WEKO3
アイテム
{"_buckets": {"deposit": "3d0c5b7e-183e-4042-b55c-b7373f2bd88f"}, "_deposit": {"created_by": 10, "id": "7029", "owners": [10], "pid": {"revision_id": 0, "type": "depid", "value": "7029"}, "status": "published"}, "_oai": {"id": "oai:repository.lib.tottori-u.ac.jp:00007029", "sets": ["10", "15"]}, "author_link": ["2512", "26083", "26084", "26085", "26086"], "item_10003_biblio_info_7": {"attribute_name": "書誌情報", "attribute_value_mlt": [{"bibliographicIssueDates": {"bibliographicIssueDate": "2011", "bibliographicIssueDateType": "Issued"}, "bibliographicPageEnd": "96", "bibliographicPageStart": "90", "bibliographic_titles": [{"bibliographic_title": "Proceedings of the International Conference on Security and Cryptography 2011"}, {"bibliographic_title": "Proceedings of the International Conference on Security and Cryptography 2011", "bibliographic_titleLang": "en"}]}]}, "item_10003_checkbox_27": {"attribute_name": "部局名", "attribute_value_mlt": [{"subitem_checkbox_item": ["kou-gakubu"]}]}, "item_10003_description_5": {"attribute_name": "抄録", "attribute_value_mlt": [{"subitem_description": "From the viewpoint of user management, continuous or on-demand biometric authentication is effective for achieving higher security. In such a case, the biometrics which is able to present biometric data unconsciously is needed and we have proposed to use the brain wave as the unconscious biometrics. In this paper, assuming driver authentication, we measure brain waves of drivers when they are tracing routes as a mental task. And we evaluate verification performance using the difference between the mean power spectrum at α-β band in relaxed condition and that in mental-tasked condition as an individual feature. As a result, the EER of 31 % is obtained among 12 subjects.", "subitem_description_type": "Other"}]}, "item_10003_publisher_8": {"attribute_name": "出版者", "attribute_value_mlt": [{"subitem_publisher": "IEEE"}]}, "item_10003_relation_10": {"attribute_name": "ISBN", "attribute_value_mlt": [{"subitem_relation_type_id": {"subitem_relation_type_id_text": "9789898425713", "subitem_relation_type_select": "ISBN"}}]}, "item_10003_relation_16": {"attribute_name": "情報源", "attribute_value_mlt": [{"subitem_relation_name": [{"subitem_relation_name_text": "Proceedings of the International Conference on Security and Cryptography 2011. 2011, 90-96"}]}]}, "item_10003_relation_17": {"attribute_name": "関連サイト", "attribute_value_mlt": [{"subitem_relation_name": [{"subitem_relation_name_text": "https://ieeexplore.ieee.org/abstract/document/6732375/"}], "subitem_relation_type_id": {"subitem_relation_type_id_text": "https://ieeexplore.ieee.org/abstract/document/6732375/", "subitem_relation_type_select": "URI"}}]}, "item_10003_rights_15": {"attribute_name": "権利", "attribute_value_mlt": [{"subitem_rights": "© 2011 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new coll"}]}, "item_10003_text_25": {"attribute_name": "EARMAS ID", "attribute_value_mlt": [{"subitem_text_value": "5623"}]}, "item_10003_text_29": {"attribute_name": "最新掲載誌名", "attribute_value_mlt": [{"subitem_text_value": ";Proceedings of the International Conference on Security and Cryptography 2011;Proceedings of the International Conference on Security and Cryptography 2011"}]}, "item_10003_text_32": {"attribute_name": "著者所属", "attribute_value_mlt": [{"subitem_text_value": "Graduate School of Engineering, Tottori University"}, {"subitem_text_value": "Graduate School of Engineering, Tottori