SlideShare a Scribd company logo
 Md. Mahmudul Hasan
 Prof. Dr. Engr. Mohiuddin Ahmad
 Department of Electrical and Electronic Engineering, KUET, Khulna-9203, Bangladesh.
ContributionContribution
Working PrincipleWorking Principle Classification & AuthenticationClassification & Authentication
Feature ExtractionFeature Extraction
Development of a EEG-Based Biometric Authentication &
Security System
Motivation and ObjectivesMotivation and Objectives
Development of a biometric
authentication system based on
electroencephalogram(EEG).
 Comparison of EEG based
authentication with latest
technologies such as:
 Radio frequency Identification(RFID)
 Near Field Communication(NFC).
 Face detection using Image
Processing.
 To fill the gap between conventional
authentication system and biometric
authentication.
Step 1: Signal Acquisition
Step 2: Row signal pre-processing
a) Filtering
b) Artifact Removal
Step 3: Feature Extraction
 Time-domain feature extraction (mean, median,
and variance)
 Frequency-domain feature extraction (WT based)
and
 Time-frequency domain feature extraction(WPD
i.e. multi-level filters to analyze the time-
frequency information)
Step 4: Classification
 SVM(support vector machine)
 ANN(Artificial neural Network)
Step 5: Biometric Authentication
Fig 4. Plotting channel spectra
.
Discussion and ConclusionDiscussion and Conclusion
ReferencesReferences
System OverviewSystem Overview
EEG & Human AuthenticationEEG & Human Authentication
Flow ChartFlow Chart
Fig. 1. Flow chart of the EEG based security system.
EEG:
 Short form of “Electroencephalography”.
 EEG is nothing but human
“brainwave signal”.
 EEG brainwave pattern is unique from
one person to another like fingerprint.
 EEG signals are the signature of neural activities.
 It is almost impossible to steal.
 EEG is very difficult to mimic.
 EEG is referred as “Language of Mind”.
1) Something you know:
 Textual password
You have a secret that you know
2) Something you have:
A smart card
Barcode
3) Something you are:
A fingerprint
Iris
EEG signal
 EEG is a unique biometric
identifier.
 EEG is Just like Fingerprint.
 EEG Can not be easily
duplicated.
 Adjustments of the EEG head set
is very much important.
 FIR filter is used to remove linear
trends.
 Individuals with bushy hair don’t
have any problems.
according to the EEG Headset.
 EEG Headset are costlier.
 Effective for strong security
system.
• To proof that EEG signal alone is able to
create a unique pattern for each subject.
• To use simple feature extraction methods.
• To provide simple classification methods
to provide strong evidence.
• To make a novel algorithm with EEG signal
processing.
• To provide unique patterns and identify
people with other human features.
• To build a reliable security system.
Authentication system:
(Three fundamental Factors)
Fig. 2. Raw EEG Signals
Fig 3. plotting channel locations
Fig 5. After FIR Filtering (linear trends removed)
Signal Acquisition: EEG HeadsetSignal Acquisition: EEG Headset
Fig 7. Statistical analysis on the dataset
Fig. 6 : After removing channel artifacts
Channel artifact removalChannel artifact removal
[1] M. Poulos, M. Rangoussi, V. Chrissikopoulos, A. Evangelou. Parametric
person identification from the EEG using computational geometry. Proceedings
of the IEEE International Conference on Electronics, Circuits, and Systems,
2:1005–1008, 1999.
[2] R. Paranjape, J.Mahovsky, L. Benedicenti, Z. Koles. The
electroencephalogram as a biometrics. Proceedings of the Canadian Conference
on Electrical and Computer Engineering, 2:1363–1366, 2001.
[3] R. Palaniappan, D. Mandic. Biometrics from brain electrical activity: A machine
learning approach. IEEE Transactions on Pattern Analysis and Machine
Intelligence, 29(4):738–742, April 2007.
[4] S. Marcel, J. R. Mill´an. Person authentication using brainwaves (EEG) and
maximum a posteriori model adaptation. IEEE Transactions on Pattern Analysis
and Machine Intelligence, 29(4):743–748, April 2007.
[5] Sebastien Marcel a Jose del R. Millan Person authentication using
brainwaves (EEG) and Maximum a posteriori model adaptation, IEEE
Transactions on Pattern Analysis and Machine Intelligence Special Issue on
Biometrics 2007
[6] Xu Huang, Salahiddin Altahat, Dat Tran, Dharmendra Sharma, Human
Identification withElectroencephalogram (EEG) Signal Processing, 2012
International Symposium on Communications and Information Technologies
(ISCIT)

