Evaluation of the Brain Wave As Biometrics in a Simulated Driving Environment
Total Page:16
File Type:pdf, Size:1020Kb
Evaluation of the Brain Wave as Biometrics in a Simulated Driving Environment Isao Nakanishi Koutaro Ozaki Shigang Li Graduate School of Engineering, Department of Engineering, Graduate School of Engineering, Tottori University Tottori University Tottori University 4-101 Koyama-Minami, Tottori, 4-101 Koyama-Minami, Tottori, 4-101 Koyama-Minami, Tottori, 680-8552 Japan 680-8552 Japan 680-8552 Japan Email: [email protected] Abstract—In the case of user management, continuous or the while that the application is executed but the continuous on-demand biometric authentication is effective for achieving authentication brings a heavy load to the system. In fact, it was higher security with a light system load. However, it requires reported that the overhead for the continuous authentication us to present biometric data unconsciously. In this paper, we focus attention on the brain wave as unconscious biometrics. was 42 % in Ref. [6]. In particular, assuming driver authentication, we measure the Thus, we have proposed on-demand authentication in which brain waves of drivers when they are using a simplified driving users are authenticated on a regular schedule or a nonregular simulator. We evaluate verification performance using 23 subjects one on demand of authentication from the system [7]. The and obtain the EER of about 20 %. on-demand authentication makes the system load lighter. By the way, the fingerprint and the iris are not suitable I. INTRODUCTION for the continuous and the on-demand authentication because Biometric person authentication gains public attention. It is they ask users to present biometric data whenever the users well known that the fingerprint and the iris achieve higher are authenticated. In other words, the continuous and the on- security and they are already used in security systems [1]. demand authentication need the biometrics that is able to On the other hand, it was reported that authentication systems present biometric data unconsciously. As such unconscious using them were circumvented by using fake fingers or printed biometrics, the face, ear, voice, keystroke and gait are applica- iris images [2], [3]. The reason is that the fingerprint or the ble but the face and the ear are easily imitated using artifacts, iris are appeared on a body surface and so become observable and the voice, keystroke and gait limit the use of biometric by using easily obtainable sensors. applications. The vein is contained within the body; therefore, it is It has been proposed to use brain waves as the biometrics expected to have tolerability to the circumvention. However, [8]–[19]. The brain wave is generated by activities of neurons it is also reported that even authentication system using the in the cerebral cortex; therefore, it is contained within the vein accepted artifacts in enrollment and verification [4]. This body, thereby preventing circumvention of security. Of course, is due to lack of the function of liveness detection that the brain wave is generated by only live human beings. If the examines whether an object is a part of a living body. The liveness can be detected using the brain wave, no additional liveness detection scheme is necessary for protecting biometric sensor is needed for the liveness detection. Moreover, the brain authentication systems from spoofing using artifacts. wave is generated autonomously and unconsciously; therefore, On the other hand, conventional biometric systems mainly it enables on-demand authentication. Conversely, brain waves assume applications based on one-time-only authentication are not suitable for one-time-only authentication since users such as access control, banking, passport control, and so are required to put sensors on their scalp every time they are on. However, from the viewpoint of user management, the authenticated. From the viewpoint of accessibility, the brain one-time-only authentication is low-security. After initially wave as biometrics is the most adequate. authenticating a genuine user, a system cannot detect spoofing Based on the above facts, we believe that operator verifica- by an imposter who has replaced the user. tion of a system such as a computer and a vehicle is suitable Assuming that both authentication and application execution for the authentication using the brain wave [7], [20]. Operators are simultaneously achieved in a single system, the one-time- wear a brain wave sensor and they are verified on demand only authentication is not a heavy load on the system since while using the system as illustrated in Fig. 1. For instance, the authentication is performed only once at the start of the in remote education systems, students should be authenticated application execution while security is not guaranteed after the while learning. It