[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Next Article in Journal
Terahertz Nondestructive Testing with Ultra-Wideband FMCW Radar
Next Article in Special Issue
Comparing Efficiency and Performance of IoT BLE and RFID-Based Systems for Achieving Contact Tracing to Monitor Infection Spread among Hospital and Office Staff
Previous Article in Journal
Relevant Cybersecurity Aspects of IoT Microservices Architectures Deployed over Next-Generation Mobile Networks
Previous Article in Special Issue
Testing for a Random Walk Structure in the Frequency Evolution of a Tone in Noise
You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

EEG Authentication System Based on One- and Multi-Class Machine Learning Classifiers

by
Luis Hernández-Álvarez
1,2,*,
Elena Barbierato
3,
Stefano Caputo
4,
Lorenzo Mucchi
4 and
Luis Hernández Encinas
2
1
Computer Security Lab, Universidad Carlos III de Madrid, 28911 Leganés, Spain
2
Institute of Physical and Information Technologies, Spanish National Research Council, 28006 Madrid, Spain
3
Department of Agriculture, Food, Environment and Forestry, University of Florence, 50144 Firenze, Italy
4
Department of Information Engineering, University of Florence, 50139 Firenze, Italy
*
Author to whom correspondence should be addressed.
Sensors 2023, 23(1), 186; https://doi.org/10.3390/s23010186
Submission received: 21 November 2022 / Revised: 15 December 2022 / Accepted: 20 December 2022 / Published: 24 December 2022
(This article belongs to the Special Issue Feature Papers in Smart and Intelligent Sensors Systems)

Abstract

:
In the current Information Age, it is usual to access our personal and professional information, such as bank account data or private documents, in a telematic manner. To ensure the privacy of this information, user authentication systems should be accurately developed. In this work, we focus on biometric authentication, as it depends on the user’s inherent characteristics and, therefore, offers personalized authentication systems. Specifically, we propose an electrocardiogram (EEG)-based user authentication system by employing One-Class and Multi-Class Machine Learning classifiers. In this sense, the main novelty of this article is the introduction of Isolation Forest and Local Outlier Factor classifiers as new tools for user authentication and the investigation of their suitability with EEG data. Additionally, we identify the EEG channels and brainwaves with greater contribution to the authentication and compare them with the traditional dimensionality reduction techniques, Principal Component Analysis, and χ 2 statistical test. In our final proposal, we elaborate on a hybrid system resistant to random forgery attacks using an Isolation Forest and a Random Forest classifiers, obtaining a final accuracy of 82.3 % , a precision of 91.1 % and a recall of 75.3 % .

1. Introduction

The recent development of technology has made it possible to implement sophisticated software even on small hardware. As a result, common devices such as smartphones, tablets, and smartwatches are typically equipped with many sensors and complex software. These portable devices now contain much of our digital lives, allowing us to access essential services on the go, such as private documents, e-payment, online shopping, and e-banking. In this context, user-friendly authentication systems that can be used frequently are essential for privacy and data protection [1]. These systems are often based on something the user knows (e.g., passwords or pins), owns (e.g., identification cards), or is (e.g., biometric data such as fingerprints) [2]. However, the first two approaches have disadvantages: complex passwords are difficult to remember, simple codes can be easily guessed by attackers, and identification objects can be physically stolen and grant permanent access after authentication [2]. The use of biometric data is preferable as it provides representative and unique information specific to each user’s body.
Biometric authentication systems often rely on artificial intelligence (AI) algorithms to differentiate specific users and prevent identity fraud [3]. AI algorithms are powerful tools that learn how to classify data based on their structure. To do this, they are trained and tested on data samples defined by biometric features. These features can be defined manually (using Machine Learning or ML) or extracted automatically (using Deep Learning or DL). Additionally, an AI model can be defined as multiclass (MC) if it learns from data with different labels (i.e., a classification problem) or as one-class (OC) if it learns from data from only one group (i.e., outlier detection) [4]. In AI studies, a model is typically trained using a series of samples called a train set, which allows the model to understand the pattern that the information follows. The model’s performance is then tested using a test set that contains similar data to the train set but that the model has never seen before. In this way, the model is evaluated on previously unseen data that are different from the train set. It is common to use a portion of the train set as a validation set to study the effect of the model’s parameters (parameter tuning) and ensure that it generalizes well and does not simply memorize the train set (overfitting) [4,5,6].
In the context of user biometric authentication, both ML and DL have been shown to be useful tools. Both techniques have produced good results when using different biometric features, including: (1) behavioral characteristics with gyroscopes, accelerometers, and magnetometers [7,8], (2) physical attributes such as facial [9], ocular [10], or fingerprint [11] recognition, and (3) physiological signals such as electroencephalograms (EEG) [12] or electrocardiograms [13]. It is important to note the difference between the user identification problem and the user authentication problem. In the former, the model learns how to differentiate between multiple users, making it an MC problem with as many labels/classes as there are users. On the other hand, user authentication involves deciding whether a user is the legitimate one or not, which is a binary problem (positive data with label 1 for the legitimate user and negative data with label 0 for impostors). As a result, most AI-based user authentication systems employ MC (binary) classifiers, using positive training data from the user of interest and negative training data from other subjects. While this is a valid approach, it is not always reasonable to assume that information about impostors is available, and a more realistic scenario would involve using OC classifiers. In this case, the model would work as an anomaly detector, learning only from the information of the user of interest. However, this option typically lowers the efficiency of the authentication system [7].
EEG signals are one of the most unique physiological characteristics of an individual [14]. EEG is a test that records the bioelectrical brain activity of a subject using multiple sensors attached to the scalp. These signals are particularly useful for user authentication applications, as this biometric information provides enough intrapersonal consistency over time to identify a specific user, while still maintaining interpersonal differences that allow other individuals to be rejected [15]. By analyzing the frequency content of EEG signals, different brain waves can be extracted.
In this work, we introduce the use of Isolation Forest (IF) and Local Outlier Factor (LOF) models for user authentication based on EEG data, which, to our knowledge, has not been explored before. Additionally, we aim to construct a hybrid system that combines OC and MC classifiers to improve the performance of OC models using MC algorithms while only requiring information from the legitimate user. We also study different approaches to reduce the dimensionality of the problem. Since AI authentication systems are often time-consuming and computationally costly [7], it is useful to reduce the dimensions of the data used by the model. It is important to note that, since we are using EEG data, we are addressing the problem of user authentication, which is different from and more appropriate than the problem of device/smartphone authentication.
The rest of this article is organized as follows: in Section 2, we detail the contribution of this work, while in Section 3 the related work is described. In Section 4, the data acquisition and preprocessing are explained, while in Section 5 the methodology followed is detailed. Then, in Section 6, the produced results are presented, and in Section 7, we finish with some conclusions.