More Related Content

What's hot

IRJET- Image Classification using Deep Learning Neural Networks for Brain...
IRJET-  	  Image Classification using Deep Learning Neural Networks for Brain...IRJET-  	  Image Classification using Deep Learning Neural Networks for Brain...
IRJET- Image Classification using Deep Learning Neural Networks for Brain...
IRJET Journal
 
Optics and Photonics Concentration
Optics and Photonics ConcentrationOptics and Photonics Concentration
Intelligent and Automatic In vivo Detection and Quantification of Transplante...
Intelligent and Automatic In vivo Detection and Quantification of Transplante...Intelligent and Automatic In vivo Detection and Quantification of Transplante...
Intelligent and Automatic In vivo Detection and Quantification of Transplante...
Michigan State University Research
 
Mobile based Automated Complete Blood Count (Auto-CBC) Analysis System from B...
Mobile based Automated Complete Blood Count (Auto-CBC) Analysis System from B...Mobile based Automated Complete Blood Count (Auto-CBC) Analysis System from B...
Mobile based Automated Complete Blood Count (Auto-CBC) Analysis System from B...
IJECEIAES
 
Ietr2 b
Ietr2 bIetr2 b
Thesis presentation
Thesis presentationThesis presentation
Thesis presentation
Aras Masood
 
ECE Technical Interest Groups
ECE Technical Interest GroupsECE Technical Interest Groups
Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...
researchinventy
 
CLASSIFICATION OF CANCER BY GENE EXPRESSION USING NEURAL NETWORK
CLASSIFICATION OF CANCER BY GENE EXPRESSION USING NEURAL NETWORKCLASSIFICATION OF CANCER BY GENE EXPRESSION USING NEURAL NETWORK
CLASSIFICATION OF CANCER BY GENE EXPRESSION USING NEURAL NETWORK
International Research Journal of Modernization in Engineering Technology and Science
 
TOP 10 CITED PAPERS FOR CRYPTOGRAPHY AND INFORMATION SECURITY
TOP 10 CITED PAPERS FOR CRYPTOGRAPHY AND INFORMATION SECURITYTOP 10 CITED PAPERS FOR CRYPTOGRAPHY AND INFORMATION SECURITY
TOP 10 CITED PAPERS FOR CRYPTOGRAPHY AND INFORMATION SECURITY
ijcisjournal
 
IRJET- Anomaly Detection System in CCTV Derived Videos
IRJET- Anomaly Detection System in CCTV Derived VideosIRJET- Anomaly Detection System in CCTV Derived Videos
IRJET- Anomaly Detection System in CCTV Derived Videos
IRJET Journal
 
Presentation
PresentationPresentation
Presentation
Videoguy
 
Education and Researching
Education and ResearchingEducation and Researching
Education and Researching
Zhijie Li
 
Ieeepro techno solutions 2013 ieee embedded project - analysis of an indoo...
Ieeepro techno solutions   2013 ieee embedded project  - analysis of an indoo...Ieeepro techno solutions   2013 ieee embedded project  - analysis of an indoo...
Ieeepro techno solutions 2013 ieee embedded project - analysis of an indoo...
srinivasanece7
 
AMA-IEEE Presentation : a low-power and reliable body area network platform f...
AMA-IEEE Presentation : a low-power and reliable body area network platform f...AMA-IEEE Presentation : a low-power and reliable body area network platform f...
AMA-IEEE Presentation : a low-power and reliable body area network platform f...
fabienmasse
 
Program for 2015 ieee international conference on consumer electronics taiw...
Program for 2015 ieee international conference on consumer electronics   taiw...Program for 2015 ieee international conference on consumer electronics   taiw...
Program for 2015 ieee international conference on consumer electronics taiw...
supra_uny
 
IRJET- Assessment of Blood Vessel using Fat Cell Acoustics
IRJET-  	  Assessment of Blood Vessel using Fat Cell AcousticsIRJET-  	  Assessment of Blood Vessel using Fat Cell Acoustics
IRJET- Assessment of Blood Vessel using Fat Cell Acoustics
IRJET Journal
 
A NOVEL DNA ENCRYPTION SYSTEM USING CELLULAR AUTOMATA
A NOVEL DNA ENCRYPTION SYSTEM USING CELLULAR AUTOMATAA NOVEL DNA ENCRYPTION SYSTEM USING CELLULAR AUTOMATA
A NOVEL DNA ENCRYPTION SYSTEM USING CELLULAR AUTOMATA
ijsptm
 
Rios_Esther_UMassREUPoster
Rios_Esther_UMassREUPosterRios_Esther_UMassREUPoster
Rios_Esther_UMassREUPoster
Esther
 
Research on security of the wlan campus network
Research on security of the wlan campus networkResearch on security of the wlan campus network
Research on security of the wlan campus network
karthik
 

What's hot (20)

IRJET- Image Classification using Deep Learning Neural Networks for Brain...
IRJET-  	  Image Classification using Deep Learning Neural Networks for Brain...IRJET-  	  Image Classification using Deep Learning Neural Networks for Brain...
IRJET- Image Classification using Deep Learning Neural Networks for Brain...
 
