|
[1] 王文娟, "物聯網概念及應用," 經濟前瞻, no. 168, pp. 29-36, 2016. [2] C. MOORE. Couple whose baby monitor was hacked has message for other families. [3] 商業週刊.福澤喬. 7pay遭駭損失3千多萬日圓,為何全家FamiPay卻沒事?日本7-11疏忽了什麼?Available:https://www.businessweekly.com.tw/article.aspx?id=26319&type=Blog. [4] 孙冬梅 and 裘正定, "生物特征识别技术综述," 电子学报, vol. 29, no. 12A, pp. 1744-1748, 2001. [5] J. R. Pinto, J. S. Cardoso, and A. Lourenço, "Evolution, Current Challenges, and Future Possibilities in ECG Biometrics," IEEE Access, vol. 6, pp. 34746-34776, 2018. [6] A. Rattani, W. J. Scheirer, and A. Ross, "Open Set Fingerprint Spoof Detection Across Novel Fabrication Materials," IEEE T. Inf. Foren. Sec., vol. 10, no. 11, pp. 2447-2460, 2015. [7] D. Wen, H. Han, and A. K. Jain, "Face Spoof Detection With Image Distortion Analysis," IEEE T. Inf. Foren. Sec., vol. 10, no. 4, pp. 746-761, 2015. [8] L. Biel, O. Pettersson, L. Philipson, and P. Wide, "ECG analysis: a new approach in human identification," IEEE T. Instrum. Meas., vol. 50, no. 3, pp. 808-812, 2001. [9] J. M. Irvine, S. A. Israel, W. Todd Scruggs, and W. J. Worek, "eigenPulse: Robust human identification from cardiovascular function," Pattern Recogn., vol. 41, no. 11, pp. 3427-3435, 2008/11/01/ 2008. [10] S.-C. Fang and H.-L. Chan, "Human identification by quantifying similarity and dissimilarity in electrocardiogram phase space," Pattern Recogn., vol. 42, no. 9, pp. 1824-1831, 2009/09/01/ 2009. [11] J. Wang, M. She, S. Nahavandi, and A. Kouzani, "Human Identification From ECG Signals Via Sparse Representation of Local Segments," IEEE Signal Proc. Let., vol. 20, no. 10, pp. 937-940, 2013. [12] S. A. Israel, J. M. Irvine, A. Cheng, M. D. Wiederhold, and B. K. Wiederhold, "ECG to identify individuals," Pattern Recogn., vol. 38, no. 1, pp. 133-142, 2005. [13] R. Hoekema, G. J. Uijen, and A. Van Oosterom, "Geometrical aspects of the interindividual variability of multilead ECG recordings," IEEE T. Bio-Med. Eng., vol. 48, no. 5, pp. 551-559, 2001. [14] S. Z. Fatemian and D. Hatzinakos, "A new ECG feature extractor for biometric recognition," in 2009 16th international conference on digital signal processing, 2009, pp. 1-6: IEEE. [15] K. N. Plataniotis, D. Hatzinakos, and J. K. M. Lee, "ECG Biometric Recognition Without Fiducial Detection," in 2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference, 2006, pp. 1-6. [16] F. Agrafioti, F. M. Bui, and D. Hatzinakos, "Secure Telemedicine: Biometrics for Remote and Continuous Patient Verification," J. Comput. Netw. Commun., vol. 2012, p. 11, 2012, Art. no. 924791. [17] S. M. Egelman, S. Komanduri, R. Shay, P. G. Kelley, M. L. Mazurek, L. Bauer, N. Christin, and L. F. Cranor, "Of Passwords and People: Measuring the Effect of Password-Composition Policies," in CHI 2011, 2011. [18] W. Burr, D. Dodson, and W. Polk, "Electronic authentication guideline," National Institute of Standards and Technology2004. [19] B. Burr, "Estimating password strength," Draft for Comment, Slide Presentation. [20] F. Aloul, S. Zahidi, and W. El-Hajj, "Two factor authentication using mobile phones," in 2009 IEEE/ACS International Conference on Computer Systems and Applications, 2009, pp. 641-644: IEEE. [21] Apple ID registration. Available: https://appleid.apple.com/account#!&page=create [22] F. Alliance. (2017, 11 April 2017). Universal 2nd Factor (U2F) Overview. [23] A. K. Jain, A. Ross, and S. Prabhakar, "An introduction to biometric recognition," IEEE T. Circ. Syst. Vid., vol. 14, no. 1, pp. 4-20, 2004. [24] J. A. Unar, W. C. Seng, and A. Abbasi, "A review of biometric technology along with trends and prospects," Pattern Recogn., vol. 47, no. 8, pp. 2673-2688, 2014/08/01/ 2014. [25] M. Turk and A. Pentland, "Face recognition using eigenfaces," in Proceedings. 