2022
DOI: 10.3390/s23010186
|View full text |Cite
|
Sign up to set email alerts
|

EEG Authentication System Based on One- and Multi-Class Machine Learning Classifiers

Abstract: In the current Information Age, it is usual to access our personal and professional information, such as bank account data or private documents, in a telematic manner. To ensure the privacy of this information, user authentication systems should be accurately developed. In this work, we focus on biometric authentication, as it depends on the user’s inherent characteristics and, therefore, offers personalized authentication systems. Specifically, we propose an electrocardiogram (EEG)-based user authentication s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
5
0

Year Published

2023
2023
2025
2025

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 41 publications
0
5
0
Order By: Relevance
“…For authentication, precision is a very important performance indicator (Hernández-Álvarez et al, 2022 ). In the view of precision, the authentication using c-VEP evoked in the MBCT performed very well.…”
Section: Discussionmentioning
confidence: 99%
“…For authentication, precision is a very important performance indicator (Hernández-Álvarez et al, 2022 ). In the view of precision, the authentication using c-VEP evoked in the MBCT performed very well.…”
Section: Discussionmentioning
confidence: 99%
“…Therefore, the verification stage requires a one-to-one match to decide the results as a valid user or imposter. Currently, classification/deep learning methods are used to perform user verification [8]. In this way, the analyzed literature suggests the following limitations:  Database: Most of the works that perform brain fingerprint extraction, and, in equal measure, the design of EEG-based authentication systems, use databases, designed for other purposes such as emotion recognition or character determination [32][33][34].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Unlike traditional systems, biometrics are advantageous as the encryption key [6] is harder to compromise or duplicate [7]. However, a biometric system is vulnerable to a variety of attacks designed to undermine the integrity of the authentication process [8,9].…”
Section: Introductionmentioning
confidence: 99%
“…Although this application will make it possible to delve deeper into purely technical aspects, it should be borne in mind that the Diamond Model and Cyberkill Chain offer a better understanding of the socio-political sphere and its role in the context of an attack, which can help and, in many cases, be decisive in dealing with a cyberattack. Alternative works in the current literature regarding AI and cybersecurity and cyber intelligence usually focus on the elaboration of user authentication protocols [46][47][48]; network situation awareness [49,50]; dangerous behaviour monitoring [51,52]; and abnormal traffic identification [53,54]. In all cases, the main goal of the proposed schemes is to predict Alternative works in the current literature regarding AI and cybersecurity and cyber intelligence usually focus on the elaboration of user authentication protocols [46][47][48]; network situation awareness [49,50]; dangerous behaviour monitoring [51,52]; and abnormal traffic identification [53,54].…”
mentioning
confidence: 99%
“…Alternative works in the current literature regarding AI and cybersecurity and cyber intelligence usually focus on the elaboration of user authentication protocols [46][47][48]; network situation awareness [49,50]; dangerous behaviour monitoring [51,52]; and abnormal traffic identification [53,54]. In all cases, the main goal of the proposed schemes is to predict Alternative works in the current literature regarding AI and cybersecurity and cyber intelligence usually focus on the elaboration of user authentication protocols [46][47][48]; network situation awareness [49,50]; dangerous behaviour monitoring [51,52]; and abnormal traffic identification [53,54]. In all cases, the main goal of the proposed schemes is to predict or identify an abnormal situation.…”
mentioning
confidence: 99%