2. Article Contribution

In this paper, we investigate the use of different OC ML classifiers with EEG signals to develop secure and usable user authentication models and compare their performance with known successful MC ML classifiers. Our principal contribution is the introduction of the IF and LOF models for user authentication. Although they are well-known ML models, as far as we know, they have never been explored in this application. In this work, we show their suitability for OC EEG user authentication and improve the performance of similar works of the literature by studying the impact of their parameters in the security as well as in the usability aspects of the models. We consider that a model is secure if the probability of an authenticated user being the legitimate one is high (i.e., a precision above 90%), while a usable model would be the one in which the legitimate user requires a low number of attempts to be authenticated (i.e., a recall above 75%). Moreover, we aim to reduce the dimensionality of the problem and, hence, the computational costs of the system, without affecting the system performance. To do that, we will analyze the contribution of the information of each EEG channel and brainwave in the authentication process. Finally, we pretend to develop a hybrid protocol that combines an OC and an MC model that represents a realistic scenario and improves the results of the OC algorithm. Therefore, in this work, we address the following novelties:
  • Solve the user authentication problem with IF and LOF, OC classifiers that have not been explored before for this application, increasing the literature authentication performance. We compared their results with OC–Support Vector Machine (OC–SVM) and, regarding MC classifiers, SVM, Random Forest (RF), and K-Nearest Neighbors (KNN). We have selected these models because they are well-known, classical ML models that have been shown to be useful in the user authentication application [7]. Moreover, as it will be exposed later, for each one of the MC models there is an equivalent OC model, which means that they have similar ways of working;
  • Identify how the security and usability of the systems can be improved by modifying the parameters of the classifiers. As far as we know, this is the first work that presents this analysis regarding OC classifiers for EEG signals;
  • Analyze the contribution to the authentication process of each channel and brain wave. We will reduce the dimensionality of the problem by selecting the most important channels and brain waves, and compare this dimensionality reduction methodology with Principal Component Analysis (PCA) and the statistical test χ 2 [16];
  • Construct a hybrid system that combines a OC and a MC model. In this sense, by using first an OC model, we will still be in a realistic scenario in which only the data of the legitimate user are needed, and then train a MC model by using the outputs of the OC model to improve the original results;
  • The publication of the used scripts so that the experiments can be replicated with different databases (Script available at: https://github.com/luishalvarez/EEG-Authentication).
Our final goal is to implement the proposed mechanism in daily life situations by employing, for example, portable EEGs that can measure real-world signals in common and usual places [17]. Following this idea, our proposal could be applied for Continuous Authentication (CA), performing the authentication automatically and in a transparent manner. In order to do this, the ML model could be deployed in a smart device of the user, so that the EEG signals are directly sent to it. Another option could be to outsource the authentication to an external server in charge of managing, protecting, and processing the data. More evident applications are Brain–Computer Interfaces (BCI) and user authentication in hospitals. BCIs refer to systems that use the brain’s electrical activity to create a communications between a user and a computer to, for example, assist subjects with paralysis. Since these systems already measure the EEG, they could directly employ the proposed scheme to make sure that the communication includes the legitimate user, performing CA. In the case of hospitals, patients whose EEG must be acquired could be authenticated, ensuring that the correct medication/treatment is applied.

3. Related Work

We have divided the related works into two classes: user authentication with MC (Section 3.1) and OC (Section 3.2) classifiers. Additionally, in Section 3.3, we also include a brief discussion on works that have used IF and LOF with EEG data, but not for the application of user authentication.

3.1. Multi-Class EEG User Authentication

Several MC AI techniques have been studied and demonstrated to be useful regarding EEG-based user authentication. For instance, in [12], the authors employ an Artificial Neural Network (ANN) to authenticate users based on energy features extracted from the wavelet decomposition of their EEG signals. The reported results achieve the greatest values of 95 % and 3.92 % for True Positive Rate (TPR) and False Positive Rate (FPR), respectively, although their database only included five subjects. A comparable approach is followed in [18], where a Multilayer Perceptron (MLP) and a correlation model are utilized to identify the users, obtaining a final accuracy of 75.8 % . Similar results were obtained with different configurations of ANNs in [19,20]. Convolutional Neural Networks (CNN) have also been studied in this field, as in [21,22,23], with results around 95 % and 5 % in accuracy and TPR.
The article included in [24] focused on the ML algorithms SVM, RF, KNN, and Naive Bayes. Positive outcomes were produced with all of them obtaining a greatest accuracy of 98.28 % with an RF. These models have been analyzed with features extracted from the time domain [25] and the frequency domain [26]. Comparable results have been recently reported in [27,28]. Other suitable models include Hidden Markov Model (HMM) and Gaussian Mixture Models (GMM) [15].

3.2. One-Class EEG User Authentication

The research of OC classifiers for user authentication is based on the OC–SVM model. For example, a Support Vector Data Description (SVDD) is used in [29] to authenticate users based on their visual evoked potentials. The strategy consisted of combining the users in groups of three, and the result obtained was 98 % of correctness. The accuracy (best value of 80 % ) and FPR (best value of 2.2 % ) of a OC–SVM were analyzed in [30] by increasing the number of blinks while measuring the EEG signals. In [31], the authors used an OC–SVM as a first security layer of an intruder detection/user identification system. In [32], OC–SVM and CNN were combined to construct a biometric authentication system. The study presented in [33] uses an OC–SVM to extract unsupervised features of EEG signals and explore their robustness against intra-subject variability.

3.3. IF and LOF with EEG Data

Recently, the combination of EEG signals with IF and LOF have been proposed in other works, but, to our knowledge, not for user authentication protocols. As an example, the study presented in [34] evaluates the use of IF to detect epileptic seizures in EEG signals. A similar objective is achieved in [35] utilizing fuzzy classifiers.
Similarly, in [36], outliers of eye state EEG signals were detected and eliminated by using IF. Alternatively, in [37], a pipeline for artifact removal in newborn EEG signals using LOF is introduced, employing it as an outlier detection algorithm. Approximated results are achieved in [38]. Another example of EEG outlier detection with LOF is [39], in which the EEG signals were used to classify breast tumors.
Based on the described literature, we can say that the IF and LOF models have not been explored for EEG-based user authentication. Even in other applications, the importance of IF and LOF was minimal compared to MC algorithms. However, in this work, we aim to study the suitability of these models to perform user authentication independently based on features already known to be successful. In the latest step, we pretend to build a hybrid system that improves their performance and only needs the information of the legitimate user.

4. Data Preparation

In this section, we describe how the EEG signals were acquired and the process followed to extract the features from which the AI models are going to learn.

4.1. Data Acquisition

To develop the measurement campaign, we took as reference the one described in [40]. The bioelectrical brain activity of 39 volunteers (23 women and 18 men between 18 and 60 years old) was measured. All volunteers were students or professors of the University of Florence and agreed to participate in the dataset collection only for research purposes. The signals were acquired with the Emotiv Epoc+ V1.1 wireless headset [41] at a sampling rate of 256 Hz. This device is commercially available and consists of 18 contact sensors on flexible and fixed plastic arms that are placed on the scalp of the user. The device contains 14 EEG channels and four references that correspond to the following locations in the International 10–20 system: AF3, F7, F3, FC5, T7, P7, O1, O2, P8, T8, FC6, F4, F8, and AF4 for channels, and P3, P4, TP9, and TP10 for references [41]. In Figure 1, the location of the channels in a scalp is included. Additionally, the headset applies digital fifth-order sinc and 50 Hz notch filters that improve the quality of the signal acquired.
The measurements were conducted in an environment with controlled illumination and sonority, and without protection against electrical and electromagnetic interference. Before starting the experiment, the individuals were asked to sign an agreement, declaring that they did not suffer any form of neurological disorder, agreed to participate in the campaign, and allowed the use of their information for research purposes only by researchers of the University of Florence. Hence, due to ethical and privacy issues, the database used in this work is not publicly available. Once the headset was placed on the subjects, and it was verified that the signal was being measured successfully, the experiment started. Each session started with a black screen (5 s), followed by an image (20 s) and another black screen (5 s). As a focused state in the participant was desired, the image selected consisted of three bottles of wine with different and complex labels, so that the user had enough stimuli. This process was repeated in four different sessions with four different images during the same day for each user. The four EEG signals were then joined, forming a single EEG signal for each user with an approximated duration of 2 min.

