SlideShare une entreprise Scribd logo
1  sur  22
Guided By Submitted By
Mr. Jayakumar M.E., J.Jercy Monica
Reg No: 960121403006
Abstract
• Nowadays, to access any digital device we use authentication techniques, which is a critical technology in
terms of security.
• Present biometric authentications such as fingerprints or face recognition are the most used methods in our
digitalized world, which are impressively advantageous in terms of security.
• There are still some flaws, like not being useful for physical disabilities, environment usage matters, and
most importantly the possibility of replicating them with some new technologies because of their visuality.
• Brain signal is another human biometric that could cover the issues of other types in terms of security and
visibility.
• This paper proposes a method using the deep breath strategy to use brain signals for authentication purposes
regardless of brain situation.
• The result shows that the proposal accomplishment can alter the entire cycle of brain-based authentication
and EEG-based authentication methods according to the parameter of permanency of the technique in many
different brain states.
Introduction
• Brain signals have some important advantages in comparison with other biometrics. For
instance, to acquire the EEG signal, the person must be alive.
• Some biometrics can be maintained from a human’s dead body after death, which would yet
legitimate for an acknowledgment after a while in the afterlife.
• Therefore, the user has to be alive to produce EEG data.
• On the other hand, EEG voltage decreases drastically with distance from the brain.
• Because EEG can change depending on the situation.
• In some positions, the brain doesn’t function properly and cannot be in its normal state to
create a pattern for a task. Some reasons like being sick, drunk, stress, etc.
Problem Statement
• By breaking down signals made from the cerebrum, one can comprehend mental practices of the
brain. Each brain state is related to a specific signal frequency, which is for understanding the
functional behavior of human brain construction.
• One of the important challenges for all brainwave authentication studies is brain pattern changes
in different brain situations.
• The EEG data of any person can change in some situations like being sick, drunk, addicted to
drugs, anxiety and any other situations that any human can experience in their life.
• Therefore, a method is needed that could have the permanency of the brain pattern and stability
over time, not just for a specific task or brain state but also for all the other states.
Objective
• The objective of this paper is to implement a method that improves the permanency of the
brain pattern using deep breathing in different brain situations.
Existing System
• The existing system is a continuous authentication method based on combination of
statistical decision machines for brain signals.
• Functional Near InfraRed Spectroscopy (NIRS) is used to measure brain oxyhemoglobin
changes for each subject to be authenticated.
• Such bio signal authentication is expected to be a viable complementary method to
traditional static security systems.
• The designed system is based on a discriminant function which utilizes the average weight
vector of one-versus-one support vector machines for NIRS spectra.
• By computing a histogram of Mahalanobis distances, high separability among subjects was
recognized.
Drawbacks
• NIRS measures changes in blood flow and oxygen levels in the brain using near-infrared
light.
• This technique is non-invasive and relatively inexpensive, but it is not as accurate as fMRI
and EEG, and the accuracy can be affected by factors such as hair and skin pigmentation.
Proposed System
• The proposed method has been done in four stages.
• First, recording the EEG signals from participants.
• Second, preprocessing the raw data, filtering, and normalization.
• Third, extracting the features from the clean data.
• The final stage, selecting the specific features according to the purpose of this study and
classification.
• Classification of EEG data with three labels, inhalation, holding the air and, exhalation was done
using SVM and NN classifiers.
Advantages
• Cannot be faked or forged, since none of the brain signals matches the others.
• Also, brain signals are invisible, so than no one can be able to forge it.
Block Diagram
EEG Sensor
Signal
Acquisition
Preprocessing
Feature
Extraction
Classification
Authentication
Algorithm Used
• Support Vector Machine (SVM)
• An SVM classifier builds a model that assigns new data points to one of the given categories.
• Thus, it can be viewed as a non-probabilistic binary linear classifier.
• Neural Network (NN)
• A neural network consists of units (neurons), arranged in layers, which convert an input vector
into some output.
• Each unit takes an input, applies a (often nonlinear) function to it and then passes the output on
to the next layer.
System Requirements
Hardware Requirements
• EEG Sensor
• Personal Computer
Software Requirements
• Jupyter Notebook
• Python Programming Language
Modules
• Signal Acquisition
• Pre-Processing
• Feature Extraction
• Classification
