303
Views
5
CrossRef citations to date
0
Altmetric
Articles

Towards the Use of Brain–Computer Interface and Gestural Technologies as a Potential Alternative to PIN Authentication

References

  • Abo-Zahhad, M., Ahmed, S., & Abbas, S. (2015). State-of-the-art methods and future perspectives for personal recognition based on electroencephalogram signals. IET Biometrics, 4(3), 179–190. doi:10.1049/iet-bmt.2014.0040
  • Abo-Zahhad, M., Ahmed, S. M., & Abbas, S. N. (2016). A new multi-level approach to EEG based human authentication using eye blinking. Pattern Recognition Letters, 82, 216–225. doi:10.1016/j.patrec.2015.07.034
  • Adams, A., & Sasse, M. A. (1999). Users are not the enemy. Communications of the ACM, 42(12), 40–46. doi:10.1145/322796.322806
  • Ali, A., Kuber, R., & Aviv, A. J. (2016). Developing and evaluating a gestural and tactile mobile interface to support user authentication. Proceedings of the iConference, 2016. doi:10.9776/16141.
  • Armstrong, B. C., Ruiz-Blondet, M. V., Khalifian, N., Kurtz, K. J., Jin, Z., & Laszlo, S. (2015). Brainprint: Assessing the uniqueness, collectability, and permanence of a novel method of ERP biometrics. Neurocomputing, 166, 59–67. doi:10.1016/j.neucom.2015.04.025
  • Ashby, C., Bhatia, A., Tenore, F., & Vogelstein, J. (2011). Low-Cost Electroencephalogram (EEG) based Authentication. 2011 5th International IEEE/EMBS Conference on Neural Engineering (NER) (pp. 442–445). Cancun, Mexico: IEEE.
  • Bianchi, A., Oakley, I., Kostakos, V., & Kwon, D. (2011). The Phone Lock: Audio and Haptic Shoulder-Surfing. Proceedings of the fifth international conference on Tangible, embedded, and embodied interaction (pp. 197–200). Funchal, Portugal: ACM.
  • Birbaumer, N. (2006). Breaking the silence: Brain-computer Interfaces (BCI) for communication and motor control. Psychophysiology, 43(6), 517–532. doi:10.1111/j.1469-8986.2006.00456.x
  • Chuang, J., Nguyen, H., Wang, C., & Johnson, B. (2013). I Think, Therefore I Am: Usability and Security of Authentication Using Brainwaves. Proceedings of the Workshop on Usable Security, USEC ’13 (pp. 1–16). Okinawa, Japan.
  • De Luca, A., Hertzschuch, K., & Hussmann, H. (2010). ColorPIN: Securing PIN entry through indirect input. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 1103–1106). Atlanta, GA USA: ACM.
  • De Luca, A., Von Zezschwitz, E., Nguyen, N., Maurer, M. E., Rubegni, E., Scipioni, M., & Langheinrich, M. (2013). Back-of-device authentication on smartphones. The 31st Annual CHI Conference on Human Factors in Computing Systems (pp. 2389–2398). Paris, France: ACM.
  • Den Hond, B. (2015). Your Brain’s unique response to words can reveal your identity. New Scientist. Retrieved from https://www.newscientist.com/article/dn27555-your-brains-unique-response-to-words-can-reveal-your-identity
  • Duvinage, M., Castermans, T., Petieau, M., Hoellinger, T., Cheron, G., & Dutoit, T. (2013). Performance of the Emotiv Epoc Headset for P300-based applications. Biomedical Engineering Online, 12, 56. doi:10.1186/1475-925X-12-56
  • Emotiv, Inc. (2014). Emotiv |EEG System |Electroencephalography. Retrieved from https://emotiv.com/
  • Friedman, D., Leeb, R., Guger, C., Steed, A., Pfurscheller, G., & Slater, M. (2007). Navigating virtual reality by thought: What is it like? Presence, 16(1), 100–110. doi:10.1162/pres.16.1.100
  • Harrison, T. (2013). The Emotiv Mind: Investigating the accuracy of the Emotiv EPOC in indentifying emotions and its use in an intelligent tutoring system. Honours Report. University of Canterbury, New Zealand, 1–59.
  • Jain, A. K., Ross, A., & Prabhakar, S. (2004). An introduction to biometric recognition. IEEE Transactions on Circuits and Systems for Video Technology, 14(1), 4–20. doi:10.1109/TCSVT.2003.818349
  • Johnson, B., Maillart, T., & Chuang, J. (2014). My thoughts are not your thoughts. 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp ‘14) (pp. 1329–1338). Seattle, WA USA: ACM.
  • Khalifa, W., Salem, A., & Roushdy, M. (2012). A survey of EEG based user authentication schemes. The 8th International Conference on INFOrmatics and Systems (INFOS2012) (pp. BIO–55). Giza, Egypt: IEEE.
  • Krishnaswamy, K., Kuber, R., & Oates, T. (2016). Developing a limb repositioning robotic interface for persons with severe physical disabilities. Universal Access in the Information Society, 15(4), 609–627. doi:10.1007/s10209-015-0439-7
  • Kromholz, K., Hupperich, T., & Holz, T. (2016). Use the force: Evaluating force-sensitive authenticaion for mobile devices. Twelfth Symposium on Usable Privacy and Security (SOUPS 2016) (pp. 207–219). Denver, CO USA.
  • Kuber, R., & Wright, F. P. (2013). Augmenting the instant messaging experience through the use of brain computer interface and gestural technologies. International Journal of Human-Computer Interaction, 29(3), 178–191. doi:10.1080/10447318.2012.702635
