{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T11:45:16Z","timestamp":1745322316409,"version":"3.40.3"},"publisher-location":"Cham","reference-count":66,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031477232"},{"type":"electronic","value":"9783031477249"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-47724-9_47","type":"book-chapter","created":{"date-parts":[[2024,4,18]],"date-time":"2024-04-18T20:29:08Z","timestamp":1713472148000},"page":"718-734","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Brain Waves Combined with Evoked Potentials as Biometric Approach for User Identification: A Survey"],"prefix":"10.1007","author":[{"given":"Roberto","family":"Saia","sequence":"first","affiliation":[]},{"given":"Salvatore","family":"Carta","sequence":"additional","affiliation":[]},{"given":"Gianni","family":"Fenu","sequence":"additional","affiliation":[]},{"given":"Livio","family":"Pompianu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,19]]},"reference":[{"key":"47_CR1","doi-asserted-by":"crossref","unstructured":"Abed, S.S., Abed, Z.F.: User authentication system based specified brain waves. J. Discrete Math. Sci. Cryptogr. 23(5), 1021\u20131024 (2020)","DOI":"10.1080\/09720529.2019.1700920"},{"key":"47_CR2","doi-asserted-by":"crossref","unstructured":"Bidgoly, A.J., Bidgoly, H.J., Arezoumand, Z.: A survey on methods and challenges in EEG based authentication. Comput. Secur. 93, 101788 (2020)","DOI":"10.1016\/j.cose.2020.101788"},{"key":"47_CR3","doi-asserted-by":"crossref","unstructured":"Bidgoly, A.J., Bidgoly, H.J., Arezoumand, Z.: Towards a universal and privacy preserving EEG-based authentication system. Sci. Rep. 12(1), 1\u201312 (2022)","DOI":"10.1038\/s41598-022-06527-7"},{"key":"47_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.113967","volume":"165","author":"D Carri\u00f3n-Ojeda","year":"2021","unstructured":"Carri\u00f3n-Ojeda, D., Fonseca-Delgado, R., Pineda, I.: Analysis of factors that influence the performance of biometric systems based on EEG signals. Expert Syst. Appl. 165, 113967 (2021)","journal-title":"Expert Syst. Appl."},{"key":"47_CR5","doi-asserted-by":"crossref","unstructured":"Carta, S., Podda, A.S., Recupero, D.R., Saia, R.: A local feature engineering strategy to improve network anomaly detection. Fut. Internet 12(10), 177 (2020)","DOI":"10.3390\/fi12100177"},{"key":"47_CR6","doi-asserted-by":"crossref","unstructured":"Coull, B.M., Pedley, T.A.: Intermittent photic stimulation. Clinical usefulness of non-convulsive responses. Electroencephalogr. Clin. Neurophysiol. 44(3), 353\u2013363 (1978)","DOI":"10.1016\/0013-4694(78)90310-3"},{"key":"47_CR7","doi-asserted-by":"crossref","unstructured":"Creel, D.J.: Visually evoked potentials. Handb. Clin. Neurol. 160, 501\u2013522 (2019)","DOI":"10.1016\/B978-0-444-64032-1.00034-5"},{"key":"47_CR8","doi-asserted-by":"crossref","unstructured":"Dahel, S.K., Xiao, Q.: Accuracy performance analysis of multimodal biometrics. In: IEEE Systems, Man and Cybernetics Society Information Assurance Workshop, pp. 170\u2013173. IEEE (2003)","DOI":"10.1109\/SMCSIA.2003.1232417"},{"issue":"3","key":"47_CR9","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1109\/LSP.2016.2516043","volume":"23","author":"R Das","year":"2016","unstructured":"Das, R., Maiorana, E., Campisi, P.: EEG biometrics using visual stimuli: a longitudinal study. IEEE Signal Process. Lett. 23(3), 341\u2013345 (2016)","journal-title":"IEEE Signal Process. Lett."},{"key":"47_CR10","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.apacoust.2018.06.024","volume":"141","author":"G-Q Di","year":"2018","unstructured":"Di, G.-Q., Fan, M.-C., Lin, Q.-H.: An experimental study on EEG characteristics induced by intermittent pure tone stimuli at different frequencies. Appl. Acoust. 