Neurokey: Towards a new paradigm of cancelable biometrics-based key generation using electroencephalograms

被引:37
|
作者
Bajwa, Garima [1 ]
Dantu, Ram [1 ]
机构
[1] Univ North Texas, Dept Comp Sci & Engn, Denton, TX 76203 USA
基金
美国国家科学基金会;
关键词
Authentication; Biometrics; Cryptography; Cryptographic keys; Electroencephalograms; Key generation; Security; AUTHENTICATION; EEG; SECURITY;
D O I
10.1016/j.cose.2016.06.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Background. Brain waves (electroencephalograms, EEG) can provide conscious, continuous human authentication for the proposed system. The advantage of brainwave biometry is that it is nearly impossible to forge or duplicate as the neuronal activity of people are distinctive even when they think about the same thing. Aim. We propose exploiting the brain as a biometric physical unclonable function (PUF). A user's EEG signals can be used to generate a unique and repeatable key that is resistant to cryptanalysis and eavesdropping, even against an adversary who obtains all the information regarding the system. Another objective is to implement a simplistic approach of cancelable biometrics by altering one's thoughts. Method. Features for the first step, Subject Authentication, are obtained from each task using the energy bands obtained from discrete Fourier transform and discrete wavelet transform. The second step constituting the Neurokey generation involves feature selection using normalized thresholds and segmentation window protocol. Results. We applied our methods to two datasets, the first based on five mental activities by seven subjects (325 samples) and the second based on three visually evoked tasks by 120 subjects (10,861 samples). These datasets were used to analyze the key generation process because they varied in the nature of data acquisition, environment, and activities. We determined the feasibility of our system using a smaller dataset first. We obtained a mean subject classification of 98.46% and 91.05% for Dataset I and Dataset II respectively. After an appropriate choice of features, the mean half total error rate for generating Neurokeys was 3.05% for Dataset I and 4.53% for Dataset II, averaged over the subjects, tasks, and electrodes. A unique key was established for each subject and task, and the error rates were analyzed for the Neurokey generation protocol. NIST statistical suite of randomness tests were applied on all the sequences obtained from the Neurokey generation process. Conclusions. A consistent, unique key for each subject can be obtained using EEG signals by collecting data from distinguishable cognitive activities. Moreover, the Neurokey can be changed easily by performing a different cognitive task, providing a means to change the biometrics in case of a compromise (cancelable). (C) 2016 Elsevier Ltd. All rights reserved.
引用
收藏
页码:95 / 113
页数:19
相关论文
共 50 条
  • [31] A Biometrics-Based Remote User Authentication Scheme Using Smart Cards
    Cui, Jianming
    Sui, Rongquan
    Zhang, Xiaojun
    Li, Hengzhong
    Cao, Ning
    CLOUD COMPUTING AND SECURITY, PT IV, 2018, 11066 : 531 - 542
  • [32] An Improvement of Robust Biometrics-Based Authentication and Key Agreement Scheme for Multi-Server Environments Using Smart Cards
    Moon, Jongho
    Choi, Younsung
    Jung, Jaewook
    Won, Dongho
    PLOS ONE, 2015, 10 (12):
  • [33] Cancelable Biometrics Vault: A Secure Key-Binding Biometric Cryptosystem based on Chaffing and Winnowing
    Ouda, Osama
    Nandakumar, Karthik
    Ross, Arun
    2020 25TH INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION (ICPR), 2021, : 8735 - 8742
  • [34] A provably secure biometrics-based authenticated key agreement scheme for multi-server environments
    Kumari, Saru
    Das, Ashok Kumar
    Li, Xiong
    Wu, Fan
    Khan, Muhammad Khurram
    Jiang, Qi
    Islam, S. K. Hafizul
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (02) : 2359 - 2389
  • [35] Chaotic maps and biometrics-based anonymous three-party authenticated key exchange protocol without using passwords
    谢琪
    胡斌
    陈克非
    刘文浩
    谭肖
    Chinese Physics B, 2015, 24 (11) : 167 - 174
  • [36] Chaotic maps and biometrics-based anonymous three-party authenticated key exchange protocol without using passwords
    Xie Qi
    Hu Bin
    Chen Ke-Fei
    Liu Wen-Hao
    Tan Xiao
    CHINESE PHYSICS B, 2015, 24 (11)
  • [37] A provably secure biometrics-based authenticated key agreement scheme for multi-server environments
    Saru Kumari
    Ashok Kumar Das
    Xiong Li
    Fan Wu
    Muhammad Khurram Khan
    Qi Jiang
    S. K. Hafizul Islam
    Multimedia Tools and Applications, 2018, 77 : 2359 - 2389
  • [38] Anonymous biometrics-based authentication scheme with key distribution for mobile multi-server environment
    Feng, Qi
    He, Debiao
    Zeadally, Sherali
    Wang, Huaqun
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 84 : 239 - 251
  • [39] An efficient biometrics-based remote user authentication scheme using smart cards
    Li, Chun-Ta
    Hwang, Min-Shiang
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2010, 33 (01) : 1 - 5
  • [40] Cryptanalysis and improvement of a biometrics-based authentication and key agreement scheme for multi-server environments
    Yang, Li
    Zheng, Zhiming
    PLOS ONE, 2018, 13 (03):