1 |
W. Khalifa, A. Salem, M. Roushdy, and K, Revett, "A Survey of EEG based User Authentication Schemes," Proceeding of The 8th International Conference on Inforrmatics and Systems, pp. 55-60, 2012.
|
2 |
W. Stallings, Network Security Essentials : Applications and Standards, Pearson Education, UK, 2013.
|
3 |
S.I Shin, J.H Cho and M.N Kim, "Proposition for 4 Channel Frontal Lobe Electrode Configuration and Study on EOG Removal from Measured EEG," Journal of Korea Multimedia Society, Vol. 6, No. 1, pp. 167-175, 2003.
|
4 |
A. Zúquete, B. Quintela, and J.P. da Silva Cunha, "Biometric Authentication using Brain Responses to Visual Stimuli," Biosignals, pp. 103-112, 2010.
|
5 |
C. Shannon, "Communication Theory of Secrecy Systems," Bell Systems Journal, Vol. 28. No. 4, pp. 659-715, 1949.
|
6 |
D.D. Patil, N.A. Nemade, and K.M. Attarde, "Iris Recognition using Fuzzy System," International Journal of Computer Science and Management Studies, Vol. 2, No. 3, pp. 14-17, 2013.
|
7 |
J. FRIDRICH, “Image Encryption based on Chaotic Maps,” Proceeding of IEEE International Conference on Computational Cybernetics and Simulation, pp. 1105-1110, 1997.
|
8 |
J.Y. Chung and Y.S. Hong, “Encryption Scheme of Image Header Information for Security of Ultra High Resolution Images,” Proceeding of Korea Computer Congress 2012, Vol. 39, No. 2C, pp. 107-109, 2012.
|
9 |
J.Y. Chung and Y.S. Hong, “Parallel Image Encryption Schemes for Security of Ultra High Resolution Images,” Proceeding of Korea Computer Congress 2012, Vol. 39, No. 1C, pp. 274-276, 2012.
|
10 |
C.F. Lin, S.H Shih, J.D. Zhu, and S.H Lee, “Implementation of An Offline Chaos-based EEG Encryption Software,” Proceeding of Advanced Communication Technology International Conference, pp. 430-433, 2012.
|
11 |
C.F. Lin, S.H. Shih, J.D. Zhu, S.H. Lee, and C.W. Liu. "C# based EEG Encryption System using Chaos Algorithm," Proceeding of 1st International Conference Complex Systems and Chaos, pp.59-62, 2013.
|
12 |
C.F. Lin and C.H. Chung, "A Chaos-based Visual Encryption Mechanism in Integrated ECG/EEG Medical Signals," Proceeding of Advanced Communication Technology ICACT 10th Intenational Conference, Vol. 3, pp. 1903-1907, 2008.
|
13 |
C. Ashby, A. Bhatia, F. Tenore, and J. Vogelstein, "Low-cost Electroencephalogram (EEG) based Authentication," Proceeding of Neural Engineering, 5th International IEEE/ EMBS Conference, pp. 442-445, 2011.
|