4.2. Data Preprocessing

For each subject i, 14 continuous EEG signals (one signal per each channel c) over time t, S i , c ( t ) were obtained. It is important to notice that signals of different users were not recorded for the same exact time interval and, therefore, the length of the signals varies from user to user. We defined the following data preprocessing procedure:
  • We divided the EEG signal of each channel and user in smaller signals of 240 ms. In other words, each S i , c ( t ) is separated in j i smaller signals, s i , c , j i ( t ) of 240 ms each. These smaller signals s i , c , j i ( t ) represent different samples of the same subject i. We chose 240 ms as time interval for two reasons: (1) it was viable to extract the frequency content (i.e., the brainwaves) we are interested in, and (2) a sufficient number of samples for each user were obtained. Since signals of different users had a different duration, the number of smaller signals j is different for each user (from here the notation j i ), and it goes from 1 to m i , where m i is the total number of smaller signals for the user i.
  • Then, we computed the wavelet decomposition of each s i , c , j i ( t ) for i { 1 , , 39 } , c { 1 , , 14 } , and j i { 1 , , m i } . Specifically, we employed a five-level wavelet decomposition using the order 2 Daubechies wavelet with Matlab, version R2021b. From this decomposition, we acquired the wavelet coefficients D1, D2, D3, D4, D5, and A5 as real-valued vectors. In Table 1, the frequency content and the corresponding brain wave of each coefficient are reported.
    We decided to use the wavelet decomposition for several reasons: (i) the implementation of the Fast Wavelet Transform is computationally fast, (ii) it offers a simultaneous signal feature localization in time and frequency domain, (iii) it is able to identify details of small parts of the signal, better than its general characteristics, and (iv) it has been shown to be suitable to an AI model with EEG data [25].
  • Finally, for each wavelet coefficient vector D1, D2, D3, D4, D5, and A5 in each s i , j i ( t ) , we calculated the following eight metrics [25]: maximum, minimum, mean, standard deviation, variance, skewness, Shannon entropy, and average power.
Taking into account that the Emotiv Epoc+ headset acquires a signal from each of its 14 channels that six coefficients are calculated for each signal, eight metrics are computed for each wavelet coefficient, and the final number of features is 14 × 6 × 8 = 672 .

5. Methodology

In this section, we explain the authentication strategy, which includes how the AI models are going to be trained and tested, and provide a brief explanation of the models that we will use, as well as of their more important parameters. Additionally, we include a threat model of our proposal.

5.1. Authentication Strategy

ML algorithms learn from data whose features have to be defined manually. In the previous section, we described how we conducted this procedure. Additionally, as already explained, we are going to divide the data into a train set, a validation set, and a test set to improve the model as much as possible and avoid overfitting.
A user authentication protocol is composed by two phases: the first one is the Enrollment Phase, in which data from the user of interest are collected and used to train a model. Once the model is constructed, the user can be authenticated by introducing a new measurement; this corresponds to the Authentication Phase. We associate the Enrollment Phase with the model training, whereas the model testing represents the Authentication Phase. To execute each phase, we differentiate between OC and MC classifiers:
  • Multi-Class classifiers: they need both positive (from the legitimate user) and negative (from an impostor) samples to be trained. In our case, the positive samples of the train set are the 80% of the total samples of the legitimate user, and the remaining 20% is used for testing. In addition, 15% of the train set represents the validation set. The negatives samples are randomly selected from the other 38 subjects for all sets, and the proportion of positive and negative samples in each set is defined as 50%.
  • One-Class classifiers: in this case, the train set consists of 80% of the total samples of the legitimate user, as these models only need positive samples. The test set is composed of the remaining 20% (positive samples), and the same number of negative samples, randomly selected from the other 38 users.
It should be mentioned that, in both cases, the data are normalized attending to the standard normalization.

5.2. Classifiers and Dimensionality Reduction

As described, both MC and OC ML classifiers have been used to develop user authentication mechanisms based on EEG data. On the one hand, MC models usually achieve better performances, as they learn the information structure of both the legitimate user and a potential impostor. Nevertheless, the information of the impostor is commonly represented by randomly selected data from the remaining subjects in the database. On the other hand, despite OC classifiers not being as efficient, they only need the information of the legitimate user to be trained.
Below, we describe the MC models proposed.
SVM: A model that constructs a hyperplane in a high-dimensional space to separate two set of points (classes). To find the optimal hyperplane, SVMs maximize its distance to the nearest element of each class, called the functional margin. We employ a Radial Basis Function (RBF) kernel function to simplify the calculations of the SVM, defining a 10-fold cross–validation process to optimize the value of the parameters C and gamma. The parameter C indicates how small the margin hyperplane is, while gamma defines the relevance of each training sample [1,4,5]. The specific values studied in the cross–validation process were C = { 0.1 , 1 , 10 , 100 , 1000 } and gamma   =   { auto, scale, 0.001 , 0.01 , 0.1 , 1 , 10 , 100 } [5].
RF: Bagging method that combines several individual decision tree classifiers [5], and whose result is the most voted class. Decision tree classifiers are models in which the leaves represent features, while branches represent labels. In this sense, the model learns how to differentiate the labels depending on the value of the features, hence creating new branches from each leave. In this work, we construct ensembles of 500 decision tree classifiers with default maximum depth (number of leaves and branches) [4,5].
KNN: It predicts the label of a new sample by looking at the most voted label of the k nearest known samples. In this sense, several metrics can be used to define distance, as, for example, the Euclidean distance of the features. In our case, we will set the number of neighbors to 25 ( k = 25 ) and use the default values for the rest of parameters [4,5].
The OC classifiers evaluated are the following:
OC–SVM: Schölkopf et al. [42] proposed a similar technique to SVM to construct a hyperplane that separate regions with and without data, called OC–SVM. Thus, OC–SVM has the same parameters of SVMs but also include the ν parameter. This new parameter is both a lower bound for the number of samples that are support vectors and an upper bound for the number of samples that are on the wrong side of the hyperplane. This is a difficult parameter to cross–validate and, certainly, we are going to explore its effect in the security and usability of the model [43].
IF: This algorithm detects anomalies by individually isolating points with binary tree classifiers, instead of modeling the normal points. This fact implies that IFs are a fast anomaly detector, with linear time complexity. Its parameters are the ones of RF and, consequently, we will use 500 estimators. Additionally, its contamination parameter is the analogous to the ν parameter of OC–SVM and, hence, we will analyze it also in this case [44].
LOF: Proposed by Breunig et al. [45], LOFs detect anomalous samples by measuring the local deviation or local density of each point with respect to its neighbors. Hence, this model is similar to KNN, but including the “contamination” parameter, which has the same meaning as for IF and OC–SVM [44].
From the included classifiers’ descriptions, it can be inferred that an OC model corresponds to each MC model (and vice versa). That is, the pairs SVM and OC–SVM, RF and IF, and KNN and LOF have approximated methodologies and, despite the fact that there are some important differences, their basic functioning is similar. As a result, we expect the best individual models (and, thus, the models of the hybrid system) to be one of these pairs.
As stated in Section 4.2, the initial number of features of our data are 672. It would be interesting to reduce this number, so that the models could be more computationally efficient (i.e., consume less time), while avoiding the reduction in their performances. We will explore the following dimensionality reduction techniques:
PCA: New features are going to be defined as linear combinations of the original ones. In this study, 32 and 64 new features were obtained with PCA, as we found that their representation percentage was sufficient (see Section 6.2).
Statistical Test χ 2 : This test enables us to identify the most significant original features. We will evaluate the models considering only the 32 and 64 most significant features (see Section 6.2).
Channel/brainwave: Alternatively, to reduce the problem dimensionality, we propose the study of each EEG channel and brainwave individually to test their contribution to the authentication model. Each channel contains 6 × 8 = 48 features, and each brainwave 14 × 8 = 112 features. Thus, detecting the most representative channels and brainwaves would allow us not only to reduce the dimensions of the problem, but also to extract the biological meaning.

5.3. Threat Model

Several security requirements should be pinpointed in the suggested authentication methodology. Considering that, in general, the user’s information is outsourced to an external server, the first security concern is the preservation of the user’s privacy. This means that protocols that guarantee data confidentiality, integrity, availability, and non–repudiation should be implemented. In addition, all parties that participate in the protocol should be authenticated before it is started. These needs can be established by defining a secure channel for data transmission and employing symmetric key cryptosystems. In fact, other works have studied the user authentication problem by using encrypted data as input to AI models [7], so that the clear information does not need to leave the sensor. Alternatively, although the general authentication protocol (data acquisition and preprocessing, and the ML models used) should be public, the specific parameters of the preprocessing step and models should be secret. By doing this, if an attacker has access to the user’s data, he will not be able to construct a new model that can imitate the original one.
The fulfillment of these requirements is crucial to avoid dataset poisoning attacks, model substitution attacks [46], stealth attacks [47], and membership inference attacks [48], among others [49]. Apart from this, an adversary may attack the protocol itself, trying to fool the model with false data. In this case, we distinguish two scenarios [50]:
  • Random or substitution attack: an adversary uses his own EEG signal to be (incorrectly) authenticated. As described, our models are tested by using positive and negative samples. Therefore, we are already considering and overcoming this attack.
  • Skilled forgery attack: an adversary tries to reproduce the user’s EEG signal as closely as possible to be (incorrectly) authenticated. The execution of this attack is more evident with authentication systems based on gestures; the attacker tries to reproduce the legit user’s movement. However, EEG signals cannot be imitated so easily. Consequently, we think that the best approximation for this attack is to train a Generative Adversarial Network (GAN) that generates similar EEG signals to the real user. Despite this attack not being addressed in the presented work, it is our objective to work on it shortly.
Lastly, we should also consider that there might be different factors affecting the acquisition of the EEG signals, thus decreasing the performance of the protocol. Some examples of them might be a malfunctioning sensor, software failures, or undesired user conditions (e.g., stress, intoxication, etc.).