Optics and Photonics Concentration
Optics and Photonics ConcentrationOptics and Photonics Concentration
Optics and Photonics Concentration
 
Intelligent and Automatic In vivo Detection and Quantification of Transplante...
Intelligent and Automatic In vivo Detection and Quantification of Transplante...Intelligent and Automatic In vivo Detection and Quantification of Transplante...
Intelligent and Automatic In vivo Detection and Quantification of Transplante...
 
Mobile based Automated Complete Blood Count (Auto-CBC) Analysis System from B...
Mobile based Automated Complete Blood Count (Auto-CBC) Analysis System from B...Mobile based Automated Complete Blood Count (Auto-CBC) Analysis System from B...
Mobile based Automated Complete Blood Count (Auto-CBC) Analysis System from B...
 
Ietr2 b
Ietr2 bIetr2 b
Ietr2 b
 
Thesis presentation
Thesis presentationThesis presentation
Thesis presentation
 
ECE Technical Interest Groups
ECE Technical Interest GroupsECE Technical Interest Groups
ECE Technical Interest Groups
 
Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...
 
CLASSIFICATION OF CANCER BY GENE EXPRESSION USING NEURAL NETWORK
CLASSIFICATION OF CANCER BY GENE EXPRESSION USING NEURAL NETWORKCLASSIFICATION OF CANCER BY GENE EXPRESSION USING NEURAL NETWORK
CLASSIFICATION OF CANCER BY GENE EXPRESSION USING NEURAL NETWORK
 
TOP 10 CITED PAPERS FOR CRYPTOGRAPHY AND INFORMATION SECURITY
TOP 10 CITED PAPERS FOR CRYPTOGRAPHY AND INFORMATION SECURITYTOP 10 CITED PAPERS FOR CRYPTOGRAPHY AND INFORMATION SECURITY
TOP 10 CITED PAPERS FOR CRYPTOGRAPHY AND INFORMATION SECURITY
 
IRJET- Anomaly Detection System in CCTV Derived Videos
IRJET- Anomaly Detection System in CCTV Derived VideosIRJET- Anomaly Detection System in CCTV Derived Videos
IRJET- Anomaly Detection System in CCTV Derived Videos
 
Presentation
PresentationPresentation
Presentation
 
Education and Researching
Education and ResearchingEducation and Researching
Education and Researching
 
Ieeepro techno solutions 2013 ieee embedded project - analysis of an indoo...
Ieeepro techno solutions   2013 ieee embedded project  - analysis of an indoo...Ieeepro techno solutions   2013 ieee embedded project  - analysis of an indoo...
Ieeepro techno solutions 2013 ieee embedded project - analysis of an indoo...
 
AMA-IEEE Presentation : a low-power and reliable body area network platform f...
AMA-IEEE Presentation : a low-power and reliable body area network platform f...AMA-IEEE Presentation : a low-power and reliable body area network platform f...
AMA-IEEE Presentation : a low-power and reliable body area network platform f...
 
Program for 2015 ieee international conference on consumer electronics taiw...
Program for 2015 ieee international conference on consumer electronics   taiw...Program for 2015 ieee international conference on consumer electronics   taiw...
Program for 2015 ieee international conference on consumer electronics taiw...
 
IRJET- Assessment of Blood Vessel using Fat Cell Acoustics
IRJET-  	  Assessment of Blood Vessel using Fat Cell AcousticsIRJET-  	  Assessment of Blood Vessel using Fat Cell Acoustics
IRJET- Assessment of Blood Vessel using Fat Cell Acoustics
 
A NOVEL DNA ENCRYPTION SYSTEM USING CELLULAR AUTOMATA
A NOVEL DNA ENCRYPTION SYSTEM USING CELLULAR AUTOMATAA NOVEL DNA ENCRYPTION SYSTEM USING CELLULAR AUTOMATA
A NOVEL DNA ENCRYPTION SYSTEM USING CELLULAR AUTOMATA
 
Rios_Esther_UMassREUPoster
Rios_Esther_UMassREUPosterRios_Esther_UMassREUPoster
Rios_Esther_UMassREUPoster
 
Research on security of the wlan campus network
Research on security of the wlan campus networkResearch on security of the wlan campus network
Research on security of the wlan campus network
 

