Next Article in Journal
Efficient Decellularization of the Full-Thickness Rat-Derived Abdominal Wall to Produce Acellular Biologic Scaffolds for Tissue Reconstruction: Promising Evidence Acquired from In Vitro Results
Previous Article in Journal
Deep Learning-Based Recognition of Periodontitis and Dental Caries in Dental X-ray Images
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Encrypt with Your Mind: Reliable and Revocable Brain Biometrics via Multidimensional Gaussian Fitted Bit Allocation

1
State Key Lab of Brain-Machine Intelligence, Hangzhou 310018, China
2
College of Computer Science and Technology, Zhejiang University, Hangzhou 310027, China
3
Affiliated Mental Health Center & Hangzhou Seventh Peoples Hospital, MOE Frontier Science Center for Brain Science and Brain-Machine Integration, Zhejiang University School of Medicine, Hangzhou 310030, China
*
Author to whom correspondence should be addressed.
Bioengineering 2023, 10(8), 912; https://doi.org/10.3390/bioengineering10080912
Submission received: 12 June 2023 / Revised: 19 July 2023 / Accepted: 30 July 2023 / Published: 1 August 2023
(This article belongs to the Section Biosignal Processing)

Abstract

:
Biometric features, e.g., fingerprints, the iris, and the face, have been widely used to authenticate individuals. However, most biometrics are not cancellable, i.e., once these biometric features are cloned or stolen, they cannot be replaced easily. Unlike traditional biometrics, brain biometrics are extremely difficult to clone or forge due to the natural randomness across different individuals, which makes them an ideal option for identity authentication. Most existing brain biometrics are based on electroencephalogram (EEG), which is usually demonstrated unstable performance due to the low signal-to-noise ratio (SNR). For the first time, we propose the use of intracortical brain signals, which have higher resolution and SNR, to realize the construction of the high-performance brain biometrics. Specifically, we put forward a novel brain-based key generation approach called multidimensional Gaussian fitted bit allocation (MGFBA). The proposed MGFBA method extracts keys from the local field potential of ten rats with high reliability and high entropy. We found that with the proposed MGFBA, the average effective key length of the brain biometrics was 938 bits, while achieving high authentication accuracy of 88.1% at a false acceptance rate of 1.9%, which is significantly improved compared to conventional EEG-based approaches. In addition, the proposed MGFBA-based keys can be conveniently revoked using different motor behaviors with high entropy. Experimental results demonstrate the potential of using intracortical brain signals for reliable authentication and other security applications.

1. Introduction

Identity authentication plays an important role in the information security field, particularly for applications that deal with sensitive or private information (e.g., financial, medical, military, and shopping information). Passwords and personal identification numbers (PINs) are frequently used for access authentication. However, users usually use short passwords or PINs that are easy to remember, but long and complicated passwords are required to realize sufficient security. In addition, users often set the same password across different applications; thus, once the passwords are stolen, guessed, or hacked, the hacker can access multiple applications fraudulently [1].
Biometric features, e.g., fingerprints, the face, and the iris, have been a popular alternative for identity authentication [2]. Biometric features are natural biological components of the human body; thus, users do not have to remember long passwords. Due to the biological uniqueness of individuals, biometric features contain rich information to guarantee authentication security [3]. Thus, biometrics are considered an ideal way to validate authorized users [3]. In the following, we survey the existing biometrics and divide them into two categories, i.e., irrevocable and revocable biometrics. (1) Irrevocable biometrics. Irrevocable biometric features contain immutable patterns, and representative examples are commonly used, e.g., fingerprints [4,5], face [6] and the iris [7]. Several studies have investigated such biometrics in recent decades; however, they have a critical limitation, i.e., they are irrevocable and can be copied easily by attackers [8,9,10,11]. For example, fingerprints left on keyboards or cups can be collected easily. In addition, faces are vulnerable to camouflage from printed photos. To address this problem, some studies have proposed using internal biological properties as biometric features, including DNA [12] and electrocardiogram (ECG) signals [13,14]). Ref. [12] employed DNA binary strands to provide rapid encryption and decryption using information hiding for steganography. Ref. [14] adopted ECG signals to generate cryptographic keys, and they achieved 100-bit keys with 95% reliability extracted from ECG signals acquired over multiple sessions. Such internal biometrics are more difficult to clone; however, they are irrevocable. In other words, once the biometric features are cloned or stolen, they cannot be substituted easily. (2) Revocable biometrics. Compared to irrevocable biometrics, revocable biometrics can be updated once stolen. The most commonly used revocable biometrics are behavioral biometrics. In 2002, Monrose et al. [15] proposed a behavioral biometric feature comprising a combination of duration and delay between keystrokes. In addition, handwritten signatures [16,17,18] are another example of a behavioral biometric feature, where the local features of the signature are used for application. However, the keys generated by behavioral biometrics are generally very short, e.g., approximately 40 bits [16], which may be insufficient security for applications with high security requirements. Recent studies have demonstrated that the human brain can provide superior revocable biometric features [19,20,21,22,23,24]. Brain waves are continuous physiological signals with variable characteristics that change in real time; thus, it is extremely difficult to steal or imitate brain signals. A previous study [20] represented EEG signals as a graph based on within-frequency and cross-frequency functional connectivity estimates, and they utilized a graph convolutional neural network for person identification. Another study [23] integrated transfer learning and dictionary learning in a learning model for EEG emotion recognition. However, these methods ignore the cancellability of brain biometrics.
Brain-based biometrics are potentially revocable; however, existing EEG-based methods suffer from poor performance. A major problem with EEG is its low signal-to-noise ratio (SNR) because the electrical signals in the brain decay significantly as they pass through the skull and scalp. Thus, an EEG-based system cannot achieve sufficient reliability due to the signal quality, and the revocability is highly limited [25]. In addition, the long-term stability of EEG is also unsatisfactory. A previous study [26] evaluated the performance of EEG over time and identified a significantly decreasing trend. Therefore, determining how to realize high reliability and long-term stability is an essential but challenging problem for brain-based biometrics. Compared with EEG signals, intracortical brain signals are an effective option in terms of constructing the high-performance brain biometrics, which are recorded with electrodes placed directly on the cortex such that the signals have higher resolution and SNR [27,28]. The main contributions of our work can be summarized as follows:
  • To the best of our knowledge, this is the first study to encode intracortical brain signals into reliable long keys.
  • In this paper, we propose a novel approach called multidimensional Gaussian fitted bit allocation (MGFBA) to encode brain signals into digitalized keys.
  • We found that with the proposed MGFBA, the average effective key length using the intracortical brain signals of 10 rats was 938 bits, and we achieved high authentication accuracy of 88.1% at a false acceptance rate of 1.9%, which is a significant improvement over conventional EEG-based approaches.
  • Our MGFBA-based keys can be conveniently revoked using different motor behaviors. The experimental results demonstrate the potential of using intracortical brain signals for reliable authentication and other security applications.

