SlideShare a Scribd company logo
1 of 32
International Journal of Biometrics and Bioinformatics (IJBB), Volume (7) : Issue (1) : 2013
Presented
by
buthainah hamdy
 Abstract
 1-INTRODUCTION
 2-RELATED WORK
 3-METHODOLOGY
3-1 Data Acquisition
3-2 Preprocessing and Feature Extraction
3-3 Classification
3-4 Implementation
 4-CONCLUSION
 We propose an EEG based BCI as new modality for Person
Authentication an develop a screen lock application that will
lock and unlock the computer screen.
 The brain waves of the person, recorded in real time are used
as password to unlock the screen.
 Using 14 sensors of Emotiv headset.
 Compute the power spectral density.
 The channel spectral power in the frequency band of alpha,
beta and gamma is used in the classification task.
 A two stage checking is done to authenticate the user.
 A proximity value of 0.78 and above is considered a good
match.
 The percentage of accuracy in classification is found to be
good.
 No external stimulus is used.
 Abstract
 1-INTRODUCTION
 2-RELATED WORK
 3-METHODOLOGY
3-1 Data Acquisition
3-2 Preprocessing and Feature Extraction
3-3 Classification
3-4 Implementation
 4-CONCLUSION
In this computer driven era, with the increase in
security threats, securing and managing the
resources has become a more complex
challenge.
Therefore, it is crucial to design a high security
system for authentication.
The world getting ready to transit from Graphic
User Interface (GUI) to Natural User Interface
(NUI) technology.
We have made an attempt to build an
authentication system based on thoughts.
 Are based on personal identification number (PIN) and
password that can be attacked by “shoulder surfing”.
 The biometric approaches based on the biological
characteristics of humans cannot be hacked, stolen or
transferred from one person to another as they are unique for
each person.
 But it change with age and time.
 Multimodal fusion for identity verification
has shown great improvement compared to
unimodal algorithms where they propose to
integrate confidence measures during the fusion
process.
 Mostly use fingerprints, speech, facial features, iris and signatures as a
base for an authentication or an identification system.
 These traits however, are known to be vulnerable to falsification as it is
possible to forge or steal.
 Therefore, new types of physiological features that are unique and cannot be
replicated are proposed for an identification system.
 Electroencephalogram (EEG) signal as a biometric.
 The EEG based biometrics is widely being considered in security sensitive
areas like banks, labs and identification of criminal in forensic.
 It can be used as a component of National e-identity card in government
sector, as they have proven to be unique between people.
 Aims to convey people's intentions to the outside world directly from their
thoughts, and is a direct communication pathway between a brain and an
external device.
 A common method for designing BCI is to use EEG signals extracted during
mental tasks that brain records using EEG sensors (electrodes).
 Person authentication aims to accept or reject a person claiming an identity,
comparing a biometric data to one template,
while the goal of person identification is to match the biometric data against all
the records in a database.
 In our work, we have made an attempt to authenticate a system, rather than
identification.
 Brain waves measured by EEG represent a summary of brain electrical activity
at a recording point on the scalp .
 The fusion of delta, theta, alpha/mu, beta and gamma waves in frequency
band.
Illustration of Location of Electrodes on the Emotiv
Headset
 We perform data acquisition, feature extraction, matching the feature vector
with the stored template all in real time.
 we have used Power Spectral Density(PSD) as a reliable feature.
 PSD is the measure of the how much power strength at each frequency.
 It shows which frequencies variations are strong and which frequencies
variations are weak.
 Principal Component Analysis(PCA) is applied to reduce the feature size.
 The obtained feature vector is then compared against a previously stored
feature vector for the same person using template matching.
 The match is considered good if the result of the comparison is greater than the
threshold value 0.78 after repeated trials keeping in mind the need to satisfy low False
Acceptance Error (FAE) and False Rejection Error (FRE).
 False Rejections(FR) will be approximately equal to the proportion of False Acceptances
(FA)called as Equal Error Rate(EER).
 We have developed a GUI, to let a user lock his computer screen when
required and unlock the same by recording his brain activity (EEG signals) as
a password for the system.
 An identity authentication system has to deal with two kinds of events:
 1-either the person claiming a given identity is the one who he claims to be
(in which case, he is called a client)
2-he is not(in which case, he is called an impostor).
 The main aim is to keep the False Acceptance Error (FAE) and the False
Rejection Error (FRE) close to zero.
 Abstract
 1-INTRODUCTION
 2-RELATED WORK
 3-METHODOLOGY
3-1 Data Acquisition
3-2 Preprocessing and Feature Extraction
3-3 Classification
3-4 Implementation
 4-CONCLUSION
 EEG based person authentication was first proposed by Marcel.
 Used Power Spectral Density as the feature
,a statistical framework based on Gaussian Mixture Models (GMM)
and Maximum A Posteriori Model (MAP) Adaptation on speaker and face
authentication.
 Neural network classification was performed on real EEG data of healthy
individuals to experimentally investigate the connection between a person's
