SlideShare una empresa de Scribd logo
1 de 10
Descargar para leer sin conexión
A RESEARCH PROPOSAL
Baseline Brainwave
         Biometrics
Baseline Brainwave Biometrics
                                              www.oliviamoran.me
Olivia Moran is a leading training specialist who specialises in E-Learning instructional design
and is a certified Moodle expert. She has been working as a trainer and course developer for 3
years developing and delivery training courses for traditional classroom, blended learning and
E-learning.




Courses Olivia Moran Has Delivered:
● MOS
● ECDL
● Internet Marketing
● Social Media
● Google [Getting Irish Businesses Online]
● Web Design [FETAC Level 5]
● Adobe Dreamweaver
● Adobe Flash
● Moodle

Specialties:
★Moodle [MCCC Moodle Certified Expert]
★ E Learning Tools/ Technologies [Commercial & Open Source]
★ Microsoft Office Specialist
★ Web Design & Online Content Writer
★ Adobe Dreamweaver, Flash & Photoshop

ABOUT THIS PAPER
This paper was written as part of a group collaboration between Olivia Moran, Eric Nichols and
Barry Feehily. It was submitted to the University of Ulster as part of the Masters in Computing
and Information Systems Management, Intelligent Systems and Design.
© Olivia Moran [www.oliviamoran.me] Baseline Brainwave Biometrics



1. ABSTRACT                                                  remain oblivious to the community of card
                                                             scanners, shoulder surfers and thieves who
                                                             constantly strive to come up with new and
Traditional as well as modern methods of
                                                             more innovative ways to steal their money and
identification are not capable of protecting
                                                             more importantly their identities.        The
the vast amounts of confidential data that
                                                             majority of passwords do not provide a
exists worldwide. Identity fraud has become a
                                                             satisfactory level of security. They can easily
billion pound industry (Travis 2006). This
                                                             be forgotten, stolen should they be written
document proposes the development of an
                                                             down, overheard and even guessed.
algorithm that can be used to identify an
individual using their unique baseline
                                                             Modern approaches namely biometrics offer
brainwave pattern. It addresses the need to
                                                             much more acceptable levels of security and
anticipate the ethical issues that will arise
                                                             protection     for    both    individuals   and
from the use of this biometric.         It also
                                                             corporations. The concept of biometrics is not
purposes to determine the legal position of
                                                             new. It has been around since the 1920’s
such a biometric technology in light of current
                                                             when the Federal Bureau of Investigation
legislation.    Relevant research previously
                                                             (F.B.I) in the United States (U.S.) introduced
conducted and their contributions are
                                                             fingerprinting technologies for the purpose of
examined in depth. The aims and objectives
                                                             identifying criminals. Since the beginning of
of the proposed research are clearly defined
                                                             its existence biometrics has developed into
and the rationale underlying this choice of
                                                             many forms, but not without each bringing
research is explained. All the methods and
                                                             their own limitations and shortfalls. The types
preliminary     design    required   for    the
                                                             most widely used today include retina, facial,
achievement of the proposed objectives are
                                                             Deoxyribonucleic Acid (D.N.A.) and iris
highlighted. The necessity of the proposed
                                                             recognition. Retina scanning has not been
research     along     with    the    potential
                                                             introduced to the same extent as facial, D.N.A.
contributions it could make to the field of
                                                             and iris recognition.       Retina scanning is
biometrics is argued.
                                                             concerned with the measurement of the
                                                             retina’s blood vessel patterns. The process of
2. INTRODUCTION                                              obtaining the retina scan is considered
                                                             personally invasive; time consuming and
The     current    methods       available    for            requires a very skilled operator.
identification of individual’s to present date
have had limited success in the fight against                Facial recognition examines the different
fraud,    identity   theft     and     terrorism.            features found on an individual’s face and
Techniques traditionally used such as personal               then analyses them in an attempt to establish
identification numbers (P.I.N.’s) and passwords              their identity.      Challenges in terms of
have many weaknesses and can easily be taken                 developing hardware that will successfully
advantage of by well clued in criminals.                     map the features of the face reliably and
Everyday, people worldwide key their P.I.N.’s                accurately have not yet been fully addressed.
into automatic teller machines (A.T.M.’s), send              A number of ethical issues have been raised
them over unsecured and unencrypted                          about the widespread use of this type of
networks and enter them in full view into                    technology mainly relating to the privacy
credit card machines in retail shops. They                   rights of individual’s. In 2001, facial scanning
© Olivia Moran [www.oliviamoran.me] Baseline Brainwave Biometrics


