{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T18:39:07Z","timestamp":1740163147127,"version":"3.37.3"},"reference-count":16,"publisher":"Wiley","license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/"}],"funder":[{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Computer Networks and Communications"],"published-print":{"date-parts":[[2012]]},"abstract":"<jats:p>The technological advancements in the field of remote sensing have resulted in substantial growth of the telemedicine industry. While health care practitioners may now monitor their patients\u2019 well-being from a distance and deliver their services remotely, the lack of physical presence introduces security risks, primarily with regard to the identity of the involved parties. The sensing apparatus, that a patient may employ at home, collects and transmits vital signals to medical centres which respond with treatment decisions despite the lack of solid authentication of the transmitter\u2019s identity. In essence, remote monitoring increases the risks of identity fraud in health care. This paper proposes a biometric identification solution suitable for continuous monitoring environments. The system uses the electrocardiogram (ECG) signal in order to extract unique characteristics which allow to discriminate users. In security, ECG falls under the category of<jats:italic>medical biometrics<\/jats:italic>, a relatively young but promising field of biometric security solutions. In this work, the authors investigate the idiosyncratic properties of home telemonitoring that may affect the ECG signal and compromise security. The effects of psychological changes on the ECG waveform are taken into consideration for the design of a robust biometric system that can identify users based on cardiac signals despite physical or emotional variations.<\/jats:p>","DOI":"10.1155\/2012\/924791","type":"journal-article","created":{"date-parts":[[2012,11,26]],"date-time":"2012-11-26T16:09:37Z","timestamp":1353946177000},"page":"1-11","source":"Crossref","is-referenced-by-count":22,"title":["Secure Telemedicine: Biometrics for Remote and Continuous Patient Verification"],"prefix":"10.1155","volume":"2012","author":[{"given":"Foteini","family":"Agrafioti","sequence":"first","affiliation":[{"name":"The S. Rogers Department of Electrical and Computer Engineering, University of Toronto, 10 King\u2019s College Road, Toronto, ON, Canada M5S 3G4"}]},{"given":"Francis M.","family":"Bui","sequence":"additional","affiliation":[{"name":"The Department of Electrical and Computer Engineering, University of Saskatchewan, 57 Campus Drive, Saskatoon, SK, Canada S7N 5A9"}]},{"given":"Dimitrios","family":"Hatzinakos","sequence":"additional","affiliation":[{"name":"The S. Rogers Department of Electrical and Computer Engineering, University of Toronto, 10 King\u2019s College Road, Toronto, ON, Canada M5S 3G4"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2004.05.014"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1002\/sec.227"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2007.01.014"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1054\/jelc.2000.7661"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/10.918594"},{"key":"8","doi-asserted-by":"crossref","first-page":"853","DOI":"10.1161\/01.CIR.30.6.853","volume":"30","year":"1964","journal-title":"Circulation"},{"key":"9","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1109\/T-AFFC.2011.28","volume":"3","year":"2012","journal-title":"IEEE Transactions on Affective Computing"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/s11257-007-9036-7"},{"year":"2005","key":"12"},{"year":"1993","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/19.930458"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2007.909996"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1109\/34.954607"},{"issue":"4616","key":"37","doi-asserted-by":"crossref","first-page":"1208","DOI":"10.1126\/science.6612338","volume":"221","year":"1983","journal-title":"Science"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1080\/01449290500331156"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1007\/s11257-010-9078-0"}],"container-title":["Journal of Computer Networks and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/jcnc\/2012\/924791.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/jcnc\/2012\/924791.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/jcnc\/2012\/924791.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T23:09:14Z","timestamp":1498000154000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.hindawi.com\/journals\/jcnc\/2012\/924791\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"references-count":16,"alternative-id":["924791","924791"],"URL":"https:\/\/doi.org\/10.1155\/2012\/924791","relation":{},"ISSN":["2090-7141","2090-715X"],"issn-type":[{"type":"print","value":"2090-7141"},{"type":"electronic","value":"2090-715X"}],"subject":[],"published":{"date-parts":[[2012]]}}}