DOI QR코드

DOI QR Code

Development of Efficient Encryption Scheme on Brain-Waves Using Five Phase Chaos Maps

  • 투고 : 2016.03.04
  • 심사 : 2016.03.24
  • 발행 : 2016.03.25

초록

Secondary damage to the user is a problem in biometrics. A brain-wave has no shape and a malicious user may not cause secondary damage to a user. However, if user sends brain-wave signals to an authentication system using a network, a malicious user could easily capture the brain-wave signals. Then, the malicious user could access the authentication system using the captured brain-wave signals. In addition, the dataset containing the brain-wave signals is large and the transfer time is long. However, user authentication requires a real-time processing, and an encryption scheme on brain-wave signals is necessary. In this paper, we propose an efficient encryption scheme using a chaos map and adaptive junk data on the brain-wave signals for user authentication. As a result, the encrypted brain-wave signals are produced and the processing time for authentication is reasonable in real-time.

키워드

참고문헌

  1. J. S. Kim and J. Y. Chung, "An EEG encryption scheme for authentication system based on brain wave," Journal of Korea Multimedia Society, vol. 18, no. 3, pp. 330-338, 2015. http://dx.doi.org/10.9717/kmms.2015.18.3.330
  2. D. D. Patil, N. A. Nemade, and K. M. Attarde, "Iris recognition using fuzzy system," International Journal of Computer Science and Mobile Computing, vol. 2, no. 3, pp. 14-17, 2013.
  3. W. Khalifa, A. Salem, M. Roushdy, and K. Revett, "A survey of EEG based user authentication schemes," in Proceedings of the 8th International Conference on Informatics and Systems (INFOS'12), Cairo, Egypt, 2012, pp. 55-60.
  4. J. Fridrich, "Image encryption based on chaotic maps," in Proceedings of IEEE International Conference on Systems, Man, and Cybernetics, Orlando, FL, 1997, pp. 1105-1110. http://dx.doi.org/10.1109/ICSMC.1997.638097
  5. C. F. Lin, S. H. Shih, J. D. Zhu, and S. H. Lee, "Implementation of an offline chaos-based EEG encryption software," in Proceedings of 14th International Conference on Advanced Communication Technology (ICACT), Pyeongchang, Korea, 2012, pp.430-433.
  6. C. F. Lin, S. H. Shih, J. D. Zhu, S. H. Lee, and C. W. Liu, "C# Based EEG Encryption System Using Chaos Algorithm," in Proceedings of the 1st WSEAS International Conference on Complex Systems and Chaos (COSC'13), Morioka, Japan, 2013.
  7. C. F. Lin and C. H. Chung, "A chaos-based visual encryption mechanism in integrated ECG/EEG medical signals," in Proceedings of 10th International Conference on Advanced Communication Technology (ICACT'08), Gangwon-do, Korea, 2008, pp. 1903-1907. http://dx.doi.org/10.1109/ICACT.2008.4494157
  8. C. Ashby, A. Bhatia, F. Tenore, and J. Vogelstein, "Lowcost electroencephalogram (EEG) based authentication," in Proceedings of 5th International IEEE/EMBS Conference on Neural Engineering (NER), Cancun, Mexico, 2011, pp. 442-445. http://dx.doi.org/10.1109/NER.2011.5910581
  9. A. Zuquete, B. Quintela, and J. P. S. Cunha, "Biometric authentication using brain responses to visual stimuli," in Proceedings of the 3rd International Conference on Bioinspired Systems and Signal Processing (Biosignals2000), Valencia, Spain, 2010, pp. 103-112.
  10. C. E. Shannon, "Communication theory of secrecy systems," Bell System Technical Journal, vol. 28, no. 4, pp. 656-715, 1949. http://dx.doi.org/10.1002/j.1538-7305.1949.tb00928.x
  11. W. Stallings, Network Security Essentials: Applications and Standards, 5th ed. Upper Saddle River, NJ: Pearson Education, 2013.
  12. T. J. Lee and K. B. Sim, "EEG based vowel feature extraction for speech recognition system using international phonetic alphabet," Journal of Korean Institute of Intelligent Systems, vol. 24, no. 1, pp. 90-95, 2014. http://dx.doi.org/10.5391/JKIIS.2014.24.1.090

피인용 문헌

  1. Analysis of Chaotic Behavior in a Novel Extended Love Model Considering Positive and Negative External Environment vol.20, pp.5, 2018, https://doi.org/10.3390/e20050365