{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T10:43:19Z","timestamp":1761648199882,"version":"3.40.4"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319079943"},{"type":"electronic","value":"9783319079950"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-07995-0_34","type":"book-chapter","created":{"date-parts":[[2014,6,10]],"date-time":"2014-06-10T23:24:31Z","timestamp":1402442671000},"page":"343-353","source":"Crossref","is-referenced-by-count":6,"title":["EEG-Based User Authentication Using Artifacts"],"prefix":"10.1007","author":[{"given":"Tien","family":"Pham","sequence":"first","affiliation":[]},{"given":"Wanli","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Dat","family":"Tran","sequence":"additional","affiliation":[]},{"given":"Phuoc","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Dinh","family":"Phung","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"34_CR1","doi-asserted-by":"crossref","unstructured":"Brigham, K., Kumar, B.V.K.V.: Subject Identification from Electroencephalogram (EEG) Signals During Imagined Speech. In: Proc. IEEE Fourth International Conference on Biometrics: Theory, Applications and Systems (BTAS 2010) (2010)","DOI":"10.1109\/BTAS.2010.5634515"},{"key":"34_CR2","unstructured":"Brown, L.: Computer Security: Principles and Practice. William Stallings (2008)"},{"key":"34_CR3","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1023\/A:1009715923555","volume":"2","author":"J. Burges","year":"1998","unstructured":"Burges, J.: A tutorial on support vector machines for pattern recognition. Data Mining and Knowledge Discovery\u00a02, 121\u2013167 (1998)","journal-title":"Data Mining and Knowledge Discovery"},{"issue":"3","key":"34_CR4","first-page":"27","volume":"2","author":"C. Chang","year":"2011","unstructured":"Chang, C., Lin, C.: LIBSVM: a library for support vector machines. ACM Transactions on Intelligent Systems and Technology (TIST)\u00a02(3), 27 (2011)","journal-title":"ACM Transactions on Intelligent Systems and Technology (TIST)"},{"issue":"1","key":"34_CR5","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/j.intcom.2009.11.007","volume":"22","author":"A. Dix","year":"2010","unstructured":"Dix, A.: Human\u2013computer interaction: A stable discipline, a nascent science, and the growth of the long tail. Interacting with Computers\u00a022(1), 13\u201327 (2010)","journal-title":"Interacting with Computers"},{"key":"34_CR6","unstructured":"Emotiv EPOC headset, http:\/\/www.emotiv.com\/"},{"key":"34_CR7","unstructured":"Experiment Wizard software tool, http:\/\/code.google.com\/p\/experiment-wizard\/"},{"issue":"1","key":"34_CR8","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1145\/1656274.1656278","volume":"11","author":"M. Hall","year":"2009","unstructured":"Hall, M., et al.: The WEKA data mining software: an update. ACM SIGKDD Explorations Newsletter\u00a011(1), 10\u201318 (2009)","journal-title":"ACM SIGKDD Explorations Newsletter"},{"key":"34_CR9","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1145\/572020.572055","volume-title":"Proceedings of the Second Nordic Conference on Human-Computer Interaction 2002","author":"S. Lenman","year":"2002","unstructured":"Lenman, S., Bretzner, L., Thuresson, B.: Using marking menus to develop command sets for computer vision based hand gesture interfaces. In: Proceedings of the Second Nordic Conference on Human-Computer Interaction 2002, pp. 239\u2013242. ACM, Aarhus (2002)"},{"key":"34_CR10","doi-asserted-by":"publisher","first-page":"743","DOI":"10.1109\/TPAMI.2007.1012","volume":"29","author":"S. Marcel","year":"2007","unstructured":"Marcel, S., Mill\u00e1n, J.R.: Person authentication using brainwaves (EEG) and maximum a posteriori model adaptation. IEEE Transactions