{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T20:51:09Z","timestamp":1742935869675,"version":"3.40.3"},"publisher-location":"Cham","reference-count":38,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030869922"},{"type":"electronic","value":"9783030869939"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-86993-9_12","type":"book-chapter","created":{"date-parts":[[2021,9,14]],"date-time":"2021-09-14T23:08:06Z","timestamp":1631660886000},"page":"124-135","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Identifying Individuals Using EEG-Based Brain Connectivity Patterns"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0857-3914","authenticated-orcid":false,"given":"Hadri","family":"Hussain","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6037-3728","authenticated-orcid":false,"given":"Chee-Ming","family":"Ting","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7939-7244","authenticated-orcid":false,"given":"M. A.","family":"Jalil","sequence":"additional","affiliation":[]},{"given":"Kanad","family":"Ray","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2289-7192","authenticated-orcid":false,"given":"S. Z. H.","family":"Rizvi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2314-4600","authenticated-orcid":false,"given":"J.","family":"Kavikumar","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1756-8239","authenticated-orcid":false,"given":"Fuad M.","family":"Noman","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7936-6675","authenticated-orcid":false,"given":"A. L. Ahmad","family":"Zubaidi","sequence":"additional","affiliation":[]},{"given":"Yin Fen","family":"Low","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1289-7620","authenticated-orcid":false,"family":"Sh-Hussain","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2037-8348","authenticated-orcid":false,"given":"Mufti","family":"Mahmud","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4604-5461","authenticated-orcid":false,"given":"M. Shamim","family":"Kaiser","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4471-3681","authenticated-orcid":false,"given":"J.","family":"Ali","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,15]]},"reference":[{"key":"12_CR1","unstructured":"Artzi, Y., Eisenstein, J.: Proceedings of the 56th Annual Meeting of the Association for Computational Linguistics: Tutorial Abstracts (2018)"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Bennani, Y., Gallinari, P.: On the use of TDNN-extracted features information in talker identification. In: [Proceedings] ICASSP 91: 1991 International Conference on Acoustics, Speech, and Signal Processing, pp. 385\u2013388. IEEE (1991)","DOI":"10.1109\/ICASSP.1991.150357"},{"issue":"5","key":"12_CR3","doi-asserted-by":"publisher","first-page":"782","DOI":"10.1109\/TIFS.2014.2308640","volume":"9","author":"P Campisi","year":"2014","unstructured":"Campisi, P., La Rocca, D.: Brain waves for automatic biometric-based user recognition. IEEE Trans. Inf. Forensics Secur. 9(5), 782\u2013800 (2014)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"12_CR4","first-page":"131","volume":"16","author":"X Chen","year":"2018","unstructured":"Chen, X., Wang, Y., Wang, L., et al.: Arrhythmia recognition and classification using ECG morphology and segment feature analysis. IEEE\/ACM Trans. Comput. Biol. Bioinform. 16(1), 131\u2013138 (2018)","journal-title":"IEEE\/ACM Trans. Comput. Biol. Bioinform."},{"issue":"12","key":"12_CR5","doi-asserted-by":"publisher","first-page":"2635","DOI":"10.1109\/TIFS.2016.2577551","volume":"11","author":"Y Chen","year":"2016","unstructured":"Chen, Y., et al.: A high-security EEG-based login system with RSVP stimuli and dry electrodes. IEEE Trans. Inf. Forensics Secur. 11(12), 2635\u20132647 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"2","key":"12_CR6","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1109\/TSMC.2018.2795609","volume":"49","author":"L Fei","year":"2018","unstructured":"Fei, L., Lu, G., Jia, W., Teng, S., Zhang, D.: Feature extraction methods for palmprint recognition: a survey and evaluation. IEEE Trans. Syst. Man Cybern. Syst. 49(2), 346\u2013363 (2018)","journal-title":"IEEE Trans. Syst. Man Cybern. Syst."