Your browser doesn't support javascript.
loading
Show: 20 | 50 | 100
Results 1 - 3 de 3
Filter
Add more filters










Database
Language
Publication year range
1.
Brain Inform ; 10(1): 19, 2023 Aug 03.
Article in English | MEDLINE | ID: mdl-37535168

ABSTRACT

Electroencephalogram(EEG)-based authentication has received increasing attention from researchers as they believe it could serve as an alternative to more conventional personal authentication methods. Unfortunately, EEG signals are non-stationary and could be easily contaminated by noise and artifacts. Therefore, further processing of data analysis is needed to retrieve useful information. Various machine learning approaches have been proposed and implemented in the EEG-based domain, with deep learning being the most current trend. However, retaining the performance of a deep learning model requires substantial computational effort and a vast amount of data, especially when the models go deeper to generate consistent results. Deep learning models trained with small data sets from scratch may experience an overfitting issue. Transfer learning becomes an alternative solution. It is a technique to recognize and apply the knowledge and skills learned from the previous tasks to a new domain with limited training data. This study attempts to explore the applicability of transferring various pre-trained models' knowledge to the EEG-based authentication domain. A self-collected database that consists of 30 subjects was utilized in the analysis. The database enrolment is divided into two sessions, with each session producing two sets of EEG recording data. The frequency spectrums of the preprocessed EEG signals are extracted and fed into the pre-trained models as the input data. Three experimental tests are carried out and the best performance is reported with accuracy in the range of 99.1-99.9%. The acquired results demonstrate the efficiency of transfer learning in authenticating an individual in this domain.

2.
F1000Res ; 11: 283, 2022.
Article in English | MEDLINE | ID: mdl-37600220

ABSTRACT

Background: With the advances in current technology, hand gesture recognition has gained considerable attention. It has been extended to recognize more distinctive movements, such as a signature, in human-computer interaction (HCI) which enables the computer to identify a person in a non-contact acquisition environment. This application is known as in-air hand gesture signature recognition. To our knowledge, there are no publicly accessible databases and no detailed descriptions of the acquisitional protocol in this domain. Methods: This paper aims to demonstrate the procedure for collecting the in-air hand gesture signature's database. This database is disseminated as a reference database in the relevant field for evaluation purposes. The database is constructed from the signatures of 100 volunteer participants, who contributed their signatures in two different sessions. Each session provided 10 genuine samples enrolled using a Microsoft Kinect sensor camera to generate a genuine dataset. In addition, a forgery dataset was also collected by imitating the genuine samples. For evaluation, each sample was preprocessed with hand localization and predictive hand segmentation algorithms to extract the hand region. Then, several vector-based features were extracted. Results: In this work, classification performance analysis and system robustness analysis were carried out. In the classification analysis, a multiclass Support Vector Machine (SVM) was employed to classify the samples and 97.43% accuracy was achieved; while the system robustness analysis demonstrated low error rates of 2.41% and 5.07% in random forgery and skilled forgery attacks, respectively. Conclusions: These findings indicate that hand gesture signature is not only feasible for human classification, but its properties are also robust against forgery attacks.


Subject(s)
Algorithms , Gestures , Humans , Databases, Factual , Knowledge , Movement
3.
Brain Inform ; 8(1): 21, 2021 Oct 11.
Article in English | MEDLINE | ID: mdl-34633582

ABSTRACT

The study of Electroencephalogram (EEG)-based biometric has gained the attention of researchers due to the neurons' unique electrical activity representation of an individual. However, the practical application of EEG-based biometrics is not currently widespread and there are some challenges to its implementation. Nowadays, the evaluation of a biometric system is user driven. Usability is one of the concerning issues that determine the success of the system. The basic elements of the usability of a biometric system are effectiveness, efficiency and user satisfaction. Apart from the mandatory consideration of the biometric system's performance, users also need an easy-to-use and easy-to-learn authentication system. Thus, to satisfy these user requirements, this paper proposes a reasonable acquisition period and employs a consumer-grade EEG device to authenticate an individual to identify the performances of two acquisition protocols: eyes-closed (EC) and visual stimulation. A self-collected database of eight subjects was utilized in the analysis. The recording process was divided into two sessions, which were the morning and afternoon sessions. In each session, the subject was requested to perform two different tasks: EC and visual stimulation. The pairwise correlation of the preprocessed EEG signals of each electrode channel was determined and a feature vector was formed. Support vector machine (SVM) was then used for classification purposes. In the performance analysis, promising results were obtained, where EC protocol achieved an accuracy performance of 83.70-96.42% while visual stimulation protocol attained an accuracy performance of 87.64-99.06%. These results have demonstrated the feasibility and reliability of our acquisition protocols with consumer-grade EEG devices.

SELECTION OF CITATIONS
SEARCH DETAIL
...