141, 46\u201353 (2018)","journal-title":"Appl. Acoust."},{"key":"47_CR11","doi-asserted-by":"crossref","unstructured":"El-Fiqi, H., Wang, M., Salimi, N., Kasmarik, K., Barlow, M., Abbass, H.: Convolution neural networks for person identification and verification using steady state visual evoked potential. In: 2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp. 1062\u20131069. IEEE (2018)","DOI":"10.1109\/SMC.2018.00188"},{"key":"47_CR12","doi-asserted-by":"crossref","unstructured":"Fraschini, M., Pani, S.M., Didaci, L., Marcialis, G.L.: Robustness of functional connectivity metrics for EEG-based personal identification over task-induced intra-class and inter-class variations. Pattern Recogn. Lett. 125, 49\u201354 (2019)","DOI":"10.1016\/j.patrec.2019.03.025"},{"key":"47_CR13","doi-asserted-by":"crossref","unstructured":"Jayarathne, I., Cohen, M., Amarakeerthi, S.: Survey of EEG-based biometric authentication. In: 2017 IEEE 8th International Conference on Awareness Science and Technology (iCAST), pp. 324\u2013329. IEEE (2017)","DOI":"10.1109\/ICAwST.2017.8256471"},{"key":"47_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.bspc.2021.102739","volume":"68","author":"CM Jijomon","year":"2021","unstructured":"Jijomon, C.M., Vinod, A.P.: Person-identification using familiar-name auditory evoked potentials from frontal EEG electrodes. Biomed. Signal Process. Control 68, 102739 (2021)","journal-title":"Biomed. Signal Process. Control"},{"key":"47_CR15","doi-asserted-by":"crossref","unstructured":"Katsigiannis, S., Arnau-Gonz\u00e1lez, P., Arevalillo-Herr\u00e1ez, M., Ramzan, N.: Single-channel EEG-based subject identification using visual stimuli. In: 2021 IEEE EMBS International Conference on Biomedical and Health Informatics (BHI), pp. 1\u20134. IEEE (2021)","DOI":"10.1109\/BHI50953.2021.9508581"},{"key":"47_CR16","doi-asserted-by":"crossref","unstructured":"Kaur, B., Kumar, P., Roy, P.P., Singh, D.: Impact of ageing on EEG based biometric systems. In: 2017 4th IAPR Asian Conference on Pattern Recognition (ACPR), pp. 459\u2013464. IEEE (2017)","DOI":"10.1109\/ACPR.2017.33"},{"key":"47_CR17","doi-asserted-by":"crossref","unstructured":"Kim, H.-S., Ahn, M.H., Min, B.-K.: Deep-learning-based automatic selection of fewest channels for brain-machine interfaces. IEEE Trans. Cybern. (2021)","DOI":"10.1109\/TCYB.2021.3052813"},{"issue":"7","key":"47_CR18","doi-asserted-by":"publisher","first-page":"874","DOI":"10.1007\/s11055-020-00980-5","volume":"50","author":"NN Lebedeva","year":"2020","unstructured":"Lebedeva, N.N., Karimova, E.D.: Stability of human EEG patterns in different tasks: the person authentication problem. Neurosci. Behav. Physiol. 50(7), 874\u2013880 (2020)","journal-title":"Neurosci. Behav. Physiol."},{"key":"47_CR19","unstructured":"Li, S., Marino, L., Alluri, V.: Music stimuli for EEG-based user authentication. In: The Thirty-Third International Flairs Conference (2020)"},{"key":"47_CR20","doi-asserted-by":"crossref","unstructured":"Li, W., Huang, Z.: Individual identification using code-modulated visual potentials with left-and-right balance. In: 2020 13th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI), pp. 699\u2013703. IEEE (2020)","DOI":"10.1109\/CISP-BMEI51763.2020.9263506"},{"key":"47_CR21","doi-asserted-by":"crossref","unstructured":"Matthews, G., Reinerman-Jones, L., Abich IV, J., Kustubayeva, A.: Optimizing performance prediction. Metrics for individual differences in EEG response to cognitive workload. Personal. Individ. Differ. 