A Study on Combining EEG Signals and Crytography for Bitcoin Security

In this paper, we propose two EEG-based systems including cryptographic key generation and (true) random number generation to enhance Bitcoin security. The first system is based on the quasi-stationary characteristic of EEG signals when analyzed in a sufficient short time window. With this quasi-stationary, stable EEG feaures are extracted and corrected to generate cryptographic keys from EEG-based authentication for the protection of Bitcoin wallets. The second one is based on the non-linear and chaotic characteristics of EEG signals. By mathematical transformation, EEG signals can be transformed to be random binary sequences for the use of protecting digital signatures in Bitcoin transactions. Two EEG datasets which are DEAP and GrazIIIa were used to validate the performance of the proposed system. Our experimental results showed that both cryptographic keys and random numbers are securely derived with very high success rates and very high rates of passing the standard statistical tests recommended by the National Institute of Standard and Technology (NIST) for examining the quality of randomness, especially in cryptography applications.

[1]  Dharmendra Sharma,et al.  A Proposed Feature Extraction Method for EEG-based Person Identification , 2012 .

[2]  Hung T. Nguyen,et al.  Investigation of window size in classification of EEG-emotion signal with wavelet entropy and support vector machine , 2015, 2015 37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC).

[3]  P. Garc,et al.  Analysis of EEG Signals using Nonlinear Dynamics and Chaos: A review , 2015 .

[4]  H. Akaike A new look at the statistical model identification , 1974 .

[5]  José del R. Millán,et al.  Person Authentication Using Brainwaves (EEG) and Maximum A Posteriori Model Adaptation , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[6]  Guangyi Chen,et al.  Are electroencephalogram (EEG) signals pseudo-random number generators? , 2014, J. Comput. Appl. Math..

[7]  Yongdong Wu,et al.  Transforming a pattern identifier into biometric key generators , 2010, 2010 IEEE International Conference on Multimedia and Expo.

[8]  Anil K. Jain,et al.  Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..

[9]  C. Stam,et al.  Nonlinear dynamical analysis of EEG and MEG: Review of an emerging field , 2005, Clinical Neurophysiology.

[10]  Youjun Li,et al.  Human Emotion Recognition with Electroencephalographic Multidimensional Features by Hybrid Deep Neural Networks , 2017 .

[11]  Thierry Pun,et al.  DEAP: A Database for Emotion Analysis ;Using Physiological Signals , 2012, IEEE Transactions on Affective Computing.

[12]  Qi Li,et al.  Cryptographic key generation from voice , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.

[13]  Hiroshi Hasegawa,et al.  Using a Low-Cost Electroencephalogram (EEG) Directly as Random Number Generator , 2014, 2014 IIAI 3rd International Conference on Advanced Applied Informatics.

[14]  Ralf Steinmetz,et al.  Biometric hash based on statistical features of online signatures , 2002, Object recognition supported by user interaction for service robots.

[15]  Andreas Uhl,et al.  A survey on biometric cryptosystems and cancelable biometrics , 2011, EURASIP J. Inf. Secur..

[16]  Anil K. Jain,et al.  Multibiometric Template Security Using Fuzzy Vault , 2008, 2008 IEEE Second International Conference on Biometrics: Theory, Applications and Systems.

[17]  Richard Shiavi,et al.  Introduction to Applied Statistical Signal Analysis: Guide to Biomedical and Electrical Engineering Applications , 2006 .

[18]  Mel Slater,et al.  Biometric random number generators , 2004, Comput. Secur..

[19]  Bin He,et al.  BRAIN^COMPUTER INTERFACE , 2007 .

[20]  F. L. D. Silva,et al.  EEG signal processing , 2000, Clinical Neurophysiology.

[21]  Nurul Nadia Ahmad,et al.  Analysis of the EEG Signal for a Practical Biometric System , 2010 .

[22]  David Chek Ling Ngo,et al.  Computation of Cryptographic Keys from Face Biometrics , 2003, Communications and Multimedia Security.

[23]  Feng Hao,et al.  Combining Crypto with Biometrics Effectively , 2006, IEEE Transactions on Computers.