EEG Authentication System Based on One- and Multi-Class Machine Learning Classifiers
<p>Measure map of Emotiv Epoc+ Headset [<a href="#B41-sensors-23-00186" class="html-bibr">41</a>].</p> "> Figure 2
<p>ROC Curves of the 39 users (colored lines) with 672 features for SVM (<b>a</b>) and RF (<b>b</b>).</p> "> Figure 3
<p>ROC Curves of the 39 users (colored lines) for configuration III.</p> ">
Abstract
:1. Introduction
2. Article Contribution
- Solve the user authentication problem with IF and LOF, OC classifiers that have not been explored before for this application, increasing the literature authentication performance. We compared their results with OC–Support Vector Machine (OC–SVM) and, regarding MC classifiers, SVM, Random Forest (RF), and K-Nearest Neighbors (KNN). We have selected these models because they are well-known, classical ML models that have been shown to be useful in the user authentication application [7]. Moreover, as it will be exposed later, for each one of the MC models there is an equivalent OC model, which means that they have similar ways of working;
- Identify how the security and usability of the systems can be improved by modifying the parameters of the classifiers. As far as we know, this is the first work that presents this analysis regarding OC classifiers for EEG signals;
- Analyze the contribution to the authentication process of each channel and brain wave. We will reduce the dimensionality of the problem by selecting the most important channels and brain waves, and compare this dimensionality reduction methodology with Principal Component Analysis (PCA) and the statistical test [16];
- Construct a hybrid system that combines a OC and a MC model. In this sense, by using first an OC model, we will still be in a realistic scenario in which only the data of the legitimate user are needed, and then train a MC model by using the outputs of the OC model to improve the original results;
- The publication of the used scripts so that the experiments can be replicated with different databases (Script available at: https://github.com/luishalvarez/EEG-Authentication).
3. Related Work
3.1. Multi-Class EEG User Authentication
3.2. One-Class EEG User Authentication
3.3. IF and LOF with EEG Data
4. Data Preparation
4.1. Data Acquisition
4.2. Data Preprocessing
- We divided the EEG signal of each channel and user in smaller signals of 240 ms. In other words, each is separated in smaller signals, of 240 ms each. These smaller signals represent different samples of the same subject i. We chose 240 ms as time interval for two reasons: (1) it was viable to extract the frequency content (i.e., the brainwaves) we are interested in, and (2) a sufficient number of samples for each user were obtained. Since signals of different users had a different duration, the number of smaller signals j is different for each user (from here the notation ), and it goes from 1 to , where is the total number of smaller signals for the user i.
- Then, we computed the wavelet decomposition of each for , , and . Specifically, we employed a five-level wavelet decomposition using the order 2 Daubechies wavelet with Matlab, version R2021b. From this decomposition, we acquired the wavelet coefficients D1, D2, D3, D4, D5, and A5 as real-valued vectors. In Table 1, the frequency content and the corresponding brain wave of each coefficient are reported.We decided to use the wavelet decomposition for several reasons: (i) the implementation of the Fast Wavelet Transform is computationally fast, (ii) it offers a simultaneous signal feature localization in time and frequency domain, (iii) it is able to identify details of small parts of the signal, better than its general characteristics, and (iv) it has been shown to be suitable to an AI model with EEG data [25].
- Finally, for each wavelet coefficient vector D1, D2, D3, D4, D5, and A5 in each , we calculated the following eight metrics [25]: maximum, minimum, mean, standard deviation, variance, skewness, Shannon entropy, and average power.
5. Methodology
5.1. Authentication Strategy
- Multi-Class classifiers: they need both positive (from the legitimate user) and negative (from an impostor) samples to be trained. In our case, the positive samples of the train set are the 80% of the total samples of the legitimate user, and the remaining 20% is used for testing. In addition, 15% of the train set represents the validation set. The negatives samples are randomly selected from the other 38 subjects for all sets, and the proportion of positive and negative samples in each set is defined as 50%.
- One-Class classifiers: in this case, the train set consists of 80% of the total samples of the legitimate user, as these models only need positive samples. The test set is composed of the remaining 20% (positive samples), and the same number of negative samples, randomly selected from the other 38 users.
5.2. Classifiers and Dimensionality Reduction
5.3. Threat Model
- Random or substitution attack: an adversary uses his own EEG signal to be (incorrectly) authenticated. As described, our models are tested by using positive and negative samples. Therefore, we are already considering and overcoming this attack.
- Skilled forgery attack: an adversary tries to reproduce the user’s EEG signal as closely as possible to be (incorrectly) authenticated. The execution of this attack is more evident with authentication systems based on gestures; the attacker tries to reproduce the legit user’s movement. However, EEG signals cannot be imitated so easily. Consequently, we think that the best approximation for this attack is to train a Generative Adversarial Network (GAN) that generates similar EEG signals to the real user. Despite this attack not being addressed in the presented work, it is our objective to work on it shortly.
