[1]. N. Ratha, S. Chikkerur, JH. Connell and RM. Bolle, “Generating cancelable fingerprint templates, “ IEEE Transactions on Pattern Analysis & Machine. Intelligence 29(4):pp. 561-572 ,2007
[2] A. D. Chan, M. M. Hamdy, A. Badre, and V. Badee, "Wavelet distance measure for person identification using electrocardiograms," IEEE transactions on instrumentation and measurement, vol. 57, pp. 248-253, 2008.
[3] S. J. Kang, S. Y. Lee, H. I. Cho, and H. Park, "ECG Authentication System Design Based on Signal Analysis in Mobile and Wearable Devices," IEEE Signal Processing Letters, vol. 23, pp. 805-808, 2016.
[4] E. K. Zaghouani, A. Benzina, and R. Attia, "ECG based authentication for e-healthcare systems: Towards a secured ECG features transmission," in Wireless Communications and Mobile Computing Conference (IWCMC), 2017 13th International, 2017, pp. 1777-1783.
[5] J. D. Brown, W. Pase, C. McKenzie, M. Salmanian, and H. Tang, "A Prototype Implementation of Continuous Authentication for Tactical Applications," in Ad Hoc Networks, ed: Springer, 2017, pp. 342-353.
[6] J. S. Arteaga-Falconi, H. Al Osman, and A. El Saddik, "ECG authentication for mobile devices," IEEE Transactions on Instrumentation and Measurement, vol. 65, pp. 591-600, 2016.
[7] D. Tantinger, M. Zrenner, N. R. Lang, H. Leutheuser, B. M. Eskofier, C. Weigand, et al., "Human authentication implemented for mobile applications based on ECG-data acquired from sensorized garments," in Computing in Cardiology Conference (CinC), 2015, 2015, pp. 417-420.
[8] W. Yarong and Z. Gang, "Study of human identification by electrocardiography frequency features," in International Symposium on Computers and Informatics (ISCI 2015), 2015.
[9] M. M. Tantawi, K. Revett, A.-B. Salem, and M. F. Tolba, "A wavelet feature extraction method for electrocardiogram (ECG)-based biometric recognition," Signal, Image and Video Processing, vol. 9, pp. 1271-1280, 2015.
[11] S. K. Kim, C. Y. Yeun, E. Damiani and N. W. Lo, "A Machine Learning Framework for Biometric Authentication using Electrocardiogram",IEEE Access7(2019), pp. 94858-94868
[12] H. Huang, L. Hu, F. Xiao, A. Du, N. Ye and Fan He “An EEG-Based Identity Authentication System with Audiovisual Paradigm in IoT” Sensors 2019, 19(7), 1664; doi: 10.3390/s19071664
[13] P. Huang, L. Guo, M. Li and Y. Fang, "Practical Privacy-preserving ECG-based Authentication for IoT-based Healthcare," in IEEE Internet of Things Journal.
doi: 10.1109/JIOT.2019.2929087
[14] N. Ratha, S. Chikkerur, JH. Connell and RM. Bolle, “Generating cancelable fingerprint templates, “ IEEE Transactions on Pattern Analysis & Machine. Intelligence 29(4):pp. 561-572 ,2007
[15] N. Dey, B. Nandi , M. Dey, D. Biswas, A. Das and SS. Chaudhuri “BioHash code generation from electrocardiogram features”. In: IEEE 3rd International Advance Computing Conference (IACC). IEEE, Ghaziabad, 2013
[16] J. Pan and WJ. Tompkins “ A Real-time qrs detection algorithm”. IEEE Trans Biomed Eng 32(3):pp. 230–236 , 1985
[17] M. Dey, N. Dey, Mahata, S. K., Chakraborty, S., Acharjee, S., & Das, A. “Electrocardiogram Feature Based Inter-human Biometric Authentication System”, 2014 International Conference on Electronic Systems, Signal Processing and Computing Technologies
[18] M. Hammad, Luo, G., and Wang, K. (2018). “Cancelable biometric authentication system based on ECG”. Multimedia Tools and Applications. doi:10.1007/s11042-018-6300-2
[19] R.
Mukhaiyar, SS. Dlay and WL. Woo “Cancelable biometric using matrix approaches”, Newcastle University, Newcastle upon Tyne , 2015
[20] J. AK, D. Maltoni, D Miao and A. Prabhakar “Handbook of fingerprint recognition”. Springer-Verlag, 2003
[21] A. Albert “Regression and the moore-penrose pseudoinverse”, Academic Press. ISBN: 9780080956039
[22] B. P. Bogert, M. J. R. Healy, and
J. W. Tukey: "The Quefrency Alanysis [sic] of Time Series for Echoes: Cepstrum, Pseudo Autocovariance, Cross-Cepstrum, and Saphe Cracking". Proceedings of the Symposium on Time Series Analysis (M. Rosenblatt, Ed) Chapter 15, pp. 209-243. New York: Wiley, 1963.