Viewers also liked

Notice of placement change form
Notice of placement change formNotice of placement change form
Notice of placement change form
screaminc
 
Analysis, design, and performance evaluations of an edge resonant switched ca...
Analysis, design, and performance evaluations of an edge resonant switched ca...Analysis, design, and performance evaluations of an edge resonant switched ca...
Analysis, design, and performance evaluations of an edge resonant switched ca...
Ecwaytechnoz
 
BCM Institute MTE Touw June Wah Singapore Business Federation - The National...
BCM Institute MTE  Touw June Wah Singapore Business Federation - The National...BCM Institute MTE  Touw June Wah Singapore Business Federation - The National...
BCM Institute MTE Touw June Wah Singapore Business Federation - The National...
BCM Institute
 
medhat_cv modefided .
medhat_cv modefided .medhat_cv modefided .
medhat_cv modefided .
Eng.Medhat El Sayed
 
Floor Ready Services, Inc.
Floor Ready Services, Inc.Floor Ready Services, Inc.
Floor Ready Services, Inc.
floorready
 
BPS Champions League - Team
BPS Champions League - TeamBPS Champions League - Team
BPS Champions League - Team
Bharath Chekuri
 
Deficit widens
Deficit widensDeficit widens
Deficit widens
allplacedout
 
Fotos Ultima Aula
Fotos Ultima AulaFotos Ultima Aula
Fotos Ultima Aula
hipermedia2007
 
Using Brain Waves as New Biometric Feature for Authenticating a Computer User...
Using Brain Waves as New Biometric Feature for Authenticating a Computer User...Using Brain Waves as New Biometric Feature for Authenticating a Computer User...
Using Brain Waves as New Biometric Feature for Authenticating a Computer User...
CSCJournals
 
AMAZÔNIA ETERNA
AMAZÔNIA ETERNAAMAZÔNIA ETERNA
AMAZÔNIA ETERNA
adrianacesar.com.br
 
Web Analytics: Data driven marketing decisions
Web Analytics: Data driven marketing decisionsWeb Analytics: Data driven marketing decisions
Web Analytics: Data driven marketing decisions
Rob Bertholf
 
Meson: Building a Machine Learning Orchestration Framework on Mesos
Meson: Building a Machine Learning Orchestration Framework on MesosMeson: Building a Machine Learning Orchestration Framework on Mesos
Meson: Building a Machine Learning Orchestration Framework on Mesos
Antony Arokiasamy
 
Presentation matin - Atelier des vacances
Presentation matin - Atelier des vacancesPresentation matin - Atelier des vacances
Presentation matin - Atelier des vacances
Tarn Tourisme
 
Android a survey of xml tree patterns
Android  a survey of xml tree patternsAndroid  a survey of xml tree patterns
Android a survey of xml tree patterns
Ecwaytechnoz
 
Writing in the Information Age: Slam Poetry Meets Blogging in the 21st Century
Writing in the Information Age: Slam Poetry Meets Blogging in the 21st CenturyWriting in the Information Age: Slam Poetry Meets Blogging in the 21st Century
Writing in the Information Age: Slam Poetry Meets Blogging in the 21st Century
JulesW
 
BarCamp Scrum Col30-2015
BarCamp Scrum Col30-2015BarCamp Scrum Col30-2015
BarCamp Scrum Col30-2015
Julián R. Figueroa
 
Provide Insight, Not Numbers Three Dangerous Data Visualization Trends and Us...
Provide Insight, Not Numbers Three Dangerous Data Visualization Trends and Us...Provide Insight, Not Numbers Three Dangerous Data Visualization Trends and Us...
Provide Insight, Not Numbers Three Dangerous Data Visualization Trends and Us...
UXPA International
 
Electroencephalography
ElectroencephalographyElectroencephalography
Electroencephalography
Paridhi Singhal
 
EEG
EEGEEG

Viewers also liked (19)

Notice of placement change form
Notice of placement change formNotice of placement change form
Notice of placement change form
 
Analysis, design, and performance evaluations of an edge resonant switched ca...
Analysis, design, and performance evaluations of an edge resonant switched ca...Analysis, design, and performance evaluations of an edge resonant switched ca...
Analysis, design, and performance evaluations of an edge resonant switched ca...
 
BCM Institute MTE Touw June Wah Singapore Business Federation - The National...
BCM Institute MTE  Touw June Wah Singapore Business Federation - The National...BCM Institute MTE  Touw June Wah Singapore Business Federation - The National...
BCM Institute MTE Touw June Wah Singapore Business Federation - The National...
 
medhat_cv modefided .
medhat_cv modefided .medhat_cv modefided .
medhat_cv modefided .
 
