Neurokey: Towards a new paradigm of cancelable biometrics-based key generation using electroencephalograms

被引:38
作者
Bajwa, Garima [1 ]
Dantu, Ram [1 ]
机构
[1] Univ North Texas, Dept Comp Sci & Engn, Denton, TX 76203 USA
基金
美国国家科学基金会;
关键词
Authentication; Biometrics; Cryptography; Cryptographic keys; Electroencephalograms; Key generation; Security; AUTHENTICATION; EEG; SECURITY;
D O I
10.1016/j.cose.2016.06.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Background. Brain waves (electroencephalograms, EEG) can provide conscious, continuous human authentication for the proposed system. The advantage of brainwave biometry is that it is nearly impossible to forge or duplicate as the neuronal activity of people are distinctive even when they think about the same thing. Aim. We propose exploiting the brain as a biometric physical unclonable function (PUF). A user's EEG signals can be used to generate a unique and repeatable key that is resistant to cryptanalysis and eavesdropping, even against an adversary who obtains all the information regarding the system. Another objective is to implement a simplistic approach of cancelable biometrics by altering one's thoughts. Method. Features for the first step, Subject Authentication, are obtained from each task using the energy bands obtained from discrete Fourier transform and discrete wavelet transform. The second step constituting the Neurokey generation involves feature selection using normalized thresholds and segmentation window protocol. Results. We applied our methods to two datasets, the first based on five mental activities by seven subjects (325 samples) and the second based on three visually evoked tasks by 120 subjects (10,861 samples). These datasets were used to analyze the key generation process because they varied in the nature of data acquisition, environment, and activities. We determined the feasibility of our system using a smaller dataset first. We obtained a mean subject classification of 98.46% and 91.05% for Dataset I and Dataset II respectively. After an appropriate choice of features, the mean half total error rate for generating Neurokeys was 3.05% for Dataset I and 4.53% for Dataset II, averaged over the subjects, tasks, and electrodes. A unique key was established for each subject and task, and the error rates were analyzed for the Neurokey generation protocol. NIST statistical suite of randomness tests were applied on all the sequences obtained from the Neurokey generation process. Conclusions. A consistent, unique key for each subject can be obtained using EEG signals by collecting data from distinguishable cognitive activities. Moreover, the Neurokey can be changed easily by performing a different cognitive task, providing a means to change the biometrics in case of a compromise (cancelable). (C) 2016 Elsevier Ltd. All rights reserved.
引用
收藏
页码:95 / 113
页数:19
相关论文
共 60 条
[41]  
Palaniappan R, 2003, ICICS-PCM 2003, VOLS 1-3, PROCEEDINGS, P1442
[42]  
Palaniappan R, 2011, COMM COM INF SC, V193, P378
[43]  
Paranjape RB, 2001, CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING 2001, VOLS I AND II, CONFERENCE PROCEEDINGS, P1363, DOI 10.1109/CCECE.2001.933649
[44]  
Patrick AS, 2008, FINGERPRINT PERFORMA
[45]  
Petitcolas F.A., 2011, Encyclopedia of cryptography and security, P675
[46]  
Poulos M., 1999, ICECS'99. Proceedings of ICECS '99. 6th IEEE International Conference on Electronics, Circuits and Systems (Cat. No.99EX357), P283, DOI 10.1109/ICECS.1999.812278
[47]  
Poulos M, 2002, METHOD INFORM MED, V41, P64
[48]   Enhancing security and privacy in biometrics-based authentication systems [J].
Ratha, NK ;
Connell, JH ;
Bolle, RM .
IBM SYSTEMS JOURNAL, 2001, 40 (03) :614-634
[49]   A survey on biometric cryptosystems and cancelable biometrics [J].
Rathgeb C. ;
Uhl A. .
Eurasip Journal on Information Security, 2011, 2011 (1)
[50]  
Revett K., 2010, Proceedings of the 2010 International Conference on Emerging Security Technologies (EST 2010), P71, DOI 10.1109/EST.2010.32