Publications

Matching entries: 0
settings...
AuthorTitleYearJournal/ProceedingsReftypeDOI/URL
Musto, R., Kuzu, R.S., Maiorana, E., Hine, G.E. and Campisi, P. Learning Biometric Representations with Mutually Independent Features Using Convolutional Autoencoders 2023 SN Computer Science
Vol. 4(5), pp. 619 
article URL 
Abstract: Representations of biometric traits to be used in automatic recognition systems are typically learned with the goal of obtaining significant discriminative capabilities, that is, generating features that are notably different when produced by traits of different subjects, while maintaining an appropriate consistency for a given user. Nonetheless, discriminability is not the only desirable property of a biometric representation. For instance, the mutual independence of the coefficients in the employed templates is a valuable property when designing biometric template protection schemes. In fact, managing representations with independent coefficients allows to maximize the achievable security. In this paper we propose different learning strategies to obtain biometric representations with the property of statistical independence among coefficients, while preserving discriminability. In order to achieve this goal, different strategies are employed to train convolutional autoencoders. As a proof of concept, the effectiveness of the proposed approaches is tested by considering biometric recognition systems using both finger-vein and palm-vein patterns.
BibTeX:
								@article{musto2023learning,
								  author = {Musto, Riccardo and Kuzu, Ridvan Salih and Maiorana, Emanuele and Hine, Gabriel Emile and Campisi, Patrizio},
								  title = {Learning Biometric Representations with Mutually Independent Features Using Convolutional Autoencoders},
								  journal = {SN Computer Science},
								  publisher = {Springer Nature Singapore Singapore},
								  year = {2023},
								  volume = {4},
								  number = {5},
								  pages = {619},
								  url = {https://link.springer.com/article/10.1007/s42979-023-01974-z}
								}
								
Hine, G.E., Kuzu, R.S., Maiorana, E. and Campisi, P. Unlinkable Zero-Leakage Biometric Cryptosystem: Theoretical Evaluation and Experimental Validation 2023 IEEE Transactions on Information Forensics and Security  article URL 
Abstract: Template protection is an issue of paramount importance for the design of secure and privacy-compliant biometric recognition systems. Template unlinkability, together with template irreversibility, is an essential requirement to properly guarantee template protection. In fact, it ensures that templates generated from the same trait, but used in different applications, cannot be linked to the same identity. This paper deals with the design of a system satisfying the unlinkability requirement. The robustness of the proposed solution is evaluated by exploiting methods stemming from the theory of stochastic optimization, as well as by using quantitative measures specifically proposed to characterize the unlinkability of biometric protection schemes. A case study using finger-vein biometrics is considered to test the proposed cryptosystem on non-ideal data. The proposed scheme guarantees 128 bits of security with acceptable false recognition rates in real-life conditions. Moreover, we provide guidelines to determine the parameters of the transformations to be applied to real biometric traits so as to ensure proper recognition, security, and unlinkability performance.
BibTeX:
								@article{hine2023unlinkable,
								  author = {Hine, Gabriel Emile and Kuzu, Ridvan Salih and Maiorana, Emanuele and Campisi, Patrizio},
								  title = {Unlinkable Zero-Leakage Biometric Cryptosystem: Theoretical Evaluation and Experimental Validation},
								  journal = {IEEE Transactions on Information Forensics and Security},
								  publisher = {IEEE},
								  year = {2023},
								  url = {https://ieeexplore.ieee.org/document/10132527}
								}
								
Musto, R., Maiorana, E., Kuzu, R.S., Hine, G.E. and Campisi, P. On the Statistical Independence of Parametric Representations in Biometric Cryptosystems: Evaluation and Improvement. 2022 International Conference on Pattern Recognition Applications and Methods, pp. 480-487  inproceedings URL 
BibTeX:
								@inproceedings{musto2022statistical,
								  author = {Musto, Riccardo and Maiorana, Emanuele and Kuzu, Ridvan Salih and Hine, Gabriel Emile and Campisi, Patrizio},
								  title = {On the Statistical Independence of Parametric Representations in Biometric Cryptosystems: Evaluation and Improvement.},
								  booktitle = {International Conference on Pattern Recognition Applications and Methods},
								  year = {2022},
								  pages = {480--487},
								  url = {https://www.scitepress.org/Papers/2022/109883/109883.pdf}
								}
								