2. Methods

2.1. Overview

In this paper, we propose a new type of brain biometrics, which utilize intracortical brain signals to realize authentication. The proposed biometrics contains two main processes, i.e., the registration and authentication processes, as shown in Figure 1. During the registration process, information about the subjects is collected, including selecting reliable features and generating key templates for each subject. Specifically, we collect the LFP signals of each subject performing the selected behavior as input, and we then preprocess the signals and extract features. After the MGFBA quantization process, we obtain the indices of reliable features as helper data and key templates for each subject stored in a secure storage medium. If a user is to be verified, the authentication process regenerates the key with MGFBA method and compares it to the key template for identity authentication. Here, we collect the LFP signals of the user performing the selected behavior as input, and then, we compute the key with MGFBA quantization. Finally, we compare the similarity of the regenerated key and the key template to validate the user’s identity.

2.2. Signal Preprocessing and Feature Extraction

The raw neural signals are processed by a 0.5–300 Hz bandpass filter (i.e., a two-order Butterworth filter) to obtain the LFP signals. According to the behavior data, we separate the performing segments of the neural signals for key generation. Within the running behavior, all data are used; within the grabbing behavior, we only preserve the segments between the reach and take-back action; within the pressing behavior, only the segments with lever pressure above a certain threshold are employed. The neural signal segments are then concatenated temporally for further feature extraction. For each channel of LFP signals, we compute the power of five classical frequency bands as features, i.e., delta band ( δ , 0.5–4 Hz), theta band ( θ , 4–8 Hz), alpha band ( α , 8–12 Hz), beta band ( β , 12–30 Hz), and gamma band ( γ , 30–300 Hz). Specifically, we take 2-s long neural signals as a trial and the power of five frequency bands for each trial was calculated by applying 512-point windows with overlap to provide one sample every 100 ms. Then, a Hanning window followed by a fast Fourier transform to each window was used to calculate time domain squared power. The log transform of the frequency power was computed as features as follows:
P o w e r ( n ) = l o g ( p ( n ) )
where n stands for each frequency band and  p ( n )  is the time domain squared power belonging to the band n. In addition, we append an additional feature  l o g ( p ( n ) ) , i.e., the log value of the sum of the frequency power of all frequency bands. In total, there are 96 features of each trial, with 16 channels considered in our experiments.