5.4. Results Acquisition

As explained before, we aim to compare the performance of OC and MC ML classifiers (while evaluating the effect of dimensionality reduction techniques), the influence of each channel and brainwave, and the impact of the ν /contamination parameter related to the security and usability of the authentication system. To do that meaningfully, the following steps are followed:
  • Firstly, we carry out some baseline results with the MC and OC algorithms and compare their performance using the whole set of features (Section 6.1);
  • Then, we compare the baseline results with the outcomes after applying the dimensionality reduction procedures PCA and χ 2 , decreasing the dimensions to 32 and 64 in both cases (Section 6.2);
  • Next, the contribution of each channel and brainwave is evaluated by solving the authentication problem with just the data of each channel/brainwave (Section 6.3);
  • After that, we evaluate the effect of the ν and “contamination” parameter in the OC classifiers in order to obtain more secure/usable authentication systems (Section 6.4);
  • Finally, taking into account the obtained results, we explore the most promising combinations of OC and MC classifiers using the data with greater contribution in the authentication problem (Section 6.5).
These comparisons are made attending to different metrics: precision, recall, F1-score, accuracy, and FPR. All of them are based on the number of True Positives (TP), False Negatives (FN), False Positives (FP), and True Negatives (TN) of each case. The definition of the metrics are included in the following formulas:
Precision = TP TP + FP , Recall = TP TP + FN ,
F 1 Score = 2 Precision · Recall Precision + Recall ,
Accuracy = TP + TN TP + FP + TN + FN , FPR = FP FP + TN
According to these definitions, we could associate the precision (percentage of times a predicted positive was a true positive) and FPR (percentage of times an impostor was identified as the owner from his total number of attempts) with the security of the model. In other words, we can say that our model is secure if it shows a high precision (above 90%) and a low FPR (less than 10%). On the contrary, the usability of the system is directly proportional to the recall (percentage of times the owner is correctly authenticated). The F1-score is the harmonic average of precision and recall, which means that it can be analyzed to identify balanced systems. Finally, the accuracy can give us an insight into how well the model performs, and if there is something undesired happening (i.e., a constant accuracy of 0.5 would mean that the model is either rejecting or accepting all samples and, therefore, is not generalizing).
Apart from the above measures, we are also going to use the Area Under the Receiver Operating Characteristic (ROC) Curve (AUC) and the Equal Error Rate (EER) to evaluate the MC classifiers. The axes of the ROC curve are typically false positive rate (x-axis) and true positive rate (y-axis) and the greater its area, the better the performance. On the contrary, a smaller EER is associated with higher accuracies, and it is defined as the point of the ROC curve in which the false acceptance rate and false rejection rate are equal. However, these two metrics are obtained from probabilities and, since the OC classifiers directly accept or reject a sample, their use does not make sense with OC models.

6. Results

In this section, we include the outcomes obtained following the procedure described previously.

6.1. Baseline OC and MC—All Features

The first step is to obtain the baseline results, shown in Table 2. These results represent, for each metric, the average of the 39 users, and were obtained with the total number of features (672).
An important consideration is that, since the negative samples were randomly selected from the data of the remaining users, we repeated each experiment three times. In any case, the standard deviation of the outcomes obtained was higher than 0.02 . We do not include this information in the tables to facilitate the results’ visualization to the reader, but the data justify that the randomization does not affect the performance of the models.
If we compare the MC models, the SVM and RF offer better security (greater precision and FPR values) and accuracy than KNN, although their usability (recall) are approximated.
With respect to the OC classifiers, although they maintain comparable results with MC in terms of security (specially in the case of IF), they experience a dramatic reduction in usability and accuracy. This means that it is more difficult to balance the security–usability relation for OC models and, thus, they are either severe or usable. Interestingly, IF and LOF present similar accuracy values, but LOF shows a more equilibrated security–usability balance.
In Figure 2a,b, the ROC curves of the 39 users for the SVM and RF are respectively represented. It can be appreciated that the curves behave similarly for every subject, with the exception of two users in the case of SVM (green and orange curves) and one user in the case of RF (orange curve). This leads us to think that the configuration of the models is appropriated.

6.2. Dimensionality Reduction

We applied the traditional dimensionality reduction techniques PCA and statistical test χ 2 and performed the same tests as in the previous section. We analyzed the results produced by reducing the dimensions to 8, 16, 32, 64, and 128. However, we observed that, for PCA, the results improved as the number of features increased until there were 32, the point at which the performance started to deteriorate. In the case of χ 2 , the results are better with a higher number of features, but, for consistency, we decided to maintain the same number of features in both methods. As a result, Table 3 includes the outcomes obtained with 32 (best case for PCA) and 64 features. In both cases, the representation of the new features was greater than 99.999 % .
Comparing the results with the ones presented in Section 6.1, we can see that the performances of the models have become worse, more abruptly for the OC classifiers. RF and SVM are still working remarkably better than KNN and, in light of these results, we decided to focus on SVM and RF for the remaining experiments, discarding KNN.
Looking at each procedure individually, it can be inferred that χ 2 has more troubles when working with MC models than PCA, but they perform similarly with OC classifiers. RF remains the best MC model in both cases and, for the OC ones, LOF is the best for PCA and IF for χ 2 .

6.3. Channel and Wave Comparison

Now, we analyze the user authentication problem taking into account each channel and brainwave individually. In Table 4 and Table 5, the results obtained for the channels and brainwaves in the case of MC classifiers are respectively presented. The same information regarding the OC models is included in Table 6 and Table 7.
For SVM and RF, the results suggest that the most important channels are P8, T8, FC6, and F4. Additionally, channel AF3 also contributes to the security for the RF. For the case of brainwaves, both models coincide, with gamma (D1 and D2) and beta (D3) waves as the most influential ones. It should be noticed that, despite the classifiers coinciding in the importance of channels and waves, the results are always better with RF. In other words, for the same channel or the same brainwave, the metrics present better values for RF than for SVM. This leads us to think that RF should be a preferred option.
With respect to the OC models, the channels that contribute the most are P8, T8, FC6, and F4, coinciding P8, FC6, and F4 as the ones with better security and usability for OC–SVM and IF. Moreover, the best result of each individual channel is always obtained with IF. Nevertheless, they present more distributed results regarding the brainwaves and, hence, it is not clear which is the best option. For high frequency components (the best choices for MC models), it looks like IF works better, whereas LOF performs the best for low frequency components.

6.4. Effect of Contamination

We want to identify the effect of the ν and contamination parameters in the performance of the models. To do that, we explored a set of different values for both parameters, { 0.01 , 0.03 , 0.05 , 0.1 , 0.3 , 0.5 } for each one of the OC classifiers using the 112 features of D1 (all channels). In Table 8, these results are included.
For all classifiers, the security is proportional to the parameters studied, while the usability is inversely proportional. This means that, for the value 0.5 , the highest security level is obtained, and for 0.01 the greatest usability level is reached. For intermediate values, the relation between security and usability is more balanced, and Table 8 suggests that the value 0.3 achieves the best equilibrium.