118, 22\u201328 (2017)","DOI":"10.1016\/j.paid.2017.03.002"},{"key":"47_CR22","doi-asserted-by":"crossref","unstructured":"Miyake, T., Kinjo, N., Nakanishi, I.: Wavelet transform and machine learning-based biometric authentication using EEG evoked by invisible visual stimuli. In: 2020 IEEE REGION 10 CONFERENCE (TENCON), pp. 573\u2013578. IEEE (2020)","DOI":"10.1109\/TENCON50793.2020.9293772"},{"key":"47_CR23","doi-asserted-by":"crossref","unstructured":"Moctezuma, L.A., Molinas, M.: Towards a minimal EEG channel array for a biometric system using resting-state and a genetic algorithm for channel selection. Sci. Rep. 10(1), 1\u201314 (2020)","DOI":"10.1038\/s41598-020-72051-1"},{"issue":"1","key":"47_CR24","doi-asserted-by":"publisher","first-page":"113","DOI":"10.3233\/JIN-170042","volume":"17","author":"M Zhendong","year":"2018","unstructured":"Zhendong, M., Yin, J., Jianfeng, H.: Application of a brain-computer interface for person authentication using EEG responses to photo stimuli. J. Integr. Neurosci. 17(1), 113\u2013124 (2018)","journal-title":"J. Integr. Neurosci."},{"key":"47_CR25","doi-asserted-by":"crossref","unstructured":"Mukai, K., Nakanishi, I.: Introduction of fractal dimension feature and reduction of calculation amount in person authentication using evoked EEG by ultrasound. In: 2020 IEEE REGION 10 CONFERENCE (TENCON), pp. 567\u2013572. IEEE (2020)","DOI":"10.1109\/TENCON50793.2020.9293921"},{"key":"47_CR26","doi-asserted-by":"crossref","unstructured":"Nakanishi, I., Hattori, M.: Biometric potential of brain waves evoked by invisible visual stimulation. In: 2017 International Conference on Biometrics and Kansei Engineering (ICBAKE), pp. 94\u201399. IEEE (2017)","DOI":"10.1109\/ICBAKE.2017.8090644"},{"key":"47_CR27","doi-asserted-by":"crossref","unstructured":"Nakanishi, I., Maruoka, T.: Biometric authentication using evoked potentials stimulated by personal ultrasound. In: 2019 42nd International Conference on Telecommunications and Signal Processing (TSP), pp. 365\u2013368. IEEE (2019)","DOI":"10.1109\/TSP.2019.8769090"},{"issue":"1","key":"47_CR28","doi-asserted-by":"publisher","first-page":"24","DOI":"10.3390\/electronics9010024","volume":"9","author":"I Nakanishi","year":"2020","unstructured":"Nakanishi, I., Maruoka, T.: Biometrics using electroencephalograms stimulated by personal ultrasound and multidimensional nonlinear features. Electronics 9(1), 24 (2020)","journal-title":"Electronics"},{"key":"47_CR29","doi-asserted-by":"crossref","unstructured":"Nakashima, H., Shindo, Y., Nakanishi, I.: Performance improvement in user verification using evoked electroencephalogram by imperceptible vibration stimuli. In: 2021 20th International Symposium on Communications and Information Technologies (ISCIT), pp. 109\u2013113. IEEE (2021)","DOI":"10.1109\/ISCIT52804.2021.9590618"},{"key":"47_CR30","doi-asserted-by":"crossref","unstructured":"Pham, T., Ma, W., Tran, D., Nguyen, P., Phung, D.: Multi-factor EEG-based user authentication. In: 2014 International Joint Conference on Neural Networks (IJCNN), pp. 4029\u20134034. IEEE (2014)","DOI":"10.1109\/IJCNN.2014.6889569"},{"key":"47_CR31","doi-asserted-by":"crossref","unstructured":"Pham, T., Ma, W., Tran, D., Tran, D.S., Phung, D.: A study on the stability of EEG signals for user authentication. In: 2015 7th International IEEE\/EMBS Conference on Neural Engineering (NER), pp. 122\u2013125. IEEE (2015)","DOI":"10.1109\/NER.2015.7146575"},{"key":"47_CR32","doi-asserted-by":"crossref","unstructured":"Piciucco, E., Maiorana, E., Falzon, O., Camilleri, K.P., Campisi, P.: Steady-state visual evoked potentials for EEG-based biometric identification. In: 2017 International Conference of the Biometrics Special Interest Group (BIOSIG), pp. 1\u20135. IEEE (2017)","DOI":"10.23919\/BIOSIG.2017.8053521"},{"issue":"1","key":"47_CR33","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/j.bpa.2005.07.012","volume":"20","author":"G Plourde","year":"2006","unstructured":"Plourde, G.: Auditory evoked potentials. Best Pract. Res. Clin. Anaesthesiol. 