Floor Ready Services, Inc.
Floor Ready Services, Inc.Floor Ready Services, Inc.
Floor Ready Services, Inc.
 
BPS Champions League - Team
BPS Champions League - TeamBPS Champions League - Team
BPS Champions League - Team
 
Deficit widens
Deficit widensDeficit widens
Deficit widens
 
Fotos Ultima Aula
Fotos Ultima AulaFotos Ultima Aula
Fotos Ultima Aula
 
Using Brain Waves as New Biometric Feature for Authenticating a Computer User...
Using Brain Waves as New Biometric Feature for Authenticating a Computer User...Using Brain Waves as New Biometric Feature for Authenticating a Computer User...
Using Brain Waves as New Biometric Feature for Authenticating a Computer User...
 
AMAZÔNIA ETERNA
AMAZÔNIA ETERNAAMAZÔNIA ETERNA
AMAZÔNIA ETERNA
 
Web Analytics: Data driven marketing decisions
Web Analytics: Data driven marketing decisionsWeb Analytics: Data driven marketing decisions
Web Analytics: Data driven marketing decisions
 
Meson: Building a Machine Learning Orchestration Framework on Mesos
Meson: Building a Machine Learning Orchestration Framework on MesosMeson: Building a Machine Learning Orchestration Framework on Mesos
Meson: Building a Machine Learning Orchestration Framework on Mesos
 
Presentation matin - Atelier des vacances
Presentation matin - Atelier des vacancesPresentation matin - Atelier des vacances
Presentation matin - Atelier des vacances
 
Android a survey of xml tree patterns
Android  a survey of xml tree patternsAndroid  a survey of xml tree patterns
Android a survey of xml tree patterns
 
Writing in the Information Age: Slam Poetry Meets Blogging in the 21st Century
Writing in the Information Age: Slam Poetry Meets Blogging in the 21st CenturyWriting in the Information Age: Slam Poetry Meets Blogging in the 21st Century
Writing in the Information Age: Slam Poetry Meets Blogging in the 21st Century
 
BarCamp Scrum Col30-2015
BarCamp Scrum Col30-2015BarCamp Scrum Col30-2015
BarCamp Scrum Col30-2015
 
Provide Insight, Not Numbers Three Dangerous Data Visualization Trends and Us...
Provide Insight, Not Numbers Three Dangerous Data Visualization Trends and Us...Provide Insight, Not Numbers Three Dangerous Data Visualization Trends and Us...
Provide Insight, Not Numbers Three Dangerous Data Visualization Trends and Us...
 
Electroencephalography
ElectroencephalographyElectroencephalography
Electroencephalography
 
EEG
EEGEEG
EEG
 

Similar to EEG based security

160.pptx
160.pptx160.pptx
A Review of Lie Detection Techniques.pdf
A Review of Lie Detection Techniques.pdfA Review of Lie Detection Techniques.pdf
A Review of Lie Detection Techniques.pdf
Whitney Anderson
 
Recognition of Epilepsy from Non Seizure Electroencephalogram using combinati...
Recognition of Epilepsy from Non Seizure Electroencephalogram using combinati...Recognition of Epilepsy from Non Seizure Electroencephalogram using combinati...
Recognition of Epilepsy from Non Seizure Electroencephalogram using combinati...
Atrija Singh
 
A Review of Lie Detection Techniques
A Review of Lie Detection TechniquesA Review of Lie Detection Techniques
A Review of Lie Detection Techniques
IRJET Journal
 
CLASSIFICATION OF ELECTROENCEPHALOGRAM SIGNALS USING XGBOOST ALGORITHM AND SU...
CLASSIFICATION OF ELECTROENCEPHALOGRAM SIGNALS USING XGBOOST ALGORITHM AND SU...CLASSIFICATION OF ELECTROENCEPHALOGRAM SIGNALS USING XGBOOST ALGORITHM AND SU...
CLASSIFICATION OF ELECTROENCEPHALOGRAM SIGNALS USING XGBOOST ALGORITHM AND SU...
IRJET Journal
 
RECENT ADVANCES IN BRAIN-COMPUTER INTERFACES
RECENT ADVANCES IN BRAIN-COMPUTER INTERFACES RECENT ADVANCES IN BRAIN-COMPUTER INTERFACES
RECENT ADVANCES IN BRAIN-COMPUTER INTERFACES
Touradj Ebrahimi
 
Review of Deep Neural Network Detectors in SM MIMO System
Review of Deep Neural Network Detectors in SM MIMO SystemReview of Deep Neural Network Detectors in SM MIMO System
Review of Deep Neural Network Detectors in SM MIMO System
ijtsrd
 
