SlideShare a Scribd company logo
A Seminar on
“Person Authentication Using Brain Waves”
Presented by:
Amena Kauser
3GU14EC005
Under The Guidance Of:
Prof. Praveen Sindagi
DEPT. OF ELECTRONICS AND COMMUNIATION ENGG.
GOVERNMENT ENGINEERING COLLEGE, RAICHUR 584134
Dept of Electronics and Communication Engg
Introduction
 Biometric Identification.
 An authentication (or verification) system involves confirming or denying
claimed by a person (one-to-one matchnig).
Dept of Electronics and Communication Engg
Biometrics
National Institute of science and technology (NIST) defines biometrics as
Automated method of identifying or authenticating an Individual based on his or
her physiological or behavioural characteristics.
The Brain Waves (BW) pattern of every individual is unique and that the EEG
(Electroencephalograms) can be used for biometric identification.
Biometrics
Brain Waves
IRIS
Palm Vein
Retina
FingerprintDept of Electronics and Communication Engg
Characteristics of BW
Main source of EEG is the synchronous activity of thousands of cortical
neurons
Everyone’s BW signals is a bit different even when they think about the
same thing
In abnormal adults the EEG shows sudden bursts of electrical activity
(spikes) or sudden slowing of BW…
These abnormal discharges may be caused by a brain tumour,
infection, injury, stroke, or epilepsy
Brain dead state: Flat EEG
Dept of Electronics and Communication Engg
Types of BW
Dept of Electronics and Communication Engg
Brainwave-based Authentication
The use of brain waves signals for user authentication have security advantages ,i.e
by the use of pass-thoughts instead of typing in a pass-word.
Authentication process have three steps:
1. Collecting of Brainwave data
2. Data Preprocessing
3. Data Analysis
Dept of Electronics and Communication Engg
Database
EEG signals were recorded with a Biosemi system
using a cap with 32 integrated electrodes.
Illustration of the location of the electrodes on the scalp cap.
Dept of Electronics and Communication Engg
Problem Description
An identity authentication system has to deal with two kinds of events
 Either the person claiming the given identity is the one who he claims to be
(client)
 Or he is not (impostor)
In general, the system may take two decisions either accept the client or reject him and
decide he is an impostor
Dept of Electronics and Communication Engg
FR FA
clientimpostor
EER
τ
EER
Person Authentication
Illustration of typical errors of biometric system during authentication. An
impostor above the threshold is a false acceptance. A client below the
threshold is the false rejection.
Dept of Electronics and Communication Engg
Applications
 Access Control Systems
 Building Gate Control
 Digital Multimedia Access
 Transaction Authentication
 Voice Mail
Dept of Electronics and Communication Engg
Advantages
 It is confidential (as it corresponds to mental task)
 It is very difficult to mimic (as similar mental tasks are person dependent)
 It is almost impossible to steal (as brain activity is sensitive to the stress and mood of the
person, and aggressor can’t force the person to reproduce his or her mental pass phrase)
Dept of Electronics and Communication Engg
REFERENCES
1. F. Babiloni, F. Cincotti, L. Lazzarini, J.d.R. Millan, J. Mourino, M. Varsta, J. Heikkonen, L.
Bianchi and M.G. Marciani, “Linear classification of low-resolution EEG patterns produced by
imagined hand movements”, IEEE Trans. on Rehabilitation Engineering, vol. 8, pp. 186-188,
2000
2. F. Cardinaux, C. Sanderson and S. Marcel, “Comparison of MLP and GMM Classifiers for
Face Verification on XM2VTS,” Proceedings of the 4th International Conference on Audio-
and Video-Based Biometric Person Authentication, pp. 911-920, 2003.
3. A.P. Dempster, N.M. Laird and D.B. Rubin. “Maximum-likelihood from incomplete data via
the EM algorithm” Journal of Royal Statistical Society, Series B (Methodological), vol. 39, no.
1, pp. 1-38, 1977.
Dept of Electronics and Communication Engg

More Related Content

PPT
Brain computer interface
PDF
Communication via-brain-computer-interface[1]
PPTX
Brain computer interaction
PPTX
Brain Computer Interface
PDF
asjadpresentation
PDF
BCI Paper
PDF
Using Brain Waves as New Biometric Feature for Authenticating a Computer User...
PPTX
Using Brain Waves as New Biometric Feature for Authenticating a Computer User...
Brain computer interface
Communication via-brain-computer-interface[1]
Brain computer interaction
Brain Computer Interface
asjadpresentation
BCI Paper
Using Brain Waves as New Biometric Feature for Authenticating a Computer User...
Using Brain Waves as New Biometric Feature for Authenticating a Computer User...