2.3. MGFBA Quantization

MGFBA quantization converts real-valued LFP features into binary strings for each subject. Figure 2 illustrates the specific steps of the MGFBA quantization process. Here, Step I is a preprocessing step to compute the population parameters, i.e., the population center and margins, which are computed based on the input parameter  α  and the population statistics. Step II involves the feature selection and key regeneration processes for each subject. Firstly, the individual statistics are taken as the primary input, and the population center and margins for each feature (computed in Step I) are then used to select the most reliable features for each subject. We then compute the code of each reliable feature and combine the codes to generate a key template for each subject. The population parameters and indices of the selected features are stored as helper data for subsequent use. Step III is an authentication step. Here, the feature indices calculated in Step II are applied to regenerate the key using the population parameters. By comparing the similarity of the regenerated key and the target key template, the authentication is successful only if the similarity is greater than a specific threshold for the given subject. Prior to discussing the proposed MGFBA in detail, we first present the assumptions considered in our experiments as follows.
Assumption 1.
Samples from the entire population are assumed to be able to represent the probability density function of each feature, and these probability density functions are considered multivariate Gaussian distributions. Here, for each LFP feature f of K dimensional space, we denote the probability density function of the population as  P D F p o p f N ( μ p o p f , p o p f ) , where  μ p o p f R K p o p f R K × K .
Assumption 2.
The LFP features of each subject are computed during registration, and these are also considered multivariate Gaussian distributions. Similarly, for each LFP feature f of K dimensional space for subject  S i  ( i [ 1 , k ] , where k is the number of subjects), we represent the probability density function of  S i  as  P D F S i f N ( μ S i f , S i f ) , where  μ S i f R K S i f R K × K .
For the 1-bit case, as shown in Figure 3a, the central red curve refers to the probability distribution of a feature of the entire population, and the yellow and green curves refer to the probability distributions of the same feature for  S u b j e c t a  and  S u b j e c t b , respectively. As shown in Figure 3b, for the 2-bit case, the central red circle refers to the probability distribution of the entire population, and the other four circles represent the probability distributions of different subjects in the population. In addition, the solid and dotted lines represent the population center and the boundaries of different code areas, respectively. For simplicity, we draw the center border of the project of two-dimensional probability distributions in the plane for the 2-bit case. In addition, the exact feature distribution of each rat is shown in Figures S1–S10 in the Supplementary Material.
Population Parameter Computation. The first step of MGFBA quantization is to compute the essential parameters of the population, i.e., the center point and the margin. As mentioned previously, the features of the population are known and considered Gaussian distributions. Thus, we attempt to fit the data into multivariate Gaussian functions to obtain the value of  μ p o p f  and  p o p f . In other words, for the 1-bit case,  μ p o p f = μ  and  p o p f = σ  in  f ( x ) = 1 2 π σ e ( x μ ) 2 2 σ 2 . Similarly, for the 2-bit case,  μ p o p f = ( μ X , μ Y )  and  p o p f = [ σ X , 0 ; 0 , σ Y ] , with  ρ = 0  for ease of calculation, in  f ( x , y ) = 1 2 π σ X σ Y 1 ρ 2 × e 1 2 ( 1 ρ 2 ) [ ( x μ X σ X ) 2 2 ρ ( x μ X σ X ) ( y μ Y σ Y ) + ( y μ Y σ Y ) 2 ] . Subsequently, we must compute the margins of the different code areas. As shown in Figure 3a, the probability density function of  S u b j e c t a  (yellow curve) overlaps the solid line (i.e., the population center). The area of this overlap indicates the amount of error we would suffer for  S u b j e c t a  if the feature is selected for key generation. Specifically, for  S u b j e c t a  whose probability distribution is mostly on the left side of the population center, the feature can be encoded correctly as 0 during key generation in most cases. However, due to the intra-class variation, there could be an error while encoding the feature if it appears on the right side of the population center. In this paper, we assign the maximum allowable overlap as  α  for a feature. If  α  is larger, the overlap area will be larger, and the intra-class reliability will be lower. Consequently,  α  controls the probability of error in (or the reliability of) the key generation, which can be utilized to manage the trade-off between reliability and entropy. For example, in the 1-bit encoding case, only features that satisfy the following constraints can be selected for key generation:
μ p o p f + P D F S i f α , if μ S i f < μ p o p f
μ p o p f P D F S i f α , if μ S i f > μ p o p f
With the above restrictions, it is obvious that the margin is directly related to the standard deviation of the probability density function of the population. Thus, it is appropriate to exploit the average standard deviation or the maximum standard deviation of all subjects to compute the suitable margin. In this paper, we adopt the maximum standard deviation for margin computation, which represents the worst-case noise. Specifically, the margin  m f  can be computed as follows for the 1-bit case:
0 m f N ( 0 , σ S j ) = 1 2 α , σ S j = max i = 1 k { σ S i }
In addition, the margins  m X f  and  m Y f  for the x-axis and y-axis, respectively, are computed analogously for the 2-bit case as follows:
0 m Y f 0 m X f N ( [ 0 , 0 ] , σ S j , X 0 0 σ S j , Y ) = 1 2 α , σ S j , X 2 + σ S j , Y 2 = max i = 1 k σ S i , X 2 + σ S i , Y 2
Note that the above equations can also be extended to three or more bits using the proposed approach.
Individual-Specific Feature Selection and Key Generation. After determining the population center and margins, it is essential to select reliable features for each subject (the identification results using all features with different classifiers are shown in Table S1 in the Supplementary Material, which are relatively low). First, for subject  S i , we compute the center point by fitting the probability distribution of  S i  into Gaussian functions. For feature f, we define f is reliable for  S i  when the distance of the center point of  S i  from the center point of population  μ p o p f  is greater than the margin  m f , as shown in (6) and (7) for 1-bit and 2-bit cases, respectively:
| μ S i f μ p o p f | m f
| μ S i , X f μ p o p , X f | m X f , | μ S i , Y f μ p o p , Y f | m Y f
Then, we compute each sample of the training set of  S i  to determine whether the feature f is reliable. Here, we employ another parameter  β  for feature selection, and if the proportion of the valid samples in the training set is greater than  β , feature f is considered to be reliable for  S i . The indices of features for each subject are stored as helper data. Note that, provided the entropy is sufficiently high, the helper data do not leak essential information.
After selecting reliable features, we can generate keys with particular encoding rules. Figure 3 illustrates the fundamental encoding principle, where each feature is encoded as  [ 0 , 1 ]  and  [ 00 , 01 , 11 , 10 ]  separately. With the population center and margins, we can compute the boundaries of the code areas for each feature. For example, in the 1-bit case, the left boundary is  μ p o p f m f  and the right boundary is  μ p o p f + m f . The encoding rules for both the 1-bit and 2-bit cases are described as follows:
c o d e = 0 , μ S i f < μ p o p f m f 1 , μ S i f > μ p o p f + m f
c o d e = 00 , μ S i , X f < μ p o p , X f m X f & μ S i , Y f > μ p o p , Y f + m Y f 01 , μ S i , X f > μ p o p , X f + m X f & μ S i , Y f > μ p o p , Y f + m Y f 10 , μ S i , X f < μ p o p , X f m X f & μ S i , Y f < μ p o p , Y f m Y f 11 , μ S i , X f > μ p o p , X f + m X f & μ S i , Y f < μ p o p , Y f m Y f
Finally, we compute the code of each reliable feature and combine these codes as the target key template for the subject. The key template is then stored in a secure storage medium, e.g., a database on a disk storage device.
Individual authentication. In the authentication process, we input the features of the user and combine the codes regenerated with reliable feature indices in the helper data to obtain the key. Here, we utilize parameter  γ  as the threshold to distinguish the correct subject from other subjects. Specifically, we compute the Hamming distance of the regenerated key with the key template as the key similarity. Each subject has a separate threshold  γ , and it is matched only when the key similarity is greater than  γ  of the target subject. To obtain the optimal  γ  value for each subject, we utilize a validation set to regenerate keys and compute the evaluation metrics with different  γ  values. Finally, for a given  γ  value, we regenerate keys using the test set and obtain the authentication performance.
In this paper, to acquire sufficiently long keys and realize high computational efficiency, we consider the 2-bit case in our experiments, and the pseudo code is shown in Algorithms 1–3. As mentioned previously, each trial has 96 features, which are placed into pairwise combinations to obtain  C 96 2 = 4560  feature combinations in two-dimensional space for key generation.
Algorithm 1. MGFBA Population Parameter Computation
Input:  α , population statistics
 1:
  μ p o p , X f μ p o p , Y f σ p o p , X f σ p o p , Y f ← Gaussian fitting with population statistics
 2:
  m X f m Y f ← Equation (5) using  α σ p o p , X f σ p o p , Y f
Output: population center point ( μ p o p , X f μ p o p , Y f ), population standard deviation ( σ p o p , X f σ p o p , Y f ), margin( m X f m Y f )
Algorithm 2. MGFBA Feature Selection and Key Generation
Input:  β , individual statistics, population center point, margin
 1:
 Initialization: i ← 1, N ← number of individuals
 2:
 for i ← 1 N do
 3:
    μ S i , X f μ S i , Y f ← Gaussian fitting with individual i statistics
 4:
    f i , 1 f i , 2 , . . . ← Equation (7) using  β μ p o p , X f μ p o p , Y f m X f m Y f
 5:
    γ i k T , i ← Equation (9) using  f i , 1 f i , 2 μ p o p , X f μ p o p , Y f m X f m Y f μ S i , X f μ S i , Y f
 6:
 end for
Output: reliable feature index of individual i( f i , 1 f i , 2 , . . . ), similarity threshold of individual i( γ i ), key template of individual i( k T , i )
Algorithm 3. MGFBA Individual Authentication
Input:  γ , individual statistics, population center point, margin, reliable feature index of individuals, similarity threshold of individuals, key template of individuals
 1:
 Initialization: i ← 1, N ← number of individuals
 2:
 for i ← 1 N do
 3:
    μ S i , X f μ S i , Y f ← Gaussian fitting with individual i statistics
 4:
    k i ← Equation (9) using  f i , 1 f i , 2 μ p o p , X f μ p o p , Y f m X f m Y f μ S i , X f μ S i , Y f
 5:
    R e s i ← compare  k i  and  k T , i  using  γ i
 6:
 end for
Output: Authentication result of individual i( R e s i )

