DC FieldValueLanguage
dc.contributor.authorGondesen, Florian-
dc.contributor.authorMarx, Matthias-
dc.contributor.authorGollmann, Dieter-
dc.date.accessioned2020-02-05T16:00:33Z-
dc.date.available2020-02-05T16:00:33Z-
dc.date.issued2018-10-24-
dc.identifier.citationBiometric-Based Physical and Cybersecurity Systems: 287-318 (2018-10-24)de_DE
dc.identifier.isbn978-331998734-7de_DE
dc.identifier.urihttp://hdl.handle.net/11420/4765-
dc.description.abstractWe analyze the current state of research on EEG-based biometrics, giving an overview of the equipment available, together with practical guidance on the design of EEG-based authentication systems, of the authentication paradigms proposed, and of the empirical evaluations reported in the research literature. We conclude that EEG-based biometrics is still far from becoming a practical proposition. In particular, the time it takes to perform EEG-based user authentication is far above the time for competing biometric authentication schemes, and the number of subjects used in empirical evaluations tends to be too small to generalize results to larger populations.en
dc.language.isoende_DE
dc.titleEEG-based biometricsde_DE
dc.typeinBookde_DE
dc.type.dinibookPart-
dcterms.DCMITypeText-
tuhh.abstract.englishWe analyze the current state of research on EEG-based biometrics, giving an overview of the equipment available, together with practical guidance on the design of EEG-based authentication systems, of the authentication paradigms proposed, and of the empirical evaluations reported in the research literature. We conclude that EEG-based biometrics is still far from becoming a practical proposition. In particular, the time it takes to perform EEG-based user authentication is far above the time for competing biometric authentication schemes, and the number of subjects used in empirical evaluations tends to be too small to generalize results to larger populations.de_DE
tuhh.publisher.doi10.1007/978-3-319-98734-7_11-
tuhh.publication.instituteSicherheit in verteilten Anwendungen E-15de_DE
tuhh.type.opusInBuch (Kapitel / Teil einer Monographie)-
dc.type.driverbookPart-
dc.type.casraiBook Chapter-
tuhh.container.startpage287de_DE
tuhh.container.endpage318de_DE
item.grantfulltextnone-
item.openairetypeinBook-
item.fulltextNo Fulltext-
item.languageiso639-1en-
item.creatorOrcidGondesen, Florian-
item.creatorOrcidMarx, Matthias-
item.creatorOrcidGollmann, Dieter-
item.cerifentitytypePublications-
item.creatorGNDGondesen, Florian-
item.creatorGNDMarx, Matthias-
item.creatorGNDGollmann, Dieter-
item.openairecristypehttp://purl.org/coar/resource_type/c_3248-
crisitem.author.deptSicherheit in verteilten Anwendungen E-15-
crisitem.author.deptSicherheit in verteilten Anwendungen E-15-
crisitem.author.orcid0000-0001-6174-8854-
crisitem.author.parentorgStudiendekanat Elektrotechnik, Informatik und Mathematik-
crisitem.author.parentorgStudiendekanat Elektrotechnik, Informatik und Mathematik-
Appears in Collections:Publications without fulltext
Show simple item record

Page view(s)

35
Last Week
0
Last month
1
checked on Jan 17, 2021

Google ScholarTM

Check

Add Files to Item

Note about this record

Export

Items in TORE are protected by copyright, with all rights reserved, unless otherwise indicated.