z-logo
open-access-imgOpen Access
Cancellable Template Design for Privacy-Preserving EEG Biometric Authentication Systems
Author(s) -
Min Wang,
Song Wang,
Jiankun Hu
Publication year - 2022
Publication title -
ieee transactions on information forensics and security
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 1.613
H-Index - 133
eISSN - 1556-6021
pISSN - 1556-6013
DOI - 10.1109/tifs.2022.3204222
Subject(s) - signal processing and analysis , computing and processing , communication, networking and broadcast technologies
As a promising candidate to complement traditional biometric modalities, brain biometrics using electroencephalography (EEG) data has received a widespread attention in recent years. However, compared with existing biometrics such as fingerprints and face recognition, research on EEG biometrics is still in its infant stage. Most of the studies focus on either designing signal elicitation protocols from the perspective of neuroscience or developing feature extraction and classification algorithms from the viewpoint of machine learning. These studies have laid the ground for the feasibility of using EEG as a biometric verification modality, but they have also raised security and privacy concerns as EEG data contains sensitive information. Existing research has used hash functions and cryptographic schemes to protect EEG data, but they do not provide functions for revoking compromised templates as in cancellable template design. This paper proposes the first cancellable EEG template design for privacy-preserving EEG-based verification systems, which can protect raw EEG signals containing sensitive privacy information (e.g., identity, health and cognitive status). A novel cancellable EEG template is developed based on EEG features extracted by a deep learning model and a non-invertible transform. The proposed transformation provides cancellable templates, while taking advantage of EEG elicitation protocol fusion to enhance biometric performance. The proposed verification system offers superior performance than the state-of-the-art, while protecting raw EEG data. Furthermore, we analyze the system’s capacity for resisting multiple attacks, and discuss some overlooked but critical issues and possible pitfalls involving hill-climbing attacks, second attacks, and classification-based verification systems.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here