Single Trial Authentication with Mental Password Writing

  • Sarah N. AbdulkaderEmail author
  • Ayman Atia
  • Mostafa-Sami M. Mostafa
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9190)


This paper presents an authentication system that uses brain waves as a biometric discriminant trait. It utilizes Electroencephalogram (EEG) signals generated from mental writing of the user-owned password. Independent Component Analysis (ICA) and baseline correction has been used for preprocessing and noise removal. The effect of two types of features, multivariate autoregressive (MVAR) model parameters and power spectral density (PSD) features, have been studied for this activity. Performance results based on single trial analysis have revealed that imagined password writing can reach average Half Total Error Rate (HTER) of 5 % for PSD features vs 3 % obtained with MVAR coefficients. The experiments have shown that mental password writing can be used for increasing the user acceptance for enrollment conditions while maintaining high performance results.


EEG BCI verification Biometric authentication Mental writing 


  1. 1.
    Shanmugapriya, D., Padmavathi, G.: A survey of biometric keystroke dynamics: approaches, security and challenges. arXiv preprint arXiv:0910.0817 (2009)Google Scholar
  2. 2.
    Riera, A., Dunne, S., Cester, I., Ruffini, G.: Electrophysiological biometrics: opportunities and risks. In: Mordini, E., Tzovaras, D. (eds.) Second Generation Biometrics: The Ethical, Legal and Social Context. The International Library of Ethics, Law and Technology, pp. 149–176. Springer, Netherlands (2012)CrossRefGoogle Scholar
  3. 3.
    Su, F., Zhou, H., Feng, Z., Ma, J.: A biometric-based covert warning system using EEG. In: 2012 5th IAPR International Conference on Biometrics (ICB), pp. 342–347. IEEE (2012)Google Scholar
  4. 4.
    Yeom, S.-K., Suk, H.-I., Lee, S.-W.: Eeg-based person authentication using face stimuli. In: 2013 International Winter Workshop on Brain-Computer Interface (BCI), pp. 58–61. IEEE (2013)Google Scholar
  5. 5.
    Yeom, S.-K., Suk, H.-I., Lee, S.-W.: Person authentication from neural activity of face-specific visual self-representation. Pattern Recogn. 46, 1159–1169 (2013)CrossRefGoogle Scholar
  6. 6.
    Ravi, K., Palaniappan, R.: Leave-one-out authentication of persons using 40 Hz EEG oscillations. In: The International Conference on Computer as a Tool, 2005. EUROCON 2005, pp. 1386–1389. IEEE (2005)Google Scholar
  7. 7.
    Zúquete, A., Quintela, B., Cunha, J.P.S.: Biometric authentication using brain responses to visual stimuli. In: Proceedings of the International Conference on Bio-inspired Systems and Signal Processing, pp. 103–112 (2010)Google Scholar
  8. 8.
    Ashby, C., Bhatia, A., Tenore, F., Vogelstein, J.: Low-cost electroencephalogram (EEG) based authentication. In: 2011 5th International IEEE/EMBS Conference on Neural Engineering (NER), pp. 442–445. IEEE (2011)Google Scholar
  9. 9.
    Hema, C.R., Paulraj, M., Kaur, H.: Brain signatures: a modality for biometric authentication. In: International Conference on Electronic Design, 2008. ICED 2008, pp. 1–4. IEEE (2008)Google Scholar
  10. 10.
    Hema, C., Osman, A.A.: Single trial analysis on EEG signatures to identify individuals. In: 2010 6th International Colloquium on Signal Processing and Its Applications (CSPA), pp. 1–3. IEEE (2010)Google Scholar
  11. 11.
    Marcel, S., del Millán, J.R.: Person authentication using brainwaves (EEG) and maximum a posteriori model adaptation. IEEE Trans. Pattern Anal. Mach. Intell. 29, 743–752 (2007) CrossRefGoogle Scholar
  12. 12.
    Svogor, I., Kisasondi, T.: Two factor authentication using EEG augmented passwords. In: Proceedings of the ITI 2012 34th International Conference on Information Technology Interfaces (ITI), pp. 373–378. IEEE (2012)Google Scholar
  13. 13.
    Wang, L., Geng, X., Global, I.: Behavioral Biometrics for Human Identification: Intelligent Applications. Medical Information Science Reference, New York (2010) CrossRefGoogle Scholar
  14. 14.
    Chuang, J., Nguyen, H., Wang, C., Johnson, B.: I think, therefore i am: usability and security of authentication using brainwaves. In: Adams, A.A., Brenner, M., Smith, M. (eds.) FC 2013. LNCS, vol. 7862, pp. 1–16. Springer, Heidelberg (2013)CrossRefGoogle Scholar
  15. 15.
    Hyvärinen, A., Karhunen, J., Oja, E.: Independent Component Analysis. Wiley, New York (2004)Google Scholar
  16. 16.
    Stone, J.V.: Independent Component Analysis. Wiley Online Library (2004)Google Scholar
  17. 17.
    Allison, B.Z., Dunne, S., Leeb, R.: Towards Practical Brain-Computer Interfaces: Bridging the Gap from Research to Real-World Applications. Springer, Heidelberg (2012)Google Scholar
  18. 18.
    Hu, L., Xiao, P., Zhang, Z., Mouraux, A., Iannetti, G.: Single-trial time–frequency analysis of electrocortical signals: baseline correction and beyond. NeuroImage. 84, 876–887 (2014)CrossRefGoogle Scholar
  19. 19.
    He, C., Lv, X., Wang, Z.J.: Hashing the mAR coefficients from EEG data for person authentication. In: IEEE International Conference on Acoustics, Speech and Signal Processing, 2009. ICASSP 2009, pp. 1445–1448. IEEE (2009)Google Scholar
  20. 20.
    Schlögl, A., Supp, G.: Analyzing event-related EEG data with multivariate autoregressive parameters. Prog. Brain Res. 159, 135–147 (2006)CrossRefGoogle Scholar
  21. 21.
    Marple, S.L.: Digital Spectral Analysis: with Applications. Prentice-Hall, Englewood Cliffs (1987)Google Scholar
  22. 22.
    Jian-feng, H.: Comparison of different classifiers for biometric system based on EEG signals. In: 2010 Second International Conference on Information Technology and Computer Science (ITCS), pp. 288–291. IEEE (2010)Google Scholar
  23. 23.
    [Last Visit: 2014.07.08].
  24. 24.
    Monroe, D.: Biometrics Metrics Report v3.0.

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  • Sarah N. Abdulkader
    • 1
    Email author
  • Ayman Atia
    • 1
  • Mostafa-Sami M. Mostafa
    • 1
  1. 1.HCI-LAB, Department of Computer ScienceFaculty of Computers and Information-Helwan UniversityCairoEgypt

Personalised recommendations