Biometrics have been used in person authentication. However, conventional biometrics have a vulnerability to the identity theft, especially in user management systems. In order to prevent the identity theft, the effective way is to authenticate continuously. However, the continuous authentication requires unconscious biometrics. The authors have been studied to use brain waves as the unconscious biometrics. In conventional studies, the authors had used spontaneous brain waves; however, their verification performance was not so high. Thus, the authors propose to use evoked potentials by supersonic sounds, which cannot be perceived by human beings. In this paper, the authors examine the characteristics of evoked potentials by supersonic sound...
From the viewpoint of user management, continuous authentication is effective. However, general biom...
For user management in high-security systems, continuous authentication is required, where unconscio...
This chapter starts with the introduction to various types of authentication modalities, before disc...
The demand for security and user authentication has recently become an essential part of all aspects...
Person authentication using biometric information has become increasingly popular owing to the fact ...
In recent years, biometrics such as fingerprints and iris scans has been used in authentication. How...
This paper studies the suitability of brain activity, namely electroencephalogram signals, as raw ma...
From the viewpoint of user management, on-demand biometric authentication is effective for achieving...
Biometrics such as fingerprints and iris scans has been used in authentication. However, conventiona...
In this paper, we investigate the use of brain activity for person authentication. It has been shown...
In the case of user management, continuous or on-demand biometric authentication is effective for ac...
Brain signals are being investigated within the medical field for more than a century to study brain...
This paper investigates the possibility of creating an authentication system based on the measuremen...
Brain signals have been investigated within the medical field for more than a century to study brai...
The brain wave is able to present biometric data unconsciously, so that it enables continuous or on-...
From the viewpoint of user management, continuous authentication is effective. However, general biom...
For user management in high-security systems, continuous authentication is required, where unconscio...
This chapter starts with the introduction to various types of authentication modalities, before disc...
The demand for security and user authentication has recently become an essential part of all aspects...
Person authentication using biometric information has become increasingly popular owing to the fact ...
In recent years, biometrics such as fingerprints and iris scans has been used in authentication. How...
This paper studies the suitability of brain activity, namely electroencephalogram signals, as raw ma...
From the viewpoint of user management, on-demand biometric authentication is effective for achieving...
Biometrics such as fingerprints and iris scans has been used in authentication. However, conventiona...
In this paper, we investigate the use of brain activity for person authentication. It has been shown...
In the case of user management, continuous or on-demand biometric authentication is effective for ac...
Brain signals are being investigated within the medical field for more than a century to study brain...
This paper investigates the possibility of creating an authentication system based on the measuremen...
Brain signals have been investigated within the medical field for more than a century to study brai...
The brain wave is able to present biometric data unconsciously, so that it enables continuous or on-...
From the viewpoint of user management, continuous authentication is effective. However, general biom...
For user management in high-security systems, continuous authentication is required, where unconscio...
This chapter starts with the introduction to various types of authentication modalities, before disc...