20(1), 129\u2013139 (2006)","journal-title":"Best Pract. Res. Clin. Anaesthesiol."},{"key":"47_CR34","doi-asserted-by":"crossref","unstructured":"Prathibha, R., Swetha, L., Shobha, K.R.: Brain computer interface: design and development of a smart robotic gripper for a prosthesis environment. In: 2017 International Conference on Networks & Advances in Computational Technologies (NetACT), pp. 278\u2013283. IEEE (2017)","DOI":"10.1109\/NETACT.2017.8076780"},{"key":"47_CR35","doi-asserted-by":"crossref","unstructured":"Puengdang, S., Tuarob, S., Sattabongkot, T., Sakboonyarat, B.: EEG-based person authentication method using deep learning with visual stimulation. In: 2019 11th International Conference on Knowledge and Smart Technology (KST), pp. 6\u201310. IEEE (2019)","DOI":"10.1109\/KST.2019.8687819"},{"key":"47_CR36","doi-asserted-by":"crossref","unstructured":"Rahman, M.A., Nakanishi, I.: Person authentication using brain waves evoked by individual-related and imperceptible visual stimuli. In: 2022 International Conference of the Biometrics Special Interest Group (BIOSIG), pp. 1\u20135. IEEE (2022)","DOI":"10.1109\/BIOSIG55365.2022.9897041"},{"key":"47_CR37","doi-asserted-by":"crossref","unstructured":"Rosli, F.A., Saidatul, A., Abdullah, A.A., Navea, R.F.: The wavelet packet decomposition features applied in EEG based authentication system. J. Phys.: Conf. Ser. 1997, 012035 (IOP Publishing) (2021)","DOI":"10.1088\/1742-6596\/1997\/1\/012035"},{"key":"47_CR38","doi-asserted-by":"crossref","unstructured":"Saia, R., Carta, S., Fenu, G., Pompianu, L.: Brain waves and evoked potentials as biometric user identification strategy: an affordable low-cost approach. In: SECRYPT, pp. 614\u2013619. SCITEPRESS (2022)","DOI":"10.5220\/0011297600003283"},{"key":"47_CR39","doi-asserted-by":"crossref","unstructured":"Saia, R., Carta, S., Fenu, G., Pompianu, L.: A region-based training data segmentation strategy to credit scoring. In: SECRYPT, pp. 275\u2013282. SCITEPRESS (2022)","DOI":"10.5220\/0011137400003283"},{"key":"47_CR40","doi-asserted-by":"crossref","unstructured":"Saia, R., Carta, S., Fenu, G., Pompianu, L.: Influencing brain waves by evoked potentials as biometric approach: taking stock of the last six years of research. Neural Comput. Appl. 1\u201327 (2023)","DOI":"10.1007\/s00521-023-08539-4"},{"key":"47_CR41","doi-asserted-by":"crossref","unstructured":"Saia, R., Carta, S., Recupero, D.R., Fenu, G., Saia, M.: A discretized enriched technique to enhance machine learning performance in credit scoring. In: KDIR, pp. 202\u2013213 (2019)","DOI":"10.5220\/0008377702020213"},{"key":"47_CR42","doi-asserted-by":"crossref","unstructured":"Saia, R., Carta, S., Recupero, D.R., Fenu, G., Stanciu, M.: A discretized extended feature space (defs) model to improve the anomaly detection performance in network intrusion detection systems. In: KDIR pp. 322\u2013329 (2019)","DOI":"10.5220\/0008113603220329"},{"key":"47_CR43","doi-asserted-by":"crossref","unstructured":"Saia, R., Podda, A.S., Fenu, G., Balia, R.: Decomposing training data to improve network intrusion detection performance. In: KDIR, pp. 241\u2013248. SCITEPRESS (2021)","DOI":"10.5220\/0010661400003064"},{"key":"47_CR44","doi-asserted-by":"crossref","unstructured":"Seha, S.N.A., Hatzinakos, S.: A new approach for EEG-based biometric authentication using auditory stimulation. In: 2019 International Conference on Biometrics (ICB), pp. 1\u20136. IEEE (2019)","DOI":"10.1109\/ICB45273.2019.8987271"},{"key":"47_CR45","doi-asserted-by":"crossref","unstructured":"Seha, S.N.A., Hatzinakos, D.: Longitudinal assessment of EEG biometrics under auditory stimulation: a deep learning approach. In: 2021 29th European Signal Processing Conference (EUSIPCO), pp. 1386\u20131390. IEEE (2021)","DOI":"10.23919\/EUSIPCO54536.2021.9616098"},{"key":"47_CR46","doi-asserted-by":"crossref","unstructured":"Sharif, M., Raza, M., Shah, J.H., Yasmin, M., Fernandes, S.L.: An overview of biometrics methods. In: Handbook of Multimedia Information Security: techniques and Applications, pp. 15\u201335 (2019)","DOI":"10.1007\/978-3-030-15887-3_2"},{"key":"47_CR47","doi-asserted-by":"crossref","unstructured":"Shindo, Y., Nakanishi, I.: Person verification using electroencephalograms evoked by new imperceptible vibration stimulation. In: 2021 IEEE 3rd Global Conference on Life Sciences and Technologies (LifeTech), pp. 282\u2013286. IEEE (2021)","DOI":"10.1109\/LifeTech52111.2021.9391860"},{"key":"47_CR48","doi-asserted-by":"crossref","unstructured":"Shindo, Y., Nakanishi, I., Takemura, A.: A study on person verification using electroencephalograms evoked by unperceivable vibration stimuli. In: 2019 Seventh International Symposium on Computing and Networking Workshops (CANDARW), pp. 416\u2013419. IEEE (2019)","DOI":"10.1109\/CANDARW.2019.00078"},{"key":"47_CR49","doi-asserted-by":"crossref","unstructured":"Skoric, M.K., Jerbic, A.B., Krois, I., Cifrek, M., Isgum, V.: Vibratory evoked potentials. In: 6th European Conference of the International Federation for Medical and Biological Engineering, pp. 505\u2013508. Springer (2015)","DOI":"10.1007\/978-3-319-11128-5_126"},{"key":"47_CR50","doi-asserted-by":"crossref","unstructured":"Soni, Y.S., Somani, S.B., Shete, V.V..: Biometric user authentication using brain waves. In: 2016 International Conference on Inventive Computation Technologies (ICICT), vol. 2, pp. 1\u20136. IEEE (2016)","DOI":"10.1109\/INVENTIVE.2016.7824888"},{"key":"47_CR51","doi-asserted-by":"crossref","unstructured":"Subha, D.P., Joseph, P.K., Acharya U, R., Lim, C.M., et al.: EEG signal analysis: a survey. J. Med. Syst. 34(2), 195\u2013212 (2010)","DOI":"10.1007\/s10916-008-9231-z"},{"key":"47_CR52","doi-asserted-by":"crossref","unstructured":"Thakor, N.V., Sherman, D.L.: EEG signal processing: theory and applications. In: Neural Engineering, pp. 259\u2013303. Springer (2013)","DOI":"10.1007\/978-1-4614-5227-0_5"},{"key":"47_CR53","doi-asserted-by":"crossref","unstructured":"Thomas, K.P., Vinod, A.P.: EEG-based biometric authentication using gamma band power during rest state. Circuits Syst. Signal Process. 37(1), 277\u2013289 (2018)","DOI":"10.1007\/s00034-017-0551-4"},{"key":"47_CR54","doi-asserted-by":"crossref","unstructured":"Thomas, K.P., Vinod, A.P.: Toward EEG-based biometric systems: the great potential of brain-wave-based biometrics. IEEE Syst. Man Cybern. Mag. 3(4), 6\u201315 (2017)","DOI":"10.1109\/MSMC.2017.2703651"},{"key":"47_CR55","doi-asserted-by":"crossref","unstructured":"Thomas, K.P., Vinod, A.P., et al.: EEG-based biometrie authentication using self-referential visual stimuli. In: 2017 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp. 3048\u20133053. IEEE (2017)","DOI":"10.1109\/SMC.2017.8123093"},{"key":"47_CR56","doi-asserted-by":"crossref","unstructured":"Von B\u00fcnau, P., Meinecke, F.C., Scholler, S., M\u00fcller, K.-R.: Finding stationary brain sources in EEG data. In: 2010 Annual International Conference of the IEEE Engineering in Medicine and Biology, pp. 2810\u20132813. IEEE (2010)","DOI":"10.1109\/IEMBS.2010.5626537"},{"key":"47_CR57","doi-asserted-by":"crossref","unstructured":"Walsh, P., Kane, N., Butler, S.: The clinical role of evoked potentials. J. Neurol. Neurosurg. Psychiatr. 