5.4. Results Acquisition
- Firstly, we carry out some baseline results with the MC and OC algorithms and compare their performance using the whole set of features (Section 6.1);
- Then, we compare the baseline results with the outcomes after applying the dimensionality reduction procedures PCA and , decreasing the dimensions to 32 and 64 in both cases (Section 6.2);
- Next, the contribution of each channel and brainwave is evaluated by solving the authentication problem with just the data of each channel/brainwave (Section 6.3);
- After that, we evaluate the effect of the and “contamination” parameter in the OC classifiers in order to obtain more secure/usable authentication systems (Section 6.4);
- Finally, taking into account the obtained results, we explore the most promising combinations of OC and MC classifiers using the data with greater contribution in the authentication problem (Section 6.5).
6. Results
6.1. Baseline OC and MC—All Features
6.2. Dimensionality Reduction
6.3. Channel and Wave Comparison
6.4. Effect of Contamination
6.5. OC and MC Combination
7. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
Abbreviations
AI | Artificial Intelligence |
ANN | Artificial Neural Network |
AUC | Area Under the Curve |
BCI | Brain Computer Interface |
CA | Continuous Authentication |
CNN | Convolutional Neural Network |
DL | Deep Learning |
EEE | Electroencephalogram |
EER | Equal Error Rate |
FPR | False Positive Rate |
GMM | Gaussian Mixture Model |
GSR | Galvanic Skin Response |
HMM | Hidden Markov Model |
IF | Isolation Forest |
KNN | K-Nearest Neighbors |
LOF | Local Outlier Factor |
MC | Multi-Class |
ML | Machine Learning |
MLP | Multilayer Perceptron |
OC | One-Class |
PCA | Principal Component Analysis |
RF | Random Forest |
ROC | Receiver Operating Characteristic |
SVDD | Support Vector Data Description |
SVM | Support Vector Machine |
TPR | True Positive Rate |
References
- Hastie, T.; Tibshirani, R.; Friedman, J. The Elements of Statistical Learning; Springer: Berlin/Heidelberg, Germany, 2009. [Google Scholar] [CrossRef]
- Obaidat, M.; Trore, I.; Wougang, I. Biometric-Based Physical and Cybersecurity Systems; Springer: Berlin/Heidelberg, Germany, 2019. [Google Scholar]
- Hernández-Álvarez, L.; De Fuentes, J.M.; González-Manzano, L.; Hernández Encinas, L. Privacy-Preserving Sensor-Based Continuous Authentication and User Profiling: A Review. Sensors 2021, 21, 92. [Google Scholar] [CrossRef] [PubMed]
- Bishop, C.M. Pattern Recognition and Machine Learning; Springer: Berlin/Heidelberg, Germany, 2006; Available online: https://www.springer.com/gp/book/9780387310732 (accessed on 13 September 2022).
- Murphy, K. Machine Learning: A Probabilistic Perspective; The MIT Press: Cambridge, MA, USA, 2012. [Google Scholar]
- Goodfellow, I.; Bengio, Y.; Courville, A. Deep Learning; The MIT Press: Cambridge, MA, USA, 2016. [Google Scholar]
- Hernández-Álvarez, L.; De Fuentes, J.M.; González-Manzano, L.; Hernández Encinas, L. SmartCAMPP-Smartphone-based continuous authentication leveraging motion sensors with privacy preservation. Pattern Recognit. Lett. 2021, 147, 189–196. [Google Scholar] [CrossRef]
- Li, Y.; Zou, B.; Deng, S.; Zhou, G. Using Feature Fusion Strategies in Continuous Authentication on Smartphones. IEEE Internet Comput. 2020, 24, 49–56. [Google Scholar] [CrossRef]
- Kudinov, A.; Elsakov, S. Improved Continuous Authentication System with Counterfeit Protection. J. Comput. Eng. Math. 2019, 6, 35–47. [Google Scholar] [CrossRef] [Green Version]
- de Freitas Pereira, T.; Marcel, S. Periocular biometrics in mobile environment. In Proceedings of the 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS), Arlington, VA, USA, 8–11 September 2015; pp. 1–7. [Google Scholar] [CrossRef]
