TY - GEN
T1 - EEG-Based User Authentication Using Artifacts
AU - PHAM, Tien
AU - MA, Wanli
AU - TRAN, Dat
AU - NGUYEN, Phuoc
AU - PHUNG, Dinh
PY - 2014
Y1 - 2014
N2 - Recently, electroencephalography (EEG) is considered as a new potential type of user authentication with many security advantages of being difficult to fake, impossible to observe or intercept, unique, and alive person recording require. The difficulty is that EEG signals are very weak and subject to the contamination from many artifact signals. However, for the applications in human health, true EEG signals, without the contamination, is highly desirable, but for the purposes of authentication, where stable and repeatable patterns from the source signals are critical, the origins of the signals are of less concern. In this paper, we propose an EEG-based authentication method, which is simple to implement and easy to use, by taking the advantage of EEG artifacts, generated by a number of purposely designed voluntary facial muscle movements. These tasks can be single or combined, depending on the level of security required. Our experiment showed that using EEG artifacts for user authentication in multilevel security systems is promising.
AB - Recently, electroencephalography (EEG) is considered as a new potential type of user authentication with many security advantages of being difficult to fake, impossible to observe or intercept, unique, and alive person recording require. The difficulty is that EEG signals are very weak and subject to the contamination from many artifact signals. However, for the applications in human health, true EEG signals, without the contamination, is highly desirable, but for the purposes of authentication, where stable and repeatable patterns from the source signals are critical, the origins of the signals are of less concern. In this paper, we propose an EEG-based authentication method, which is simple to implement and easy to use, by taking the advantage of EEG artifacts, generated by a number of purposely designed voluntary facial muscle movements. These tasks can be single or combined, depending on the level of security required. Our experiment showed that using EEG artifacts for user authentication in multilevel security systems is promising.
KW - Authentication
KW - Biometrics
KW - EEG
KW - Pattern recognition
KW - Security
KW - biometrics
KW - security
KW - authentication
KW - pattern recognition
UR - http://www.scopus.com/inward/record.url?scp=84927749085&partnerID=8YFLogxK
UR - http://www.mendeley.com/research/eegbased-user-authentication-using-artifacts
U2 - 10.1007/978-3-319-07995-0_34
DO - 10.1007/978-3-319-07995-0_34
M3 - Conference contribution
SN - 9781479950492
VL - 299
T3 - Advances in Intelligent Systems and Computing
SP - 343
EP - 353
BT - International Joint Conference SOCO’14-CISIS’14-ICEUTE’14
A2 - de la Puerta, José Gaviria
A2 - Ferreira, Iván García
A2 - Bringas, Pablo García
A2 - Klett, Fanny
A2 - Abraham, Ajith
A2 - de Carvalho, André C.P.L.F.
A2 - Herrero, Álvaro
A2 - Baruque, Bruno
A2 - Quintián, Héctor
A2 - Corchado, Emilio
PB - Springer
CY - Cham, Switzerland
T2 - International Joint Conference SOCO'14-CISIS'14-ICEUTE'14
Y2 - 25 June 2014 through 27 June 2014
ER -