{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T04:06:26Z","timestamp":1748577986363,"version":"3.41.0"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319203751"},{"type":"electronic","value":"9783319203768"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-20376-8_1","type":"book-chapter","created":{"date-parts":[[2015,7,20]],"date-time":"2015-07-20T06:00:17Z","timestamp":1437372017000},"page":"3-12","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Single Trial Authentication with Mental Password Writing"],"prefix":"10.1007","author":[{"given":"Sarah N.","family":"Abdulkader","sequence":"first","affiliation":[]},{"given":"Ayman","family":"Atia","sequence":"additional","affiliation":[]},{"given":"Mostafa-Sami M.","family":"Mostafa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,21]]},"reference":[{"key":"1_CR1","unstructured":"Shanmugapriya, D., Padmavathi, G.: A survey of biometric keystroke dynamics: approaches, security and challenges. arXiv preprint arXiv:0910.0817 (2009)"},{"key":"1_CR2","series-title":"The International Library of Ethics, Law and Technology","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/978-94-007-3892-8_7","volume-title":"Second Generation Biometrics: The Ethical, Legal and Social Context","author":"A Riera","year":"2012","unstructured":"Riera, A., Dunne, S., Cester, I., Ruffini, G.: Electrophysiological biometrics: opportunities and risks. In: Mordini, E., Tzovaras, D. (eds.) Second Generation Biometrics: The Ethical, Legal and Social Context. The International Library of Ethics, Law and Technology, pp. 149\u2013176. Springer, Netherlands (2012)"},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"Su, F., Zhou, H., Feng, Z., Ma, J.: A biometric-based covert warning system using EEG. In: 2012 5th IAPR International Conference on Biometrics (ICB), pp. 342\u2013347. IEEE (2012)","DOI":"10.1109\/ICB.2012.6199830"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Yeom, S.-K., Suk, H.-I., Lee, S.-W.: Eeg-based person authentication using face stimuli. In: 2013 International Winter Workshop on Brain-Computer Interface (BCI), pp. 58\u201361. IEEE (2013)","DOI":"10.1109\/IWW-BCI.2013.6506630"},{"key":"1_CR5","doi-asserted-by":"publisher","first-page":"1159","DOI":"10.1016\/j.patcog.2012.10.023","volume":"46","author":"S-K Yeom","year":"2013","unstructured":"Yeom, S.-K., Suk, H.-I., Lee, S.-W.: Person authentication from neural activity of face-specific visual self-representation. Pattern Recogn. 46, 1159\u20131169 (2013)","journal-title":"Pattern Recogn."},{"key":"1_CR6","unstructured":"Ravi, K., Palaniappan, R.: Leave-one-out authentication of persons using 40\u00a0Hz EEG oscillations. In: The International Conference on Computer as a Tool, 2005. EUROCON 2005, pp. 1386\u20131389. IEEE (2005)"},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"Z\u00faquete, A., Quintela, B., Cunha, J.P.S.: Biometric authentication using brain responses to visual stimuli. In: Proceedings of the International Conference on Bio-inspired Systems and Signal Processing, pp. 103\u2013112 (2010)","DOI":"10.5220\/0002750101030112"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Ashby, C., Bhatia, A., Tenore, F., Vogelstein, J.: Low-cost electroencephalogram (EEG) based authentication. In: 2011 5th International IEEE\/EMBS Conference on Neural Engineering (NER), pp. 442\u2013445. IEEE (2011)","DOI":"10.1109\/NER.2011.5910581"},{"key":"1_CR9","unstructured":"Hema, C.R., Paulraj, M., Kaur, H.: Brain signatures: a modality for biometric authentication. In: International Conference on Electronic Design, 2008. ICED 2008, pp. 1\u20134. IEEE (2008)"},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Hema, C., Osman, A.A.: Single trial analysis on EEG signatures to identify individuals. In: 2010 6th International Colloquium on Signal Processing and Its Applications (CSPA), pp. 1\u20133. IEEE (2010)","DOI":"10.1109\/CSPA.2010.5545313"},{"key":"1_CR11","doi-asserted-by":"publisher","first-page":"743","DOI":"10.1109\/TPAMI.2007.1012","volume":"29","author":"S Marcel","year":"2007","unstructured":"Marcel, S., del Mill\u00e1n, J.R.: Person authentication using brainwaves (EEG) and maximum a posteriori model adaptation. IEEE Trans. Pattern Anal. Mach. Intell. 