Signal Acquisition
• To acquiring the signals, EEG sensor and a computer to record and store the data, was used.
• The data are recorded, then digitized and got ready for analysis.
• According to the studies, the range of four to six minutes may be an appropriate time for
individuals to accumulate alpha brainwave successfully.
Pre-Processing
• To clear the data, a band-pass filter in the range of 0.5 Hz and 50 Hz was applied using a
Finite Impulse Response (FIR) technique.
• High-pass filter is one of the best ways to remove large amplitude and the slow drifts in the
data.
• The range of 0.5 Hz makes the data ready for Independent Component Analysis (ICA)
analysis technique, which is very sensitive to low band-pass frequencies.
• After filtering the data and clearing it from artifacts and noises, the ICA algorithm applied to
the data to do a blind source separation of the process of signal mixing.
Feature Extraction
• According to the aim of this project and analyzing the relaxation state brainwave types produced
by deep breathing, our main focus was on Alpha and Beta waves.
• Therefore, the power spectral density (PSD) method, which extracts the frequency characteristics
of signals was used.
• PSD presents a consistent and effective way to extract the characteristics of spectral patterns with
high discriminate accuracy for motor imagery EEGs.
• After visually inspecting the entire data for all subjects, three features were extracted from the
alpha and beta bands of PSD.
• This was done by recognizing and selecting the highest PSD peak values in each band separately.
Classification
• For the classification of the appropriately selected features, two classifiers were used.
• Support Vector Machine (SVM), and Neural Network (NN) which are the most commonly used
in classifying EEG signals.
• SVM and Neural Network can both express the information to a higher dimensional space to
allocate a choice limit.
• SVMs could be equivalent to a superficial neural network architecture.
• On the other hand, for a large amount of data, a NN will overtake an SVM.
• The two classes of calculations can surmise non-linear decision capacities, with various
methodologies.
Applications
• Access control
• Financial transactions
• Student verification systems
• Personal data verification
Conclusion
• An experiential study has been presented, which investigated deep breathings as a brain state for
authentication purposes based on human EEG data.
• An EEG Sensor is used in this study to record the brain waves of the participants, while they were
asked to take deep breaths in three steps each time.
• The results show that deep breathing can make the brain improve the alpha and beta waves no
matter which situation the person is experiencing which could be the best option to have a stable
brain pattern that could be predicted with high accuracy for the authentication process.
• Therefore, different parts of deep breathing is used as an authentication brain pattern and are able
to successfully achieve high accuracy using SVM and NN classifiers.
References
1) F. Yousefi, H. Kolivand, “Brain Signals as a New Biometric Authentication Method Using
Brain-Computer Interface”. In: Lee N.(eds) Encyclopedia of Computer Graphics and Games.
Springer, Cham, 2019.
2) Di, Y., An, X., He, F., Liu, S., Ke, Y., Ming, D., 2019. Robustness analysis of identification
using resting-state EEG signals. IEEE Access 7 (c), 42113–42122.
3) Ruiz-blondet, M., Khalifian, N., Armstrong, B.C., Jin, Z., Kurtz, K.J., Laszlo, S., 2014.
Brainprint: identifying unique features of neural activity with machine learning. In: Proc. 36th
Annual Conf. of the Cognitive Science Society, pp. 827–832.
4) Das, R., Piciucco, E., Maiorana, E., Campisi, P., 2016. Visually evoked potentials for EEG
biometrie recognition. In: 2016 1st International Workshop on Sensing, Processing and
Learning for Intelligent Machines, SPLINE 2016 –Proceedings.
5) Zhang, F., Mao, Z., Huang, Y., Lin, X., Ding, G., 2018. Deep learning models for eeg-based
rapid serial visual presentation event classification. J. Inf. Hiding Mul- timed. Signal Process. 9
(1), 177–187.
References…
6) Kaur, B., Singh, D., Roy, P.P., 2017. A novel framework of EEG-based user identification by
analyzing music-listening behavior. Multimed. Tools Appl. 76 (24), 25581–25602.
7) Alyasseri, Z.A.A., Khader, A T., Al-Betar, M.A., Papa, J.P., Ahmad Alomari, O., 2018. EEG-
based person authentication using multi-objective flower pollination algorithm. In: 2018 IEEE
Congress on Evolutionary Computation (CEC). IEEE, pp. 1–8.
8) Kumari, P., Vaish, A., 2016. Feature-level fusion of mental task’s brain signal for an efficient
identification system. Neural Comput. Appl. 27 (3), 659–669.
9) Yousefi, F., Kolivand, H. and Baker, T., 2020. SaS-BCI: a new strategy to predict image
memorability and use mental imagery as a brain-based biometric authentication. Neural
Computing and Applications, pp.1-15.
10) Chen, J.X., Mao, Z.J., Yao, W.X. and Huang, Y.F., 2019. EEG-based biometric identification
with convolutional neural network. Multimedia Tools and Applications, pp.1-21.
A New Solution to the Brain State Permanency for Brain-Based Authentication Methods.pptx