De Luisa, L., Hine, G.E., Maiorana, E. and Campisi, P. In-air 3D dynamic signature recognition using haptic devices 2021 2021 IEEE International Workshop on Biometrics and Forensics (IWBF), pp. 1-6  inproceedings URL 
Abstract: Signature recognition is one of the most widespread and legally accepted methodology to authenticate a person's identity. In this work, we show how a haptic device can be used to acquire in-air 3D signatures, and provide the time-dependent position and orientation characteristics needed to effectively perform user verification. Dynamic time warping and hidden Markov models are here employed to compare samples acquired during the enrolment and verification stages. The recognition performance achieved when testing the proposed system on samples captured from 52 subjects testify the effectiveness of the proposed approach. Furthermore, a longitudinal analysis carried out on data from a subset of 21 subjects, for which two recording sessions have been taken at an average distance of four months, demonstrates that effective recognition can be performed even at long time distances from the enrolment.
BibTeX:
								@inproceedings{de2021air,
								  author = {De Luisa, Luca and Hine, Gabriel Emile and Maiorana, Emanuele and Campisi, Patrizio},
								  title = {In-air 3D dynamic signature recognition using haptic devices},
								  booktitle = {2021 IEEE International Workshop on Biometrics and Forensics (IWBF)},
								  year = {2021},
								  pages = {1--6},
								  url = {https://ieeexplore.ieee.org/document/9465089}
								}
								
Hine, G.E. ANONYMOUS BIOMETRICS 2019 School: Università degli studi Roma Tre  phdthesis URL 
Abstract: In this thesis, we developed techniques that enable to use biometric traits for authentication in an anonymous manner. At first glance, the concept of anonymous biometrics seems quite odd since biometric traits are closely linked to our identity. Moreover, the widespread adoption of biometrics in forensics, border control, surveillance applications have biased the general vision that users have if asked to show their biometrics. The basic idea behind anonymous biometrics is to do not use biometrics themselves as identifiers, but rather bind the biometric trait with a secret key that acts as the authenticator. The biometric trait becomes a factor of the authentication protocol that let the user reproduce the identifier that has been previously assigned to him. In this way, the authentication service provider does not need to know the biometric sample itself, or any representation of it. Because of the intrinsic noisiness of biometrics, classical cryptographic techniques are not suitable, and specific techniques, known as biometric cryptosystems, have been developed. In this context, we present a novel biometric cryptosystem obtaining perfect security, that is not leaking any information about the employed secret key from the knowledge of the data stored in the database. While similar methods have already been sought in the literature, the approaches proposed so far have been evaluated in terms of recognition performance under the unrealistic assumption of ideal statistical distributions for the considered biometric data. Conversely, in this thesis, we investigate the applicability of the proposed framework to practical scenarios while managing a trade-off between privacy and recognition performance. This goal has been achieved by introducing a class of transformation functions enforcing zero leakage secrecy, by designing an adaptive strategy for embedding the secret key bits into the selected features, and by developing a system parameters optimization strategy with respect to security, recognition performance, and privacy. Experimental tests conducted on real fingerprint data prove the effectiveness of the proposed scheme. Another important aspect is to ensure the untraceability along different services. That means that we should be able to produce different identifiers starting from the same biometric trait, but these should be indistinguishable from identifiers originated by independent users. The vulnerability of our system to the linkability attack has been analysed and an enhanced system is proposed in order to counteract it. A frequently neglected aspect in cryptosystem design proposals and analysis is the impossibility to synchronise signals once they are encrypted. Any kind of biometric should be aligned before doing any comparison. That means that further auxiliary data must be stored as a reference. This could leak too much information making the cryptosystem design useless. In this context, we propose a novel translation-invariant representation for fingerprint minutiae.
BibTeX:
								@phdthesis{hine2019anonymous,
								  author = {Hine, Gabriel Emile},
								  title = {ANONYMOUS BIOMETRICS},
								  school = {Università degli studi Roma Tre},
								  year = {2019},
								  url = {https://arcadia.sba.uniroma3.it/handle/2307/40514}
								}
								
