Javascript must be enabled to continue!
Privacy Preserving EEG-based Authentication Using Perceptual Hashing
View through CrossRef
The use of electroencephalogram (EEG), an electrophysiological monitoring method for recording the brain activity, for authentication has attracted the interest of researchers for over a decade. In addition to exhibiting qualities of biometric-based authentication, they are revocable, impossible to mimic, and resistant to coercion attacks. However, EEG signals carry a wealth of information about an individual and can reveal private information about the user. This brings significant privacy issues to EEG-based authentication systems as they have access to raw EEG signals. This thesis proposes a privacy-preserving EEG-based authentication system that preserves the privacy of the user by not revealing the raw EEG signals while allowing the system to authenticate the user accurately. In that, perceptual hashing is utilized and instead of raw EEG signals, their perceptually hashed values are used in the authentication process. In addition to describing the authentication process, algorithms to compute the perceptual hash are developed based on two feature extraction techniques. Experimental results show that an authentication system using perceptual hashing can achieve performance comparable to a system that has access to raw EEG signals if enough EEG channels are used in the process. This thesis also presents a security analysis to show that perceptual hashing can prevent information leakage.
Title: Privacy Preserving EEG-based Authentication Using Perceptual Hashing
Description:
The use of electroencephalogram (EEG), an electrophysiological monitoring method for recording the brain activity, for authentication has attracted the interest of researchers for over a decade.
In addition to exhibiting qualities of biometric-based authentication, they are revocable, impossible to mimic, and resistant to coercion attacks.
However, EEG signals carry a wealth of information about an individual and can reveal private information about the user.
This brings significant privacy issues to EEG-based authentication systems as they have access to raw EEG signals.
This thesis proposes a privacy-preserving EEG-based authentication system that preserves the privacy of the user by not revealing the raw EEG signals while allowing the system to authenticate the user accurately.
In that, perceptual hashing is utilized and instead of raw EEG signals, their perceptually hashed values are used in the authentication process.
In addition to describing the authentication process, algorithms to compute the perceptual hash are developed based on two feature extraction techniques.
Experimental results show that an authentication system using perceptual hashing can achieve performance comparable to a system that has access to raw EEG signals if enough EEG channels are used in the process.
This thesis also presents a security analysis to show that perceptual hashing can prevent information leakage.
Related Results
THE EFFECT OF PETHIDINE ON THE NEONATAL EEG
THE EFFECT OF PETHIDINE ON THE NEONATAL EEG
SUMMARYThirty‐two preterm infants were monitored with an on‐line cotside EEG system for periods of up to nine days. Changes in the normal pattern of discontinuity of the EEG were s...
Augmented Differential Privacy Framework for Data Analytics
Augmented Differential Privacy Framework for Data Analytics
Abstract
Differential privacy has emerged as a popular privacy framework for providing privacy preserving noisy query answers based on statistical properties of databases. ...
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
Abstract
In some situations, the transfer of authentication authority is necessary for user authentication. In traditional authentication, a trust mechanism based on a trus...
An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
Vehicular Ad Hoc Network (VANET) is a wireless Mobile Ad Hoc Network that is used for communication between vehicles, vehicles and fixed access points, and vehicles and pedestrians...
Privacy Risk in Recommender Systems
Privacy Risk in Recommender Systems
Nowadays, recommender systems are mostly used in many online applications to filter information and help users in selecting their relevant requirements. It avoids users to become o...
Evaluation of Mathematical Cognitive Functions with the Use of EEG Brain Imaging
Evaluation of Mathematical Cognitive Functions with the Use of EEG Brain Imaging
During the last decades, the interest displayed in neurocognitive and brain science research is relatively high. In this chapter, the cognitive neuroscience field approach focuses ...
Blockchain-Based Anonymous Authentication in Edge Computing Environment
Blockchain-Based Anonymous Authentication in Edge Computing Environment
Authentication is an important requirement for the security of edge computing applications. The existing authentication schemes either frequently rely on third-party trusted author...
POTENTIAL APPLICATION OF HARDWARE PROTECTED SYMMETRIC AUTHENTICATION MICROCIRCUITS TO ENSURE THE SECURITY OF INTERNET OF THINGS
POTENTIAL APPLICATION OF HARDWARE PROTECTED SYMMETRIC AUTHENTICATION MICROCIRCUITS TO ENSURE THE SECURITY OF INTERNET OF THINGS
The paper objective is to determine the basic schemes and their characteristics for ensuring the security of Internet of Things nodes using symmetric authentication cryptographic m...