University"}, {"subitem_text_value": "Faculty of Engineering, Tottori University"}]}, "item_10003_version_type_20": {"attribute_name": "著者版フラグ", "attribute_value_mlt": [{"subitem_version_resource": "http://purl.org/coar/version/c_ab4af688f83e57aa", "subitem_version_type": "AM"}]}, "item_creator": {"attribute_name": "著者", "attribute_type": "creator", "attribute_value_mlt": [{"creatorNames": [{"creatorName": "Nakanishi, Isao"}, {"creatorName": "Nakanishi, Isao", "creatorNameLang": "en"}], "nameIdentifiers": [{"nameIdentifier": "2512", "nameIdentifierScheme": "WEKO"}, {"nameIdentifier": "80243377", "nameIdentifierScheme": "e-Rad", "nameIdentifierURI": "https://kaken.nii.ac.jp/ja/search/?qm=80243377"}, {"nameIdentifier": "100000543", "nameIdentifierScheme": "研究者総覧鳥取大学", "nameIdentifierURI": "http://researchers.adm.tottori-u.ac.jp/html/100000543_ja.html"}]}, {"creatorNames": [{"creatorName": "Baba, Sadanao"}], "nameIdentifiers": [{"nameIdentifier": "26083", "nameIdentifierScheme": "WEKO"}]}, {"creatorNames": [{"creatorName": "Inoue, Masahiro"}], "nameIdentifiers": [{"nameIdentifier": "26084", "nameIdentifierScheme": "WEKO"}]}, {"creatorNames": [{"creatorName": "Baba, Sadanao", "creatorNameLang": "en"}], "nameIdentifiers": [{"nameIdentifier": "26085", "nameIdentifierScheme": "WEKO"}]}, {"creatorNames": [{"creatorName": "Inoue, Masahiro", "creatorNameLang": "en"}], "nameIdentifiers": [{"nameIdentifier": "26086", "nameIdentifierScheme": "WEKO"}]}]}, "item_files": {"attribute_name": "ファイル情報", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_date", "date": [{"dateType": "Available", "dateValue": "2018-05-11"}], "displaytype": "detail", "download_preview_message": "", "file_order": 0, "filename": "ICSECRYPT2011_90.pdf", "filesize": [{"value": "505.4 kB"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensefree": "© 2011 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new coll", "licensetype": "license_note", "mimetype": "application/pdf", "size": 505400.0, "url": {"label": "ICSECRYPT2011_90.pdf", "url": "https://repository.lib.tottori-u.ac.jp/record/7029/files/ICSECRYPT2011_90.pdf"}, "version_id": "6d5a7bc5-78be-40af-aba9-331cec7c1032"}]}, "item_keyword": {"attribute_name": "キーワード", "attribute_value_mlt": [{"subitem_subject": "Biometrics", "subitem_subject_scheme": "Other"}, {"subitem_subject": "Driver Authentication", "subitem_subject_scheme": "Other"}, {"subitem_subject": "Brain Wave", "subitem_subject_scheme": "Other"}, {"subitem_subject": "Route Trace", "subitem_subject_scheme": "Other"}, {"subitem_subject": "Mental Task", "subitem_subject_scheme": "Other"}, {"subitem_subject": "Biometrics", "subitem_subject_language": "en", "subitem_subject_scheme": "Other"}, {"subitem_subject": "Driver Authentication", "subitem_subject_language": "en", "subitem_subject_scheme": "Other"}, {"subitem_subject": "Brain Wave", "subitem_subject_language": "en", "subitem_subject_scheme": "Other"}, {"subitem_subject": "Route Trace", "subitem_subject_language": "en", "subitem_subject_scheme": "Other"}, {"subitem_subject": "Mental Task", "subitem_subject_language": "en", "subitem_subject_scheme": "Other"}]}, "item_language": {"attribute_name": "言語", "attribute_value_mlt": [{"subitem_language": "eng"}]}, "item_resource_type": {"attribute_name": "資源タイプ", "attribute_value_mlt": [{"resourcetype": "conference paper", "resourceuri": "http://purl.org/coar/resource_type/c_5794"}]}, "item_title": "Driver authentication using brain waves while route tracing as