|
[1] W. Khalifa, A. Salem, M. Roushdy, and K. Revett, “A survey of EEG based user authentication schemes,” in 2012 8th International Conference on Informatics and Systems (INFOS), pp. BIO–55–60, 2012. [2] A. Almehmadi and K. El-Khatib, “The state of the art in electroencephalogram and access control,” in 2013 Third International Conference on Communications and Information Technology (ICCIT), pp. 49–54, IEEE, 2013. [3] J. Thorpe, P. C. van Oorschot, and A. Somayaji, “Pass-thoughts: authenticating with our minds,” in Proceedings of the 2005 workshop on New Security Paradigms, pp. 45–56, ACM, 2005. [4] D. Peralta, I. Triguero, R. Sanchez-Reillo, F. Herrera, and J. M. Benítez, “Fast fingerprint identification for large databases,” Pattern Recognition, vol. 47, no. 2, pp. 588–602, 2014. [5] S. Pankanti, S. Prabhakar, and A. K. Jain, “On the individuality of fingerprints,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 24, no. 8, pp. 1010–1025, 2002. [6] Y. Xu, L. Fei, and D. Zhang, “Combining left and right palmprint images for more accurate personal identification,” IEEE Transactions on Image Processing, vol. 24, no. 2, pp. 549–559, 2015. [7] M. Blanton and P. Gasti, “Secure and efficient protocols for iris and fingerprint identification,” in European Symposium on Research in Computer Security, pp. 190–209, Springer, 2011. [8] A. Dustor and P. Kłosowski, “Biometric voice identification based on fuzzy kernel classifier,” in International Conference on Computer Networks, pp. 456–465, Springer, 2013. [9] Y. Sun, Y. Chen, X. Wang, and X. Tang, “Deep learning face representation by joint identification-verification,” in Advances in Neural Information Processing Systems, pp. 1988–1996, 2014. [10] S. Liu, Y. Bai, J. Liu, H. Qi, P. Li, X. Zhao, P. Zhou, L. Zhang, B. Wan, C. Wang, et al., “Individual feature extraction and identification on EEG signals in relax and visual evoked tasks,” Biomedical Informatics and Technology, pp. 305–318, 2014. [11] S. Marcel and J. d. R. Millán, “Person authentication using brainwaves EEG and maximum a posteriori model adaptation,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 29, no. 4, 2007. [12] M. Poulos, M. Rangoussi, and N. Alexandris, “Neural network based person identification using EEG features,” in 1999 IEEE International Conference on Acoustics, Speech, and Signal Processing, vol. 2, pp. 1117–1120, IEEE, 1999. [13] M. Poulos, M. Rangoussi, V. Chrissikopoulos, and A. Evangelou, “Person identification based on parametric processing of the EEG,” in The 6th IEEE International Conference on Electronics, Circuits and Systems. (ICECS’99), vol. 1, pp. 283–286, IEEE, 1999. [14] M. Abo-Zahhad, S. M. Ahmed, and S. N. Abbas, “A novel biometric approach for human identification and verification using eye blinking signal.,” 2015 IEEE Signal Process Letters, vol. 22, no. 7, pp. 876–880, 2015. [15] L. F. Haas, “Hans Berger(1873–1941), Richard Caton(1842–1926), and electroencephalography,” Journal of Neurology, Neurosurgery & Psychiatry, vol. 74, no. 1, pp. 9–9, 2003. [16] M. Teplan et al., “Fundamentals of EEG measurement,” Measurement Science Review, vol. 2, no. 2, pp. 1–11, 2002. [17] M. Poulos, M. Rangoussi, V. Chrissikopoulos, and A. Evangelou, “Parametric person identification from the EEG using computational geometry,” in The 6th IEEE International Conference on Electronics, Circuits and Systems, Proceedings of ICECS’99, vol. 2, pp. 1005–1008, IEEE, 1999. [18] G. Mohammadi, P. Shoushtari, B. Molaee Ardekani, and M. B. Shamsollahi, “Person identification by using ar model for EEG signals,” in Proceeding of World Academy of Science, Engineering and Technology, vol. 11, pp. 281–285, 2006. [19] H. A. Shedeed, “A new method for person identification in a biometric security system based on brain EEG signal processing,” in World Congress on Information and Communication Technologies (WICT), pp. 1205–1210, IEEE, 2011. [20] T. Pham, W. Ma, D. Tran, P. Nguyen, and D. Phung, “EEG-based user authentication using artifacts,” in International Joint Conference SOCO' 14-CISIS' 14-ICEUTE' 14. Springer, pp. 343–353, Springer, 2014. [21] Q. Gui, Z. Jin, and W. Xu, “Exploring EEG-based biometrics for user identification and authentication,” in IEEE Signal Processing in Medicine and Biology Symposium (SPMB), pp. 1–6, IEEE, 2014. [22] A. B. Jeng, C.-C. Tseng, D.-F. Tseng, and J.-C. Wang, “A study of CAPTCHA and its application to user authentication,” in International Conference on Computational Collective Intelligence, pp. 433–440, Springer, 2010. [23] E. Bursztein, M. Martin, and J. Mitchell, “Text-based CAPTCHA strengths and weakness,” in Proceedings of the 18th ACM conference on Computer and communications security, pp. 125–138, ACM, 2011. [24] E. E. Papalexakis, A. Fyshe, N. D. Sidiropoulos, P. P. Talukdar, T. M. Mitchell, and C. Faloutsos, “Good-enough brain model: Challenges, algorithms, and discoveries in multisubject experiments,” 2014 Big data, vol. 2, no. 4, pp. 216–229, 2014. [25] A. Prochazka, J. Kukal, and O. Vysata, “Wavelet transform use for feature extraction and EEG signal segments classification,” in 2008. 3rd International Symposium on Communications, Control and Signal Processing,(ISCCSP), pp. 719–722, IEEE, 2008. [26] S. Karsoliya, “Approximating number of hidden layer neurons in multiple hidden layer BPNN architecture,” International Journal of Engineering Trends and Technology, vol. 3, no. 6, pp. 714–717, 2012. [27] M. D. Odom and R. Sharda, “A neural network model for bankruptcy prediction,” in International Joint Conference on Neural Networks,(IJCNN), pp. 163–168, IEEE, 1990. [28] S.-K. Yeom, H.-I. Suk, and S.-W. Lee, “Person authentication from neural activity of face-specific visual self-representation,” Pattern Recognition, vol. 46, no. 4, pp. 1159–1169, 2013.
|