{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T05:39:36Z","timestamp":1743053976349,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030804718"},{"type":"electronic","value":"9783030804725"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-80472-5_31","type":"book-chapter","created":{"date-parts":[[2021,7,20]],"date-time":"2021-07-20T20:02:54Z","timestamp":1626811374000},"page":"374-388","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Authentication System by Human Brainwaves Using Machine Learning and Artificial Intelligence"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6140-3351","authenticated-orcid":false,"given":"Z. B.","family":"Hu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4055-1494","authenticated-orcid":false,"given":"V.","family":"Buriachok","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8875-3362","authenticated-orcid":false,"given":"M.","family":"TajDini","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9349-7946","authenticated-orcid":false,"given":"V.","family":"Sokolov","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,21]]},"reference":[{"issue":"4","key":"31_CR1","doi-asserted-by":"publisher","first-page":"760","DOI":"10.1587\/transcom.2018sep0016","volume":"102","author":"E-S Haukipuro","year":"2019","unstructured":"Haukipuro, E.-S., et al.: Mobile brainwaves: on the interchangeability of simple authentication tasks with low-cost, single-electrode EEG devices. IEICE Trans. Commun. 102(4), 760\u2013767 (2019). https:\/\/doi.org\/10.1587\/transcom.2018sep0016","journal-title":"IEICE Trans. Commun."},{"issue":"7","key":"31_CR2","doi-asserted-by":"publisher","first-page":"1664","DOI":"10.3390\/s19071664","volume":"19","author":"H Huang","year":"2019","unstructured":"Huang, H., et al.: An EEG-based identity authentication system with audiovisual paradigm in IoT. Sens. 19(7), 1664 (2019). https:\/\/doi.org\/10.3390\/s19071664","journal-title":"Sens."},{"issue":"4","key":"31_CR3","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1504\/ijbm.2020.10032523","volume":"12","author":"SJ Alsunaidi","year":"2020","unstructured":"Alsunaidi, S.J., Alissa, K.A., Saqib, N.A.: A comparison of human brainwaves-based biometric authentication systems. Intern. J. Biom. 12(4), 411 (2020). https:\/\/doi.org\/10.1504\/ijbm.2020.10032523","journal-title":"Intern. J. Biom."},{"issue":"1","key":"31_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1504\/ijaip.2017.081177","volume":"9","author":"V Tulceanu","year":"2017","unstructured":"Tulceanu, V.: Brainwave authentication using emotional patterns. Intern. J. Adv. Intell. Paradig. 9(1), 1 (2017). https:\/\/doi.org\/10.1504\/ijaip.2017.081177","journal-title":"Intern. J. Adv. Intell. Paradig."},{"issue":"12","key":"31_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/electronics9122092","volume":"9","author":"M TajDini","year":"2020","unstructured":"TajDini, M., et al.: Wireless sensors for brain activity\u2014a survey. Electron. 9(12), 1\u201326 (2020). https:\/\/doi.org\/10.3390\/electronics9122092","journal-title":"Electron."},{"key":"31_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-41320-9_1","volume-title":"Financial Cryptography and Data Security","author":"J Chuang","year":"2013","unstructured":"Chuang, J., Nguyen, H., Wang, C., Johnson, B.: I Think, Therefore I Am: Usability and Security of Authentication Using Brainwaves. In: Adams, A.A., Brenner, M., Smith, M. (eds.) FC 2013. LNCS, vol. 7862, pp. 1\u201316. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-41320-9_1"},{"key":"31_CR7","doi-asserted-by":"publisher","unstructured":"Ashby, C., et al.: Low-cost electroencephalogram (EEG) based authentication. IEEE\/EMBS Conference on Neural Engineering: 442\u2013445 (2011). https:\/\/doi.org\/10.1109\/ner.2011.5910581","DOI":"10.1109\/ner.2011.5910581"},{"key":"31_CR8","doi-asserted-by":"publisher","unstructured":"Hu, B., et al.: A pervasive EEG-based biometric system. Int. Workshop Ubiquit. Affect. Awareness Intell. Interac. 