6.5. OC and MC Combination

Finally, we propose a hybrid system that combines an OC with an MC classifier. To maintain a realistic scenario, the first layer of the system is the OC model, trained with only positive data, as data from other users, including malicious ones, are not typically available. The test data of this model will then be introduced as train data to a MC classifier, labeled by the OC model. In this way, we manage to improve the results of OC models by the action of the MC classifier.
Consequently with the results presented in the previous sections, we decided to select IF and RF as the OC and MC classifiers of the described system, respectively. They were the ones that presented the best outcomes and match in their most significant channels. To test the system, we have defined several configurations depending on the data used to train the first model. All the configurations and the results are showed in Table 9. In order to understand the importance of these results, we have included the outcomes obtained using all data (Complete), and the data reduced with PCA and χ 2 . It should be clarified that we settled the value of the parameter contamination to 0.3 in all cases.
We can appreciate that the best results are obtained with Configuration III, in which the features are formed by D1 coefficient (gamma wave) of all channels. Hence, it seems that this option is preferable over using a combination of brainwaves and less channels. Actually, the results obtained using all the features are worse, which leads us to think that we are using useful features and avoiding non-representative information. We can consider that Configuration III has an appropriated level of security ( 91.2 % of precision and 8.4 % of FPR) and a good level of usability ( 76.0 % of recall). In addition, we added a column to include the mean time (in seconds) that it takes to train a model. It should be clarified that all experiments have been carried out on Intel Core i7 at 2.00 GHz and 16 GB of RAM, using Python 3.9.
It can be seen that the greater the number of features, the larger time the model takes. Certainly, each model takes 2 s to be trained when all features are used and, in the configuration proposed, we maintain this time to less than 1 second ( 49.23 % of reduction). This time is less than 0.1 s larger than the one obtained with Configuration I (the lowest obtained). As a result, we consider Configuration III the best option among the studied ones.
To guarantee that the results presented are coherent independently of the initial data, and as a double-check for our proposal, we repeated the experiments with Configuration III modifying the train and test sets. In other words, we randomly permuted the samples of all users five times and solved the authentication problem for each case. The results are presented in Table 10, and the stability of the results can be easily appreciated.
From the biological point of view, D1 represents high gamma waves, which are related to intense brain activities and cognitive phenomena such as attention. Taking into account the nature of the experiments performed to obtained the EEG signals, the preferable use of D1 over the rest of brainwaves makes sense. In Figure 3, the ROC curve of Configuration III can be found. It is easy to see that all users behave similarly, with the exception of two of them.

7. Conclusions

The development of secure and user-friendly authentication systems is essential in today’s world, where many routines and activities are based on online services. The security of these systems protects user information, while their usability enhances the user experience.
In this work, we have investigated the use of OC ML classifiers to solve the problem of user authentication individually and in combination with MC models. The authentication system was based on EEG data that we collected in an experimental campaign, as it is considered one of the most unique and characteristic features of an individual’s body. Therefore, the proposed system does not recognize the user’s device, but the specific user. We also identified the channels and brainwaves that contribute most to distinguishing a user, finding that high-frequency content (i.e., high brain activity information) provides the most significant information. Interestingly, the results suggest that Isolation Forest (IF), an unexplored OC model in this application, is the best option. Furthermore, we propose a hybrid system using IF and RF classifiers, which achieved an accuracy of 82.3%, a precision of 91.1%, a false positive rate (FPR) of 8.3%, and a recall of 75.3%.
In future research, we aim to improve these results by combining EEG signals with other biometric features such as galvanic skin response (GSR), eye movement, or information from inertial sensors (e.g., accelerometers and gyroscopes). We also plan to explore the use of DL techniques (one-class ANN, CNN) to solve the user authentication problem and compare the results of ML and DL. Finally, we intend to train a GAN and simulate skilled forgery attacks for EEG user authentication.

Author Contributions

Conceptualization, L.H.-Á., S.C., L.M. and L.H.E.; methodology, L.H.-Á., S.C. and L.M.; software, L.H.-Á., E.B. and S.C.; validation, L.H.-Á., L.M. and L.H.E.; formal analysis, L.H.-Á. and L.M.; investigation, L.H.-Á. and S.C.; resources, L.H.-Á. and L.M.; data curation, L.H.-Á., E.B. and S.C.; writing—original draft preparation, L.H.-Á.; writing—review and editing, L.H.-Á., E.B., S.C., L.M. and L.H.E.; visualization, L.H.-Á., S.C. and L.M.; supervision, L.M. and L.H.E.; project administration, L.M. and L.H.E.; funding acquisition, L.M. and L.H.E. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Spanish State Research Agency (AEI) of the Ministry of Science and Innovation (MCIN), project P2QProMeTe Grant No. PID2020-112586RBI00/AEI/10.13039/501100011033.

Institutional Review Board Statement

Ethical review and approval were waived for this study as it is not an interventional or medical study.

Informed Consent Statement

Informed consent was obtained from all subjects involved in the study.

Data Availability Statement

Not applicable.

Acknowledgments

This work was supported in part by Comunidad de Madrid (Spain) through Project CYNAMON, Grant No. P2018/TCS-4566-CM, co-funded by the European Regional Development Fund (ESF, FEDER and ERDF, EU); in part by the European Union’s Horizon 2020 Research and Innovation Program under Grant No. 872752 and under Grant No. 101017141; in part by the European Telecommunication Standard Institute (ETSI) technical committee (TC) on Smart Body Area Network (SmartBAN). L.H.-Á. would like to thank CSIC Project CASDiM for its support. E.B would like to thank UNICESV (Centro Universitario Di Ricerca Per Lo Sviluppo Competitivo Del Settore Vitivinicolo). We want to thank the reviewer for their useful comments and recommendations.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
AIArtificial Intelligence
ANNArtificial Neural Network
AUCArea Under the Curve
BCIBrain Computer Interface
CAContinuous Authentication
CNNConvolutional Neural Network
DLDeep Learning
EEEElectroencephalogram
EEREqual Error Rate
FPRFalse Positive Rate
GMMGaussian Mixture Model
GSRGalvanic Skin Response
HMMHidden Markov Model
IFIsolation Forest
KNNK-Nearest Neighbors
LOFLocal Outlier Factor
MCMulti-Class
MLMachine Learning
MLPMultilayer Perceptron
OCOne-Class
PCAPrincipal Component Analysis
RFRandom Forest
ROCReceiver Operating Characteristic
SVDDSupport Vector Data Description
SVMSupport Vector Machine
TPRTrue Positive Rate