- Shreyas, K.K.; Rajeev, S.; Panetta, K.; Agaian, S.S. Fingerprint authentication using geometric features. In Proceedings of the 2017 IEEE International Symposium on Technologies for Homeland Security (HST), Boston, MA, USA, 25–26 April 2017; pp. 1–7. [Google Scholar] [CrossRef]
- Vaish, A.; Sharma, P.K. Individual Identification based on Neuro-signal using Motor Movement and Imaginary Cognitive Process. Opt.-Int. J. Light Electron Opt. 2015, 127, 2143–2148. [Google Scholar] [CrossRef]
- Camara, C.; Peris-Lopez, P.; Safkhani, M.; Bagheri, N. ECGsound for human identification. Biomed. Signal Process. Control 2022, 72, 103335. [Google Scholar] [CrossRef]
- Smit, D.; Posthuma, D.; Boomsma, D.; Geus, E. Heritability of background EEG across the power spectrum. Psychophysiology 2005, 42, 691–697. [Google Scholar] [CrossRef]
- Jalaly Bidgoly, A.; Jalaly, H.; Arezoumand, Z. A Survey on Methods and Challenges in EEG Based Authentication. Comput. Secur. 2020, 93, 1–16. [Google Scholar] [CrossRef]
- Pal, B.; Zaman, S.; Hasan, A.; Hasan, A.M.; Mahmud, F. Chi-Square Statistic and Principal Component Analysis Based Compressed Feature Selection Approach for Naïve Bayesian Classifier. J. Artif. Intell. Res. Adv. 2015, 2, 16–23. [Google Scholar]
- Casson, A.; Abdulaal, M.; Dulabh, M.; Kohli, S.; Krachunov, S.; Trimble, E. Electroencephalogram. In Seamless Healthcare Monitoring; Springer: Berlin/Heidelberg, Germany, 2018; pp. 45–81. [Google Scholar] [CrossRef]
- Waili, T.; Md Johar, M.G.; Sidek, K.; Nor, N.; Yaacob, H.; Othman, M. EEG Based Biometric Identification Using Correlation and MLPNN Models. Int. J. Online Biomed. Eng. 2019, 15, 77–90. [Google Scholar] [CrossRef] [Green Version]
- Gui, Q.; Jin, Z.; Xu, W. Exploring EEG-based biometrics for user identification and authentication. In Proceedings of the 2014 IEEE Signal Processing in Medicine and Biology Symposium (SPMB), Philadelphia, PA, USA, 13 December 2014; pp. 1–6. [Google Scholar] [CrossRef]
- Kaur, B.; Singh, D.; Roy, P. A Novel framework of EEG-based user identification by analyzing music-listening behavior. Multimed. Tools Appl. 2017, 76, 25581–25602. [Google Scholar] [CrossRef]
- Wu, Q.; Zeng, Y.; Zhang, C.; Tong, l.; Yan, B. An EEG-Based Person Authentication System with Open-Set Capability Combining Eye Blinking Signals. Sensors 2018, 18, 335. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Schons, T.; Moreira, G.; Silva, P.; Coelho, V.; Luz, E. Convolutional Network for EEG-Based Biometric. In Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications; Springer: Cham, Switzerland, 2018; pp. 601–608. [Google Scholar] [CrossRef]
- Bidgoly, A.; Bidgoly, H.; Arezoumand, Z. Towards a universal and privacy preserving EEG-based authentication system. Scientific Reports 2022, 21, 1–12. [Google Scholar] [CrossRef] [PubMed]
- Valsaraj, A.; Madala, I.; Garg, N.; Patil, M.; Baths, V. Motor Imagery Based Multimodal Biometric User Authentication System Using EEG. In Proceedings of the 2020 International Conference on Cyberworlds (CW), Caen, France, 29 September–1 October 2020; pp. 272–279. [Google Scholar] [CrossRef]
- Kumar Nitendra, A.K.; Siddiqi, A.H. Wavelet Transform for Classification of EEG Signal using SVM and ANN. Biomed. Pharmacol. 2017, 10, 1–9. [Google Scholar] [CrossRef]
- Di, Y.; An, X.; He, F.; Liu, S.; Ke, Y.; Ming, D. Robustness Analysis of Identification Using Resting-State EEG Signals. IEEE Access 2019, 7, 42113–42122. [Google Scholar] [CrossRef]
- Sodhro, A.H.; Sennersten, C.; Ahmad, A. Towards Cognitive Authentication for Smart Healthcare Applications. Sensors 2022, 22, 2101. [Google Scholar] [CrossRef]
- Lai, C.; Ibrahim, H.; Abdullah, M.; Suandi, S. EEG-Based Biometric Close-Set Identification Using CNN-ECOC-SVM. In Proceedings of the International Conference on Artificial Intelligence and Big Data in Digital Era, Ho Chi Minh, Vietnam, 18–19 December 2021; pp. 723–732. [Google Scholar]