received a substantial amount of bad press                   Iris scanning along with the other forms of
when the F.B.I. in the U.S. tested out this                  biometrics mentioned cannot be used in
technology on every person entering the                      isolation if they wish to be effective. They
‘Raymond James Stadium’ during the                           need to offer a multimodal means of
superbowl. This process was undertaken in                    identification. A system only offering iris
complete secrecy thus creating a climate of                  recognition would exclude a substantial part
distrust towards such technologies.                          of the population who have either been born
                                                             without an iris or lost it through an accident.
D.N.A. testing is used to measure the genetic                The exclusion of users with disabilities could
make up i.e. genetic signature, which makes                  be deemed unethical and discriminatory and
an individual unique. The results of the test                even illegal under the legislation currently
can take a long time to compile compared to                  governing certain countries.
other methods such as facial and iris
recognition.       It is also incapable of                   The limitations and weaknesses associated
distinguishing monozygotic twins i.e. twins                  with the biometric technologies mentioned
who come from the same embryo. D.N.A.                        could be overcome by a relatively new
testing requires the acquisition of a sample of              biometric     technology     called    ‘Baseline
an individual’s D.N.A.. This sample is obtained              Brainwave Biometrics’. Such a technology
by taking a sample of cells from the inner side              could be used in isolation as studies show
of the cheek using a swab. Again, ethical                    ‚every single individual has a unique and
issues arise with the application of this                    unchanging baseline brainwave pattern‛
technology.      Some religions consider the                 Lawson (2002). This process would require no
collection of such a sample to be a breech of                action on the part of the user once enrolled
their religious beliefs.                                     and a biometric profile constructed. A remote
                                                             brainwave biometric system would not be
Iris recognition involves analysing an                       personally invasive in any way and therefore
individual’s iris. The iris is made up of a                  would cause no discomfort or inconvenience
unique pattern, which is different in each eye               to the user. It would also not pose any health
and even among monzygotic twins.              The            risks, as the scanners would not emit any
process of identifying people using this                     infrared lights. It would also be relatively
technology involves standing at a camera that                impossible to replicate the baseline brainwave
uses an infrared light in order to obtain an                 in a manner that could trick such a system.
image of the iris. The medical effect of this
light on the health of individual’s still remains            This document proposes the development of
debatable. Independent medical personnel                     an algorithm to analyse baseline brainwave
who do not have an interest in the commercial                patterns, for the express purpose of
application of this technololgy need to carry                identification of individuals. It aims to identify
out further studies to find a conclusive answer.             the ethical issues that will arise from the use
Problems arise when the subject being                        of baseline brainwave biometrics. It proposes
identified suddenly moves their head or turns                that the legality of using such a biometric
away from the scanner. In this case, it is                   technology also be established.            It will
unable to successfully carry out identification.             examine the work already done in this field of
                                                             study as well as the contributions that are
                                                             relevant and lay the foundation for the
© Olivia Moran [www.oliviamoran.me] Baseline Brainwave Biometrics


