Skip to main content
Healthcare Technology Letters logoLink to Healthcare Technology Letters
. 2020 Sep 3;7(4):109–113. doi: 10.1049/htl.2019.0092

Design of electroencephalogram authentication access control to smart car

Yuhua Chen 1, Jinghai Yin 1,
PMCID: PMC7494368  PMID: 32983547

Abstract

In recent years, with the development of intelligent vehicles, the demand for security will be bigger and bigger. One of the most important solutions is the use of new biometric technology. At present, there are still some areas to be improved on biometric technology. For example, diseases will destroy some biological characteristics, some detection methods are too slow, many detection methods do not need living detection, and so on. Electroencephalogram (EEG) is a new biometric tool for living identification. In this Letter, a kind of identity authentication system based on the EEG signal is presented. The overall goal of this research is to design a new authentication method and develop the corresponding application. Therefore, the authors carried out a series of EEG experiments, and analysed and discussed the experimental results. Based on these results, they build and present an access control system based on the uniqueness of their EEG signals to be capable of authenticating access control to the car. The accuracy of the authentication system is >87.3%.

Keywords: electroencephalography, authorisation, biometrics (access control)

Keywords: electroencephalogram authentication access control, smart car, intelligent vehicles, important solutions, biometric technology, biological characteristics, detection methods, living detection, biometric tool, living identification, identity authentication system, EEG signal, authentication method, access control system

1. Introduction

The authentication system of the smart car is an urgent part to be installed within smart car's compounds, which focused on security aspects of entry access. Conventional authentication systems use key and password, however, they are deemed inconvenient and insecure. Biometrics appears to solve these problems related to the conventional system [1]. Currently, several relatively mature biometric technologies including fingerprint [2], face [3], iris [4], signature [5], and speech [6] recognition are well studied. These methods have their disadvantages and advantages depending on the performance, usability, and capability [1]. Therefore, there is a need to explore and find another method of a biometric system.

Electroencephalogram (EEG) is a very good biometric feature, which can be used as a person authentication [712]. EEG signal has recently received substantial attention as a potential biometric. EEG signal is stable enough for biometric analysis, it is convenient to record it for a relatively long duration to obtain sufficient data to first train and then test a classifier. Owing to the difference between morphology and function, the brain needs to organise and coordinate the specific cognitive function or mental state. Recent studies have shown that some of the specific information about EEG can be used to automatically identify the subject's identity. Owing to the very high universality of the EEG signal, and it also has a strong ability to resist deception, EEG is very suitable for identification as a biometric signal. Since it is impossible for an attacker to imitate an EEG signal of the tested person and transmit it to the corresponding electrode.

When the subjects were collected in the resting state, the brain waves produced by brain activity were mainly distributed among the 0.5–40 Hz frequency bands. There are five main types of rhythms that can be found in EEG signals. It is assumed that the brain is the slowest in the inactive state, while the fastest rhythm indicates that the brain is currently processing information. Different EEG waveforms can be decomposed using different mathematical methods. Usually, the EEG signal is a combination of many different waveforms. We can classify it according to their frequency, amplitude, wave shape, and spatial distribution.

EEG has been used in many different fields for clinical diagnosis. For example, verification of brain death or coma, identification of epileptic seizures, movement disorders, migraine, deep anaesthesia testing etc. Each person's EEG is as unique as his fingerprints. It has a very strong uniqueness. When a person receives visual stimulation, the visual cortex of the brain on the back of the head produces a strong change in the EEG signal. Therefore, this region is the best position to measure the visual EEG signal.

On the management of system security, we must first distinguish between three completely different concepts: identification, authentication, and authorisation. The main content of this paper is the system authentication.

2. Literature survey

As a non-invasive brain–computer interface (BCI) application, the EEG-based biometric recognition system has received more and more attention in the scientific community. The identification of EEG signals is a relatively new method of biometric identification, which has benefited from the development of human genetics and clinical neurophysiology.

