SlideShare a Scribd company logo
Guided By Submitted By
Mr. Jayakumar M.E., J.Jercy Monica
Reg No: 960121403006
Abstract
• Nowadays, to access any digital device we use authentication techniques, which is a critical technology in
terms of security.
• Present biometric authentications such as fingerprints or face recognition are the most used methods in our
digitalized world, which are impressively advantageous in terms of security.
• There are still some flaws, like not being useful for physical disabilities, environment usage matters, and
most importantly the possibility of replicating them with some new technologies because of their visuality.
• Brain signal is another human biometric that could cover the issues of other types in terms of security and
visibility.
• This paper proposes a method using the deep breath strategy to use brain signals for authentication purposes
regardless of brain situation.
• The result shows that the proposal accomplishment can alter the entire cycle of brain-based authentication
and EEG-based authentication methods according to the parameter of permanency of the technique in many
different brain states.
Introduction
• Brain signals have some important advantages in comparison with other biometrics. For
instance, to acquire the EEG signal, the person must be alive.
• Some biometrics can be maintained from a human’s dead body after death, which would yet
legitimate for an acknowledgment after a while in the afterlife.
• Therefore, the user has to be alive to produce EEG data.
• On the other hand, EEG voltage decreases drastically with distance from the brain.
• Because EEG can change depending on the situation.
• In some positions, the brain doesn’t function properly and cannot be in its normal state to
create a pattern for a task. Some reasons like being sick, drunk, stress, etc.
Problem Statement
• By breaking down signals made from the cerebrum, one can comprehend mental practices of the
brain. Each brain state is related to a specific signal frequency, which is for understanding the
functional behavior of human brain construction.
• One of the important challenges for all brainwave authentication studies is brain pattern changes
in different brain situations.
• The EEG data of any person can change in some situations like being sick, drunk, addicted to
drugs, anxiety and any other situations that any human can experience in their life.
• Therefore, a method is needed that could have the permanency of the brain pattern and stability
over time, not just for a specific task or brain state but also for all the other states.
Objective
• The objective of this paper is to implement a method that improves the permanency of the
brain pattern using deep breathing in different brain situations.
Existing System
• The existing system is a continuous authentication method based on combination of
statistical decision machines for brain signals.
• Functional Near InfraRed Spectroscopy (NIRS) is used to measure brain oxyhemoglobin
changes for each subject to be authenticated.
• Such bio signal authentication is expected to be a viable complementary method to
traditional static security systems.
• The designed system is based on a discriminant function which utilizes the average weight
vector of one-versus-one support vector machines for NIRS spectra.
• By computing a histogram of Mahalanobis distances, high separability among subjects was
recognized.
Drawbacks
• NIRS measures changes in blood flow and oxygen levels in the brain using near-infrared
light.
• This technique is non-invasive and relatively inexpensive, but it is not as accurate as fMRI
and EEG, and the accuracy can be affected by factors such as hair and skin pigmentation.
Proposed System
• The proposed method has been done in four stages.
• First, recording the EEG signals from participants.
• Second, preprocessing the raw data, filtering, and normalization.
• Third, extracting the features from the clean data.
• The final stage, selecting the specific features according to the purpose of this study and
classification.
• Classification of EEG data with three labels, inhalation, holding the air and, exhalation was done
using SVM and NN classifiers.
Advantages
• Cannot be faked or forged, since none of the brain signals matches the others.
• Also, brain signals are invisible, so than no one can be able to forge it.
Block Diagram
EEG Sensor
Signal
Acquisition
Preprocessing
Feature
Extraction
Classification
Authentication
Algorithm Used
• Support Vector Machine (SVM)
• An SVM classifier builds a model that assigns new data points to one of the given categories.
• Thus, it can be viewed as a non-probabilistic binary linear classifier.
• Neural Network (NN)
• A neural network consists of units (neurons), arranged in layers, which convert an input vector
into some output.
• Each unit takes an input, applies a (often nonlinear) function to it and then passes the output on
to the next layer.
System Requirements
Hardware Requirements
• EEG Sensor
• Personal Computer
Software Requirements
• Jupyter Notebook
• Python Programming Language
Modules
• Signal Acquisition
• Pre-Processing
• Feature Extraction
• Classification
Signal Acquisition
