A Real-Time Electroencephalogram (EEG) Based Individual Identification Interface for Mobile Security in Ubiquitous Environment

With the booms of mobile communication, especially mobile smart phone, technologies to identify individuals for mobile security calls for some more strict requirements in user-friendly, real-time and ubiquitous aspects. In addition to traditional approaches (for example, password check), some advanced biometric methodologies have been applied in practice, such as fingerprint and iris based solutions, however, these solutions generally lack a true ubiquitous nature for mobile security. In this paper, we present a real time EEG based individual identification interface to support ubiquitous applications. The EEG signals are collected through a mono-polar single channel in real time via a mobile EEG device. An experiment involving about 20 subjects has been conducted to evaluate the interface. The experiment comprises three types of tests: accuracy test, time dimension test and capacity dimension test. The results of these experiments demonstrate that our approach is highly suitable to the demands of mobile security in ubiquitous environment. In addition, we integrate this interface into scenarios of ubiquitous application - Online Predictive Tools for Intervention in Mental Illness (OPTIMI).

[1]  H. Akaike Fitting autoregressive models for prediction , 1969 .

[2]  Carles Grau,et al.  Unobtrusive Biometric System Based on Electroencephalogram Analysis , 2008, EURASIP J. Adv. Signal Process..

[3]  T. Cecchin,et al.  Seizure lateralization in scalp EEG using Hjorth parameters , 2010, Clinical Neurophysiology.

[4]  Bin Hu,et al.  EEG-Based Cognitive Interfaces for Ubiquitous Applications: Developments and Challenges , 2011, IEEE Intelligent Systems.

[5]  R. Homan,et al.  Cerebral location of international 10-20 system electrode placement. , 1987, Electroencephalography and clinical neurophysiology.

[6]  L. Benedicenti,et al.  The electroencephalogram as a biometric , 2001, Canadian Conference on Electrical and Computer Engineering 2001. Conference Proceedings (Cat. No.01TH8555).

[7]  M Congedo,et al.  A review of classification algorithms for EEG-based brain–computer interfaces , 2007, Journal of neural engineering.

[8]  B. Hjorth EEG analysis based on time domain properties. , 1970, Electroencephalography and clinical neurophysiology.

[9]  P. Senthil Kumar,et al.  Removal of Ocular Artifacts in the EEG through Wavelet Transform without using an EOG Reference Channel , 2008 .

[10]  Haitham Cruickshank,et al.  The security challenges for mobile ubiquitous services , 2007, Inf. Secur. Tech. Rep..

[11]  M Poulos,et al.  Person Identification from the EEG using Nonlinear Signal Classification , 2002, Methods of Information in Medicine.

[12]  Bin Hu,et al.  Towards an Efficient and Accurate EEG Data Analysis in EEG-Based Individual Identification , 2010, UIC.

[13]  H H Stassen,et al.  Genetic aspects of the EEG: an investigation into the within-pair similarity of monozygotic and dizygotic twins with a new method of analysis. , 1987, Electroencephalography and clinical neurophysiology.

[14]  J Pardey,et al.  A review of parametric modelling techniques for EEG analysis. , 1996, Medical engineering & physics.

[15]  Isao Nakanishi,et al.  Personal Authentication Using New Feature Vector of Brain Wave , 2008 .

[16]  José del R. Millán,et al.  Person Authentication Using Brainwaves (EEG) and Maximum A Posteriori Model Adaptation , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[17]  N. E. Sviderskaya,et al.  Genetic features of the spatial organization of the human cerebral cortex , 2006, Neuroscience and Behavioral Physiology.

[18]  Nicole Krämer,et al.  Time Domain Parameters as a feature for EEG-based Brain-Computer Interfaces , 2009, Neural Networks.

[19]  Henri Depoortere,et al.  Evaluation of the stability and quality of sleep using hjorth's descriptors , 1993, Physiology & Behavior.

[20]  R. Shibata Selection of the order of an autoregressive model by Akaike's information criterion , 1976 .

[21]  Anil K. Jain,et al.  Attacks on biometric systems: a case study in fingerprints , 2004, IS&T/SPIE Electronic Imaging.