In 2002, Palaniappan and Raveendran [11] used visual evoked potentials (VEPs) for biometric identification [13, 14]. The system extracted the absolute spectral power (ASP) of the gamma band. These ASP features were extracted from 61 electrodes and classified by the neural network (NN), achieving on average 90.95% accuracy on ten subjects. Nguyen et al. developed a model that relies on a feature vector consisting of Mel-frequency cepstral coefficients, energy and pith measurements, spectral features, zero-crossing rate, and their statistical functions. The model achieved 92.8% classification accuracy on 20 subjects and 61.7% classification accuracy on 122 subjects [15]. Marcel and Millan developed a system, which included the imagined task of producing words, moving the right hand and the left hand. The system was based on a Gaussian mixture model classifier and power spectral density (PSD) features. In the left-hand moving task, they obtain the best performance of 6.60% of equal error rate [16]. Thorpe et al. presented the idea for one type of authentication system by pass-thoughts and described the design of this system. Since the human brain signal is unique, when we carry out the same thinking activities, different people produce EEG signals that are completely different. So they think such a certification system is feasible [17]. Singhal and RamKumar have designed a system that can measure VEP by a single electrode (Oz). The classification accuracy of this system achieved 78% on ten subjects [18]. Das et al. studied the spatiotemporal pattern responsible for encoding personal discriminant data. After EEG was classified by a linear support vector machine (SVM), the system achieved performances between 90 and 95% for 20 subjects [19]. Ferreira et al. developed a system based solely on a SVM. Their best effort achieved 84.33% accuracy on 13 subjects [20]. Sun et al. proposed a multi-task learning approach where an NN was trained with features extracted from multiple tasks EEGs, obtaining 95.6 and 94.81% of classification on imagining left- and right-hand moving task, respectively [21]. Su et al. used PSD from 5 to 32 Hz as features and auto regression coefficients, when classifying with a combination of linear discriminant classifier and k-nearest neighbour the system achieved 97.5% accuracy when classifying with a NN and a SVM, the system achieved 81.90 and 79.6% accuracy [22]. In the work of Bao et al., autoregressive mode, phase synchronisation, energy spectral density, and linear-complexity value were used as EEG features. The NN was employed for the identification of individual differences [23]. Our previous research is mainly based on the personal identification of EEG signals, and the classification method based on multi-feature fusion [2428].

Some studies have shown that EEG signals can be recorded by mobile devices and sent to the server after signal preprocessing [29]. Kumar et al. have collected EEG signals of 50 users while drawing different patterns. The system identified 2400 unauthorised attempts. Their experiments reveal that the method is promising and can be a possible alternative to develop robust authentication protocols for hand-held devices [30]. Saini et al. proposed a novel multimodal user identification and verification scheme combining two inter-linked biometric traits, i.e. signature and EEG. User's identification is performed with individuals’ signature and EEG signals as well as their combined traits. The identification accuracy of the proposed multimodal approach has been achieved up to 98.24% [31]. Zúquete et al. processed VEP for authentication and used the image of the black and white line map by Snodgrass and Vanderwart to derive an EEG authentication system [32]. This is similar to the way we use it because we also used visual stimulation to establish the authentication system.

3. Method

The design of the new key for implementing the access control system (ACS) is developed using a model that actually works with various parts. These parts are summarised as shown in Fig. 1. Users through the interface of ACS control the authentication application software. Software directly calls BCI middleware to achieve the core functions. The user's EEG signals are also sent to the middleware through the electrode cap. The middleware also exchanges data with the algorithm library and the pattern library.

Fig. 1.

Fig. 1

Conceptual components for ACS

3.1. EEG acquisition

Based on our previous research, a 40-channel neuroscan amplifier was used to collect EEG signals, and scan 4.3 software is adopted. Data from all electrodes were referenced to two electrically linked mastoids at A1 and A2, digitised at 1000 Hz from a 32-channel electrode cap (including 30 effective channels and two reference channels) based on the international 10–20 system (Fig. 2). The sampling frequency is set to 1000 Hz: 200 Hz low-pass and 0.05 Hz high-pass.

Fig. 2.

Fig. 2

Electrodes position according to International 10–20 System Standards

3.2. Scenario

The experiments are carried out in the Collaborative Innovation Center of Automobile Service Engineering and Industrial Upgrading, Jiangxi University of Technology. Subjects are students and young teachers from the Jiangxi University of Technology. In the tests, subjects look towards the computer screen and perform operations according to experimental requirements.

In the tests, the stimulation programme will display different pictures on the computer screen. For each subject, five different pictures are displayed in each experiment. These pictures consist of one self-photo and any four non-self-photos in the photo gallery. A self-photo denotes a target subject's own photo, while the non-self-photo includes other familiar or unfamiliar photos. Each picture is randomly displayed on the screen for 1000 ms, which is followed by a 250 ms black screen, totally taking 1250 ms. Each picture uses the head part of the subject with the same background.