• To acquiring the signals, EEG sensor and a computer to record and store the data, was used.
• The data are recorded, then digitized and got ready for analysis.
• According to the studies, the range of four to six minutes may be an appropriate time for
individuals to accumulate alpha brainwave successfully.
Pre-Processing
• To clear the data, a band-pass filter in the range of 0.5 Hz and 50 Hz was applied using a
Finite Impulse Response (FIR) technique.
• High-pass filter is one of the best ways to remove large amplitude and the slow drifts in the
data.
• The range of 0.5 Hz makes the data ready for Independent Component Analysis (ICA)
analysis technique, which is very sensitive to low band-pass frequencies.
• After filtering the data and clearing it from artifacts and noises, the ICA algorithm applied to
the data to do a blind source separation of the process of signal mixing.
Feature Extraction
• According to the aim of this project and analyzing the relaxation state brainwave types produced
by deep breathing, our main focus was on Alpha and Beta waves.
• Therefore, the power spectral density (PSD) method, which extracts the frequency characteristics
of signals was used.
• PSD presents a consistent and effective way to extract the characteristics of spectral patterns with
high discriminate accuracy for motor imagery EEGs.
• After visually inspecting the entire data for all subjects, three features were extracted from the
alpha and beta bands of PSD.
• This was done by recognizing and selecting the highest PSD peak values in each band separately.
Classification
• For the classification of the appropriately selected features, two classifiers were used.
• Support Vector Machine (SVM), and Neural Network (NN) which are the most commonly used
in classifying EEG signals.
• SVM and Neural Network can both express the information to a higher dimensional space to
allocate a choice limit.
• SVMs could be equivalent to a superficial neural network architecture.
• On the other hand, for a large amount of data, a NN will overtake an SVM.
• The two classes of calculations can surmise non-linear decision capacities, with various
methodologies.
Applications
• Access control
• Financial transactions
• Student verification systems
• Personal data verification
Conclusion
• An experiential study has been presented, which investigated deep breathings as a brain state for
authentication purposes based on human EEG data.
• An EEG Sensor is used in this study to record the brain waves of the participants, while they were
asked to take deep breaths in three steps each time.
• The results show that deep breathing can make the brain improve the alpha and beta waves no
matter which situation the person is experiencing which could be the best option to have a stable
brain pattern that could be predicted with high accuracy for the authentication process.
• Therefore, different parts of deep breathing is used as an authentication brain pattern and are able
to successfully achieve high accuracy using SVM and NN classifiers.
References
1) F. Yousefi, H. Kolivand, “Brain Signals as a New Biometric Authentication Method Using
Brain-Computer Interface”. In: Lee N.(eds) Encyclopedia of Computer Graphics and Games.
Springer, Cham, 2019.
2) Di, Y., An, X., He, F., Liu, S., Ke, Y., Ming, D., 2019. Robustness analysis of identification
using resting-state EEG signals. IEEE Access 7 (c), 42113–42122.
3) Ruiz-blondet, M., Khalifian, N., Armstrong, B.C., Jin, Z., Kurtz, K.J., Laszlo, S., 2014.
Brainprint: identifying unique features of neural activity with machine learning. In: Proc. 36th
Annual Conf. of the Cognitive Science Society, pp. 827–832.
4) Das, R., Piciucco, E., Maiorana, E., Campisi, P., 2016. Visually evoked potentials for EEG
biometrie recognition. In: 2016 1st International Workshop on Sensing, Processing and
Learning for Intelligent Machines, SPLINE 2016 –Proceedings.
5) Zhang, F., Mao, Z., Huang, Y., Lin, X., Ding, G., 2018. Deep learning models for eeg-based
rapid serial visual presentation event classification. J. Inf. Hiding Mul- timed. Signal Process. 9
(1), 177–187.
References…
6) Kaur, B., Singh, D., Roy, P.P., 2017. A novel framework of EEG-based user identification by
analyzing music-listening behavior. Multimed. Tools Appl. 76 (24), 25581–25602.
7) Alyasseri, Z.A.A., Khader, A T., Al-Betar, M.A., Papa, J.P., Ahmad Alomari, O., 2018. EEG-
based person authentication using multi-objective flower pollination algorithm. In: 2018 IEEE
Congress on Evolutionary Computation (CEC). IEEE, pp. 1–8.
8) Kumari, P., Vaish, A., 2016. Feature-level fusion of mental task’s brain signal for an efficient
identification system. Neural Comput. Appl. 27 (3), 659–669.
9) Yousefi, F., Kolivand, H. and Baker, T., 2020. SaS-BCI: a new strategy to predict image
memorability and use mental imagery as a brain-based biometric authentication. Neural
Computing and Applications, pp.1-15.
10) Chen, J.X., Mao, Z.J., Yao, W.X. and Huang, Y.F., 2019. EEG-based biometric identification
with convolutional neural network. Multimedia Tools and Applications, pp.1-21.
A New Solution to the Brain State Permanency for Brain-Based Authentication Methods.pptx