Final thesis presentation on bci
Final thesis presentation on bciFinal thesis presentation on bci
Final thesis presentation on bci
Redwan Islam
 
A Comparative Study of Machine Learning Algorithms for EEG Signal Classification
A Comparative Study of Machine Learning Algorithms for EEG Signal ClassificationA Comparative Study of Machine Learning Algorithms for EEG Signal Classification
A Comparative Study of Machine Learning Algorithms for EEG Signal Classification
sipij
 
A Comparative Study of Machine Learning Algorithms for EEG Signal Classification
A Comparative Study of Machine Learning Algorithms for EEG Signal ClassificationA Comparative Study of Machine Learning Algorithms for EEG Signal Classification
A Comparative Study of Machine Learning Algorithms for EEG Signal Classification
sipij
 
A Comparative Study of Machine Learning Algorithms for EEG Signal Classification
A Comparative Study of Machine Learning Algorithms for EEG Signal ClassificationA Comparative Study of Machine Learning Algorithms for EEG Signal Classification
A Comparative Study of Machine Learning Algorithms for EEG Signal Classification
sipij
 
A COMPARATIVE STUDY OF MACHINE LEARNING ALGORITHMS FOR EEG SIGNAL CLASSIFICATION
A COMPARATIVE STUDY OF MACHINE LEARNING ALGORITHMS FOR EEG SIGNAL CLASSIFICATIONA COMPARATIVE STUDY OF MACHINE LEARNING ALGORITHMS FOR EEG SIGNAL CLASSIFICATION
A COMPARATIVE STUDY OF MACHINE LEARNING ALGORITHMS FOR EEG SIGNAL CLASSIFICATION
sipij
 
Best Paper winning PPT
Best Paper winning PPTBest Paper winning PPT
Best Paper winning PPT
Kamal Lamichhane
 
E44082429
E44082429E44082429
E44082429
IJERA Editor
 
Automated_EEG_artifact_elimination_by_applying_mac.pdf
Automated_EEG_artifact_elimination_by_applying_mac.pdfAutomated_EEG_artifact_elimination_by_applying_mac.pdf
Automated_EEG_artifact_elimination_by_applying_mac.pdf
murali926139
 
Transfer learning for epilepsy detection using spectrogram images
Transfer learning for epilepsy detection using spectrogram imagesTransfer learning for epilepsy detection using spectrogram images
Transfer learning for epilepsy detection using spectrogram images
IAESIJAI
 
19. 22068.pdf
19. 22068.pdf19. 22068.pdf
19. 22068.pdf
TELKOMNIKA JOURNAL
 
Motor Imagery Recognition of EEG Signal using Cuckoo Search Masking Empirical...
Motor Imagery Recognition of EEG Signal using Cuckoo Search Masking Empirical...Motor Imagery Recognition of EEG Signal using Cuckoo Search Masking Empirical...
Motor Imagery Recognition of EEG Signal using Cuckoo Search Masking Empirical...
ijtsrd
 
Ijetr042301
Ijetr042301Ijetr042301
Brain Tumor Detection Using Artificial Neural Network Fuzzy Inference System ...
Brain Tumor Detection Using Artificial Neural Network Fuzzy Inference System ...Brain Tumor Detection Using Artificial Neural Network Fuzzy Inference System ...
Brain Tumor Detection Using Artificial Neural Network Fuzzy Inference System ...
Editor IJCATR
 

Similar to EEG based security (20)

160.pptx
160.pptx160.pptx
160.pptx
 
A Review of Lie Detection Techniques.pdf
A Review of Lie Detection Techniques.pdfA Review of Lie Detection Techniques.pdf
A Review of Lie Detection Techniques.pdf
 
Recognition of Epilepsy from Non Seizure Electroencephalogram using combinati...
Recognition of Epilepsy from Non Seizure Electroencephalogram using combinati...Recognition of Epilepsy from Non Seizure Electroencephalogram using combinati...
Recognition of Epilepsy from Non Seizure Electroencephalogram using combinati...
 
A Review of Lie Detection Techniques
A Review of Lie Detection TechniquesA Review of Lie Detection Techniques
A Review of Lie Detection Techniques
 
CLASSIFICATION OF ELECTROENCEPHALOGRAM SIGNALS USING XGBOOST ALGORITHM AND SU...
CLASSIFICATION OF ELECTROENCEPHALOGRAM SIGNALS USING XGBOOST ALGORITHM AND SU...CLASSIFICATION OF ELECTROENCEPHALOGRAM SIGNALS USING XGBOOST ALGORITHM AND SU...
CLASSIFICATION OF ELECTROENCEPHALOGRAM SIGNALS USING XGBOOST ALGORITHM AND SU...
 