3.3. Data analysis

Feature extraction mainly includes the establishment of different types of data sets, the calculation of fuzzy entropy, the analysis of features, and the calculation of Fisher distance. We performed a signal analysis of the two types of EEG data from both self- and non-self-photographed responses. To realise the identification of human identity, we calculate the fuzzy entropy of the EEG signal. The formula of fuzzy entropy is shown as follows.

For a time series of EEG data, {a(i):i[1,,N]}, we can reconstruct an m-dimensional vector as follows:

Uim=ui,ui+1,,ui+m1=ai,ai+1,,ai+m1i=1,,Nm (1)

where ui,ui+1,...,ui+m1 and ai,ai+1,...,ai+m1 represent m consecutive values from the ith point, and a0i represents the average of m values. The reconstructed vector can produce a maximum distance and we define it as follows:

dijm=dUim,Ujm=max|u(i+k)u(j+k)|k(0,m1),ij (2)

and then the similarity degree, Dijm, of Uim,Ujm can be defined as follows:

Dijm=μdijm,n,r=expdijmn/r (3)

R and N are exponential functions of gradient and width. In this Letter, R = 0.3×SD (SD of the time series) and N = 2. Therefore, we can define the following functions:

ϕmn,r=1Nmi=1Nm1Nm1j=1jiNmDijm (4)

When the fuzzy entropy of the time series N is finite, its sequence length can be defined as

FuzzyEn=lnφmn,rlnφm+1n,r (5)

The Fisher distance method is used to analyse the characteristics of EEG signals with different electrodes. Fisher distance is often used in classification studies to represent differences between classes. In this study, the Fisher distance is proportional to the distance between classes. The greater the difference, the greater the Fisher distance, and vice versa. The formula for calculating the Fisher distance is as follows:

F=(μ1μ2)2σ12+σ12 (6)

where F is the Fisher distance, σ and μ are variance and mean, respectively, the subscripts 1 and 2 represent two types.

To provide a more intuitive and easier to understand method to measure the prediction quality. In this Letter, the following equations are used for performance testing:

FRR=FNTP+FNFAR=FPFP+TN (7)

True positive (TP) represents the number of EEG signals of the EEG signal, which is identified as a self-portrait photograph. True negative (TN) represents the number of EEG signals for non-self-portrait photographs that are identified as non-self-portrait photographs of EEG. False positive (FP) is the number of EEG signals that are identified as self-time photos of EEG signals of non-self-portrait. False negative (FN) is the number of EEG signals of the self-portrait EEG signal identified as non-self-portrait photos. FRR is the false rejection rate, FAR is the false acceptance rate.

3.4. Technical front-end setup

The core modules of the control system are encapsulated in the middleware, which shields a large number of technical details so that non-professional developers can develop a variety of application software based on EEG. The system middleware architecture diagram is shown in Fig. 3, including the Android operating system, the device abstraction layer (Bluetooth interface, WiFi interface, ZigBee interface etc.), the data management layer (containing some basic data operations such as data storage, data query, data reception, and so on), and some entities such as database, model library, algorithms library, EEG library, and so on. In the core service layer, where all of the analysis and processing of EEG signals is completed, including the signal preprocessing, feature extraction, feature classification, and other aspects of the complex process. The upper layer is the application interface, these applications include identity EEG, BCI, detection EEG, polygraph EEG, and so on. Each layer is called a layer of content, also a call, end users only need to call the application interface to complete the development work, without understanding how the EEG signal acquisition, processing, and classification process is.

Fig. 3.

Fig. 3

Middleware architecture based on Android platform

Prior to recording the user's EEG to authenticate him or her, several steps must be carried out. The entire system flows from the perspective of the user is illustrated in Fig. 4. After the EEG is collected through the signal preprocessing, feature extraction, and other steps, the system will produce a series of characteristic values. If the current operation type is the feature collection, these features will be saved to the feature database through several procedures, such as feature selection, feature classification, feature storage, and so on. Once the identity of the operating system begins to match the characteristics and features of library data. If the match is successful, the engine can be started, otherwise, the system displays ‘login failed’, then the system restarts the identification process. If failed five times, the system access will be denied.

