910 research outputs found

    Driver authentication using brain waves while route tracing as a mental task

    Get PDF
    From the viewpoint of user management, continuous or on-demand biometric authentication is effective for achieving higher security. In such a case, the biometrics which is able to present biometric data unconsciously is needed and we have proposed to use the brain wave as the unconscious biometrics. In this paper, assuming driver authentication, we measure brain waves of drivers when they are tracing routes as a mental task. And we evaluate verification performance using the difference between the mean power spectrum at α-β band in relaxed condition and that in mental-tasked condition as an individual feature. As a result, the EER of 31 % is obtained among 12 subjects

    Using BrainWaves as Transparent Biometrics for On-Demand Driver Authentication

    Get PDF
    Conventional biometric systems mainly assume one-timeonly authentication. However, this technique is not used with user management applications. If a user is replaced by an imposter after the authentication has occurred, the systems cannot detect such a replacement. One solution to this problem is on-demand-authentication, in which users are authenticated on a regular or nonregular schedule, as determined by the system. However, the on-demand-authentication technique requires that we present biometric data without regard to do so. In this paper, we focus on the use of brain waves as transparent biometric signals. In particular, we assume driver authentication and measure the brain waves of drivers when they are performing mental tasks such as tracing routes or using a simplified driving simulator as an actual task. We propose to extract the power spectrum in the α–β band as an individual feature and propose two verification methods based on the similarity of the features. In addition, we propose to divide the α–β band into either four or six partitions and to fuse the similarity scores from all the partitions. We evaluate the verification performance using 23 subjects and obtain an equal error rate of 20-25 %

    Unconscious Biometrics for Continuous User Verification

    Get PDF
    In user management system, continuous or successive (ondemand) authentication is required to prevent identity theft. In particular, biometrics of which data are unconsciously presented to authentication systems is necessary. In this paper, brain waves and intra-palm propagation signals are introduced as biometrics and their verification performances using actually measured data are presented

    Evaluation of the Brain Wave as Biometrics in a Simulated Driving Environment

    Get PDF
    In the case of user management, continuous or on-demand biometric authentication is effective for achieving higher security with a light system load. However, it requires us to present biometric data unconsciously. In this paper, we focus attention on the brain wave as unconscious biometrics. In particular, assuming driver authentication, we measure the brain waves of drivers when they are using a simplified driving simulator. We evaluate verification performance using 23 subjects and obtain the EER of about 20 %

    Evaluation of BrainWaves as Biometrics for Driver Authentication Using Simplified Driving Simulator

    Get PDF
    The brain wave is able to present biometric data unconsciously, so that it enables continuous or on-demand authentication which is effective in user management. In this paper, assuming an application to driver authentication, we evaluate verification performance of the brain wave using a simplified driving simulator. In addition, dividing the α-β band to several partitions, we propose to extract the difference between a mean value of the power spectrum at each partition in relaxed condition and that in mental-tasked condition as an individual feature. Fusing the differences from higher partitions in verification, the EER of 24% is obtained among 10 subjects

    Integrating passive ubiquitous surfaces into human-computer interaction

    Get PDF
    Mobile technologies enable people to interact with computers ubiquitously. This dissertation investigates how ordinary, ubiquitous surfaces can be integrated into human-computer interaction to extend the interaction space beyond the edge of the display. It turns out that acoustic and tactile features generated during an interaction can be combined to identify input events, the user, and the surface. In addition, it is shown that a heterogeneous distribution of different surfaces is particularly suitable for realizing versatile interaction modalities. However, privacy concerns must be considered when selecting sensors, and context can be crucial in determining whether and what interaction to perform.Mobile Technologien ermöglichen den Menschen eine allgegenwärtige Interaktion mit Computern. Diese Dissertation untersucht, wie gewöhnliche, allgegenwärtige Oberflächen in die Mensch-Computer-Interaktion integriert werden können, um den Interaktionsraum über den Rand des Displays hinaus zu erweitern. Es stellt sich heraus, dass akustische und taktile Merkmale, die während einer Interaktion erzeugt werden, kombiniert werden können, um Eingabeereignisse, den Benutzer und die Oberfläche zu identifizieren. Darüber hinaus wird gezeigt, dass eine heterogene Verteilung verschiedener Oberflächen besonders geeignet ist, um vielfältige Interaktionsmodalitäten zu realisieren. Bei der Auswahl der Sensoren müssen jedoch Datenschutzaspekte berücksichtigt werden, und der Kontext kann entscheidend dafür sein, ob und welche Interaktion durchgeführt werden soll

    Digital Transformation

    Get PDF
    The amount of literature on Digital Transformation is staggering—and it keeps growing. Why, then, come out with yet another such document? Moreover, any text aiming at explaining the Digital Transformation by presenting a snapshot is going to become obsolete in a blink of an eye, most likely to be already obsolete at the time it is first published. The FDC Initiative on Digital Reality felt there is a need to look at the Digital Transformation from the point of view of a profound change that is pervading the entire society—a change made possible by technology and that keeps changing due to technology evolution opening new possibilities but is also a change happening because it has strong economic reasons. The direction of this change is not easy to predict because it is steered by a cultural evolution of society, an evolution that is happening in niches and that may expand rapidly to larger constituencies and as rapidly may fade away. This creation, selection by experimentation, adoption, and sudden disappearance, is what makes the whole scenario so unpredictable and continuously changing.The amount of literature on Digital Transformation is staggering—and it keeps growing. Why, then, come out with yet another such document? Moreover, any text aiming at explaining the Digital Transformation by presenting a snapshot is going to become obsolete in a blink of an eye, most likely to be already obsolete at the time it is first published. The FDC Initiative on Digital Reality felt there is a need to look at the Digital Transformation from the point of view of a profound change that is pervading the entire society—a change made possible by technology and that keeps changing due to technology evolution opening new possibilities but is also a change happening because it has strong economic reasons. The direction of this change is not easy to predict because it is steered by a cultural evolution of society, an evolution that is happening in niches and that may expand rapidly to larger constituencies and as rapidly may fade away. This creation, selection by experimentation, adoption, and sudden disappearance, is what makes the whole scenario so unpredictable and continuously changing

    Mobile Ad-Hoc Networks

    Get PDF
    Being infrastructure-less and without central administration control, wireless ad-hoc networking is playing a more and more important role in extending the coverage of traditional wireless infrastructure (cellular networks, wireless LAN, etc). This book includes state-of the-art techniques and solutions for wireless ad-hoc networks. It focuses on the following topics in ad-hoc networks: vehicular ad-hoc networks, security and caching, TCP in ad-hoc networks and emerging applications. It is targeted to provide network engineers and researchers with design guidelines for large scale wireless ad hoc networks

    Design a CPW antenna on rubber substrate for multiband applications

    Get PDF
    This paper presents a compact CPW monopole antenna on rubber substrate for multiband applications. The multi band applications (2.45 and 3.65 GHz) is achieved on this antenna design with better antenna performances. Specially this antenna focused on ISM band application meanwhile some of slots (S1, S2, S3) have been used and attained another frequency band at 3.65 GHz for WiMAX application. The achievement of the antenna outcomes from this design that the bandwidth of 520 MHz for first band, the second band was 76 MHz for WiMAX application and the radiation efficiency attained around 90%. Moreover, the realized gain was at 4.27 dBi which overcome the most of existing design on that field. CST microwave studio has been used for antenna simulation
    corecore