Privacy Preserving EEG-based Authentication Using Perceptual Hashing
The use of electroencephalogram (EEG), an electrophysiological monitoring method for recording the brain activity, for authentication has attracted the interest of researchers for over a decade. In addition to exhibiting qualities of biometric-based authentication, they are revocable, impossible to...
Main Author: | |
---|---|
Other Authors: | |
Format: | Others |
Language: | English |
Published: |
University of North Texas
2016
|
Subjects: | |
Online Access: | https://digital.library.unt.edu/ark:/67531/metadc955127/ |
id |
ndltd-unt.edu-info-ark-67531-metadc955127 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-unt.edu-info-ark-67531-metadc9551272020-07-15T07:09:31Z Privacy Preserving EEG-based Authentication Using Perceptual Hashing Koppikar, Samir Dilip Bio-signals Electroencephalogram (EEG) Perceptual hashing Data protection. Biometric identification. Brain fingerprinting. Electroencephalography. Hashing (computer science) The use of electroencephalogram (EEG), an electrophysiological monitoring method for recording the brain activity, for authentication has attracted the interest of researchers for over a decade. In addition to exhibiting qualities of biometric-based authentication, they are revocable, impossible to mimic, and resistant to coercion attacks. However, EEG signals carry a wealth of information about an individual and can reveal private information about the user. This brings significant privacy issues to EEG-based authentication systems as they have access to raw EEG signals. This thesis proposes a privacy-preserving EEG-based authentication system that preserves the privacy of the user by not revealing the raw EEG signals while allowing the system to authenticate the user accurately. In that, perceptual hashing is utilized and instead of raw EEG signals, their perceptually hashed values are used in the authentication process. In addition to describing the authentication process, algorithms to compute the perceptual hash are developed based on two feature extraction techniques. Experimental results show that an authentication system using perceptual hashing can achieve performance comparable to a system that has access to raw EEG signals if enough EEG channels are used in the process. This thesis also presents a security analysis to show that perceptual hashing can prevent information leakage. University of North Texas Takabi, Hassan Caragea, Cornelia Yuan, Xiaohui 2016-12 Thesis or Dissertation vii, 61 pages : illustrations. Text local-cont-no: submission_442 https://digital.library.unt.edu/ark:/67531/metadc955127/ ark: ark:/67531/metadc955127 English Use restricted to UNT Community Koppikar, Samir Dilip Copyright Copyright is held by the author, unless otherwise noted. All rights Reserved. |
collection |
NDLTD |
language |
English |
format |
Others
|
sources |
NDLTD |
topic |
Bio-signals Electroencephalogram (EEG) Perceptual hashing Data protection. Biometric identification. Brain fingerprinting. Electroencephalography. Hashing (computer science) |
spellingShingle |
Bio-signals Electroencephalogram (EEG) Perceptual hashing Data protection. Biometric identification. Brain fingerprinting. Electroencephalography. Hashing (computer science) Koppikar, Samir Dilip Privacy Preserving EEG-based Authentication Using Perceptual Hashing |
description |
The use of electroencephalogram (EEG), an electrophysiological monitoring method for recording the brain activity, for authentication has attracted the interest of researchers for over a decade. In addition to exhibiting qualities of biometric-based authentication, they are revocable, impossible to mimic, and resistant to coercion attacks. However, EEG signals carry a wealth of information about an individual and can reveal private information about the user. This brings significant privacy issues to EEG-based authentication systems as they have access to raw EEG signals.
This thesis proposes a privacy-preserving EEG-based authentication system that preserves the privacy of the user by not revealing the raw EEG signals while allowing the system to authenticate the user accurately. In that, perceptual hashing is utilized and instead of raw EEG signals, their perceptually hashed values are used in the authentication process. In addition to describing the authentication process, algorithms to compute the perceptual hash are developed based on two feature extraction techniques. Experimental results show that an authentication system using perceptual hashing can achieve performance comparable to a system that has access to raw EEG signals if enough EEG channels are used in the process. This thesis also presents a security analysis to show that perceptual hashing can prevent information leakage. |
author2 |
Takabi, Hassan |
author_facet |
Takabi, Hassan Koppikar, Samir Dilip |
author |
Koppikar, Samir Dilip |
author_sort |
Koppikar, Samir Dilip |
title |
Privacy Preserving EEG-based Authentication Using Perceptual Hashing |
title_short |
Privacy Preserving EEG-based Authentication Using Perceptual Hashing |
title_full |
Privacy Preserving EEG-based Authentication Using Perceptual Hashing |
title_fullStr |
Privacy Preserving EEG-based Authentication Using Perceptual Hashing |
title_full_unstemmed |
Privacy Preserving EEG-based Authentication Using Perceptual Hashing |
title_sort |
privacy preserving eeg-based authentication using perceptual hashing |
publisher |
University of North Texas |
publishDate |
2016 |
url |
https://digital.library.unt.edu/ark:/67531/metadc955127/ |
work_keys_str_mv |
AT koppikarsamirdilip privacypreservingeegbasedauthenticationusingperceptualhashing |
_version_ |
1719329414821445632 |