Physiological signals: The next generation authentication and identification methods!?

Egon van den Broek, Martijn Spitters

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    4 Citations (Scopus)
    345 Downloads (Pure)


    Throughout the last 40 years, the security breach caused by human error is often disregarded. To relief the latter problem, this article introduces a new class of biometrics that is founded on processing physiological personal features, as opposed to physical and behavioral features. After an introduction on authentication, physiological signals are discussed, including their advantages, disadvantages, and initial directives for obtaining them. This new class of authentication methods can increase biometrics’ robustness and enables cross validation. I close this article with a brief discussion in which a recap of the article is provided, law, privacy, and ethical issues are discussed, some suggestions for the processing pipeline of this new class of authentication methods are done, and conclusions are drawn.
    Original languageUndefined
    Title of host publicationIEEE Proceedings of the 2013 European Intelligence and Security Informatics Conference (EISIC 2013)
    EditorsJ. Brynielsson, F. Johansson
    Place of PublicationLos Alamitos, CA, USA
    PublisherIEEE Computer Society
    Number of pages4
    ISBN (Print)978-0-7695-5062-6
    Publication statusPublished - 12 Aug 2013
    EventIEEE 2013 European Intelligence and Security Informatics Conference (EISIC 2013) - Uppsala, Sweden
    Duration: 12 Aug 201314 Aug 2013

    Publication series

    PublisherIEEE Computer Society


    ConferenceIEEE 2013 European Intelligence and Security Informatics Conference (EISIC 2013)
    Other12-14 Aug 2013


    • HMI-CI: Computational Intelligence
    • HMI-HF: Human Factors
    • HMI-IE: Information Engineering
    • EWI-23588
    • Identification
    • METIS-299986
    • Physiological Signals
    • IR-87376
    • BioSignals
    • Biometrics
    • Authentication
    • Security

    Cite this