Fig. 4.

Fig. 4

System flow chart

3.5. System structure

The main function of the system is realised by the vehicle-mounted mobile device.

As shown in Fig. 5, the system is composed of driver, mobile terminal equipment, EEG acquisition, analysis module, engine control unit (ECU), and engine. Mobile terminal devices will show real-time EEG signals and stimulation photos. The EEG signals of drivers are evoked by the photos stimuli, EEG signals are collected and analysed after being sent to the mobile terminal equipment and ECU, ECU will identify the results into a signal to control the start of the engine.

Fig. 5.

Fig. 5

System structure diagram

4. Results

As can be seen from Table 1, we use our proposed identification method to identify EEG data, the average success rate in the electrodes FP1 and FP2 fuzzy entropy is about 87.3%. Among the ten subjects, the highest classification accuracy was 92%, while the lowest was about 84%. The method has a slightly lower error acceptance rate (FAR) 5.5% and a lower FRR of 5.6%. In addition, the average FAR and FRR of this method is relatively low, which means that our proposed method has better stability. The remarkable improved success rate indicates that using fuzzy entropy in the electrodes FP1 and FP2 to design identify authentication access control is feasible.

Table 1.

Performance of the authentication access system

Subjects Accuracy, % FAR, % FRR, %
1 85.4 8.0 6.4
2 92.1 3.1 4.6
3 84.0 6.8 9.0
4 83.9 7.1 8.9
5 90.0 6.6 3.3
6 84.6 3.8 5.7
7 86.5 5.7 7.6
8 88.2 4.5 5.2
9 87.3 6.2 3.1
10 90.7 3.6 2.4
mean (std) 87.3 (2.9) 5.5 (1.7) 5.6 (2.4)

It can be seen from Fig. 6 that there are two major data entities in this entity relationship (ER) diagram, the first entity is EEG features, the second entity is feature vector, between both of them, is 1: N relationship, a feature entity corresponding to N eigenvectors. EEG features data entity includes subject, experimental mode, algorithm, acquisition mode, and other related attributes. Feature vector data entity includes a vector matrix, feature value, number, and other attributes. According to this, ER diagram can infer the basic data framework EEG database.

Fig. 6.

Fig. 6

Feature library ER diagram

Fig. 7 shows the user interface (UI) of driver's identity recognition programme, the upper part of UI is the stimulation photos to induce specific EEG signals, the lower part is the change of EEG signals. Also, the progress bar is the time of single recognition tips.

Fig. 7.

Fig. 7

User interface of driver identification

5. Discussion and conclusion

At this point, one can confirm that the problem of identity authentication ACS based on the EEG signal is sensitive to several factors. such as frequencies, the location of electrodes, stimulation paradigm, and subject condition. Space and frequency may be two decisive factors of the problem. It seems clear that the spectral distribution of EEG signals contains subject-specific information that can be used in an authentication system. These biometric systems can extract several characteristic behaviours. We can expect that multiple electrodes, rhythms, and mission data can be used to increase the system's recognition performance.

The main disadvantage of EEG-based personal identification is that the acquisition equipment is inconvenient to use. Nevertheless, many researchers are now working to design a variety of new EEG recording devices for users.

At present, people are trying to use some EEG-based systems in our daily life. The problem of mobile acquisition of BCI system based on single-channel EEG signal has been solved. Using the mobile client as the foundation of the system platform, a simple EEG-based authentication system can be established by using a low-cost acquisition device. The monitoring of the impedance of the dry electrode and the integrated skin to electrode as well as the reliable high-quality wearable EEG monitoring system has also been developing continuously. With the rapid development of these technologies, the acquisition equipment becomes more and more practical and reasonable. We believe that in the near future there will be a cheap and practical EEG-based authentication system.

6. Acknowledgments

This work was supported by the National Natural Science Foundation of China (61762045) and Science and Technology Project of Jiangxi Provincial Department of Education (GJJ171030), the Natural Sciences Project of Jiangxi University of Technology (16XTKFYB06), and the Patent transformation Project of Intellectual Property Office of Jiangxi Province (the application and popularisation of the digital method to distinguish the direction of rotation photoelectric encoder in identification). We thank Zhendong Mu for preprocessing EEG data.