References

  1. Hastie, T.; Tibshirani, R.; Friedman, J. The Elements of Statistical Learning; Springer: Berlin/Heidelberg, Germany, 2009. [Google Scholar] [CrossRef]
  2. Obaidat, M.; Trore, I.; Wougang, I. Biometric-Based Physical and Cybersecurity Systems; Springer: Berlin/Heidelberg, Germany, 2019. [Google Scholar]
  3. Hernández-Álvarez, L.; De Fuentes, J.M.; González-Manzano, L.; Hernández Encinas, L. Privacy-Preserving Sensor-Based Continuous Authentication and User Profiling: A Review. Sensors 2021, 21, 92. [Google Scholar] [CrossRef] [PubMed]
  4. Bishop, C.M. Pattern Recognition and Machine Learning; Springer: Berlin/Heidelberg, Germany, 2006; Available online: https://www.springer.com/gp/book/9780387310732 (accessed on 13 September 2022).
  5. Murphy, K. Machine Learning: A Probabilistic Perspective; The MIT Press: Cambridge, MA, USA, 2012. [Google Scholar]
  6. Goodfellow, I.; Bengio, Y.; Courville, A. Deep Learning; The MIT Press: Cambridge, MA, USA, 2016. [Google Scholar]
  7. Hernández-Álvarez, L.; De Fuentes, J.M.; González-Manzano, L.; Hernández Encinas, L. SmartCAMPP-Smartphone-based continuous authentication leveraging motion sensors with privacy preservation. Pattern Recognit. Lett. 2021, 147, 189–196. [Google Scholar] [CrossRef]
  8. Li, Y.; Zou, B.; Deng, S.; Zhou, G. Using Feature Fusion Strategies in Continuous Authentication on Smartphones. IEEE Internet Comput. 2020, 24, 49–56. [Google Scholar] [CrossRef]
  9. Kudinov, A.; Elsakov, S. Improved Continuous Authentication System with Counterfeit Protection. J. Comput. Eng. Math. 2019, 6, 35–47. [Google Scholar] [CrossRef] [Green Version]
  10. de Freitas Pereira, T.; Marcel, S. Periocular biometrics in mobile environment. In Proceedings of the 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS), Arlington, VA, USA, 8–11 September 2015; pp. 1–7. [Google Scholar] [CrossRef]
  11. Shreyas, K.K.; Rajeev, S.; Panetta, K.; Agaian, S.S. Fingerprint authentication using geometric features. In Proceedings of the 2017 IEEE International Symposium on Technologies for Homeland Security (HST), Boston, MA, USA, 25–26 April 2017; pp. 1–7. [Google Scholar] [CrossRef]
  12. Vaish, A.; Sharma, P.K. Individual Identification based on Neuro-signal using Motor Movement and Imaginary Cognitive Process. Opt.-Int. J. Light Electron Opt. 2015, 127, 2143–2148. [Google Scholar] [CrossRef]
  13. Camara, C.; Peris-Lopez, P.; Safkhani, M.; Bagheri, N. ECGsound for human identification. Biomed. Signal Process. Control 2022, 72, 103335. [Google Scholar] [CrossRef]
  14. Smit, D.; Posthuma, D.; Boomsma, D.; Geus, E. Heritability of background EEG across the power spectrum. Psychophysiology 2005, 42, 691–697. [Google Scholar] [CrossRef]
  15. Jalaly Bidgoly, A.; Jalaly, H.; Arezoumand, Z. A Survey on Methods and Challenges in EEG Based Authentication. Comput. Secur. 2020, 93, 1–16. [Google Scholar] [CrossRef]
  16. Pal, B.; Zaman, S.; Hasan, A.; Hasan, A.M.; Mahmud, F. Chi-Square Statistic and Principal Component Analysis Based Compressed Feature Selection Approach for Naïve Bayesian Classifier. J. Artif. Intell. Res. Adv. 2015, 2, 16–23. [Google Scholar]
  17. Casson, A.; Abdulaal, M.; Dulabh, M.; Kohli, S.; Krachunov, S.; Trimble, E. Electroencephalogram. In Seamless Healthcare Monitoring; Springer: Berlin/Heidelberg, Germany, 2018; pp. 45–81. [Google Scholar] [CrossRef]
  18. Waili, T.; Md Johar, M.G.; Sidek, K.; Nor, N.; Yaacob, H.; Othman, M. EEG Based Biometric Identification Using Correlation and MLPNN Models. Int. J. Online Biomed. Eng. 2019, 15, 77–90. [Google Scholar] [CrossRef] [Green Version]
  19. Gui, Q.; Jin, Z.; Xu, W. Exploring EEG-based biometrics for user identification and authentication. In Proceedings of the 2014 IEEE Signal Processing in Medicine and Biology Symposium (SPMB), Philadelphia, PA, USA, 13 December 2014; pp. 1–6. [Google Scholar] [CrossRef]
  20. Kaur, B.; Singh, D.; Roy, P. A Novel framework of EEG-based user identification by analyzing music-listening behavior. Multimed. Tools Appl. 2017, 76, 25581–25602. [Google Scholar] [CrossRef]
  21. Wu, Q.; Zeng, Y.; Zhang, C.; Tong, l.; Yan, B. An EEG-Based Person Authentication System with Open-Set Capability Combining Eye Blinking Signals. Sensors 2018, 18, 335. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  22. Schons, T.; Moreira, G.; Silva, P.; Coelho, V.; Luz, E. Convolutional Network for EEG-Based Biometric. In Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications; Springer: Cham, Switzerland, 2018; pp. 601–608. [Google Scholar] [CrossRef]
  23. Bidgoly, A.; Bidgoly, H.; Arezoumand, Z. Towards a universal and privacy preserving EEG-based authentication system. Scientific Reports 2022, 21, 1–12. [Google Scholar] [CrossRef] [PubMed]
  24. Valsaraj, A.; Madala, I.; Garg, N.; Patil, M.; Baths, V. Motor Imagery Based Multimodal Biometric User Authentication System Using EEG. In Proceedings of the 2020 International Conference on Cyberworlds (CW), Caen, France, 29 September–1 October 2020; pp. 272–279. [Google Scholar] [CrossRef]
  25. Kumar Nitendra, A.K.; Siddiqi, A.H. Wavelet Transform for Classification of EEG Signal using SVM and ANN. Biomed. Pharmacol. 2017, 10, 1–9. [Google Scholar] [CrossRef]
  26. Di, Y.; An, X.; He, F.; Liu, S.; Ke, Y.; Ming, D. Robustness Analysis of Identification Using Resting-State EEG Signals. IEEE Access 2019, 7, 42113–42122. [Google Scholar] [CrossRef]
  27. Sodhro, A.H.; Sennersten, C.; Ahmad, A. Towards Cognitive Authentication for Smart Healthcare Applications. Sensors 2022, 22, 2101. [Google Scholar] [CrossRef]
  28. Lai, C.; Ibrahim, H.; Abdullah, M.; Suandi, S. EEG-Based Biometric Close-Set Identification Using CNN-ECOC-SVM. In Proceedings of the International Conference on Artificial Intelligence and Big Data in Digital Era, Ho Chi Minh, Vietnam, 18–19 December 2021; pp. 723–732. [Google Scholar]
  29. Zuquete, A.; Quintela, B.; Cunha, J.P. Biometric Authentication using Brain Responses to Visual Stimuli. In Proceedings of the Third International Conference on Bio-inspired Systems and Signal Processing, Biosignals, Valencia, Spain, 20–23 January 2010; pp. 103–112. [Google Scholar]
  30. Gupta, E.; Agarwal, M.; Sivakumar, R. Blink to Get In: Biometric Authentication for Mobile Devices using EEG Signals. In Proceedings of the ICC 2020—2020 IEEE International Conference on Communications (ICC), Dublin, Ireland, 7–11 June 2020; IEEE: Piscataway, NJ, USA, 2020; pp. 1–6. [Google Scholar] [CrossRef]
