SlideShare a Scribd company logo
 Md. Mahmudul Hasan
 Prof. Dr. Engr. Mohiuddin Ahmad
 Department of Electrical and Electronic Engineering, KUET, Khulna-9203, Bangladesh.
Contribution
Working Principle Classification & Authentication
Feature Extraction
Development of a EEG-Based Biometric Authentication &
Security System
Motivation and Objectives
Development of a biometric
authentication system based on
electroencephalogram(EEG).
 Comparison of EEG based
authentication with latest
technologies such as:
 Radio frequency Identification(RFID)
 Near Field Communication(NFC).
 Face detection using Image
Processing.
 To fill the gap between conventional
authentication system and biometric
authentication.
Step 1: Signal Acquisition
Step 2: Row signal pre-processing
a) Filtering
b) Artifact Removal
Step 3: Feature Extraction
 Time-domain feature extraction (mean, median,
and variance)
 Frequency-domain feature extraction (WT based)
and
 Time-frequency domain feature extraction(WPD
i.e. multi-level filters to analyze the time-
frequency information)
Step 4: Classification
 SVM(support vector machine)
 ANN(Artificial neural Network)
Step 5: Biometric Authentication
Fig 4. Plotting channel spectra
.
Discussion and Conclusion
References
System Overview
EEG & Human Authentication
Flow Chart
Fig. 1. Flow chart of the EEG based security system.
EEG:
 Short form of “Electroencephalography”.
 EEG is nothing but human
“brainwave signal”.
 EEG brainwave pattern is unique from
one person to another like fingerprint.
 EEG signals are the signature of neural activities.
 It is almost impossible to steal.
 EEG is very difficult to mimic.
 EEG is referred as “Language of Mind”.
1) Something you know:
 Textual password
 You have a secret that you know
2) Something you have:
 A smart card
 Barcode
3) Something you are:
 A fingerprint
 Iris
 EEG signal
 EEG is a unique biometric
identifier.
 EEG is Just like Fingerprint.
 EEG Can not be easily
duplicated.
 Adjustments of the EEG head set
is very much important.
 FIR filter is used to remove linear
trends.
 Individuals with bushy hair don’t
have any problems.
according to the EEG Headset.
 EEG Headset are costlier.
 Effective for strong security
system.
 To proof that EEG signal alone is able to
create a unique pattern for each subject.
 To use simple feature extraction methods.
 To provide simple classification methods
to provide strong evidence.
 To make a novel algorithm with EEG signal
processing.
 To provide unique patterns and identify
people with other human features.
 To build a reliable security system.
Authentication system:
(Three fundamental Factors)
Fig. 2. Raw EEG Signals
Fig 3. plotting channel locations
Fig 5. After FIR Filtering (linear trends removed)
Signal Acquisition: EEG Headset
Fig 7. Statistical analysis on the dataset
Fig. 6 : After removing channel artifacts
Channel artifact removal
[1] M. Poulos, M. Rangoussi, V. Chrissikopoulos, A. Evangelou. Parametric
person identification from the EEG using computational geometry. Proceedings
of the IEEE International Conference on Electronics, Circuits, and Systems,
2:1005–1008, 1999.
[2] R. Paranjape, J.Mahovsky, L. Benedicenti, Z. Koles. The
electroencephalogram as a biometrics. Proceedings of the Canadian Conference
on Electrical and Computer Engineering, 2:1363–1366, 2001.
[3] R. Palaniappan, D. Mandic. Biometrics from brain electrical activity: A machine
learning approach. IEEE Transactions on Pattern Analysis and Machine
Intelligence, 29(4):738–742, April 2007.
[4] S. Marcel, J. R. Mill´an. Person authentication using brainwaves (EEG) and
maximum a posteriori model adaptation. IEEE Transactions on Pattern Analysis
and Machine Intelligence, 29(4):743–748, April 2007.
[5] Sebastien Marcel a Jose del R. Millan Person authentication using
brainwaves (EEG) and Maximum a posteriori model adaptation, IEEE
Transactions on Pattern Analysis and Machine Intelligence Special Issue on
Biometrics 2007
[6] Xu Huang, Salahiddin Altahat, Dat Tran, Dharmendra Sharma, Human
Identification withElectroencephalogram (EEG) Signal Processing, 2012
International Symposium on Communications and Information Technologies
(ISCIT)

More Related Content

PPT
EEG based security
PDF
A Reliable Password-based User Authentication Scheme for Web-based Human Geno...
PDF
Overview of Machine Learning and Deep Learning Methods in Brain Computer Inte...
PPTX
Electrophysiological imaging for advanced pharmacological screening
PPT
Neural Engineering Research Overview
DOCX
Matlab ieee 2014 be, b.tech_completed list_(m)
PPTX
Intelligent and Automatic In vivo Detection and Quantification of Transplante...
DOCX
Education and Researching
EEG based security
A Reliable Password-based User Authentication Scheme for Web-based Human Geno...
Overview of Machine Learning and Deep Learning Methods in Brain Computer Inte...
Electrophysiological imaging for advanced pharmacological screening
Neural Engineering Research Overview
Matlab ieee 2014 be, b.tech_completed list_(m)
Intelligent and Automatic In vivo Detection and Quantification of Transplante...
Education and Researching

