DOI QR코드

DOI QR Code

Next-Generation Personal Authentication Scheme Based on EEG Signal and Deep Learning

  • Yang, Gi-Chul (Dept. of Convergence Software, Mokpo National University)
  • Received : 2020.01.23
  • Accepted : 2020.05.18
  • Published : 2020.10.31

Abstract

The personal authentication technique is an essential tool in this complex and modern digital information society. Traditionally, the most general mechanism of personal authentication was using alphanumeric passwords. However, passwords that are hard to guess or to break, are often hard to remember. There are demands for a technology capable of replacing the text-based password system. Graphical passwords can be an alternative, but it is vulnerable to shoulder-surfing attacks. This paper looks through a number of recently developed graphical password systems and introduces a personal authentication system using a machine learning technique with electroencephalography (EEG) signals as a new type of personal authentication system which is easier for a person to use and more difficult for others to steal than other preexisting authentication systems.

Keywords

References

  1. Wikipedia, "Authentication," [Online]. Available: https://en.wikipedia.org/wiki/Authentication.
  2. H. Berger, "Uber das electrenkephalogramm des menschen," Archiv fur Psychiatrie und Nervenkrankheiten, vol. 87, no. 1, pp. 527-570, 1929. https://doi.org/10.1007/BF01797193
  3. T. A. Travis, C. Y. Kondo, and J. R. Knott, "Alpha enhancement research: a review," Biological Psychiatry, vol. 10, no. 1, pp. 69-89, 1975.
  4. B. Rockstroh, T. Elbert, A. Canavan, W. Lutzenberger, and N. Birbaumer, Slow Cortical Potentials and Behavior, 2nd ed. Baltimore, MD: Urban & Schwarzenberg, 1989.
  5. M. B. Sterman, "Basic concepts and clinical findings in the treatment of seizure disorders with EEG operant conditioning," Clinical Electroencephalography, vol. 31, no. 1, pp. 45-55, 2000. https://doi.org/10.1177/155005940003100111
  6. H. J. Hwang, S. Kim, S. Choi, and C. H. Im, EEG-based brain-computer interfaces: a thorough literature survey, International Journal of Human-Computer Interaction, vol. 29, no. 12, pp. 814-826, 2013. https://doi.org/10.1080/10447318.2013.780869
  7. H. J. Hwang, J. H. Lim, Y. J. Jung, H. Choi, S. W. Lee, and C. H. Im, "Development of an SSVEP-based BCI spelling system adopting a QWERTY-style LED keyboard," Journal of Neuroscience Methods, vol. 208, no. 1, pp. 59-65, 2012. https://doi.org/10.1016/j.jneumeth.2012.04.011
  8. I. Volosyak, "SSVEP-based Bremen-BCI interface--boosting information transfer rates," Journal of Neural Engineering, vol. 8, no. 3, 036020, 2011.
  9. G. Blonder, "Graphical passwords," U.S. Patent 5559961, Sep 24, 1996.
  10. R. N. Shepard, "Recognition memory for words, sentences, and pictures," Journal of Verbal Learning and Verbal Behavior, vol. 6, no. 1, pp. 156-163, 1967. https://doi.org/10.1016/S0022-5371(67)80067-7
  11. A. Paivio, T. B. Rogers, and P. C. Smythe, "Why are pictures easier to recall than words?," Psychonomic Science, vol. 11, no. 4, pp. 137-138, 1976. https://doi.org/10.3758/BF03331011
  12. A. E. Dirik, N. Memon, and J. C. Birget, "Modeling user choice in the PassPoints graphical password scheme," in Proceedings of the 3rd Symposium on Usable Privacy and Security (SOUPS), Pittsburgh, PA, 2007, pp. 20-28.
  13. D. Hong, S. Man, B. Hawes, and M. Mathews, "A graphical password scheme strongly resistant to spyware," in Proceedings of the International Conference on Security and Management (SAM), Las Vegas, NV, 2004, pp. 94-100.
  14. R. Dhamija and A. Perrig, "Deja vu: a user study using images for authentication," in Proceedings of the 9th USENIX Security Symposium, Denver, CO, 2000, pp. 45-58.
  15. A. Perrig and D. Song, "Hash visualization: a new technique to improve real-world security," in Proceedings of International Workshop on Cryptographic Techniques and E-Commerce, Hong Kong, China, 1999, pp. 131-138.
  16. S. Akula and V. Devisetty, "Image based registration and authentication system," in Proceedings of Midwest Instruction and Computing Symposium, Morris, MN, 2004.