7 References

  • 1.Merone M., Soda P., Sansone M., et al. : ‘ECG databases for biometric systems: a systematic review’, Expert Syst. Appl., 2017, 67, pp. 189–202 (doi: 10.1016/j.eswa.2016.09.030) [Google Scholar]
  • 2.Yao Z., Bars J.M.L., Charrier C., et al. : ‘Literature review of fingerprint quality assessment and its evaluation’, IET Biometrics, 2016, 5, (3), pp. 243–251 (doi: 10.1049/iet-bmt.2015.0027) [Google Scholar]
  • 3.Zhang X., Pham D.S., Venkatesh S., et al. : ‘Mixed-norm sparse representation for multi view face recognition’, Pattern Recognit., 2015, 48, (9), pp. 2935–2946 (doi: 10.1016/j.patcog.2015.02.022) [Google Scholar]
  • 4.Miao D., Zhang M., Sun Z., et al. : ‘Bin-based classifier fusion of iris and face biometrics’, Neurocomputing, 2017, 224, pp. 105–118 (doi: 10.1016/j.neucom.2016.10.048) [Google Scholar]
  • 5.Zareen F.J., Jabin S.: ‘Authentic mobile-biometric signature verification system’, IET Biometrics, 2016, 5, (1), pp. 13–19 (doi: 10.1049/iet-bmt.2015.0017) [Google Scholar]
  • 6.Das R.K., Jelil S., Prasanna S.R.M.: ‘Development of multi-level speech based person authentication system’, J. Signal Process. Syst., 2016, 88, pp. 1–13 [Google Scholar]
  • 7.Bajwa G., Dantu R.: ‘Neurokey: towards a new paradigm of cancelable biometrics-based key generation using electroencephalograms’, Comput. Secur., 2016, 62, pp. 95–113 (doi: 10.1016/j.cose.2016.06.001) [Google Scholar]
  • 8.Rodrigues D., Silva G.F.A., Papa J.P., et al. : ‘EEG-based person identification through binary flower pollination algorithm’, Expert Syst. Appl., 2016, 62, pp. 81–90 (doi: 10.1016/j.eswa.2016.06.006) [Google Scholar]
  • 9.Maiorana E., La Rocca D., Campis P.: ‘Eigenbrains and eigentensorbrains: parsimonious bases for EEG biometrics’, Neurocomputing, 2016, 171, pp. 638–648 (doi: 10.1016/j.neucom.2015.07.005) [Google Scholar]
  • 10.Maiorana E., Solé-Casals J., Campisi P.: ‘EEG signal preprocessing for biometric recognition’, Mach. Vision Appl., 2016, 27, pp. 1351–1360 (doi: 10.1007/s00138-016-0804-4) [Google Scholar]
  • 11.Palaniappan R., Raveendran P.: ‘Individual identification technique using visual evoked potential signals’, Electron. Lett., 2002, 38, pp. 1634–1635 (doi: 10.1049/el:20021104) [Google Scholar]
  • 12.Palaniappan R., Mandic D. P.: ‘EEG based biometric framework for automatic identity verification’, J. VLSI Signal Process., 2007, 49, (2), pp. 243–250 (doi: 10.1007/s11265-007-0078-1) [Google Scholar]
  • 13.Nguyen P., Tran D., Huang X., et al. : ‘A proposed feature extraction method for EEG-based person identification’. Int. Conf. on Artificial Intelligence, Las Vegas, USA, 2012 [Google Scholar]
  • 14.Marcel S., Millan J.: ‘Person authentication using brainwaves (EEG) and maximum a posteriori model adaptation’, IEEE Trans. Pattern Anal. Mach. Intell., 2007, 29, pp. 743–752 (doi: 10.1109/TPAMI.2007.1012) [DOI] [PubMed] [Google Scholar]
  • 15.Thorpe J., Oorschot P.C.., Somayaji A.: ‘Pass-thoughts: authenticating with our minds’. Proc. New Security Paradigms Workshop, Lake Arrowhead, 2005, pp. 45–56 [Google Scholar]
  • 16.Singhal G., RamKumar P.: ‘Person identification using evoked potentials and peak matching’. IEEE Biometrics Symp., Baltimore, MD, USA, 2007, vol. 74, pp. 1–6 [Google Scholar]
  • 17.Das K., Zhang S., Giesbrecht B., et al. : ‘Using rapid visually evoked EEG activity for person identification’. Int. Conf. on Engineering in Medicine and Biology Society, Minneapolis, MN, USA, September 2009, pp. 2490–2493 [DOI] [PubMed] [Google Scholar]