- Zuquete, A.; Quintela, B.; Cunha, J.P. Biometric Authentication using Brain Responses to Visual Stimuli. In Proceedings of the Third International Conference on Bio-inspired Systems and Signal Processing, Biosignals, Valencia, Spain, 20–23 January 2010; pp. 103–112. [Google Scholar]
- Gupta, E.; Agarwal, M.; Sivakumar, R. Blink to Get In: Biometric Authentication for Mobile Devices using EEG Signals. In Proceedings of the ICC 2020—2020 IEEE International Conference on Communications (ICC), Dublin, Ireland, 7–11 June 2020; IEEE: Piscataway, NJ, USA, 2020; pp. 1–6. [Google Scholar] [CrossRef]
- Moctezuma, L.; Molinas, M. Multi-objective optimization for EEG channel selection and accurate intruder detection in an EEG-based subject identification system. Sci. Rep. 2020, 10, 5850. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Haga, J. Biometric System Using EEG Signals from Resting–State and One–Class Classifiers. Ph.D. Thesis, Norwegian University of Science and Technology, Trondheim, Norway, 2020. [Google Scholar]
- Nishimoto, T.; Higashi, H.; Morioka, H.; Ishii, S. EEG-based personal identification method using unsupervised feature extraction and its robustness against intra-subject variability. J. Neural Eng. 2020, 17, 026007. [Google Scholar] [CrossRef]
- Guo, Y.; Jiang, X.; Tao, L.; Mengc, L.; Dai, C.; Long, X.; Wan, F.; Zhang, Y.; Van Dijk, J.; Aarts, R.M.; et al. Epileptic Seizure Detection by Cascading Isolation Forest-based Anomaly Screening and EasyEnsemble. IEEE Trans. Neural Syst. Rehabil. Eng. 2022, 30, 915–924. [Google Scholar] [CrossRef] [PubMed]
- Rabcan, J.; Levashenko, V.; Zaitseva, E.; Kvassay, M. Review of Methods for EEG Signal Classification and Development of New Fuzzy Classification-Based Approach. IEEE Access 2020, 8, 189720–189734. [Google Scholar] [CrossRef]
- Ketu, S.; Mishra, P. Hybrid classification model for eye state detection using electroencephalogram signals. Cogn. Neurodynamics 2022, 16, 73–90. [Google Scholar] [CrossRef] [PubMed]
- Kumaravel, V.; Farella, E.; Parise, E.; Buiatti, M. NEAR: An artifact removal pipeline for human newborn EEG data. Dev. Cogn. Neurosci. 2022, 54, 1–14. [Google Scholar] [CrossRef] [PubMed]
- Saba-Sadiya, S.; Chantland, E.; Alhanai, T.; Liu, T.; Ghassemi, M. Unsupervised EEG Artifact Detection and Correction. Front. Digit. Health 2021, 2, 608920. [Google Scholar] [CrossRef] [PubMed]
- Chakravarthy, S.; Rajaguru, H. Effectivebreast Tumor Classification using K–Strongest Strength With Local Outlier Factor Algorithm. Int. J. Aquat. Sci. 2021, 12, 1596–1603. [Google Scholar]
- Arnau-González, P.; Katsigiannis, S.; Arevalillo-Herráez, M.; Ramzan, N. BED: A New Data Set for EEG-Based Biometrics. IEEE Internet Things J. 2021, 8, 12219–12230. [Google Scholar] [CrossRef]
- Epoc+, E. Epoc+ User Manual. 2022. Available online: https://emotiv.gitbook.io/epoc-user-manual/ (accessed on 9 May 2022).
- Schölkopf, R.; Williamson, A.; Smola, J.; Platt, J. Support vector method for novelty detection. In Advances in Neural Information Processing Systems; MIT Press: Cambridge, MA, USA, 2000; pp. 582–588. [Google Scholar] [CrossRef]
- Khan, S.; Madden, M. One-Class Classification: Taxonomy of Study and Review of Techniques. Knowl. Eng. Rev. 2014, 29, 345–374. [Google Scholar] [CrossRef] [Green Version]
- Liu, F.T.; Ting, K.; Zhou, Z.H. Isolation Forest. In Proceedings of the 2008 Eighth IEEE International Conference on Data Mining, Pisa, Italy, 15–19 December 2008; IEEE: Piscataway, NJ, USA, 2009; pp. 413–422. [Google Scholar] [CrossRef]
- Breunig, M.M.; Kriegel, H.P.; Ng, R.T.; Sander, J. LOF: Identifying Density-Based Local Outliers. ACM SIGMOD Rec. 2000, 29, 93–104. [Google Scholar] [CrossRef]
- Comiter, M.Z. Attacking Artificial Intelligence AI’s Security Vulnerability and What Policymakers Can Do about It. Tech. Rep.. 2019. Available online: https://www.belfercenter.org/sites/default/files/2019-08/AttackingAI/AttackingAI.pdf (accessed on 23 September 2022).
