Study on EEG Password Based on AR Power Spectrum and BP Network

In recent information day, how to identify person and protect security of information is a key to the social. A problem of personal verification and identification is an actively growing area of research. The methods are numerous, and are based on different personal characteristics. Voice, lip movements, hand geometry, face, odor, gait, iris, retina, fingerprint are the most commonly used authentication methods. With the development of information society, the identity recognition technology in the privacy protection, information security and plays a more and more important role. In daily life, people often need to know the identity of people around, to prevent the individual rights are being violated.

Provided by: AICIT Topic: Security Date Added: May 2012 Format: PDF

Find By Topic