Table of Contents Author Guidelines Submit a Manuscript
Journal of Sensors
Volume 2016 (2016), Article ID 1831742, 9 pages
http://dx.doi.org/10.1155/2016/1831742
Research Article

Identity Recognition Using Biological Electroencephalogram Sensors

1College of Mathematics and Econometrics, Hunan University, Changsha, Hunan 410082, China
2School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan 411201, China
3Department of Computer Science and Engineering, Lehigh University, Bethlehem, PA 18015, USA

Received 30 June 2016; Accepted 19 September 2016

Academic Editor: Fei Yu

Copyright © 2016 Wei Liang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Abstract

Brain wave signal is a bioelectric phenomenon reflecting activities in human brain. In this paper, we firstly introduce brain wave-based identity recognition techniques and the state-of-the-art work. We then analyze important features of brain wave and present challenges confronted by its applications. Further, we evaluate the security and practicality of using brain wave in identity recognition and anticounterfeiting authentication and describe use cases of several machine learning methods in brain wave signal processing. Afterwards, we survey the critical issues of characteristic extraction, classification, and selection involved in brain wave signal processing. Finally, we propose several brain wave-based identity recognition techniques for further studies and conclude this paper.

1. Introduction

Human biological features include various intrinsic physiological features (e.g., fingerprint) and behavioral features (e.g., signature). The emerging technology of mobile crowd sensing [1] and the recent rise of social bots [2] have added fuels to the research of identity recognition based on human biological features, which is a technique to authenticate human identity by using biosensors, fundamentals of biostatistics, and/or human biological features [36]. Generally, any physiological or behavioral feature can be used in identity recognition systems as long as it meets the following conditions: () universality, that is, every human being has this feature, () uniqueness, that is, different people present this feature differently, () stability, that is, it will not change within a period of time, and () collectability, that is, it can be quantitatively measured.

Traditional identity authentication techniques such as access codes, passwords, or IC (Integrated Circuit) cards may be vulnerable to identity loss, forgery, theft, or compromise since they are separated from human biological features. These techniques are widely used in information system or web environment [7]. However, they have limitations in handling the challenges of forging. For example, one may use forged biological features, such as fingerprint, hand shape, palm print, face, iris, and human ear, to crack such systems [8]. Therefore, more research needs to be done and new approaches should be studied to address this challenge that throttles the development speed of identity recognition systems based on human biological features.

Brain wave is a unique biological feature that is hard to be forged. Recently, researchers attempt to apply brain wave techniques in identity recognition. Brain waves, as general bioelectrical phenomena, are generated by the ever-changing bioelectrical field in the human brain. Electroencephalogram (EEG) records brain waves along the scalp. Stimulations of different external signals will lead to different brain waves. Researchers may record the change of the bioelectric fields by inserting electrode(s) into the brain or using an electrode cap on the scalp to collect EEG data.

In an identity recognition system, as illustrated in Figure 1, there are multiple steps in processing the collected brain wave data, such as preprocessing, characteristic extraction, and validation. The classified characteristics will be matched with the data in a characteristic database. After calculating the posterior probability of each testing sample under an established model of human subjects, one can implement human identity recognition and authentication by using brain waves.

Figure 1: Brain wave-based identity recognition system.

The rest of the paper is organized as follows. Firstly, we introduce the state-of-the-art brain wave-based identity recognition technologies by discussing the features and electrophysiological basics of human brain waves. Then, we describe the fundamentals and processes of collecting, extracting, selecting, and classifying brain wave features. Then we discuss how machine learning methods are applied in brain wave-based identity recognition systems. Finally, we conclude this paper with future work.

2. Electrophysiological Basics of EEG

Human brain is an important part of the central neural system, including cerebrum, cerebellum, and brain stem. Cerebrum is the most complex component with the largest brain volume and highest growth level. The surface of cerebral hemisphere is uneven and full of sulci and gyri. Several deep sulci divide cerebral hemisphere into four regions: the frontal, parietal, temporal, and occipital lobes. There are many small sulci developed across each lobe region, which extend the surface area of cerebral cortex. Different cortical regions control different nerve centers and undertake different tasks. Thus each region of cerebral cortex has its own function. Researchers have standardized the placement of electrodes for collecting and recording brain waves. The international standard of 10–20 scalp electrode placement [9] is shown in Figure 2.

Figure 2: Placement of scalp EEG electrodes.