- Tyukin, I.; Higham, D.; Gorban, A. On adversarial examples and stealth attacks in artificial intelligence systems. In Proceedings of the 2020 International Joint Conference on Neural Networks (IJCNN), Glasgow, UK, 19–24 July 2020. [Google Scholar] [CrossRef]
- Shokri, R.; Stronati, M.; Song, C.; Shmatikov, V. Membership inference attacks against machine learning models. In Proceedings of the IEEE Symposium on Security and Privacy, San Jose, CA, USA, 22–24 May 2017; pp. 3–18. [Google Scholar] [CrossRef] [Green Version]
- Hernández-Álvarez, L.; González-Manzano, L.; Fuentes, J.M.d.; Hernández Encinas, L. Biometrics and Artificial Intelligence: Attacks and Challenges. In Breakthroughs in Digital Biometrics and Forensics; Daimi, K., Francia, G., III, Encinas, L.H., Eds.; Springer International Publishing: Berlin/Heidelberg, Germany, 2022; pp. 213–240. [Google Scholar] [CrossRef]
- Fabregas, J.; Faundez-Zanuy, M. On-line signature verification system with failure to enroll managing. Pattern Recognit. 2009, 42, 2117–2126. [Google Scholar] [CrossRef]
Wavelet Coeff. | D1 | D2 | D3 | D4 | D5 | A5 |
Brain wave | ||||||
Freq. (Hz) | 64–128 | 32–64 | 16–32 | 8–16 | 4–8 | 0–4 |
No Dim. Red. | AUC | EER | Prec. | Recall | Acc | FPR | |
---|---|---|---|---|---|---|---|
SVM | 0.980 | 0.056 | 0.943 | 0.955 | 0.948 | 0.948 | 0.059 |
RF | 0.991 | 0.033 | 0.970 | 0.957 | 0.962 | 0.964 | 0.029 |
KNN | 0.899 | 0.157 | 0.775 | 0.905 | 0.823 | 0.802 | 0.301 |
OC–SVM | - | - | 0.871 | 0.547 | 0.652 | 0.730 | 0.087 |
IF | - | - | 0.910 | 0.537 | 0.663 | 0.741 | 0.054 |
LOF | - | - | 0.821 | 0.621 | 0.691 | 0.730 | 0.160 |
PCA | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
AUC | EER | Prec. | Recall | Acc | FPR | AUC | EER | Prec. | Recall | Acc | FPR | ||||
32 Features | |||||||||||||||
SVM | 0.887 | 0.176 | 0.834 | 0.780 | 0.797 | 0.814 | 0.152 | 0.752 | 0.300 | 0.682 | 0.725 | 0.690 | 0.690 | 0.344 | |
RF | 0.967 | 0.087 | 0.911 | 0.898 | 0.900 | 0.906 | 0.087 | 0.781 | 0.285 | 0.707 | 0.748 | 0.723 | 0.718 | 0.312 | |
KNN | 0.794 | 0.269 | 0.722 | 0.635 | 0.648 | 0.681 | 0.273 | 0.683 | 0.363 | 0.636 | 0.616 | 0.610 | 0.632 | 0.352 | |
OC–SVM | - | - | 0.624 | 0.525 | 0.547 | 0.589 | 0.346 | - | - | 0.633 | 0.568 | 0.587 | 0.606 | 0.355 | |
IF | - | - | 0.624 | 0.527 | 0.547 | 0.588 | 0.351 | - | - | 0.649 | 0.551 | 0.581 | 0.613 | 0.326 | |
LOF | - | - | 0.705 | 0.627 | 0.651 | 0.669 | 0.290 | - | - | 0.585 | 0.579 | 0.575 | 0.570 | 0.439 | |
64 Features | |||||||||||||||
SVM | 0.909 | 0.161 | 0.818 | 0.853 | 0.823 | 0.828 | 0.198 | 0.811 | 0.251 | 0.733 | 0.793 | 0.756 | 0.747 | 0.299 | |
RF | 0.962 | 0.090 | 0.901 | 0.898 | 0.893 | 0.900 | 0.098 | 0.845 | 0.223 | 0.768 | 0.807 | 0.784 | 0.779 | 0.248 | |
KNN | 0.777 | 0.262 | 0.727 | 0.559 | 0.587 | 0.652 | 0.255 | 0.736 | 0.302 | 0.687 | 0.689 | 0.673 | 0.680 | 0.329 | |
OC–SVM | - | - | 0.592 | 0.511 | 0.527 | 0.565 | 0.381 | - | - | 0.662 | 0.571 | 0.599 | 0.623 | 0.324 | |
IF | - | - | 0.571 | 0.510 | 0.520 | 0.552 | 0.407 | - | - | 0.713 | 0.545 | 0.604 | 0.651 | 0.242 | |
