Evaluation of Brain Waves As Biometrics for Driver Authentication Using Simplified Driving Simulator

Evaluation of Brain Waves As Biometrics for Driver Authentication Using Simplified Driving Simulator

Evaluation of Brain Waves as Biometrics for Driver Authentication Using Simplified Driving Simulator Isao Nakanishi, Sadanao Baba and Shigang Li Graduate School of Engineering Tottori University Tottori, Japan Email: [email protected] Abstract—The brain wave is able to present biometric data Authentication unconsciously, so that it enables continuous or on-demand A authentication which is effective in user management. In this paper, assuming an application to driver authentication, we Application Execution evaluate verification performance of the brain wave using a simplified driving simulator. In addition, dividing the - During Use band to several partitions, we propose to extract the difference between a mean value of the power spectrum at (a) One-Time-Only each partition in relaxed condition and that in mental-tasked condition as an individual feature. Fusing the differences Authentication from higher partitions in verification, the EER of 24% is obtained among 10 subjects. Application Execution Keywords-Biometrics, Driver Authentication, Brain Wave, During Use Simplified Driving Simulator (b) Continuous I. INTRODUCTION In ubiquitous networked society, non face-to-face com- A A A A A munication is necessary, so that the person authentication Application Execution technique which verifies whether users are genuine or not becomes important. Until now passwords and/or ID cards During Use are used for such a case. But there is a problem that they (c) On-Demand are at a risk for being forgotten or stolen. Thus, the person authentication using biometrics attracts attention [1]. As the biometrics, a physical or behavioral Figure 1. Authentication styles. characteristic such as the fingerprint, iris, vein, face, ear, voice, signature and keystroke are utilized. They are never forgotten or stolen; therefore, they are effective in usabil- On the other hand, the continuous authentication is ity. However, they assume one-time-only authentication actively studied [2], [3]. The authentication is always since they are considered as alternatives of the passwords achieved while the applications are being executed; there- or the ID cards. fore, the security is also guaranteed the while but it brings On the other hand, from a viewpoint of user man- heavy load on the system. It was reported that the overhead agement, the one-time-only authentication is low-security. of 42% in computational time was caused in a continuous After authentication by a genuine user, even if he/she is authentication system [3]. switched to an imposter, the one-time-only authentication We have proposed the on-demand authentication, where could not detect such an identity thief. a user is authenticated on a regular or nonregular schedule In order to cope with the problem, continuous or on- on demand of authentication from a system [4]. The on- demand authentication is needed. Figure 1 shows conceiv- demand authentication does not require the system to able styles for authentication, in which it is assumed that authenticate the user at all times, so that it could reduce the authentication process and the execution of applica- the load on the system. tions are simultaneously performed in a single system. However, in the on-demand authentication, the user is where (a) is the one-time-only, (b) is the continuous, required to present biometric data every time the system and (c) is the on-demand authentication. attempts to authenticate and so it is not inconvenience. As mentioned above, in the one-time-only authenti- Resultingly, unconscious biometrics is needed. cation, the authentication is achieved only at the start As the unconscious biometrics, the face, ear, voice, of using the applications; therefore, the authentication keystroke and gate are applicable but the face and the ear requires the system little load but there is no security after are easily imitated using artifacts and the voice, keystroke the authentication. and gate limit applications. In fact, conventional biometric modalities mostly have thentication, we evaluate verification performance of the a problem that to make their artifacts is easy so that brain wave while a user is operating a simplified driving they are revealed on the body surface. It is well known simulator. that consumer authentication systems using the fingerprint If the detection of catnapped and/or drunkard drivers were circumvented by fake fingers [5]. using the brain wave is possible, it is expected to be This is due to lack of the function of liveness detection integrated with the driver’s on-demand authentication and which examines whether an object is a part of a living will become valuable protection against having accidents. body. The liveness detection scheme is necessary for In this paper, we assume driver authentication as one of protecting biometric authentication systems from spoofing applications which need the on-demand authentication and using the artifacts but it also needs additional sensors or propose simple feature extraction and verification methods systems. of the brain wave and then evaluate them