A Study on the Feasibility of Using EEG Signals for Authentication Purpose

Wanli MA, Dat TRAN, Phuoc Nguyen

Research output: A Conference proceeding or a Chapter in BookConference contribution

10 Citations (Scopus)
6 Downloads (Pure)

Abstract

Authentication is to verify if one is who he/she claims. It plays an important role in security systems. In this paper, we study the feasibility of using Electroencephalography EEG brain signals for authentication purpose. In a general sense, there are three types of authentications including password based, token based, and biometric based. Each of them has its own merit and drawback. Technology advancing makes it possible to easily obtain EEG signals. The evidences show that finding repeatable and stable brainwave patterns in EEG data is feasible. The prospect of using EEG signals for authentication is promising. An EEG based authentication system has the combined advantages of both password based and biometric based authentication systems, yet without their drawbacks. Therefore, it makes an EEG signal based authentication suitable for especially high security system. Through the analysis and processing of EEG signals of motor imagery from BCI Competition, our experiment results confirm the theories stated in this paper.
Original languageEnglish
Title of host publicationProceedings of the 20th International Conference on Neural Information Processing (ICONIP 2013), Part II
Subtitle of host publicationLecture Notes in Computer Science
EditorsMinho Lee, Akira Hirose, Zeng-Guang Hou, Rhee Man Kil
Place of PublicationHeidelberg
PublisherSpringer
Pages562-569
Number of pages8
Volume8227
ISBN (Print)9783642420412
Publication statusPublished - 2013
Event20th International Conference on Neural Information Processing (ICONIP 2013) - Daegu, Daegu, Korea, Republic of
Duration: 3 Nov 20137 Nov 2013

Conference

Conference20th International Conference on Neural Information Processing (ICONIP 2013)
Abbreviated titleICONIP 2013
CountryKorea, Republic of
CityDaegu
Period3/11/137/11/13

Fingerprint

Electroencephalography
Authentication
Biometrics
Security systems
Brain
Processing

Cite this

MA, W., TRAN, D., & Nguyen, P. (2013). A Study on the Feasibility of Using EEG Signals for Authentication Purpose. In M. Lee, A. Hirose, Z-G. Hou, & R. M. Kil (Eds.), Proceedings of the 20th International Conference on Neural Information Processing (ICONIP 2013), Part II: Lecture Notes in Computer Science (Vol. 8227, pp. 562-569). Heidelberg: Springer.
MA, Wanli ; TRAN, Dat ; Nguyen, Phuoc. / A Study on the Feasibility of Using EEG Signals for Authentication Purpose. Proceedings of the 20th International Conference on Neural Information Processing (ICONIP 2013), Part II: Lecture Notes in Computer Science. editor / Minho Lee ; Akira Hirose ; Zeng-Guang Hou ; Rhee Man Kil. Vol. 8227 Heidelberg : Springer, 2013. pp. 562-569
@inproceedings{d45e618350fa4b5b8fdb6de5c76dce74,
title = "A Study on the Feasibility of Using EEG Signals for Authentication Purpose",
abstract = "Authentication is to verify if one is who he/she claims. It plays an important role in security systems. In this paper, we study the feasibility of using Electroencephalography EEG brain signals for authentication purpose. In a general sense, there are three types of authentications including password based, token based, and biometric based. Each of them has its own merit and drawback. Technology advancing makes it possible to easily obtain EEG signals. The evidences show that finding repeatable and stable brainwave patterns in EEG data is feasible. The prospect of using EEG signals for authentication is promising. An EEG based authentication system has the combined advantages of both password based and biometric based authentication systems, yet without their drawbacks. Therefore, it makes an EEG signal based authentication suitable for especially high security system. Through the analysis and processing of EEG signals of motor imagery from BCI Competition, our experiment results confirm the theories stated in this paper.",
keywords = "Use Authentication, EEG",
author = "Wanli MA and Dat TRAN and Phuoc Nguyen",
year = "2013",
language = "English",
isbn = "9783642420412",
volume = "8227",
pages = "562--569",
editor = "Minho Lee and Akira Hirose and Zeng-Guang Hou and Kil, {Rhee Man}",
booktitle = "Proceedings of the 20th International Conference on Neural Information Processing (ICONIP 2013), Part II",
publisher = "Springer",
address = "Netherlands",