Contenu connexe

Similaire à A New Solution to the Brain State Permanency for Brain-Based Authentication Methods.pptx

Mind Reading Device
Mind Reading DeviceMind Reading Device
Mind Reading Devicebiomedicz
 
Brain computer interface
Brain computer interfaceBrain computer interface
Brain computer interfaceNeurologyKota
 
Human Brain Simulation for Robotic Applications
Human Brain Simulation for Robotic ApplicationsHuman Brain Simulation for Robotic Applications
Human Brain Simulation for Robotic ApplicationsDR.P.S.JAGADEESH KUMAR
 
Brain computer interface based
Brain computer interface basedBrain computer interface based
Brain computer interface basedMohammed Saeed
 
Brain wave
Brain waveBrain wave
Brain waverohitgb
 
Biorobotics 140203232936-phpapp01
Biorobotics 140203232936-phpapp01Biorobotics 140203232936-phpapp01
Biorobotics 140203232936-phpapp01UsamaIqbal37
 
Brain Fingerprinting
Brain FingerprintingBrain Fingerprinting
Brain Fingerprintingveera
 
Overview of Machine Learning and Deep Learning Methods in Brain Computer Inte...
Overview of Machine Learning and Deep Learning Methods in Brain Computer Inte...Overview of Machine Learning and Deep Learning Methods in Brain Computer Inte...
Overview of Machine Learning and Deep Learning Methods in Brain Computer Inte...IJCSES Journal
 
Brain frequency based handicap wheelchair
Brain frequency based handicap wheelchairBrain frequency based handicap wheelchair
Brain frequency based handicap wheelchairDhanuaravinth K
 
Final thesis presentation on bci
Final thesis presentation on bciFinal thesis presentation on bci
Final thesis presentation on bciRedwan Islam
 

Similaire à A New Solution to the Brain State Permanency for Brain-Based Authentication Methods.pptx (20)

BCI
BCIBCI
BCI
 
BRAIN GATE
BRAIN GATEBRAIN GATE
BRAIN GATE
 
Mind Reading Device
Mind Reading DeviceMind Reading Device
Mind Reading Device
 
Ferree Resume
Ferree ResumeFerree Resume
Ferree Resume
 
BCI
BCIBCI
BCI
 
BRAIN FINGERPRINTING TECHNOLOGY
BRAIN FINGERPRINTING TECHNOLOGYBRAIN FINGERPRINTING TECHNOLOGY
BRAIN FINGERPRINTING TECHNOLOGY
 
Brain computer interface
Brain computer interfaceBrain computer interface
Brain computer interface
 
Brain finger printing technology
Brain finger printing technologyBrain finger printing technology
Brain finger printing technology
 
Human Brain Simulation for Robotic Applications
Human Brain Simulation for Robotic ApplicationsHuman Brain Simulation for Robotic Applications
Human Brain Simulation for Robotic Applications
 
Brain computer interface based
Brain computer interface basedBrain computer interface based
Brain computer interface based
 
Brain wave
Brain waveBrain wave
Brain wave
 
Prem
PremPrem
Prem
 
Biorobotics 140203232936-phpapp01
Biorobotics 140203232936-phpapp01Biorobotics 140203232936-phpapp01
Biorobotics 140203232936-phpapp01
 
Brain Fingerprinting
Brain FingerprintingBrain Fingerprinting
Brain Fingerprinting
 
Bio Robotics
Bio RoboticsBio Robotics
Bio Robotics
 
Overview of Machine Learning and Deep Learning Methods in Brain Computer Inte...
Overview of Machine Learning and Deep Learning Methods in Brain Computer Inte...Overview of Machine Learning and Deep Learning Methods in Brain Computer Inte...
Overview of Machine Learning and Deep Learning Methods in Brain Computer Inte...
 
Brain Computer Interface (BCI)
Brain Computer Interface (BCI)Brain Computer Interface (BCI)
Brain Computer Interface (BCI)
 
NeuroMarketing
NeuroMarketing NeuroMarketing
NeuroMarketing
 
Brain frequency based handicap wheelchair
Brain frequency based handicap wheelchairBrain frequency based handicap wheelchair
Brain frequency based handicap wheelchair
 
Final thesis presentation on bci
Final thesis presentation on bciFinal thesis presentation on bci
Final thesis presentation on bci
 

Dernier

Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxchumtiyababu
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxMuhammadAsimMuhammad6
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptNANDHAKUMARA10
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxmaisarahman1
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network DevicesChandrakantDivate1
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Call Girls Mumbai
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesMayuraD1
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.Kamal Acharya
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilVinayVitekari
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayEpec Engineered Technologies
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARKOUSTAV SARKAR
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 

