Research Article

Combining Cryptography with EEG Biometrics

Algorithm 4

Authentication.
Input: EEG biometric and fuzzy commitment .
(1) Extract EEG code from EEG biometric .
(2) Compute the codeword
(3) Compute
(4) Compute
(5) Check
Output: The user is authenticated or rejected.