A Review on Universal Code

Authors

  • Sreedhar Aashika Civil Engineer, 21, First Floor, Third Main Road, Vasanth Nagar, Bangalore – 560052, India

DOI:

https://doi.org/10.53469/jrse.2024.06(07).19

Keywords:

Universal Code, Personal identification, Convolutional Neural network, Ensemble approach

Abstract

Conventional personal identification methods (ID, password, authorization certificate, etc.) entail various issues, including forgery or loss. Technological advances and the diffusion across industries have enhanced convenience; however, privacy risks due to security attacks are increasing. Hence, personal identification based on biometrics such as the face, iris, fingerprints, and veins has been used widely. However, biometric information including faces and fingerprints is difficult to apply in industries requiring high-level security, owing to tampering or forgery risks and recognition errors. This paper proposes a personal identification technique based on Coccyx with an Artificial Intelligence.

References

Priya M.S in honor of her Intelligence work on Multilevel Image Thresholding using OTSU’s Algorithm in Image Segmentation International Journal of Scientific & Engineering Research Volume 8, Issue 5, May-2017

Gabriela Slizewska Graduate Student · University of Pittsburgh Pittsburgh, Pennsylvania, United States. Bermúdez, Jos‚ Luis; Marcel, Anthony & Eilan, Naomi eds. (1995), The Body and the Self (Cambridge, MA & London: The MIT Press)

Blakemore, Colin & Greenfield, Susan eds. (1987), Mind waves (Oxford: Blackwell)

Jeong, D. Artificial intelligence security threat, crime, and forensics: Taxonomy and open issues. IEEE Access 2020, 8, 184560–184574. [Google Scholar] [CrossRef]

Kim, J.; Rhee, P. Image recognition based on adaptive deep learning. Inst. Internet Broadcast. Commun. 2018, 18, 113–117. [Google Scholar]

Lu, L.; Mao, J.; Wang, W.; Ding, G.; Zhang, Z. A study of personal recognition method based on emg signal. IEEE Trans. Biomed. Circuits Syst. 2020, 14, 681–691. [Google Scholar] [CrossRef] [PubMed]

Rabuzin, K.; Baca, M.; Sajko, M. E-learning: Biometrics as a security factor. In Proceedings of the International Multi-Conference on Computing in the Global Information Technology, Bucharest, Romania, 1–3 August 2006; p. 64. [Google Scholar]

Barros, A.; Rosário, D.; Resque, P.; Cerqueira, E. Heart of IoT: ECG as biometric sign for authentication and identification. In Proceedings of the 15th International Wireless Communications & Mobile Computing Conference (IWCMC), Tangier, Morocco, 24–28 June 2019; pp. 307–312. [Google Scholar]

Jiang, X.; Xu, K.; Liu, X.; Dai, C.; Clifton, A.D.; Clancy, A.E.; Akay, M.; Chen, W. Cancelable HD- sEMG-based biometrics for cross-application discrepant personal identification. IEEE J. Biomed. Health Inform. 2021, 25, 1070–1079. [Google Scholar] [CrossRef]

Biel, L.; Pettersson, O.; Philipson, L.; Wide, P. ECG analysis: A new approach in human identification. IEEE Trans. Instrum. Meas. 2001, 50, 808–812. [Google Scholar] [CrossRef] [Green Version]

Ingale, M.; Cordeiro, R.; Thentu, S.; Park, Y.; Karimian, N. ECG biometric authentication: A comparative analysis. IEEE Access 2020, 8, 117853– 117866. [Google Scholar] [CrossRef]

Zhang, Q.; Zhou, D.; Zeng, X. HeartID: A multiresolution convolutional neural network for ECG- Based biometric human identification in smart health applications. IEEE Access 2017, 5, 11805–11816. [Google Scholar] [CrossRef]

Israel, S.A.; Irvine, J.M.; Cheng, A.; Wiederhold, M.D.; Wiederhold, B.K. ECG to identify individuals. Pattern Recognit. 2005, 38, 113–142. [Google Scholar] [CrossRef]

Jahiruzzaman, M.; Hossain, A.B.M.A. ECG based biometric human identification using chaotic encryption. In Proceedings of the International Conference on Electrical Engineering and Information Communication Technology (ICEEICT), Savar, Bangladesh, 21–23 May 2015; pp. 1–5. [Google Scholar]

Zhao, Z.; Yang, L.; Chen, D.; Luo, Y. A human ECG identification system based on ensemble empirical mode decomposition. Sensors 2013, 13, 6832–6864. [Google Scholar] [CrossRef] [Green Version]

Wieclaw, L.; Khoma, Y.; Fałat, P.; Sabodashko, D.; Herasymenko, V. Biometrie identification from raw ECG signal using deep learning techniques. In Proceedings of the 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), Bucharest, Romania, 21–23 September 2017; pp. 129–133. [Google Scholar]

Labati, R.D.; Muñoz, E.; Piuri, V.; Sassi, R.; Scotti, F. Deep-ECG: Convolutional neural networks for ECG biometric recognition. Pattern Recognit. Lett. 2019, 126, 78–85. [Google Scholar] [CrossRef]

Abhijit Dasgupta a, Rajat K. De b Department of Structural Biology, St. Jude Children's Research Hospital, Memphis, TN, United States

T. Neil Davis, 2156 Koyukuk Drive, University of Alaska Fairbanks,Fairbanks, AK 99775

Jin-A Lee and Keun-Chang Kwak Department of Electronic Engineering IT-Bio Convergence System, Chosun University, Gwangju 61452, Korea;

45 SPW HB S-100/KHB 1700.7, Space Transportation System Payload Ground Safety Handbook.

SPW HB S-100/KHB 1700.7, Space Transportation System Payload Ground Safety Handbook.

SPW HB S-100/KHB 1700.7, Space Transportation System Payload Ground Safety Handbook.

World Scientific Europe, Connecting Great Minds.

Ismail al-Jazari. The Book of Knowledge of Ingenious Mechanical Devices.'Book in knowledge of engineering tricks' in 1206. Mesopotamia, Turkey.

The Coccyx Miracle in Islam and Science.

Google Images. Indian Sociology.

Downloads

Published

2024-07-30

How to Cite

Aashika, S. (2024). A Review on Universal Code. Journal of Research in Science and Engineering, 6(7), 100–116. https://doi.org/10.53469/jrse.2024.06(07).19