proposed work. The aims and objectives are
defined and the rationale for undertaking                    Some of the same concepts considered during
such work is argued.          The methods and                their research apply to the proposed research
preliminary design used to accomplish these                  being put forward in this document. The
defined objectives are explained in detail. The              process used by Thorpe et al (2005) involved
significance of this proposed research as well               the capture of the subjects EEG signals which
as its contribution to this field of study will be           they describe as representations of ‚the
highlighted.                                                 electrical activity in the brain as measured
                                                             from outside of the skull . . . EEG’s are
3. BACKGROUND                                                normally acquired by using a set of electrodes
                                                             that must make contact with the skin on the
LITERATURE                                                   scalp.    These signals are amplified and
                                                             digitized‛ Thorpe et al (2005).        Presently
Lawson carried out some of the earliest work                 technology does not exist that enables
done in the field of brainwave biometrics.                   capturing to be carried out remotely and,
Lawson conducted numerous experiments                        therefore, a similar means of capturing EEG
involving people with disabilities.          The             signals will be used by the authors. It is hoped
objective of these tests was ‚to help people                 that such technology will be developed in the
overcome mental disabilities, by teaching                    future.
them how to alter or normalize a specific
brainwave pattern‛. During this study he                     Millan & Marcel (2006) have conducted a
found that ‚A person has the ability to alter                significant amount of research into the area of
most of their own brainwave patterns, they                   brain computer interfaces.        This work is
cannot alter what is referred to as their                    concerned mostly with the ‚bulk response of
baseline brainwave pattern‛ Lawson (2002).                   the brain‛ when exposed to a mental stimulus
Lawson concluded that since such a brainwave                 i.e. making a person think of an image and
is unique to an individual, and can be                       then reading the brain’s total bulk response.
measured, then it could be used as a                         Similar principles apply to Millians’ research as
biometric.     These brainwaves are basically                that being proposed but differ due to the fact
electrical signals called electroencephalogr                 that it would only be concerned with one type
-aphy (EEG’s), which emit from the brain.                    of brainwave the baseline brainwave.           It
Lawson coined the term ‚EEG Fingerprint‛.                    would not require a subject to think about a
                                                             particular thing i.e. an image.        His work
Another study was undertaken by Thorpe et al                 concentrated on the authentication of
(2005), which involved anlaysing individuals                 individuals whereas the proposed research
brainwave patterns to extract information                    would focus on identification only.
that could be used to control certain functions
on a computer. They argue that this kind of
research focusing on the brainwave patterns
                                                             4. PROPOSED WORK
has only been made possible due to the fact
that ‚in recent years the cost of computers                  4.1 Objectives
with sufficient processing power to analyze
EEG signals in real-time has become                          1. To develop an algorithm          which will
affordable‛.                                                    successfully identify an         individuals’
© Olivia Moran [www.oliviamoran.me] Baseline Brainwave Biometrics


   baseline brainwave pattern from a                         aspects if not managed correctly could have a
   database consisting of ten billion binary                 detrimental effect on the implementation of
   patterns.                                                 this technology and ultimately its success.

2. To highlight the ethical issues associated                It is also essential to establish how such a
   with the use of baseline brainwave                        biometric technology would stand against
   biometric technologies and the potential                  current legislation. There is obviously no point
   impacts of these issues on the introduction               creating a technology that cannot be used
   of these technologies.                                    because it is both illegal and unethical.

3. To identify the legality of the utilisation of            4.3 Methodology            &    Preliminary
   baseline brainwave biometric technologies
                                                             Design
   in terms of the current legislation
   governing the European Union (E.U.), the
                                                             This section outlines the methods and designs
   U.S. as well as International Law.
                                                             that will be used for the achievement of the
                                                             stated objectives.
4.2 Rationale
                                                             4.3.1. Method for the achievement of
Presently, technology does not exist which
                                                             Objective 1
allows remote identification of individuals
using biometric techniques.          Brainwave
biometrics has the potential to overcome this                An algorithm will be produced through the
current limitation.     Such a system would                  completion of both primary and secondary
require an algorithm to compare baseline                     research. The primary research will involve
brainwave patterns and distinguish unique                    creating something new; the techniques that
identifiers within these patterns.         These             will be used to develop and use the algorithm
patterns could potentially be checked against                to identify individuals.
a database consisting of ten billion binary
patterns. The United State’s Census Bureau’s                 The algorithm will be concerned with three
have made a prediction that the world’s                      main areas.
population will reach between nine and ten
billion people by 2050 (See Appendix 1).                     1. The acquisition of a baseline brainwave
Assuming this predication to be relatively                      pattern.
accurate the algorithm proposed will be
sufficient to meet the needs of a worldwide                  2. The transference of the collected
population for at least the next 40 years.                      brainwave into a unique binary format,
                                                                which can be analysed to identify unique
It is necessary to carry out research to identify               characteristics.
the ethical issues that will arise from using a
biometric technology of this kind. This field of             3. The comparison of the baseline brainwave
research is in its early stages and the impacts                 to stored records for a match.
of this technology on areas such as such as
privacy, users with disabilities and religious
concerns have not yet been established. These
© Olivia Moran [www.oliviamoran.me] Baseline Brainwave Biometrics


