BIOMETRICAL AUTHENTICATION SYSTEMS USING ELECTROENCEPHALOGRAPHY
DOI:
https://doi.org/10.28925/2663-4023.2022.15.196215Keywords:
brain-machine interface; BMI; brain-computer interface; BCI; electroencephalography; EEG; Equal Error Rate; EERAbstract
There has been a growing movement to connect brain science to medicine, education, and industry in recent years. Personal authentication can be divided into the following types: knowledge authentication, property authentication, and biometric authentication. Authentication by passwords or PINs used to log in to a device falls under knowledge authentication. Property-based authentication is based on a person’s property, such as a card or a key. Biometric Authentication is a personal authentication, which uses biometric information, and biometric authentication, such as fingerprints, irises, voiceprints, etc., has been developed. This article consists of eight sections about Biometrical Authentication and a conclusion. After introduction we had an overview on Biometric authentication in section two and then talking about biometric authentication technologies, further we discuss about already available authentication by physical characteristic such as Palm vein, fingerprint , iris recognition in chapter four, then we continue with behavioral authentication like voice authentication and it’s problems in chapter five, then in chapter six we explain biometric authentication with feature extraction which means using Machine learning and Artificial intelligence in Authentication systems and by having that in chapter seven we explained performance of authentication by feature extraction and comparing Equal Error Rate and Receiver Operating Characteristics, False Rejection Rate and False Acceptance Rate for performance evaluation and finally in chapter eight we showed how Electroencephalography data by using feature extraction can be used for authentication with k-Nearest Neighbor and Support Vector Machine methods. Furthermore, in this study, we used Relaxation EEG, which means brainwave authentication without mental tasks or external stimuli.
Downloads
References
Kawato, M. (2008). Brain-Network Interface. Journal of the Institute of Electronics. Information and
Communication Engineers, 91(2), 123–130.
Hotson, G., et al. (2016). Individual Finger Control of a Modular Prosthetic Limb using High-Density
Electrocorticography in a Human Subject. Journal of Neural Engineering, 13(2), 026017.
doi:10.1088/1741-2560/13/2/026017
Tanaka, K. (2012). Development of a Wheelchair Moved by Brain Wave Commands (Special Issue on the
Forefront of Robotics for Supporting People). Journal of the Japan Society for Precision Engineering,
(81), 662–665.
Rao, R. P. N., et al. (2014). A Direct Brain-to-Brain Interface in Humans. PLoS ONE, 9(11), e111332.
doi:10.1371/journal.pone.0111332
This Place. MindRDR. http://mindrdr.thisplace.com/static/index.html
Armstrong, B. C., et al. (2015). Brainprint: Assessing the Uniqueness, Collectability, and Permanence of a
Novel Method for ERP Biometrics. Neurocomputing, 166, 59–67. doi:10.1016/j.neucom.2015.04.025
Komatsu, N., Uchida, K., Ikeno, S., and Sakano, S. (2008). The Story of Biometrics, Japanese Standards
Association.
Thorpe, J., van Oorschot, P. C., and Somayaji, A. (2005). Pass-thoughts. Proceedings of the 2005 Workshop
on New Security Paradigms—NSPW’05. doi:10.1145/1146269.1146282
Ito, S., Mitsukura, Y., Fukumi, M., and Akamtsu, N. (2004). Proposal of the EEG Analysis Method Using
the Individual Characteristic of the EEG. IEEJ Transactions on Electronics, Information and Systems,
(6), 1259–1266. doi:10.1541/ieejeiss.124.1259
Kumari, P., and Vaish, A. (2014). Brainwave based Authentication System: Research Issues and
Challenges, International Journal of Computer Engineering and Applications, IV(I&II), 89–108.
Atzori, L., Iera, A., and Morabito, G. (2010). The Internet of Things: A Survey. Computer Networks,
(15), 2787–2805.
Watanabe, K. (2003). The Birth of Judicial Identity: Individual Identification and Registration in Civil
Society, Kotososha.
Hoshino, Y. (2005). Fingerprint Authentication Technology—Biometric Security, Tokyo Denki University
Press.
Toshiba. Fingerprint Authentication. http://www.it-serve.co.jp/products/security/fingerprint_attest.htm
Fujimori. Palm Vein Certification. http://www.fujitsu.com/jp/group/frontech/solutions/businesstechnology/security/palmsecure/
Hitachi. Finger Vein Authentication. http://www.hitachi-ics.co.jp/product/virsecur/vein/secure_sol.html
Fushidori. Iris Certification. http://atfe.fmworld.net/at/report/?id=320
Taigman, Y., Yang, M., Ranzato, M., and Wolf, L. (2014). DeepFace: Closing the Gap to Human-Level
Performance in Face Verification. 2014 IEEE Conference on Computer Vision and Pattern Recognition.
doi:10.1109/cvpr.2014.220
Cristianini, N. and Shawe-Taylor, J. (2005). Introduction to Support Vector Machines, Kyoritsu Publishing
Co.
Kumazawa, I. (1998). Learning and Neural Networks, Morikita Publishing Co.
Riera, A., et al. (2007). Unobtrusive Biometric System Based on Electroencephalogram Analysis.
EURASIP Journal on Advances in Signal Processing, 2008 (1). doi:10.1155/2008/143728
Ishikawa, Y., et al. (2015). A Personal Classification Method Using Spatial Information of Multi-channel
EEG. International Conference on Parallel and Distributed Processing International Conference on Parallel
and Distributed Processing Techniques and Applications, 1, 229–235.
Hema, C. R., Paulraj, M. P., and Kaur, H. (2008). Brain Signatures: A Modality for Biometric
Authentication. 2008 International Conference on Electronic Design. doi:10.1109/iced.2008.4786753
Marcel, S., and R. Millan, J. (2007). Person Authentication Using Brainwaves (EEG) and Maximum A
Posteriori Model Adaptation. IEEE Transactions on Pattern Analysis and Machine Intelligence, 29(4),
–752. doi:10.1109/tpami.2007.1012
Palaniappan, R., and Mandic, D. P. (2007). Biometrics from Brain Electrical Activity: A Machine Learning
Approach. IEEE Transactions on Pattern Analysis and Machine Intelligence, 29(4), 738–742.
doi:10.1109/tpami.2007.1013
Nakanishi, I., Fukuda, H., and Li, S. (2013). Biometric verification using brain waves toward on-demand
user management systems. Proceedings of the 6th International Conference on Security of Information and
Networks—SIN’13. doi:10.1145/2523514.2523536
Ishikawa, Y., Yoshida, C., Takata, M., and Joe, K. (2014). Validation of EEG Personal Authentication with
Multi-channels and Multi-tasks. International Conference on Parallel and Distributed Processing
International Conference on Parallel and Distributed Processing Techniques and Applications, 2, 182–188.
Kanamori, T., Takenouchi, T., and Murata, N. (2009). Pattern Recognition, Kyoritsu Publication.
Nagata, Y., and Munechika, M. (2001). Introduction to Multivariate Analysis Methods, Science, Inc.
Fisher, R. A. (1936). The Use of Multiple Measurements in Taxonomic Problems. Annals of Eugenics,
(2), 179–188. doi:10.1111/j.1469-1809.1936.tb02137.x
Karayama, H. (2014). Outdoor EEG Personal Authentication for Wearable BMI Operation. Intelligence
and Information, 26(2), 606–616.