3. Experimental Setup and Results

3.1. Data Acquisition

The main dataset used to evaluate the proposed MGFBA method included LFP signals recorded in rats. For these animal experiments, 10 adult male Sprague-Dawley rats (300–350 g) were used.
Behavior tasks. To validate the cancellability of MGFBA, the rats were trained to perform three unique behavior tasks: (1) running on a treadmill, (2) single-pellet retrieval, and (3) lever pressing. Here, each rat followed a training process for approximately one week. Treadmill running. A 80 cm × 9 cm × 12 cm treadmill was utilized to encourage the rats to run. Here, the speed was set to 10 m/min. For each experiment day, we collected five minutes of running data for each rat. The data were inspected visually to remove periods in which the rats were not running. Single-pellet retrieval. We used a reaching chamber where pellets were placed in front of a hole on the chamber for the rats to grab. Here, the rat stretching out and drawing back its paw was considered a single trial, and a laser facility was used to record the timestamp of each trial. We trained the rats to perform this task with the left forelimb. During this experiment, the reaching timestamps were recorded, and for each session, the rats performed the grabbing task for 10 min. Lever pressing. Here, we used a behavior box, and we trained the rats to perform a lever press task, where water was provided as a reward when the rats pressed the lever down over a pressure threshold. All rats were required to use the left forelimb to perform this task. Prior to each experiment day, water was restricted moderately to 10–15 mL per day to enhance the rats’ lever-pressing performance. During the experiment, the pressure values of the lever were recorded for subsequent analysis. In each session, the rats were required to press the lever for a total of 15 min.
Neural signal collection and dataset partition. The LFP signals were recorded using a 16-channel ( 2 × 8 ) handmade microelectrode array (35 μm nichrome) implanted over the right premotor cortex (RFA; 2.5 mm lateral and 3.5 mm anterior to bregma), as shown in Figure 4. The anterior  2 × 4  electrodes were implanted in the RFA, and the posterior  2 × 4  electrodes were in the CFA at a depth of 1.2–1.5 mm in layer V. All data were recorded using a multichannel neural signal acquisition system (OmniPlex/128, Plexon TM, Dallas, TX, USA) with an amplification of 1750 and 50-Hz notch filter. The behavior data were recorded simultaneously with neural signals at a sampling rate of 1 kHz. For different behavior tasks, we collected the neural and behavior data for 5∼11 days. We utilized 80% of the dataset as a training set, 10% as a validation set, and 10% as a test set. We employed the training set to compute the population parameters, select reliable features, and generate key templates for subjects, and we used the validation set to select the optimal values for parameters  α β , and  γ .

3.2. Evaluation Metrics

Our primary focus is identity authentication; thus, we considered common metrics used to evaluate biometric authentication, such as authentication accuracy, false acceptance rate, and key length. The formulas of the authentication accuracy and false acceptance rate are as follows:
A u t h e n t i c a t i o n A c c u r a c y = 1 N ( i = 1 N i s V a l i d ( k i , k T ) )
F a l s e A c c e p t a n c e R a t e = i = 1 M j = 1 N i i s V a l i d ( k i j , k T ) i = 1 M N i
i s V a l i d ( k 1 , k 2 ) = 1 , H D ( k 1 , k 2 ) γ 0 , H D ( k 1 , k 2 ) > γ
For a subject S, we calculated the authentication accuracy by counting the number of valid keys using all samples of subject S (one sample generated one key). Here, we compared the value of HD (Hamming Distance) between the generated key  k i  and the key template  k T  of subject S to validate the generated key as shown in Equation (12), where  γ  is a similarity threshold. As for the false acceptance rate, we computed the number of valid keys using all samples of other subjects, where M represents the number of other subjects and  N i  represents the number of samples of other subject i.
In addition, to measure the randomness of the generated keys, we computed the entropy of the keys, which should be sufficiently large to resist attacks. Here, we calculated the min-entropy of feature f as follows:
E ( f ) = δ l o g 2 ( max i = 1 n { P i ( f ) } )
P i ( f ) = C o u n t ( X = B i ) j = 1 n C o u n t ( X = B j )
where  B i  represents the  i t h  bit combination in the total n bit combinations, i.e.,  B i { 0 , 1 } ( n = 2 )  and  B i { 00 , 01 , 11 , 10 } ( n = 4 )  for the 1-bit and 2-bit cases, respectively. Here,  C o u n t ( X )  is the number of samples in code area X P i ( f )  represents the probability of bit combination i, and  E ( f )  is the proportion of the bit combination with the maximum samples. In addition,  δ  is a normalizing parameter, which is 1 and  1 2  for the 1-bit and 2-bit cases, respectively. Note that the maximum value of min-entropy is 1 if and only if  P i ( f ) = 1 2 m ( i m , m = 1 , 2 , . . . ) , where m is the length of the bit combination. If the min-entropy is close to 1, it is nearly impossible to guess the correct bit combination for the feature. In our evaluations, we computed the average min-entropy of all features to investigate the security performance of the proposed method.

3.3. Performance of Brain-Based Authentication

Table 1 shows the evaluation results obtained for the three behaviors for all rats. For the running behavior, seven rats achieved 100% authentication accuracy, six rats obtained a 0% false acceptance rate, and the average authentication accuracy and false acceptance rate were 87.5% and 3.9%, respectively. For the grabbing behavior, eight rats obtained 100% authentication accuracy, seven rats obtained a 0% false acceptance rate, and the average authentication accuracy and false acceptance rate were 84.0% and 1.8%, respectively. In terms of the pressing behavior, eight rats obtained 100% authentication accuracy, a total of 10 obtained a 0% false acceptance rate, and the average authentication accuracy and false acceptance rate were 92.9% and 0%, respectively. These results demonstrate that that, among the three behaviors, the best performance was obtained for the pressing behavior. The difference in performance between the behaviors may be due to the fact that the grabbing behavior always involved a chewing noise from the rats, and the running behavior was strenuous with more electromyography and background noise. In contrast, the pressing behavior was conducted in an insulated box, and this behavior is more moderate than the other behaviors and involves less noise-related influence. In addition, the average key lengths were 892 bits, 1209 bits, and 713 bits for the running, grabbing, and pressing behaviors, respectively. These key lengths are all sufficiently long to satisfy security requirements. Note that some rats obtained considerable key lengths. For example, as shown in Table 1, Rat-6 obtained 3780 bits, 4222 bits, and 4412 bits with 100% authentication accuracy and 0% false acceptance rate for the three behaviors, which demonstrates that the proposed method can generate sufficiently long keys with high reliability and security. We also found that rats have their own preferred behaviors. For example, Rat-5 obtained 938 bits for the running behavior while obtaining only 32 bits for the pressing behavior. Similarly, Rat-10 obtained 1636 bits for the grabbing behavior while obtaining only 408 bits for the pressing behavior. It is likely that different subjects may achieve better performance with specific behaviors, which can inform us in terms of selecting optimal behaviors for different subjects. In addition, as shown in Figure 5a, the average entropy of the total 4560 feature combinations was 0.75, 0.68, and 0.69 for the three behaviors, respectively, which is sufficiently high for key security. Overall, we found that the performance obtained for all behaviors was satisfactory.