More Related Content

Similar to A New Solution to the Brain State Permanency for Brain-Based Authentication Methods.pptx

BCI
BCIBCI
BRAIN GATE
BRAIN GATEBRAIN GATE
BRAIN GATE
Namrata Koley
 
Mind Reading Device
Mind Reading DeviceMind Reading Device
Mind Reading Device
biomedicz
 
BCI
BCIBCI
BRAIN FINGERPRINTING TECHNOLOGY
BRAIN FINGERPRINTING TECHNOLOGYBRAIN FINGERPRINTING TECHNOLOGY
BRAIN FINGERPRINTING TECHNOLOGY
Divyaprathapraju Divyaprathapraju
 
Brain computer interface
Brain computer interfaceBrain computer interface
Brain computer interface
NeurologyKota
 
Brain finger printing technology
Brain finger printing technologyBrain finger printing technology
Brain finger printing technology
Divyaprathapraju Divyaprathapraju
 
Human Brain Simulation for Robotic Applications
Human Brain Simulation for Robotic ApplicationsHuman Brain Simulation for Robotic Applications
Human Brain Simulation for Robotic Applications
DR.P.S.JAGADEESH KUMAR
 
Brain computer interface based
Brain computer interface basedBrain computer interface based
Brain computer interface basedMohammed Saeed
 
Brain wave
Brain waveBrain wave
Brain wave
rohitgb
 
Prem
PremPrem
Biorobotics 140203232936-phpapp01
Biorobotics 140203232936-phpapp01Biorobotics 140203232936-phpapp01
Biorobotics 140203232936-phpapp01
UsamaIqbal37
 
Brain Fingerprinting
Brain FingerprintingBrain Fingerprinting
Brain Fingerprintingveera
 
Bio Robotics
Bio RoboticsBio Robotics
Bio Robotics
Abida Zama
 
Overview of Machine Learning and Deep Learning Methods in Brain Computer Inte...
Overview of Machine Learning and Deep Learning Methods in Brain Computer Inte...Overview of Machine Learning and Deep Learning Methods in Brain Computer Inte...
Overview of Machine Learning and Deep Learning Methods in Brain Computer Inte...
IJCSES Journal
 
Brain Computer Interface (BCI)
Brain Computer Interface (BCI)Brain Computer Interface (BCI)
Brain Computer Interface (BCI)
Debabrata Chakraborty
 
Brain frequency based handicap wheelchair
Brain frequency based handicap wheelchairBrain frequency based handicap wheelchair
Brain frequency based handicap wheelchair
Dhanuaravinth K
 
