JOURNAL BROWSE
Search
Advanced SearchSearch Tips
Development of Efficient Encryption Scheme on Brain-Waves Using Five Phase Chaos Maps
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
Development of Efficient Encryption Scheme on Brain-Waves Using Five Phase Chaos Maps
Kim, Jung-Sook; Chung, Jang-Young;
  PDF(new window)
 Abstract
Secondary damage to the user is a problem in biometrics. A brain-wave has no shape and a malicious user may not cause secondary damage to a user. However, if user sends brain-wave signals to an authentication system using a network, a malicious user could easily capture the brain-wave signals. Then, the malicious user could access the authentication system using the captured brain-wave signals. In addition, the dataset containing the brain-wave signals is large and the transfer time is long. However, user authentication requires a real-time processing, and an encryption scheme on brain-wave signals is necessary. In this paper, we propose an efficient encryption scheme using a chaos map and adaptive junk data on the brain-wave signals for user authentication. As a result, the encrypted brain-wave signals are produced and the processing time for authentication is reasonable in real-time.
 Keywords
Adaptive junk data;Brain-wave;Chaos maps;Encryption scheme;User authentication system;
 Language
English
 Cited by
 References
1.
J. S. Kim and J. Y. Chung, "An EEG encryption scheme for authentication system based on brain wave," Journal of Korea Multimedia Society, vol. 18, no. 3, pp. 330-338, 2015. http://dx.doi.org/10.9717/kmms.2015.18.3.330 crossref(new window)

2.
D. D. Patil, N. A. Nemade, and K. M. Attarde, "Iris recognition using fuzzy system," International Journal of Computer Science and Mobile Computing, vol. 2, no. 3, pp. 14-17, 2013.

3.
W. Khalifa, A. Salem, M. Roushdy, and K. Revett, "A survey of EEG based user authentication schemes," in Proceedings of the 8th International Conference on Informatics and Systems (INFOS'12), Cairo, Egypt, 2012, pp. 55-60.

4.
J. Fridrich, "Image encryption based on chaotic maps," in Proceedings of IEEE International Conference on Systems, Man, and Cybernetics, Orlando, FL, 1997, pp. 1105-1110. http://dx.doi.org/10.1109/ICSMC.1997.638097 crossref(new window)

5.
C. F. Lin, S. H. Shih, J. D. Zhu, and S. H. Lee, "Implementation of an offline chaos-based EEG encryption software," in Proceedings of 14th International Conference on Advanced Communication Technology (ICACT), Pyeongchang, Korea, 2012, pp.430-433.

6.
C. F. Lin, S. H. Shih, J. D. Zhu, S. H. Lee, and C. W. Liu, "C# Based EEG Encryption System Using Chaos Algorithm," in Proceedings of the 1st WSEAS International Conference on Complex Systems and Chaos (COSC'13), Morioka, Japan, 2013.

7.
C. F. Lin and C. H. Chung, "A chaos-based visual encryption mechanism in integrated ECG/EEG medical signals," in Proceedings of 10th International Conference on Advanced Communication Technology (ICACT'08), Gangwon-do, Korea, 2008, pp. 1903-1907. http://dx.doi.org/10.1109/ICACT.2008.4494157 crossref(new window)

8.
C. Ashby, A. Bhatia, F. Tenore, and J. Vogelstein, "Lowcost electroencephalogram (EEG) based authentication," in Proceedings of 5th International IEEE/EMBS Conference on Neural Engineering (NER), Cancun, Mexico, 2011, pp. 442-445. http://dx.doi.org/10.1109/NER.2011.5910581 crossref(new window)

9.
A. Zuquete, B. Quintela, and J. P. S. Cunha, "Biometric authentication using brain responses to visual stimuli," in Proceedings of the 3rd International Conference on Bioinspired Systems and Signal Processing (Biosignals2000), Valencia, Spain, 2010, pp. 103-112.

10.
C. E. Shannon, "Communication theory of secrecy systems," Bell System Technical Journal, vol. 28, no. 4, pp. 656-715, 1949. http://dx.doi.org/10.1002/j.1538-7305.1949.tb00928.x crossref(new window)

11.
W. Stallings, Network Security Essentials: Applications and Standards, 5th ed. Upper Saddle River, NJ: Pearson Education, 2013.

12.
T. J. Lee and K. B. Sim, "EEG based vowel feature extraction for speech recognition system using international phonetic alphabet," Journal of Korean Institute of Intelligent Systems, vol. 24, no. 1, pp. 90-95, 2014. http://dx.doi.org/10.5391/JKIIS.2014.24.1.090 crossref(new window)