Accurate authentication based on ECG using deep learning

Biometric-based authentication methods have been widely used, for example on portable devices (e.g., Android and iOS devices). However, there are several known limitations in existing authentication methods based on biometrics (e.g., those using facial, iris, and fingerprint). For example, in a heal...

Full description

Saved in:
Bibliographic Details
Published inJournal of computer security Vol. 32; no. 5; pp. 425 - 446
Main Authors Zhang, Liping, Chen, Shukai, Ren, Wei, Min, Geyong, Choo, Kim-Kwang Raymond
Format Journal Article
LanguageEnglish
Published London, England SAGE Publications 18.11.2024
Sage Publications Ltd
Subjects
Online AccessGet full text

Cover

Loading…