The brain wave is able to present biometric data unconsciously, so that it enables continuous or on-demand authentication which is effective in user management. In this paper, assuming an application to driver authentication, we evaluate verification performance of the brain wave using a simplified driving simulator. In addition, dividing the α-β band to several partitions, we propose to extract the difference between a mean value of the power spectrum at each partition in relaxed condition and that in mental-tasked condition as an individual feature. Fusing the differences from higher partitions in verification, the EER of 24% is obtained among 10 subjects
Biometrics such as fingerprints and iris scans has been used in authentication. However, conventiona...
Brain signals are being investigated within the medical field for more than a century to study brain...
We seek to augment the current Common Access Control (CAC) card and Personal Identification Number (...
In the case of user management, continuous or on-demand biometric authentication is effective for ac...
From the viewpoint of user management, continuous or on-demand biometric authentication is effective...
From the viewpoint of user management, on-demand biometric authentication is effective for achieving...
For user management in high-security systems, continuous authentication is required, where unconscio...
This paper investigates the possibility of creating an authentication system based on the measuremen...
From the viewpoint of user management, continuous authentication is effective. However, general biom...
Biometrics have been used in person authentication. However, conventional biometrics have a vulnerab...
In this paper, we investigate the use of brain activity for person authentication. It has been shown...
Security authentication is one of the most important levels of information security. Nowadays, human...
Security authentication is one of the most important levels of information security. Nowadays, human...
The demand for security and user authentication has recently become an essential part of all aspects...
Person authentication using biometric information has become increasingly popular owing to the fact ...
Biometrics such as fingerprints and iris scans has been used in authentication. However, conventiona...
Brain signals are being investigated within the medical field for more than a century to study brain...
We seek to augment the current Common Access Control (CAC) card and Personal Identification Number (...
In the case of user management, continuous or on-demand biometric authentication is effective for ac...
From the viewpoint of user management, continuous or on-demand biometric authentication is effective...
From the viewpoint of user management, on-demand biometric authentication is effective for achieving...
For user management in high-security systems, continuous authentication is required, where unconscio...
This paper investigates the possibility of creating an authentication system based on the measuremen...
From the viewpoint of user management, continuous authentication is effective. However, general biom...
Biometrics have been used in person authentication. However, conventional biometrics have a vulnerab...
In this paper, we investigate the use of brain activity for person authentication. It has been shown...
Security authentication is one of the most important levels of information security. Nowadays, human...
Security authentication is one of the most important levels of information security. Nowadays, human...
The demand for security and user authentication has recently become an essential part of all aspects...
Person authentication using biometric information has become increasingly popular owing to the fact ...
Biometrics such as fingerprints and iris scans has been used in authentication. However, conventiona...
Brain signals are being investigated within the medical field for more than a century to study brain...
We seek to augment the current Common Access Control (CAC) card and Personal Identification Number (...