Final thesis presentation on bci
Final thesis presentation on bciFinal thesis presentation on bci
Final thesis presentation on bci
Redwan Islam
 

Similar to A New Solution to the Brain State Permanency for Brain-Based Authentication Methods.pptx (20)

BCI
BCIBCI
BCI
 
BRAIN GATE
BRAIN GATEBRAIN GATE
BRAIN GATE
 
Mind Reading Device
Mind Reading DeviceMind Reading Device
Mind Reading Device
 
Ferree Resume
Ferree ResumeFerree Resume
Ferree Resume
 
BCI
BCIBCI
BCI
 
BRAIN FINGERPRINTING TECHNOLOGY
BRAIN FINGERPRINTING TECHNOLOGYBRAIN FINGERPRINTING TECHNOLOGY
BRAIN FINGERPRINTING TECHNOLOGY
 
Brain computer interface
Brain computer interfaceBrain computer interface
Brain computer interface
 
Brain finger printing technology
Brain finger printing technologyBrain finger printing technology
Brain finger printing technology
 
Human Brain Simulation for Robotic Applications
Human Brain Simulation for Robotic ApplicationsHuman Brain Simulation for Robotic Applications
Human Brain Simulation for Robotic Applications
 
Brain computer interface based
Brain computer interface basedBrain computer interface based
Brain computer interface based
 
Brain wave
Brain waveBrain wave
Brain wave
 
Prem
PremPrem
Prem
 
Biorobotics 140203232936-phpapp01
Biorobotics 140203232936-phpapp01Biorobotics 140203232936-phpapp01
Biorobotics 140203232936-phpapp01
 
Brain Fingerprinting
Brain FingerprintingBrain Fingerprinting
Brain Fingerprinting
 
Bio Robotics
Bio RoboticsBio Robotics
Bio Robotics
 
Overview of Machine Learning and Deep Learning Methods in Brain Computer Inte...
Overview of Machine Learning and Deep Learning Methods in Brain Computer Inte...Overview of Machine Learning and Deep Learning Methods in Brain Computer Inte...
Overview of Machine Learning and Deep Learning Methods in Brain Computer Inte...
 
Brain Computer Interface (BCI)
Brain Computer Interface (BCI)Brain Computer Interface (BCI)
Brain Computer Interface (BCI)
 
NeuroMarketing
NeuroMarketing NeuroMarketing
NeuroMarketing
 
Brain frequency based handicap wheelchair
Brain frequency based handicap wheelchairBrain frequency based handicap wheelchair
Brain frequency based handicap wheelchair
 
Final thesis presentation on bci
Final thesis presentation on bciFinal thesis presentation on bci
Final thesis presentation on bci
 

Recently uploaded

MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
BrazilAccount1
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 

Recently uploaded (20)

MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 

A New Solution to the Brain State Permanency for Brain-Based Authentication Methods.pptx

