skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: An EEG-Based User Authentication System Using Event-Related Potentials and Ensemble Learning
This paper presents an EEG-based user authentication system using Event-Related Potentials (ERPs) to distinguish legitimate users from impostors. Utilizing a publicly available EEG dataset, we implemented a comprehensive data processing pipeline, which included advanced preprocessing and feature extraction techniques. Multiple state-of-the-art machine learning classifiers, such as CatBoost and XGBoost, were evaluated to assess their effectiveness in user authentication. The results showed a very low average Equal Error Rate (EER) of 2.53%. Our study emphasizes the strength of the P300 and N400 responses in biometric authentication and demonstrates the potential of advanced ensemble classifiers in improving system accuracy. This research contributes to the development of EEG-based authentication and lays the groundwork for future studies aiming to create secure and practical biometric systems.  more » « less
Award ID(s):
2340997
PAR ID:
10627231
Author(s) / Creator(s):
;
Publisher / Repository:
IEEE
Date Published:
ISBN:
979-8-3503-8641-7
Page Range / eLocation ID:
1 to 6
Subject(s) / Keyword(s):
Brainwave Authentication, electroencephalogram (EEG), Biometrics, User Authentication, Brain-Computer Interface (BCI), Event-Related Potentials (ERPs)
Format(s):
Medium: X
Location:
Grand Forks, ND, USA
Sponsoring Org:
National Science Foundation
More Like this
  1. Biometric authentication systems face significant challenges due to the vulnerability of traditional methods like passwords and fingerprints to theft or imitation. Electroencephalography (EEG)-based authentication presents a promising alternative by using unique brainwave patterns. This study introduces a novel EEG-based authentication system that utilizes cognitive and memory-related stimuli to elicit distinct brainwave responses. By incorporating multi-session data collection, the system effectively accounts for temporal variability. Additionally, advanced feature extraction techniques capture spatial, temporal, and spectral characteristics, enhancing authentication accuracy. A comprehensive feature engineering pipeline is employed, evaluating various classifiers across different stimuli types. Findings reveal that memory-related tasks, particularly word recognition, consistently generate the most reliable EEG responses. Among the classifiers tested, Logistic Regression demonstrates the highest effectiveness. The system achieves robust performance across multiple sessions, demonstrating its potential for practical real-world deployment. These findings lay a solid foundation for advancing EEG-based biometric authentication, paving the way for more secure and practical implementations in both research and applied settings. 
    more » « less
  2. Authentication is a key step for accessing resources and services. Currently, there are several ways of performing authentication such as text-based passwords and graphical images. These methods can be circumvented to bypass authentication system. Biometric signatures have been gaining popularity for user authentication. In this paper, we examine various attacks on iris-based authentication system followed by some common examples of mitigation techniques. 
    more » « less
  3. Biometric recognition, or simply biometrics, is the use of biological attributes such as face, fingerprints or iris in order to recognize an individual in an automated manner. A key application of biometrics is authentication; i.e., using said biological attributes to provide access by verifying the claimed identity of an individual. This paper presents a framework for Biometrics-as-a-Service (BaaS) that performs biometric matching operations in the cloud, while relying on simple and ubiquitous consumer devices such as smartphones. Further, the framework promotes innovation by providing interfaces for a plurality of software developers to upload their matching algorithms to the cloud. When a biometric authentication request is submitted, the system uses a criteria to automatically select an appropriate matching algorithm. Every time a particular algorithm is selected, the corresponding developer is rendered a micropayment. This creates an innovative and competitive ecosystem that benefits both software developers and the consumers. As a case study, we have implemented the following: (a) an ocular recognition system using a mobile web interface providing user access to a biometric authentication service, and (b) a Linux-based virtual machine environment used by software developers for algorithm development and submission. 
    more » « less
  4. As mobile devices become increasingly integral to daily life, the need for robust security measures has intensified. Continuous user authentication (CUA) is an emerging paradigm designed to enhance security by verifying user identity throughout device usage, rather than solely at login. This study aims to explore user perceptions, experiences, and preferences concerning CUA methods, such as biometric scans (e.g., fingerprints, facial recognition) and behavioral analytics (e.g., typing patterns, swipe gestures). We will investigate the importance users place on continuous authentication for safeguarding personal data, as well as the usability challenges they encounter. Specifically, we will delve into how users perceive the reliability and accuracy of biometric and behavioral authentication methods, considering factors such as the perceived invasiveness of biometric scans and concerns about data privacy. Additionally, we will examine how perceptions and preferences for CUA vary across different age groups, as younger generations may be more accustomed to biometric authentication and less concerned about privacy implications, while older generations may have different preferences and concerns. The findings of this study will provide insights into user trust, privacy concerns, and the overall effectiveness of CUA in improving mobile security. By understanding user attitudes, this research seeks to inform the development of more intuitive and secure authentication solutions that align with user needs and expectations across various demographics. 
    more » « less
  5. The unauthorized usage of various services and resources in cloud computing is something that must be protected against. Authentication and access control are the most significant concerns in cloud computing. Several researchers in this field suggest numerous approaches to enhance cloud authentication towards robustness. User names and associated passwords have been a common practice for long as Single Factor Authentication. However, advancements in the speed of computing and the usage of simple methods, starting from the Brute Force technique to the implementation of advanced and efficient crytographic algorithms, have posed several threats and vulnerabilities for authentication systems, leading to the degradation of their effectiveness. Multi-factor authentication has emerged as a robust means of securing the cloud using simultaneous and multiple means of authentication factors. This employs multiple levels of cascaded authentication checks. This paper covers an extensive and systematic survey of various factors towards their adoption and suitability for authentication for multi-factor authentication mechanisms. The inference drawn from the survey is in terms of arriving at a unique authentication factor that does not require any additional, specialized hardware or software for multi-factor authentication. Such authentication also uses the distinct biometric characteristics of the concerned user in the process. This arrangement augments the secured and robust user authentication process. The mechanism is also assessed as an effective means against impersonation attacks. 
    more » « less