Research Article
Combining Cryptography with EEG Biometrics
Input: EEG biometric and fuzzy commitment . | (1) Extract EEG code from EEG biometric . | (2) Compute the codeword | (3) Compute | (4) Compute | (5) Check | Output: The user is authenticated or rejected. |
|