  31. Moctezuma, L.; Molinas, M. Multi-objective optimization for EEG channel selection and accurate intruder detection in an EEG-based subject identification system. Sci. Rep. 2020, 10, 5850. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  32. Haga, J. Biometric System Using EEG Signals from Resting–State and One–Class Classifiers. Ph.D. Thesis, Norwegian University of Science and Technology, Trondheim, Norway, 2020. [Google Scholar]
  33. Nishimoto, T.; Higashi, H.; Morioka, H.; Ishii, S. EEG-based personal identification method using unsupervised feature extraction and its robustness against intra-subject variability. J. Neural Eng. 2020, 17, 026007. [Google Scholar] [CrossRef]
  34. Guo, Y.; Jiang, X.; Tao, L.; Mengc, L.; Dai, C.; Long, X.; Wan, F.; Zhang, Y.; Van Dijk, J.; Aarts, R.M.; et al. Epileptic Seizure Detection by Cascading Isolation Forest-based Anomaly Screening and EasyEnsemble. IEEE Trans. Neural Syst. Rehabil. Eng. 2022, 30, 915–924. [Google Scholar] [CrossRef] [PubMed]
  35. Rabcan, J.; Levashenko, V.; Zaitseva, E.; Kvassay, M. Review of Methods for EEG Signal Classification and Development of New Fuzzy Classification-Based Approach. IEEE Access 2020, 8, 189720–189734. [Google Scholar] [CrossRef]
  36. Ketu, S.; Mishra, P. Hybrid classification model for eye state detection using electroencephalogram signals. Cogn. Neurodynamics 2022, 16, 73–90. [Google Scholar] [CrossRef] [PubMed]
  37. Kumaravel, V.; Farella, E.; Parise, E.; Buiatti, M. NEAR: An artifact removal pipeline for human newborn EEG data. Dev. Cogn. Neurosci. 2022, 54, 1–14. [Google Scholar] [CrossRef] [PubMed]
  38. Saba-Sadiya, S.; Chantland, E.; Alhanai, T.; Liu, T.; Ghassemi, M. Unsupervised EEG Artifact Detection and Correction. Front. Digit. Health 2021, 2, 608920. [Google Scholar] [CrossRef] [PubMed]
  39. Chakravarthy, S.; Rajaguru, H. Effectivebreast Tumor Classification using K–Strongest Strength With Local Outlier Factor Algorithm. Int. J. Aquat. Sci. 2021, 12, 1596–1603. [Google Scholar]
  40. Arnau-González, P.; Katsigiannis, S.; Arevalillo-Herráez, M.; Ramzan, N. BED: A New Data Set for EEG-Based Biometrics. IEEE Internet Things J. 2021, 8, 12219–12230. [Google Scholar] [CrossRef]
  41. Epoc+, E. Epoc+ User Manual. 2022. Available online: https://emotiv.gitbook.io/epoc-user-manual/ (accessed on 9 May 2022).
  42. Schölkopf, R.; Williamson, A.; Smola, J.; Platt, J. Support vector method for novelty detection. In Advances in Neural Information Processing Systems; MIT Press: Cambridge, MA, USA, 2000; pp. 582–588. [Google Scholar] [CrossRef]
  43. Khan, S.; Madden, M. One-Class Classification: Taxonomy of Study and Review of Techniques. Knowl. Eng. Rev. 2014, 29, 345–374. [Google Scholar] [CrossRef] [Green Version]
  44. Liu, F.T.; Ting, K.; Zhou, Z.H. Isolation Forest. In Proceedings of the 2008 Eighth IEEE International Conference on Data Mining, Pisa, Italy, 15–19 December 2008; IEEE: Piscataway, NJ, USA, 2009; pp. 413–422. [Google Scholar] [CrossRef]
  45. Breunig, M.M.; Kriegel, H.P.; Ng, R.T.; Sander, J. LOF: Identifying Density-Based Local Outliers. ACM SIGMOD Rec. 2000, 29, 93–104. [Google Scholar] [CrossRef]
  46. Comiter, M.Z. Attacking Artificial Intelligence AI’s Security Vulnerability and What Policymakers Can Do about It. Tech. Rep.. 2019. Available online: https://www.belfercenter.org/sites/default/files/2019-08/AttackingAI/AttackingAI.pdf (accessed on 23 September 2022).
  47. Tyukin, I.; Higham, D.; Gorban, A. On adversarial examples and stealth attacks in artificial intelligence systems. In Proceedings of the 2020 International Joint Conference on Neural Networks (IJCNN), Glasgow, UK, 19–24 July 2020. [Google Scholar] [CrossRef]
  48. Shokri, R.; Stronati, M.; Song, C.; Shmatikov, V. Membership inference attacks against machine learning models. In Proceedings of the IEEE Symposium on Security and Privacy, San Jose, CA, USA, 22–24 May 2017; pp. 3–18. [Google Scholar] [CrossRef] [Green Version]
  49. Hernández-Álvarez, L.; González-Manzano, L.; Fuentes, J.M.d.; Hernández Encinas, L. Biometrics and Artificial Intelligence: Attacks and Challenges. In Breakthroughs in Digital Biometrics and Forensics; Daimi, K., Francia, G., III, Encinas, L.H., Eds.; Springer International Publishing: Berlin/Heidelberg, Germany, 2022; pp. 213–240. [Google Scholar] [CrossRef]
  50. Fabregas, J.; Faundez-Zanuy, M. On-line signature verification system with failure to enroll managing. Pattern Recognit. 2009, 42, 2117–2126. [Google Scholar] [CrossRef]
Figure 1. Measure map of Emotiv Epoc+ Headset [41].
Figure 1. Measure map of Emotiv Epoc+ Headset [41].
Sensors 23 00186 g001
Figure 2. ROC Curves of the 39 users (colored lines) with 672 features for SVM (a) and RF (b).
Figure 2. ROC Curves of the 39 users (colored lines) with 672 features for SVM (a) and RF (b).
Sensors 23 00186 g002
Figure 3. ROC Curves of the 39 users (colored lines) for configuration III.
Figure 3. ROC Curves of the 39 users (colored lines) for configuration III.
Sensors 23 00186 g003
Table 1. Correspondence between Wavelet Coefficients, Brain Waves, and Frequency Content.
Table 1. Correspondence between Wavelet Coefficients, Brain Waves, and Frequency Content.
Wavelet Coeff.D1D2D3D4D5A5
Brain wave γ γ β α θ δ
Freq. (Hz)64–12832–6416–328–164–80–4
Table 2. Results with 672 features.
Table 2. Results with 672 features.
No Dim. Red.AUCEERPrec.Recall F 1 AccFPR
SVM0.9800.0560.9430.9550.9480.9480.059
RF0.9910.0330.9700.9570.9620.9640.029
KNN0.8990.1570.7750.9050.8230.8020.301
OC–SVM--0.8710.5470.6520.7300.087
IF--0.9100.5370.6630.7410.054
LOF--0.8210.6210.6910.7300.160
Table 3. Results with PCA and χ 2 —32 and 64 features.
Table 3. Results with PCA and χ 2 —32 and 64 features.
PCA χ 2
AUCEERPrec.Recall F 1 AccFPR AUCEERPrec.Recall F 1 AccFPR
32 Features
SVM0.8870.1760.8340.7800.7970.8140.152 0.7520.3000.6820.7250.6900.6900.344
RF0.9670.0870.9110.8980.9000.9060.087 0.7810.2850.7070.7480.7230.7180.312
KNN0.7940.2690.7220.6350.6480.6810.273 0.6830.3630.6360.6160.6100.6320.352
OC–SVM--0.6240.5250.5470.5890.346 --0.6330.5680.5870.6060.355
IF--0.6240.5270.5470.5880.351 --0.6490.5510.5810.6130.326
LOF--0.7050.6270.6510.6690.290 --0.5850.5790.5750.5700.439
64 Features
SVM0.9090.1610.8180.8530.8230.8280.198 0.8110.2510.7330.7930.7560.7470.299
RF0.9620.0900.9010.8980.8930.9000.098 0.8450.2230.7680.8070.7840.7790.248
KNN0.7770.2620.7270.5590.5870.6520.255 0.7360.3020.6870.6890.6730.6800.329
OC–SVM--0.5920.5110.5270.5650.381 --0.6620.5710.5990.6230.324
IF--0.5710.5100.5200.5520.407 --0.7130.5450.6040.6510.242
LOF--0.6580.6090.6200.6320.345 --0.6160.5940.6000.6030.388
Table 4. Results per Channel with MC—48 features.
Table 4. Results per Channel with MC—48 features.
SVM RF
AUCEERPrec.Recall F 1 AccFPR AUCEERPrec.Recall F 1 AccFPR
AF30.7890.2770.7120.7810.7430.7320.316 0.8330.2330.7560.8010.7770.7710.258
