Fig. 6From: Person authentication based on eye-closed and visual stimulation using EEG signalsComparison results of EEG acquisition protocols for the afternoon session, S2Back to article page