3.4. Revocability

To verify the revocability of the proposed method, we computed the false acceptance rate of other behaviors relative to a given behavior. As shown in Figure 5b, the false acceptance rate was effectively less than 10% for the grabbing and pressing behaviors, while that of the running behavior was greater than that of other behaviors. Specifically, the false acceptance rates of other behaviors relative to running behavior were 13.0% and 24.1%, those for the grabbing behavior were 11.2% and 9.6%, and those for the pressing behavior were 7.7% and 4.7%. These results are relatively higher than the values of the false acceptance rates shown in Table 1, and we discuss the reasons for these differences in the following. On the one hand, the similarity of the brain signals between the behaviors of a rat is naturally higher than the similarity of a behavior between rats. On the other hand, electrode noise that was not eliminated during the preprocessing step could be present; thus, the brain signals may have some duplication between the behaviors of a rat. For example, the brain signals for the pressing behavior exhibited the minimum noise among the three behaviors; therefore, the duplication portion of noise is smaller, and the performance is better. However, for the running behavior, due to the strenuous movements involved, there were more electromyography and background noise, which reduced the proportion of the effective brain signals. If we further optimize the preprocessing steps to reduce additional noise, we think that the false acceptance rate can be controlled within 5%. Overall, we think that it is feasible to generate different reliable keys between behaviors with the proposed method.
Figure 5. (a) Average entropy of three behaviors. (b) Performance of revocability between behaviors. (c) Average authentication accuracy of nine rats over 28 days. (d) Average false acceptance rate of nine rats over 28 days. (e) Average authentication accuracy of each rat over 28 days. Each color corresponds to a rat. (f) Average false acceptance rate of each rat over 28 days. Each color corresponds to a rat.
Figure 5. (a) Average entropy of three behaviors. (b) Performance of revocability between behaviors. (c) Average authentication accuracy of nine rats over 28 days. (d) Average false acceptance rate of nine rats over 28 days. (e) Average authentication accuracy of each rat over 28 days. Each color corresponds to a rat. (f) Average false acceptance rate of each rat over 28 days. Each color corresponds to a rat.
Bioengineering 10 00912 g005

3.5. Long-Term Stability

To examine the long-term stability of the proposed method, we collected the brain signals for the ruxnning behavior every three days for 40 days with nine rats (one rat died prior to the acquisition). Specifically, in total, we obtained 14-day data after one month of collection. Here, we utilized previous 4-day data for training and the remaining 10-day data for test (the duration of test is 28 days). As shown in Figure 5c, the authentication accuracy decreased slightly over time, and the authentication accuracies of test day-1 and test day-28 were 83.6% and 66.7%, respectively. As shown in Figure 5d, the value for the false acceptance rate also declined. The false acceptance rates of test day-1 and test day-28 were 7.3% and 3.0%, respectively. The reason for the above results may be that the noise in the brain signals was larger due to electrode drift. With more noise signals and less reliable features, the authentication accuracy decreased. However, due to the irregular noise signals, the probability of false authentication was also lower. Surprisingly, some rats exhibited excellent performance during the long-term experiments. As shown in Figure 5e, Rat-2 and Rat-7 effectively obtained nearly 100% authentication accuracy from test day-1 to test day-28, and Rat-1 and Rat-6 achieved greater than 80% authentication accuracy from test day-1 to test day-28. These results demonstrate that the proposed method realizes outstanding long-term stability. However, the authentication accuracy of some rats was relatively low, e.g., Rat-4 and Rat-5. Possible reasons for this poor performance may include obvious electrode drift and biological changes in the brain’s neural cells, thereby leading to increased noise and less effective information for the key generation process. Overall, we achieved an average authentication accuracy of 74.2% and an average false acceptance rate of 5.9% for nine rats during the one-month experimental period, which demonstrates that the proposed method is sufficiently practical for long-term key generation. We believe that the long-term performance can be improved by using superior electrode materials and implementing better preprocessing steps to eliminate more noise.

3.6. Influence of Parameters

3.6.1. Training Size

In the following, we examine the influence of different numbers of training days on the key generation performance. Here, we computed the evaluation metrics of training days 1 to 8 for the running and grabbing behaviors and days 1 to 4 for the pressing behavior. As shown in Figure 6a–c, for all three behaviors, the authentication accuracy increased slightly using different numbers of training days, the false acceptance rate was approximately 3%, and the entropy was approximately 0.7. These results prove that the brain signals remained effective over several days, and the performance was stable. In addition, we obtained an authentication accuracy of approximately 80% using only one training day. These results demonstrate that we can utilize fewer training days to realize comparable performance, which can greatly reduce the pressure for training models and provide convenience in practical application.

3.6.2. Number of LFP Channels

We also investigated the influence of different numbers of training channels on the key generation performance, including 4∼96 channels. As shown in Figure 6d, the authentication accuracy increased rapidly up to 32 channels for both the running and grabbing behaviors and up to 16 channels for the pressing behavior. Then, the authentication accuracy remained stable for all three behaviors with increasing numbers of training channels. Thus, we consider that using 32 channels for the running and grabbing behaviors and 16 channels for the pressing behavior is sufficient for the key generation process. In terms of the false acceptance rate, the values decreased slightly with an increasing numbers of channels. It is likely that with more channels, we can obtain more essential differences of the brain signals between rats, which is expected to enhance the invasion difficulty. For entropy, we found that the values increased up to 16 channels and then remained stable. A possible reason for this increase is that the population information was inadequate for stable feature distribution with fewer than 16 channels. Overall, it is feasible that we can adopt fewer channels to generate stable and secure keys, which can ease the demand for the electrode and acquisition equipment.

3.6.3. Parameter  α

In this section, we compare the performance of the three behaviors with different  α  values ranging from 0.20 to 0.49. As shown in Figure 7, the authentication accuracy increased with increasing  α  values. We consider the reason could be that there may be few stable combinations with a low  α  value, which has stricter restrictions in terms of key generation, and this leads to low authentication accuracy. In terms of the false acceptance rate, the value increased slightly with the increasing  α  value, which is reasonable due to the narrower boundaries and larger code areas. In addition, for both entropy and key length, more reliable feature combinations are joined; thus, the results are improved with larger  α  values.

