{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T09:33:18Z","timestamp":1744191198064},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030354442"},{"type":"electronic","value":"9783030354459"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-35445-9_44","type":"book-chapter","created":{"date-parts":[[2020,2,27]],"date-time":"2020-02-27T12:04:08Z","timestamp":1582805048000},"page":"645-657","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Bimodal Biometrics Using EEG-Voice Fusion at Score Level Based on Hidden Markov Models"],"prefix":"10.1007","author":[{"given":"Juan Carlos","family":"Moreno-Rodriguez","sequence":"first","affiliation":[]},{"given":"Juan Manuel","family":"Ramirez-Cortes","sequence":"additional","affiliation":[]},{"given":"Rene","family":"Arechiga-Martinez","sequence":"additional","affiliation":[]},{"given":"Pilar","family":"Gomez-Gil","sequence":"additional","affiliation":[]},{"given":"Juan Carlos","family":"Atenco-Vazquez","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,2,28]]},"reference":[{"issue":"3","key":"44_CR1","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/MMUL.2018.2873494","volume":"25","author":"Z Akhtar","year":"2018","unstructured":"Akhtar, Z., Hadid, A., Nixon, M.S., Tistarelli, M., Dugelay, J.L., Marcel, S.: Biometrics: in search of identity and security (Q A). IEEE Multimed. 25(3), 22\u201335 (2018)","journal-title":"IEEE Multimed."},{"key":"44_CR2","unstructured":"Supratak, A., Wu, C., Dong, H., Sun, K., Guo, Y.: Survey on feature extraction and applications of biosignals. Mach. Learn. Heal. Informatics 9605, 161\u2013182 (2016)"},{"issue":"1","key":"44_CR3","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/TCSVT.2003.818349","volume":"14","author":"A.K. Jain","year":"2004","unstructured":"Jain, A.K., Ross, A., Prabhakar, S.: An introduction to biometric recognition. IEEE Trans. Circuits Syst. Video Technol. 14(1), 4\u201320 (2004)","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"44_CR4","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1016\/j.bspc.2015.05.008","volume":"21","author":"SN Carvalho","year":"2015","unstructured":"Carvalho, S.N., et al.: Comparative analysis of strategies for feature extraction and classification in SSVEP BCIs. Biomed. Signal Process. Control 21, 34\u201342 (2015)","journal-title":"Biomed. Signal Process. Control"},{"key":"44_CR5","doi-asserted-by":"crossref","unstructured":"Akhtar, Z., Kale, S.: Security analysis of multimodal biometric systems against spoof attacks. Commun. Comput. Inf. Sci. 191(Part 2), 604\u2013611 (2011)","DOI":"10.1007\/978-3-642-22714-1_62"},{"key":"44_CR6","first-page":"721","volume-title":"Communications in Computer and Information Science","author":"J. C. Zapata","year":"2017","unstructured":"Zapata, J.C., Duque, C.M., Rojas-Idarraga, Y., Gonzalez, M.E., Guzm\u00e1n, J.A., Becerra Botero, M.A.: Data fusion applied to biometric identification\u2014a review. In: Communications in Computer and Information Science, vol. 735, pp. 721\u2013733 (2017)"},{"volume-title":"Handbook of Remote Biometrics","year":"2010","key":"44_CR7","unstructured":"Tistarelli, M. (ed.): Handbook of Remote Biometrics, vol. 6256. Springer, London (2010)"},{"key":"44_CR8","unstructured":"Khalifa, W., Salem, A., Roushdy, M.: A survey of EEG based user authentication schemes. In: 2012 8th International Conference on Informatics and Systems (INFOS), pp. 55\u201360 (2012)"},{"issue":"1","key":"44_CR9","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1109\/JSEN.2015.2471183","volume":"16","author":"V Goverdovsky","year":"2016","unstructured":"Goverdovsky, V., Looney, D., Kidmose, P., Mandic, D.P.: In-ear EEG from viscoelastic generic earpieces: robust and unobtrusive 24\/7 monitoring. IEEE Sens. J. 16(1), 271\u2013277 (2016)","journal-title":"IEEE Sens. J."},{"issue":"12","key":"44_CR10","doi-asserted-by":"publisher","first-page":"2635","DOI":"10.1109\/TIFS.2016.2577551","volume":"11","author":"Y Chen","year":"2016","unstructured":"Chen, Y., et al.: A high-security EEG-based login system with RSVP stimuli and dry electrodes. IEEE Trans. Inf. Forensics Secur. 11(12), 2635\u20132647 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"44_CR11","doi-asserted-by":"crossref","unstructured":"Patel, V., Burns, M., Chandramouli, R., Vinjamuri, R.: Biometrics Based on Hand Synergies and their Neural Representations. IEEE Access (2017)","DOI":"10.1109\/ACCESS.2017.2718003"},{"key":"44_CR12","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1016\/j.ins.2017.11.045","volume":"430\u2013431","author":"R Saini","year":"2018","unstructured":"Saini, R., et al.: Don\u2019t just sign use brain too: a novel multimodal approach for user identification and verification. Inf. Sci. (Ny) 430\u2013431, 163\u2013178 (2018)","journal-title":"Inf. Sci. (Ny)"},{"key":"44_CR13","doi-asserted-by":"crossref","unstructured":"Latvala, O.