17\u201324 (2011). https:\/\/doi.org\/10.1145\/2030092.2030097","DOI":"10.1145\/2030092.2030097"},{"key":"31_CR9","doi-asserted-by":"publisher","DOI":"10.1109\/iecbes.2016.7843426","author":"S-H Liew","year":"2016","unstructured":"Liew, S.-H., et al.: Incrementing FRNN model with simple heuristic update for brainwaves person authentication. IEEE EMBS Conf. Biomed. Eng. Sci. (2016). https:\/\/doi.org\/10.1109\/iecbes.2016.7843426","journal-title":"IEEE EMBS Conf. Biomed. Eng. Sci."},{"key":"31_CR10","doi-asserted-by":"publisher","unstructured":"Blondet, M.V.R., Laszlo, S., Jin, Z.: Assessment of permanence of non-volitional EEG brainwaves as a biometric. IEEE Int. Conf. Identity, Secur. Behav. Anal. 1\u20136 (2015). https:\/\/doi.org\/10.1109\/isba.2015.7126359","DOI":"10.1109\/isba.2015.7126359"},{"key":"31_CR11","doi-asserted-by":"publisher","unstructured":"Johnson, B., Maillart, T., Chuang, J.: My thoughts are not your thoughts. ACM Int. Jt. Conf. Pervasive Ubiquit. Comput.: Adjunct Publ. (2014). https:\/\/doi.org\/10.1145\/2638728.2641710","DOI":"10.1145\/2638728.2641710"},{"issue":"5","key":"31_CR12","doi-asserted-by":"publisher","first-page":"28","DOI":"10.5815\/ijisa.2020.05.03","volume":"12","author":"S Hagras","year":"2020","unstructured":"Hagras, S., Mostafa, R.R., Abou Elfetouh, A.: A biometric system based on single-channel EEG recording in one-second. Int. J. Intell. Syst. Appl. 12(5), 28\u201340 (2020). https:\/\/doi.org\/10.5815\/ijisa.2020.05.03","journal-title":"Int. J. Intell. Syst. Appl."},{"issue":"5","key":"31_CR13","doi-asserted-by":"publisher","first-page":"33","DOI":"10.5815\/ijisa.2018.05.04","volume":"10","author":"HAR Akkar","year":"2018","unstructured":"Akkar, H.A.R., Jasim, F.B.A.: Intelligent training algorithm for artificial neural network EEG classifications. Int. J. Intell. Syst. Appl. 10(5), 33\u201341 (2018). https:\/\/doi.org\/10.5815\/ijisa.2018.05.04","journal-title":"Int. J. Intell. Syst. Appl."},{"issue":"12","key":"31_CR14","doi-asserted-by":"publisher","first-page":"19","DOI":"10.5815\/ijitcs.2016.12.03","volume":"8","author":"M Sreeshakthy","year":"2016","unstructured":"Sreeshakthy, M., Preethi, J., Dhilipan, A.: A survey on emotion classification from EEG signal using various techniques and performance analysis. Int. J. Inf. Technol. Comput. Sci. 8(12), 19\u201326 (2016). https:\/\/doi.org\/10.5815\/ijitcs.2016.12.03","journal-title":"Int. J. Inf. Technol. Comput. Sci."},{"issue":"1","key":"31_CR15","doi-asserted-by":"publisher","first-page":"59","DOI":"10.5815\/ijieeb.2013.01.07","volume":"5","author":"A Goshvarpour","year":"2013","unstructured":"Goshvarpour, A., Ebrahimnezhad, H., Goshvarpour, A.: Classification of epileptic EEG signals using time-delay neural networks and probabilistic neural networks. Int. J. Inf. Eng. Electron. Bus. 5(1), 59\u201367 (2013). https:\/\/doi.org\/10.5815\/ijieeb.2013.01.07","journal-title":"Int. J. Inf. Eng. Electron. Bus."},{"key":"31_CR16","doi-asserted-by":"publisher","unstructured":"Azizi, M.S.A.M, et al.: Authentication with brainwaves: a review on the application of EEG as an authentication method. In: 2018 Fourth International Conference on Advances in Computing, Communication and Automation (2018). https:\/\/doi.org\/10.1109\/icaccaf.2018.8776850","DOI":"10.1109\/icaccaf.2018.8776850"},{"issue":"4","key":"31_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3393619","volume":"11","author":"X Zhang","year":"2020","unstructured":"Zhang, X., Yao, L., Huang, C., Tao, G., Yang, Z., Liu, Y.: DeepKey: a multimodal biometric authentication system via deep decoding gaits and brainwaves. ACM Trans. Intell. Syst. Technol. 