[go: up one dir, main page]

Rathi et al., 2020 - Google Patents

Brain signatures perspective for high-security authentication

Rathi et al., 2020

Document ID
1470247916080081999
Author
Rathi N
Singla R
Tiwari S
Publication year
Publication venue
Biomedical Engineering: Applications, Basis and Communications

External Links

Snippet

In the recent past, the web (internet) has emerged as the most interactive authentication system for all of us (ie Internet banking passwords, system or building access, and e- payment platforms, etc.) and as a result, traditional authentication systems (like passwords …
Continue reading at www.worldscientific.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2133Verifying human interaction, e.g., Captcha
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2145Inheriting rights or properties, e.g., propagation of permissions or restrictions within a hierarchy
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00006Acquiring or recognising fingerprints or palmprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/36Image preprocessing, i.e. processing the image information without deciding about the identity of the image
    • G06K9/46Extraction of features or characteristics of the image

Similar Documents

Publication Publication Date Title
Wang et al. Convolutional neural networks using dynamic functional connectivity for EEG-based person identification in diverse human states
Ruiz-Blondet et al. CEREBRE: A novel method for very high accuracy event-related potential biometric identification
Jayarathne et al. BrainID: Development of an EEG-based biometric authentication system
Chen et al. A high-security EEG-based login system with RSVP stimuli and dry electrodes
Lin et al. Brain password: A secure and truly cancelable brain biometrics for smart headwear
Singh et al. Bioelectrical signals as emerging biometrics: Issues and challenges
Campisi et al. EEG for automatic person recognition
Rathi et al. A novel approach for designing authentication system using a picture based P300 speller
Min et al. Individual identification using cognitive electroencephalographic neurodynamics
Jayarathne et al. Survey of EEG-based biometric authentication
Thomas et al. Biometric identification of persons using sample entropy features of EEG during rest state
Debie et al. Session invariant EEG signatures using elicitation protocol fusion and convolutional neural network
Revett Cognitive biometrics: a novel approach to person authentication
WO2017201972A1 (en) Identity recognition method and device based on electroencephalogram signal
Casanova et al. User recognition based on periocular biometrics and touch dynamics
Serwadda et al. fNIRS: A new modality for brain activity-based biometric authentication
Pham et al. A study on the feasibility of using EEG signals for authentication purpose
Pham et al. A study on the stability of EEG signals for user authentication
Gui et al. Multichannel EEG-based biometric using improved RBF neural networks
Rathi et al. Brain signatures perspective for high-security authentication
Jianfeng et al. Multi-feature authentication system based on event evoked electroencephalogram
Rathi et al. Towards a role-based authentication system based on SSVEP-P300 hybrid brain–computer interfacing
Alsunaidi et al. A comparison of human brainwaves-based biometric authentication systems
Rathi et al. Authentication framework for security application developed using a pictorial P300 speller
Rathi et al. A comparative study of classification methods for designing a pictorial P300-based authentication system