Hine, G.E., Maiorana, E. and Campisi, P. Minutiae Triple Correlation: A Translation Invariant Fingerprint Representation 2019 2019 8th European Workshop on Visual Information Processing (EUVIP), pp. 244-249  inproceedings URL 
Abstract: In this paper, we introduce a novel translation-invariant minutiae representation based on triple correlation for fingerprint biometric recognition. In contrast with other fingerprint representations with translation-invariant characteristics, the proposed one does not lose any information about the original trait, with the only exception of its absolute position. Nevertheless, triple correlation would be of little use, in its native form, for signal processing applications, due to its high-demanding memory requirements. By exploiting the intrinsic sparsity of the treated minutiae, we propose a sparse implementation of the employed triple correlation, allowing its use in practical application and the definition of a suitable comparison algorithm here introduced. The performed experimental tests show the suitability of the proposed triple-correlation representation for fingerprint minutiae comparison.
BibTeX:
								@inproceedings{hine2019minutiae,
								  author = {Hine, Gabriel Emile and Maiorana, Emanuele and Campisi, Patrizio},
								  title = {Minutiae Triple Correlation: A Translation Invariant Fingerprint Representation},
								  booktitle = {2019 8th European Workshop on Visual Information Processing (EUVIP)},
								  year = {2019},
								  pages = {244--249},
								  url = {https://ieeexplore.ieee.org/document/8946139}
								}
								
Hine, G.E., Maiorana, E. and Campisi, P. Fingerprint minutiae matching through sparse cross-correlation 2018 2018 26th European Signal Processing Conference (EUSIPCO), pp. 2370-2374  inproceedings URL 
Abstract: In this paper, we introduce a novel minutiae-based matching algorithm for fingerprint recognition. The method is built on an elegant and straightforward mathematical formulation: the minutiae set is represented by a train of complex pulses and the matching algorithm is based on a simple crosscorrelation. We propose two different implementations. The first one exploits the intrinsic sparsity of the signal representing the minutiae set in order to construct an efficient implementation. The other relies on the Fourier transform to build a fixed-length representation, being thus suitable to be used in many biometric crypto-systems. The proposed method exhibits performance comparable with NIST's Bozorth3, that is a standard de facto for minutiae matching, but it shows to be more robust with cropped fingerprints.
BibTeX:
								@inproceedings{hine2018fingerprint,
								  author = {Hine, Gabriel Emile and Maiorana, Emanuele and Campisi, Patrizio},
								  title = {Fingerprint minutiae matching through sparse cross-correlation},
								  booktitle = {2018 26th European Signal Processing Conference (EUSIPCO)},
								  year = {2018},
								  pages = {2370--2374},
								  url = {https://ieeexplore.ieee.org/document/8553301}
								}
								
Hine, G.E., Maiorana, E. and Campisi, P. A zero-leakage fuzzy embedder from the theoretical formulation to real data 2017 IEEE Transactions on Information Forensics and Security
Vol. 12(7), pp. 1724-1734 
article URL 
Abstract: In this paper, we present a novel biometric cryptosystem obtaining perfect security, that is not leaking any information about the employed secret key from the knowledge of the stored helper data. While similar purposes have already been sought in the literature, the approaches proposed so far have been evaluated in terms of recognition performance under the unrealistic assumption of ideal statistical distributions for the considered biometric data. Conversely, in this paper, we investigate the applicability of the proposed framework to practical scenarios while managing a trade-off between privacy and recognition performance. This goal has been achieved by introducing a class of transformation functions enforcing zero-leakage secrecy, by designing an adaptive strategy for embedding the secret key bits into the selected features, and by developing a system parameters optimization strategy with respect to security, recognition performance, and privacy. Experimental tests conducted on real fingerprint data prove the effectiveness of the proposed scheme.
BibTeX:
								@article{hine2017zero,
								  author = {Hine, Gabriel Emile and Maiorana, Emanuele and Campisi, Patrizio},
								  title = {A zero-leakage fuzzy embedder from the theoretical formulation to real data},
								  journal = {IEEE Transactions on Information Forensics and Security},
								  publisher = {IEEE},
								  year = {2017},
								  volume = {12},
								  number = {7},
								  pages = {1724--1734},
								  url = {https://ieeexplore.ieee.org/document/7885071}
								}
								
