Electrocardiogram signals-based user authentication systems using soft computing techniques

M Hosseinzadeh, B Vo, MY Ghafour… - Artificial Intelligence …, 2021 - Springer
With the advent of various security attacks, biometric authentication methods are gaining
momentum in the security literature. Electrocardiogram or ECG signals are one of the …

Cancelable biometric authentication system based on ECG

M Hammad, G Luo, K Wang - Multimedia Tools and Applications, 2019 - Springer
Biometrics are widely deployed in various security systems; however, they have drawbacks
in the form of leakage or stealing, therefore numerous solutions have been proposed to …

Line spectral frequency-based features and extreme learning machine for voice activity detection from audio signal

H Mukherjee, SM Obaidullah, KC Santosh… - International Journal of …, 2018 - Springer
Voice activity detection (VAD) refers to the task of identifying vocal segments from an audio
clip. It helps in reducing the computational overhead as well elevate the recognition …

ActID: An efficient framework for activity sensor based user identification

SRV Sudhakar, N Kayastha, K Sha - Computers & Security, 2021 - Elsevier
Identification is the core of any authentication protocol design as the purpose of the
authentication is to verify the user's identity. The efficient establishment and verification of …

Cancelable ECG biometrics using compressive sensing-generalized likelihood ratio test

H Kim, SY Chun - IEEE Access, 2019 - ieeexplore.ieee.org
Electrocardiogram (ECG) has been investigated as promising biometrics, but it cannot be
canceled and re-used once compromised just like other biometrics. We propose methods to …

Attendance recording system using partial face recognition algorithm

B Surekha, KJ Nazare, S Viswanadha Raju… - Intelligent techniques in …, 2017 - Springer
In today's world, recording the attendance of a student plays an important role in improving
the quality of educational system. The manual labor included in the maintenance and …

Biometric-based security system: Issues and challenges

U Gawande, Y Golhar, K Hajari - Intelligent Techniques in Signal …, 2017 - Springer
Though biometric systems have been successfully engaged in a number of real-world
applications, they are error prone. The challenge is to develop a biometric system that is …

Two biometric approaches for cattle identification based on features and classifiers fusion

A Tharwat, T Gaber… - International Journal of …, 2015 - inderscienceonline.com
According to FAO organisation, by 2050 annual meat production should be risen by over
200 M tonnes to reach 470 M tones as the world population will reach 9.1 billion (34 …

Multi-fingerprint unimodel-based biometric authentication supporting cloud computing

P Rajeswari, S Viswanadha Raju, AS Ashour… - Intelligent techniques in …, 2017 - Springer
Cloud computing is one of the emerging technologies that transfers network users to the
next level. Security is one of the critical challenges faced by cloud computing. Biometrics …

SMHeart ID: smart ID based on ECG and long short term memory for remote health monitoring

D Saxena, P Patel - Multimedia Tools and Applications, 2024 - Springer
To a good extent, remote health monitoring (RHM) has become an important area of
research as life expectancy has improved. RHM can be very helpful for chronic and critical …