- Volume 16 Issue 1
Secondary damage to the user is a problem in biometrics. A brain-wave has no shape and a malicious user may not cause secondary damage to a user. However, if user sends brain-wave signals to an authentication system using a network, a malicious user could easily capture the brain-wave signals. Then, the malicious user could access the authentication system using the captured brain-wave signals. In addition, the dataset containing the brain-wave signals is large and the transfer time is long. However, user authentication requires a real-time processing, and an encryption scheme on brain-wave signals is necessary. In this paper, we propose an efficient encryption scheme using a chaos map and adaptive junk data on the brain-wave signals for user authentication. As a result, the encrypted brain-wave signals are produced and the processing time for authentication is reasonable in real-time.
Adaptive junk data;Brain-wave;Chaos maps;Encryption scheme;User authentication system
- J. S. Kim and J. Y. Chung, "An EEG encryption scheme for authentication system based on brain wave," Journal of Korea Multimedia Society, vol. 18, no. 3, pp. 330-338, 2015. http://dx.doi.org/10.9717/kmms.2015.18.3.330 https://doi.org/10.9717/kmms.2015.18.3.330
- D. D. Patil, N. A. Nemade, and K. M. Attarde, "Iris recognition using fuzzy system," International Journal of Computer Science and Mobile Computing, vol. 2, no. 3, pp. 14-17, 2013.
- W. Khalifa, A. Salem, M. Roushdy, and K. Revett, "A survey of EEG based user authentication schemes," in Proceedings of the 8th International Conference on Informatics and Systems (INFOS'12), Cairo, Egypt, 2012, pp. 55-60.
- J. Fridrich, "Image encryption based on chaotic maps," in Proceedings of IEEE International Conference on Systems, Man, and Cybernetics, Orlando, FL, 1997, pp. 1105-1110. http://dx.doi.org/10.1109/ICSMC.1997.638097 https://doi.org/10.1109/ICSMC.1997.638097
- C. F. Lin, S. H. Shih, J. D. Zhu, and S. H. Lee, "Implementation of an offline chaos-based EEG encryption software," in Proceedings of 14th International Conference on Advanced Communication Technology (ICACT), Pyeongchang, Korea, 2012, pp.430-433.
- C. F. Lin, S. H. Shih, J. D. Zhu, S. H. Lee, and C. W. Liu, "C# Based EEG Encryption System Using Chaos Algorithm," in Proceedings of the 1st WSEAS International Conference on Complex Systems and Chaos (COSC'13), Morioka, Japan, 2013.
- C. F. Lin and C. H. Chung, "A chaos-based visual encryption mechanism in integrated ECG/EEG medical signals," in Proceedings of 10th International Conference on Advanced Communication Technology (ICACT'08), Gangwon-do, Korea, 2008, pp. 1903-1907. http://dx.doi.org/10.1109/ICACT.2008.4494157 https://doi.org/10.1109/ICACT.2008.4494157
- C. Ashby, A. Bhatia, F. Tenore, and J. Vogelstein, "Lowcost electroencephalogram (EEG) based authentication," in Proceedings of 5th International IEEE/EMBS Conference on Neural Engineering (NER), Cancun, Mexico, 2011, pp. 442-445. http://dx.doi.org/10.1109/NER.2011.5910581 https://doi.org/10.1109/NER.2011.5910581
- A. Zuquete, B. Quintela, and J. P. S. Cunha, "Biometric authentication using brain responses to visual stimuli," in Proceedings of the 3rd International Conference on Bioinspired Systems and Signal Processing (Biosignals2000), Valencia, Spain, 2010, pp. 103-112.
- C. E. Shannon, "Communication theory of secrecy systems," Bell System Technical Journal, vol. 28, no. 4, pp. 656-715, 1949. http://dx.doi.org/10.1002/j.1538-7305.1949.tb00928.x https://doi.org/10.1002/j.1538-7305.1949.tb00928.x
- W. Stallings, Network Security Essentials: Applications and Standards, 5th ed. Upper Saddle River, NJ: Pearson Education, 2013.
- T. J. Lee and K. B. Sim, "EEG based vowel feature extraction for speech recognition system using international phonetic alphabet," Journal of Korean Institute of Intelligent Systems, vol. 24, no. 1, pp. 90-95, 2014. http://dx.doi.org/10.5391/JKIIS.2014.24.1.090 https://doi.org/10.5391/JKIIS.2014.24.1.090
연구 과제 주관 기관 : Kimpo University