  • 1. Guided By Submitted By Mr. Jayakumar M.E., J.Jercy Monica Reg No: 960121403006
  • 2. Abstract • Nowadays, to access any digital device we use authentication techniques, which is a critical technology in terms of security. • Present biometric authentications such as fingerprints or face recognition are the most used methods in our digitalized world, which are impressively advantageous in terms of security. • There are still some flaws, like not being useful for physical disabilities, environment usage matters, and most importantly the possibility of replicating them with some new technologies because of their visuality. • Brain signal is another human biometric that could cover the issues of other types in terms of security and visibility. • This paper proposes a method using the deep breath strategy to use brain signals for authentication purposes regardless of brain situation. • The result shows that the proposal accomplishment can alter the entire cycle of brain-based authentication and EEG-based authentication methods according to the parameter of permanency of the technique in many different brain states.
  • 3. Introduction • Brain signals have some important advantages in comparison with other biometrics. For instance, to acquire the EEG signal, the person must be alive. • Some biometrics can be maintained from a human’s dead body after death, which would yet legitimate for an acknowledgment after a while in the afterlife. • Therefore, the user has to be alive to produce EEG data. • On the other hand, EEG voltage decreases drastically with distance from the brain. • Because EEG can change depending on the situation. • In some positions, the brain doesn’t function properly and cannot be in its normal state to create a pattern for a task. Some reasons like being sick, drunk, stress, etc.
  • 4. Problem Statement • By breaking down signals made from the cerebrum, one can comprehend mental practices of the brain. Each brain state is related to a specific signal frequency, which is for understanding the functional behavior of human brain construction. • One of the important challenges for all brainwave authentication studies is brain pattern changes in different brain situations. • The EEG data of any person can change in some situations like being sick, drunk, addicted to drugs, anxiety and any other situations that any human can experience in their life. • Therefore, a method is needed that could have the permanency of the brain pattern and stability over time, not just for a specific task or brain state but also for all the other states.
  • 5. Objective • The objective of this paper is to implement a method that improves the permanency of the brain pattern using deep breathing in different brain situations.
  • 6. Existing System • The existing system is a continuous authentication method based on combination of statistical decision machines for brain signals. • Functional Near InfraRed Spectroscopy (NIRS) is used to measure brain oxyhemoglobin changes for each subject to be authenticated. • Such bio signal authentication is expected to be a viable complementary method to traditional static security systems. • The designed system is based on a discriminant function which utilizes the average weight vector of one-versus-one support vector machines for NIRS spectra. • By computing a histogram of Mahalanobis distances, high separability among subjects was recognized.
  • 7. Drawbacks • NIRS measures changes in blood flow and oxygen levels in the brain using near-infrared light. • This technique is non-invasive and relatively inexpensive, but it is not as accurate as fMRI and EEG, and the accuracy can be affected by factors such as hair and skin pigmentation.
  • 8. Proposed System • The proposed method has been done in four stages. • First, recording the EEG signals from participants. • Second, preprocessing the raw data, filtering, and normalization. • Third, extracting the features from the clean data. • The final stage, selecting the specific features according to the purpose of this study and classification. • Classification of EEG data with three labels, inhalation, holding the air and, exhalation was done using SVM and NN classifiers.
  • 9. Advantages • Cannot be faked or forged, since none of the brain signals matches the others. • Also, brain signals are invisible, so than no one can be able to forge it.
  • 11. Algorithm Used • Support Vector Machine (SVM) • An SVM classifier builds a model that assigns new data points to one of the given categories. • Thus, it can be viewed as a non-probabilistic binary linear classifier. • Neural Network (NN) • A neural network consists of units (neurons), arranged in layers, which convert an input vector into some output. • Each unit takes an input, applies a (often nonlinear) function to it and then passes the output on to the next layer.
  • 12. System Requirements Hardware Requirements • EEG Sensor • Personal Computer Software Requirements • Jupyter Notebook • Python Programming Language
  • 13. Modules • Signal Acquisition • Pre-Processing • Feature Extraction • Classification