},{"key":"#cr-split#-12_CR7.1","unstructured":"Feng, K., Liu, G.: Obstructive sleep apnea detection based on unsupervised feature learning and hidden Markov model. In: BIBE 2019"},{"key":"#cr-split#-12_CR7.2","unstructured":"The Third International Conference on Biological Information and Biomedical Engineering, pp. 1-4. VDE (2019)"},{"key":"12_CR8","unstructured":"Homayon, S., Salarian, M.: IRIS recognition for personal identification using Lamstar neural network. arXiv preprint arXiv:1907.12145 (2019)"},{"key":"12_CR9","doi-asserted-by":"publisher","first-page":"560","DOI":"10.1007\/978-3-642-21729-6_140","volume-title":"IFMBE Proceedings","author":"H Hussain","year":"2011","unstructured":"Hussain, H., Salleh, S., Ting, C., Ariff, A., Kamarulafizam, I., Surya, R.: Speaker verification using Gaussian mixture model (GMM). In: Osman, N.A.A., Abas, W.A.B.W., Ting, H.N. (eds.) IFMBE Proceedings, vol. 35, pp. 560\u2013564. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-21729-6_140"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Hussain, H., et al.: Analysis of ECG biosignal recognition for client identifiction. In: 2017 IEEE International Conference on Signal and Image Processing Applications (ICSIPA), pp. 15\u201320. IEEE (2017)","DOI":"10.1109\/ICSIPA.2017.8120572"},{"issue":"5","key":"12_CR11","first-page":"202","volume":"4","author":"G Kaur","year":"2015","unstructured":"Kaur, G., Singh, D., Kaur, S.: Electrocardiogram (ECG) as a biometric characteristic: a review. Int. J. Emerg. Res. Manage. Technol. 4(5), 202\u2013206 (2015)","journal-title":"Int. J. Emerg. Res. Manage. Technol."},{"issue":"1","key":"12_CR12","first-page":"187","volume":"3","author":"R Kaur","year":"2015","unstructured":"Kaur, R., Choudhary, P.: Handwritten signature verification based on surf features using hmm. Int. J. Comput. Sci. Trends Technol. (IJCST) 3(1), 187\u2013195 (2015)","journal-title":"Int. J. Comput. Sci. Trends Technol. (IJCST)"},{"issue":"9","key":"12_CR13","doi-asserted-by":"publisher","first-page":"2127","DOI":"10.1109\/TIP.2009.2023153","volume":"18","author":"A Kumar","year":"2009","unstructured":"Kumar, A., Prathyusha, K.V.: Personal authentication using hand vein triangulation and knuckle shape. IEEE Trans. Image Process. 18(9), 2127\u20132136 (2009)","journal-title":"IEEE Trans. Image Process."},{"issue":"1","key":"12_CR14","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/s00422-009-0350-5","volume":"102","author":"W Liao","year":"2010","unstructured":"Liao, W., et al.: Evaluating the effective connectivity of resting state networks using conditional granger causality. Biol. Cybern. 102(1), 57\u201369 (2010)","journal-title":"Biol. Cybern."},{"issue":"2","key":"12_CR15","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1049\/iet-bmt.2017.0044","volume":"7","author":"SH Liew","year":"2017","unstructured":"Liew, S.H., Choo, Y.H., Low, Y.F., Yusoh, Z.I.M.: EEG-based biometric authentication modelling using incremental fuzzy-rough nearest neighbour technique. IET Biometrics 7(2), 145\u2013152 (2017)","journal-title":"IET Biometrics"},{"issue":"1","key":"12_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s12559-020-09773-x","volume":"13","author":"M Mahmud","year":"2021","unstructured":"Mahmud, M., Kaiser, M.S., McGinnity, T.M., Hussain, A.: Deep learning in mining biological data. Cogn. Comput. 13(1), 1\u201333 (2021)","journal-title":"Cogn. Comput."},{"issue":"6","key":"12_CR17","doi-asserted-by":"publisher","first-page":"2063","DOI":"10.1109\/TNNLS.2018.2790388","volume":"29","author":"M Mahmud","year":"2018","unstructured":"Mahmud, M., Kaiser, M.S., Hussain, A., Vassanelli, S.: Applications of deep learning and reinforcement learning to biological data. IEEE Trans. Neural Networks Learn. Syst. 29(6), 2063\u20132079 (2018)","journal-title":"IEEE Trans. Neural Networks Learn. Syst."},{"key":"12_CR18","doi-asserted-by":"crossref","unstructured":"Marcel, S., Mill\u00e1n, J.D.R.: Person authentication using brainwaves (EEG) and maximum a posteriori model adaptation. IEEE Trans. Pattern Anal. Mach. Intell. 