Review Article

Review on EEG-Based Authentication Technology

Table 3

Shallow classification methods for EEG authentication.

ResearchersTasksFeature extractionClassificationAccuracy (%)

Kong et al. [65]MINode degree of brain networkLDA99.1
DRI mental task99.3

Salem et al. [41]MANHOB-HCI VEPCNNSVM99.99
Seha et al. [52]ListeningCCALDA96.46
Wu et al. [34]FRSVP VEPFisher LDA and logistic regressionHDCA91.46
Koike-Akino et al. [35]ERPPCA and partial least squaresLDA96.70
Brigham et al. [47]Imagined speechARSVM99.76
Jayarathne et al. [66]Listening + VEP + ERPCSPLDA96.97
Keshishzadeh et al. [51]Resting stateARSVM97.43
Thomas et al. [31]Resting stateIndividual alpha frequency (IAF) delta band power (DBP)Cross-correlation values and Mahalanobis distance90
Bashar et al. [42]Resting stateMSD, WPESECOC-SVM94.44
Gui et al. [17]VEPWPDANN90
Pham et al. [46]MIAR, PSDSVDD99.90
Zeynali et al. [67]Mental taskDFT, DWT, ARBN85.97
SVM84.49

Wu et al. [34]RSVPFisher LDAHDCA with genetic algorithm94.26