1991 IEEE computer society conference on computer vision and pattern recognition, 1991, pp. 586,587,588,589,590,591-586,587,588,589,590,591. [26] D. Maltoni, D. Maio, A. K. Jain, and S. Prabhakar, Handbook of fingerprint recognition. Springer Science & Business Media, 2009. [27] S.-C. Wu and P.-T. Chen, "Block projection based feature extraction for biometric recognition with multi-lead ECG," Int. J. Pharma Med. Biol. Sci., vol. 4, no. 2, p. 97, 2015. [28] Y. Wang, F. Agrafioti, D. Hatzinakos, and K. N. Plataniotis, "Analysis of Human Electrocardiogram for Biometric Recognition," EURASIP J. Adv. Sig. Pr., vol. 2008, no. 1, p. 148658, 2007/09/19 2007. [29] O. Boumbarov, Y. Velchev, and S. Sokolov, "ECG personal identification in subspaces using radial basis neural networks," in Int. Worksh. Int. Data, 2009, pp. 446-451. [30] M. N. Dar, M. U. Akram, A. Usman, and S. A. Khan, "ECG biometric identification for general population using multiresolution analysis of DWT based features," in Proc. 2nd Int. Conf. Inf. Secur. Cyber Forensics (InfoSec), 2015, pp. 5-10. [31] A. D. C. Chan, M. M. Hamdy, A. Badre, and V. Badee, "Wavelet Distance Measure for Person Identification Using Electrocardiograms," IEEE T. Instrum. Meas., vol. 57, no. 2, pp. 248-253, 2008. [32] R. Matta, J. K. H. Lau, F. Agrafioti, and D. Hatzinakos, "Real-time continuous identification system using ECG signals," in Proc. 24th Can. Conf. Elect. Comput. Eng. (CCECE), 2011, pp. 001313-001316. [33] M. Hejazi, S. A. R. Al-Haddad, S. J. Hashim, A. F. A. Aziz, and Y. P. Singh, "Feature level fusion for biometric verification with two-lead ECG signals," in Proc. IEEE CSPA, 2016, pp. 54-59. [34] V. M. Patel, N. K. Ratha, and R. Chellappa, "Cancelable Biometrics: A review," IEEE Signal Proc. Mag., vol. 32, no. 5, pp. 54-65, 2015. [35] C. Rathgeb and A. Uhl, "A survey on biometric cryptosystems and cancelable biometrics," Eurasip J. Inf. Secur., vol. 2011, no. 1, p. 3, 2011. [36] J. K. Pillai, V. M. Patel, R. Chellappa, and N. K. Ratha, "Sectored Random Projections for Cancelable Iris Biometrics," in ICASSP, 2010, pp. 1838-1841. [37] A. B. J. Teoh, Y. W. Kuan, and S. Lee, "Cancellable biometrics and annotations on BioHash," Pattern Recogn., vol. 41, no. 6, pp. 2034-2044, 2008/06/01/ 2008. [38] A. Kong, K.-H. Cheung, D. Zhang, M. Kamel, and J. You, "An analysis of BioHashing and its variants," Pattern Recogn., vol. 39, no. 7, pp. 1359-1368, 2006/07/01/ 2006. [39] D. L. Donoho, "Compressed sensing," IEEE Trans. Inf. Theory, vol. 52, no. 4, pp. 1289-1306, 2006. [40] R. C. Merkle, "Protocols for public key cryptosystems," in 1980 IEEE Symposium on Security and Privacy, 1980, pp. 122-122: IEEE. [41] R. L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Communications of the ACM, vol. 21, no. 2, pp. 120-126, 1978. [42] m. integrated. MAX86150EVSYS Evaluation System for the MAX86150 . Available:https://www.maximintegrated.com/en/products/sensors/MAX86150EVSYS.html/tb_tab0. [43] Nvidia. Jetson nano開發套件與模組. Available: https://www.nvidia.com/zh-tw/autonomous-machines/embedded-systems/jetson-nano/ [44] m. integrated. MAX86150EVSYS Physical photo. Available:https://datasheets.maximintegrated.com/en/ds/MAX86150EVSYS.pdf. [45] ARDUINO. Getting Started with Arduino UNO. Available: https://www.arduino.cc/en/Guide/ArduinoUno [46] R. Bousseljot, D. Kreiseler, and A. Schnabel, "Nutzung der EKG-Signaldatenbank CARDIODAT der PTB über das Internet," Biomed. Tech., vol. 40, no. s1, p. 317, 1995. [47] J. Bonneau, C. Herley, P. C. Van Oorschot, and F. Stajano, "The quest to replace passwords: A framework for comparative evaluation of web authentication schemes," in 2012 IEEE Symposium on Security and Privacy, 2012, pp. 553-567: IEEE. [48] R. M. Van Rijswijk and J. Van Dijk, "tiqr: a novel take on two-‐factor authentication," in Proceedings of LISA’11: 25th Large Installation System Administration Conference, 2011, p. 81.
|