29(4), 743\u2013752 (2007)","DOI":"10.1109\/TPAMI.2007.1012"},{"key":"12_CR19","volume-title":"Handbook of Neural Computing Applications","author":"AJ Maren","year":"2014","unstructured":"Maren, A.J., Harston, C.T., Pap, R.M.: Handbook of Neural Computing Applications. Academic Press, Cambridge (2014)"},{"issue":"9","key":"12_CR20","doi-asserted-by":"publisher","first-page":"2159","DOI":"10.1109\/TIFS.2017.2699944","volume":"12","author":"BK Min","year":"2017","unstructured":"Min, B.K., Suk, H.I., Ahn, M.H., Lee, M.H., Lee, S.W.: Individual identification using cognitive electroencephalographic neurodynamics. IEEE Trans. Inf. Forensics Secur. 12(9), 2159\u20132167 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"12_CR21","doi-asserted-by":"publisher","first-page":"705","DOI":"10.1109\/JBHI.2019.2925036","volume":"24","author":"F Noman","year":"2019","unstructured":"Noman, F., Salleh, S.H., Ting, C.M., Samdin, S.B., Ombao, H., Hussain, H.: A Markov-switching model approach to heart sound segmentation and classification. IEEE J. Biomed. Health Inform. 24(3), 705\u2013716 (2019)","journal-title":"IEEE J. Biomed. Health Inform."},{"key":"12_CR22","doi-asserted-by":"crossref","unstructured":"Oglesby, J., Mason, J.: Optimisation of neural models for speaker identification. In: International Conference on Acoustics, Speech, and Signal Processing, pp. 261\u2013264. IEEE (1990)","DOI":"10.1109\/ICASSP.1990.115617"},{"key":"12_CR23","doi-asserted-by":"crossref","unstructured":"Paranjape, R., Mahovsky, J., Benedicenti, L., Koles, Z.: The electroencephalogram as a biometric. In: Canadian Conference on Electrical and Computer Engineering 2001. Conference Proceedings (Cat. No. 01TH8555), vol. 2, pp. 1363\u20131366. IEEE (2001)","DOI":"10.1109\/CCECE.2001.933649"},{"key":"12_CR24","unstructured":"Pirale, D., Nirgude, M.: Biometric techniques using neural networks. Int. J. Adv. Res. Comput. Commun. Eng. 5(4), 256 (2016)"},{"key":"12_CR25","doi-asserted-by":"crossref","unstructured":"Poulos, M., Rangoussi, M., Chrissikopoulos, V., Evangelou, A.: Person identification based on parametric processing of the EEG. In: ICECS 1999. Proceedings of ICECS 1999. 6th IEEE International Conference on Electronics, Circuits and Systems (Cat. No. 99EX357), vol. 1, pp. 283\u2013286. IEEE (1999)","DOI":"10.1109\/ICECS.1999.812278"},{"key":"12_CR26","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/978-3-030-59277-6_22","volume-title":"Brain Informatics","author":"S Rahman","year":"2020","unstructured":"Rahman, S., Sharma, T., Mahmud, M.: Improving alcoholism diagnosis: comparing instance-based classifiers against neural networks for classifying EEG signal. In: Mahmud, M., Vassanelli, S., Kaiser, M.S., Zhong, N. (eds.) BI 2020. LNCS (LNAI), vol. 12241, pp. 239\u2013250. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-59277-6_22"},{"key":"12_CR27","doi-asserted-by":"crossref","unstructured":"Rowe, R.K., Nixon, K.A., Corcoran, S.P.: Multispectral fingerprint biometrics. In: Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop, pp. 14\u201320. IEEE (2005)","DOI":"10.1109\/IAW.2005.1495928"},{"key":"12_CR28","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/978-3-030-59277-6_27","volume-title":"Brain Informatics","author":"MS Satu","year":"2020","unstructured":"Satu, M.S., Rahman, S., Khan, M.I., Abedin, M.Z., Kaiser, M.S., Mahmud, M.: Towards improved detection of cognitive performance using bidirectional multilayer long-short term memory neural network. In: Mahmud, M., Vassanelli, S., Kaiser, M.S., Zhong, N. (eds.) BI 2020. LNCS (LNAI), vol. 12241, pp. 297\u2013306. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-59277-6_27"},{"key":"12_CR29","doi-asserted-by":"crossref","unstructured":"Shirke, S.D., Rajabhushnam, C.: Biometric personal IRIS recognition from an image at long distance. In: 2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI), pp. 560\u2013565. IEEE (2019)","DOI":"10.1109\/ICOEI.2019.8862640"},{"issue":"12","key":"12_CR30","doi-asserted-by":"publisher","first-page":"3259","DOI":"10.1109\/TIFS.2019.2916403","volume":"14","author":"M Wang","year":"2019","unstructured":"Wang, M., El-Fiqi, H., Hu, J., Abbass, H.A.: Convolutional neural networks using dynamic functional connectivity for EEG-based person identification in diverse human states. IEEE Trans. Inf. Forensics Secur. 