In different regions of cerebral cortex, the distribution of nerve cells is uneven and they have diverse structures. The potential collected by placing electrodes on scalp is not a reflection of potential variations of a single nerve cell but a synthetic effect of abundant neural activities. Therefore, the recorded brain wave signals of a series of potentials are regarded as an overlap of brain waves of different types generated in different brain regions. Generally, features of the potential series such as frequency, amplitude, and phase are used to describe brain waves. Under different states of brain activity, brain wave features will be different. As shown in Table 1 (five frequency bands of EEG signal), researchers categorize brain waves into multiple types based on their frequencies and locations, respectively, , , , , , and waves.

Table 1: Five frequency bands of EEG signal.

In previous work, researchers have tested different acquisition protocols for human recognition tasks such as relaxation with eye closed, EEG recordings based on visual stimuli, and performing mental tasks.

The blockage of rhythm is related to the ready state of movement. For example, human body movements, imagination, or behavior consciousness has great effects on rhythm. The amplitude of rhythm may be controlled by trained subjects. The use of rhythm for authentication control has received wide attention from researchers. wave of relatively high frequencies is another commonly used wave in research and it is ubiquitous in human brain particularly in central and frontal areas. It is regarded to be closely associated with human thinking activities. For instance, wave can be observed in EEG signals when a person is nervous or excited. wave is generated when a lot of nerve cells carry out an intensive cognitive activity or movement. It has the highest frequency and minimum amplitude among all types of brain waves. Appearance of wave demonstrates that the human brain is performing complex thinking activities or experiencing extreme excitements.

3. State of the Art

At present, research on individual identity recognition using EEG is still in its infancy. Existing studies can be roughly classified into two categories: EEG signal recognition during resting state and evoked EEG signal recognition. An overview of relevant research is illustrated in Figure 3.

Figure 3: Overview of identity recognition based on EEG.
3.1. Evaluation Criteria of EEG-Based Identity Recognition

There are three major criteria for evaluating the performance of EEG-based identity recognition systems.

(1) Classification Accuracy. Classification accuracy is defined as the ratio of the number of accurately classified samples to the number of all samples. It is the most commonly used evaluation criterion to show the system feasibility.

(2) Kappa Value. Kappa value is a quantitative assessment to evaluate statistical consistence of EEG biological features. It takes into account accuracy of sample statistics and accuracy of random classification when samples are random. Moreover, Kappa can also be used to evaluate classification accuracy, robustness, and performance comparison as well. For multiple-category classifications, Kappa is better than classification accuracy. Kappa testing belongs to consistency testing method. It is utilized to test the difference between real consistency rate and random consistency rate. The calculation is described as formula (1). Here, denotes the real consistency rate and is the theoretical consistency.

(3) Rate of Security Recognition. An EEG identity recognition system needs to recognize identity of each individual from brain wave, which entails high classification accuracy. High recognition accuracy is hard to achieve when brain waves have low signal to noise ratio. In this case, complexity of identity recognition algorithm will be improved by adding the number of recognizable tasks. Recognition rate of EEG data is an important index to measure the superiority of EEG identity recognition algorithm.

3.2. Analysis

Approaches proposed in references recognize an individual’s identity by analyzing brain waves in her/his resting state, leveraging features of collected brain waves when the individual is sober and relaxed with eyes closed or open. Reference [10] utilizes principles of Lattice Equivalent Model and Levinson Recursion to generate autoregressive (AR) models with 3–21 orders. Nonlinear analysis is employed to analyze brain waves of forty persons in their resting states with eyes open and with eyes closed. Recognition is conducted using the data collected by one of the electrodes (P4 electrode). The security of recognition system is evaluated according to statistics of forty persons under coefficients of different orders. Bai et al. [11] proposed identifying a person by using the Visual Evoke Potential (VEP) of EEG signals. In this work, several techniques, such as Fisher Discriminant, Recursive Feature Elimination, and Genetic Algorithm, were introduced to reduce the utilized electrodes for less-intrusive user experience. They use a self-collected database of twenty subjects and select the data of 32 electrodes in experiment. The experimental results show that the best identification rate is 97.25% by using a Support Vector Machine classifier. Furthermore, the classification accuracy achieves 85% in experiments. In [12], the authors use variance and density of power spectrum to create characteristic vectors. Data from 23 participants are used in security evaluation. Finally, it achieves the security recognition rate of 79%. After that, Hema et al. [13] proposed an improved scheme. A modality for biometric authentication technique is reported by using brain EEG signals recorded during the performance of three mental tasks to identify six individuals. Using a three-layer feed-forward neural network, they classify brain wave data from six subjects according to thinking activities into four states (Multiplication Task, Reading Task, Spell Task, and Relax Task). Experimental results show that the average security recognition rate reaches 94.4% to 97.5%, significantly improving the performance on security recognition rate. In [14], an individual identity recognition algorithm based on brain waves is devised using a Gaussian mixture model. In the experiment, the subjects need to complete three repeated body tasks with uniform rhythm, including left hand movement, right hand movement, and two-hand movement. Their results have verified that the Gaussian mixture model can remove noise signals such as those related to electromyography and eye movements when the subject is relaxed and thinking. The paper also shows that there are some mental tasks that are more appropriate for person authentication than others.

