Reference Hub1
Identity Verification using Resting State Brain Signals

Identity Verification using Resting State Brain Signals

Ramaswamy Palaniappan, Lalit M. Patnaik
Copyright: © 2007 |Pages: 7
ISBN13: 9781591409878|ISBN10: 159140987X|EISBN13: 9781591409885
DOI: 10.4018/978-1-59140-987-8.ch050
Cite Chapter Cite Chapter

MLA

Palaniappan, Ramaswamy, and Lalit M. Patnaik. "Identity Verification using Resting State Brain Signals." Encyclopedia of Information Ethics and Security, edited by Marian Quigley, IGI Global, 2007, pp. 335-341. https://doi.org/10.4018/978-1-59140-987-8.ch050

APA

Palaniappan, R. & Patnaik, L. M. (2007). Identity Verification using Resting State Brain Signals. In M. Quigley (Ed.), Encyclopedia of Information Ethics and Security (pp. 335-341). IGI Global. https://doi.org/10.4018/978-1-59140-987-8.ch050

Chicago

Palaniappan, Ramaswamy, and Lalit M. Patnaik. "Identity Verification using Resting State Brain Signals." In Encyclopedia of Information Ethics and Security, edited by Marian Quigley, 335-341. Hershey, PA: IGI Global, 2007. https://doi.org/10.4018/978-1-59140-987-8.ch050

Export Reference

Mendeley
Favorite

Abstract

In the last several decades, computers or automated technologies have been utilized to verify the identity of humans using biometrics (i.e., physical and behavioral characteristics) (Wayman, Jain, Maltoni, & Maio, 2004), as it often surpasses the conventional automatic identity verification measures like passwords and personal identification numbers (PINs) by offering positive human identification. For example, the use of a PIN actually denotes the automatic identification of the PIN, not necessarily identification of the person who has provided it. The same applies with cards and tokens, which could be presented by anyone who successfully steals the card or token. PINs and passwords also have the problem of being compromised by ‘shoulder surfing’ and people picking the obvious choices. Even the recently proposed graphical passwords share similar problems.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.