EEG-Based User Authentication Using Artifacts

Tien PHAM, Wanli MA, Dat TRAN, Phuoc NGUYEN, Dinh PHUNG

Research output: A Conference proceeding or a Chapter in BookConference contribution

5 Citations (Scopus)

Abstract

Recently, electroencephalography (EEG) is considered as a new potential type of user authentication with many security advantages of being difficult to fake, impossible to observe or intercept, unique, and alive person recording require. The difficulty is that EEG signals are very weak and subject to the contamination from many artifact signals. However, for the applications in human health, true EEG signals, without the contamination, is highly desirable, but for the purposes of authentication, where stable and repeatable patterns from the source signals are critical, the origins of the signals are of less concern. In this paper, we propose an EEG-based authentication method, which is simple to implement and easy to use, by taking the advantage of EEG artifacts, generated by a number of purposely designed voluntary facial muscle movements. These tasks can be single or combined, depending on the level of security required. Our experiment showed that using EEG artifacts for user authentication in multilevel security systems is promising.
Original languageEnglish
Title of host publicationInternational Joint Conference SOCO’14-CISIS’14-ICEUTE’14
Subtitle of host publicationBilbao, Spain, June 25th–27th, 2014, Proceedings
EditorsJosé Gaviria de la Puerta, Iván García Ferreira, Pablo García Bringas, Fanny Klett, Ajith Abraham, André C.P.L.F. de Carvalho, Álvaro Herrero, Bruno Baruque, Héctor Quintián, Emilio Corchado
Place of PublicationCham, Switzerland
PublisherSpringer
Pages343-353
Number of pages10
Volume299
ISBN (Electronic)9783319079950
ISBN (Print)9781479950492
DOIs
Publication statusPublished - 2014
EventInternational Joint Conference SOCO'14-CISIS'14-ICEUTE'14 - Bilbao, Bilbao, Spain
Duration: 25 Jun 201427 Jun 2014

Publication series

NameAdvances in Intelligent Systems and Computing
Volume299
ISSN (Print)2194-5357
ISSN (Electronic)2194-5365

Conference

ConferenceInternational Joint Conference SOCO'14-CISIS'14-ICEUTE'14
CountrySpain
CityBilbao
Period25/06/1427/06/14

Fingerprint

Electroencephalography
Authentication
Contamination
Bioelectric potentials
Security systems
Muscle
Health
Experiments

Cite this

PHAM, T., MA, W., TRAN, D., NGUYEN, P., & PHUNG, D. (2014). EEG-Based User Authentication Using Artifacts. In J. G. de la Puerta, I. G. Ferreira, P. G. Bringas, F. Klett, A. Abraham, A. C. P. L. F. de Carvalho, Á. Herrero, B. Baruque, H. Quintián, ... E. Corchado (Eds.), International Joint Conference SOCO’14-CISIS’14-ICEUTE’14: Bilbao, Spain, June 25th–27th, 2014, Proceedings (Vol. 299, pp. 343-353). (Advances in Intelligent Systems and Computing; Vol. 299). Cham, Switzerland: Springer. https://doi.org/10.1007/978-3-319-07995-0_34
PHAM, Tien ; MA, Wanli ; TRAN, Dat ; NGUYEN, Phuoc ; PHUNG, Dinh. / EEG-Based User Authentication Using Artifacts. International Joint Conference SOCO’14-CISIS’14-ICEUTE’14: Bilbao, Spain, June 25th–27th, 2014, Proceedings. editor / José Gaviria de la Puerta ; Iván García Ferreira ; Pablo García Bringas ; Fanny Klett ; Ajith Abraham ; André C.P.L.F. de Carvalho ; Álvaro Herrero ; Bruno Baruque ; Héctor Quintián ; Emilio Corchado. Vol. 299 Cham, Switzerland : Springer, 2014. pp. 343-353 (Advances in Intelligent Systems and Computing).
@inproceedings{9ebf597805034e69a787b18578233523,
title = "EEG-Based User Authentication Using Artifacts",
abstract = "Recently, electroencephalography (EEG) is considered as a new potential type of user authentication with many security advantages of being difficult to fake, impossible to observe or intercept, unique, and alive person recording require. The difficulty is that EEG signals are very weak and subject to the contamination from many artifact signals. However, for the applications in human health, true EEG signals, without the contamination, is highly desirable, but for the purposes of authentication, where stable and repeatable patterns from the source signals are critical, the origins of the signals are of less concern. In this paper, we propose an EEG-based authentication method, which is simple to implement and easy to use, by taking the advantage of EEG artifacts, generated by a number of purposely designed voluntary facial muscle movements. These tasks can be single or combined, depending on the level of security required. Our experiment showed that using EEG artifacts for user authentication in multilevel security systems is promising.",
keywords = "Authentication, Biometrics, EEG, Pattern recognition, Security, biometrics, security, authentication, pattern recognition",
author = "Tien PHAM and Wanli MA and Dat TRAN and Phuoc NGUYEN and Dinh PHUNG",
year = "2014",
doi = "10.1007/978-3-319-07995-0_34",
language = "English",
isbn = "9781479950492",
volume = "299",
series = "Advances in Intelligent Systems and Computing",
publisher = "Springer",
pages = "343--353",
editor = "{de la Puerta}, {Jos{\'e} Gaviria} and Ferreira, {Iv{\'a}n Garc{\'i}a} and Bringas, {Pablo Garc{\'i}a} and Fanny Klett and Ajith Abraham and {de Carvalho}, {Andr{\'e} C.P.L.F.} and {\'A}lvaro Herrero and Bruno Baruque and H{\'e}ctor Quinti{\'a}n and Emilio Corchado",
booktitle = "International Joint Conference SOCO’14-CISIS’14-ICEUTE’14",
address = "Netherlands",