29, 743\u2013752 (2007)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"1_CR12","unstructured":"Svogor, I., Kisasondi, T.: Two factor authentication using EEG augmented passwords. In: Proceedings of the ITI 2012 34th International Conference on Information Technology Interfaces (ITI), pp. 373\u2013378. IEEE (2012)"},{"key":"1_CR13","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-60566-725-6","volume-title":"Behavioral Biometrics for Human Identification: Intelligent Applications","author":"L Wang","year":"2010","unstructured":"Wang, L., Geng, X., Global, I.: Behavioral Biometrics for Human Identification: Intelligent Applications. Medical Information Science Reference, New York (2010)"},{"key":"1_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-41320-9_1","volume-title":"Financial Cryptography and Data Security","author":"J Chuang","year":"2013","unstructured":"Chuang, J., Nguyen, H., Wang, C., Johnson, B.: I think, therefore i am: usability and security of authentication using brainwaves. In: Adams, A.A., Brenner, M., Smith, M. (eds.) FC 2013. LNCS, vol. 7862, pp. 1\u201316. Springer, Heidelberg (2013)"},{"key":"1_CR15","volume-title":"Independent Component Analysis","author":"A Hyv\u00e4rinen","year":"2004","unstructured":"Hyv\u00e4rinen, A., Karhunen, J., Oja, E.: Independent Component Analysis. Wiley, New York (2004)"},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"Stone, J.V.: Independent Component Analysis. Wiley Online Library (2004)","DOI":"10.7551\/mitpress\/3717.001.0001"},{"key":"1_CR17","volume-title":"Towards Practical Brain-Computer Interfaces: Bridging the Gap from Research to Real-World Applications","author":"BZ Allison","year":"2012","unstructured":"Allison, B.Z., Dunne, S., Leeb, R.: Towards Practical Brain-Computer Interfaces: Bridging the Gap from Research to Real-World Applications. Springer, Heidelberg (2012)"},{"key":"1_CR18","doi-asserted-by":"publisher","first-page":"876","DOI":"10.1016\/j.neuroimage.2013.09.055","volume":"84","author":"L Hu","year":"2014","unstructured":"Hu, L., Xiao, P., Zhang, Z., Mouraux, A., Iannetti, G.: Single-trial time\u2013frequency analysis of electrocortical signals: baseline correction and beyond. NeuroImage. 84, 876\u2013887 (2014)","journal-title":"NeuroImage."},{"key":"1_CR19","unstructured":"He, C., Lv, X., Wang, Z.J.: Hashing the mAR coefficients from EEG data for person authentication. In: IEEE International Conference on Acoustics, Speech and Signal Processing, 2009. ICASSP 2009, pp. 1445\u20131448. IEEE (2009)"},{"key":"1_CR20","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1016\/S0079-6123(06)59009-0","volume":"159","author":"A Schl\u00f6gl","year":"2006","unstructured":"Schl\u00f6gl, A., Supp, G.: Analyzing event-related EEG data with multivariate autoregressive parameters. Prog. Brain Res. 159, 135\u2013147 (2006)","journal-title":"Prog. Brain Res."},{"key":"1_CR21","volume-title":"Digital Spectral Analysis: with Applications","author":"SL Marple","year":"1987","unstructured":"Marple, S.L.: Digital Spectral Analysis: with Applications. Prentice-Hall, Englewood Cliffs (1987)"},{"key":"1_CR22","doi-asserted-by":"crossref","unstructured":"Jian-feng, H.: Comparison of different classifiers for biometric system based on EEG signals. In: 2010 Second International Conference on Information Technology and Computer Science (ITCS), pp. 288\u2013291. IEEE (2010)","DOI":"10.1109\/ITCS.2010.77"},{"key":"1_CR23","unstructured":"[Last Visit: 2014.07.08]. http:\/\/www.emotiv.com"},{"key":"1_CR24","unstructured":"Monroe, D.: Biometrics Metrics Report v3.0. http:\/\/www.usma.edu\/ietd\/docs\/BiometricsMetricsReport.pdf"}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy, and Trust"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-20376-8_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,29]],"date-time":"2025-05-29T12:22:17Z","timestamp":1748521337000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-20376-8_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319203751","9783319203768"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-20376-8_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"21 July 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}