EEG and genetically specific information.
 correct classification scores in the range of 80% to 100% for person
identification.
 Two-stage biometric authentication method was proposed.
 The feature extraction methodology includes both linear and
nonlinear measures to give improved accuracy.
 The combination of two-stage authentication with EEG features has
good potential as a biometric as it is highly resistant to fraud.
 Principal Component Analysis(PCA) is applied to reduce the feature
size.
 Abstract
 1-INTRODUCTION
 2-RELATED WORK
 3-METHODOLOGY
3-1 Data Acquisition
3-2 Preprocessing and Feature Extraction
3-3 Classification
3-4 Implementation
 4-CONCLUSION
Framework of the Model.
 EEG signals are recorded.
 The sampling rate is 128Hz.
 The total time of each recording is 10 seconds.
 The subject is instructed to avoid blinking or moving his body during the data collection
to prevent the noise caused due to artifacts.
 Artifacts due to eye blinks produces a high amplitude signal called Electrooculogram
(EOG) that can be many times greater than the EEG signals.
 The dataset from normal subjects are recorded for two active cognitive tasks during
each recording session.
 1-Meditation activity: The subject is asked to meditate for a fixed period of time while
his brain waves are recorded.
 2-Math activity: The subject is given non-trivial multiplication problems, such as 79
times 56 and is asked to solve them without vocalizing or making any other physical
movements.
 The problems were designed so that they could not be solved in the time allowed.
 The EEG data is segmented.
 Channel spectral power for three spectral bands Alpha, Beta and Gamma is computed.
 14 x 3 = 42 features are extracted for each segment of the data.
 Using PCA and PSD.
 The unit of PSD is energy per frequency (width).
 Computation of PSD can be done directly by the method of Fourier analysis or
computing autocorrelation function and then transforming it.
 The Discrete Fourier transform is given by
 where (f1, f2) is the frequency band and Sx(f) is the power spectral density. The inter-hemispheric
channel spectral power differences in each spectral band are given by P 𝑑𝑖𝑓𝑓 = (P1 – P2) / (P1 +
P2) where P1 and P2 are the powers in different channels in the same spectral band but in the
opposite hemispheres.
 The obtained feature vector is compared against a previously stored feature vector for
that subject, using Euclidean Distance for template matching.
 The match is considered good if the result of the comparison >0.78
 keeping in mind the need to satisfy low False Acceptance Error (FAE) and False
Rejection Error (FRE).
 The authentication system was realized by developing an application which would lock
and unlock the screen.
 Initially the screen is locked and a subject’s EEG signals for two mental tasks
are recorded and stored as a reference, called the training phase.
 If the screen is to be unlocked, the subject’s brain waves are recorded again and
matched with the earlier stored sample. If there is a considerable match, then the screen
is unlocked, otherwise it will stay locked.
 The description of the working prototype is outlined as:
 1-Training of the system
 2-Feature extraction
 3-Creating user profile
 4-Authenticating
 The feature extraction and matching part are coded in MATLAB, while the UI
part is designed and coded in C#.
User Interface Diagram
 Steps
 Step 1: The initial screen which is the main prompt screen facilitates the user to perform
the lock screen, add/remove user, change account name and restore activities.
 Step 2: We add a new user as there are no existing users initially. The training form
opens wherein we train the system for authentication. The training is based on two
activities, Meditation and Math activity. While the subject is performing these activities,
the signals are recorded and stored.
Main Prompt Window.
 Step 3: Once the training process is complete, the user returns to the main
prompt form .The user can now lock the screen by clicking on the lock
screen option.
The login form appears wherein user name has to be specified for unlocking
the screen. There are 3 available options, Unlock, Restart and Shutdown.
User login window
 Step 4: When the unlock option is pressed by the user an authentication form
appears.
Two activities, for which the system has been trained earlier, must be
performed for authentication , one after the other.
 Step 5: If the authentication is successful then the main prompt form is
displayed and the screen is successfully unlocked, else the authentication
fails and the screen remains in the locked state.
 Abstract
 1-INTRODUCTION
 2-RELATED WORK
 3-METHODOLOGY
3-1 Data Acquisition
3-2 Preprocessing and Feature Extraction
3-3 Classification
3-4 Implementation
 4-CONCLUSION
 the EEG can be used for biometric authentication.
 Person authentication aims to accept or reject a person claiming an identity.
 We perform EEG recording, feature extraction and matching of the feature
vector with the stored feature vector, all in real time.
This system is designed without using any type of external stimulus.
This work,
however, needs more refinement such as,
i. Recording must be done in clinical conditions where there are no external
interferences (noise free environment).
ii. Training the users to perform the various mental tasks with full
concentration.
iii. Handling high dimensional data.
iv. Devising a more or less perfect matching algorithm that gives 0 FAE and 0
FRE.
Using Brain Waves as New Biometric Feature for Authenticatinga Computer User in Real-Time