14(12), 3259\u20133272 (2019)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"12_CR31","doi-asserted-by":"publisher","first-page":"486","DOI":"10.1109\/TCDS.2019.2924648","volume":"12","author":"T Wilaiprasitporn","year":"2019","unstructured":"Wilaiprasitporn, T., Ditthapron, A., Matchaparn, K., Tongbuasirilai, T., Banluesombatkul, N., Chuangsuwanich, E.: Affective EEG-based person identification using the deep learning approach. IEEE Trans. Cogn. Dev. Syst. 12(3), 486\u2013496 (2019)","journal-title":"IEEE Trans. Cogn. Dev. Syst."},{"issue":"1","key":"12_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s41598-018-29984-5","volume":"8","author":"C Will","year":"2018","unstructured":"Will, C., et al.: Radar-based heart sound detection. Sci. Rep. 8(1), 1\u201314 (2018)","journal-title":"Sci. Rep."},{"issue":"3","key":"12_CR33","doi-asserted-by":"publisher","first-page":"035013","DOI":"10.1088\/1741-2560\/11\/3\/035013","volume":"11","author":"I Winkler","year":"2014","unstructured":"Winkler, I., Brandl, S., Horn, F., Waldburger, E., Allefeld, C., Tangermann, M.: Robust artifactual independent component classification for BCI practitioners. J. Neural Eng. 11(3), 035013 (2014)","journal-title":"J. Neural Eng."},{"key":"12_CR34","doi-asserted-by":"publisher","first-page":"153751","DOI":"10.1109\/ACCESS.2019.2948857","volume":"7","author":"Q Xie","year":"2019","unstructured":"Xie, Q., Tu, S., Wang, G., Lian, Y., Xu, L.: Feature enrichment based convolutional neural network for heartbeat classification from electrocardiogram. IEEE Access 7, 153751\u2013153760 (2019)","journal-title":"IEEE Access"},{"issue":"4","key":"12_CR35","doi-asserted-by":"publisher","first-page":"1159","DOI":"10.1016\/j.patcog.2012.10.023","volume":"46","author":"SK Yeom","year":"2013","unstructured":"Yeom, S.K., Suk, H.I., Lee, S.W.: Person authentication from neural activity of face-specific visual self-representation. Pattern Recogn. 46(4), 1159\u20131169 (2013)","journal-title":"Pattern Recogn."},{"issue":"8","key":"12_CR36","doi-asserted-by":"publisher","first-page":"1526","DOI":"10.3390\/app9081526","volume":"9","author":"R Zemouri","year":"2019","unstructured":"Zemouri, R., Zerhouni, N., Racoceanu, D.: Deep learning in the biomedical applications: recent and future status. Appl. Sci. 9(8), 1526 (2019)","journal-title":"Appl. Sci."},{"key":"12_CR37","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/978-3-642-15314-3_14","volume-title":"Brain Informatics","author":"Q Zhao","year":"2010","unstructured":"Zhao, Q., et al.: Improving individual identification in security check with an EEG based biometric solution. In: Yao, Y., Sun, R., Poggio, T., Liu, J., Zhong, N., Huang, J. (eds.) BI 2010. LNCS (LNAI), vol. 6334, pp. 145\u2013155. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-15314-3_14"}],"container-title":["Lecture Notes in Computer Science","Brain Informatics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-86993-9_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T10:34:42Z","timestamp":1725791682000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-86993-9_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030869922","9783030869939"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-86993-9_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"15 September 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Brain Informatics","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 September 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 September 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"brain2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/bi2021.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"90","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"49","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"54% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}