{"created":"2023-08-02T03:57:54.536432+00:00","id":7029,"links":{},"metadata":{"_buckets":{"deposit":"3d0c5b7e-183e-4042-b55c-b7373f2bd88f"},"_deposit":{"created_by":10,"id":"7029","owners":[10],"pid":{"revision_id":0,"type":"depid","value":"7029"},"status":"published"},"_oai":{"id":"oai:repository.lib.tottori-u.ac.jp:00007029","sets":["1:10","2:15"]},"author_link":["2512","26083","26084","26085","26086"],"item_10003_biblio_info_7":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2011","bibliographicIssueDateType":"Issued"},"bibliographicPageEnd":"96","bibliographicPageStart":"90","bibliographic_titles":[{"bibliographic_title":"Proceedings of the International Conference on Security and Cryptography 2011"},{"bibliographic_title":"Proceedings of the International Conference on Security and Cryptography 2011","bibliographic_titleLang":"en"}]}]},"item_10003_description_5":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":"From the viewpoint of user management, continuous or on-demand biometric authentication is effective for achieving higher security. In such a case, the biometrics which is able to present biometric data unconsciously is needed and we have proposed to use the brain wave as the unconscious biometrics. In this paper, assuming driver authentication, we measure brain waves of drivers when they are tracing routes as a mental task. And we evaluate verification performance using the difference between the mean power spectrum at α-β band in relaxed condition and that in mental-tasked condition as an individual feature. As a result, the EER of 31 % is obtained among 12 subjects.","subitem_description_type":"Other"}]},"item_10003_publisher_8":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"IEEE"}]},"item_10003_relation_10":{"attribute_name":"ISBN","attribute_value_mlt":[{"subitem_relation_type_id":{"subitem_relation_type_id_text":"9789898425713","subitem_relation_type_select":"ISBN"}}]},"item_10003_relation_16":{"attribute_name":"情報源","attribute_value_mlt":[{"subitem_relation_name":[{"subitem_relation_name_text":"Proceedings of the International Conference on Security and Cryptography 2011. 2011, 90-96"}]}]},"item_10003_relation_17":{"attribute_name":"関連サイト","attribute_value_mlt":[{"subitem_relation_name":[{"subitem_relation_name_text":"https://ieeexplore.ieee.org/abstract/document/6732375/"}],"subitem_relation_type_id":{"subitem_relation_type_id_text":"https://ieeexplore.ieee.org/abstract/document/6732375/","subitem_relation_type_select":"URI"}}]},"item_10003_rights_15":{"attribute_name":"権利","attribute_value_mlt":[{"subitem_rights":"© 2011 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new coll"}]},"item_10003_text_32":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"Graduate School of Engineering, Tottori University"},{"subitem_text_value":"Graduate School of Engineering, Tottori University"},{"subitem_text_value":"Faculty of Engineering, Tottori University"}]},"item_10003_version_type_20":{"attribute_name":"著者版フラグ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_ab4af688f83e57aa","subitem_version_type":"AM"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Nakanishi, Isao"},{"creatorName":"Nakanishi, Isao","creatorNameLang":"en"}],"nameIdentifiers":[{"nameIdentifier":"2512","nameIdentifierScheme":"WEKO"},{"nameIdentifier":"80243377","nameIdentifierScheme":"e-Rad","nameIdentifierURI":"https://kaken.nii.ac.jp/ja/search/?qm=80243377"},{"nameIdentifier":"100000543","nameIdentifierScheme":"研究者総覧鳥取大学","nameIdentifierURI":"http://researchers.adm.tottori-u.ac.jp/html/100000543_ja.html"}]},{"creatorNames":[{"creatorName":"Baba, Sadanao"}],"nameIdentifiers":[{"nameIdentifier":"26083","nameIdentifierScheme":"WEKO"}]},{"creatorNames":[{"creatorName":"Inoue, Masahiro"}],"nameIdentifiers":[{"nameIdentifier":"26084","nameIdentifierScheme":"WEKO"}]},{"creatorNames":[{"creatorName":"Baba, Sadanao","creatorNameLang":"en"}],"nameIdentifiers":[{"nameIdentifier":"26085","nameIdentifierScheme":"WEKO"}]},{"creatorNames":[{"creatorName":"Inoue, Masahiro","creatorNameLang":"en"}],"nameIdentifiers":[{"nameIdentifier":"26086","nameIdentifierScheme":"WEKO"}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2018-05-11"}],"displaytype":"detail","filename":"ICSECRYPT2011_90.pdf","filesize":[{"value":"505.4 kB"}],"format":"application/pdf","licensefree":"© 2011 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new coll","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"ICSECRYPT2011_90.pdf","url":"https://repository.lib.tottori-u.ac.jp/record/7029/files/ICSECRYPT2011_90.pdf"},"version_id":"6d5a7bc5-78be-40af-aba9-331cec7c1032"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"Biometrics","subitem_subject_scheme":"Other"},{"subitem_subject":"Driver Authentication","subitem_subject_scheme":"Other"},{"subitem_subject":"Brain Wave","subitem_subject_scheme":"Other"},{"subitem_subject":"Route Trace","subitem_subject_scheme":"Other"},{"subitem_subject":"Mental Task","subitem_subject_scheme":"Other"},{"subitem_subject":"Biometrics","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"Driver Authentication","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"Brain Wave","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"Route Trace","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"Mental Task","subitem_subject_language":"en","subitem_subject_scheme":"Other"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"conference paper","resourceuri":"http://purl.org/coar/resource_type/c_5794"}]},"item_title":"Driver authentication using brain waves while route tracing as a mental task","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Driver authentication using brain waves while route tracing as a mental task","subitem_title_language":"en"}]},"item_type_id":"10003","owner":"10","path":["10","15"],"pubdate":{"attribute_name":"PubDate","attribute_value":"2018-06-22"},"publish_date":"2018-06-22","publish_status":"0","recid":"7029","relation_version_is_last":true,"title":["Driver authentication using brain waves while route tracing as a mental task"],"weko_creator_id":"10","weko_shared_id":-1},"updated":"2023-09-28T07:59:23.668907+00:00"}