Similar to PERSON AUTHENTICATION USING BRAINWAVES (20)

PPTX
Brainwave seminar
PDF
Development of a EEG-Based Biometric Authentication & Security System
PPT
EEG based security
PPTX
EEG survey
PPTX
A New Solution to the Brain State Permanency for Brain-Based Authentication M...
PPT
Biometrics - Chapter 1 Introduction.pptx
DOCX
The Science Behind EEG (Electroencephalogram)
PPTX
Review 3
PDF
Lvq based person identification system
PDF
Enhancement of Multi-Modal Biometric Authentication Based on IRIS and Brain N...
PDF
B VOC Level-7: Biometric Comparision and Evaluation
PPTX
Brain wave
PDF
Brain Computer Interface for User Recognition And Smart Home Control
PPT
Biometrics presentation
PPT
Bio Metrics
PDF
J04302076081
DOCX
Next chapter in biometrics
PPT
A study on biometric authentication techniques
PPTX
Biometric Technology
PPTX
Biometric Authentication
Brainwave seminar
Development of a EEG-Based Biometric Authentication & Security System
EEG based security
EEG survey
A New Solution to the Brain State Permanency for Brain-Based Authentication M...
Biometrics - Chapter 1 Introduction.pptx
The Science Behind EEG (Electroencephalogram)
Review 3
Lvq based person identification system
Enhancement of Multi-Modal Biometric Authentication Based on IRIS and Brain N...
B VOC Level-7: Biometric Comparision and Evaluation
Brain wave
Brain Computer Interface for User Recognition And Smart Home Control
Biometrics presentation
Bio Metrics
J04302076081
Next chapter in biometrics
A study on biometric authentication techniques
Biometric Technology
Biometric Authentication
Ad

Recently uploaded (20)

PPTX
Microbiology with diagram medical studies .pptx
PPTX
microscope-Lecturecjchchchchcuvuvhc.pptx
PPTX
ANEMIA WITH LEUKOPENIA MDS 07_25.pptx htggtftgt fredrctvg
PDF
Unveiling a 36 billion solar mass black hole at the centre of the Cosmic Hors...
PDF
VARICELLA VACCINATION: A POTENTIAL STRATEGY FOR PREVENTING MULTIPLE SCLEROSIS
PPTX
2. Earth - The Living Planet Module 2ELS
PPTX
G5Q1W8 PPT SCIENCE.pptx 2025-2026 GRADE 5
PPTX
ECG_Course_Presentation د.محمد صقران ppt
PPTX
2Systematics of Living Organisms t-.pptx
DOCX
Viruses (History, structure and composition, classification, Bacteriophage Re...
PDF
CAPERS-LRD-z9:AGas-enshroudedLittleRedDotHostingaBroad-lineActive GalacticNuc...
PPTX
Comparative Structure of Integument in Vertebrates.pptx
PPTX
EPIDURAL ANESTHESIA ANATOMY AND PHYSIOLOGY.pptx
PDF
Biophysics 2.pdffffffffffffffffffffffffff
PDF
Mastering Bioreactors and Media Sterilization: A Complete Guide to Sterile Fe...
PDF
. Radiology Case Scenariosssssssssssssss
PPTX
Introduction to Fisheries Biotechnology_Lesson 1.pptx
PDF
SEHH2274 Organic Chemistry Notes 1 Structure and Bonding.pdf
PPTX
2. Earth - The Living Planet earth and life
PDF
Placing the Near-Earth Object Impact Probability in Context
Microbiology with diagram medical studies .pptx
microscope-Lecturecjchchchchcuvuvhc.pptx
ANEMIA WITH LEUKOPENIA MDS 07_25.pptx htggtftgt fredrctvg
Unveiling a 36 billion solar mass black hole at the centre of the Cosmic Hors...
VARICELLA VACCINATION: A POTENTIAL STRATEGY FOR PREVENTING MULTIPLE SCLEROSIS
2. Earth - The Living Planet Module 2ELS
G5Q1W8 PPT SCIENCE.pptx 2025-2026 GRADE 5
ECG_Course_Presentation د.محمد صقران ppt
2Systematics of Living Organisms t-.pptx
Viruses (History, structure and composition, classification, Bacteriophage Re...
CAPERS-LRD-z9:AGas-enshroudedLittleRedDotHostingaBroad-lineActive GalacticNuc...
Comparative Structure of Integument in Vertebrates.pptx
EPIDURAL ANESTHESIA ANATOMY AND PHYSIOLOGY.pptx
Biophysics 2.pdffffffffffffffffffffffffff
Mastering Bioreactors and Media Sterilization: A Complete Guide to Sterile Fe...
. Radiology Case Scenariosssssssssssssss
Introduction to Fisheries Biotechnology_Lesson 1.pptx
SEHH2274 Organic Chemistry Notes 1 Structure and Bonding.pdf
2. Earth - The Living Planet earth and life
Placing the Near-Earth Object Impact Probability in Context
Ad