In the research of evoked brain wave recognition techniques, an approach proposed in [15] recognizes identity using Visual Evoked Potential (VEP). VEP is a bioelectricity activity induced by visual stimulations to the central neural system. It is an electrical signal of cerebral cortex that responded to visual stimulation, which represents the change of bioelectrical behavior after receiving external information. In [16], the authors propose that different VEP signals in time domain will be triggered by showing the subject with self-face and non-self-face. It could be utilized in person recognition. The prototype system is simple and with low recognition rates, indicating a great room for improvement. In [17], the authors conduct experiments based on 3,560 sets of VEP signals from 102 persons. There was a minimum of 10 and a maximum of 50 eye-blink-free VEP signals from each subject. Techniques used for feature classification include the k-Nearest Neighbors (kNN), Elman Neural Network (ENN) classifiers, and 10-fold Cross Validation Classification (CVC). Notably, it reaches the highest recognition accuracy rate of 98.12%. The experiments had clearly indicated the significant potential of brain electrical activity as biometrics. In [18], the authors synthesize individual brain waves of multiple tasks and extract data features in brain waves for identity recognition. This method matches brain waves with those from nine persons in database. The highest recognition rate is 95.6%.

In [19], the authors use Fast Johnson-Lindenstrauss Transform for robust EEG mAR coefficients hashing. The promising results suggest that hashing may open new research directions and applications in the emerging EEG-based biometry area. The authors of [20] adopt VEP signals with frequency of 30–50 Hz and implement identity recognition by matching these signals against those of twenty persons in database. The feature vector utilizes coefficients of AR model and the peak value of power spectral density. Dimensionality reduction of features is performed using Fisher linear discriminate analysis. Finally, the kNN technique is employed to classify the data and the leave-one-out cross validation method is used for accuracy assessment, which leads to a correct classification rate of 100% [21].

4. System Analysis

4.1. EEG Data Collection
4.1.1. Hardware Sensor System for EEG Data Collection

Generally, EEG signal collection methods can be classified into three categories: embedding, semiembedding, and nonembedding [22]. An embedding collection method inserts microelectrode(s) or a microelectrode array into the cerebral cortex and collects electrical activities in aggregation of nerve cells, called Local Field Potentials (LFPs). This method can achieve high precision but may cause damage to nerve cells. In the semiembedding methods, electrodes are placed at the surface of cerebral cortex. Compared with the embedding method it has no damage to nerve cells. But both the embedding and the semiembedding methods are intrusive to the subject’s body. Consequently, both ways usually apply in research on BCI technologies with subjects using animals or human beings with serious brain damage. Nonembedding methods use electrodes placed on the scalp surface and no intrusive operation is necessary. It has no damage to nerve cells and has advantages like usage convenience and device affordability. These advantages make the nonembedding way popular in BCI research. However, the drawbacks of nonembedding methods are obvious as well. For example, electrical signals of nerve cells which are detected at the scalp surface are weak due to signal attenuations across cerebral tissues, endocranium, skull, soft tissues, and so forth. The signals in different encephalic regions are mixed with interference signals, such as electromyography (EMG), electronystagmogram (ENG), and electrocardiogram (ECG). Thus the signal noise ratio of the collected EEG signals decreases, causing difficulty in extracting the useful EEG signals.

4.1.2. Available EEG Data Sets

(i)EEG experiments can be conducted on basis of EEG data set on the website [23, 24]. EEGLAB is an open MATLAB tool box developed by Neural Computing Institute in University of California, San Diego, USA. Users can use independent component analysis or time/spectrum domain analysis in this tool box to analyze EEG signals.(ii)EEG data analysis and modeling center in Thredbo University, Germany, has provided many original EEG benchmarks (http://www.fdm.uni-freiburg.de/EpilepsyData) [25]. The benchmark suit contains many data about dynamic EEG analysis and prediction of epileptics.

4.2. EEG Data Processing

EEG signal processing can be divided into three steps: preprocessing, feature extraction, and classification [26]. Preprocessing is used to reduce noise interference and improve signal noise ratio, which includes band-pass filters, and so forth. The processed signals will be used for feature extraction, which extracts features from EEG signals to reflect intention of subjects. The classifier will classify features signals of EEG.

