1. A Chaotic Theoretical Approach to ECG-Based Identity Recognition [Application Notes]
- Author
-
Shyan-Lung Lin, Cheng-Tang Chiang, Ching-Kun Chen, Yen-Ming Chiu, and Chun-Liang Lin
- Subjects
Biometrics ,Computer science ,business.industry ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Access control ,Computer security ,computer.software_genre ,Keystroke logging ,Theoretical Computer Science ,Identification (information) ,Artificial Intelligence ,Face (geometry) ,Pattern recognition (psychology) ,Security management ,business ,computer ,Signature recognition - Abstract
Sophisticated technologies realized from applying the idea of biometric identification are increasingly applied in the entrance security management system, private document protection, and security access control. Common biometric identification involves voice, attitude, keystroke, signature, iris, face, palm or finger prints, etc. Still, there are novel identification technologies based on the individual's biometric features under development [1-4].
- Published
- 2014