Biometric technology has gained immense popularity as an effective solution for enhancing cybersecurity, specifically in countering financial fraud and security threats. EEG-based authentication is unique among biometric authentication methods due to its unparalleled confidentiality and non-replicability. This study explores the feasibility of using motor imagery tasks and rest conditions for human authentication. Ten physically fit subjects, aged between 20 and 28 years, participated voluntarily in the study. The subjects perform imaginary tasks involving their left and right-hand movement. Each task lasted for two minutes, separated by a one-minute break, and EEG data were collected using the EPOC+ device, which features 14-channel electrodes. The sampling frequency was set at 128 Hz. To extract relevant frequency information, Butterworth bandpass filters were employed to extract the alpha (8-13Hz), beta (14-30Hz), and gamma (30-42Hz) frequency bands. Linear features, such as power spectral density (PSD), were obtained using the Welch Method and the Burg Method, while spectral entropy was used to extract non-linear features. Statistical features mean, median, standard deviation, minimum, and maximum were derived from the PSD, and spectral entropy was used as input for the classifiers. Multiple classifiers, including k-nearest neighbor (KNN), support vector machine (SVM), decision tree and Naive Bayes, were employed for the classification task. The Welch method combined with the support vector machine classifier achieved a higher classification accuracy of 96.83% for the beta waves from channels C3, C4, O1, and O2, corresponding to the frontal and occipital lobes. Interestingly, the rest conditions exhibited a higher classification accuracy of 96.83% compared to the motor-imagery tasks, which achieved 96.04%. The utilization of motor imagery tasks and rest conditions, along with the application of advanced classification techniques, holds promise for the development of robust and reliable biometric systems in cybersecurity.
Read full abstract