RECENT ADVANCES IN BRAIN-COMPUTER INTERFACES
RECENT ADVANCES IN BRAIN-COMPUTER INTERFACES RECENT ADVANCES IN BRAIN-COMPUTER INTERFACES
RECENT ADVANCES IN BRAIN-COMPUTER INTERFACES
 
Review of Deep Neural Network Detectors in SM MIMO System
Review of Deep Neural Network Detectors in SM MIMO SystemReview of Deep Neural Network Detectors in SM MIMO System
Review of Deep Neural Network Detectors in SM MIMO System
 
Final thesis presentation on bci
Final thesis presentation on bciFinal thesis presentation on bci
Final thesis presentation on bci
 
A Comparative Study of Machine Learning Algorithms for EEG Signal Classification
A Comparative Study of Machine Learning Algorithms for EEG Signal ClassificationA Comparative Study of Machine Learning Algorithms for EEG Signal Classification
A Comparative Study of Machine Learning Algorithms for EEG Signal Classification
 
A Comparative Study of Machine Learning Algorithms for EEG Signal Classification
A Comparative Study of Machine Learning Algorithms for EEG Signal ClassificationA Comparative Study of Machine Learning Algorithms for EEG Signal Classification
A Comparative Study of Machine Learning Algorithms for EEG Signal Classification
 
A Comparative Study of Machine Learning Algorithms for EEG Signal Classification
A Comparative Study of Machine Learning Algorithms for EEG Signal ClassificationA Comparative Study of Machine Learning Algorithms for EEG Signal Classification
A Comparative Study of Machine Learning Algorithms for EEG Signal Classification
 
A COMPARATIVE STUDY OF MACHINE LEARNING ALGORITHMS FOR EEG SIGNAL CLASSIFICATION
A COMPARATIVE STUDY OF MACHINE LEARNING ALGORITHMS FOR EEG SIGNAL CLASSIFICATIONA COMPARATIVE STUDY OF MACHINE LEARNING ALGORITHMS FOR EEG SIGNAL CLASSIFICATION
A COMPARATIVE STUDY OF MACHINE LEARNING ALGORITHMS FOR EEG SIGNAL CLASSIFICATION
 
Best Paper winning PPT
Best Paper winning PPTBest Paper winning PPT
Best Paper winning PPT
 
E44082429
E44082429E44082429
E44082429
 
Automated_EEG_artifact_elimination_by_applying_mac.pdf
Automated_EEG_artifact_elimination_by_applying_mac.pdfAutomated_EEG_artifact_elimination_by_applying_mac.pdf
Automated_EEG_artifact_elimination_by_applying_mac.pdf
 
Transfer learning for epilepsy detection using spectrogram images
Transfer learning for epilepsy detection using spectrogram imagesTransfer learning for epilepsy detection using spectrogram images
Transfer learning for epilepsy detection using spectrogram images
 
19. 22068.pdf
19. 22068.pdf19. 22068.pdf
19. 22068.pdf
 
Motor Imagery Recognition of EEG Signal using Cuckoo Search Masking Empirical...
Motor Imagery Recognition of EEG Signal using Cuckoo Search Masking Empirical...Motor Imagery Recognition of EEG Signal using Cuckoo Search Masking Empirical...
Motor Imagery Recognition of EEG Signal using Cuckoo Search Masking Empirical...
 
Ijetr042301
Ijetr042301Ijetr042301
Ijetr042301
 
Brain Tumor Detection Using Artificial Neural Network Fuzzy Inference System ...
Brain Tumor Detection Using Artificial Neural Network Fuzzy Inference System ...Brain Tumor Detection Using Artificial Neural Network Fuzzy Inference System ...
Brain Tumor Detection Using Artificial Neural Network Fuzzy Inference System ...
 

Recently uploaded

Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
University of Maribor
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
JamalHussainArman
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
anoopmanoharan2
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
MIGUELANGEL966976
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
mahammadsalmanmech
 
Series of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.pptSeries of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.ppt
PauloRodrigues104553
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
gestioneergodomus
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
digital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdfdigital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdf
drwaing
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
NidhalKahouli2
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
mamunhossenbd75
 
2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt
PuktoonEngr
 
Low power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniquesLow power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniques
nooriasukmaningtyas
 
Wearable antenna for antenna applications
Wearable antenna for antenna applicationsWearable antenna for antenna applications
Wearable antenna for antenna applications
Madhumitha Jayaram
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
Hitesh Mohapatra
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 

Recently uploaded (20)

Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
 
Series of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.pptSeries of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.ppt
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
digital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdfdigital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdf
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
 
