2018
DOI: 10.1155/2018/1867548
|View full text |Cite
|
Sign up to set email alerts
|

Combining Cryptography with EEG Biometrics

Abstract: Cryptographic frameworks depend on key sharing for ensuring security of data. While the keys in cryptographic frameworks must be correctly reproducible and not unequivocally connected to the identity of a user, in biometric frameworks this is different. Joining cryptography techniques with biometrics can solve these issues. We present a biometric authentication method based on the discrete logarithm problem and Bose-Chaudhuri-Hocquenghem (BCH) codes, perform its security analysis, and demonstrate its security … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
47
0
2

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 59 publications
(49 citation statements)
references
References 48 publications
0
47
0
2
Order By: Relevance
“…The increasing awareness of brain–computer interfaces (BCI) for brain signal analysis has sparked new interest in electroencephalogram (EEG) acquisition device development. Various rehabilitation [ 1 ], entertainment, and even security [ 2 ] applications can be implemented by post-processing [ 3 , 4 , 5 ] such electrical signals recorded from the human scalp. However, developing a BCI is a challenging task due to the noisy and variable nature of the EEG signal itself.…”
Section: Introductionmentioning
confidence: 99%
“…The increasing awareness of brain–computer interfaces (BCI) for brain signal analysis has sparked new interest in electroencephalogram (EEG) acquisition device development. Various rehabilitation [ 1 ], entertainment, and even security [ 2 ] applications can be implemented by post-processing [ 3 , 4 , 5 ] such electrical signals recorded from the human scalp. However, developing a BCI is a challenging task due to the noisy and variable nature of the EEG signal itself.…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, static authentication becomes prey to session hijacking attacks. To overcome the issue of static authentication of biometric features and cryptographic methods, Robertas et al [24] proposed EEG based biometric cryptosystem. This biometric cryptosystem has 4 of low explosibility and can be used by disabled people or users with some missing physical traits.…”
Section: Related Workmentioning
confidence: 99%
“…As per the guidelines of Robertas et al [24], Jorgensen and Yu [52], we tested the app for False Table 4. Survey questions to test the usefulness of the Bio-Guard app.…”
Section: Test For False Rejection Rate (Frr) False Acceptance Rate (mentioning
confidence: 99%
“…Therefore, static authentication becomes prey to session hijacking attacks. To overcome the issue of static authentication of biometric features and cryptographic methods, Robertas et al [24] proposed EEG based biometric cryptosystem. This biometric cryptosystem has low explosibility and can be used by disabled people or users with some missing physical traits.…”
Section: Related Workmentioning
confidence: 99%