What's hot (19)

PDF
Applied mathematics
PDF
TOP 10 CITED PAPERS FOR CRYPTOGRAPHY AND INFORMATION SECURITY
PPT
AMA-IEEE Presentation : a low-power and reliable body area network platform f...
PDF
CLASSIFICATION OF CANCER BY GENE EXPRESSION USING NEURAL NETWORK
PDF
1 file front M.TECH ( PDF FILE )
DOC
1 front M.TECH ( M S WORD FILE )
DOCX
1 file front M.TECH ( M S WORD FILE )
PDF
1 front M.TACH ( PDF FILE )
DOCX
WIRLESS SENSOR NETWORK experiment LIST BY MR UMAKANT GOHATRE AND PROF. V. P. ...
PDF
Rios_Esther_UMassREUPoster
PPTX
Monitoring of concrete structures by electro mechanical impedance technique
PDF
IRJET- Anomaly Detection System in CCTV Derived Videos
PPT
Research on security of the wlan campus network
PDF
Research Inventy : International Journal of Engineering and Science is publis...
PDF
A NOVEL DNA ENCRYPTION SYSTEM USING CELLULAR AUTOMATA
PDF
An enhanced lossless compression with cryptography hybrid mechanism for ECG b...
PDF
Shridhar_Resume_Embedded
Applied mathematics
TOP 10 CITED PAPERS FOR CRYPTOGRAPHY AND INFORMATION SECURITY
AMA-IEEE Presentation : a low-power and reliable body area network platform f...
CLASSIFICATION OF CANCER BY GENE EXPRESSION USING NEURAL NETWORK
1 file front M.TECH ( PDF FILE )
1 front M.TECH ( M S WORD FILE )
1 file front M.TECH ( M S WORD FILE )
1 front M.TACH ( PDF FILE )
WIRLESS SENSOR NETWORK experiment LIST BY MR UMAKANT GOHATRE AND PROF. V. P. ...
Rios_Esther_UMassREUPoster
Monitoring of concrete structures by electro mechanical impedance technique
IRJET- Anomaly Detection System in CCTV Derived Videos
Research on security of the wlan campus network
Research Inventy : International Journal of Engineering and Science is publis...
A NOVEL DNA ENCRYPTION SYSTEM USING CELLULAR AUTOMATA
An enhanced lossless compression with cryptography hybrid mechanism for ECG b...
Shridhar_Resume_Embedded
Ad

Similar to Development of a EEG-Based Biometric Authentication & Security System (20)

PPTX
Using Brain Waves as New Biometric Feature for Authenticating a Computer User...
PDF
Using Brain Waves as New Biometric Feature for Authenticating a Computer User...
PDF
Lvq based person identification system
PPTX
A New Solution to the Brain State Permanency for Brain-Based Authentication M...
PPTX
PERSON AUTHENTICATION USING BRAINWAVES
DOCX
The Science Behind EEG (Electroencephalogram)
PPTX
EEG survey
PDF
J04302076081
PDF
Using K-Nearest Neighbors and Support Vector Machine Classifiers in Personal ...
PPTX
Brainwave seminar
PPTX
Brain computer interface based
PPTX
Deep Learning based Brain Activity recognition using EEG.pptx
PDF
EEG Mouse:A Machine Learning-Based Brain Computer Interface_interface
PDF
Swiss knife security kit for implantable medical devices
PDF
A machine learning algorithm for classification of mental tasks.pdf
PPT
nwang_aerospace13_machine_learning_framework.ppt
PPT
nwang_aerospace13.ppt
PDF
Electroencephalography-based brain-computer interface using neural networks
PPTX
signals ppt.pptx
Using Brain Waves as New Biometric Feature for Authenticating a Computer User...
Using Brain Waves as New Biometric Feature for Authenticating a Computer User...
Lvq based person identification system
A New Solution to the Brain State Permanency for Brain-Based Authentication M...
PERSON AUTHENTICATION USING BRAINWAVES
The Science Behind EEG (Electroencephalogram)
EEG survey
J04302076081
Using K-Nearest Neighbors and Support Vector Machine Classifiers in Personal ...
Brainwave seminar
Brain computer interface based
Deep Learning based Brain Activity recognition using EEG.pptx
EEG Mouse:A Machine Learning-Based Brain Computer Interface_interface
Swiss knife security kit for implantable medical devices
A machine learning algorithm for classification of mental tasks.pdf
nwang_aerospace13_machine_learning_framework.ppt
nwang_aerospace13.ppt
Electroencephalography-based brain-computer interface using neural networks
signals ppt.pptx
Ad

Recently uploaded (20)

PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
web development for engineering and engineering
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PPTX
Sustainable Sites - Green Building Construction
PPTX
Internet of Things (IOT) - A guide to understanding
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
DOCX
573137875-Attendance-Management-System-original
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPTX
UNIT 4 Total Quality Management .pptx
PDF
composite construction of structures.pdf
PPT
Mechanical Engineering MATERIALS Selection
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPTX
Lecture Notes Electrical Wiring System Components
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
web development for engineering and engineering
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
R24 SURVEYING LAB MANUAL for civil enggi
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
Sustainable Sites - Green Building Construction
Internet of Things (IOT) - A guide to understanding
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
573137875-Attendance-Management-System-original
Embodied AI: Ushering in the Next Era of Intelligent Systems
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
UNIT 4 Total Quality Management .pptx
composite construction of structures.pdf
Mechanical Engineering MATERIALS Selection
UNIT-1 - COAL BASED THERMAL POWER PLANTS
Lecture Notes Electrical Wiring System Components
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf

Development of a EEG-Based Biometric Authentication & Security System

  • 1.  Md. Mahmudul Hasan  Prof. Dr. Engr. Mohiuddin Ahmad  Department of Electrical and Electronic Engineering, KUET, Khulna-9203, Bangladesh. Contribution Working Principle Classification & Authentication Feature Extraction Development of a EEG-Based Biometric Authentication & Security System Motivation and Objectives Development of a biometric authentication system based on electroencephalogram(EEG).  Comparison of EEG based authentication with latest technologies such as:  Radio frequency Identification(RFID)  Near Field Communication(NFC).  Face detection using Image Processing.  To fill the gap between conventional authentication system and biometric authentication. Step 1: Signal Acquisition Step 2: Row signal pre-processing a) Filtering b) Artifact Removal Step 3: Feature Extraction  Time-domain feature extraction (mean, median, and variance)  Frequency-domain feature extraction (WT based) and  Time-frequency domain feature extraction(WPD i.e. multi-level filters to analyze the time- frequency information) Step 4: Classification  SVM(support vector machine)  ANN(Artificial neural Network) Step 5: Biometric Authentication Fig 4. Plotting channel spectra . Discussion and Conclusion References System Overview EEG & Human Authentication Flow Chart Fig. 1. Flow chart of the EEG based security system. EEG:  Short form of “Electroencephalography”.  EEG is nothing but human “brainwave signal”.  EEG brainwave pattern is unique from one person to another like fingerprint.  EEG signals are the signature of neural activities.  It is almost impossible to steal.  EEG is very difficult to mimic.  EEG is referred as “Language of Mind”. 1) Something you know:  Textual password  You have a secret that you know 2) Something you have:  A smart card  Barcode 3) Something you are:  A fingerprint  Iris  EEG signal  EEG is a unique biometric identifier.  EEG is Just like Fingerprint.  EEG Can not be easily duplicated.  Adjustments of the EEG head set is very much important.  FIR filter is used to remove linear trends.  Individuals with bushy hair don’t have any problems. according to the EEG Headset.  EEG Headset are costlier.  Effective for strong security system.  To proof that EEG signal alone is able to create a unique pattern for each subject.  To use simple feature extraction methods.  To provide simple classification methods to provide strong evidence.  To make a novel algorithm with EEG signal processing.  To provide unique patterns and identify people with other human features.  To build a reliable security system. Authentication system: (Three fundamental Factors) Fig. 2. Raw EEG Signals Fig 3. plotting channel locations Fig 5. After FIR Filtering (linear trends removed) Signal Acquisition: EEG Headset Fig 7. Statistical analysis on the dataset Fig. 6 : After removing channel artifacts Channel artifact removal [1] M. Poulos, M. Rangoussi, V. Chrissikopoulos, A. Evangelou. Parametric person identification from the EEG using computational geometry. Proceedings of the IEEE International Conference on Electronics, Circuits, and Systems, 2:1005–1008, 1999. [2] R. Paranjape, J.Mahovsky, L. Benedicenti, Z. Koles. The electroencephalogram as a biometrics. Proceedings of the Canadian Conference on Electrical and Computer Engineering, 2:1363–1366, 2001. [3] R. Palaniappan, D. Mandic. Biometrics from brain electrical activity: A machine learning approach. IEEE Transactions on Pattern Analysis and Machine Intelligence, 29(4):738–742, April 2007. [4] S. Marcel, J. R. Mill´an. Person authentication using brainwaves (EEG) and maximum a posteriori model adaptation. IEEE Transactions on Pattern Analysis and Machine Intelligence, 29(4):743–748, April 2007. [5] Sebastien Marcel a Jose del R. Millan Person authentication using brainwaves (EEG) and Maximum a posteriori model adaptation, IEEE Transactions on Pattern Analysis and Machine Intelligence Special Issue on Biometrics 2007 [6] Xu Huang, Salahiddin Altahat, Dat Tran, Dharmendra Sharma, Human Identification withElectroencephalogram (EEG) Signal Processing, 2012 International Symposium on Communications and Information Technologies (ISCIT)