Privacy-Preserving Network BMI Decoding of Covert Spatial Attention

The brain-machine interface (BMI) has attracted much attention in the fields of biomedical engineering and ICT human communications. Of particular interest, neural decoding methods have rapidly developed over the last decade in neuroscience, allowing us to estimate the contents of human perception and subjective mental states by capturing brain activity patterns. However, the development of neural decoding will generate significant concern about privacy violation. In this manuscript, we propose a secure network BMI decoding method based on sparse coding for a covert spatial attention task. It is shown that secure sparse coding enables us to not only protect observed EEG signals, but also achieve the same estimation performance as that offered by sparse coding with unprotected observed signals.

[1]  Motoaki Kawanabe,et al.  Decoding spatial attention by using cortical currents estimated from electroencephalography with near-infrared spectroscopy prior information , 2014, NeuroImage.

[2]  F. Tong,et al.  Decoding the visual and subjective contents of the human brain , 2005, Nature Neuroscience.

[3]  Y Kamitani,et al.  Neural Decoding of Visual Imagery During Sleep , 2013, Science.

[4]  Tsuyoshi Murata,et al.  {m , 1934, ACML.

[5]  Balas K. Natarajan,et al.  Sparse Approximate Solutions to Linear Systems , 1995, SIAM J. Comput..

[6]  Kjersti Engan,et al.  Method of optimal directions for frame design , 1999, 1999 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings. ICASSP99 (Cat. No.99CH36258).

[7]  Hitoshi Kiya,et al.  Unitary Transform-Based Template Protection and Its Application to l2-norm Minimization Problems , 2016, IEICE Trans. Inf. Syst..

[8]  Vijay Varadharajan,et al.  Apsipa Transactions on Signal and Information Processing Additional Services for Apsipa Transactions on Signal and Information Processing: Survey on Securing Data Storage in the Cloud , 2022 .

[10]  Hitoshi Kiya,et al.  Privacy-Preserving SVM Computing by Using Random Unitary Transformation , 2018, 2018 International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS).

[11]  A. Bruckstein,et al.  K-SVD : An Algorithm for Designing of Overcomplete Dictionaries for Sparse Representation , 2005 .

[12]  Motoaki Kawanabe,et al.  Learning a common dictionary for subject-transfer decoding with resting calibration , 2015, NeuroImage.

[13]  Nitesh Saxena,et al.  PEEP: Passively Eavesdropping Private Input via Brainwave Signals , 2017, Financial Cryptography.

[14]  Y. C. Pati,et al.  Orthogonal matching pursuit: recursive function approximation with applications to wavelet decomposition , 1993, Proceedings of 27th Asilomar Conference on Signals, Systems and Computers.

[15]  David J. Field,et al.  Emergence of simple-cell receptive field properties by learning a sparse code for natural images , 1996, Nature.

[16]  Zhanpeng Jin,et al.  CEREBRE: A Novel Method for Very High Accuracy Event-Related Potential Biometric Identification , 2016, IEEE Transactions on Information Forensics and Security.

[17]  Mauro Barni,et al.  Privacy Protection in Biometric-Based Recognition Systems: A marriage between cryptography and signal processing , 2015, IEEE Signal Processing Magazine.

[18]  Mauro Barni,et al.  Encrypted signal processing for privacy protection: Conveying the utility of homomorphic encryption and multiparty computation , 2013, IEEE Signal Processing Magazine.

[19]  Mauro Barni,et al.  Privacy Protection in Biometric-Based Recognition Systems , 2015 .

[20]  Miguel A. L. Nicolelis,et al.  Brain–machine interfaces: past, present and future , 2006, Trends in Neurosciences.

[21]  Michael Elad,et al.  Sparse and Redundant Representations - From Theory to Applications in Signal and Image Processing , 2010 .

[22]  Wotao Yin,et al.  Iteratively reweighted algorithms for compressive sensing , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.