76(suppl 2), ii16\u2013ii22 (2005)","DOI":"10.1136\/jnnp.2005.068130"},{"key":"47_CR58","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.neucom.2020.09.017","volume":"421","author":"Z Wan","year":"2021","unstructured":"Wan, Z., Yang, R., Huang, M., Zeng, N., Liu, X.: A review on transfer learning in EEG signal analysis. Neurocomputing 421, 1\u201314 (2021)","journal-title":"Neurocomputing"},{"key":"47_CR59","doi-asserted-by":"crossref","unstructured":"Wijayanto, I., Hadiyoso, S., Sekarningrum, F.A.: Biometric identification based on EEG signal with photo stimuli using Hjorth descriptor. In: 2020 8th International Conference on Information and Communication Technology (ICoICT), pp. 1\u20134. IEEE (2020)","DOI":"10.1109\/ICoICT49345.2020.9166210"},{"key":"47_CR60","doi-asserted-by":"crossref","unstructured":"Xavier, G., Ting, A.S., Fauzan, N.: P-eg002. An exploratory study of brain waves and corresponding brain regions of fatigue post-call doctors using quantitative electroencephalogram. Clin. Neurophysiol. 132(8), e78 (2021)","DOI":"10.1016\/j.clinph.2021.02.162"},{"key":"47_CR61","doi-asserted-by":"crossref","unstructured":"Yamashita, M., Nakazawa, M., Nishikawa, Y.: The proposal and it\u2019s evalution of biometric authentication method by EEG analysis using image stimulation. In: 2018 Eleventh International Conference on Mobile Computing and Ubiquitous Network (ICMU), pp. 1\u20134. IEEE (2018)","DOI":"10.23919\/ICMU.2018.8653605"},{"issue":"6","key":"47_CR62","doi-asserted-by":"publisher","first-page":"958","DOI":"10.1109\/THMS.2017.2682115","volume":"47","author":"S Yang","year":"2017","unstructured":"Yang, S., Deravi, F.: On the usability of electroencephalographic signals for biometric recognition: a survey. IEEE Trans. Hum.-Mach. Syst. 47(6), 958\u2013969 (2017)","journal-title":"IEEE Trans. Hum.-Mach. Syst."},{"key":"47_CR63","doi-asserted-by":"crossref","unstructured":"Yap, H.Y., Choo, Y.H., Mohd Yusoh, Z.I., Khoh, W.H.: Person authentication based on eye-closed and visual stimulation using EEG signals. Brain Inform. 8(1), 1\u201313 (2021)","DOI":"10.1186\/s40708-021-00142-4"},{"issue":"1","key":"47_CR64","doi-asserted-by":"publisher","first-page":"6","DOI":"10.3390\/s19010006","volume":"19","author":"Y Zeng","year":"2019","unstructured":"Zeng, Y., Qunjian, W., Yang, K., Tong, L., Yan, B., Shu, J., Yao, D.: EEG-based identity authentication framework using face rapid serial visual presentation with optimized channels. Sensors 19(1), 6 (2019)","journal-title":"Sensors"},{"key":"47_CR65","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.114961","volume":"177","author":"H Zhao","year":"2021","unstructured":"Zhao, H., Chen, Y., Pei, W., Chen, H., Wang, Y.: Towards online applications of EEG biometrics using visual evoked potentials. Expert Syst. Appl. 177, 114961 (2021)","journal-title":"Expert Syst. Appl."},{"issue":"12","key":"47_CR66","doi-asserted-by":"publisher","first-page":"3206","DOI":"10.1109\/TIFS.2019.2912272","volume":"14","author":"H Zhao","year":"2019","unstructured":"Zhao, H., Wang, Y., Liu, Z., Pei, W., Chen, H.: Individual identification based on code-modulated visual-evoked potentials. IEEE Trans. Inf. Forensics Secur. 14(12), 3206\u20133216 (2019)","journal-title":"IEEE Trans. Inf. Forensics Secur."}],"container-title":["Lecture Notes in Networks and Systems","Intelligent Systems and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-47724-9_47","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,16]],"date-time":"2024-11-16T16:03:18Z","timestamp":1731772998000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-47724-9_47"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031477232","9783031477249"],"references-count":66,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-47724-9_47","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"19 April 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}