Ramalli, A., Scaringella, M., Matrone, G., Dallai, A., Boni, E., Savoia, A.S., Bassi, L., Hine, G.E. and Tortoli, P. High dynamic range ultrasound imaging with real-time filtered-delay multiply and sum beamforming 2017 2017 IEEE International Ultrasonics Symposium (IUS), pp. 1-4  inproceedings URL 
Abstract: Most commercially available ultrasound imaging systems currently implement the delay and sum (DAS) beamforming. Alternative beamformers have been presented, offering higher performance at the expense of computational complexity, which has so far limited their practical real-time implementation. In particular, the Filtered-Delay Multiply and Sum (F-DMAS) beamformer, which adds the computation of signed square roots, absolute values and multiplications to DAS, was recently shown to be effective in improving resolution, dynamic range and overall image quality. In this work, we present the real-time implementation of the F-DMAS beamformer on the ULA-OP 256 research system. This is obtained through a reformulation of the F-DMAS algorithm that allows reducing its computational cost. Compared to DAS, F-DMAS images of a commercial phantom captured in real-time showed higher CR (up to +7 dB), better spatial resolution (up to 30%), but lower CNR (-40%).
BibTeX:
								@inproceedings{ramalli2017high,
								  author = {Ramalli, Alessandro and Scaringella, Monica and Matrone, Giulia and Dallai, Alessandro and Boni, Enrico and Savoia, Alessandro Stuart and Bassi, Luca and Hine, Gabriel Emile and Tortoli, Piero},
								  title = {High dynamic range ultrasound imaging with real-time filtered-delay multiply and sum beamforming},
								  booktitle = {2017 IEEE International Ultrasonics Symposium (IUS)},
								  year = {2017},
								  pages = {1--4},
								  url = {https://ieeexplore.ieee.org/document/8053519}
								}
								
Hine, G., Onaolapo, J., De Cristofaro, E., Kourtellis, N., Leontiadis, I., Samaras, R., Stringhini, G. and Blackburn, J. Kek, cucks, and god emperor trump: A measurement study of 4chan’s politically incorrect forum and its effects on the web 2017
Vol. 11(1)Proceedings of the International AAAI Conference on Web and Social Media, pp. 92-101 
inproceedings URL 
Abstract: The discussion-board site 4chan has been part of the Internet's dark underbelly since its inception, and recent political events have put it increasingly in the spotlight. In particular, /pol/, the "Politically Incorrect" board, has been a central figure in the outlandish 2016 US election season, as it has often been linked to the alt-right movement and its rhetoric of hate and racism. However, 4chan remains relatively unstudied by the scientific community: little is known about its user base, the content it generates, and how it affects other parts of the Web. In this paper, we start addressing this gap by analyzing /pol/ along several axes, using a dataset of over 8M posts we collected over two and a half months. First, we perform a general characterization, showing that /pol/ users are well distributed around the world and that 4chan's unique features encourage fresh discussions. We also analyze content, finding, for instance, that YouTube links and hate speech are predominant on /pol/. Overall, our analysis not only provides the first measurement study of /pol/, but also insight into online harassment and hate speech trends in social media.
BibTeX:
								@inproceedings{hine2017kek,
								  author = {Hine, Gabriel and Onaolapo, Jeremiah and De Cristofaro, Emiliano and Kourtellis, Nicolas and Leontiadis, Ilias and Samaras, Riginos and Stringhini, Gianluca and Blackburn, Jeremy},
								  title = {Kek, cucks, and god emperor trump: A measurement study of 4chan’s politically incorrect forum and its effects on the web},
								  booktitle = {Proceedings of the International AAAI Conference on Web and Social Media},
								  year = {2017},
								  volume = {11},
								  number = {1},
								  pages = {92--101},
								  url = {https://arxiv.org/abs/1610.03452}
								}
								
Hine, G.E., Maiorana, E. and Campisi, P. Resting-state EEG: A study on its non-stationarity for biometric applications 2017 2017 International Conference of the Biometrics Special Interest Group (BIOSIG), pp. 1-5  inproceedings URL 
Abstract: In the last years, several papers on EEG-based biometric recognition systems have been published. Specifically, most of the proposed contributions focus on brain signals recorded in resting state conditions, with either closed or open eyes. A common assumption is that the acquired signals are quasi-stationarity. In this paper, we investigate such property in terms of discriminative capability, and we analyze whether or not it holds throughout the entire duration of data collected over long periods. An extensive set of experimental tests, conducted over a database comprising signals collected from 50 subjects in three distinct acquisition sessions, shows that the most distinctive information of the brain signals is temporally located at the beginning of each recording.
BibTeX:
								@inproceedings{hine2017resting,
								  author = {Hine, Gabriel Emile and Maiorana, Emanuele and Campisi, Patrizio},
								  title = {Resting-state EEG: A study on its non-stationarity for biometric applications},
								  booktitle = {2017 International Conference of the Biometrics Special Interest Group (BIOSIG)},
								  year = {2017},
								  pages = {1--5},
								  url = {https://ieeexplore.ieee.org/document/8053519}
								}
								