Original EEG data contains interference signals from sources other than brain activities. Therefore, it is necessary to process original EEG signals for noise reduction and SNR improvement. In different EEG systems, there are various preprocessing algorithms utilized, mostly antinoise filtering and optimal electrode combination.

4.2.1. Antinoise Interference

The procedure of EEG signal collection is easily affected by ocular artifacts, including nonphysiological and physiological interference. The former is interference caused by the environment or equipment, such as power frequency interference, environmental interference, variation of contact resistance between electrode and scalp, and relative slippage. Power frequency interference can be eliminated by 50 Hz trap filter or low-pass filter. Environmental interference may be noise distracting subjects or electromagnetic radiation in space. Moreover, when EEG signals are collected by wet electrodes, conductive paste is required between the electrodes and the scalp to reduce contact resistance, which may change during the experiment. In this case, researchers introduce anti-contact-resistance and anti-ocular-artifact approaches to address this issue. Interference of nonphysiological ocular artifact, including relative slippage caused by head movement, can be controlled by improving experiment methods while the majority of nonphysiological interference can be eliminated by filter technologies [27].

4.2.2. Optimal Electrode Combination

EEG signals are collected by multiple electrodes at different scalp spots of subjects. Each lead data reflects different neural activities [28]. However, not every lead data is helpful in improving the performance of identity recognition system. For example, in a visually evoked EEG experiment, lead data far from the visual cortex cannot be used to recognize identity. In addition, there may exist redundant EEG information among EEG lead data sets. Consequently, researchers utilize electrode selection algorithms for optimal electrode combination to reduce the number of electrodes needed, the preparation time of experiment, the cost of experiment, the EEG data size, and the computational complexity of EEG signal processing [29].

4.3. Applications of Machine Learning in EEG-Based Identity Recognition

As illustrated in Figure 1, after preprocessing EEG signals, for example, by methods described in Section 4.2, EEG feature selection, extraction, and classification are the next steps for EEG-based identity recognition as detailed in Figure 4.

Figure 4: Flow of EEG signal processing.

As shown in Figure 4, the original EEG signals and stego data set are initialized. The features are effectively extracted and classified by using classification algorithms in machine learning. The classified features are matched and analyzed with EEG testing database. Finally, the EEG-based identity authentication is implemented by comparison.

In this section we focus on discussing applications of machine learning methods for EGG-based identity recognition, in the feature signal preprocessing, selection, extraction, and classification, respectively.

4.3.1. EEG Signal Preprocessing

There are large amounts of high dimensional data in collected EEG signals, including noise, expression profile, and wave data. High dimensional data call for higher requirements of hardware storage and classifier selection. Dimension reduction technology can be employed to deal with dimension disaster and improve precision of classification algorithms. It also helps to improve visualization and data compression ratio. Generally, dimension reduction is required to reserve the effective expression of original data. Existing dimension reduction algorithms can be roughly classified into feature selection algorithms and feature extraction (subspace learning) algorithms. The former directly remove unrelated data from the original data, whereas the latter project high dimensional data into low dimensional spaces and fulfill dimension reduction transformation.

In existing EEG dimension reduction methods, data features of spatial samples in linear or nonlinear data set are usually projected in low dimensional spaces. The subset learning algorithms for dimension reduction can be divided into linear algorithms and nonlinear algorithms. The linear subset learning algorithms are based on traditional data optimization methods and the obtained data always have single variation. However, EEG dimension reduction under regularization framework should consider fusion of multiple features. For nonlinear dimension reduction, traditional algorithms mainly focus on study of flow learning. Regular nonlinear dimension reduction technologies usually concentrate on kernel method. In [30], the authors fulfill dimension reduction by using a sparse subset learning method. Orthogonal discriminate information is added into sparse neighborhood preserving projects. It makes the data after dimension reduction keep a similar partial reconfiguration relationship with sparse neighborhood preserving projects. Meanwhile, margin maximization and partial reconfigurable relationship can be utilized to process EEG samples of the same kind.

4.3.2. EEG Feature Extraction

EEG is electrical signal of cerebral cortex responsible for stimulation and is biological activity variation of central nervous system after receiving external information. However, due to the delay from receiving stimulation to generating EEG signal, EEG amplitude and width are different for each person. So the time domain characteristic can be obtained. Since EEG has short duration time, the signal length is insufficient to evaluate frequency features.