2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt
 
Low power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniquesLow power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniques
 
Wearable antenna for antenna applications
Wearable antenna for antenna applicationsWearable antenna for antenna applications
Wearable antenna for antenna applications
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 

EEG based security

  • 1.  Md. Mahmudul Hasan  Prof. Dr. Engr. Mohiuddin Ahmad  Department of Electrical and Electronic Engineering, KUET, Khulna-9203, Bangladesh. ContributionContribution Working PrincipleWorking Principle Classification & AuthenticationClassification & Authentication Feature ExtractionFeature Extraction Development of a EEG-Based Biometric Authentication & Security System Motivation and ObjectivesMotivation and Objectives Development of a biometric authentication system based on electroencephalogram(EEG).  Comparison of EEG based authentication with latest technologies such as:  Radio frequency Identification(RFID)  Near Field Communication(NFC).  Face detection using Image Processing.  To fill the gap between conventional authentication system and biometric authentication. Step 1: Signal Acquisition Step 2: Row signal pre-processing a) Filtering b) Artifact Removal Step 3: Feature Extraction  Time-domain feature extraction (mean, median, and variance)  Frequency-domain feature extraction (WT based) and  Time-frequency domain feature extraction(WPD i.e. multi-level filters to analyze the time- frequency information) Step 4: Classification  SVM(support vector machine)  ANN(Artificial neural Network) Step 5: Biometric Authentication Fig 4. Plotting channel spectra . Discussion and ConclusionDiscussion and Conclusion ReferencesReferences System OverviewSystem Overview EEG & Human AuthenticationEEG & Human Authentication Flow ChartFlow Chart Fig. 1. Flow chart of the EEG based security system. EEG:  Short form of “Electroencephalography”.  EEG is nothing but human “brainwave signal”.  EEG brainwave pattern is unique from one person to another like fingerprint.  EEG signals are the signature of neural activities.  It is almost impossible to steal.  EEG is very difficult to mimic.  EEG is referred as “Language of Mind”. 1) Something you know:  Textual password You have a secret that you know 2) Something you have: A smart card Barcode 3) Something you are: A fingerprint Iris EEG signal  EEG is a unique biometric identifier.  EEG is Just like Fingerprint.  EEG Can not be easily duplicated.  Adjustments of the EEG head set is very much important.  FIR filter is used to remove linear trends.  Individuals with bushy hair don’t have any problems. according to the EEG Headset.  EEG Headset are costlier.  Effective for strong security system. • To proof that EEG signal alone is able to create a unique pattern for each subject. • To use simple feature extraction methods. • To provide simple classification methods to provide strong evidence. • To make a novel algorithm with EEG signal processing. • To provide unique patterns and identify people with other human features. • To build a reliable security system. Authentication system: (Three fundamental Factors) Fig. 2. Raw EEG Signals Fig 3. plotting channel locations Fig 5. After FIR Filtering (linear trends removed) Signal Acquisition: EEG HeadsetSignal Acquisition: EEG Headset Fig 7. Statistical analysis on the dataset Fig. 6 : After removing channel artifacts Channel artifact removalChannel artifact removal [1] M. Poulos, M. Rangoussi, V. Chrissikopoulos, A. Evangelou. Parametric person identification from the EEG using computational geometry. Proceedings of the IEEE International Conference on Electronics, Circuits, and Systems, 2:1005–1008, 1999. [2] R. Paranjape, J.Mahovsky, L. Benedicenti, Z. Koles. The electroencephalogram as a biometrics. Proceedings of the Canadian Conference on Electrical and Computer Engineering, 2:1363–1366, 2001. [3] R. Palaniappan, D. Mandic. Biometrics from brain electrical activity: A machine learning approach. IEEE Transactions on Pattern Analysis and Machine Intelligence, 29(4):738–742, April 2007. [4] S. Marcel, J. R. Mill´an. Person authentication using brainwaves (EEG) and maximum a posteriori model adaptation. IEEE Transactions on Pattern Analysis and Machine Intelligence, 29(4):743–748, April 2007. [5] Sebastien Marcel a Jose del R. Millan Person authentication using brainwaves (EEG) and Maximum a posteriori model adaptation, IEEE Transactions on Pattern Analysis and Machine Intelligence Special Issue on Biometrics 2007 [6] Xu Huang, Salahiddin Altahat, Dat Tran, Dharmendra Sharma, Human Identification withElectroencephalogram (EEG) Signal Processing, 2012 International Symposium on Communications and Information Technologies (ISCIT)

Editor's Notes

  1. Poster Presentation @ Inter University tech Fiesta, KUET, Khulna-9203 Date: January 22-23, 2016 Venue: KUET, Bangladesh