|
[1] A. K. Jain, A. Ross, and S. Prabhakar, "An introduction to biometric recognition," IEEE Trans. Circuits Syst. Video Technol, vol. 14, pp. 4-20, 2004. [2] J. Unar, W. C. Seng, and A. Abbasi, "A review of biometric technology along with trends and prospects," Pattern Recog., vol. 47, pp. 2673-2688, 2014. [3] N. K. Ratha, J. H. Connell, and R. M. Bolle, "Enhancing security and privacy in biometrics-based authentication systems," IBM Syst. J., vol. 40, pp. 614-634, 2001. [4] A. K. Jain, K. Nandakumar, and A. Nagar, "Biometric template security," EURASIP J. on Advances in Signal Processing, vol. 2008, p. 113, 2008. [5] S. Rane, Y. Wang, S. C. Draper, and P. Ishwar, "Secure biometrics: concepts, authentication architectures, and challenges," IEEE Signal Process. Mag., vol. 30, pp. 51-64, 2013. [6] V. M. Patel, N. K. Ratha, and R. Chellappa, "Cancelable biometrics: A review," IEEE Signal Process. Mag., vol. 32, pp. 54-65, 2015. [7] S. Prabhakar, S. Pankanti, and A. K. Jain, "Biometric recognition: Security and privacy concerns," IEEE Security Privacy, 2003. [8] R. M. Bolle, J. H. Connell, and N. K. Ratha, "Biometric perils and patches," Pattern Recog., vol. 35, pp. 2727-2738, 2002. [9] R. Belguechi, E. Cherrier, and C. Rosenberger, "How to Evaluate Transformation Based Cancelable Biometric Systems?," in NIST International Biometric Performance Testing Conference (IBPC), 2012. [10] R. Belguechi, E. Cherrier, C. Rosenberger, and S. Ait-Aoudia, "An integrated framework combining Bio-Hashed minutiae template and PKCS15 compliant card for a better secure management of fingerprint cancelable templates," Comput. Secur., vol. 39, pp. 325-339, 2013. [11] J. K. Pillai, V. M. Patel, R. Chellappa, and N. K. Ratha, "Sectored Random Projections for Cancelable Iris Biometrics," in Proc. IEEE Int. Conf. Acoust. Speech Signal Process, 2010, pp. 1838-1841. [12] M. Savvides, B. V. Kumar, and P. K. Khosla, "Cancelable biometric filters for face recognition," in Proc. Int. Conf. Pattern Recognition, 2004, pp. 922-925. [13] R Bousseljot, D Kreiseler, and A. Schnabel, "Nutzung der EKG-Signaldatenbank CARDIODAT der PTB über das internet," Biomedizinische Technik, vol. 40, p. s317, 1995. [14] Y. Wang, F. Agrafioti, D. Hatzinakos, and K. N. Plataniotis, "Analysis of human electrocardiogram for biometric recognition," EURASIP J. on Advances in Signal Processing, vol. 2008, pp. 1-11, 2007. [15] L. Biel, O. Pettersson, L. Philipson, and P. Wide, "ECG analysis: a new approach in human identification," IEEE Trans. Instrum. Mea., vol. 50, pp. 808-812, 2001. [16] I. Odinaka, P.-H. Lai, A. D. Kaplan, J. A. O'Sullivan, E. J. Sirevaag, and J. W. Rohrbaugh, "ECG biometric recognition: A comparative analysis," IEEE Trans. Inf. Forensics Security, vol. 7, pp. 1812-1824, 2012. [17] S. A. Israel, J. M. Irvine, A. Cheng, M. D. Wiederhold, and B. K. Wiederhold, "ECG to identify individuals," Pattern Recog., vol. 38, pp. 133-142, 2005. [18] Y. N. Singh and S. K. Singh, "Identifying individuals using eigenbeat features of electrocardiogram," Journal of Engineering, vol. 2013, 2013. [19] L. Sörnmo and P. Laguna, Bioelectrical signal processing in cardiac and neurological applications vol. 8: Academic Press, 2005. [20] Online, " http://celestialmedicine.tumblr.com/post/106864492194." [21] N. Dey, B. Nandi, M. Dey, D. Biswas, A. Das, and S. S. Chaudhuri, "Biohash code generation from electrocardiogram features," in 3rd IEEE International Advance Computing Conference, 2013, pp. 732-735. [22] R. Hoekema, G. J. Uijen, and A. Van Oosterom, "Geometrical aspects of the interindividual variability of multilead ECG recordings," IEEE Trans. Biomed. Eng., vol. 48, pp. 551-559, 2001. [23] C. Levkov, G. Mihov, R. Ivanov, I. Daskalov, I. Christov, and I. Dotsinsky, "Removal of power-line interference from the ECG: a review of the subtraction procedure," BioMedical Engineering OnLine, vol. 4, p. 1, 2005. [24] P. De Chazal, C. Heneghan, E. Sheridan, R. Reilly, P. Nolan, and M. O'Malley, "Automated processing of the single-lead electrocardiogram for the detection of obstructive sleep apnoea," IEEE Trans. Biomed. Eng., vol. 50, pp. 686-696, 2003. [25] J. Pan and W. J. Tompkins, "A real-time QRS detection algorithm," IEEE Trans. Biomed. Eng., pp. 230-236, 1985. [26] R. Schmidt, "Multiple emitter location and signal parameter estimation," IEEE Trans. Antennas Propag., vol. 34, pp. 276-280, 1986. [27] G. Strang, "Introduction to linear algebra," 2011. [28] J. M. Irvine, S. A. Israel, W. T. Scruggs, and W. J. Worek, "eigenPulse: Robust human identification from cardiovascular function," Pattern Recog., vol. 41, pp. 3427-3435, 2008. [29] P. McSharry and G. Clifford, "ECGSYN-A realistic ECG waveform generator," URL http://www. physionet. org/physiotools/ecgsyn, 2003. [30] R. Moddemeijer, "On estimation of entropy and mutual information of continuous distributions," SigPr, vol. 16, pp. 233-248, 1989. |