in experiments For these reasons mentioned above, we have focused using a simplified driving simulator. attention on the brain wave as biometrics [6], [4], [7]. The brain wave is generated by the activities of neurons in the II. VERIFICATION USING BRAIN WAV E S cerebral cortex; therefore, it is hidden in the body and so A. Brain Wave effective for anti-circumvention. If the function of liveness Electrical changes from large number of synapses (neu- detection is possible by using the brain wave, no additional rons) in the cerebral cortex are accumulated and then sensor or system is needed. Moreover, the brain wave is detected as a brain wave (Electroencephalogram: EEG) generated autonomously and unconsciously; therefore, it on scalp using an electrode. Because of spatiotemporal enables the on-demand authentication. The brain wave is dispersiveness of neurons, there are not distinct patterns the best biometrics on accessibility since it is detectable in the EEG in general. However, when the activity of even if the user has any physical defect. the cerebral cortex becomes low, brain waves partially It has been already studied by other researchers to become synchronous and thereby some distinctive wave use the brain wave as biometrics [8]-[17]. However, it is observed. As such waves, (0.5-3Hz), (4-7Hz), (8- is not clear what applications of authentication using the 13Hz), and (14-30Hz) are well known and detectable brain wave are. Of course, the brain wave is not suitable when human beings are during deep sleep, getting sleepy, for applications based on the one-time-only authentication relaxed with closed eyes, and in some mental activity, such as the room entering management and the passport respectively. In particular, the and/or waves are control since users are required to wear sensors every time applicable for person authentication. they are authenticated. Approaches using visual stimuli are very interesting [12], [17] but they are not applicable in B. Feature Extraction and Verification unconscious authentication. In order to make the authen- Most of the conventional approaches used medical- tication using the brain wave fit for practical use, it is use brain wave sensor systems (electroencephalographs), necessary to argue not only the performance but also the which required users to set a number of electrodes on utilization style. their scalp. It was inconvenience when assuming practical We consider that the brain wave as biometrics is the applications. In addition, such multichannel measurement most suitable for the on-demand authentication as pre- increases the amount of processing data, so that it needs viously mentioned. Users are authenticated on demand heavy computational load. It is also unsuitable for the from a system while using it. Figure 2 shows examples practical use while it could provide higher authentication of the utilization style which assume drivers of a public accuracy. transportation system such as a train, bus, aircraft, ship For removing the burden of wearing the brain wave and so on which involve many human lives, operators of a sensor and reducing the computational load, we use a computer with sensitive information, students in a remote consumer-use brain wave sensor system which has only education system which gives them some academic degree one electrode (single-channel). In addition, we adopt or public qualification, and operators of a military weapon. feature extraction and verification methods as simply as In this paper, assuming an application to driver au- possible. Concretely, dividing − band into several partitions, the difference between a mean value of the power spec- Brain Wave Brain Wave Sensor Sensor trum in tasked condition and that in relaxed condition at each partition are utilized as an individual feature. Figure 3 shows the case of 4 partitions. The reason why the − band is divided is that spectral distribution is not a uniform state and depends on an individual; therefore, each partition has different effects on verification Therefore, to find and utilize distinguishable partitions might be effective for the verification. The block diagram of the proposed verification system Figure 2. Utilization styles of authentication using the brain wave. is described in Fig. 4. In advance of the verification, Enrollment Verification Measurement in Measurement in Mental Measurement in Mental Relaxed Condition Tasked Condition Tasked Condition Brain Wave Brain Wave Brain Wave L times FFT FFT FFT Power Spectrum Power Spectrum Power Spectrum Averaging of L Data Averaging of L Data Average Values in P Bands Averaged Spectrum Averaged Spectrum Average Values Average Values in P Bands in P Bands Template Score Calculation Decision Figure 4. A block diagram of the proposed verification system. score is calculated by Mean Power Spectrum in Relaxed Condition ∑ m ru = ∣∣ − ∣−∣ − ∣∣ (1) ct Mean Power Spectrum in Tasked Condition pe =1 S r Difference between Mean Power Spectra e where is the number of partitions, and are tem- ow P plates in the relaxed and tasked conditions, respectively and is a mean value of each partition in the tasked condition at the verification stage.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    6 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us