{"title":"生理信号:新一代认证与鉴定方法!?","authors":"E. V. D. Broek, Martijn Spitters","doi":"10.1109/EISIC.2013.35","DOIUrl":null,"url":null,"abstract":"Throughout the last 40 years, the security breach caused by human error is often disregarded. To relief the latter problem, this article introduces a new class of biometrics that is founded on processing physiological personal features, as opposed to physical and behavioral features. After an introduction on authentication, physiological signals are discussed, including their advantages, disadvantages, and initial directives for obtaining them. This new class of authentication methods can increase biometrics' robustness and enables cross validation. I close this article with a brief discussion in which a recap of the article is provided, law, privacy, and ethical issues are discussed, some suggestions for the processing pipeline of this new class of authentication methods are done, and conclusions are drawn.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"55 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Physiological Signals: The Next Generation Authentication and Identification Methods!?\",\"authors\":\"E. V. D. Broek, Martijn Spitters\",\"doi\":\"10.1109/EISIC.2013.35\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Throughout the last 40 years, the security breach caused by human error is often disregarded. To relief the latter problem, this article introduces a new class of biometrics that is founded on processing physiological personal features, as opposed to physical and behavioral features. After an introduction on authentication, physiological signals are discussed, including their advantages, disadvantages, and initial directives for obtaining them. This new class of authentication methods can increase biometrics' robustness and enables cross validation. I close this article with a brief discussion in which a recap of the article is provided, law, privacy, and ethical issues are discussed, some suggestions for the processing pipeline of this new class of authentication methods are done, and conclusions are drawn.\",\"PeriodicalId\":229195,\"journal\":{\"name\":\"2013 European Intelligence and Security Informatics Conference\",\"volume\":\"55 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-08-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 European Intelligence and Security Informatics Conference\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/EISIC.2013.35\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 European Intelligence and Security Informatics Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EISIC.2013.35","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Physiological Signals: The Next Generation Authentication and Identification Methods!?
Throughout the last 40 years, the security breach caused by human error is often disregarded. To relief the latter problem, this article introduces a new class of biometrics that is founded on processing physiological personal features, as opposed to physical and behavioral features. After an introduction on authentication, physiological signals are discussed, including their advantages, disadvantages, and initial directives for obtaining them. This new class of authentication methods can increase biometrics' robustness and enables cross validation. I close this article with a brief discussion in which a recap of the article is provided, law, privacy, and ethical issues are discussed, some suggestions for the processing pipeline of this new class of authentication methods are done, and conclusions are drawn.