3.6.4. Parameter  β

We also observed the performance of the three behaviors using different  β  values ranging from 0.1 to 1.0. As shown in Figure 8, the authentication accuracy increased up to a  β  value of 0.9 and then declined. Obviously, with a higher  β  value, we could pick out more stable combinations, which could generate more reliable keys and improve authentication accuracy. However, when  β  reached 1.0, the restriction was too high to regenerate identical keys; thus, the accuracy declined considerably. In terms of the false acceptance rate and key length, the values increased slightly due to the lower number of reliable combinations. While entropy is not associated with  β , the value was constant using different  β  values.

4. Discussion

To the best of our knowledge, this study is the first to propose a brain-based key generation method that uses intracortical brain signals. In this paper, we have demonstrated the potential to provide both reliable and revocable biometrics. We found that the proposed MGFBA method can reliably generate long keys (up to 4412 bits) from the LFPs, which is suitable for various security applications, e.g., electronic cash applications and secure multiparty computation. In addition, the proposed brain biometrics can be revoked easily by changing the paradigms. However, in this study, we only experimented on rats with three specific behaviors; thus, the theoretical challenge and response pairs may be huge. In addition, we found that the proposed method also obtains good long-term stability over a one-month period, which demonstrates its feasibility for practical use.
Currently, most studies utilize EEG as the main source for biometric construction due to the convenience of signal acquisition [19,20,21,22,23,24]. However, a major problem with EEG is its low SNR because the brain’s electrical signals decay significantly while passing through the skull and scalp. Thus, an EEG-based system cannot realize sufficiently high reliability due to the signal quality, and the revocability is highly limited [25]. In addition, the electrode drift problem with EEG is an inherent limitation once the EEG cap is removed and then worn again, which results in insufficient long-term stability. A previous study [26] evaluated the performance of EEG over time and demonstrated a significantly decreasing trend. Thus, using intracortical brain signals, e.g., LFPs, can provide a better option for high-performance brain biometric construction because these signals are recorded with electrodes placed directly on the cortex such that they are higher resolution with sufficient SNR [27,28].
We also identified several limitations with the proposed method. Notwithstanding, brain biometrics also exist many potential problems. In this study, we utilized intracortical brain signals to obtain sufficient performance; however, the implanted electrodes used for signal acquisition may be invalid or suffer from the drift problem, which would lead to a reduction in long-term stability. In addition, the noise of the implanted electrodes may mix into the effective brain signals; thus, such noise may be incorrectly considered as effective signals. However, we believe that these limitations can be overcome with the ongoing development of acquisition equipment and optimization of the preprocessing steps. As shown in Figure 4e,f, the long-term performance obtained with Rat-2 and Rat-7 was excellent, with nearly 100% authentication accuracy and a 0% false acceptance rate, which demonstrates that brain signals are capable of providing long-term stability. Thus, with more stable equipment, the performance of brain biometrics can be improved further.
Similarly, the cancellability performance can also be affected by the noise of implanted electrodes. Such noise may be computed as features for key generation, which could increase the similarity of keys between different behaviors. We also found that the intensity of the behaviors influences the false acceptance rate between behaviors, as shown in Figure 4b. With increasing intensity, the noise of the electrode becomes obvious. With slight behaviors, e.g., the pressing behavior, the performance was significantly better than that for the running behavior. Thus, electrode noise is the main factor influencing cancellability performance, which could be solved by further optimization of the preprocessing steps. Overall, our results prove that the cancellability of brain metrics is good, and the performance can be improved further with additional optimization.

5. Conclusions

In this paper, we have proposed a key generation method that extracts keys from the LFP with high reliability and entropy. In addition, we found that intracranial brain signals can be excellent biometric features with outstanding reliability and cancellability due to the higher spatial and temporal resolution than EEG signals. The proposed MGFBA approach can reliably generate long keys (up to 4412 bits) from the LFPs, which is suitable for various security applications, e.g., electronic cash applications and secure multiparty computation. The experimental results demonstrate that a 938-bit key on average can be generated from the LFP signals from three behaviors at an authentication accuracy of 88.1% and false acceptance rate of 1.9%. Furthermore, we can easily transform the behaviors to generate different reliable and secure keys, which proves that brain biometrics are revocable. We think that our work has demonstrated the potential of using intracortical brain signals for reliable authentication and other security applications, e.g., brain–computer interfaces.

Supplementary Materials

The following supporting information can be downloaded at: https://www.mdpi.com/article/10.3390/bioengineering10080912/s1, Figure S1: The exact 96 feature distribution of Rat-1; Figure S2: The exact 96 feature distribution of Rat-2; Figure S3: The exact 96 feature distribution of Rat-3; Figure S4: The exact 96 feature distribution of Rat-4; Figure S5: The exact 96 feature distribution of Rat-5; Figure S6: The exact 96 feature distribution of Rat-6; Figure S7: The exact 96 feature distribution of Rat-7; Figure S8: The exact 96 feature distribution of Rat-8; Figure S9: The exact 96 feature distribution of Rat-9; Figure S10: The exact 96 feature distribution of Rat-10; Table S1: The identification results with different classifiers using 96-dim features.

Author Contributions

Conceptualization, M.L. and Y.Q.; methodology, M.L.; software, M.L.; validation, M.L., Y.Q. and G.P.; formal analysis, M.L.; investigation, M.L.; resources, G.P.; data curation, M.L.; writing—original draft preparation, M.L.; writing—review and editing, M.L.; visualization, M.L.; supervision, Y.Q.; project administration, G.P.; funding acquisition, G.P. All authors have read and agreed to the published version of the manuscript.

Funding

This work was partly supported by grants from the China Brain Project (2021ZD0200400) (to G.P.), the Natural Science Foundation of China (U1909202 and 61925603) (to G.P.), and the Key Research and Development Program of Zhejiang Province in China (2020C03004) (to G.P.).

Institutional Review Board Statement

All surgery and experimental procedures involving rats in this study strictly adhered to the Guide for The Care and Use of Laboratory Animals (China Ministry of Health) and were approved by the Laboratory Animal Welfare and Ethics Committee of Zhejiang University (Ethics Code: ZJU20210057).

Informed Consent Statement

Not applicable.

