Skip to main content

EEG-Based User Authentication Using Artifacts

  • Conference paper

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 299))

Abstract

Recently, electroencephalography (EEG) is considered as a new potential type of user authentication with many security advantages of being difficult to fake, impossible to observe or intercept, unique, and alive person recording require. The difficulty is that EEG signals are very weak and subject to the contamination from many artifact signals. However, for the applications in human health, true EEG signals, without the contamination, is highly desirable, but for the purposes of authentication, where stable and repeatable patterns from the source signals are critical, the origins of the signals are of less concern. In this paper, we propose an EEG-based authentication method, which is simple to implement and easy to use, by taking the advantage of EEG artifacts, generated by a number of purposely designed voluntary facial muscle movements. These tasks can be single or combined, depending on the level of security required. Our experiment showed that using EEG artifacts for user authentication in multilevel security systems is promising.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Brigham, K., Kumar, B.V.K.V.: Subject Identification from Electroencephalogram (EEG) Signals During Imagined Speech. In: Proc. IEEE Fourth International Conference on Biometrics: Theory, Applications and Systems (BTAS 2010) (2010)

    Google Scholar 

  2. Brown, L.: Computer Security: Principles and Practice. William Stallings (2008)

    Google Scholar 

  3. Burges, J.: A tutorial on support vector machines for pattern recognition. Data Mining and Knowledge Discovery 2, 121–167 (1998)

    Article  Google Scholar 

  4. Chang, C., Lin, C.: LIBSVM: a library for support vector machines. ACM Transactions on Intelligent Systems and Technology (TIST) 2(3), 27 (2011)

    Google Scholar 

  5. Dix, A.: Human–computer interaction: A stable discipline, a nascent science, and the growth of the long tail. Interacting with Computers 22(1), 13–27 (2010)

    Article  MathSciNet  Google Scholar 

  6. Emotiv EPOC headset, http://www.emotiv.com/

  7. Experiment Wizard software tool, http://code.google.com/p/experiment-wizard/

  8. Hall, M., et al.: The WEKA data mining software: an update. ACM SIGKDD Explorations Newsletter 11(1), 10–18 (2009)

    Article  Google Scholar 

  9. Lenman, S., Bretzner, L., Thuresson, B.: Using marking menus to develop command sets for computer vision based hand gesture interfaces. In: Proceedings of the Second Nordic Conference on Human-Computer Interaction 2002, pp. 239–242. ACM, Aarhus (2002)

    Google Scholar 

  10. Marcel, S., Millán, J.R.: Person authentication using brainwaves (EEG) and maximum a posteriori model adaptation. IEEE Transactions on Pattern Analysis and Machine Intelligence 29, 743–752 (2007)

    Article  Google Scholar 

  11. Nakagawa, S., Wang, L., Ohtsuka, S.: Speaker Identification and Verification by Combining MFCC and Phase Information. IEEE Transactions on Audio, Speech, and Language Processing 20, 1085–1095 (2012)

    Article  Google Scholar 

  12. Nina, H., et al.: Integrating cognitive load theory and concepts of human–computer interaction. Computers in Human Behavior 26(6), 1278–1288 (2010)

    Article  Google Scholar 

  13. Nguyen, P., Tran, D., Huang, X., Ma, W.: Motor Imagery EEG-Based Person Verification. In: Rojas, I., Joya, G., Cabestany, J. (eds.) IWANN 2013, Part II. LNCS, vol. 7903, pp. 430–438. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  14. Palaniappan, R.: Two-stage biometric authentication method using thought activity brain waves. International Journal of Neural Systems 18 (2008)

    Google Scholar 

  15. Safont, G., Salazar, A., Soriano, A., Vergara, L.: Combination of multiple detectors for EEG based biometric identification/authentication. In: 2012 IEEE International Carnahan Conference on Security Technology (ICCST), pp. 230–236 (2012)

    Google Scholar 

  16. Sanei, S., Chambers, J.: EEG signal processing. Wiley-Interscience (2007)

    Google Scholar 

  17. Sun, S.: Multitask learning for EEG-based biometrics. In: 19th International Conference on Pattern Recognition, ICPR 2008, pp. 1–4 (2008)

    Google Scholar 

  18. Turk, M., Robertson, G.: Perceptual user interfaces. Communications of the ACM 43(3) (2000)

    Google Scholar 

  19. Welch, P.: The use of Fast Fourier Transform for the estimation of power spectra: a method based on time averaging over short, modified periodogram. IEEE Trans. Audio Electroacoustics, 70–73 (1967)

    Google Scholar 

  20. Zhao, W., Zhang, H.: Secure Fingerprint Recognition Based on Frobenius Norm. In: 2012 International Conference on Computer Science and Electronics Engineering, vol. 1, pp. 388–391 (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tien Pham .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Pham, T., Ma, W., Tran, D., Nguyen, P., Phung, D. (2014). EEG-Based User Authentication Using Artifacts. In: de la Puerta, J., et al. International Joint Conference SOCO’14-CISIS’14-ICEUTE’14. Advances in Intelligent Systems and Computing, vol 299. Springer, Cham. https://doi.org/10.1007/978-3-319-07995-0_34

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-07995-0_34

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-07994-3

  • Online ISBN: 978-3-319-07995-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics