Neurokey: Towards a new paradigm of cancelable biometrics-based key generation using electroencephalograms

被引:37
|
作者
Bajwa, Garima [1 ]
Dantu, Ram [1 ]
机构
[1] Univ North Texas, Dept Comp Sci & Engn, Denton, TX 76203 USA
基金
美国国家科学基金会;
关键词
Authentication; Biometrics; Cryptography; Cryptographic keys; Electroencephalograms; Key generation; Security; AUTHENTICATION; EEG; SECURITY;
D O I
10.1016/j.cose.2016.06.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Background. Brain waves (electroencephalograms, EEG) can provide conscious, continuous human authentication for the proposed system. The advantage of brainwave biometry is that it is nearly impossible to forge or duplicate as the neuronal activity of people are distinctive even when they think about the same thing. Aim. We propose exploiting the brain as a biometric physical unclonable function (PUF). A user's EEG signals can be used to generate a unique and repeatable key that is resistant to cryptanalysis and eavesdropping, even against an adversary who obtains all the information regarding the system. Another objective is to implement a simplistic approach of cancelable biometrics by altering one's thoughts. Method. Features for the first step, Subject Authentication, are obtained from each task using the energy bands obtained from discrete Fourier transform and discrete wavelet transform. The second step constituting the Neurokey generation involves feature selection using normalized thresholds and segmentation window protocol. Results. We applied our methods to two datasets, the first based on five mental activities by seven subjects (325 samples) and the second based on three visually evoked tasks by 120 subjects (10,861 samples). These datasets were used to analyze the key generation process because they varied in the nature of data acquisition, environment, and activities. We determined the feasibility of our system using a smaller dataset first. We obtained a mean subject classification of 98.46% and 91.05% for Dataset I and Dataset II respectively. After an appropriate choice of features, the mean half total error rate for generating Neurokeys was 3.05% for Dataset I and 4.53% for Dataset II, averaged over the subjects, tasks, and electrodes. A unique key was established for each subject and task, and the error rates were analyzed for the Neurokey generation protocol. NIST statistical suite of randomness tests were applied on all the sequences obtained from the Neurokey generation process. Conclusions. A consistent, unique key for each subject can be obtained using EEG signals by collecting data from distinguishable cognitive activities. Moreover, the Neurokey can be changed easily by performing a different cognitive task, providing a means to change the biometrics in case of a compromise (cancelable). (C) 2016 Elsevier Ltd. All rights reserved.
引用
收藏
页码:95 / 113
页数:19
相关论文
共 50 条
  • [1] Biometrics-based cryptographic key generation
    Chang, YJ
    Zhang, WD
    Chen, TS
    2004 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXP (ICME), VOLS 1-3, 2004, : 2203 - 2206
  • [2] Robust biometrics-based key agreement scheme with smart cards towards a new architecture
    Zhu, Hongfeng
    Jiang, Man
    Hao, Xin
    Zhang, Yan
    Journal of Information Hiding and Multimedia Signal Processing, 2015, 6 (01): : 81 - 98
  • [3] BIOMETRICS-BASED GENERATION OF DIFFIE-HELLMAN KEY EXCHANGE PARAMETERS
    Kovacevic, Aldin
    Saracevic, Muzafer
    Hasic, Amor
    COMPUTER SCIENCE-AGH, 2024, 25 (03):
  • [4] RSA Key Generation From Cancelable Fingerprint Biometrics
    Sarkar, Arpita
    Singh, Binod Kr
    Bhaumik, Ujjayanta
    2017 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION, CONTROL AND AUTOMATION (ICCUBEA), 2017,
  • [5] Biometrics-based authentication: a new approach
    Sui, Yan
    Zou, Xukai
    Du, Eliza Yingzi
    2011 20TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN), 2011,
  • [6] BioSAKE: Biometrics-based Secure Authentication and Key Exchange
    Nandakumar, Karthik
    2013 INTERNATIONAL CONFERENCE ON BIOMETRICS (ICB), 2013,
  • [7] New robust biometrics-based mutual authentication scheme with key agreement using elliptic curve cryptography
    Qi, Mingping
    Chen, Jianhua
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (18) : 23335 - 23351
  • [8] New robust biometrics-based mutual authentication scheme with key agreement using elliptic curve cryptography
    Mingping Qi
    Jianhua Chen
    Multimedia Tools and Applications, 2018, 77 : 23335 - 23351
  • [9] Key binding biometrics-based remote user authentication scheme using smart cards
    Al-Saggaf, Alawi A.
    IET BIOMETRICS, 2018, 7 (03) : 278 - 284
  • [10] Biometrics-Based Secret Key Agreement by Public Discussion with RFID System
    Rodrigues, Marcus V. C.
    Masculo, Felipe M.
    de Assis, Francisco M.
    Albert, Bruno B.
    2014 INTERNATIONAL CONFERENCE ON CYBERWORLDS (CW), 2014, : 313 - 318