References
- J. Thorpe, P. C. van Oorschot, and A. Somayaji, "Passthoughts: authenticating with our minds," in Proc. 2005 Workshop on New Security Paradigms. ACM, pp. 45-56, 2005.
- A.K. Jain, L. Hong, S. Pankanti, and R. Bolle, "An identityauthentication system using fingerprints," Proc. IEEE, vol. 85, no. 9, pp. 1365-1388, 1997. https://doi.org/10.1109/5.628674
- W. Zhao, R. Chellappa, P.J. Phillips, and A. Rosenfeld, "Face recognition: a literature survey," Acm. Comput. Surv., vol. 35, no. 4, pp. 399-458, 2003. https://doi.org/10.1145/954339.954342
- L. Flom, and A. Safir, "Iris recognition system," U.S. Patent No. 4,641,349., 1987.
- Burr, E. William, D. Donna F, and P. William T., Electronic authentication guideline. US Department of Commerce, Technology Administration, National Institute of Standards and Technology, 2004.
- H. Berger, "Uber das elektrenkephalogramm des menschen," Eur. Arch. Psy. Clin. N., vol. 87, no. 1, pp. 527-570, 1929.
- R. Palaniappan, and P. Raveendran, "Individual identification technique using visual evoked potential signals," Electron. Lett., vol. 38, no. 25, pp. 1634-1635, 2002. https://doi.org/10.1049/el:20021104
- Y. Chen, A. D. Atnafu, I. Schlattner, W. T. Weldtsadik, M.C. Roh, H. J. Kim, S. H. Lee, B. Blankertz, and S. Fazli, "A highsecurity EEG-based login system with RSVP stimuli and dry electrodes," IEEE T. Inf. Foren. Se., vol. 11, no. 12, pp. 2635-2647, 2016. https://doi.org/10.1109/TIFS.2016.2577551
- S. Marcel, and J. D. R. Millan, "Person authentication using brainwaves (EEG) and maximum a posteriori model adaptation," IEEE T. Pattern. Anal., vol. 29, no. 4, pp. 743-748, 2007. https://doi.org/10.1109/TPAMI.2007.1012
- A. Zuquete, B. Quintela, and J. S. Cunha, "Biometric authentication using brain responses to visual stimuli," Repositorio Institucional da Universidade de Aveiro, 2010.
- I. Nakanishi, S. Baba, and C. Miyamoto, "EEG based biometric authentication using new spectral features," In Intelligent Signal Processing and Communication SystemsI, SPACS 2009. International Symposium on IEEE, pp. 651-654, 2009.
- W. Khalifa, A. Salem, M. Roushdy, and K. Revett, "A survey of EEG based user authentication schemes," Proc. 8th International Conference on IEEE, 2012.
- D. La Rocca, P. Campisi, and G. Scarano, "EEG biometrics for individual recognition in resting state with closed eyes," Proc. 2012 BIOSIG-Proceedings of the International Conference of the IEEE, pp. 1-12, 2012.
- R. J. Barry, A. R. Clarke, S. J. Johnstone, C. A. Magee, and J. A. Rushby, "EEG differences between eyes-closed and eyesopen resting conditions," Clin. Neurophysiol. vol. 118, no. 12, pp. 2765-2773, 2007. https://doi.org/10.1016/j.clinph.2007.07.028
- T. A. Travis, C. Y. Kondo, and J. R. Knott., "Parameters of eyes-closed alpha enhancement," Psychophysiology, vol. 11, no. 6, pp. 674-681, 1974. https://doi.org/10.1111/j.1469-8986.1974.tb01136.x
- J. W. Osselton, "Acquisition of EEG data by bipolar unipolar and average reference methods: a theoretical comparison," Electroencephalogr. Clin. Neurophysiol. vol. 19, no. 5, pp. 527-528, 1965. https://doi.org/10.1016/0013-4694(65)90195-1
- F. F. Offner, "The EEG as potential mapping: the value of the average monopolar reference," Electroencephalogr. Clin. Neurophysiol. vol. 2, no. 1, pp. 213-214, 1950. https://doi.org/10.1016/0013-4694(50)90040-X