11(4), 1\u201324 (2020). https:\/\/doi.org\/10.1145\/3393619","journal-title":"ACM Trans. Intell. Syst. Technol."},{"key":"31_CR18","doi-asserted-by":"publisher","unstructured":"Jenkins, J., et al.: Authentication, privacy, security can exploit brainwave by biomarker. Independent Compon. Anal. Compressive Sampling, Wavelets, Neural Net, Biosyst. Nanoeng. XII (2014). https:\/\/doi.org\/10.1117\/12.2051323","DOI":"10.1117\/12.2051323"},{"key":"31_CR19","doi-asserted-by":"publisher","unstructured":"Seha, S.N.A., Hatzinakos, D.: EEG-based human recognition using steady-state AEPs and subject-unique spatial filters. IEEE Trans. Inf. Forensics Secur. 1\u20131 (2020). https:\/\/doi.org\/10.1109\/tifs.2020.3001729","DOI":"10.1109\/tifs.2020.3001729"},{"key":"31_CR20","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1016\/j.compeleceng.2017.05.001","volume":"65","author":"W Liang","year":"2018","unstructured":"Liang, W., et al.: SIRSE: a secure identity recognition scheme based on electroencephalogram data with multi-factor feature. Comput. Electr. Eng. 65, 310\u2013321 (2018). https:\/\/doi.org\/10.1016\/j.compeleceng.2017.05.001","journal-title":"Comput. Electr. Eng."},{"key":"31_CR21","doi-asserted-by":"publisher","unstructured":"Gray, S.N.: An overview of the use of neurofeedback biofeedback for the treatment of symptoms of traumatic brain injury in military and civilian populations. Med. Acupunct. 29(4), 215\u2013219 (2017). https:\/\/doi.org\/10.1089\/acu.2017.1220","DOI":"10.1089\/acu.2017.1220"},{"key":"31_CR22","unstructured":"Sjamsudin, F.P., Suganuma, M., Kameyama, W.: A-18\u20133 experimental results on EEG-based person identification with machine learning (2016)"},{"key":"31_CR23","doi-asserted-by":"publisher","unstructured":"Tangkraingkij, P., Montaphan, A., Nakavisute, I.: An appropriate number of neurons in a hidden layer for personal authentication using delta brainwave signals. In: 2nd International Conference on Control and Robotics Engineering (2017). https:\/\/doi.org\/10.1109\/iccre.2017.7935076","DOI":"10.1109\/iccre.2017.7935076"},{"key":"31_CR24","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.robot.2014.11.015","volume":"65","author":"P Kumari","year":"2015","unstructured":"Kumari, P., Vaish, A.: Brainwave based user identification system: a pilot study in robotics environment. Robot. Auton. Syst. 65, 15\u201323 (2015). https:\/\/doi.org\/10.1016\/j.robot.2014.11.015","journal-title":"Robot. Auton. Syst."}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances in Computer Science for Engineering and Education IV"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-80472-5_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,20]],"date-time":"2021-07-20T20:22:04Z","timestamp":1626812524000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-80472-5_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030804718","9783030804725"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-80472-5_31","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"21 July 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCSEEA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computer Science, Engineering and Education Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kiev","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ukraine","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 January 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 January 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccseea2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icics.net\/conf\/2021\/ICCSEEA2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}