37 Hits in 5.5 sec

Security Solutions Using Brain Signals

Anupama. H.S, Anusha M, Aparna Joshi, Apoorva N, N.K. Cauvery, Lingaraju. G.M
2018 IAES International Journal of Artificial Intelligence (IJ-AI)  
The Electro- Encephalogram (EEG) signals are recorded from the neuroheadset when a user is shown a key image (signature image).  ...  A Brain Computer Interface is a direct neural interface or a brain–machine interface. It provides a communication path between human brain and the computer system.  ...  Besides electroencephalogram (EEG), as a biometric modality, could be used to send covert warning when the authorized user is under external forcing conditions, as implemented in [19] .  ... 
doi:10.11591/ijai.v7.i2.pp105-110 fatcat:bwr4elmqfrhdfneqbptsgbwqju

Brainprint: Assessing the uniqueness, collectability, and permanence of a novel method for ERP biometrics

Blair C. Armstrong, Maria V. Ruiz-Blondet, Negin Khalifian, Kenneth J. Kurtz, Zhanpeng Jin, Sarah Laszlo
2015 Neurocomputing  
When the EEG is time-locked to stimulation--such as the presentation of a word--, and averaged over many such presentations, the Event-Related Potential (ERP) is obtained.  ...  These potentials can be measured at the scalp, and constitute the electroencephalogram (EEG).  ...  A biometric-based covert warning system using EEG. Proceedings of the 5th IARP International Conference on Biometrics, 342-347. Wijdicks, E. F. (1995). Determining brain death in adults.  ... 
doi:10.1016/j.neucom.2015.04.025 fatcat:t6vmke5t3vhavhtm2mzowfq2xe

The role of biometric applications in air transport security

Smilja Teodorovic
2016 Nauka bezbednost policija  
Biometrics represents identification of individuals based on their quantifiable biological characteristics in automatic pattern recognition systems and is considered one of the most reliable means for  ...  The intent of this review is to familiarize readers with biometric tools aimed at establishing and maintaining high security at airports and during flight, as well as to point out promising emerging biometric  ...  Researchers have been developing such biometric system, which is based on distinctive alpha and beta brain wave patterns recorded by an electroencephalogram (EEG). 61 , 62 Pilot's EEG would thus be  ... 
doi:10.5937/nbp1602139t fatcat:ite5lnqeurh37aaopfatk3go5u

Brain computer interfacing: Applications and challenges

Sarah N. Abdulkader, Ayman Atia, Mostafa-Sami M. Mostafa
2015 Egyptian Informatics Journal  
Brain computer interface technology represents a highly growing field of research with application systems.  ...  It creates a mutual understanding between users and the surrounding systems. This paper shows the application areas that could benefit from brain waves in facilitating or achieving their goals.  ...  Besides electroencephalogram (EEG), as a biometric modality, could be used to send covert warning when the authorized user is under external forcing conditions, as implemented in [87] .  ... 
doi:10.1016/j.eij.2015.06.002 fatcat:iiopgu4eqfekrc6ombyjy6sk2y

Privacy-Protecting Techniques for Behavioral Data: A Survey [article]

Simon Hanisch, Patricia Arias-Cabarcos, Javier Parra-Arnau, Thorsten Strufe
2021 arXiv   pre-print
Our behavior (the way we talk, walk, or think) is unique and can be used as a biometric trait. It also correlates with sensitive attributes like emotions.  ...  Their base method uses a GMM-mapping based speaker transformation system to transfer speakers to a target synthetic voice called kal-diphone.  ...  [158] also use a speaker transformation system based on GMM mapping but combine it with a harmonic stochastic model.  ... 
arXiv:2109.04120v1 fatcat:zsv2bgrynveutlq2akx3vllhbq

Seven Types of Privacy [chapter]

Rachel L. Finn, David Wright, Michael Friedewald
2012 European Data Protection: Coming of Age  
Unlike current-generation overt biometric systems used to authenticate or identify an individual with their co-operation, sensing and identifying individuals at a distance can result in covert data capture  ...  Soft biometrics and the use of biometrics at a distance both pose a threat to personal data and image.  ...  However, with the advent of new technologies such as next-generation biometrics, DNA sequencing and human enhancement technologies the data being collected moves from simply describing a person to being  ... 
doi:10.1007/978-94-007-5170-5_1 fatcat:een5kcxq3za6bg5ubatdtqgcse

Visual Spatial Attention Control in an Independent Brain-Computer Interface

S.P. Kelly, E.C. Lalor, C. Finucane, G. McDarby, R.B. Reilly
2005 IEEE Transactions on Biomedical Engineering  
An interface involving real-time biofeedback is described, demonstrating reduced training time in comparison to existing BCIs based on self-regulation paradigms.  ...  The system utilizes electrophysiological correlates of visual spatial attention mechanisms, the self-regulation of which is naturally developed through continuous application in everyday life.  ...  EEG signals were recorded from the O1 and O2 electrode positions based on the international 10-20 electrode system [18] .  ... 
doi:10.1109/tbme.2005.851510 pmid:16189972 fatcat:covvw4ocozg7zmgrnenf42rple

A Taxonomy for Enhancing Usability, Flexibility, and Security of User Authentication