Iula, A., Hine, G., Ramalli, A., Guidi, F. and Boni, E. 2d and 3d palmprint extraction by an automated ultrasound system 2016 Applications in Electronics Pervading Industry, Environment and Society: APPLEPIES 2014, pp. 83-89  article URL 
Abstract: In this work, some possible procedures to extract both 2D and 3D palmprints from the same experimental 3D ultrasound image of the human palm are presented. The ultrasound system used to achieve the 3D images is composed of a CNC commercial pantograph, which moves a high frequency (12 MHz) ultrasound probe along its elevation direction to cover the desired area of the human palm. The ULtrasound Advanced Open Platform (ULA-OP) is employed as ultrasound imaging system.
BibTeX:
								@article{iula20162d,
								  author = {Iula, Antonio and Hine, Gabriel and Ramalli, Alessandro and Guidi, Francesco and Boni, Enrico},
								  title = {2d and 3d palmprint extraction by an automated ultrasound system},
								  journal = {Applications in Electronics Pervading Industry, Environment and Society: APPLEPIES 2014},
								  publisher = {Springer International Publishing},
								  year = {2016},
								  pages = {83--89},
								  url = {https://link.springer.com/chapter/10.1007/978-3-319-20227-3_11}
								}
								
Maiorana, E., Hine, G.E. and Campisi, P. Hill-Climbing Attacks on Multibiometrics Recognition Systems 2015 IEEE Transactions on Information Forensics and Security
Vol. 10(5), pp. 900-915 
article DOI  
Abstract: Biometric recognition systems, despite the advantages provided with respect to traditional authentication methods, have some peculiar weaknesses which may allow an attacker being falsely recognized or accessing users' personal data. Among such vulnerabilities, in this paper, we speculate on the hill-climbing attack, i.e., the possibility for an attacker to exploit the scores produced by the matcher with the goal of generating synthetic biometric data, which could allow a false acceptance. More in detail, we focus on multibiometrics systems and investigate about the robustness of different system architectures, both parallel and serial fusion schemes, against the hill-climbing attack. Nonuniform quantization is also evaluated as a possible countermeasure for limiting the effectiveness of the considered attacks in terms of recognition success rate and average number of required attempts without affecting the recognition performance.
BibTeX:
								@article{maiorana2015hill,
								  author = {Maiorana, Emanuele and Hine, Gabriel Emile and Campisi, Patrizio},
								  title = {Hill-Climbing Attacks on Multibiometrics Recognition Systems},
								  journal = {IEEE Transactions on Information Forensics and Security},
								  year = {2015},
								  volume = {10},
								  number = {5},
								  pages = {900-915},
								  doi = {https://doi.org/10.1109/TIFS.2014.2384735}
								}
								
Iula, A., Hine, G., Ramalli, A. and Guidi, F. An improved ultrasound system for biometric recognition based on hand geometry and palmprint 2014 Procedia Engineering
Vol. 87, pp. 1338-1341 
article URL 
Abstract: In this work, an improved ultrasound technique for biometric recognition is proposed. It allows to acquire simultaneously two biometric characteristics: 3D Hand Geometry and 3D Palmprint.

An open research platform is employed as ultrasound imaging system. A commercial high frequency probe is moved in the elevation direction over the region of interest by an automated scanning system based on numeric controlled pantograph. Experimental results are presented and the advantages of the proposed technique are highlighted and discussed.

