Leave-one-out authentication of persons using 40 Hz EEG oscillations
It has been shown previously that recognizing persons using 40 Hz electroencephalogram (EEG) oscillations is possible. In the method, features were computed from the Visual Evoked Potential (VEP) signals recorded from 61 electrodes while subjects perceived a picture. Here, two modifications have bee...
| Main Authors: | Ravi, , KVR, Palaniappan, , R |
|---|---|
| Format: | Article |
| Published: |
2005
|
| Subjects: | |
| Online Access: | http://shdl.mmu.edu.my/2328/ |
Similar Items
Improving visual evoked potential feature classification for person recognition using PCA and normalization
by: Palaniappan, Ramaswamy, et al.
Published: (2006)
by: Palaniappan, Ramaswamy, et al.
Published: (2006)
Classification of alcohol abusers: An intelligent approach
by: Kanna,, PS, et al.
Published: (2005)
by: Kanna,, PS, et al.
Published: (2005)
Loss-tolerant stream authentication via configurable integration of one-time signatures and hash-graphs
by: Goh,, A, et al.
Published: (2003)
by: Goh,, A, et al.
Published: (2003)
Personal authenticator on the basis of two-factors: Palmprint features and tokenized random data
by: Pang, Ying Han, et al.
Published: (2004)
by: Pang, Ying Han, et al.
Published: (2004)
Recognising individuals using their brain patterns
by: Ravi,, FVR, et al.
Published: (2005)
by: Ravi,, FVR, et al.
Published: (2005)
Webcam Based Fingerprint Authentication for Personal Identification System
by: Islam, Md. Rajibul, et al.
Published: (2007)
by: Islam, Md. Rajibul, et al.
Published: (2007)
Neural network classification of late gamma band electroencephalogram features
by: Ravi, K. V. R., et al.
Published: (2006)
by: Ravi, K. V. R., et al.
Published: (2006)
Frequency modulation in EEG signals
by: Vijayakumar, V., et al.
Published: (2006)
by: Vijayakumar, V., et al.
Published: (2006)
Simple Authentication Scheme for Personal Digital Assistants using the Hidden Markov Model ToolKit
by: Ching, Ho Chiung, et al.
Published: (2007)
by: Ching, Ho Chiung, et al.
Published: (2007)
CSS 40L-Komunikasi Data
by: PPSM, Pusat Pengajian Sains Matematik
Published: (1988)
by: PPSM, Pusat Pengajian Sains Matematik
Published: (1988)
Path integral representation of fractional harmonic oscillator
by: EAB, C, et al.
Published: (2006)
by: EAB, C, et al.
Published: (2006)
Iris authentication using privatized advanced correlation filter
by: Chong, , SC, et al.
Published: (2006)
by: Chong, , SC, et al.
Published: (2006)
Fast And Simple NEMO Authentication Via Random Number.
by: Tan, Tat Kin, et al.
Published: (2007)
by: Tan, Tat Kin, et al.
Published: (2007)
A Chaos-Based Authenticated Cipher with Associated Data
by: Je, Sen Teh, et al.
Published: (2017)
by: Je, Sen Teh, et al.
Published: (2017)
A Chaos-Based Authenticated Cipher with Associated Data
by: Je, Sen Teh, et al.
Published: (2017)
by: Je, Sen Teh, et al.
Published: (2017)
PalmHashing: A novel approach for dual-factor authentication
by: Tee, Connie, et al.
Published: (2004)
by: Tee, Connie, et al.
Published: (2004)
On the Rila-Mitchell security protocols for biometrics-based cardholder authentication in smartcards
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
On the Rila-Mitchell security protocols for biometrics-based cardholder authentication in smartcards
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
An Adaptive Error Modeling Scheme for the Lossless Compression of EEG Signals
by: Sriraam, N., et al.
Published: (2008)
by: Sriraam, N., et al.
Published: (2008)
Biohashing: two factor authentication featuring fingerprint data and tokenised random number
by: Jin, , ATB, et al.
Published: (2004)
by: Jin, , ATB, et al.
Published: (2004)
An integrated dual factor authenticator based on the face data and tokenised random number
by: Teoh, , ABJ, et al.
Published: (2004)
by: Teoh, , ABJ, et al.
Published: (2004)
Bio-discretization: Biometrics authentication featuring face data and tokenised random number
by: Foon, , NH, et al.
Published: (2004)
by: Foon, , NH, et al.