a mental task", "item_titles": {"attribute_name": "タイトル", "attribute_value_mlt": [{"subitem_title": "Driver authentication using brain waves while route tracing as a mental task", "subitem_title_language": "en"}]}, "item_type_id": "10003", "owner": "10", "path": ["10", "15"], "permalink_uri": "https://repository.lib.tottori-u.ac.jp/records/7029", "pubdate": {"attribute_name": "PubDate", "attribute_value": "2018-06-22"}, "publish_date": "2018-06-22", "publish_status": "0", "recid": "7029", "relation": {}, "relation_version_is_last": true, "title": ["Driver authentication using brain waves while route tracing as a mental task"], "weko_shared_id": -1}
Driver authentication using brain waves while route tracing as a mental task
https://repository.lib.tottori-u.ac.jp/records/7029
https://repository.lib.tottori-u.ac.jp/records/70290c8d696b-0320-4e84-a036-42140067301b
名前 / ファイル | ライセンス | アクション |
---|---|---|
![]() |
|
Item type | 会議発表論文 / Conference Paper(1) | |||||
---|---|---|---|---|---|---|
公開日 | 2018-06-22 | |||||
タイトル | ||||||
言語 | en | |||||
タイトル | Driver authentication using brain waves while route tracing as a mental task | |||||
言語 | ||||||
言語 | eng | |||||
キーワード | ||||||
主題 | Biometrics | |||||
キーワード | ||||||
主題 | Driver Authentication | |||||
キーワード | ||||||
主題 | Brain Wave | |||||
キーワード | ||||||
主題 | Route Trace | |||||
キーワード | ||||||
主題 | Mental Task | |||||
キーワード | ||||||
言語 | en | |||||
主題 | Biometrics | |||||
キーワード | ||||||
言語 | en | |||||
主題 | Driver Authentication | |||||
キーワード | ||||||
言語 | en | |||||
主題 | Brain Wave | |||||
キーワード | ||||||
言語 | en | |||||
主題 | Route Trace | |||||
キーワード | ||||||
言語 | en | |||||
主題 | Mental Task | |||||
資源タイプ | ||||||
資源タイプ | conference paper | |||||
著者 |
Nakanishi, Isao
× Nakanishi, Isao× Baba, Sadanao× Inoue, Masahiro× Baba, Sadanao× Inoue, Masahiro |
|||||
著者所属 | ||||||
Graduate School of Engineering, Tottori University | ||||||
著者所属 | ||||||
Graduate School of Engineering, Tottori University | ||||||
著者所属 | ||||||
Faculty of Engineering, Tottori University | ||||||
抄録 | ||||||
内容記述タイプ | Other | |||||
内容記述 | From the viewpoint of user management, continuous or on-demand biometric authentication is effective for achieving higher security. In such a case, the biometrics which is able to present biometric data unconsciously is needed and we have proposed to use the brain wave as the unconscious biometrics. In this paper, assuming driver authentication, we measure brain waves of drivers when they are tracing routes as a mental task. And we evaluate verification performance using the difference between the mean power spectrum at α-β band in relaxed condition and that in mental-tasked condition as an individual feature. As a result, the EER of 31 % is obtained among 12 subjects. | |||||
書誌情報 |
Proceedings of the International Conference on Security and Cryptography 2011 en : Proceedings of the International Conference on Security and Cryptography 2011 p. 90-96, 発行日 2011 |
|||||
出版者 | ||||||
出版者 | IEEE | |||||
ISBN | ||||||
識別子タイプ | ISBN | |||||
関連識別子 | 9789898425713 | |||||
権利 | ||||||
権利情報 | © 2011 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new coll | |||||
情報源 | ||||||
関連名称 | Proceedings of the International Conference on Security and Cryptography 2011. 2011, 90-96 | |||||
関連サイト | ||||||
識別子タイプ | URI | |||||
関連識別子 | https://ieeexplore.ieee.org/abstract/document/6732375/ | |||||
関連名称 | https://ieeexplore.ieee.org/abstract/document/6732375/ | |||||
著者版フラグ | ||||||
出版タイプ | AM |