Loading…

A Chaotic Theorectical Approach to ECG-Based Identity Recognition [Application Notes]

Sophisticated technologies realized from applying the idea of biometric identification are increasingly applied in the entrance security management system, private document protection, and security access control. Common biometric identification involves voice, attitude, keystroke, signature, iris,...

Full description

Saved in:
Bibliographic Details
Published in:IEEE computational intelligence magazine 2014-02, Vol.9 (1), p.53
Main Authors: Chen, Ching-Kun, Lin, Chun-Liang, Lin, Shyan-Lung, Chiu, Yen-Ming, Chiang, Cheng-Tang
Format: Magazinearticle
Language:English
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Sophisticated technologies realized from applying the idea of biometric identification are increasingly applied in the entrance security management system, private document protection, and security access control. Common biometric identification involves voice, attitude, keystroke, signature, iris, face, palm or finger prints, etc. Still, there are novel identification technologies based on the individual's biometric features under development [1-4].
ISSN:1556-6048
1556-603X
DOI:10.1109/MCI.2013.2291691