Dernier (20)

Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech Civil
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 

A New Solution to the Brain State Permanency for Brain-Based Authentication Methods.pptx

  • 1. Guided By Submitted By Mr. Jayakumar M.E., J.Jercy Monica Reg No: 960121403006
  • 2. Abstract • Nowadays, to access any digital device we use authentication techniques, which is a critical technology in terms of security. • Present biometric authentications such as fingerprints or face recognition are the most used methods in our digitalized world, which are impressively advantageous in terms of security. • There are still some flaws, like not being useful for physical disabilities, environment usage matters, and most importantly the possibility of replicating them with some new technologies because of their visuality. • Brain signal is another human biometric that could cover the issues of other types in terms of security and visibility. • This paper proposes a method using the deep breath strategy to use brain signals for authentication purposes regardless of brain situation. • The result shows that the proposal accomplishment can alter the entire cycle of brain-based authentication and EEG-based authentication methods according to the parameter of permanency of the technique in many different brain states.
  • 3. Introduction • Brain signals have some important advantages in comparison with other biometrics. For instance, to acquire the EEG signal, the person must be alive. • Some biometrics can be maintained from a human’s dead body after death, which would yet legitimate for an acknowledgment after a while in the afterlife. • Therefore, the user has to be alive to produce EEG data. • On the other hand, EEG voltage decreases drastically with distance from the brain. • Because EEG can change depending on the situation. • In some positions, the brain doesn’t function properly and cannot be in its normal state to create a pattern for a task. Some reasons like being sick, drunk, stress, etc.
  • 4. Problem Statement • By breaking down signals made from the cerebrum, one can comprehend mental practices of the brain. Each brain state is related to a specific signal frequency, which is for understanding the functional behavior of human brain construction. • One of the important challenges for all brainwave authentication studies is brain pattern changes in different brain situations. • The EEG data of any person can change in some situations like being sick, drunk, addicted to drugs, anxiety and any other situations that any human can experience in their life. • Therefore, a method is needed that could have the permanency of the brain pattern and stability over time, not just for a specific task or brain state but also for all the other states.
  • 5. Objective • The objective of this paper is to implement a method that improves the permanency of the brain pattern using deep breathing in different brain situations.
  • 6. Existing System • The existing system is a continuous authentication method based on combination of statistical decision machines for brain signals. • Functional Near InfraRed Spectroscopy (NIRS) is used to measure brain oxyhemoglobin changes for each subject to be authenticated. • Such bio signal authentication is expected to be a viable complementary method to traditional static security systems. • The designed system is based on a discriminant function which utilizes the average weight vector of one-versus-one support vector machines for NIRS spectra. • By computing a histogram of Mahalanobis distances, high separability among subjects was recognized.
  • 7. Drawbacks • NIRS measures changes in blood flow and oxygen levels in the brain using near-infrared light. • This technique is non-invasive and relatively inexpensive, but it is not as accurate as fMRI and EEG, and the accuracy can be affected by factors such as hair and skin pigmentation.
  • 8. Proposed System • The proposed method has been done in four stages. • First, recording the EEG signals from participants. • Second, preprocessing the raw data, filtering, and normalization. • Third, extracting the features from the clean data. • The final stage, selecting the specific features according to the purpose of this study and classification. • Classification of EEG data with three labels, inhalation, holding the air and, exhalation was done using SVM and NN classifiers.
  • 9. Advantages • Cannot be faked or forged, since none of the brain signals matches the others. • Also, brain signals are invisible, so than no one can be able to forge it.
  • 11. Algorithm Used • Support Vector Machine (SVM) • An SVM classifier builds a model that assigns new data points to one of the given categories. • Thus, it can be viewed as a non-probabilistic binary linear classifier. • Neural Network (NN) • A neural network consists of units (neurons), arranged in layers, which convert an input vector into some output. • Each unit takes an input, applies a (often nonlinear) function to it and then passes the output on to the next layer.
  • 12. System Requirements Hardware Requirements • EEG Sensor • Personal Computer Software Requirements • Jupyter Notebook • Python Programming Language
