A Study on Combining EEG Signals and Crytography for Bitcoin Security
暂无分享,去创建一个
Wanli Ma | Dat Tran | Dang Nguyen | Wanli Ma | D. Tran | Dang Nguyen
[1] Dharmendra Sharma,et al. A Proposed Feature Extraction Method for EEG-based Person Identification , 2012 .
[2] Hung T. Nguyen,et al. Investigation of window size in classification of EEG-emotion signal with wavelet entropy and support vector machine , 2015, 2015 37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC).
[3] P. Garc,et al. Analysis of EEG Signals using Nonlinear Dynamics and Chaos: A review , 2015 .
[4] H. Akaike. A new look at the statistical model identification , 1974 .
[5] José del R. Millán,et al. Person Authentication Using Brainwaves (EEG) and Maximum A Posteriori Model Adaptation , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[6] Guangyi Chen,et al. Are electroencephalogram (EEG) signals pseudo-random number generators? , 2014, J. Comput. Appl. Math..
[7] Yongdong Wu,et al. Transforming a pattern identifier into biometric key generators , 2010, 2010 IEEE International Conference on Multimedia and Expo.
[8] Anil K. Jain,et al. Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..
[9] C. Stam,et al. Nonlinear dynamical analysis of EEG and MEG: Review of an emerging field , 2005, Clinical Neurophysiology.
[10] Youjun Li,et al. Human Emotion Recognition with Electroencephalographic Multidimensional Features by Hybrid Deep Neural Networks , 2017 .
[11] Thierry Pun,et al. DEAP: A Database for Emotion Analysis ;Using Physiological Signals , 2012, IEEE Transactions on Affective Computing.
[12] Qi Li,et al. Cryptographic key generation from voice , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[13] Hiroshi Hasegawa,et al. Using a Low-Cost Electroencephalogram (EEG) Directly as Random Number Generator , 2014, 2014 IIAI 3rd International Conference on Advanced Applied Informatics.
[14] Ralf Steinmetz,et al. Biometric hash based on statistical features of online signatures , 2002, Object recognition supported by user interaction for service robots.
[15] Andreas Uhl,et al. A survey on biometric cryptosystems and cancelable biometrics , 2011, EURASIP J. Inf. Secur..
[16] Anil K. Jain,et al. Multibiometric Template Security Using Fuzzy Vault , 2008, 2008 IEEE Second International Conference on Biometrics: Theory, Applications and Systems.
[17] Richard Shiavi,et al. Introduction to Applied Statistical Signal Analysis: Guide to Biomedical and Electrical Engineering Applications , 2006 .
[18] Mel Slater,et al. Biometric random number generators , 2004, Comput. Secur..
[19] Bin He,et al. BRAIN^COMPUTER INTERFACE , 2007 .
[20] F. L. D. Silva,et al. EEG signal processing , 2000, Clinical Neurophysiology.
[21] Nurul Nadia Ahmad,et al. Analysis of the EEG Signal for a Practical Biometric System , 2010 .
[22] David Chek Ling Ngo,et al. Computation of Cryptographic Keys from Face Biometrics , 2003, Communications and Multimedia Security.
[23] Feng Hao,et al. Combining Crypto with Biometrics Effectively , 2006, IEEE Transactions on Computers.