More Related Content

What's hot

Gesture recognition document
Gesture recognition documentGesture recognition document
Gesture recognition documentNikhil Jha
 
Gesture recognition technology
Gesture recognition technology Gesture recognition technology
Gesture recognition technology Nagamani Gurram
 
Brain Finger-Printing
Brain Finger-PrintingBrain Finger-Printing
Brain Finger-Printingnibelmd9
 
Brain fingerprint technology presentation
Brain fingerprint technology presentationBrain fingerprint technology presentation
Brain fingerprint technology presentationHarsha Gundapaneni
 
Best topics for seminar
Best topics for seminarBest topics for seminar
Best topics for seminarshilpi nagpal
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technologyVishwasJangra
 
Skinput technology
Skinput technologySkinput technology
Skinput technologyranjeetdon
 
Hand Gesture Recognition using Neural Network
Hand Gesture Recognition using Neural NetworkHand Gesture Recognition using Neural Network
Hand Gesture Recognition using Neural NetworkBhagwat Singh Rathore
 
Ambient intelligence (AmI)
 Ambient intelligence (AmI)  Ambient intelligence (AmI)
Ambient intelligence (AmI) Maneesh B.S
 
Silent sound technology_powerpoint
Silent sound technology_powerpointSilent sound technology_powerpoint
Silent sound technology_powerpointAmitt Arrsh
 
Hand gesture recognition
Hand gesture recognitionHand gesture recognition
Hand gesture recognitionbakhti rahman
 
Computer science seminar topics
Computer science seminar topicsComputer science seminar topics
Computer science seminar topics123seminarsonly
 
Ambient Intelligence seminar report made by Shifali Jindal
Ambient Intelligence seminar report made by Shifali JindalAmbient Intelligence seminar report made by Shifali Jindal
Ambient Intelligence seminar report made by Shifali JindalShifaliJindal
 

What's hot (20)

Gesture recognition document
Gesture recognition documentGesture recognition document
Gesture recognition document
 
Gesture recognition technology
Gesture recognition technology Gesture recognition technology
Gesture recognition technology
 
Brain Finger-Printing
Brain Finger-PrintingBrain Finger-Printing
Brain Finger-Printing
 
Brain fingerprint technology presentation
Brain fingerprint technology presentationBrain fingerprint technology presentation
Brain fingerprint technology presentation
 
Best topics for seminar
Best topics for seminarBest topics for seminar
Best topics for seminar
 
Haptic technology
Haptic technologyHaptic technology
Haptic technology
 
Skinput
SkinputSkinput
Skinput
 
Finger vein technology
Finger vein technologyFinger vein technology
Finger vein technology
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technology
 
Brain gate
Brain gateBrain gate
Brain gate
 
Skinput technology
Skinput technologySkinput technology
Skinput technology
 
Hand Gesture Recognition using Neural Network
Hand Gesture Recognition using Neural NetworkHand Gesture Recognition using Neural Network
Hand Gesture Recognition using Neural Network
 
Ambient intelligence (AmI)
 Ambient intelligence (AmI)  Ambient intelligence (AmI)
Ambient intelligence (AmI)
 
Silent sound technology_powerpoint
Silent sound technology_powerpointSilent sound technology_powerpoint
Silent sound technology_powerpoint
 
Ambient Intelligence
Ambient IntelligenceAmbient Intelligence
Ambient Intelligence
 
Hand gesture recognition
Hand gesture recognitionHand gesture recognition
Hand gesture recognition
 
Speaker Recognition
Speaker RecognitionSpeaker Recognition
Speaker Recognition
 
Computer science seminar topics
Computer science seminar topicsComputer science seminar topics
Computer science seminar topics
 
Voice morphing-
Voice morphing-Voice morphing-
Voice morphing-
 
Ambient Intelligence seminar report made by Shifali Jindal
Ambient Intelligence seminar report made by Shifali JindalAmbient Intelligence seminar report made by Shifali Jindal
Ambient Intelligence seminar report made by Shifali Jindal
 

Similar to Using Brain Waves as New Biometric Feature for Authenticating a Computer User in Real-Time

IRJET- Depression Prediction System using Different Methods
IRJET- Depression Prediction System using Different MethodsIRJET- Depression Prediction System using Different Methods
IRJET- Depression Prediction System using Different MethodsIRJET Journal
 
IRJET- Review on Depression Prediction using Different Methods
IRJET- Review on Depression Prediction using Different MethodsIRJET- Review on Depression Prediction using Different Methods
IRJET- Review on Depression Prediction using Different MethodsIRJET Journal
 
Transfer learning for epilepsy detection using spectrogram images
Transfer learning for epilepsy detection using spectrogram imagesTransfer learning for epilepsy detection using spectrogram images
Transfer learning for epilepsy detection using spectrogram imagesIAESIJAI
 
A Comparative Study of Machine Learning Algorithms for EEG Signal Classification
A Comparative Study of Machine Learning Algorithms for EEG Signal ClassificationA Comparative Study of Machine Learning Algorithms for EEG Signal Classification
A Comparative Study of Machine Learning Algorithms for EEG Signal Classificationsipij
 
A COMPARATIVE STUDY OF MACHINE LEARNING ALGORITHMS FOR EEG SIGNAL CLASSIFICATION
A COMPARATIVE STUDY OF MACHINE LEARNING ALGORITHMS FOR EEG SIGNAL CLASSIFICATIONA COMPARATIVE STUDY OF MACHINE LEARNING ALGORITHMS FOR EEG SIGNAL CLASSIFICATION
A COMPARATIVE STUDY OF MACHINE LEARNING ALGORITHMS FOR EEG SIGNAL CLASSIFICATIONsipij
 