EEG features extraction is among the key issues in identity recognition systems. Through measurements or computations, the objects to be recognized or classified usually yield many original features. In this situation, samples require a procedure of high dimensional spatial feature extraction. In other words, samples will be expressed in low dimensional spaces via projections. During this procedure, the most effective similar features will be extracted from original EEG features. Since features of different categories are usually different from each other, the noise elimination and dimensionality reduction technologies can be studied according to EEG features in time and frequency domains, as well as their application conditions. After eliminating noise, EEG signals record the amplitudes during a period, which cannot be used in identity recognition. In this scenario, it is necessary to classify and transform the time domain signals in order to obtain stable and unique features, autoregressive model coefficients, and power spectral density. These are common features of EEG identity recognition systems.

Another scenario is to mine the high-pass data of EEG signals. Previous feature selection algorithms mainly employ statistical approaches and boundary information. Reference [31] proposes selecting features by using sparse norm and demonstrates the rotation invariance of norm. Authors in [32] propose a generalized assistant function method to solve structural sparsity. This method greatly improves the efficiency of solving the structural sparsity problem, via taking advantage of parallelization. Authors in [33] exploit both global structure and partial structure of data in feature selection. It demonstrates that this way can improve recognition effects in supervised or unsupervised model size recognition. Reference [34] indicates that the recognition performance based on both partial boundary structure and global boundary structure is encouraging. However, the simulation parameters of the partial structure are required to be set manually. Results in [35] demonstrate that the 2 : 1 feature subset based on structural sparse norm has low redundancy.

In EEG feature selection, the high-efficient feature selection algorithms can be taken into consideration. An available method is to combine multiobjective regression and graph embedding using a uniform optimization model. This method is suitable for EEG feature selection, since constraints of structural sparse norm are added. The method is different from other methods and has two advantages: () it considers the features of global boundary information and partial structure of the EEG feature data when selecting EEG feature subset. Thus, the global structure and partial structure can be effectively maintained in EEG feature selection. Consequently, feature matching can be completed efficiently in EEG identity recognition. () The mutual interactions between data features are considered in the procedure of reducing dimension of EEG features. Thus, the reduction of processing efficiency caused by greedy methods is avoided. A batching method can be introduced for EEG features, in order to improve the processing speed and decrease the time complexity.

4.3.3. EEG Feature Selection

Feature selection is to select a group of distinguishing characteristic subsets from the original feature collection according to some optimization measurement(s). Usually, EEG data has multifeatures. The purpose of feature selection is to find the most effective features from the feature set of original EEG. The features in different classifications may also be aggregated using clustering methods. For example, with the extensive study on EEG feature data, authors of [36] consider the correlation between feature and response and the redundancy between features. A selection criterion algorithm based on the correlation and redundancy is proposed, which maximizes the correlation between feature subset and response.

4.3.4. EEG Classification

The design of classifier is a hot topic in EEG data processing and applications [3740]. Traditional methods for EEG classifier design face the challenge caused by high dimension of EEG data sets, thus the classification result may have large deviations. Small sample size problem of EEG could lead to the overfitting phenomenon, which limits the application of traditional classifier. To address this issue, [41] has designed a no-argument sparse expression classifier by using a regularization method. This classifier has good robustness and does not need to set sparsity parameters manually. In EEG collection for different individuals, researchers can design effective crossing verification methods according to different sparsity parameters and select the optimal parameter model to address the small sample problem.

Authors of [42] have classified data features in database of epilepsy patients with brain disease. A classification method is proposed to distinguish normal and abnormal (epilepsy) EEG. Data mining of epilepsy EEG and complex signal processing are fulfilled by using theories such as chaos, the nearest neighbor, and systematic statistic time analysis. Results indicate that the proposed method can correctly classify normal and abnormal EEG data with sensitivity of 81.29% and specificity of 72.86%. As shown in Figure 5, the KNN method is employed to query in test point area of training data. Unknown test point will be marked red when . In this case, we can see “trained” data collection test points. Optimal positions of test points can be found quickly. Furthermore, the performance of EEG classification can also be greatly improved.

Figure 5: kNN query starts at the test point and grows a spherical region until it encloses training samples, and it labels the test point by a majority voting of these samples. In this case, where , the test point would be labeled by the category of the red points.
4.3.5. Discussion

EEG signals belong to biometric modality, which may be affected by multiple factors. It is not enough for the alone metric such as accuracy rate to represent the performance. In order to address these biological problems of EEG, an optimization model can be established for EEG identity recognition. Studies on this problem have developed several models. The models and their optimization not only can provide theoretical evidence for data processing in EEG identity recognition but also can offer a good practical reference for detection departments that engage in identity recognition for living bodies. In the research of EEG classification method, the high-pass technology makes the collection of EEG samples become easier. However, in practical sample analysis and application, low correlation and flexibility still exist in sample data. The reasons lie in two aspects. On one hand, deviations of techniques, hardware, and software reduce reliability of disease data, thus greatly impairing the correlation of EEG data. On the other hand, biochemical experiments are usually expensive; thus only a small number of samples are used for mark. This issue raises a higher requirement for EEG data selection. Consequently, it becomes a key issue to select typical EEG samples for sample label design. A mathematical model for EEG sample selection is proposed.

Let denote the characteristic function model of EEG, denote a sample dataset, and and , respectively, denote the number of samples and the characteristic dimension; a mathematical model for the original problem can be established as follows:where , , , and . is a linear combination coefficient vector. The optimization model (2) has introduced a slack variable . The features of norm make vectors and sparse. Otherwise, the optimization process will fail.

As indicated in this model, (2) is a convex optimization problem. An alternative and iterative method can be employed to address this problem. The method, however, cannot be directly applied to feature dimension reduction of EEG due to its low convergence rate. In this regard, in order to improve the scaling ability of the original model, an assistant function should be found and further optimized to avoid excessive computation of gradient information.

5. Conclusions and Prospects

As understanding of the uniqueness of EEG signals increases, EEG is applied to more and more fields. It can not only realize anticounterfeiting and bioassay but also overcome the security issue of traditional biometric-based identity recognition. In this paper, we have highlighted the following perspectives. () Concerning EEG processing, we have reviewed a number of EEG preprocessing techniques and identified the limitation of existing methods. We have also discussed how to maximize the preservation of EEG characteristics when removing noises such as EMG and EOG. () Concerning feature selection and extraction, various common features of EEG are reported. We have also elaborated the advantages of supervised and unsupervised selection methods in dimension reduction of EEG data features. () We have placed an emphasis on the description of the design of various classifiers for EEG. Machine learning for EEG identity recognition systems is discussed as well. In summary, identity recognition based on EEG is still in its infancy and there is much work to be done in this area. Though various algorithms have been proposed, there is still significant room for improvement in both theory and practice, so as to meet the performance and cost requirements of person authentication using EEG under different states or from different devices.

Competing Interests

The authors declare that they have no competing interests.

Acknowledgments

This work is supported by the National Science Foundation of China (Grant 61572188), Hunan Provincial Natural Science Foundation of China (Grant 2016jj2058), the China Postdoctoral Science Foundation funded project (Grant 140778), Scientific Research Project of Hunan University of Science and Technology (E51697), and Scientific Research Fund of Hunan Provincial Education Department (Grants 14A047 and 10C0689).

References

  1. B. Guo, Z. Wang, Z. Yu et al., “Mobile crowd sensing and computing: the review of an emerging human-powered sensing paradigm,” ACM Computing Surveys, vol. 48, no. 1, article 7, 2015. View at Publisher · View at Google Scholar · View at Scopus
  2. E. Ferrara, O. Varol, C. Davis, F. Menczer, and A. Flammini, “The rise of social bots,” Communications of the ACM, vol. 59, no. 7, pp. 96–104, 2016. View at Publisher · View at Google Scholar
  3. K. A. Nixon, V. Aimale, and R. K. Rowe, “Spoof detection schemes,” in Handbook of Biometrics, pp. 403–423, Springer, Berlin, Germany, 2008. View at Google Scholar
  4. T. Matsumoto, H. Matsumoto, K. Yamada, and S. Hoshino, “Impact of artificial gummy fingers on fingerprint systems,” in Proceedings of the Optical Security and Counterfeit Deterrence Techniques IV, vol. 4677 of Proceedings of SPIE, pp. 275–289, Seoul, South Korea, May 2002.
  5. B. Y. Hiew, A. B. J. Teoh, and O. S. Yin, “A secure digital camera based fingerprint verification system,” Journal of Visual Communication and Image Representation, vol. 21, no. 3, pp. 219–231, 2010. View at Publisher · View at Google Scholar · View at Scopus
  6. L. Zhang, L. Zhang, D. Zhang, and H. Zhu, “Online finger-knuckle-print verification for personal authentication,” Pattern Recognition, vol. 43, no. 7, pp. 2560–2571, 2010. View at Publisher · View at Google Scholar · View at Scopus
  7. S.-G. Wang, Q.-B. Sun, and F.-C. Yang, “Web service dynamic selection by the decomposition of global QoS constraints,” Ruan Jian Xue Bao/Journal of Software, vol. 22, no. 7, pp. 1426–1439, 2011. View at Publisher · View at Google Scholar · View at Scopus
  8. P. Kumari and A. Vaish, “Brainwave based authentication system: research issues and challenges,” International Journal of Computer Engineering and Applications, vol. 4, no. I, pp. 89–108, 2014. View at Publisher · View at Google Scholar
  9. R. W. Homan, “The 10–20 electrode system and cerebral location,” American Journal of EEG Technology, vol. 28, no. 4, pp. 269–279, 1988. View at Google Scholar · View at Scopus
  10. R. B. Paranjape, J. Mahovsky, L. Benedicenti, and Z. Koles', “The electroencephalogramas a biometric,” in Proceedings of the Canadian Conference on Electrical and Computer Engineering, Toronto, Canada, May 2001.
  11. Y. Bai, Z. Zhang, and D. Ming, “Feature selection and channel optimization for biometric identification based on visual evoked potentials,” in Proceedings of the 2014 19th International Conference on Digital Signal Processing (DSP '14), pp. 772–776, Hong Kong, August 2014. View at Publisher · View at Google Scholar · View at Scopus
  12. C. Miyamoto, S. Baba, and I. Nakanishi, “Biometric person authentication using new spectral features of electroencephalogram (EEG),” in Proceedings of the International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS '08), pp. 1–4, February 2009. View at Publisher · View at Google Scholar · View at Scopus
  13. C. R. Hema, M. P. Paulraj, and H. Kaur, “Brain signatures: a modality for biometric authentication,” in Proceedings of the International Conference on Electronic Design (ICED '08), pp. 1–3, Penang, Malaysia, December 2008. View at Publisher · View at Google Scholar · View at Scopus
  14. S. Marcel and J. D. R. Millán, “Person authentication using brainwaves (EEG) and maximum a posteriori model adaptation,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 29, no. 4, pp. 743–752, 2007. View at Publisher · View at Google Scholar · View at Scopus
  15. S.-H. Liew, Y.-H. Choo, Y. F. Low, and Z. I. Mohd Yusoh, “Identifying Visual Evoked Potential (VEP) electrodes setting for person authentication,” International Journal of Advances in Soft Computing and Its Applications, vol. 7, no. 3, pp. 85–99, 2015. View at Google Scholar · View at Scopus
  16. R. Palaniappan and D. P. Mandic, “EEG based biometric framework for automatic identity verification,” Journal of VLSI Signal Processing Systems for Signal, Image, and Video Technology, vol. 49, no. 2, pp. 243–250, 2007. View at Publisher · View at Google Scholar · View at Scopus
  17. R. Palaniappan and D. P. Mandic, “Biometrics from brain electrical activity: a machine learning approach,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 29, no. 4, pp. 738–742, 2007. View at Publisher · View at Google Scholar · View at Scopus
  18. S. Sun, “Multitask learning for EEG-based biometrics,” in Proceedings of the 19th International Conference on Pattern Recognition (ICPR '08), pp. 1–4, December 2008. View at Scopus
  19. C. He, X. Lv, and Z. J. Wang, “Hashing the mAR coefficients from EEG data for person authentication,” in Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '09), pp. 1445–1448, Taipei, Taiwan, April 2009. View at Publisher · View at Google Scholar · View at Scopus
  20. R. Palaniappan, “Method of identifying individuals using VEP signals and neural network,” IEE Proceedings: Science, Measurement and Technology, vol. 151, no. 1, pp. 16–20, 2004. View at Publisher · View at Google Scholar · View at Scopus
  21. A. Yazdani, A. Roodaki, S. H. Rezatofighi, K. Misaghian, and S. K. Setarehdan, “Fisher linear discriminant based person identification using visual evoked potentials,” in Proceedings of the 2008 9th International Conference on Signal Processing (ICSP '08), pp. 1677–1680, Beijing, China, October 2008. View at Publisher · View at Google Scholar · View at Scopus
  22. M. T. Arun, R. Am, K. Umar, and M. S. Owjanya, “Human Brain Signals (EEG) based experimental authentication for secured devices,” International Journal of Scientific Engineering and Technology Research, vol. 3, no. 27, pp. 5557–5560, 2014. View at Google Scholar
  23. “UCI Machine Learning Repository: EEG Database Data Set,” https://archive.ics.uci.edu/ml/datasets/EEG+Database
  24. http://www.mathworks.com/products/matlab
  25. “European Epilepsy Database,” http://epilepsy-database.eu/
  26. R. B. Paranjape, J. Mahovsky, L. Benedicenti et al., “The electroencephalogram as a biometric,” Proceedings of the IEEE Canadian Conference on Electrical and Computer Engineering, vol. 2, pp. 1363–1366, 2001. View at Google Scholar
  27. R. Palaniappan, “A new method to identify individuals using signals from the brain,” in Proceedings of the Joint Conference of the 4th International Conference on Information, Communications and Signal Processing, and 4th Pacific Rim Conference on Multimedia, pp. 1442–1445, Singapore, December 2003.
  28. R. Palaniappan, “Recognizing individuals using their brain patterns,” in Proceedings of the 3rd International Conference on Information Technology and Applications (ICITA '05), vol. 2, pp. 520–523, Sydney, Australia, 2005.
  29. R. Palaniappan and P. Raveendran, “Individual identification technique using visual evoked potential signals,” Electronics Letters, vol. 38, no. 25, pp. 1634–1635, 2002. View at Publisher · View at Google Scholar · View at Scopus
  30. L. Scrucca, “A geometric approach to subset selection and sparse sufficient dimension reduction,” in New Perspectives in Statistical Modeling and Data Analysis, S. Ingrassia, R. Rocci, and M. Vichi, Eds., pp. 569–576, Springer, Berlin, Germany, 2011. View at Google Scholar
  31. L. Du, Z. Shen, X. Li, P. Zhou, and Y.-D. Shen, “Local and global discriminative learning for unsupervised feature selection,” in Proceedings of the 13th IEEE International Conference on Data Mining (ICDM '13), pp. 131–140, Dallas, Tex, USA, December 2013. View at Publisher · View at Google Scholar · View at Scopus
  32. D. Cai, C. Zhang, and X. He, “Unsupervised feature selection for multi-cluster data,” in Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 333–342, ACM, Washington, DC, USA, July 2010.
  33. S. Gao, I. W.-H. Tsang, L.-T. Chia, and P. Zhao, “Local features are not lonely—Laplacian sparse coding for image classification,” in Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR '10), pp. 3555–3561, June 2010. View at Publisher · View at Google Scholar · View at Scopus
  34. D. Kong and C. Ding, “Efficient algorithms for selecting features with arbitrary group constraints via group lasso,” in Proceedings of the 13th IEEE International Conference on Data Mining (ICDM '13), pp. 379–388, Dallas, Tex, USA, December 2013. View at Publisher · View at Google Scholar · View at Scopus
  35. C. Hou, F. Nie, D. Yi et al., “Feature selection via joint embedding learning and sparse regression,” in Proceedings of the 22nd International Joint Conference on Artificial Intelligence (IJCAI '11), vol. 22, pp. 13–24, 2011. View at Publisher · View at Google Scholar
  36. Y. Sun, S. Todorovic, and S. Goodison, “Local-learning-based feature selection for high-dimensional data analysis,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 32, no. 9, pp. 1610–1626, 2010. View at Publisher · View at Google Scholar · View at Scopus
  37. S.-H. Liew, Y.-H. Choo, and Y. F. Low, “Fuzzy-rough nearest neighbor classifier for person authentication using EEG signals,” in Proceedings of the 2013 International Conference on Fuzzy Theory and Its Applications (iFUZZY '13), pp. 316–321, Taipei, Taiwan, December 2013. View at Publisher · View at Google Scholar · View at Scopus
  38. B. W. Heumann, “An object-based classification of mangroves using a hybrid decision tree-support vector machine approach,” Remote Sensing, vol. 3, no. 11, pp. 2440–2460, 2011. View at Publisher · View at Google Scholar · View at Scopus
  39. K. Baskar, R. Kathirvel, and J. Sundararajan, “A novel classifier algorithm for EEG signal based person authentication from Cz channel with 2D-wavelet compression for the online voting system using touch panel,” Australian Journal of Basic and Applied Sciences, vol. 8, no. 5, pp. 399–409, 2014. View at Google Scholar
  40. M. Poulos, M. Rangoussi, N. Alexandris, and A. Evangelou, “Person identification from the EEG using nonlinear signal classification,” Methods of Information in Medicine, vol. 41, no. 1, pp. 64–75, 2002. View at Google Scholar · View at Scopus
  41. B. Liao, Y. Jiang, G. Yuan, W. Zhu, L. Cai, and Z. Cao, “Learning a weighted meta-sample based parameter free sparse representation classification for microarray data,” PLoS ONE, vol. 9, no. 8, Article ID e104314, 2014. View at Publisher · View at Google Scholar · View at Scopus
  42. W. A. Chaovalitwongse, Y.-J. Fan, and R. C. Sachdeo, “On the time series K-nearest neighbor classification of abnormal brain activity,” IEEE Transactions on Systems, Man, and Cybernetics Part A:Systems and Humans, vol. 37, no. 6, pp. 1005–1016, 2007. View at Publisher · View at Google Scholar · View at Scopus