{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:28:25Z","timestamp":1750220905311,"version":"3.41.0"},"publisher-location":"New York, New York, USA","reference-count":26,"publisher":"ACM Press","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1145\/3368926.3369708","type":"proceedings-article","created":{"date-parts":[[2019,12,20]],"date-time":"2019-12-20T13:30:11Z","timestamp":1576848611000},"page":"242-247","source":"Crossref","is-referenced-by-count":1,"title":["Secure EEG-Based User Authentication System Integrated with Robust Watermarking"],"prefix":"10.1145","author":[{"given":"Pham Duy","family":"Trung","sequence":"first","affiliation":[{"name":"Academy of Cryptography Techniques, Hanoi, Vietnam"}]},{"given":"Nguyen Nhat","family":"Hai","sequence":"additional","affiliation":[{"name":"Hanoi University of Science and Technology, Hanoi, Vietnam"}]},{"given":"Nguyen Thi Hong","family":"Ha","sequence":"additional","affiliation":[{"name":"Academy of Cryptography Techniques, Hanoi, Vietnam"}]}],"member":"320","reference":[{"key":"key-10.1145\/3368926.3369708-1","unstructured":"Brendan Allison. 2011. Trends in BCI research: progress today, backlash tomorrow? XRDS: Crossroads, The ACM Magazine for Students 18, 1 (2011), 18--22."},{"key":"key-10.1145\/3368926.3369708-2","unstructured":"C Brunner, R Leeb, G M&#252;ller-Putz, A Schl&#246;gl, and G Pfurtscheller. 2008. BCI Competition 2008---Graz data set A. Institute for Knowledge Discovery (Laboratory of Brain-Computer Interfaces), Graz University of Technology (2008), 136--142."},{"key":"key-10.1145\/3368926.3369708-3","unstructured":"V Claus and S Ralf. 2001. Approaches to biometric watermarks for owner authentication. In Proceedings of SPIE, Vol. 43. 209--219."},{"key":"key-10.1145\/3368926.3369708-4","unstructured":"Jing Dong and Tieniu Tan. 2008. Effects of watermarking on iris recognition performance. In Control, Automation, Robotics and Vision, 2008. ICARCV 2008. 10th International Conference on. IEEE, 1156--1161."},{"key":"key-10.1145\/3368926.3369708-5","unstructured":"Jutta H&#228;mmerle-Uhl, Karl Raab, and Andreas Uhl. 2010. Experimental study on the impact of robust watermarking on iris recognition accuracy. In Proceedings of the 2010 ACM Symposium on Applied Computing. ACM, 1479--1484."},{"key":"key-10.1145\/3368926.3369708-6","unstructured":"Jutta H&#228;mmerle-Uhl, Karl Raab, and Andreas Uhl. 2011. Watermarking as a means to enhance biometric systems: A critical survey. In International Workshop on Information Hiding. Springer, 238--254."},{"key":"key-10.1145\/3368926.3369708-7","unstructured":"Frank Hartung and Martin Kutter. 1999. Multimedia watermarking techniques. Proc. IEEE 87, 7 (1999), 1079--1107."},{"key":"key-10.1145\/3368926.3369708-8","unstructured":"Chen He, Xudong Lv, and Z Jane Wang. 2009. Hashing the mAR coefficients from EEG data for person authentication. In Acoustics, Speech and Signal Processing, 2009. ICASSP 2009. IEEE International Conference on. IEEE, 1445--1448."},{"key":"key-10.1145\/3368926.3369708-9","unstructured":"Jian-feng Hu. 2010. Biometric System based on EEG Signals by feature combination. In Measuring Technology and Mechatronics Automation (ICMTMA), 2010 International Conference on, Vol. 1. IEEE, 752--755."},{"key":"key-10.1145\/3368926.3369708-10","unstructured":"Reinhard Huber, Herbert St&#246;gner, and Andreas Uhl. 2011. Two-factor biometric recognition with integrated tamper-protection watermarking. In IFIP International Conference on Communications and Multimedia Security. Springer, 72--84."},{"key":"key-10.1145\/3368926.3369708-11","unstructured":"Md Rajibul Islam, Md Shohel Sayeed, and Andrews Samraj. 2008. Biometric template protection using watermarking with hidden password encryption. In Information Technology, 2008. ITSim 2008. International Symposium on, Vol. 1. IEEE, 1--8."},{"key":"key-10.1145\/3368926.3369708-12","unstructured":"Anil K Jain and Umut Uludag. 2003. Hiding biometric data. IEEE transactions on pattern analysis and machine intelligence 25, 11 (2003), 1494--1498."},{"key":"key-10.1145\/3368926.3369708-13","unstructured":"Anil K Jain, Umut Uludag, and Rein-Lien Hsu. 2002. Hiding a face in a fingerprint image. In Pattern Recognition, 2002. Proceedings. 16th International Conference on, Vol. 3. IEEE, 756--759."},{"key":"key-10.1145\/3368926.3369708-14","unstructured":"Andreas Lang and Jana Dittmann. 