}

PHAM, T, MA, W, TRAN, D, NGUYEN, P & PHUNG, D 2014, EEG-Based User Authentication Using Artifacts. in JG de la Puerta, IG Ferreira, PG Bringas, F Klett, A Abraham, ACPLF de Carvalho, Á Herrero, B Baruque, H Quintián & E Corchado (eds), International Joint Conference SOCO’14-CISIS’14-ICEUTE’14: Bilbao, Spain, June 25th–27th, 2014, Proceedings. vol. 299, Advances in Intelligent Systems and Computing, vol. 299, Springer, Cham, Switzerland, pp. 343-353, International Joint Conference SOCO'14-CISIS'14-ICEUTE'14, Bilbao, Spain, 25/06/14. https://doi.org/10.1007/978-3-319-07995-0_34

EEG-Based User Authentication Using Artifacts. / PHAM, Tien; MA, Wanli; TRAN, Dat; NGUYEN, Phuoc; PHUNG, Dinh.

International Joint Conference SOCO’14-CISIS’14-ICEUTE’14: Bilbao, Spain, June 25th–27th, 2014, Proceedings. ed. / José Gaviria de la Puerta; Iván García Ferreira; Pablo García Bringas; Fanny Klett; Ajith Abraham; André C.P.L.F. de Carvalho; Álvaro Herrero; Bruno Baruque; Héctor Quintián; Emilio Corchado. Vol. 299 Cham, Switzerland : Springer, 2014. p. 343-353 (Advances in Intelligent Systems and Computing; Vol. 299).

Research output: A Conference proceeding or a Chapter in BookConference contribution

TY - GEN

T1 - EEG-Based User Authentication Using Artifacts

AU - PHAM, Tien

AU - MA, Wanli

AU - TRAN, Dat

AU - NGUYEN, Phuoc

AU - PHUNG, Dinh

PY - 2014

Y1 - 2014

N2 - Recently, electroencephalography (EEG) is considered as a new potential type of user authentication with many security advantages of being difficult to fake, impossible to observe or intercept, unique, and alive person recording require. The difficulty is that EEG signals are very weak and subject to the contamination from many artifact signals. However, for the applications in human health, true EEG signals, without the contamination, is highly desirable, but for the purposes of authentication, where stable and repeatable patterns from the source signals are critical, the origins of the signals are of less concern. In this paper, we propose an EEG-based authentication method, which is simple to implement and easy to use, by taking the advantage of EEG artifacts, generated by a number of purposely designed voluntary facial muscle movements. These tasks can be single or combined, depending on the level of security required. Our experiment showed that using EEG artifacts for user authentication in multilevel security systems is promising.

AB - Recently, electroencephalography (EEG) is considered as a new potential type of user authentication with many security advantages of being difficult to fake, impossible to observe or intercept, unique, and alive person recording require. The difficulty is that EEG signals are very weak and subject to the contamination from many artifact signals. However, for the applications in human health, true EEG signals, without the contamination, is highly desirable, but for the purposes of authentication, where stable and repeatable patterns from the source signals are critical, the origins of the signals are of less concern. In this paper, we propose an EEG-based authentication method, which is simple to implement and easy to use, by taking the advantage of EEG artifacts, generated by a number of purposely designed voluntary facial muscle movements. These tasks can be single or combined, depending on the level of security required. Our experiment showed that using EEG artifacts for user authentication in multilevel security systems is promising.

KW - Authentication

KW - Biometrics

KW - EEG

KW - Pattern recognition

KW - Security

KW - biometrics

KW - security

KW - authentication

KW - pattern recognition

UR - http://www.scopus.com/inward/record.url?scp=84927749085&partnerID=8YFLogxK

UR - http://www.mendeley.com/research/eegbased-user-authentication-using-artifacts

U2 - 10.1007/978-3-319-07995-0_34

DO - 10.1007/978-3-319-07995-0_34

M3 - Conference contribution

SN - 9781479950492

VL - 299

T3 - Advances in Intelligent Systems and Computing

SP - 343

EP - 353

BT - International Joint Conference SOCO’14-CISIS’14-ICEUTE’14

A2 - de la Puerta, José Gaviria

A2 - Ferreira, Iván García

A2 - Bringas, Pablo García

A2 - Klett, Fanny

A2 - Abraham, Ajith

A2 - de Carvalho, André C.P.L.F.

A2 - Herrero, Álvaro

A2 - Baruque, Bruno

A2 - Quintián, Héctor

A2 - Corchado, Emilio

PB - Springer

CY - Cham, Switzerland

ER -

PHAM T, MA W, TRAN D, NGUYEN P, PHUNG D. EEG-Based User Authentication Using Artifacts. In de la Puerta JG, Ferreira IG, Bringas PG, Klett F, Abraham A, de Carvalho ACPLF, Herrero Á, Baruque B, Quintián H, Corchado E, editors, International Joint Conference SOCO’14-CISIS’14-ICEUTE’14: Bilbao, Spain, June 25th–27th, 2014, Proceedings. Vol. 299. Cham, Switzerland: Springer. 2014. p. 343-353. (Advances in Intelligent Systems and Computing). https://doi.org/10.1007/978-3-319-07995-0_34