  • 14. Signal Acquisition • To acquiring the signals, EEG sensor and a computer to record and store the data, was used. • The data are recorded, then digitized and got ready for analysis. • According to the studies, the range of four to six minutes may be an appropriate time for individuals to accumulate alpha brainwave successfully.
  • 15. Pre-Processing • To clear the data, a band-pass filter in the range of 0.5 Hz and 50 Hz was applied using a Finite Impulse Response (FIR) technique. • High-pass filter is one of the best ways to remove large amplitude and the slow drifts in the data. • The range of 0.5 Hz makes the data ready for Independent Component Analysis (ICA) analysis technique, which is very sensitive to low band-pass frequencies. • After filtering the data and clearing it from artifacts and noises, the ICA algorithm applied to the data to do a blind source separation of the process of signal mixing.
  • 16. Feature Extraction • According to the aim of this project and analyzing the relaxation state brainwave types produced by deep breathing, our main focus was on Alpha and Beta waves. • Therefore, the power spectral density (PSD) method, which extracts the frequency characteristics of signals was used. • PSD presents a consistent and effective way to extract the characteristics of spectral patterns with high discriminate accuracy for motor imagery EEGs. • After visually inspecting the entire data for all subjects, three features were extracted from the alpha and beta bands of PSD. • This was done by recognizing and selecting the highest PSD peak values in each band separately.
  • 17. Classification • For the classification of the appropriately selected features, two classifiers were used. • Support Vector Machine (SVM), and Neural Network (NN) which are the most commonly used in classifying EEG signals. • SVM and Neural Network can both express the information to a higher dimensional space to allocate a choice limit. • SVMs could be equivalent to a superficial neural network architecture. • On the other hand, for a large amount of data, a NN will overtake an SVM. • The two classes of calculations can surmise non-linear decision capacities, with various methodologies.
  • 18. Applications • Access control • Financial transactions • Student verification systems • Personal data verification
  • 19. Conclusion • An experiential study has been presented, which investigated deep breathings as a brain state for authentication purposes based on human EEG data. • An EEG Sensor is used in this study to record the brain waves of the participants, while they were asked to take deep breaths in three steps each time. • The results show that deep breathing can make the brain improve the alpha and beta waves no matter which situation the person is experiencing which could be the best option to have a stable brain pattern that could be predicted with high accuracy for the authentication process. • Therefore, different parts of deep breathing is used as an authentication brain pattern and are able to successfully achieve high accuracy using SVM and NN classifiers.
  • 20. References 1) F. Yousefi, H. Kolivand, “Brain Signals as a New Biometric Authentication Method Using Brain-Computer Interface”. In: Lee N.(eds) Encyclopedia of Computer Graphics and Games. Springer, Cham, 2019. 2) Di, Y., An, X., He, F., Liu, S., Ke, Y., Ming, D., 2019. Robustness analysis of identification using resting-state EEG signals. IEEE Access 7 (c), 42113–42122. 3) Ruiz-blondet, M., Khalifian, N., Armstrong, B.C., Jin, Z., Kurtz, K.J., Laszlo, S., 2014. Brainprint: identifying unique features of neural activity with machine learning. In: Proc. 36th Annual Conf. of the Cognitive Science Society, pp. 827–832. 4) Das, R., Piciucco, E., Maiorana, E., Campisi, P., 2016. Visually evoked potentials for EEG biometrie recognition. In: 2016 1st International Workshop on Sensing, Processing and Learning for Intelligent Machines, SPLINE 2016 –Proceedings. 5) Zhang, F., Mao, Z., Huang, Y., Lin, X., Ding, G., 2018. Deep learning models for eeg-based rapid serial visual presentation event classification. J. Inf. Hiding Mul- timed. Signal Process. 9 (1), 177–187.
  • 21. References… 6) Kaur, B., Singh, D., Roy, P.P., 2017. A novel framework of EEG-based user identification by analyzing music-listening behavior. Multimed. Tools Appl. 76 (24), 25581–25602. 7) Alyasseri, Z.A.A., Khader, A T., Al-Betar, M.A., Papa, J.P., Ahmad Alomari, O., 2018. EEG- based person authentication using multi-objective flower pollination algorithm. In: 2018 IEEE Congress on Evolutionary Computation (CEC). IEEE, pp. 1–8. 8) Kumari, P., Vaish, A., 2016. Feature-level fusion of mental task’s brain signal for an efficient identification system. Neural Comput. Appl. 27 (3), 659–669. 9) Yousefi, F., Kolivand, H. and Baker, T., 2020. SaS-BCI: a new strategy to predict image memorability and use mental imagery as a brain-based biometric authentication. Neural Computing and Applications, pp.1-15. 10) Chen, J.X., Mao, Z.J., Yao, W.X. and Huang, Y.F., 2019. EEG-based biometric identification with convolutional neural network. Multimedia Tools and Applications, pp.1-21.