13.07.2015 Views

Thesis - Instituto de Telecomunicações

Thesis - Instituto de Telecomunicações

Thesis - Instituto de Telecomunicações

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

30 CHAPTER 2. STATE OF THE ARTeye activities. In [180] an approach based on Visual Evoked Potential (VEP), where imagesare shown to 102 subjects, obtained an error near 10%.Advantages and Disadvantages The case for an EEG biometric system is hard to<strong>de</strong>fend. Recent studies are more concerned with the answer to the research question thanto propose a viable system.The EEG acquisition is one of the most intrusive techniques <strong>de</strong>scribed in this chapter.This technique is time consuming and with several hygiene concerns. Conventional EEG acquisitionneeds the application of special conductive gels to improve the conductive contactwith the skull skin. Some recent improved <strong>de</strong>signs for EEG signal acquisition systems havebeen <strong>de</strong>veloped, for reduced and specific locations in the head. The overall <strong>de</strong>sign has improvedand usability has increased in the sense that they are now easier to place [122, 150].Nevertheless the usage of such a system is, as yet, far from acceptance for regular use.2.3.9 Related TechniquesThere are additional research works related to user behavior. While these cannot be consi<strong>de</strong>redas biometric techniques, they have some interesting characteristics related to thisclass of biometric applications.In [31], a user i<strong>de</strong>ntification system is <strong>de</strong>signed based on a page of handwritten textwriting style. In [208], the user is i<strong>de</strong>ntified by the graphical characteristics of his cursivehandwritten text. The authors use an image of a page of handwritten text and extractfeatures from the several lines and words. This new approach was used to create the traitcalled write print [144]. This is a content analysis i<strong>de</strong>a that tries to classify users in diversegroups or even to verify their i<strong>de</strong>ntity via their textual writing style.Graphical passwords [49, 120, 230] have been proposed as a more secure system thannormal textual passwords. The user sketches a small picture using an electronic pen (thesystem is proposed for use in PDAs with graphical input via a stylus). The authors claimthat secret drawing is more memorable and presents more diversity than textual passwords.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!