F70.7560.2960.6880.7660.7200.7050.356 0.7940.2660.7200.7760.7450.7360.300
F30.7950.2680.7130.7900.7450.7340.323 0.8280.2380.7510.7980.7710.7640.270
FC50.8010.2600.7180.8080.7560.7430.321 0.8330.2370.7470.8060.7730.7660.274
T70.7570.3010.6880.7650.7180.7070.351 0.7990.2750.7170.7530.7320.7320.290
P70.7810.2830.7070.8170.7520.7340.348 0.8280.2420.7430.8020.7670.7600.281
010.7880.2720.7100.8030.7480.7340.336 0.8300.2390.7480.8100.7760.7690.273
020.7820.2750.7140.7780.7370.7260.326 0.8360.2360.7560.8040.7770.7690.267
P80.8210.2400.7420.8190.7740.7660.287 0.8630.2080.7800.8400.8070.8000.240
T80.8020.2520.7270.8180.7660.7520.314 0.8390.2260.7550.8090.7790.7740.262
FC60.7920.2730.7160.8230.7620.7410.340 0.8240.2440.7420.8190.7760.7640.292
F40.8040.2480.7400.7850.7540.7550.275 0.8680.1940.8010.8260.8090.8090.208
F80.7660.2940.6950.7680.7240.7080.353 0.7920.2670.7260.7660.7430.7360.295
AF40.7660.2880.7000.7750.7300.7160.344 0.8200.2410.7480.7790.7590.7570.264
Table 5. Results per Wave with MC—112 features.
Table 5. Results per Wave with MC—112 features.
SVM RF
AUCEERPrec.Recall F 1 AccFPR AUCEERPrec.Recall F 1 AccFPR
D10.9690.0650.9270.9560.9400.9390.079 0.9850.0440.9550.9470.9500.9510.044
D20.9620.0710.9270.9350.9290.9300.074 0.9800.0550.9480.9310.9380.9400.051
D30.9690.0660.9270.9430.9350.9340.075 0.9850.0480.9560.9350.9450.9460.042
D40.9550.0880.9000.9220.9090.9070.108 0.9730.0700.9350.9270.9300.9310.066
D50.9430.1140.8700.9100.8880.8850.141 0.9580.0950.9140.8930.9020.9030.087
A50.9420.1090.8890.8950.8890.8910.113 0.9730.0750.9300.9080.9160.9190.069
Table 6. Results per Channel with OC—48 features.
Table 6. Results per Channel with OC—48 features.
OC–SVM ( ν = 0.5) IF (contamination = 0.5) LOF (contamination = 0.5)
Prec.Recall F 1 AccFPR Prec.Recall F 1 AccFPR Prec.Recall F 1 AccFPR
AF30.6270.5120.5560.5940.325 0.6840.4980.5700.6300.238 0.5830.5420.5570.5640.413
F70.6150.5370.5660.5880.362 0.6600.5080.5680.6150.277 0.5800.5370.5550.5660.406
F30.6230.5420.5710.5960.350 0.6650.5190.5750.6200.279 0.5780.5550.5600.5600.435
FC50.6120.5230.5570.5850.352 0.6620.5180.5720.6180.283 0.5760.5430.5540.5540.435
T70.6150.4940.5400.5850.325 0.6360.4670.5320.5960.276 0.5770.5170.5410.5590.400
P70.6190.5300.5630.5950.339 0.6590.4940.5570.6150.263 0.5590.5460.5490.5470.453
010.6280.5260.5610.5930.340 0.6780.5180.5790.6300.257 0.5680.5390.5480.5480.443
020.6590.5580.5890.6170.323 0.7190.5320.5990.6540.225 0.5780.5710.5660.5600.450
P80.6870.5630.6060.6390.285 0.7480.5410.6190.6720.197 0.5980.5670.5730.5710.425
T80.6520.5470.5840.6230.301 0.7110.5370.6030.6600.218 0.5870.5720.5750.5770.418
FC60.6610.5700.6050.6320.306 0.7160.5500.6160.6630.224 0.5760.5760.5710.5640.448
F40.7170.5600.6170.6540.252 0.7550.5520.6270.6780.196 0.6020.5720.5790.5780.416
F80.6120.5600.5760.5880.385 0.6440.5380.5770.6090.319 0.5660.5560.5580.5590.439
AF40.6310.5580.5780.5960.366 0.6870.5400.5920.6350.270 0.5840.5810.5780.5740.433
Table 7. Results per Wave with OC—112 features.
Table 7. Results per Wave with OC—112 features.
OC–SVM ( ν = 0.5) IF (Contamination = 0.5) LOF (Contamination = 0.5)
Prec.Recall F 1 AccFPR Prec.Recall F 1 AccFPR Prec.Recall F 1 AccFPR
D10.7740.5240.6150.6740.176 0.9470.5100.6550.7400.030 0.7050.5700.6240.6570.255
D20.8390.5070.6220.6990.109 0.9450.4860.6350.7290.029 0.7670.5790.6530.6950.190
D30.8430.5020.6220.7000.102 0.9250.4880.6330.7240.041 0.7830.5720.6550.7010.171
D40.7980.5100.6170.6870.136 0.8600.5070.6340.7100.087 0.7810.5870.6650.7050.176
D50.7440.5410.6210.6730.194 0.7780.5370.6270.6880.161 0.7430.6040.6620.6930.219
A50.6770.5550.5930.6390.278 0.6780.5620.5970.6380.286 0.7590.6330.6810.7110.210
Table 8. Results for Different Values of ν and contamination with OC—112 features (D1).
Table 8. Results for Different Values of ν and contamination with OC—112 features (D1).
OC–SVM (D1) IF (D1) LOF (D1)
Prec.Recall F 1 AccFPR Prec.Recall F 1 AccFPR Prec.Recall F 1 AccFPR
0.50.7720.5240.6120.6710.182 0.9400.5130.6580.7410.030 0.7010.5690.6220.6560.257
0.30.7020.7230.7010.6880.347 0.8750.7170.7810.8040.110 0.6380.7720.6960.6630.446
0.10.6260.9000.7290.6570.585 0.7120.9110.7910.7540.404 0.5620.9450.7050.6040.738
0.050.6040.9380.7260.6380.663 0.6330.9550.7560.6860.583 0.5350.9800.6920.5640.853
0.030.5930.9450.7210.6260.694 0.5800.9750.7250.6240.726 0.5230.9910.6850.5440.903
0.010.6020.9470.7280.6360.675 0.5090.9950.6730.5160.962 0.5100.9990.6750.5200.959
Table 9. Best OC-MC configurations.
Table 9. Best OC-MC configurations.
Configuration#FeaturesWavesChannelsAUCEERPrec.Recall F 1 AccFPRt (s)
I40D1AF3, P8, T8, FC6, F40.8660.1980.8420.7520.7850.7890.1720.903
II64D1AF3, 01, 02, P8, T8, FC6, F40.8940.1740.8920.7560.8060.8150.1210.927
III112D1all0.9070.1470.9120.7600.8290.8340.0840.996
IV80D1,D2AF3, P8, T8, FC6, F40.8930.1680.8800.7510.7980.8100.1260.960
V120D1,D2,D3AF3, P8, T8, FC6, F40.8880.1720.8700.7450.7820.7980.1411.005
Complete672allall0.8990.1530.8750.7660.7860.8040.1512.023
Best PCA32--0.6270.3870.6280.7570.6610.6150.5410.906
Best χ 2 32--0.6730.3750.6360.7940.6940.6350.5390.909
Table 10. Five different permutations of Configuration III.
Table 10. Five different permutations of Configuration III.
PermutationConfigurationAUCEERPrec.Recall F 1 AccFPRt (s)
1III0.9070.1470.9120.7600.8290.8340.0840.996
2III0.9040.1630.9240.7270.8140.8150.0760.998
3III0.9000.1630.9000.7620.8250.8030.0960.997
4III0.9120.1400.9150.7710.8370.8490.0700.996
5III0.9020.1510.9040.430.8160.8130.0880.999
AverageIII0.9050.1530.9110.7530.8240.8230.0830.997
Standard DeviationIII0.0050.0100.0090.0180.0100.0180.0100.001
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Hernández-Álvarez, L.; Barbierato, E.; Caputo, S.; Mucchi, L.; Hernández Encinas, L. EEG Authentication System Based on One- and Multi-Class Machine Learning Classifiers. Sensors 2023, 23, 186. https://doi.org/10.3390/s23010186

AMA Style

Hernández-Álvarez L, Barbierato E, Caputo S, Mucchi L, Hernández Encinas L. EEG Authentication System Based on One- and Multi-Class Machine Learning Classifiers. Sensors. 2023; 23(1):186. https://doi.org/10.3390/s23010186

Chicago/Turabian Style

Hernández-Álvarez, Luis, Elena Barbierato, Stefano Caputo, Lorenzo Mucchi, and Luis Hernández Encinas. 2023. "EEG Authentication System Based on One- and Multi-Class Machine Learning Classifiers" Sensors 23, no. 1: 186. https://doi.org/10.3390/s23010186

APA Style

Hernández-Álvarez, L., Barbierato, E., Caputo, S., Mucchi, L., & Hernández Encinas, L. (2023). EEG Authentication System Based on One- and Multi-Class Machine Learning Classifiers. Sensors, 23(1), 186. https://doi.org/10.3390/s23010186

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop