Task Sensitivity in Continuous Electroencephalogram Person Authentication

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Person authentication using 3D palmprints

Biometric technologies, including fingerprint, face, iris, and palmprint recognition, are drawing increasing attention in both academic research and industrial applications.1 Palmprint identification uses the inner surface of the palm to distinguish between people2 and includes among its many merits stable features, a high level of accuracy, and user-friendliness. To the best of our knowledge, ...

متن کامل

Facial Expression based Person Authentication

High quality automatic facial expression based person authentication system is practically difficult mainly due to poses in face. This work paves way to develop a more perfect automatic person authentication system using facial expressions. In this work, ways to extract automatically pose free face images from video taken in normal room condition, determining mouth region, extracting features a...

متن کامل

Facial Movement Based Person Authentication

In this position paper, we present an authentication method using spatial temporal facial movements. Facial movements are defined by a facial coding system and are obtained by making a facial expression in front of a 3D camera. Facial muscle movements are impossible to be replicated, thus our method is invulnerable to spoofing attacks. We briefly discuss our current work and present preliminary...

متن کامل

Spatiotemporal person authentication based on multilevel fusion

In this paper, we propose a spatiotemporal person authentication approach based on multilevel fusion of 3D face biometric information with audio and visual speech information. The proposed approach combines the information from three audio-video based modules, namely: audio, visual speech, and 3D face and performs tri-module fusion in an automatic, unsupervised and adaptive manner, by adapting ...

متن کامل

Continuous Spatial Authentication

Recent advances in wireless communications and positioning devices have generated a tremendous amount of interest in the continuous monitoring of spatial queries. However, such applications can incur a heavy burden on the data owner (DO), due to very frequent location updates. Database outsourcing is a viable solution, whereby the DO delegates its database functionality to a service provider (S...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Advanced Computer Science and Applications

سال: 2020

ISSN: 2156-5570,2158-107X

DOI: 10.14569/ijacsa.2020.0110270