PERSON AUTHENTICATION USING BRAINWAVES

  • 1. A Seminar on “Person Authentication Using Brain Waves” Presented by: Amena Kauser 3GU14EC005 Under The Guidance Of: Prof. Praveen Sindagi DEPT. OF ELECTRONICS AND COMMUNIATION ENGG. GOVERNMENT ENGINEERING COLLEGE, RAICHUR 584134 Dept of Electronics and Communication Engg
  • 2. Introduction  Biometric Identification.  An authentication (or verification) system involves confirming or denying claimed by a person (one-to-one matchnig). Dept of Electronics and Communication Engg
  • 3. Biometrics National Institute of science and technology (NIST) defines biometrics as Automated method of identifying or authenticating an Individual based on his or her physiological or behavioural characteristics. The Brain Waves (BW) pattern of every individual is unique and that the EEG (Electroencephalograms) can be used for biometric identification. Biometrics Brain Waves IRIS Palm Vein Retina FingerprintDept of Electronics and Communication Engg
  • 4. Characteristics of BW Main source of EEG is the synchronous activity of thousands of cortical neurons Everyone’s BW signals is a bit different even when they think about the same thing In abnormal adults the EEG shows sudden bursts of electrical activity (spikes) or sudden slowing of BW… These abnormal discharges may be caused by a brain tumour, infection, injury, stroke, or epilepsy Brain dead state: Flat EEG Dept of Electronics and Communication Engg
  • 5. Types of BW Dept of Electronics and Communication Engg
  • 6. Brainwave-based Authentication The use of brain waves signals for user authentication have security advantages ,i.e by the use of pass-thoughts instead of typing in a pass-word. Authentication process have three steps: 1. Collecting of Brainwave data 2. Data Preprocessing 3. Data Analysis Dept of Electronics and Communication Engg
  • 7. Database EEG signals were recorded with a Biosemi system using a cap with 32 integrated electrodes. Illustration of the location of the electrodes on the scalp cap. Dept of Electronics and Communication Engg
  • 8. Problem Description An identity authentication system has to deal with two kinds of events  Either the person claiming the given identity is the one who he claims to be (client)  Or he is not (impostor) In general, the system may take two decisions either accept the client or reject him and decide he is an impostor Dept of Electronics and Communication Engg
  • 9. FR FA clientimpostor EER τ EER Person Authentication Illustration of typical errors of biometric system during authentication. An impostor above the threshold is a false acceptance. A client below the threshold is the false rejection. Dept of Electronics and Communication Engg
  • 10. Applications  Access Control Systems  Building Gate Control  Digital Multimedia Access  Transaction Authentication  Voice Mail Dept of Electronics and Communication Engg
  • 11. Advantages  It is confidential (as it corresponds to mental task)  It is very difficult to mimic (as similar mental tasks are person dependent)  It is almost impossible to steal (as brain activity is sensitive to the stress and mood of the person, and aggressor can’t force the person to reproduce his or her mental pass phrase) Dept of Electronics and Communication Engg
  • 12. REFERENCES 1. F. Babiloni, F. Cincotti, L. Lazzarini, J.d.R. Millan, J. Mourino, M. Varsta, J. Heikkonen, L. Bianchi and M.G. Marciani, “Linear classification of low-resolution EEG patterns produced by imagined hand movements”, IEEE Trans. on Rehabilitation Engineering, vol. 8, pp. 186-188, 2000 2. F. Cardinaux, C. Sanderson and S. Marcel, “Comparison of MLP and GMM Classifiers for Face Verification on XM2VTS,” Proceedings of the 4th International Conference on Audio- and Video-Based Biometric Person Authentication, pp. 911-920, 2003. 3. A.P. Dempster, N.M. Laird and D.B. Rubin. “Maximum-likelihood from incomplete data via the EM algorithm” Journal of Royal Statistical Society, Series B (Methodological), vol. 39, no. 1, pp. 1-38, 1977. Dept of Electronics and Communication Engg