  • 18.Ferreira A., Almeida C., Georgieva P., et al. : ‘Advances in EEG based biometry’. Proc. 7th Int. Conf. on Image Analysis and Recognition, Póvoa de Varzim, Portugal, June 2010, Part II, pp. 287–295 [Google Scholar]
  • 19.Sun S.: ‘Multi-task learning for EEG-based biometrics’. 19th Int. Conf. on Pattern Recognition, Tampa, FL, USA, December 2008, pp. 1–4 [Google Scholar]
  • 20.Su F., Xia L., Cai A., et al. : ‘EEG-based personal identification: from proof-of-concept to a practical system’. 20th Int. Conf. on Pattern Recognition, Istanbul, Turkey, 2010, pp. 3728–3731 [Google Scholar]
  • 21.Bao X.C., Wang J.L., Hu J.F.: ‘Method of individual identification based on electroencephalogram analysis’. Int. Conf. on New Trends in Information & Service Science, Beijing, China, 2009, pp. 390–393 [Google Scholar]
  • 22.Jianfeng H., Zhendong M., Ping W.: ‘Multi-feature authentication system based on event evoked electroencephalogram’, J. Med. Imaging Health Inf., 2015, 5, (4), pp. 862–870 (doi: 10.1166/jmihi.2015.1471) [Google Scholar]
  • 23.Yin J.H., Hu J.F., Mu Z.D.: ‘Developing and evaluating a Mobile driver fatigue detection network based on electroencephalograph signals’, Healthc. Technol. Lett., 2017, 4, (1), pp. 34–38 (doi: 10.1049/htl.2016.0053) [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 24.Mu Z., Hu J., Min J.: ‘EEG-based person authentication using a fuzzy entropy-related approach with two electrodes’, Entropy, 2016, 18, (12), p. 432, (doi: 10.3390/e18120432) [Google Scholar]
  • 25.Mu Z.D., Hu J.F., Yin J.H.: ‘Driving fatigue detecting based on EEG signals of forehead area’, Int. J. Pattern Recognit. Artif. Intell., 2017, 31, (5), p. 1750011 (doi: 10.1142/S0218001417500112) [Google Scholar]
  • 26.Hu J.: ‘Comparison of different features and classifiers for driver fatigue detection based on a single EEG channel’, Comput. Math. Methods Med., 2017, 2017, p. 9, Article ID 5109530, doi: 10.1155/2017/5109530 [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 27.Mu Z., Hu J., Min J.: ‘Driver fatigue detection system using electroencephalography signals based on combined entropy features’, Appl. Sci., 2017, 7, (2), p. 150, (doi: 10.3390/app7020150) [Google Scholar]
  • 28.Mu Z., Hu J., Min J., et al. : ‘Comparison of different entropy as feature for person authentication based on EEG signals’, IET Biometrics, 2017, 6, pp. 409–417, (doi: 10.1049/iet-bmt.2016.0144) [Google Scholar]
  • 29.Klonovs J., Petersen C., Olesen H., et al. : ‘ID proof on the go: development of a mobile EEG-based biometric authentication system’, IEEE Veh. Technol. Mag., 2013, 8, pp. 81–89 (doi: 10.1109/MVT.2012.2234056) [Google Scholar]
  • 30.Kumar P., Saini R., Roy P.P., et al. : ‘A bio-signal based framework to secure mobile devices’, J. Netw. Comput. Appl., 2017, 89, pp. 62–71 (doi: 10.1016/j.jnca.2017.02.011) [Google Scholar]
  • 31.Saini R., Kaur B., Singh P., et al. : ‘Don't just sign use brain too: a novel multimodal approach for user identification and verification’, Inf. Sci., 2018, 430, pp. 163–178 (doi: 10.1016/j.ins.2017.11.045) [Google Scholar]
  • 32.Zúquete A., Quintela B., Cunha J.P.D.S.: ‘Biometric authentication using brain responses to visual stimuli’. Proc. Third Int. Conf. on Bio-Inspired Systems and Signal Processing, Valencia, Spain, January, 2010 [Google Scholar]

Articles from Healthcare Technology Letters are provided here courtesy of Wiley

RESOURCES