BibTeX:
								@article{iula2014improved,
								  author = {Iula, Antonio and Hine, Gabriel and Ramalli, Alessandro and Guidi, Francesco},
								  title = {An improved ultrasound system for biometric recognition based on hand geometry and palmprint},
								  journal = {Procedia Engineering},
								  publisher = {No longer published by Elsevier},
								  year = {2014},
								  volume = {87},
								  pages = {1338--1341},
								  url = {https://www.sciencedirect.com/science/article/pii/S1877705814028318}
								}
								
Iula, A., Hine, G.E., Ramalli, A. and Guidi, F. Wide 3D ultrasound palmprint for biometric recognition 2014 Ultrasonics Symposium (IUS), 2014 IEEE International, pp. 1388-1391  inproceedings URL 
Abstract: An ultrasound technique for extracting 3D palmprints has been recently proposed. A drawback of that method relies in the small volume acquired, which is limited by the aperture of the array.
BibTeX:
								@inproceedings{iula2014wide,
								  author = {Iula, Antonio and Hine, Gabriel Emile and Ramalli, Alessandro and Guidi, Francesco},
								  title = {Wide 3D ultrasound palmprint for biometric recognition},
								  booktitle = {Ultrasonics Symposium (IUS), 2014 IEEE International},
								  year = {2014},
								  pages = {1388--1391},
								  url = {https://ieeexplore.ieee.org/document/6931989}
								}
								
Iula, A., Hine, G.E., Ramalli, A., Guidi, F., Boni, E., Savoia, A.S. and Caliano, G. An enhanced Ultrasound technique for 3D Palmprint Recognition 2013 Ultrasonics Symposium (IUS), 2013 IEEE International, pp. 978-981  inproceedings URL 
Abstract: In the present work, and enhanced ultrasound technique for extracting 3D palmprint for biometric recognition purposes is presented.
BibTeX:
								@inproceedings{iula2013enhanced,
								  author = {Iula, Antonio and Hine, Gabriel Emile and Ramalli, Alessandro and Guidi, Francesco and Boni, Enrico and Savoia, Alessandro Stuart and Caliano, Giosue},
								  title = {An enhanced Ultrasound technique for 3D Palmprint Recognition},
								  booktitle = {Ultrasonics Symposium (IUS), 2013 IEEE International},
								  year = {2013},
								  pages = {978--981},
								  url = {https://ieeexplore.ieee.org/document/6724875}
								}
								
Maiorana, E., Hine, G.E. and Campisi, P. Hill-climbing attack: Parametric optimization and possible countermeasures. an application to on-line signature recognition 2013 2013 International Conference on Biometrics (ICB), pp. 1-6  inproceedings URL 
Abstract: Although biometric recognition systems provide many advantages over traditional recognition methods, they can be vulnerable to specific attacks which may considerably decrease their security. In this paper we focus on the hill-climbing attack which is peculiar of biometric systems. Specifically, we evaluate the effectiveness of general approaches relying on parametric functions optimization for performing this kind of attack, and propose possible countermeasures which can be used for increasing the system robustness without significantly affecting its recognition performance. An application to on-line signature biometrics is taken into account to test both the proposed attacks and some possible countermeasures.
BibTeX:
								@inproceedings{maiorana2013hill,
								  author = {Maiorana, Emanuele and Hine, Gabriel E and Campisi, Patrizio},
								  title = {Hill-climbing attack: Parametric optimization and possible countermeasures. an application to on-line signature recognition},
								  booktitle = {2013 International Conference on Biometrics (ICB)},
								  year = {2013},
								  pages = {1--6},
								  url = {https://ieeexplore.ieee.org/document/6612961}
								}
								
Maiorana, E., Hine, G.E., La Rocca, D. and Campisi, P. On the vulnerability of an EEG-based biometric system to hill-climbing attacks algorithms' comparison and possible countermeasures 2013 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS), pp. 1-6  inproceedings URL 
Abstract: In this paper we analyze the vulnerability to hill-climbing attacks of a biometric recognition system based on electroencephalography (EEG). It is assumed that an attacker can access the scores produced by the employed matcher, and use them to control the generation of synthetic EEG templates until achieving a successful authentication. To this aim, different general approaches relying on function optimization are evaluated and compared in terms of authentication success rate and average number of required attempts. The possibility of increasing the system robustness against this kind of attacks, without significantly affecting its recognition performance, is also investigated.
BibTeX:
								@inproceedings{maiorana2013vulnerability,
								  author = {Maiorana, Emanuele and Hine, Gabriel Emile and La Rocca, Daria and Campisi, Patrizio},
								  title = {On the vulnerability of an EEG-based biometric system to hill-climbing attacks algorithms' comparison and possible countermeasures},
								  booktitle = {2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS)},
								  year = {2013},
								  pages = {1--6},
								  url = {https://ieeexplore.ieee.org/abstract/document/6712726}
								}