Neurokey: Towards a new paradigm of cancelable biometrics-based key generation using electroencephalograms

被引:37
|
作者
Bajwa, Garima [1 ]
Dantu, Ram [1 ]
机构
[1] Univ North Texas, Dept Comp Sci & Engn, Denton, TX 76203 USA
基金
美国国家科学基金会;
关键词
Authentication; Biometrics; Cryptography; Cryptographic keys; Electroencephalograms; Key generation; Security; AUTHENTICATION; EEG; SECURITY;
D O I
10.1016/j.cose.2016.06.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Background. Brain waves (electroencephalograms, EEG) can provide conscious, continuous human authentication for the proposed system. The advantage of brainwave biometry is that it is nearly impossible to forge or duplicate as the neuronal activity of people are distinctive even when they think about the same thing. Aim. We propose exploiting the brain as a biometric physical unclonable function (PUF). A user's EEG signals can be used to generate a unique and repeatable key that is resistant to cryptanalysis and eavesdropping, even against an adversary who obtains all the information regarding the system. Another objective is to implement a simplistic approach of cancelable biometrics by altering one's thoughts. Method. Features for the first step, Subject Authentication, are obtained from each task using the energy bands obtained from discrete Fourier transform and discrete wavelet transform. The second step constituting the Neurokey generation involves feature selection using normalized thresholds and segmentation window protocol. Results. We applied our methods to two datasets, the first based on five mental activities by seven subjects (325 samples) and the second based on three visually evoked tasks by 120 subjects (10,861 samples). These datasets were used to analyze the key generation process because they varied in the nature of data acquisition, environment, and activities. We determined the feasibility of our system using a smaller dataset first. We obtained a mean subject classification of 98.46% and 91.05% for Dataset I and Dataset II respectively. After an appropriate choice of features, the mean half total error rate for generating Neurokeys was 3.05% for Dataset I and 4.53% for Dataset II, averaged over the subjects, tasks, and electrodes. A unique key was established for each subject and task, and the error rates were analyzed for the Neurokey generation protocol. NIST statistical suite of randomness tests were applied on all the sequences obtained from the Neurokey generation process. Conclusions. A consistent, unique key for each subject can be obtained using EEG signals by collecting data from distinguishable cognitive activities. Moreover, the Neurokey can be changed easily by performing a different cognitive task, providing a means to change the biometrics in case of a compromise (cancelable). (C) 2016 Elsevier Ltd. All rights reserved.
引用
收藏
页码:95 / 113
页数:19
相关论文
共 50 条
  • [41] An Enhanced Biometrics-based Remote User Authentication Scheme Using Smart Cards
    Lu, Jian-Zhu
    Chen, Ting
    Zhou, Jipeng
    Yang, Jinjin
    Jiang, Junhui
    2013 6TH INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING (CISP), VOLS 1-3, 2013, : 1643 - 1648
  • [42] Recursive hiding of biometrics-based secret sharing scheme using adversary structure
    Lai, Hong
    Xiao, Jinghua
    Li, Lixiang
    Yang, Yixian
    INFORMATION PROCESSING LETTERS, 2012, 112 (17-18) : 683 - 687
  • [43] A secure three-factor authentication and biometrics-based key agreement scheme for TMIS with user anonymity
    Sammoud, Amal
    Chalouf, Mohamed Aymen
    Hamdi, Omessaad
    Montavont, Nicolas
    Bouallegue, Ammar
    2020 16TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE, IWCMC, 2020, : 1916 - 1921
  • [44] Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards
    Li, Xiong
    Niu, Jian-Wei
    Ma, Jian
    Wang, Wen-Dong
    Liu, Cheng-Lian
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (01) : 73 - 79
  • [45] New biometrics-based authentication scheme for multi-server environment in critical systems
    Han Shen
    Chongzhi Gao
    Debiao He
    Libing Wu
    Journal of Ambient Intelligence and Humanized Computing, 2015, 6 : 825 - 834
  • [46] A Secure Biometrics-Based Multi-Server Authentication Protocol Using Smart Cards
    Odelu, Vanga
    Das, Ashok Kumar
    Goswami, Adrijit
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (09) : 1953 - 1966
  • [47] Soft biometrics-based face image retrieval using improved grey wolf optimisation
    Sikkandar, Haseena
    Thiyagarajan, Revathi
    IET IMAGE PROCESSING, 2020, 14 (03) : 451 - 461
  • [48] Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards
    State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China
    不详
    不详
    J Network Comput Appl, 1 (73-79):
  • [49] New biometrics-based authentication scheme for multi-server environment in critical systems
    Shen, Han
    Gao, Chongzhi
    He, Debiao
    Wu, Libing
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2015, 6 (06) : 825 - 834
  • [50] AN ONLINE BIOMETRICS-BASED SECRET SHARING SCHEME FOR MULTIPARTY CRYPTOSYSTEM USING SMART CARDS
    Li, Chun-Ta
    Hwang, Min-Shiang
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2010, 6 (05): : 2181 - 2188