  • 13. Modules • Signal Acquisition • Pre-Processing • Feature Extraction • Classification
  • 14. Signal Acquisition • To acquiring the signals, EEG sensor and a computer to record and store the data, was used. • The data are recorded, then digitized and got ready for analysis. • According to the studies, the range of four to six minutes may be an appropriate time for individuals to accumulate alpha brainwave successfully.
  • 15. Pre-Processing • To clear the data, a band-pass filter in the range of 0.5 Hz and 50 Hz was applied using a Finite Impulse Response (FIR) technique. • High-pass filter is one of the best ways to remove large amplitude and the slow drifts in the data. • The range of 0.5 Hz makes the data ready for Independent Component Analysis (ICA) analysis technique, which is very sensitive to low band-pass frequencies. • After filtering the data and clearing it from artifacts and noises, the ICA algorithm applied to the data to do a blind source separation of the process of signal mixing.
  • 16. Feature Extraction • According to the aim of this project and analyzing the relaxation state brainwave types produced by deep breathing, our main focus was on Alpha and Beta waves. • Therefore, the power spectral density (PSD) method, which extracts the frequency characteristics of signals was used. • PSD presents a consistent and effective way to extract the characteristics of spectral patterns with high discriminate accuracy for motor imagery EEGs. • After visually inspecting the entire data for all subjects, three features were extracted from the alpha and beta bands of PSD. • This was done by recognizing and selecting the highest PSD peak values in each band separately.
  • 17. Classification • For the classification of the appropriately selected features, two classifiers were used. • Support Vector Machine (SVM), and Neural Network (NN) which are the most commonly used in classifying EEG signals. • SVM and Neural Network can both express the information to a higher dimensional space to allocate a choice limit. • SVMs could be equivalent to a superficial neural network architecture. • On the other hand, for a large amount of data, a NN will overtake an SVM. • The two classes of calculations can surmise non-linear decision capacities, with various methodologies.
  • 18. Applications • Access control • Financial transactions • Student verification systems • Personal data verification
  • 19. Conclusion • An experiential study has been presented, which investigated deep breathings as a brain state for authentication purposes based on human EEG data. • An EEG Sensor is used in this study to record the brain waves of the participants, while they were asked to take deep breaths in three steps each time. • The results show that deep breathing can make the brain improve the alpha and beta waves no matter which situation the person is experiencing which could be the best option to have a stable brain pattern that could be predicted with high accuracy for the authentication process. • Therefore, different parts of deep breathing is used as an authentication brain pattern and are able to successfully achieve high accuracy using SVM and NN classifiers.
  • 20. References 1) F. Yousefi, H. Kolivand, “Brain Signals as a New Biometric Authentication Method Using Brain-Computer Interface”. In: Lee N.(eds) Encyclopedia of Computer Graphics and Games. Springer, Cham, 2019. 2) Di, Y., An, X., He, F., Liu, S., Ke, Y., Ming, D., 2019. Robustness analysis of identification using resting-state EEG signals. IEEE Access 7 (c), 42113–42122. 3) Ruiz-blondet, M., Khalifian, N., Armstrong, B.C., Jin, Z., Kurtz, K.J., Laszlo, S., 2014. Brainprint: identifying unique features of neural activity with machine learning. In: Proc. 36th Annual Conf. of the Cognitive Science Society, pp. 827–832. 4) Das, R., Piciucco, E., Maiorana, E., Campisi, P., 2016. Visually evoked potentials for EEG biometrie recognition. In: 2016 1st International Workshop on Sensing, Processing and Learning for Intelligent Machines, SPLINE 2016 –Proceedings. 5) Zhang, F., Mao, Z., Huang, Y., Lin, X., Ding, G., 2018. Deep learning models for eeg-based rapid serial visual presentation event classification. J. Inf. Hiding Mul- timed. Signal Process. 9 (1), 177–187.
  • 21. References… 6) Kaur, B., Singh, D., Roy, P.P., 2017. A novel framework of EEG-based user identification by analyzing music-listening behavior. Multimed. Tools Appl. 76 (24), 25581–25602. 7) Alyasseri, Z.A.A., Khader, A T., Al-Betar, M.A., Papa, J.P., Ahmad Alomari, O., 2018. EEG- based person authentication using multi-objective flower pollination algorithm. In: 2018 IEEE Congress on Evolutionary Computation (CEC). IEEE, pp. 1–8. 8) Kumari, P., Vaish, A., 2016. Feature-level fusion of mental task’s brain signal for an efficient identification system. Neural Comput. Appl. 27 (3), 659–669. 9) Yousefi, F., Kolivand, H. and Baker, T., 2020. SaS-BCI: a new strategy to predict image memorability and use mental imagery as a brain-based biometric authentication. Neural Computing and Applications, pp.1-15. 10) Chen, J.X., Mao, Z.J., Yao, W.X. and Huang, Y.F., 2019. EEG-based biometric identification with convolutional neural network. Multimedia Tools and Applications, pp.1-21.