}

MA, W, TRAN, D & Nguyen, P 2013, A Study on the Feasibility of Using EEG Signals for Authentication Purpose. in M Lee, A Hirose, Z-G Hou & RM Kil (eds), Proceedings of the 20th International Conference on Neural Information Processing (ICONIP 2013), Part II: Lecture Notes in Computer Science. vol. 8227, Springer, Heidelberg, pp. 562-569, 20th International Conference on Neural Information Processing (ICONIP 2013), Daegu, Korea, Republic of, 3/11/13.

A Study on the Feasibility of Using EEG Signals for Authentication Purpose. / MA, Wanli; TRAN, Dat; Nguyen, Phuoc.

Proceedings of the 20th International Conference on Neural Information Processing (ICONIP 2013), Part II: Lecture Notes in Computer Science. ed. / Minho Lee; Akira Hirose; Zeng-Guang Hou; Rhee Man Kil. Vol. 8227 Heidelberg : Springer, 2013. p. 562-569.

Research output: A Conference proceeding or a Chapter in BookConference contribution

TY - GEN

T1 - A Study on the Feasibility of Using EEG Signals for Authentication Purpose

AU - MA, Wanli

AU - TRAN, Dat

AU - Nguyen, Phuoc

PY - 2013

Y1 - 2013

N2 - Authentication is to verify if one is who he/she claims. It plays an important role in security systems. In this paper, we study the feasibility of using Electroencephalography EEG brain signals for authentication purpose. In a general sense, there are three types of authentications including password based, token based, and biometric based. Each of them has its own merit and drawback. Technology advancing makes it possible to easily obtain EEG signals. The evidences show that finding repeatable and stable brainwave patterns in EEG data is feasible. The prospect of using EEG signals for authentication is promising. An EEG based authentication system has the combined advantages of both password based and biometric based authentication systems, yet without their drawbacks. Therefore, it makes an EEG signal based authentication suitable for especially high security system. Through the analysis and processing of EEG signals of motor imagery from BCI Competition, our experiment results confirm the theories stated in this paper.

AB - Authentication is to verify if one is who he/she claims. It plays an important role in security systems. In this paper, we study the feasibility of using Electroencephalography EEG brain signals for authentication purpose. In a general sense, there are three types of authentications including password based, token based, and biometric based. Each of them has its own merit and drawback. Technology advancing makes it possible to easily obtain EEG signals. The evidences show that finding repeatable and stable brainwave patterns in EEG data is feasible. The prospect of using EEG signals for authentication is promising. An EEG based authentication system has the combined advantages of both password based and biometric based authentication systems, yet without their drawbacks. Therefore, it makes an EEG signal based authentication suitable for especially high security system. Through the analysis and processing of EEG signals of motor imagery from BCI Competition, our experiment results confirm the theories stated in this paper.

KW - Use Authentication

KW - EEG

M3 - Conference contribution

SN - 9783642420412

VL - 8227

SP - 562

EP - 569

BT - Proceedings of the 20th International Conference on Neural Information Processing (ICONIP 2013), Part II

A2 - Lee, Minho

A2 - Hirose, Akira

A2 - Hou, Zeng-Guang

A2 - Kil, Rhee Man

PB - Springer

CY - Heidelberg

ER -

MA W, TRAN D, Nguyen P. A Study on the Feasibility of Using EEG Signals for Authentication Purpose. In Lee M, Hirose A, Hou Z-G, Kil RM, editors, Proceedings of the 20th International Conference on Neural Information Processing (ICONIP 2013), Part II: Lecture Notes in Computer Science. Vol. 8227. Heidelberg: Springer. 2013. p. 562-569