Privacy Preserving EEG-based Authentication Using Perceptual Hashing

The use of electroencephalogram (EEG), an electrophysiological monitoring method for recording the brain activity, for authentication has attracted the interest of researchers for over a decade. In addition to exhibiting qualities of biometric-based authentication, they are revocable, impossible to...

Full description

Bibliographic Details
Main Author: Koppikar, Samir Dilip
Other Authors: Takabi, Hassan
Format: Others
Language:English
Published: University of North Texas 2016
Subjects:
Online Access:https://digital.library.unt.edu/ark:/67531/metadc955127/
id ndltd-unt.edu-info-ark-67531-metadc955127
record_format oai_dc
spelling ndltd-unt.edu-info-ark-67531-metadc9551272020-07-15T07:09:31Z Privacy Preserving EEG-based Authentication Using Perceptual Hashing Koppikar, Samir Dilip Bio-signals Electroencephalogram (EEG) Perceptual hashing Data protection. Biometric identification. Brain fingerprinting. Electroencephalography. Hashing (computer science) The use of electroencephalogram (EEG), an electrophysiological monitoring method for recording the brain activity, for authentication has attracted the interest of researchers for over a decade. In addition to exhibiting qualities of biometric-based authentication, they are revocable, impossible to mimic, and resistant to coercion attacks. However, EEG signals carry a wealth of information about an individual and can reveal private information about the user. This brings significant privacy issues to EEG-based authentication systems as they have access to raw EEG signals. This thesis proposes a privacy-preserving EEG-based authentication system that preserves the privacy of the user by not revealing the raw EEG signals while allowing the system to authenticate the user accurately. In that, perceptual hashing is utilized and instead of raw EEG signals, their perceptually hashed values are used in the authentication process. In addition to describing the authentication process, algorithms to compute the perceptual hash are developed based on two feature extraction techniques. Experimental results show that an authentication system using perceptual hashing can achieve performance comparable to a system that has access to raw EEG signals if enough EEG channels are used in the process. This thesis also presents a security analysis to show that perceptual hashing can prevent information leakage. University of North Texas Takabi, Hassan Caragea, Cornelia Yuan, Xiaohui 2016-12 Thesis or Dissertation vii, 61 pages : illustrations. Text local-cont-no: submission_442 https://digital.library.unt.edu/ark:/67531/metadc955127/ ark: ark:/67531/metadc955127 English Use restricted to UNT Community Koppikar, Samir Dilip Copyright Copyright is held by the author, unless otherwise noted. All rights Reserved.
collection NDLTD
language English
format Others
sources NDLTD
topic Bio-signals
Electroencephalogram (EEG)
Perceptual hashing
Data protection.
Biometric identification.
Brain fingerprinting.
Electroencephalography.
Hashing (computer science)
spellingShingle Bio-signals
Electroencephalogram (EEG)
Perceptual hashing
Data protection.
Biometric identification.
Brain fingerprinting.
Electroencephalography.
Hashing (computer science)
Koppikar, Samir Dilip
Privacy Preserving EEG-based Authentication Using Perceptual Hashing
description The use of electroencephalogram (EEG), an electrophysiological monitoring method for recording the brain activity, for authentication has attracted the interest of researchers for over a decade. In addition to exhibiting qualities of biometric-based authentication, they are revocable, impossible to mimic, and resistant to coercion attacks. However, EEG signals carry a wealth of information about an individual and can reveal private information about the user. This brings significant privacy issues to EEG-based authentication systems as they have access to raw EEG signals. This thesis proposes a privacy-preserving EEG-based authentication system that preserves the privacy of the user by not revealing the raw EEG signals while allowing the system to authenticate the user accurately. In that, perceptual hashing is utilized and instead of raw EEG signals, their perceptually hashed values are used in the authentication process. In addition to describing the authentication process, algorithms to compute the perceptual hash are developed based on two feature extraction techniques. Experimental results show that an authentication system using perceptual hashing can achieve performance comparable to a system that has access to raw EEG signals if enough EEG channels are used in the process. This thesis also presents a security analysis to show that perceptual hashing can prevent information leakage.
author2 Takabi, Hassan
author_facet Takabi, Hassan
Koppikar, Samir Dilip
author Koppikar, Samir Dilip
author_sort Koppikar, Samir Dilip
title Privacy Preserving EEG-based Authentication Using Perceptual Hashing
title_short Privacy Preserving EEG-based Authentication Using Perceptual Hashing
title_full Privacy Preserving EEG-based Authentication Using Perceptual Hashing
title_fullStr Privacy Preserving EEG-based Authentication Using Perceptual Hashing
title_full_unstemmed Privacy Preserving EEG-based Authentication Using Perceptual Hashing
title_sort privacy preserving eeg-based authentication using perceptual hashing
publisher University of North Texas
publishDate 2016
url https://digital.library.unt.edu/ark:/67531/metadc955127/
work_keys_str_mv AT koppikarsamirdilip privacypreservingeegbasedauthenticationusingperceptualhashing
_version_ 1719329414821445632