-M., Peng, C., Honkamaa, P., Halunen, K.: \u201cSpeak, Friend, and Enter\u201d\u2014secure, spoken one-time password authentication. In: 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS), pp. 1\u20135 (2018)","DOI":"10.1109\/NTMS.2018.8328719"},{"key":"44_CR14","doi-asserted-by":"crossref","unstructured":"Heigold, G., Moreno, I., Bengio, S., Shazeer, N.: End-to-end text-dependent speaker verification. In: IEEE International Conference on Acoustics, Speech, and Signal Processing, pp. 5115\u20135119 (2016 May)","DOI":"10.1109\/ICASSP.2016.7472652"},{"key":"44_CR15","doi-asserted-by":"crossref","unstructured":"Zhang, C., Koishida, K.: End-to-end text-independent speaker verification with triplet loss on short utterances. In: Proceedings of Annual Conference of the International Speech Communication Association (INTERSPEECH 2017), pp. 1487\u20131491 (2017 August)","DOI":"10.21437\/Interspeech.2017-1608"},{"issue":"3","key":"44_CR16","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1007\/s11265-016-1148-z","volume":"88","author":"Rohan Kumar Das","year":"2016","unstructured":"Das, R.K., Jelil, S., Mahadeva Prasanna, S.R.: Development of multi-level speech based person authentication system. J. Signal Process. Syst. 88(3), 259\u2013271 (2017)","journal-title":"Journal of Signal Processing Systems"},{"key":"44_CR17","unstructured":"Beranek, B., Warren, R.: Authenticating Customers with Nuance Voice Biometrics Solutions, Redbooks REDP-4903-00, IBM Corporation, 1\u201318 (2012)"},{"key":"44_CR18","unstructured":"LumenVox.: Multifactor Authentication\u2014LumenVox. [Online]. Available \nhttps:\/\/www.lumenvox.com\/multifactor-authentication\/\n\n. Accessed 19 Feb 2019"},{"key":"44_CR19","doi-asserted-by":"crossref","unstructured":"Pressel Coretto, G.A., Gareis, I.E., Rufiner, H.L.: Open access database of EEG signals recorded during imagined speech. In: 12th International Symposium on Medical Information Processing and Analysis, vol. 10160, p. 1016002 (2017)","DOI":"10.1117\/12.2255697"},{"issue":"3","key":"44_CR20","first-page":"138","volume":"2","author":"L Muda","year":"2010","unstructured":"Muda, L., Begam, M., Elamvazuthi, I.: Voice recognition algorithms using Mel Frequency Cepstral Coefficient (MFCC) and Dynamic Time Warping (DTW) techniques. J. Comput. 2(3), 138\u2013143 (2010)","journal-title":"J. Comput."},{"key":"44_CR21","doi-asserted-by":"crossref","unstructured":"Agrawal, S., Mishra, D.K.: Speaker verification using mel-frequency cepstrum coefficient and linear prediction coding. In: 2017 International Conference on Recent Innovations in Signal processing and Embedded Systems (RISE), pp. 543\u2013548. IEEE (2018 January)","DOI":"10.1109\/RISE.2017.8378215"},{"key":"44_CR22","unstructured":"Young, S., Evermann, G., Gales, M., Hain, T., Kershaw, D., Liu, X., Valtchev, V.: The HTK book, n.p.: Cambridge University Engineering Department, 3(1), 1\u2013175 (2002)"},{"issue":"6","key":"44_CR23","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1016\/j.jmp.2011.08.002","volume":"55","author":"I Visser","year":"2011","unstructured":"Visser, I.: Seven things to remember about hidden Markov models: a tutorial on Markovian models for time series. J. Math. Psychol. 55(6), 403\u2013415 (2011)","journal-title":"J. Math. Psychol."},{"key":"44_CR24","doi-asserted-by":"crossref","unstructured":"Kaur, B., Singh, D.: Neuro signals: a future biomertic approach towards user identification. In: Proceedings of the 7th International Conference Confluence 2017 on Cloud Computing, Data Science and Engineering, pp. 112\u2013117 (2017)","DOI":"10.1109\/CONFLUENCE.2017.7943133"},{"key":"44_CR25","doi-asserted-by":"crossref","unstructured":"Jayarathne, I., Cohen, M., Amarakeerthi, S.: Survey of EEG-based biometric authentication. In: Proceedings of 2017 IEEE 8th International Conference on Awareness Science Technology (iCAST 2017), pp. 324\u2013329 (2018 January)","DOI":"10.1109\/ICAwST.2017.8256471"},{"issue":"3","key":"44_CR26","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1049\/iet-bmt.2014.0040","volume":"4","author":"SN Abbas","year":"2015","unstructured":"Abbas, S.N., Abo-Zahhad, M., Ahmed, S.M.: State-of-the-art methods and future perspectives for personal recognition based on electroencephalogram signals. IET Biometrics 4(3), 179\u2013190 (2015)","journal-title":"IET Biometrics"},{"issue":"3","key":"44_CR27","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1177\/1073858409349899","volume":"16","author":"ED Ross","year":"2010","unstructured":"Ross, E.D.: Cerebral localization of functions and the neurology of language: fact versus fiction or is it something else? Neuroscientist 16(3), 222\u2013243 (2010)","journal-title":"Neuroscientist"},{"issue":"4","key":"44_CR28","doi-asserted-by":"publisher","first-page":"1084","DOI":"10.1016\/j.eswa.2006.02.005","volume":"32","author":"A Subasi","year":"2007","unstructured":"Subasi, A.: EEG signal classification using wavelet feature extraction and a mixture of expert model. Expert Syst. Appl. 32(4), 1084\u20131093 (2007)","journal-title":"Expert Syst. Appl."}],"container-title":["Studies in Computational Intelligence","Intuitionistic and Type-2 Fuzzy Logic Enhancements in Neural and Optimization Algorithms: Theory and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-35445-9_44","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,27]],"date-time":"2020-02-27T12:17:31Z","timestamp":1582805851000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-35445-9_44"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030354442","9783030354459"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-35445-9_44","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"28 February 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}