Data Availability Statement

The datasets are available on reasonable requests from the corresponding author.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Tatlı, E.I. Cracking more password hashes with patterns. IEEE Trans. Inf. Forensics Secur. 2015, 10, 1656–1665. [Google Scholar] [CrossRef]
  2. Uludag, U.; Pankanti, S.; Prabhakar, S.; Jain, A.K. Biometric cryptosystems: Issues and challenges. Proc. IEEE 2004, 92, 948–960. [Google Scholar] [CrossRef]
  3. Jain, A.K.; Ross, A.; Pankanti, S. Biometrics: A tool for information security. IEEE Trans. Inf. Forensics Secur. 2006, 1, 125–143. [Google Scholar]
  4. Jin, Z.; Teoh, A.B.J.; Goi, B.-M.; Tay, Y.-H. Biometric cryptosystems: A new biometric key binding and its implementation for fingerprint minutiae-based representation. Pattern Recognit. 2016, 56, 50–62. [Google Scholar] [CrossRef]
  5. Ratha, N.K.; Chikkerur, S.; Connell, J.H.; Bolle, R.M. Generating cancelable fingerprint templates. IEEE Trans. Pattern Anal. Mach. Intell. 2007, 29, 561–572. [Google Scholar] [CrossRef]
  6. He, X.; Yan, S.; Hu, Y.; Niyogi, P.; Zhang, H.-J. Face recognition using laplacianfaces. IEEE Trans. Pattern Anal. Mach. Intell. 2005, 27, 328–340. [Google Scholar]
  7. Wildes, R.P. Iris recognition: An emerging biometric technology. Proc. IEEE 1997, 85, 1348–1363. [Google Scholar] [CrossRef]
  8. Jain, A.K.; Ross, A.; Prabhakar, S. An introduction to biometric recognition. IEEE Trans. Circuits Syst. Video Technol. 2004, 14, 4–20. [Google Scholar] [CrossRef] [Green Version]
  9. Marasco, E.; Ross, A. A survey on antispoofing schemes for fingerprint recognition systems. ACM Comput. Surv. 2014, 47, 1–36. [Google Scholar] [CrossRef]
  10. Matsumoto, T.; Matsumoto, H.; Yamada, K.; Hoshino, S. Impact of artificial “gummy” fingers on fingerprint systems. In Optical Security and Counterfeit Deterrence Techniques IV; Electronic Imaging: San Jose, CA, USA, 2002; Volume 4677, pp. 275–289. [Google Scholar]
  11. Galbally, J.; Ross, A.; Gomez-Barrero, M.; Fierrez, J.; Ortega-Garcia, J. From the iriscode to the iris: A new vulnerability of iris recognition systems. Black Hat Briefings USA 2012, 1, 8. [Google Scholar]
  12. Leier, A.; Richter, C.; Banzhaf, W.; Rauhe, H. Cryptography with DNA binary strands. Biosystems 2000, 57, 13–22. [Google Scholar] [CrossRef] [PubMed]
  13. Odinaka, I.; Lai, P.-H.; Kaplan, A.D.; O’Sullivan, J.A.; Sirevaag, E.J.; Rohrbaugh, J.W. ECG biometric recognition: A comparative analysis. IEEE Trans. Inf. Forensics Secur. 2012, 7, 1812–1824. [Google Scholar] [CrossRef]
  14. Karimian, N.; Guo, Z.; Tehranipoor, M.; Forte, D. Highly reliable key generation from electrocardiogram (ECG). IEEE Trans. Biomed. Eng. 2016, 64, 1400–1411. [Google Scholar] [CrossRef]
  15. Monrose, F.; Reiter, M.K.; Wetzel, S. Password hardening based on keystroke dynamics. Int. J. Inf. Secur. 2002, 1, 69–83. [Google Scholar] [CrossRef] [Green Version]
  16. Feng, H.; Wah, C.C. Private key generation from on-line handwritten signatures. Inf. Manag. Comput. Secur. 2002, 10, 159–164. [Google Scholar] [CrossRef] [Green Version]
  17. Vielhauer, C.; Steinmetz, R. Handwriting: Feature correlation analysis for biometric hashes. EURASIP J. Adv. Signal Process. 2004, 2004, 389304. [Google Scholar] [CrossRef] [Green Version]
  18. Freire-Santos, M.; Fierrez-Aguilar, J.; Ortega-García, J. Cryptographic key generation using handwritten signature. In Biometric Technology for Human Identification III; Defense and Security Symposium: Orlando (Kissimmee), FL, USA, 2006; Volume 6202, pp. 225–231. [Google Scholar]
  19. Lin, F.; Cho, K.W.; Song, C.; Jin, Z.; Xu, W. Exploring a brain-based cancelable biometrics for smart headwear: Concept, implementation, and evaluation. IEEE Trans. Mob. Comput. 2019, 19, 2774–2792. [Google Scholar] [CrossRef]
  20. Wang, M.; El-Fiqi, H.; Hu, J.; Abbass, H.A. Convolutional neural networks using dynamic functional connectivity for EEG-based person identification in diverse human states. IEEE Trans. Inf. Forensics Secur. 2019, 14, 3259–3272. [Google Scholar] [CrossRef]
  21. Cheng, B.; Fan, C.; Fu, H.; Huang, J.; Chen, H.; Luo, X. Measuring and computing cognitive statuses of construction workers based on electroencephalogram: A critical review. IEEE Trans. Comput. Soc. Syst. 2022, 9, 1644–1659. [Google Scholar] [CrossRef]
  22. Altaheri, H.; Muhammad, G.; Alsulaiman, M.; Amin, S.U.; Altuwaijri, G.A.; Abdul, W.; Bencherif, M.A.; Faisal, M. Deep learning techniques for classification of electroencephalogram (EEG) motor imagery (MI) signals: A review. Neural Comput. Applic 2023, 35, 14681–14722. [Google Scholar] [CrossRef]
  23. Gu, X.; Cai, W.; Gao, M.; Jiang, Y.; Ning, X.; Qian, P. Multi-Source domain transfer discriminative dictionary learning modeling for electroencephalogram-based emotion recognition. IEEE Trans. Comput. Soc. Syst. 2022, 9, 1604–1612. [Google Scholar] [CrossRef]
  24. Peng, Y.; Jin, F.; Kong, W.; Nie, F.; Lu, B.-L.; Cichocki, A. OGSSL: A semi-supervised classification model coupled with optimal graph learning for EEG emotion recognition. IEEE Trans. Neural Syst. Rehabil. Eng. 2022, 30, 1288–1297. [Google Scholar] [CrossRef] [PubMed]
  25. Gui, Q.; Ruiz-Blondet, M.V.; Laszlo, S.; Jin, Z. A survey on brain biometrics. ACM Comput. Surv. (CSUR) 2019, 51, 1–38. [Google Scholar] [CrossRef]
  26. Maiorana, E.; Campisi, P. Longitudinal evaluation of EEG-based biometric recognition. IEEE Trans. Inf. Forensics Secur. 2017, 13, 1123–1138. [Google Scholar] [CrossRef]
  27. Collinger, J.L.; Wodlinger, B.; Downey, J.E.; Wang, W.; Tyler-Kabara, E.C.; Weber, D.J.; McMorl, A.J.; Velliste, M.; Boninger, M.L.; Schwartz, A.B. High-performance neuroprosthetic control by an individual with tetraplegia. The Lancet 2013, 381, 557–564. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  28. Bouton, C.E.; Shaikhouni, A.; Annetta, N.V.; Bockbrader, M.A.; Friedenberg, D.A.; Nielson, D.M.; Sharma, G.; Sederberg, P.B.; Glenn, B.C.; Mysiw, W.J.; et al. Restoring cortical control of functional movement in a human with quadriplegia. Nature 2016, 533, 760. [Google Scholar] [CrossRef]
