2020
DOI: 10.1007/s00521-020-05247-1
|View full text |Cite
|
Sign up to set email alerts
|

SaS-BCI: a new strategy to predict image memorability and use mental imagery as a brain-based biometric authentication

Abstract: Security authentication is one of the most important levels of information security. Nowadays, human biometric techniques are the most secure methods for authentication purposes that cover the problems of older types of authentication like passwords and pins. There are many advantages of recent biometrics in terms of security; however, they still have some disadvantages. Progresses in technology made some specific devices, which make it possible to copy and make a fake human biometric because they are all visi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
1

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(16 citation statements)
references
References 38 publications
0
15
1
Order By: Relevance
“…It is observed and analyzed from previous research studies that high performance can be achieved from a well deployed and secure system [ 15 , 16 , 17 , 18 , 19 ], while with a more computational complex task(s) system a threshold is met due to more resources e.g., time consumption and longer delay. The authentication, balances between individual entities on one hand which on the other hand affects other parts of the system.…”
Section: Proposed Framework Of Cognitive Authentication Systemmentioning
confidence: 99%
See 2 more Smart Citations
“…It is observed and analyzed from previous research studies that high performance can be achieved from a well deployed and secure system [ 15 , 16 , 17 , 18 , 19 ], while with a more computational complex task(s) system a threshold is met due to more resources e.g., time consumption and longer delay. The authentication, balances between individual entities on one hand which on the other hand affects other parts of the system.…”
Section: Proposed Framework Of Cognitive Authentication Systemmentioning
confidence: 99%
“…A strong presence of security level is a prioritization. A simple and less probes-based EEG system takes less computational power and results in compromised security, that is why not a potential candidate [ 15 , 16 , 17 , 18 , 19 , 20 ]. Researchers [ 21 , 22 , 23 , 24 , 25 ], propose wet EEG electrodes for high signal accuracy, calibration and less noise, interference unlike the dry leads.…”
Section: Proposed Framework Of Cognitive Authentication Systemmentioning
confidence: 99%
See 1 more Smart Citation
“…Hybrid protocols consist of a mixture of one or more EEGbased User Authentication methos or a mixture of traditional User Authentication techniques with EEG-based ones, like: Resting -VEP [43], VEP -Image Imagery [74], VEPnumber imagery [41], and RSVP -Motor Imagery [23]. Combining traditional User Authentication techniques or simple activities with EEG-based ones includes the use of pattern passwords on smartphones with parallel EEG recording [40,103,105], EEG signal recording while driving [51], and simultaneous recording of EEG and Gait signals when the user walks [78].…”
Section: Hybrid Protocolsmentioning
confidence: 99%
“…On the one hand, when the information is incomplete, people have to bypass the knowledge gap to make judgments [ 55 ]. On the other hand, non-verbal information obtained through external clues from the food packaging is easier to identify and remember than verbal information [ 56 , 57 ]. Thus, consumers are more inclined to use psychological shortcuts to draw conclusions about products according to the external characteristics of packaging (e.g., size, color, etc.)…”
Section: Literature Review and Research Hypothesismentioning
confidence: 99%