scispace - formally typeset
Open AccessJournal ArticleDOI

Combining Cryptography with EEG Biometrics.

TLDR
This work presents a biometric authentication method based on the discrete logarithm problem and Bose-Chaudhuri-Hocquenghem (BCH) codes, performs its security analysis, and demonstrates its security characteristics.
Abstract
Cryptographic frameworks depend on key sharing for ensuring security of data. While the keys in cryptographic frameworks must be correctly reproducible and not unequivocally connected to the identity of a user, in biometric frameworks this is different. Joining cryptography techniques with biometrics can solve these issues. We present a biometric authentication method based on the discrete logarithm problem and Bose-Chaudhuri-Hocquenghem (BCH) codes, perform its security analysis, and demonstrate its security characteristics. We evaluate a biometric cryptosystem using our own dataset of electroencephalography (EEG) data collected from 42 subjects. The experimental results show that the described biometric user authentication system is effective, achieving an Equal Error Rate (ERR) of 0.024.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Comparison between Concentration and Immersion Based on EEG Analysis.

TL;DR: In this study, Concentration and immersion states were induced to analyze the electroencephalography (EEG) changes during these states to imply diagnostic capabilities of various other mental states.
Journal ArticleDOI

Validation of Electroencephalographic Recordings Obtained with a Consumer-Grade, Single Dry Electrode, Low-Cost Device: A Comparative Study.

TL;DR: Overall, the NeuroSky MindWave is noise-limited, but provides stable recordings even through long periods of time, which would be of adequate quality compared to that of conventional wet electrode EEG devices, except for a potential calibration error and spectral differences at low frequencies.
Journal ArticleDOI

Development of a Modular Board for EEG Signal Acquisition.

TL;DR: The design and evaluation of a compact, modular, battery powered, conventional EEG signal acquisition board based on an ADS1298 analog front-end chip is presented and can be qualified as a low-cost precision cEEG research device.
Journal ArticleDOI

Multimodal EEG and Keystroke Dynamics Based Biometric System Using Machine Learning Algorithms

TL;DR: In this article, a multimodal biometric system combining EEG and keystroke dynamics is proposed, which can be considered secure and reliable for any kind of biometric identification and authentication.
Journal ArticleDOI

Secure ear biometrics using circular kernel principal component analysis, Chebyshev transform hashing and Bose–Chaudhuri–Hocquenghem error-correcting codes

TL;DR: This work applies iterative closest point and kernel principal component analysis with circular kernel for feature extraction while using a circular kernel function, combined with empirical mode decomposition into intrinsic mode functions perceptual hashing using and fast Chebyshev transform, and a secure authentication approach that exploits the discrete logarithm problem and Bose–Chaudhuri–Hocquenghem error-correcting codes to generate 128-bit crypto keys.
References
More filters
Proceedings ArticleDOI

A fuzzy commitment scheme

TL;DR: Because the fuzzy commitment scheme is tolerant of error, it is capable of protecting biometric data just as conventional cryptographic techniques, like hash functions, are used to protect alphanumeric passwords.
Proceedings ArticleDOI

A fuzzy vault scheme

TL;DR: In this article, the authors describe a fuzzy vault construction that allows Alice to place a secret value /spl kappa/ in a secure vault and lock it using an unordered set A of elements from some public universe U. If Bob tries to "unlock" the vault using B, he obtains the secret value if B is close to A, i.e., only if A and B overlap substantially.
Journal ArticleDOI

A survey on biometric cryptosystems and cancelable biometrics

TL;DR: A comprehensive survey of biometric cryptosystems and cancelable biometrics is presented and state-of-the-art approaches are reviewed based on which an in-depth discussion and an outlook to future prospects are given.
Journal ArticleDOI

Combining Crypto with Biometrics Effectively

TL;DR: The first practical and secure way to integrate the iris biometric into cryptographic applications is proposed, and an error-free key can be reproduced reliably from genuine iris codes with a 99.5 percent success rate.
Journal ArticleDOI

A Fuzzy Vault Scheme

TL;DR: In this paper, the authors describe a fuzzy vault, a cryptographic construction that allows a player Alice to place a secret value in a secure vault and "lock" it using a set A of elements from some public universe U. If Bob tries to "unlock" the vault using another set B of similar length, he obtains only if B is close to A, i.e., only if A and B overlap substantially.
Related Papers (5)