Published: (2004)
Improving The Efficiency Of Sip
Authentication Based On The
Pre-Calculated Look-Up Table
by: Jaber, Aws Naser
Published: (2013)
by: Jaber, Aws Naser
Published: (2013)
Unreliable Network Re-Authentication Protocol Based On Hybrid Key Using CSP Approach.
by: Ramadass, Sureswaran, et al.
Published: (2007)
by: Ramadass, Sureswaran, et al.
Published: (2007)
Improving the performance of two-state mental task brain-computer interface design using linear discriminant classifier
by: Palaniappan, , R, et al.
Published: (2005)
by: Palaniappan, , R, et al.
Published: (2005)
Two-Factor Cancelable Biometrics Authenticator
by: Pang, Ying Han, et al.
Published: (2007)
by: Pang, Ying Han, et al.
Published: (2007)
Technology Review: Image Enhancement, Feature Extraction and Template Protection of a Fingerprint Authentication System
by: Islam, Md. Rajibul, et al.
Published: (2010)
by: Islam, Md. Rajibul, et al.
Published: (2010)
Mutual Authentication Protocol Model For Low-Cost RFID Systems Based On Shelled Random Value
by: al-Dala'ien, Mu'awya Naser Salam
Published: (2011)
by: al-Dala'ien, Mu'awya Naser Salam
Published: (2011)
Approximate Entropy-Based Epileptic EEG Detection Using Artificial Neural Networks
by: Srinivasan, Vairavan, et al.
Published: (2007)
by: Srinivasan, Vairavan, et al.
Published: (2007)
Mental Stress Classification Among
Higher Education Students In Malaysia
From Electroencephalogram (Eeg)
Using Convolutional Neural Network
With Modified Stochastic Gradient
Descent.
by: Rashid, Nur Ramizah Ramino
Published: (2024)
by: Rashid, Nur Ramizah Ramino
Published: (2024)
Cryptanalysis of an improved client-to-client password-authenticated key exchange (C2C-PAKE) scheme
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
Reliable template protection technique for biometric authentication
by: Ong, Teng Sian, et al.
Published: (2008)
by: Ong, Teng Sian, et al.
Published: (2008)
Performance Evaluation of Neural Network and Linear Predictors for Near-Lossless Compression of EEG Signals
by: Sriraam, N., et al.
Published: (2008)
by: Sriraam, N., et al.
Published: (2008)
New hybrid genetic operators for real coded genetic algorithm to compute optimal control of a class of hybrid systems
by: ARUMUGAM, M, et al.
Published: (2005)
by: ARUMUGAM, M, et al.
Published: (2005)
Extracting Single Trial Visual Evoked Potentials using Selective Eigen-Rate Principal Components
by: Andrews, , Samraj, et al.
Published: (2005)
by: Andrews, , Samraj, et al.
Published: (2005)
Extracting single trial visual evoked potentials using selective eigen-rate principal components
by: Andrews, S, S, et al.
Published: (2005)
by: Andrews, S, S, et al.
Published: (2005)
Multimodality to improve Security and Privacy in Fingerprint Authentication System
by: Islam, Md. Rajibul, et al.
Published: (2007)
by: Islam, Md. Rajibul, et al.
Published: (2007)
Typing Dynamics Biometric Authentication through Fuzzy Logic
by: Zhe, Jin, et al.
Published: (2008)
by: Zhe, Jin, et al.
Published: (2008)
Statistical Model for Ring Oscillator Phase Noise Variability Accounting for within-Die Process Variation
by: Faizal, Khalek, et al.
Published: (2009)
by: Faizal, Khalek, et al.
Published: (2009)
S-Cart, Intelligent self check-out trolley in hypermarket.
Creation of value proposition for intelligent self-checkout trolley.
by: Koh, Peik See
Published: (2010)
by: Koh, Peik See
Published: (2010)
Similar Items
-
Improving visual evoked potential feature classification for person recognition using PCA and normalization
by: Palaniappan, Ramaswamy, et al.
Published: (2006) -
Classification of alcohol abusers: An intelligent approach
by: Kanna,, PS, et al.
Published: (2005) -
Loss-tolerant stream authentication via configurable integration of one-time signatures and hash-graphs
by: Goh,, A, et al.
Published: (2003) -
Personal authenticator on the basis of two-factors: Palmprint features and tokenized random data
by: Pang, Ying Han, et al.
Published: (2004) -
Recognising individuals using their brain patterns
by: Ravi,, FVR, et al.
Published: (2005)