  17. D. Weinshall and S. Kirkpatrick, "Passwords you'll never forget, but can't recall," in Proceedings of Conference on Human Factors in Computing Systems (CHI), Vienna, Austria, 2004, pp. 1399-1402.
  18. W. Jansen, "Authenticating mobile device users through image selection," in The Internet Society: Advances in Learning, Commerce and Security. Southampton, UK: WIT Press, 2004, pp. 184-192
  19. I. Jermyn, A. Mayer, F. Monrose, M. K. Reiter, and A. D. Rubin, "The design and analysis of graphical passwords," in Proceedings of the 8th USENIX Security Symposium, Washington, DC, 1999.
  20. A. F. Syukri, E. Okamoto, and M. Mambo, "A user identification system using signature written with mouse," in Information Security and Privacy. Berlin: Springer, 1998, pp. 403-414.
  21. S. Wiedenbeck, J. Waters, J. C. Birget, A. Brodskiy, and N. Memon, "PassPoints: design and longitudinal evaluation of a graphical password system," International Journal of Human Computer Studies, vol. 63, no. 1-2, pp. 102-127, 2005. https://doi.org/10.1016/j.ijhcs.2005.04.010
  22. S. Brostoff and M. A. Sasse, "Are passfaces more usable than passwords? A field trial investigation," in People and Computers XIV - Usability or Else. London, UK: Springer, 2000, pp. 405-424.
  23. M. Boroditsky, "Passlogix password schemes," 2002 [Online]. Available: http://www.passlogix.com.
  24. G. C. Yang, "PassPositions: a secure and user-friendly graphical password scheme," in Proceedings of 2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT), Kuta Bali, Indonesia, 2017, pp. 1-5.
  25. G. C. Yang and H. Oh, "Implementation of a graphical password authentication system 'PassPositions'," Journal of Image and Graphics, vol. 6, no. 2. pp. 117-121, 2018. https://doi.org/10.18178/joig.6.2.117-121
  26. G. C. Yang, "A new graphical password system using intersecting points in a signature," International Journal of Engineering & Technology, vol. 7, no. 4.39, pp. 61-64, 2018.
  27. G. C. Yang, "T-TIME: a password scheme based on touch signal generation time difference," Journal of Advanced Information Technology and Convergence, vol. 8, no. 2, pp.41-46, 2018. https://doi.org/10.14801/jaitc.2018.8.2.41
  28. G. C. Yang, "A multimodal password system based on graphics and text," Engineering Letters, vol. 28, no. 2, pp. 300-305, 2020.
  29. R. Biddle, S. Chiasson, and P. C. Van Oorschot, "Graphical passwords: learning from the first twelve years," ACM Computing Surveys (CSSUR), vol. 44, no. 4, article no. 19, 2012.
  30. G. C. Yang, "Development status and prospects of graphical password authentication system in Korea," KSII Transactions on Internet and Information Systems, vol. 13, no. 11, pp. 5755-5772, 2019. https://doi.org/10.3837/tiis.2019.11.026
  31. T. M. Li, H. C. Chao, and J. Zhang, "Emotion classification based on brain wave: a survey," Human-centric Computing and Information Sciences, vol. 9, Article no. 42, 2019.
  32. N. H. Keum, T. Lee, J. B. Lee, and H. P. "Measuring the degree of content immersion in a non-experimental environment using a portable EEG device," Journal of Information Processing Systems, vol. 14, no. 4, pp. 1049-1061, 2018. https://doi.org/10.3745/JIPS.04.0084
  33. T. Pedersen, C. Johansen, and A. Josang, "Behavioural computer science: an agenda for combining modelling of human and system behaviours," Human-centric Computing and Information Sciences, vol. 8, article no. 7, 2018.
  34. V. Suryani, S. Sulistyo, and W. Widyawan, "Two-phase security protection for the internet of things object," Journal of Information Processing Systems, vol. 14, no. 6, pp. 1431-1437, 2018. https://doi.org/10.3745/JIPS.03.0106
  35. D. Nield, "Scientists have connected the brains of 3 people, enabling them to share thoughts," 2018 [Online]. Available: https://www.sciencealert.com/brain-to-brain-mind-connection-lets-three-people-share-thoughts.
  36. A. J. Casson, D. C. Yates, S. J. M. Smith, J. S. Duncan, and E. Rodriguez-Villegas, "Wearable electroencephalography," IEEE Engineering in Medicine and Biology Magazine, vol. 29, no. 3, pp. 44-56, 2010. https://doi.org/10.1109/MEMB.2010.936545
  37. F. Wang, G. Li, J. Chen, Y. Duan, and D. Zhang, "Novel semi-dry electrodes for brain-computer interface applications," Journal of Neural Engineering, vol. 13, no. 4, article no. 046021, 2016.