is even more so for students who are trying authentication. to obtain some academic degree or public qualification. In In order to cope with this problem, continuous authenti- addition, operators of public transportation systems should be cation is proposed [5], [6]. The security is guaranteed all authenticated while operating the systems since hundreds of EEG Sensor 7 [x10 ] α β m 0.8 u tr ec0.6 p S er0.4 w o P0.2 0 8 11 14 17 20 Frequency [Hz] Fig. 1. Illustrations of on-demand operator verification using the brain wave. (a) Relaxed [x10 7] α β 0.8 m u human lives depend on them. There are other examples: pilots tr 0.6 ec p of aircrafts, drivers of emergency vehicles, and operators of S0.4 er military weapons. w o0.2 In Ref. [20], we measured brain waves of drivers who were P 0 tracing routes as mental task and evaluated the verification 8 11 14 17 20 performance. However, the route tracing did not require them Frequency [Hz] to move their four limbs. For evaluating the verification (b) Tasked performance in more practical environment, some actual task that involves four limbs’ moving should be assumed. In this (a) Subject: A paper, we examine the verification performance of the brain waves of drivers who are using a simplified driving simulator. [x10 7] II. AUTHENTICATION USING BRAIN WAVES α β m 0.8 u tr A. Brain Wave ec 0.6 p S Electrical changes from large number of synapses (neurons) er 0.4 w o in the cerebral cortex are accumulated and then detected as P 0.2 a brain wave (Electroencephalogram: EEG) on the scalp by 0 using an electrode. Because of spatiotemporal dispersiveness 8 11 14 17 20 Frequency [Hz] of the neurons, there are not distinct patterns in the EEG (a) Relaxed in general. However, when activity of the cerebral cortex [x10 7] becomes low, brain waves partially become synchronous and α β 0.8 m thereby some distinctive pattern is observed. As such patterns, u tr 0.6 ± (0.5-3Hz), θ (4-7Hz), ® (8-13Hz), and ¯ (14-30Hz) are well ec p S0.4 known and detectable when human beings are during deep er w o 0.2 sleep, getting sleepy, relaxed with closed eyes, and in some P mental activity, respectively. In particular, the ® and/or the ¯ 0 8 11 14 17 20 waves are applicable for person authentication. Frequency [Hz] B. Feature Extraction and Verification (b) Tasked In order to actualize the authentication using EEGs, the architecture for feature extraction and verification must be as (b) Subject: B simple as possible. Therefore, we have used a single sensor for detecting the brain wave and had proposed to extract power Fig. 2. Examples of the EEG spectrum from two subjects. spectra at the ®-¯ band as individual features and a verification method based on the difference between a mean value of the power spectrum in a mental-tasked condition and that in a relaxed condition [20]. This concept is based on the fact that ® users in practical applications. In this paper, we propose to waves are detectable and ¯ waves are undetectable in the relax compare spectra directly in the tasked condition. Additionally, condition while the ® waves are suppressed and the ¯ waves for suppressing intra-individual variation, we introduce nor- become detectable in the mental-tasked condition as shown malization into verification. in Fig. 2, which describes the spectra at the ®-¯ band in the Furthermore, we divide the ®-¯ band into several partitions relaxed and the mental-tasked conditions from two subjects. and fuse scores from all partitions [20]. Figure 3 illustrates However, the conventional method needed additional mea- the partitioning, where the number of partitions is four. The surement in the relaxed condition. It was inconvenience for reason why we introduce the partitioning is that the spectral Partition #1 Partition #2 Partition #3 Partition #4 m u tr ec p S er w o P 8 1114 17 20 Frequency [Hz] Fig. 3. Partitions in the ®-¯ band. Fig. 5. A still image of the driving scene. Enrollment Verification Measurement Measurement during a task during a task score S is calculated by XP FFT FFT j t ¡ tj L times S = sT s p: (1) p=1 Spectral Smoothing Spectral Smoothing t t where P is the number of partitions, sT is a template, and s is Power Spectrum Power Spectrum a mean value of each partition. For normalization, each power spectral value of st is multiplied by a ratio of a mean value t t of all power spectra of a template: sT to that of s . The mean Ensemble Averaging t t of L Data Normalization power spectrum of s is equalized to that of the template: sT . If S is less than a threshold, the user is authenticated Averaged Spectrum genuine. Mean Power in P bands III. EXPERIMENTS Mean Power in P bands Experiments in practical driving carry a risk of having Matching some accident. There is a way to introduce a special training S simulator that is possible to simulate the driving in our Template Decision laboratory but it has also an issue of cost.