Figure 1. Flowchart of registration and authentication of the biometrics.
Figure 1. Flowchart of registration and authentication of the biometrics.
Bioengineering 10 00912 g001
Figure 2. Block diagrams of MGFBA quantization.
Figure 2. Block diagrams of MGFBA quantization.
Bioengineering 10 00912 g002
Figure 3. Feature encoding and quantization of the (a) 1-bit case and (b) 2-bit case with the proposed MGFBA method. For the 1-bit case, the central red curve represents the probability distribution of the entire population, and the other two curves represent the probability distributions of different subjects in the population. For the 2-bit case, the central red circle represents the probability distribution of the entire population, and the other four circles represent the probability distributions of different subjects in the population. The solid and dotted lines represent the population center and the boundaries of different code areas, respectively.
Figure 3. Feature encoding and quantization of the (a) 1-bit case and (b) 2-bit case with the proposed MGFBA method. For the 1-bit case, the central red curve represents the probability distribution of the entire population, and the other two curves represent the probability distributions of different subjects in the population. For the 2-bit case, the central red circle represents the probability distribution of the entire population, and the other four circles represent the probability distributions of different subjects in the population. The solid and dotted lines represent the population center and the boundaries of different code areas, respectively.
Bioengineering 10 00912 g003
Figure 4. Schematic diagram of intracortical brain signal collection of the rat. The gray circle of CFA stands for the ischemic area, and the green areas of both CFA and RFA show the location of electrodes (dark yellow). A 16-channel ( 2 × 8 ) handmade microelectrode array (35 μm nichrome) was implanted to collect the brain signals.
Figure 4. Schematic diagram of intracortical brain signal collection of the rat. The gray circle of CFA stands for the ischemic area, and the green areas of both CFA and RFA show the location of electrodes (dark yellow). A 16-channel ( 2 × 8 ) handmade microelectrode array (35 μm nichrome) was implanted to collect the brain signals.
Bioengineering 10 00912 g004
Figure 6. Performance using different numbers of training days and training channels. (a) Average authentication accuracy using different numbers of training days. (b) Average false acceptance rate using different numbers of training days. (c) Average entropy using different numbers of training days. (d) Average authentication accuracy using different numbers of training channels. (e) Average false acceptance rate using different numbers of training channels. (f) Average entropy using different numbers of training channels.
Figure 6. Performance using different numbers of training days and training channels. (a) Average authentication accuracy using different numbers of training days. (b) Average false acceptance rate using different numbers of training days. (c) Average entropy using different numbers of training days. (d) Average authentication accuracy using different numbers of training channels. (e) Average false acceptance rate using different numbers of training channels. (f) Average entropy using different numbers of training channels.
Bioengineering 10 00912 g006
Figure 7. Performance obtained with different  α  values (0.20–0.49) for three behaviors.
Figure 7. Performance obtained with different  α  values (0.20–0.49) for three behaviors.
Bioengineering 10 00912 g007
Figure 8. Performance obtained with different  β  values (0.1–1.0) for three behaviors.
Figure 8. Performance obtained with different  β  values (0.1–1.0) for three behaviors.
Bioengineering 10 00912 g008
Table 1. Performance with different motor behaviors.
Table 1. Performance with different motor behaviors.
RUNNINGRat-1Rat-2Rat-3Rat-4Rat-5Rat-6Rat-7Rat-8Rat-9Rat-10Avg
Authentication Accuracy1.000.750.500.501.001.001.001.001.001.000.88
False Acceptance Rate0.08000.11000.1100.0800.04
Key Length11143384882489383780740112301134892
GRABBINGRat-1Rat-2Rat-3Rat-4Rat-5Rat-6Rat-7Rat-8Rat-9Rat-10Avg
Authentication Accuracy0.231.000.171.001.001.001.001.001.001.000.84
False Acceptance Rate0000000.110.050.0300.02
Key Length21101341403582504222285823414816361209
PRESSINGRat-1Rat-2Rat-3Rat-4Rat-5Rat-6Rat-7Rat-8Rat-9Rat-10Avg
Authentication Accuracy1.001.001.001.001.001.000.890.401.001.000.93
False Acceptance Rate00000000000
Key Length6424836015032441265036660408713
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Li, M.; Qi, Y.; Pan, G. Encrypt with Your Mind: Reliable and Revocable Brain Biometrics via Multidimensional Gaussian Fitted Bit Allocation. Bioengineering 2023, 10, 912. https://doi.org/10.3390/bioengineering10080912

AMA Style

Li M, Qi Y, Pan G. Encrypt with Your Mind: Reliable and Revocable Brain Biometrics via Multidimensional Gaussian Fitted Bit Allocation. Bioengineering. 2023; 10(8):912. https://doi.org/10.3390/bioengineering10080912

Chicago/Turabian Style

Li, Ming, Yu Qi, and Gang Pan. 2023. "Encrypt with Your Mind: Reliable and Revocable Brain Biometrics via Multidimensional Gaussian Fitted Bit Allocation" Bioengineering 10, no. 8: 912. https://doi.org/10.3390/bioengineering10080912

APA Style

Li, M., Qi, Y., & Pan, G. (2023). Encrypt with Your Mind: Reliable and Revocable Brain Biometrics via Multidimensional Gaussian Fitted Bit Allocation. Bioengineering, 10(8), 912. https://doi.org/10.3390/bioengineering10080912

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop