A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Security Solutions Using Brain Signals
2018
IAES International Journal of Artificial Intelligence (IJ-AI)
The Electro- Encephalogram (EEG) signals are recorded from the neuroheadset when a user is shown a key image (signature image). ...
A Brain Computer Interface is a direct neural interface or a brain–machine interface. It provides a communication path between human brain and the computer system. ...
Besides electroencephalogram (EEG), as a biometric modality, could be used to send covert warning when the authorized user is under external forcing conditions, as implemented in [19] . ...
doi:10.11591/ijai.v7.i2.pp105-110
fatcat:bwr4elmqfrhdfneqbptsgbwqju
Brainprint: Assessing the uniqueness, collectability, and permanence of a novel method for ERP biometrics
2015
Neurocomputing
When the EEG is time-locked to stimulation--such as the presentation of a word--, and averaged over many such presentations, the Event-Related Potential (ERP) is obtained. ...
These potentials can be measured at the scalp, and constitute the electroencephalogram (EEG). ...
A biometric-based covert warning system using EEG. Proceedings of the 5th IARP International Conference on Biometrics, 342-347. Wijdicks, E. F. (1995). Determining brain death in adults. ...
doi:10.1016/j.neucom.2015.04.025
fatcat:t6vmke5t3vhavhtm2mzowfq2xe
The role of biometric applications in air transport security
2016
Nauka bezbednost policija
Biometrics represents identification of individuals based on their quantifiable biological characteristics in automatic pattern recognition systems and is considered one of the most reliable means for ...
The intent of this review is to familiarize readers with biometric tools aimed at establishing and maintaining high security at airports and during flight, as well as to point out promising emerging biometric ...
Researchers have been developing such biometric system, which is based on distinctive alpha and beta brain wave patterns recorded by an electroencephalogram (EEG). 61 , 62 Pilot's EEG would thus be ...
doi:10.5937/nbp1602139t
fatcat:ite5lnqeurh37aaopfatk3go5u
Brain computer interfacing: Applications and challenges
2015
Egyptian Informatics Journal
Brain computer interface technology represents a highly growing field of research with application systems. ...
It creates a mutual understanding between users and the surrounding systems. This paper shows the application areas that could benefit from brain waves in facilitating or achieving their goals. ...
Besides electroencephalogram (EEG), as a biometric modality, could be used to send covert warning when the authorized user is under external forcing conditions, as implemented in [87] . ...
doi:10.1016/j.eij.2015.06.002
fatcat:iiopgu4eqfekrc6ombyjy6sk2y
Privacy-Protecting Techniques for Behavioral Data: A Survey
[article]
2021
arXiv
pre-print
Our behavior (the way we talk, walk, or think) is unique and can be used as a biometric trait. It also correlates with sensitive attributes like emotions. ...
Their base method uses a GMM-mapping based speaker transformation system to transfer speakers to a target synthetic voice called kal-diphone. ...
[158] also use a speaker transformation system based on GMM mapping but combine it with a harmonic stochastic model. ...
arXiv:2109.04120v1
fatcat:zsv2bgrynveutlq2akx3vllhbq
Seven Types of Privacy
[chapter]
2012
European Data Protection: Coming of Age
Unlike current-generation overt biometric systems used to authenticate or identify an individual with their co-operation, sensing and identifying individuals at a distance can result in covert data capture ...
Soft biometrics and the use of biometrics at a distance both pose a threat to personal data and image. ...
However, with the advent of new technologies such as next-generation biometrics, DNA sequencing and human enhancement technologies the data being collected moves from simply describing a person to being ...
doi:10.1007/978-94-007-5170-5_1
fatcat:een5kcxq3za6bg5ubatdtqgcse
Visual Spatial Attention Control in an Independent Brain-Computer Interface
2005
IEEE Transactions on Biomedical Engineering
An interface involving real-time biofeedback is described, demonstrating reduced training time in comparison to existing BCIs based on self-regulation paradigms. ...
The system utilizes electrophysiological correlates of visual spatial attention mechanisms, the self-regulation of which is naturally developed through continuous application in everyday life. ...
EEG signals were recorded from the O1 and O2 electrode positions based on the international 10-20 electrode system [18] . ...
doi:10.1109/tbme.2005.851510
pmid:16189972
fatcat:covvw4ocozg7zmgrnenf42rple
A Taxonomy for Enhancing Usability, Flexibility, and Security of User Authentication
2017
Advances in Science, Technology and Engineering Systems
A fundamental aspect of security is user authentication, which allows devices and software applications to establish their user's identity and identity is in turn used to establish which of its capabilities ...
While multiple authentication steps, known as multifactor authentication, are being used more widely throughout the military, government, businesses, and consumer sectors, the selection and implementation ...
finger
equipment,
exertion-tolerant,
stress-tolerant, voice use, covert
use. ...
doi:10.25046/aj020627
fatcat:bihtf4jvdzd67mgxkusmpz6xd4
Addressing Security and Privacy Challenges in Internet of Things
[article]
2018
arXiv
pre-print
Several recent research studies have demonstrated that launching security/privacy attacks against IoT-enabled systems, in particular wearable medical sensor (WMS)-based systems, may lead to catastrophic ...
Internet of Things (IoT), also referred to as the Internet of Objects, is envisioned as a holistic and transformative approach for providing numerous services. ...
Unfortunately, major biometrics-based systems, e.g., fingerprint-based, do not provide a high level of passiveness. ...
arXiv:1807.06724v1
fatcat:f45cytbjkjgyjiytvr2ygdcsze
Careful Technology
[chapter]
2016
Theological Perspectives on a Surveillance Society
Other titles in the series include: Evangelicalism and the Emerging Church A Congregational Study of a Vineyard Church Cory E. ...
both commerce and the state that has ushered in a 'surveillance society'. ...
Whereas earlier systems employed perhaps a single biometric, there is a shift towards multimodal systems where several different biometrics are combined with the consequences of 'a prima facie intensification ...
doi:10.4324/9781315551333-6
fatcat:zzf4anmuljhehenppo7b6csvpm
ADVERT: An Adaptive and Data-Driven Attention Enhancement Mechanism for Phishing Prevention
[article]
2022
arXiv
pre-print
Based on the eye-tracking data, we extract visual states and attention states as system-level sufficient statistics to characterize the user's visual behaviors and attention status. ...
We corroborate the effectiveness, efficiency, and robustness of ADVERT through a case study based on the data set collected from human subject experiments conducted at New York University. ...
First, as a human user reads emails and judges whether they are phishing or legitimate, a covert eye-tracking system can record the user's eye-gaze locations and pupil sizes in real-time. ...
arXiv:2106.06907v2
fatcat:u77mfqzz5zgpvifljyy74fqb3u
Ubiquitous Gaze Sensing and Interaction (Dagstuhl Seminar 18252)
2019
Dagstuhl Reports
The miniaturization of optical devices and advances in computer vision, as well as a lower cost point, have led to an increased integration of gaze sensing capabilities in computing systems. ...
Eye tracking is no longer restricted to a well controlled laboratory setting, but moving into everyday settings. ...
This requires that we define appropriate user models based on pre-recorded eye movement data, which we can then use as ground truth if a new person is using a system. ...
doi:10.4230/dagrep.8.6.77
dblp:journals/dagstuhl-reports/ChuangDQW18
fatcat:7nfkzimerrb3hpcb25bwy7sf5e
Psychophysiology of Challenge in Play
2016
Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems - CHI EA '16
As video games emerge as a leading form of entertainment, so too does the need for a comprehensive understanding of the player experience. ...
In later comparisons of both non-biometric and biometric storyboards, Mirza-Babei et al. found that the use of biometric storyboards resulted in a greater number of requested design iterations and increased ...
As with all other psychophysiological measurements except EEG, the ECG system was supplied by BIOPAC Systems Inc. ...
doi:10.1145/2851581.2892485
dblp:conf/chi/KlarkowskiJWPS16
fatcat:wlu7srlk5za3zfybjjlcnr2req
Heritability of brain activity related to response inhibition: A longitudinal genetic study in adolescent twins
2017
International Journal of Psychophysiology
Variance component estimates are based on the best-fitting model (see text and Supplementary Table 1). Int J Psychophysiol. Author manuscript; available in PMC 2018 May 01. ...
Deficits in response inhibition, a key component of impulsivity, have been implicated as a core dysfunction in a range of neuropsychiatric disorders such as ADHD and addictions. ...
A study using EEG and fMRI (Garavan et al., 2002) revealed 2 systems related to RI: the ACC and a network including right prefrontal and parietal areas. ...
doi:10.1016/j.ijpsycho.2017.03.002
pmid:28300615
pmcid:PMC5454802
fatcat:rqfvu6orzbc7nc3lqmhwhwdlum
Introducing Traffic Analysis
[chapter]
2007
Digital Privacy
Similarly, as already mentioned, covert channels based on the effects of heat on clock drift can be used to de-anonymize servers [50] . ...
Traffic analysis inspired techniques can also be used to protect systems and build trust. Advogato [46] is a social network based system, that provides a community for free software developers. ...
doi:10.1201/9781420052183.ch5
fatcat:liopgsxpknh3hnfat76wyc4szu
« Previous
Showing results 1 — 15 out of 37 results