LOF | - | - | 0.658 | 0.609 | 0.620 | 0.632 | 0.345 | - | - | 0.616 | 0.594 | 0.600 | 0.603 | 0.388 |
SVM | RF | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
AUC | EER | Prec. | Recall | Acc | FPR | AUC | EER | Prec. | Recall | Acc | FPR | ||||
AF3 | 0.789 | 0.277 | 0.712 | 0.781 | 0.743 | 0.732 | 0.316 | 0.833 | 0.233 | 0.756 | 0.801 | 0.777 | 0.771 | 0.258 | |
F7 | 0.756 | 0.296 | 0.688 | 0.766 | 0.720 | 0.705 | 0.356 | 0.794 | 0.266 | 0.720 | 0.776 | 0.745 | 0.736 | 0.300 | |
F3 | 0.795 | 0.268 | 0.713 | 0.790 | 0.745 | 0.734 | 0.323 | 0.828 | 0.238 | 0.751 | 0.798 | 0.771 | 0.764 | 0.270 | |
FC5 | 0.801 | 0.260 | 0.718 | 0.808 | 0.756 | 0.743 | 0.321 | 0.833 | 0.237 | 0.747 | 0.806 | 0.773 | 0.766 | 0.274 | |
T7 | 0.757 | 0.301 | 0.688 | 0.765 | 0.718 | 0.707 | 0.351 | 0.799 | 0.275 | 0.717 | 0.753 | 0.732 | 0.732 | 0.290 | |
P7 | 0.781 | 0.283 | 0.707 | 0.817 | 0.752 | 0.734 | 0.348 | 0.828 | 0.242 | 0.743 | 0.802 | 0.767 | 0.760 | 0.281 | |
01 | 0.788 | 0.272 | 0.710 | 0.803 | 0.748 | 0.734 | 0.336 | 0.830 | 0.239 | 0.748 | 0.810 | 0.776 | 0.769 | 0.273 | |
02 | 0.782 | 0.275 | 0.714 | 0.778 | 0.737 | 0.726 | 0.326 | 0.836 | 0.236 | 0.756 | 0.804 | 0.777 | 0.769 | 0.267 | |
P8 | 0.821 | 0.240 | 0.742 | 0.819 | 0.774 | 0.766 | 0.287 | 0.863 | 0.208 | 0.780 | 0.840 | 0.807 | 0.800 | 0.240 | |
T8 | 0.802 | 0.252 | 0.727 | 0.818 | 0.766 | 0.752 | 0.314 | 0.839 | 0.226 | 0.755 | 0.809 | 0.779 | 0.774 | 0.262 | |
FC6 | 0.792 | 0.273 | 0.716 | 0.823 | 0.762 | 0.741 | 0.340 | 0.824 | 0.244 | 0.742 | 0.819 | 0.776 | 0.764 | 0.292 | |
F4 | 0.804 | 0.248 | 0.740 | 0.785 | 0.754 | 0.755 | 0.275 | 0.868 | 0.194 | 0.801 | 0.826 | 0.809 | 0.809 | 0.208 | |
F8 | 0.766 | 0.294 | 0.695 | 0.768 | 0.724 | 0.708 | 0.353 | 0.792 | 0.267 | 0.726 | 0.766 | 0.743 | 0.736 | 0.295 | |
AF4 | 0.766 | 0.288 | 0.700 | 0.775 | 0.730 | 0.716 | 0.344 | 0.820 | 0.241 | 0.748 | 0.779 | 0.759 | 0.757 | 0.264 |
SVM | RF | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
AUC | EER | Prec. | Recall | Acc | FPR | AUC | EER | Prec. | Recall | Acc | FPR | ||||
D1 | 0.969 | 0.065 | 0.927 | 0.956 | 0.940 | 0.939 | 0.079 | 0.985 | 0.044 | 0.955 | 0.947 | 0.950 | 0.951 | 0.044 | |
D2 | 0.962 | 0.071 | 0.927 | 0.935 | 0.929 | 0.930 | 0.074 | 0.980 | 0.055 | 0.948 | 0.931 | 0.938 | 0.940 | 0.051 | |
D3 | 0.969 | 0.066 | 0.927 | 0.943 | 0.935 | 0.934 | 0.075 | 0.985 | 0.048 | 0.956 | 0.935 | 0.945 | 0.946 | 0.042 | |
D4 | 0.955 | 0.088 | 0.900 | 0.922 | 0.909 | 0.907 | 0.108 | 0.973 | 0.070 | 0.935 | 0.927 | 0.930 | 0.931 | 0.066 | |
D5 | 0.943 | 0.114 | 0.870 | 0.910 | 0.888 | 0.885 | 0.141 | 0.958 | 0.095 | 0.914 | 0.893 | 0.902 | 0.903 | 0.087 | |
A5 | 0.942 | 0.109 | 0.889 | 0.895 | 0.889 | 0.891 | 0.113 | 0.973 | 0.075 | 0.930 | 0.908 | 0.916 | 0.919 | 0.069 |
OC–SVM ( = 0.5) | IF (contamination = 0.5) | LOF (contamination = 0.5) | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Prec. | Recall | Acc | FPR | Prec. | Recall | Acc | FPR | Prec. | Recall | Acc | FPR | ||||||
AF3 | 0.627 | 0.512 | 0.556 | 0.594 | 0.325 | 0.684 | 0.498 | 0.570 | 0.630 | 0.238 | 0.583 | 0.542 | 0.557 | 0.564 | 0.413 | ||