2007. Digital watermarking of biometric speech references: impact to the eer system performance. In Electronic Imaging 2007. International Society for Optics and Photonics, 650513--650513."},{"key":"key-10.1145\/3368926.3369708-15","unstructured":"R Leeb, C Brunner, GR M&#252;ller-Putz, A Schl&#246;gl, and G Pfurtscheller. 2008. BCI Competition 2008--Graz data set B. Graz University of Technology, Austria (2008)."},{"key":"key-10.1145\/3368926.3369708-16","doi-asserted-by":"crossref","unstructured":"Sebastien Marcel and Jos&#233; del R Mill&#225;n. 2007. Person authentication using brainwaves (EEG) and maximum a posteriori model adaptation. IEEE transactions on pattern analysis and machine intelligence 29, 4 (2007).","DOI":"10.1109\/TPAMI.2007.1012"},{"key":"key-10.1145\/3368926.3369708-17","unstructured":"Daesung Moon, Taehae Kim, SeungHwan Jung, Yongwha Chung, Kiyoung Moon, Dosung Ahn, and Sang-Kyoon Kim. 2005. Performance evaluation of watermarking techniques for secure multimodal biometric systems. Computational Intelligence and Security (2005), 635--642."},{"key":"key-10.1145\/3368926.3369708-18","unstructured":"Isao Nakanishi, Sadanao Baba, and Chisei Miyamoto. 2009. EEG based biometric authentication using new spectral features. In Intelligent Signal Processing and Communication Systems, 2009. ISPACS 2009. International Symposium on. IEEE, 651--654."},{"key":"key-10.1145\/3368926.3369708-19","unstructured":"Mohammad Ali Nematollahi and SAR Al-Haddad. 2016. Distant speaker recognition: an overview. International Journal of Humanoid Robotics 13, 02 (2016), 1550032."},{"key":"key-10.1145\/3368926.3369708-20","unstructured":"Phuoc Nguyen, Dat Tran, Trung Le, Tuan Hoang, and Dharmendra Sharma. 2012. Multi-sphere support vector data description for brain-computer interface. In Communications and Electronics (ICCE), 2012 Fourth International Conference on. IEEE, 318--321."},{"key":"key-10.1145\/3368926.3369708-21","unstructured":"Phuoc Nguyen, Dat Tran, Trung Le, Xu Huang, and Wanli Ma. 2013. EEG-based person verification using multi-sphere SVDD and UBM. In Pacific-Asia Conference on Knowledge Discovery and Data Mining. Springer, 289--300."},{"key":"key-10.1145\/3368926.3369708-22","unstructured":"RB Paranjape, J Mahovsky, L Benedicenti, and Z Koles. 2001. The electroencephalogram as a biometric. In Electrical and Computer Engineering, 2001. Canadian Conference on, Vol. 2. IEEE, 1363--1366."},{"key":"key-10.1145\/3368926.3369708-23","unstructured":"Tien Pham, Wanli Ma, Dat Tran, Phuoc Nguyen, and Dinh Phung. 2014. Multi-factor EEG-based user authentication. In Neural Networks (IJCNN), 2014 International Joint Conference on. IEEE, 4029--4034."},{"key":"key-10.1145\/3368926.3369708-24","unstructured":"Trung Duy Pham, Dat Tran, and Wanli Ma. 2015. A Proposed Blind DWT-SVD Watermarking Scheme for EEG Data. In International Conference on Neural Information Processing. Springer, 69--76."},{"key":"key-10.1145\/3368926.3369708-25","unstructured":"Takami Satonaka. 2002. Biometric watermark authentication with multiple verification rule. In Neural Networks for Signal Processing, 2002. Proceedings of the 2002 12th IEEE Workshop on. IEEE, 597--606."},{"key":"key-10.1145\/3368926.3369708-26","unstructured":"William Stallings. 2006. Cryptography and network security: principles and practices. Pearson Education India."}],"event":{"number":"10","sponsor":["SOICT, School of Information and Communication Technology - HUST","NAFOSTED, The National Foundation for Science and Technology Development"],"acronym":"SoICT 2019","name":"the Tenth International Symposium","start":{"date-parts":[[2019,12,4]]},"location":"Hanoi, Ha Long Bay, Viet Nam","end":{"date-parts":[[2019,12,6]]}},"container-title":["Proceedings of the Tenth International Symposium on Information and Communication Technology  - SoICT 2019"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368926.3369708","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/dl.acm.org\/ft_gateway.cfm?id=3369708&ftid=2101258&dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:51Z","timestamp":1750203891000},"score":1,"resource":{"primary":{"URL":"http:\/\/dl.acm.org\/citation.cfm?doid=3368926.3369708"}},"subtitle":[],"proceedings-subject":"Information and Communication Technology","short-title":[],"issued":{"date-parts":[[2019]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1145\/3368926.3369708","relation":{},"subject":[],"published":{"date-parts":[[2019]]}}}