  • Kuber, R., & Yu, W. (2010). Feasibility study of tactile-based authentication. International Journal of Human-Computer Studies, 68, 158–181. doi:10.1016/j.ijhcs.2009.11.001
  • Kumar, P., Saini, R., Roy, P., & Dogra, D. (2017). A bio-signal based framework to secure mobile devices. Journal of Network and Computer Applications, 89, 62–71. doi:10.1016/j.jnca.2017.02.011
  • Li, Y., Nam, C. S., Shadden, B. B., & Johnson, S. L. (2011). A P300-based brain–computer interface: Effects of interface type and screen size. International Journal of Human-Computer Interaction, 27(1), 52–68. doi:10.1080/10447318.2011.535753
  • Lopez-Gordo, M., Ron-Angevin, R., & Pelayo, F. (2015). Authentication of brain-computer interface users in network applications. International Work-Conference on Artificial Neural Networks (pp. 124–132). Springer.
  • Mados, B., Adam, N., Hurtuk, J., & Copjak, M. (2013). Brain-computer interface and arduino microcontroller family software interconnection solution. 14th International Symposium on Applied Machine Intelligence and Infomatics (pp. 217–221). Herl’any Slovakia.
  • Mu, Z., Hu, J., & Min, J. (2016). EEG-based person authentication using a fuzzy entropy-related approach with two electrodes. Entropy, 18(12), 432. doi:10.3390/e18120432
  • Neurosky, Inc. (2017). Retrieved from https://neurosky.com/
  • O’Hara, K., Sellen, A., & Harper, R. (2011). Embodiment in brain-computer interaction. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 353–362). Vancouver, BC, Canada: ACM.
  • Palaniappan, R. (2008). Two-stage biometric authentication method using thought activity brain waves. International Journal of Neural Systems, 18(1), 59–66. doi:10.1142/S0129065708001373
  • Pham, T., Ma, W., Tran, D., Nguyen, P., & Phung, D. (2014). Multi-factor EEG-based user authentication. 2014 International Joint Conference on Neural Networks (IJCNN) (pp. 4029–4034). IEEE.
  • Pham, T., Ma, W., Tran, D., Tran, D., & Phung, D. (2015). A study on the stability of EEG signals for user authentication. 2015 7th International IEEE/EMBS Conference on Neural Engineering (NER) (pp. 122–125). IEEE.
  • Plass-Oude Bos, D., Reuderink, B., Van De Laar, B., Hayrettin, G., Muhl, C., Poel, M., … Nijholt, A. (2010). Human-computer interaction for BCI games: Usability and user experience. 2010 International Conference on Cyberworlds (CW) (pp. 277–281). Singapore: IEEE.
  • Said, K., Kuber, R., & Murphy, E. (2015). AudioAuth: Exploring the design and usability of a sound-based authentication system. International Journal of Mobile Human-Computer Interaction, 7(4), 16–34. doi:10.4018/IJMHCI
  • Sourina, O., & Liu, Y. (2011). A fractal-based algorithm of emotion recognition from eeg using arousal-valence model. In Biosignals (pp. 209–214). Rome, Italy.
  • Srinadhu, C., Addanki, S. K., & Acharyulu, B. R. (2011). Mirage 1.0: A key entry scheme resilient to shoulder-surfing. International Journal of Computer Applications, 29(1), 47–53. doi:10.5120/3526-4804
  • Takada, T., & Koike, H. (2003). Awase-E: Image-based authentication for mobile phones using user’s favorite images. International Conference on Mobile Human-Computer Interaction (pp. 347–351). Berlin Heidelberg: Springer.
  • Taylor, G. S., & Schmidt, C. (2012). Empirical evaluation of the Emotiv EPOC BCI headset for the detection of mental actions. Proceedings of the Human Factors and Ergonomics Society Annual Meeting. 56 pp. 197–197. Boston, Massachusetts USA: SAGE Publications.
  • Thorpe, J., Van Oorschot, P. C., & Somayaji, A. (2005). Pass-thoughts: Authenticating with our minds. Proceedings of the 2005 Workshop on New Security Paradigms (pp. 45–56). Lake Arrowhead, CA USA: ACM.
  • Wheeler, M., Wolf, F., & Kuber, R. (2013). Supporting augmented and alternative communication using a low-cost gestural device. Proceedings of the 15th International ACM Conference on Computers and Accessibility, Article No: 67.
  • Wolpaw, J. R., Birbaumer, N., McFarland, D. J., Pfurtscheller, G., & Vaughan, T. M. (2002). Brain–computer Interfaces for Communication and Control. Clinical Neurophysiology, 113(6), 767–791. doi:10.1016/S1388-2457(02)00057-3
  • Zhang, J., Chen, M., Zhao, S., Hu, S., Shi, Z., & Cao, Y. (2016). Relief-based EEG sensor selection methods for emotion recognition. Sensors, 16(10), 1558. doi:10.3390/s16101558
  • Zhao, S., Dragicevic, P., Chignell, M., Balakrishnan, R., & Baudisch, P. (2007). earPod: eyes-free menu selection using touch input and reactive audio feedback. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 1395–1404). San Jose, CA USA.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.