F7 | 0.615 | 0.537 | 0.566 | 0.588 | 0.362 | 0.660 | 0.508 | 0.568 | 0.615 | 0.277 | 0.580 | 0.537 | 0.555 | 0.566 | 0.406 | ||
F3 | 0.623 | 0.542 | 0.571 | 0.596 | 0.350 | 0.665 | 0.519 | 0.575 | 0.620 | 0.279 | 0.578 | 0.555 | 0.560 | 0.560 | 0.435 | ||
FC5 | 0.612 | 0.523 | 0.557 | 0.585 | 0.352 | 0.662 | 0.518 | 0.572 | 0.618 | 0.283 | 0.576 | 0.543 | 0.554 | 0.554 | 0.435 | ||
T7 | 0.615 | 0.494 | 0.540 | 0.585 | 0.325 | 0.636 | 0.467 | 0.532 | 0.596 | 0.276 | 0.577 | 0.517 | 0.541 | 0.559 | 0.400 | ||
P7 | 0.619 | 0.530 | 0.563 | 0.595 | 0.339 | 0.659 | 0.494 | 0.557 | 0.615 | 0.263 | 0.559 | 0.546 | 0.549 | 0.547 | 0.453 | ||
01 | 0.628 | 0.526 | 0.561 | 0.593 | 0.340 | 0.678 | 0.518 | 0.579 | 0.630 | 0.257 | 0.568 | 0.539 | 0.548 | 0.548 | 0.443 | ||
02 | 0.659 | 0.558 | 0.589 | 0.617 | 0.323 | 0.719 | 0.532 | 0.599 | 0.654 | 0.225 | 0.578 | 0.571 | 0.566 | 0.560 | 0.450 | ||
P8 | 0.687 | 0.563 | 0.606 | 0.639 | 0.285 | 0.748 | 0.541 | 0.619 | 0.672 | 0.197 | 0.598 | 0.567 | 0.573 | 0.571 | 0.425 | ||
T8 | 0.652 | 0.547 | 0.584 | 0.623 | 0.301 | 0.711 | 0.537 | 0.603 | 0.660 | 0.218 | 0.587 | 0.572 | 0.575 | 0.577 | 0.418 | ||
FC6 | 0.661 | 0.570 | 0.605 | 0.632 | 0.306 | 0.716 | 0.550 | 0.616 | 0.663 | 0.224 | 0.576 | 0.576 | 0.571 | 0.564 | 0.448 | ||
F4 | 0.717 | 0.560 | 0.617 | 0.654 | 0.252 | 0.755 | 0.552 | 0.627 | 0.678 | 0.196 | 0.602 | 0.572 | 0.579 | 0.578 | 0.416 | ||
F8 | 0.612 | 0.560 | 0.576 | 0.588 | 0.385 | 0.644 | 0.538 | 0.577 | 0.609 | 0.319 | 0.566 | 0.556 | 0.558 | 0.559 | 0.439 | ||
AF4 | 0.631 | 0.558 | 0.578 | 0.596 | 0.366 | 0.687 | 0.540 | 0.592 | 0.635 | 0.270 | 0.584 | 0.581 | 0.578 | 0.574 | 0.433 |
OC–SVM ( = 0.5) | IF (Contamination = 0.5) | LOF (Contamination = 0.5) | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Prec. | Recall | Acc | FPR | Prec. | Recall | Acc | FPR | Prec. | Recall | Acc | FPR | ||||||
D1 | 0.774 | 0.524 | 0.615 | 0.674 | 0.176 | 0.947 | 0.510 | 0.655 | 0.740 | 0.030 | 0.705 | 0.570 | 0.624 | 0.657 | 0.255 | ||
D2 | 0.839 | 0.507 | 0.622 | 0.699 | 0.109 | 0.945 | 0.486 | 0.635 | 0.729 | 0.029 | 0.767 | 0.579 | 0.653 | 0.695 | 0.190 | ||
D3 | 0.843 | 0.502 | 0.622 | 0.700 | 0.102 | 0.925 | 0.488 | 0.633 | 0.724 | 0.041 | 0.783 | 0.572 | 0.655 | 0.701 | 0.171 | ||
D4 | 0.798 | 0.510 | 0.617 | 0.687 | 0.136 | 0.860 | 0.507 | 0.634 | 0.710 | 0.087 | 0.781 | 0.587 | 0.665 | 0.705 | 0.176 | ||
D5 | 0.744 | 0.541 | 0.621 | 0.673 | 0.194 | 0.778 | 0.537 | 0.627 | 0.688 | 0.161 | 0.743 | 0.604 | 0.662 | 0.693 | 0.219 | ||
A5 | 0.677 | 0.555 | 0.593 | 0.639 | 0.278 | 0.678 | 0.562 | 0.597 | 0.638 | 0.286 | 0.759 | 0.633 | 0.681 | 0.711 | 0.210 |
OC–SVM (D1) | IF (D1) | LOF (D1) | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Prec. | Recall | Acc | FPR | Prec. | Recall | Acc | FPR | Prec. | Recall | Acc | FPR | ||||||
0.5 | 0.772 | 0.524 | 0.612 | 0.671 | 0.182 | 0.940 | 0.513 | 0.658 | 0.741 | 0.030 | 0.701 | 0.569 | 0.622 | 0.656 | 0.257 | ||
0.3 | 0.702 | 0.723 | 0.701 | 0.688 | 0.347 | 0.875 | 0.717 | 0.781 | 0.804 | 0.110 | 0.638 | 0.772 | 0.696 | 0.663 | 0.446 | ||
0.1 | 0.626 | 0.900 | 0.729 | 0.657 | 0.585 | 0.712 | 0.911 | 0.791 | 0.754 | 0.404 | 0.562 | 0.945 | 0.705 | 0.604 | 0.738 | ||
0.05 | 0.604 | 0.938 | 0.726 | 0.638 | 0.663 | 0.633 | 0.955 | 0.756 | 0.686 | 0.583 | 0.535 | 0.980 | 0.692 | 0.564 | 0.853 | ||
0.03 | 0.593 | 0.945 | 0.721 | 0.626 | 0.694 | 0.580 | 0.975 | 0.725 | 0.624 | 0.726 | 0.523 | 0.991 | 0.685 | 0.544 | 0.903 | ||
0.01 | 0.602 | 0.947 | 0.728 | 0.636 | 0.675 | 0.509 | 0.995 | 0.673 | 0.516 | 0.962 | 0.510 | 0.999 | 0.675 | 0.520 | 0.959 |
Configuration | #Features | Waves | Channels | AUC | EER | Prec. | Recall | Acc | FPR | t (s) | |
---|---|---|---|---|---|---|---|---|---|---|---|
I | 40 | D1 | AF3, P8, T8, FC6, F4 | 0.866 | 0.198 | 0.842 | 0.752 | 0.785 | 0.789 | 0.172 | 0.903 |
II | 64 | D1 | AF3, 01, 02, P8, T8, FC6, F4 | 0.894 | 0.174 | 0.892 | 0.756 | 0.806 | 0.815 | 0.121 | 0.927 |
III | 112 | D1 | all | 0.907 | 0.147 | 0.912 | 0.760 | 0.829 | 0.834 | 0.084 | 0.996 |
IV | 80 | D1,D2 | AF3, P8, T8, FC6, F4 | 0.893 | 0.168 | 0.880 | 0.751 | 0.798 | 0.810 | 0.126 | 0.960 |
V | 120 | D1,D2,D3 | AF3, P8, T8, FC6, F4 | 0.888 | 0.172 | 0.870 | 0.745 | 0.782 | 0.798 | 0.141 | 1.005 |
Complete | 672 | all | all | 0.899 | 0.153 | 0.875 | 0.766 | 0.786 | 0.804 | 0.151 | 2.023 |
Best PCA | 32 | - | - | 0.627 | 0.387 | 0.628 | 0.757 | 0.661 | 0.615 | 0.541 | 0.906 |
Best | 32 | - | - | 0.673 | 0.375 | 0.636 | 0.794 | 0.694 | 0.635 | 0.539 | 0.909 |
Permutation | Configuration | AUC | EER | Prec. | Recall | Acc | FPR | t (s) | |
---|---|---|---|---|---|---|---|---|---|
1 | III | 0.907 | 0.147 | 0.912 | 0.760 | 0.829 | 0.834 | 0.084 | 0.996 |
2 | III | 0.904 | 0.163 | 0.924 | 0.727 | 0.814 | 0.815 | 0.076 | 0.998 |
3 | III | 0.900 | 0.163 | 0.900 | 0.762 | 0.825 | 0.803 | 0.096 | 0.997 |
4 | III | 0.912 | 0.140 | 0.915 | 0.771 | 0.837 | 0.849 | 0.070 | 0.996 |
5 | III | 0.902 | 0.151 | 0.904 | 0.43 | 0.816 | 0.813 | 0.088 | 0.999 |
Average | III | 0.905 | 0.153 | 0.911 | 0.753 | 0.824 | 0.823 | 0.083 | 0.997 |
Standard Deviation | III | 0.005 | 0.010 | 0.009 | 0.018 | 0.010 | 0.018 | 0.010 | 0.001 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Hernández-Álvarez, L.; Barbierato, E.; Caputo, S.; Mucchi, L.; Hernández Encinas, L. EEG Authentication System Based on One- and Multi-Class Machine Learning Classifiers. Sensors 2023, 23, 186. https://doi.org/10.3390/s23010186
Hernández-Álvarez L, Barbierato E, Caputo S, Mucchi L, Hernández Encinas L. EEG Authentication System Based on One- and Multi-Class Machine Learning Classifiers. Sensors. 2023; 23(1):186. https://doi.org/10.3390/s23010186
Chicago/Turabian StyleHernández-Álvarez, Luis, Elena Barbierato, Stefano Caputo, Lorenzo Mucchi, and Luis Hernández Encinas. 2023. "EEG Authentication System Based on One- and Multi-Class Machine Learning Classifiers" Sensors 23, no. 1: 186. https://doi.org/10.3390/s23010186
APA StyleHernández-Álvarez, L., Barbierato, E., Caputo, S., Mucchi, L., & Hernández Encinas, L. (2023). EEG Authentication System Based on One- and Multi-Class Machine Learning Classifiers. Sensors, 23(1), 186. https://doi.org/10.3390/s23010186