A Comparative Study of Machine Learning Algorithms for EEG Signal Classification
A Comparative Study of Machine Learning Algorithms for EEG Signal ClassificationA Comparative Study of Machine Learning Algorithms for EEG Signal Classification
A Comparative Study of Machine Learning Algorithms for EEG Signal Classificationsipij
 
A Comparative Study of Machine Learning Algorithms for EEG Signal Classification
A Comparative Study of Machine Learning Algorithms for EEG Signal ClassificationA Comparative Study of Machine Learning Algorithms for EEG Signal Classification
A Comparative Study of Machine Learning Algorithms for EEG Signal Classificationsipij
 
IRJET- Machine Learning Approach for Emotion Recognition using EEG Signals
IRJET-  	  Machine Learning Approach for Emotion Recognition using EEG SignalsIRJET-  	  Machine Learning Approach for Emotion Recognition using EEG Signals
IRJET- Machine Learning Approach for Emotion Recognition using EEG SignalsIRJET Journal
 
The second seminar
The second seminarThe second seminar
The second seminarAhmedMahany
 
Motor Imagery Recognition of EEG Signal using Cuckoo Search Masking Empirical...
Motor Imagery Recognition of EEG Signal using Cuckoo Search Masking Empirical...Motor Imagery Recognition of EEG Signal using Cuckoo Search Masking Empirical...
Motor Imagery Recognition of EEG Signal using Cuckoo Search Masking Empirical...ijtsrd
 
Motor Imagery based Brain Computer Interface for Windows Operating System
Motor Imagery based Brain Computer Interface for Windows Operating SystemMotor Imagery based Brain Computer Interface for Windows Operating System
Motor Imagery based Brain Computer Interface for Windows Operating SystemIRJET Journal
 
rob 537 final paper(fourth modify)
rob 537 final paper(fourth modify)rob 537 final paper(fourth modify)
rob 537 final paper(fourth modify)Huanchi Cao
 
Using Brain Waves as New Biometric Feature for Authenticating a Computer User...
Using Brain Waves as New Biometric Feature for Authenticating a Computer User...Using Brain Waves as New Biometric Feature for Authenticating a Computer User...
Using Brain Waves as New Biometric Feature for Authenticating a Computer User...CSCJournals
 
Improved feature exctraction process to detect seizure using CHBMIT-dataset ...
Improved feature exctraction process to detect seizure  using CHBMIT-dataset ...Improved feature exctraction process to detect seizure  using CHBMIT-dataset ...
Improved feature exctraction process to detect seizure using CHBMIT-dataset ...IJECEIAES
 
Prediction Model for Emotion Recognition Using EEG
Prediction Model for Emotion Recognition Using EEGPrediction Model for Emotion Recognition Using EEG
Prediction Model for Emotion Recognition Using EEGIRJET Journal
 
Recognition of emotional states using EEG signals based on time-frequency ana...
Recognition of emotional states using EEG signals based on time-frequency ana...Recognition of emotional states using EEG signals based on time-frequency ana...
Recognition of emotional states using EEG signals based on time-frequency ana...IJECEIAES
 
Efficient electro encephelogram classification system using support vector ma...
Efficient electro encephelogram classification system using support vector ma...Efficient electro encephelogram classification system using support vector ma...
Efficient electro encephelogram classification system using support vector ma...nooriasukmaningtyas
 
Robot Motion Control Using the Emotiv EPOC EEG System
Robot Motion Control Using the Emotiv EPOC EEG SystemRobot Motion Control Using the Emotiv EPOC EEG System
Robot Motion Control Using the Emotiv EPOC EEG SystemjournalBEEI
 
IRJET-A Survey on Effect of Meditation on Attention Level Using EEG
IRJET-A Survey on Effect of Meditation on Attention Level Using EEGIRJET-A Survey on Effect of Meditation on Attention Level Using EEG
IRJET-A Survey on Effect of Meditation on Attention Level Using EEGIRJET Journal
 
IRJET - Detection of Depression Level using EEG Signal
IRJET -  	  Detection of Depression Level using EEG SignalIRJET -  	  Detection of Depression Level using EEG Signal
IRJET - Detection of Depression Level using EEG SignalIRJET Journal
 

Similar to Using Brain Waves as New Biometric Feature for Authenticating a Computer User in Real-Time (20)

IRJET- Depression Prediction System using Different Methods
IRJET- Depression Prediction System using Different MethodsIRJET- Depression Prediction System using Different Methods
IRJET- Depression Prediction System using Different Methods
 
IRJET- Review on Depression Prediction using Different Methods
IRJET- Review on Depression Prediction using Different MethodsIRJET- Review on Depression Prediction using Different Methods
IRJET- Review on Depression Prediction using Different Methods
 
Transfer learning for epilepsy detection using spectrogram images
Transfer learning for epilepsy detection using spectrogram imagesTransfer learning for epilepsy detection using spectrogram images
Transfer learning for epilepsy detection using spectrogram images
 
A Comparative Study of Machine Learning Algorithms for EEG Signal Classification
A Comparative Study of Machine Learning Algorithms for EEG Signal ClassificationA Comparative Study of Machine Learning Algorithms for EEG Signal Classification
A Comparative Study of Machine Learning Algorithms for EEG Signal Classification
 
A COMPARATIVE STUDY OF MACHINE LEARNING ALGORITHMS FOR EEG SIGNAL CLASSIFICATION
A COMPARATIVE STUDY OF MACHINE LEARNING ALGORITHMS FOR EEG SIGNAL CLASSIFICATIONA COMPARATIVE STUDY OF MACHINE LEARNING ALGORITHMS FOR EEG SIGNAL CLASSIFICATION
A COMPARATIVE STUDY OF MACHINE LEARNING ALGORITHMS FOR EEG SIGNAL CLASSIFICATION
 
A Comparative Study of Machine Learning Algorithms for EEG Signal Classification
A Comparative Study of Machine Learning Algorithms for EEG Signal ClassificationA Comparative Study of Machine Learning Algorithms for EEG Signal Classification
A Comparative Study of Machine Learning Algorithms for EEG Signal Classification
 
A Comparative Study of Machine Learning Algorithms for EEG Signal Classification
A Comparative Study of Machine Learning Algorithms for EEG Signal ClassificationA Comparative Study of Machine Learning Algorithms for EEG Signal Classification
A Comparative Study of Machine Learning Algorithms for EEG Signal Classification
 
IRJET- Machine Learning Approach for Emotion Recognition using EEG Signals
IRJET-  	  Machine Learning Approach for Emotion Recognition using EEG SignalsIRJET-  	  Machine Learning Approach for Emotion Recognition using EEG Signals
IRJET- Machine Learning Approach for Emotion Recognition using EEG Signals
 
The second seminar
The second seminarThe second seminar
The second seminar
 
Motor Imagery Recognition of EEG Signal using Cuckoo Search Masking Empirical...
Motor Imagery Recognition of EEG Signal using Cuckoo Search Masking Empirical...Motor Imagery Recognition of EEG Signal using Cuckoo Search Masking Empirical...
Motor Imagery Recognition of EEG Signal using Cuckoo Search Masking Empirical...
 
Motor Imagery based Brain Computer Interface for Windows Operating System
Motor Imagery based Brain Computer Interface for Windows Operating SystemMotor Imagery based Brain Computer Interface for Windows Operating System
Motor Imagery based Brain Computer Interface for Windows Operating System
 
rob 537 final paper(fourth modify)
rob 537 final paper(fourth modify)rob 537 final paper(fourth modify)
rob 537 final paper(fourth modify)
 
Using Brain Waves as New Biometric Feature for Authenticating a Computer User...
Using Brain Waves as New Biometric Feature for Authenticating a Computer User...Using Brain Waves as New Biometric Feature for Authenticating a Computer User...
Using Brain Waves as New Biometric Feature for Authenticating a Computer User...
 
Improved feature exctraction process to detect seizure using CHBMIT-dataset ...
Improved feature exctraction process to detect seizure  using CHBMIT-dataset ...Improved feature exctraction process to detect seizure  using CHBMIT-dataset ...
Improved feature exctraction process to detect seizure using CHBMIT-dataset ...
 
Prediction Model for Emotion Recognition Using EEG
Prediction Model for Emotion Recognition Using EEGPrediction Model for Emotion Recognition Using EEG
Prediction Model for Emotion Recognition Using EEG
 
Recognition of emotional states using EEG signals based on time-frequency ana...
Recognition of emotional states using EEG signals based on time-frequency ana...Recognition of emotional states using EEG signals based on time-frequency ana...
Recognition of emotional states using EEG signals based on time-frequency ana...
 
Efficient electro encephelogram classification system using support vector ma...
Efficient electro encephelogram classification system using support vector ma...Efficient electro encephelogram classification system using support vector ma...
Efficient electro encephelogram classification system using support vector ma...
 
Robot Motion Control Using the Emotiv EPOC EEG System
Robot Motion Control Using the Emotiv EPOC EEG SystemRobot Motion Control Using the Emotiv EPOC EEG System
Robot Motion Control Using the Emotiv EPOC EEG System
 
IRJET-A Survey on Effect of Meditation on Attention Level Using EEG
IRJET-A Survey on Effect of Meditation on Attention Level Using EEGIRJET-A Survey on Effect of Meditation on Attention Level Using EEG
IRJET-A Survey on Effect of Meditation on Attention Level Using EEG
 
IRJET - Detection of Depression Level using EEG Signal
IRJET -  	  Detection of Depression Level using EEG SignalIRJET -  	  Detection of Depression Level using EEG Signal
IRJET - Detection of Depression Level using EEG Signal
 

More from Buthainah Hamdy

الكمبيوتر وتكنولوجيا المعلومات والاتصالات الدرس السادس
الكمبيوتر وتكنولوجيا المعلومات والاتصالات الدرس السادسالكمبيوتر وتكنولوجيا المعلومات والاتصالات الدرس السادس
الكمبيوتر وتكنولوجيا المعلومات والاتصالات الدرس السادسButhainah Hamdy
 
_الكمبيوتر وتكنولوجيا المعلومات والاتصالات الدرس الخامس
_الكمبيوتر وتكنولوجيا المعلومات والاتصالات الدرس الخامس_الكمبيوتر وتكنولوجيا المعلومات والاتصالات الدرس الخامس
_الكمبيوتر وتكنولوجيا المعلومات والاتصالات الدرس الخامسButhainah Hamdy
 
_الكمبيوتر وتكنولوجيا المعلومات والاتصالات الدرس الرابع
_الكمبيوتر وتكنولوجيا المعلومات والاتصالات الدرس الرابع_الكمبيوتر وتكنولوجيا المعلومات والاتصالات الدرس الرابع
_الكمبيوتر وتكنولوجيا المعلومات والاتصالات الدرس الرابعButhainah Hamdy
 
الكمبيوتر وتكنولوجيا المعلومات والاتصالات الدرس الثالث.pdf
الكمبيوتر وتكنولوجيا المعلومات والاتصالات الدرس الثالث.pdfالكمبيوتر وتكنولوجيا المعلومات والاتصالات الدرس الثالث.pdf
الكمبيوتر وتكنولوجيا المعلومات والاتصالات الدرس الثالث.pdfButhainah Hamdy
 
الكمبيوتر وتكنولوجيا المعلومات والاتصالات الدرس الثاني
الكمبيوتر وتكنولوجيا المعلومات والاتصالات   الدرس الثانيالكمبيوتر وتكنولوجيا المعلومات والاتصالات   الدرس الثاني
الكمبيوتر وتكنولوجيا المعلومات والاتصالات الدرس الثانيButhainah Hamdy
 
الكمبيوتر وتكنولوجيا المعلومات والاتصالات الدرس الأول
الكمبيوتر وتكنولوجيا المعلومات والاتصالات الدرس الأولالكمبيوتر وتكنولوجيا المعلومات والاتصالات الدرس الأول
الكمبيوتر وتكنولوجيا المعلومات والاتصالات الدرس الأولButhainah Hamdy
 
الوحدة الثانية إنشاء ومعالجة الصور برنامج GIMP
الوحدة الثانية إنشاء ومعالجة الصور  برنامج GIMPالوحدة الثانية إنشاء ومعالجة الصور  برنامج GIMP
الوحدة الثانية إنشاء ومعالجة الصور برنامج GIMPButhainah Hamdy
 
Robust Part-Based Hand Gesture Recognition Using Kinect Sensor
Robust Part-Based Hand Gesture Recognition Using Kinect SensorRobust Part-Based Hand Gesture Recognition Using Kinect Sensor
Robust Part-Based Hand Gesture Recognition Using Kinect SensorButhainah Hamdy
 
History of Writing (GRAPHOLOGY)
History of Writing (GRAPHOLOGY)History of Writing (GRAPHOLOGY)
History of Writing (GRAPHOLOGY)Buthainah Hamdy
 

More from Buthainah Hamdy (12)

الكمبيوتر وتكنولوجيا المعلومات والاتصالات الدرس السادس
الكمبيوتر وتكنولوجيا المعلومات والاتصالات الدرس السادسالكمبيوتر وتكنولوجيا المعلومات والاتصالات الدرس السادس
الكمبيوتر وتكنولوجيا المعلومات والاتصالات الدرس السادس
 
_الكمبيوتر وتكنولوجيا المعلومات والاتصالات الدرس الخامس
_الكمبيوتر وتكنولوجيا المعلومات والاتصالات الدرس الخامس_الكمبيوتر وتكنولوجيا المعلومات والاتصالات الدرس الخامس
_الكمبيوتر وتكنولوجيا المعلومات والاتصالات الدرس الخامس
 
_الكمبيوتر وتكنولوجيا المعلومات والاتصالات الدرس الرابع
_الكمبيوتر وتكنولوجيا المعلومات والاتصالات الدرس الرابع_الكمبيوتر وتكنولوجيا المعلومات والاتصالات الدرس الرابع
_الكمبيوتر وتكنولوجيا المعلومات والاتصالات الدرس الرابع
 
الكمبيوتر وتكنولوجيا المعلومات والاتصالات الدرس الثالث.pdf
الكمبيوتر وتكنولوجيا المعلومات والاتصالات الدرس الثالث.pdfالكمبيوتر وتكنولوجيا المعلومات والاتصالات الدرس الثالث.pdf
الكمبيوتر وتكنولوجيا المعلومات والاتصالات الدرس الثالث.pdf
 
الكمبيوتر وتكنولوجيا المعلومات والاتصالات الدرس الثاني
الكمبيوتر وتكنولوجيا المعلومات والاتصالات   الدرس الثانيالكمبيوتر وتكنولوجيا المعلومات والاتصالات   الدرس الثاني
الكمبيوتر وتكنولوجيا المعلومات والاتصالات الدرس الثاني
 
الكمبيوتر وتكنولوجيا المعلومات والاتصالات الدرس الأول
الكمبيوتر وتكنولوجيا المعلومات والاتصالات الدرس الأولالكمبيوتر وتكنولوجيا المعلومات والاتصالات الدرس الأول
الكمبيوتر وتكنولوجيا المعلومات والاتصالات الدرس الأول
 
الوحدة الثانية إنشاء ومعالجة الصور برنامج GIMP
الوحدة الثانية إنشاء ومعالجة الصور  برنامج GIMPالوحدة الثانية إنشاء ومعالجة الصور  برنامج GIMP
الوحدة الثانية إنشاء ومعالجة الصور برنامج GIMP
 
Robust Part-Based Hand Gesture Recognition Using Kinect Sensor
Robust Part-Based Hand Gesture Recognition Using Kinect SensorRobust Part-Based Hand Gesture Recognition Using Kinect Sensor
Robust Part-Based Hand Gesture Recognition Using Kinect Sensor
 
EEG survey
EEG surveyEEG survey
EEG survey
 
History of Writing (GRAPHOLOGY)
History of Writing (GRAPHOLOGY)History of Writing (GRAPHOLOGY)
History of Writing (GRAPHOLOGY)
 
Graphology .
Graphology .Graphology .
Graphology .
 
Graphology research
Graphology researchGraphology research
Graphology research
 

Recently uploaded

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 

Recently uploaded (20)

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 

Using Brain Waves as New Biometric Feature for Authenticating a Computer User in Real-Time

  • 1. International Journal of Biometrics and Bioinformatics (IJBB), Volume (7) : Issue (1) : 2013 Presented by buthainah hamdy
  • 2.  Abstract  1-INTRODUCTION  2-RELATED WORK  3-METHODOLOGY 3-1 Data Acquisition 3-2 Preprocessing and Feature Extraction 3-3 Classification 3-4 Implementation  4-CONCLUSION
  • 3.  We propose an EEG based BCI as new modality for Person Authentication an develop a screen lock application that will lock and unlock the computer screen.  The brain waves of the person, recorded in real time are used as password to unlock the screen.  Using 14 sensors of Emotiv headset.  Compute the power spectral density.  The channel spectral power in the frequency band of alpha, beta and gamma is used in the classification task.
  • 4.  A two stage checking is done to authenticate the user.  A proximity value of 0.78 and above is considered a good match.  The percentage of accuracy in classification is found to be good.  No external stimulus is used.
  • 5.  Abstract  1-INTRODUCTION  2-RELATED WORK  3-METHODOLOGY 3-1 Data Acquisition 3-2 Preprocessing and Feature Extraction 3-3 Classification 3-4 Implementation  4-CONCLUSION
  • 6. In this computer driven era, with the increase in security threats, securing and managing the resources has become a more complex challenge. Therefore, it is crucial to design a high security system for authentication. The world getting ready to transit from Graphic User Interface (GUI) to Natural User Interface (NUI) technology. We have made an attempt to build an authentication system based on thoughts.
  • 7.  Are based on personal identification number (PIN) and password that can be attacked by “shoulder surfing”.  The biometric approaches based on the biological characteristics of humans cannot be hacked, stolen or transferred from one person to another as they are unique for each person.  But it change with age and time.
  • 8.  Multimodal fusion for identity verification has shown great improvement compared to unimodal algorithms where they propose to integrate confidence measures during the fusion process.
  • 9.  Mostly use fingerprints, speech, facial features, iris and signatures as a base for an authentication or an identification system.  These traits however, are known to be vulnerable to falsification as it is possible to forge or steal.  Therefore, new types of physiological features that are unique and cannot be replicated are proposed for an identification system.  Electroencephalogram (EEG) signal as a biometric.  The EEG based biometrics is widely being considered in security sensitive areas like banks, labs and identification of criminal in forensic.  It can be used as a component of National e-identity card in government sector, as they have proven to be unique between people.
  • 10.  Aims to convey people's intentions to the outside world directly from their thoughts, and is a direct communication pathway between a brain and an external device.  A common method for designing BCI is to use EEG signals extracted during mental tasks that brain records using EEG sensors (electrodes).  Person authentication aims to accept or reject a person claiming an identity, comparing a biometric data to one template, while the goal of person identification is to match the biometric data against all the records in a database.  In our work, we have made an attempt to authenticate a system, rather than identification.  Brain waves measured by EEG represent a summary of brain electrical activity at a recording point on the scalp .  The fusion of delta, theta, alpha/mu, beta and gamma waves in frequency band.
  • 11. Illustration of Location of Electrodes on the Emotiv Headset
  • 12.  We perform data acquisition, feature extraction, matching the feature vector with the stored template all in real time.  we have used Power Spectral Density(PSD) as a reliable feature.  PSD is the measure of the how much power strength at each frequency.  It shows which frequencies variations are strong and which frequencies variations are weak.  Principal Component Analysis(PCA) is applied to reduce the feature size.  The obtained feature vector is then compared against a previously stored feature vector for the same person using template matching.
  • 13.  The match is considered good if the result of the comparison is greater than the threshold value 0.78 after repeated trials keeping in mind the need to satisfy low False Acceptance Error (FAE) and False Rejection Error (FRE).  False Rejections(FR) will be approximately equal to the proportion of False Acceptances (FA)called as Equal Error Rate(EER).
  • 14.  We have developed a GUI, to let a user lock his computer screen when required and unlock the same by recording his brain activity (EEG signals) as a password for the system.  An identity authentication system has to deal with two kinds of events:  1-either the person claiming a given identity is the one who he claims to be (in which case, he is called a client) 2-he is not(in which case, he is called an impostor).  The main aim is to keep the False Acceptance Error (FAE) and the False Rejection Error (FRE) close to zero.
  • 15.  Abstract  1-INTRODUCTION  2-RELATED WORK  3-METHODOLOGY 3-1 Data Acquisition 3-2 Preprocessing and Feature Extraction 3-3 Classification 3-4 Implementation  4-CONCLUSION
  • 16.  EEG based person authentication was first proposed by Marcel.  Used Power Spectral Density as the feature ,a statistical framework based on Gaussian Mixture Models (GMM) and Maximum A Posteriori Model (MAP) Adaptation on speaker and face authentication.  Neural network classification was performed on real EEG data of healthy individuals to experimentally investigate the connection between a person's EEG and genetically specific information.  correct classification scores in the range of 80% to 100% for person identification.
  • 17.  Two-stage biometric authentication method was proposed.  The feature extraction methodology includes both linear and nonlinear measures to give improved accuracy.  The combination of two-stage authentication with EEG features has good potential as a biometric as it is highly resistant to fraud.  Principal Component Analysis(PCA) is applied to reduce the feature size.
  • 18.  Abstract  1-INTRODUCTION  2-RELATED WORK  3-METHODOLOGY 3-1 Data Acquisition 3-2 Preprocessing and Feature Extraction 3-3 Classification 3-4 Implementation  4-CONCLUSION
  • 20.  EEG signals are recorded.  The sampling rate is 128Hz.  The total time of each recording is 10 seconds.  The subject is instructed to avoid blinking or moving his body during the data collection to prevent the noise caused due to artifacts.  Artifacts due to eye blinks produces a high amplitude signal called Electrooculogram (EOG) that can be many times greater than the EEG signals.  The dataset from normal subjects are recorded for two active cognitive tasks during each recording session.  1-Meditation activity: The subject is asked to meditate for a fixed period of time while his brain waves are recorded.  2-Math activity: The subject is given non-trivial multiplication problems, such as 79 times 56 and is asked to solve them without vocalizing or making any other physical movements.  The problems were designed so that they could not be solved in the time allowed.
  • 21.  The EEG data is segmented.  Channel spectral power for three spectral bands Alpha, Beta and Gamma is computed.  14 x 3 = 42 features are extracted for each segment of the data.  Using PCA and PSD.  The unit of PSD is energy per frequency (width).  Computation of PSD can be done directly by the method of Fourier analysis or computing autocorrelation function and then transforming it.
  • 22.  The Discrete Fourier transform is given by  where (f1, f2) is the frequency band and Sx(f) is the power spectral density. The inter-hemispheric channel spectral power differences in each spectral band are given by P 𝑑𝑖𝑓𝑓 = (P1 – P2) / (P1 + P2) where P1 and P2 are the powers in different channels in the same spectral band but in the opposite hemispheres.
  • 23.  The obtained feature vector is compared against a previously stored feature vector for that subject, using Euclidean Distance for template matching.  The match is considered good if the result of the comparison >0.78  keeping in mind the need to satisfy low False Acceptance Error (FAE) and False Rejection Error (FRE).
  • 24.  The authentication system was realized by developing an application which would lock and unlock the screen.  Initially the screen is locked and a subject’s EEG signals for two mental tasks are recorded and stored as a reference, called the training phase.  If the screen is to be unlocked, the subject’s brain waves are recorded again and matched with the earlier stored sample. If there is a considerable match, then the screen is unlocked, otherwise it will stay locked.
  • 25.  The description of the working prototype is outlined as:  1-Training of the system  2-Feature extraction  3-Creating user profile  4-Authenticating  The feature extraction and matching part are coded in MATLAB, while the UI part is designed and coded in C#.
  • 27.  Steps  Step 1: The initial screen which is the main prompt screen facilitates the user to perform the lock screen, add/remove user, change account name and restore activities.  Step 2: We add a new user as there are no existing users initially. The training form opens wherein we train the system for authentication. The training is based on two activities, Meditation and Math activity. While the subject is performing these activities, the signals are recorded and stored. Main Prompt Window.
  • 28.  Step 3: Once the training process is complete, the user returns to the main prompt form .The user can now lock the screen by clicking on the lock screen option. The login form appears wherein user name has to be specified for unlocking the screen. There are 3 available options, Unlock, Restart and Shutdown. User login window
  • 29.  Step 4: When the unlock option is pressed by the user an authentication form appears. Two activities, for which the system has been trained earlier, must be performed for authentication , one after the other.  Step 5: If the authentication is successful then the main prompt form is displayed and the screen is successfully unlocked, else the authentication fails and the screen remains in the locked state.
  • 30.  Abstract  1-INTRODUCTION  2-RELATED WORK  3-METHODOLOGY 3-1 Data Acquisition 3-2 Preprocessing and Feature Extraction 3-3 Classification 3-4 Implementation  4-CONCLUSION
  • 31.  the EEG can be used for biometric authentication.  Person authentication aims to accept or reject a person claiming an identity.  We perform EEG recording, feature extraction and matching of the feature vector with the stored feature vector, all in real time. This system is designed without using any type of external stimulus. This work, however, needs more refinement such as, i. Recording must be done in clinical conditions where there are no external interferences (noise free environment). ii. Training the users to perform the various mental tasks with full concentration. iii. Handling high dimensional data. iv. Devising a more or less perfect matching algorithm that gives 0 FAE and 0 FRE.