Improving Individual Identification in Security Check with an EEG Based Biometric Solution
暂无分享,去创建一个
Bin Hu | Qinglin Zhao | Hong Peng | Quanying Liu | Li Liu | Lanlan Li | Yanbing Qi
[1] Daniel Klein,et al. Foiling the cracker: A survey of, and improvements to, password security , 1992 .
[2] M Poulos,et al. Person Identification from the EEG using Nonlinear Signal Classification , 2002, Methods of Information in Medicine.
[3] Ken Jones,et al. Getting Personal , 1995 .
[4] Sharath Pankanti,et al. Biometrics: a tool for information security , 2006, IEEE Transactions on Information Forensics and Security.
[5] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[6] Andrzej Cichocki,et al. Blind noise reduction for multisensory signals using ICA and subspace filtering, with application to EEG analysis , 2002, Biological Cybernetics.
[7] Chan F. Lam,et al. Signature recognition through spectral analysis , 1989, Pattern Recognit..
[8] Jiawei Han,et al. Data Mining: Concepts and Techniques , 2000 .
[9] R. Homan,et al. Cerebral location of international 10-20 system electrode placement. , 1987, Electroencephalography and clinical neurophysiology.
[10] J Pardey,et al. A review of parametric modelling techniques for EEG analysis. , 1996, Medical engineering & physics.
[11] S. Debener,et al. Mining EEG-fMRI using independent component analysis. , 2009, International journal of psychophysiology : official journal of the International Organization of Psychophysiology.
[12] Ramaswamy Palaniappan,et al. Method of identifying individuals using VEP signals and neural network , 2004 .
[13] Brenda Moss. Getting personal. Biometric security devices gain access to health care facilities. , 2002, Health facilities management.
[14] Nalini K. Ratha,et al. Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..
[15] Zied Elouedi,et al. Naive Bayes vs decision trees in intrusion detection systems , 2004, SAC '04.
[16] Paulo Schor,et al. Iris recognition as a biometric method after cataract surgery , 2004, Biomedical engineering online.
[17] Anil K. Jain,et al. Handbook of Face Recognition, 2nd Edition , 2011 .
[18] M Poulos,et al. On the use of EEG features towards person identification via neural networks. , 2001, Medical informatics and the Internet in medicine.
[19] Sachin S. Sapatnekar,et al. Statistical timing analysis with correlated non-Gaussian parameters using independent component analysis , 2006, 2006 43rd ACM/IEEE Design Automation Conference.
[20] Arun Ross,et al. An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.
[21] Judith A. Markowitz. Voice biometrics , 2000, CACM.
[22] N. Birbaumer,et al. The thought-translation device (TTD): neurobehavioral mechanisms and clinical outcome , 2003, IEEE Transactions on Neural Systems and Rehabilitation Engineering.
[23] Anil K. Jain,et al. Handbook of Fingerprint Recognition , 2005, Springer Professional Computing.
[24] Carles Grau,et al. Unobtrusive Biometric System Based on Electroencephalogram Analysis , 2008, EURASIP J. Adv. Signal Process..