Background: The electroencephalogram (EEG) signal represents a subject's specific brain activity patterns and is considered as an ideal biometric given its superior invisibility, non-clonality, and non-coercion. In order to enhance its applicability in identity authentication, a novel EEG-based identity authentication method is proposed based on self- or non-self-face rapid serial visual presentation.
Results: In contrast to previous studies that extracted EEG features from rest state or motor imagery, the designed paradigm could obtain a distinct and stable biometric trait with a lower time cost. Channel selection was applied to select specific channels for each user to enhance system portability and improve discriminability between users and imposters. Two different imposter scenarios were designed to test system security, which demonstrate the capability of anti-deception. Fifteen users and thirty imposters participated in the experiment. The mean authentication accuracy values for the two scenarios were 91.31 and 91.61%, with 6 s time cost, which illustrated the precision and real-time capability of the system. Furthermore, in order to estimate the repeatability and stability of our paradigm, another data acquisition session is conducted for each user. Using the classification models generated from the previous sessions, a mean false rejected rate of 7.27% has been achieved, which demonstrates the robustness of our paradigm.
Conclusions: Experimental results reveal that the proposed paradigm and methods are effective for EEG-based identity authentication.
Download full-text PDF |
Source |
---|---|
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC5934893 | PMC |
http://dx.doi.org/10.1186/s12938-018-0483-7 | DOI Listing |
Indian J Endocrinol Metab
December 2024
Department of Endocrinology and Metabolism, Adhar Health Institute, Hisar, Haryana, India.
In the conservative heartland of Haryana, India, a poignant encounter in a hospital chamber revealed the raw, often overlooked struggles of gender incongruence. A young woman, presenting in masculine attire and identifying herself with the pronouns 'he' and 'him', sought not only medical assistance for transition to male but also the validation of his identity amidst a backdrop of societal prejudice. This case underscores the complexities faced by individuals with gender incongruence in a society resistant to non-binary identities.
View Article and Find Full Text PDFNurs Philos
January 2025
Department of Medical Psychology, University Medical Center Hamburg-Eppendorf, Hamburg, Germany.
The moral authority of advance directives (ADs) in the context of persons living with dementia (PLWD) has sparked a multifaceted debate, encompassing concerns such as authenticity and the appropriate involvement of caregivers. Dresser critiques ADs based on Parfit's account of numeric personal identity, using the often-discussed case of a PLWD called Margo. She claims that dementia leads to a new manifestation of Margo emerging, which then contracts pneumonia.
View Article and Find Full Text PDFNeuroimage
January 2025
Center for Research on Self and Identity, School of Psychology, University of Southampton, Southampton, SO17 1BJ, UK. Electronic address:
Authenticity has captivated scholars. But what is it? An emerging view considers it exaggerated favorability (self-enhancement), whereas traditional views regard it as self-accuracy and self-consistency. We tested these theoretical views by contrasting the authentic self with the presented self, a highly desirable representation.
View Article and Find Full Text PDFFoods
January 2025
Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan 430072, China.
The food and agriculture sector is a cornerstone of critical infrastructure (CI), underpinning global food security, public health, and economic stability. However, the increasing digitalization and connectivity of operational technologies (OTs) in this sector expose it to significant cybersecurity risks. Blockchain technology (BT) has emerged as a transformative solution for addressing these challenges by enhancing network security, traceability, and system resilience.
View Article and Find Full Text PDFEnter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!