Susan Gottschlich
2017 Advances in Science, Technology and Engineering Systems  
A fundamental aspect of security is user authentication, which allows devices and software applications to establish their user's identity and identity is in turn used to establish which of its capabilities  ...  While multiple authentication steps, known as multifactor authentication, are being used more widely throughout the military, government, businesses, and consumer sectors, the selection and implementation  ...  finger equipment, exertion-tolerant, stress-tolerant, voice use, covert use.  ... 
doi:10.25046/aj020627 fatcat:bihtf4jvdzd67mgxkusmpz6xd4

Addressing Security and Privacy Challenges in Internet of Things [article]

Arsalan Mosenia
2018 arXiv   pre-print
Several recent research studies have demonstrated that launching security/privacy attacks against IoT-enabled systems, in particular wearable medical sensor (WMS)-based systems, may lead to catastrophic  ...  Internet of Things (IoT), also referred to as the Internet of Objects, is envisioned as a holistic and transformative approach for providing numerous services.  ...  Unfortunately, major biometrics-based systems, e.g., fingerprint-based, do not provide a high level of passiveness.  ... 
arXiv:1807.06724v1 fatcat:f45cytbjkjgyjiytvr2ygdcsze

Careful Technology [chapter]

2016 Theological Perspectives on a Surveillance Society  
Other titles in the series include: Evangelicalism and the Emerging Church A Congregational Study of a Vineyard Church Cory E.  ...  both commerce and the state that has ushered in a 'surveillance society'.  ...  Whereas earlier systems employed perhaps a single biometric, there is a shift towards multimodal systems where several different biometrics are combined with the consequences of 'a prima facie intensification  ... 
doi:10.4324/9781315551333-6 fatcat:zzf4anmuljhehenppo7b6csvpm

ADVERT: An Adaptive and Data-Driven Attention Enhancement Mechanism for Phishing Prevention [article]

Linan Huang, Shumeng Jia, Emily Balcetis, Quanyan Zhu
2022 arXiv   pre-print
Based on the eye-tracking data, we extract visual states and attention states as system-level sufficient statistics to characterize the user's visual behaviors and attention status.  ...  We corroborate the effectiveness, efficiency, and robustness of ADVERT through a case study based on the data set collected from human subject experiments conducted at New York University.  ...  First, as a human user reads emails and judges whether they are phishing or legitimate, a covert eye-tracking system can record the user's eye-gaze locations and pupil sizes in real-time.  ... 
arXiv:2106.06907v2 fatcat:u77mfqzz5zgpvifljyy74fqb3u

Ubiquitous Gaze Sensing and Interaction (Dagstuhl Seminar 18252)

Lewis Chuang, Andrew Duchowski, Pernilla Qvarfordt, Daniel Weiskopf, Michael Wagner
2019 Dagstuhl Reports  
The miniaturization of optical devices and advances in computer vision, as well as a lower cost point, have led to an increased integration of gaze sensing capabilities in computing systems.  ...  Eye tracking is no longer restricted to a well controlled laboratory setting, but moving into everyday settings.  ...  This requires that we define appropriate user models based on pre-recorded eye movement data, which we can then use as ground truth if a new person is using a system.  ... 
doi:10.4230/dagrep.8.6.77 dblp:journals/dagstuhl-reports/ChuangDQW18 fatcat:7nfkzimerrb3hpcb25bwy7sf5e

Psychophysiology of Challenge in Play

Madison Klarkowski, Daniel Johnson, Peta Wyeth, Cody Phillips, Simon Smith
2016 Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems - CHI EA '16  
As video games emerge as a leading form of entertainment, so too does the need for a comprehensive understanding of the player experience.  ...  In later comparisons of both non-biometric and biometric storyboards, Mirza-Babei et al. found that the use of biometric storyboards resulted in a greater number of requested design iterations and increased  ...  As with all other psychophysiological measurements except EEG, the ECG system was supplied by BIOPAC Systems Inc.  ... 
doi:10.1145/2851581.2892485 dblp:conf/chi/KlarkowskiJWPS16 fatcat:wlu7srlk5za3zfybjjlcnr2req

Heritability of brain activity related to response inhibition: A longitudinal genetic study in adolescent twins

Andrey P. Anokhin, Simon Golosheykin, Julia D. Grant, Andrew C. Heath
2017 International Journal of Psychophysiology  
Variance component estimates are based on the best-fitting model (see text and Supplementary Table 1). Int J Psychophysiol. Author manuscript; available in PMC 2018 May 01.  ...  Deficits in response inhibition, a key component of impulsivity, have been implicated as a core dysfunction in a range of neuropsychiatric disorders such as ADHD and addictions.  ...  A study using EEG and fMRI (Garavan et al., 2002) revealed 2 systems related to RI: the ACC and a network including right prefrontal and parietal areas.  ... 
doi:10.1016/j.ijpsycho.2017.03.002 pmid:28300615 pmcid:PMC5454802 fatcat:rqfvu6orzbc7nc3lqmhwhwdlum

Introducing Traffic Analysis [chapter]

Richard Clayton, George Danezis
2007 Digital Privacy  
Similarly, as already mentioned, covert channels based on the effects of heat on clock drift can be used to de-anonymize servers [50] .  ...  Traffic analysis inspired techniques can also be used to protect systems and build trust. Advogato [46] is a social network based system, that provides a community for free software developers.  ... 
doi:10.1201/9781420052183.ch5 fatcat:liopgsxpknh3hnfat76wyc4szu
« Previous Showing results 1 — 15 out of 37 results