on Pattern Analysis and Machine Intelligence\u00a029, 743\u2013752 (2007)","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"34_CR11","doi-asserted-by":"publisher","first-page":"1085","DOI":"10.1109\/TASL.2011.2172422","volume":"20","author":"S. Nakagawa","year":"2012","unstructured":"Nakagawa, S., Wang, L., Ohtsuka, S.: Speaker Identification and Verification by Combining MFCC and Phase Information. IEEE Transactions on Audio, Speech, and Language Processing\u00a020, 1085\u20131095 (2012)","journal-title":"IEEE Transactions on Audio, Speech, and Language Processing"},{"issue":"6","key":"34_CR12","doi-asserted-by":"publisher","first-page":"1278","DOI":"10.1016\/j.chb.2010.05.031","volume":"26","author":"H. Nina","year":"2010","unstructured":"Nina, H., et al.: Integrating cognitive load theory and concepts of human\u2013computer interaction. Computers in Human Behavior\u00a026(6), 1278\u20131288 (2010)","journal-title":"Computers in Human Behavior"},{"key":"34_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"430","DOI":"10.1007\/978-3-642-38682-4_46","volume-title":"Advances in Computational Intelligence","author":"P. Nguyen","year":"2013","unstructured":"Nguyen, P., Tran, D., Huang, X., Ma, W.: Motor Imagery EEG-Based Person Verification. In: Rojas, I., Joya, G., Cabestany, J. (eds.) IWANN 2013, Part II. LNCS, vol.\u00a07903, pp. 430\u2013438. Springer, Heidelberg (2013)"},{"key":"34_CR14","doi-asserted-by":"crossref","unstructured":"Palaniappan, R.: Two-stage biometric authentication method using thought activity brain waves. International Journal of Neural Systems\u00a018 (2008)","DOI":"10.1142\/S0129065708001373"},{"key":"34_CR15","doi-asserted-by":"crossref","unstructured":"Safont, G., Salazar, A., Soriano, A., Vergara, L.: Combination of multiple detectors for EEG based biometric identification\/authentication. In: 2012 IEEE International Carnahan Conference on Security Technology (ICCST), pp. 230\u2013236 (2012)","DOI":"10.1109\/CCST.2012.6393564"},{"key":"34_CR16","doi-asserted-by":"crossref","unstructured":"Sanei, S., Chambers, J.: EEG signal processing. Wiley-Interscience (2007)","DOI":"10.1002\/9780470511923"},{"key":"34_CR17","doi-asserted-by":"crossref","unstructured":"Sun, S.: Multitask learning for EEG-based biometrics. In: 19th International Conference on Pattern Recognition, ICPR 2008, pp. 1\u20134 (2008)","DOI":"10.1109\/ICPR.2008.4761865"},{"key":"34_CR18","doi-asserted-by":"crossref","unstructured":"Turk, M., Robertson, G.: Perceptual user interfaces. Communications of the ACM\u00a043(3) (2000)","DOI":"10.1145\/330534.330535"},{"key":"34_CR19","doi-asserted-by":"crossref","unstructured":"Welch, P.: The use of Fast Fourier Transform for the estimation of power spectra: a method based on time averaging over short, modified periodogram. IEEE Trans. Audio Electroacoustics, 70\u201373 (1967)","DOI":"10.1109\/TAU.1967.1161901"},{"key":"34_CR20","doi-asserted-by":"crossref","unstructured":"Zhao, W., Zhang, H.: Secure Fingerprint Recognition Based on Frobenius Norm. In: 2012 International Conference on Computer Science and Electronics Engineering, vol.\u00a01, pp. 388\u2013391 (2012)","DOI":"10.1109\/ICCSEE.2012.372"}],"container-title":["Advances in Intelligent Systems and Computing","International Joint Conference SOCO\u201914-CISIS\u201914-ICEUTE\u201914"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-07995-0_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T09:15:45Z","timestamp":1746263745000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-07995-0_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319079943","9783319079950"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-07995-0_34","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2014]]}}}