It is hoped that a scanner would be developed                guaranteed by using the following pseudo
which would enable the scanning of an                        code:
individuals’ baseline brainwave pattern to be
carried out remotely. Such technology would                        The subject brainwave is obtained.
ensure complete ease of use as no action
would be required from users. The hardware                         While this process is undertaken the
needed to detect these extremely weak                               following will be done. (wave being read
brainwaves has not yet been developed.                              != start of wave); //will last milliseconds
However when it is, an algorithm will be
required that will separate brainwaves from                        Read in and record start to end of wave.
the baseline brainwave.
                                                             Next, the collected brainwave patterns need
The proposed research will require full user                 to be transformed into a binary format so that
participation as a result of these limitations               it can then be analysed to extract the baseline
with existing hardware. It will be concerned                 brainwave pattern and its unique identifiers.
only with the collection of brainwaves from a                A number of factors need to be considered
single individual at any one time. The design                during this stage, including the wavelength,
of the algorithm will be such that it will use               amplitude and frequency of each crest and
low coupling.      This will ensure that the                 trough found in the brainwave pattern. These
algorithm can be altered at a later date to                  parameters must be converted into their
allow for the separation of brainwaves from                  corresponding binary codes. Each baseline
multiple persons, when hardware is advanced                  brainwave pattern is unique and therefore,
enough to cater for this implementation.                     the resulting binary data will be absolutely
                                                             distinct.
The acquisition of the baseline brainwave
pattern will involve the use of a device that                A system comprising of a database containing
must be worn by the subject as outlined in                   up to 10,000,000,000 binary digits is proposed.
figure 1. This device amplifies the brainwaves               There will be no duplication of these binary
so that they are strong enough to be detected                digits with each corresponding directly to the
by an E.E.G. reader.                                         parameters of up to 10,000,000,000 unique
                                                             individuals’ baseline brainwaves.
Figure 1:
                                                             Finally, the algorithm will compare the
                                                             subjects’ baseline brainwave pattern to stored
                                                             records to determine a match.               The
                                                             comparison of brainwaves against a database
                                                             of ten billion brainwaves would take an
Source: http://www.ibva.com                                  unacceptable and unreasonable amount of
                                                             time. Consequently, a method that uses a
The brainwave will then be stored. This                      binary searching algorithm is proposed. This
brainwave for comparison reasons will have                   will conduct a search on an ordered list with
both a start and an end to its binary structure.             data being stored in multiple databases. For a
The efficiency of this process will be                       process such as this to work, a number of steps
                                                             need to be taken. The first would involve
© Olivia Moran [www.oliviamoran.me] Baseline Brainwave Biometrics


determining exactly which database should be                 4.3.2 Method for the achievement of
searched. The first few binary numbers of                    Objective 2
each brainwave pattern could satisfy this
purpose. For example, all patterns starting                  The main ethical issues arising from the use of
with 00101 would be in one database and all                  brainwave biometrics will be identified. The
the patterns with a pattern of 00110 would be                identification will be made possible through
in another database.                                         both primary and secondary research. The
                                                             primary research will involve interviewing
Once the relevant database is located a binary               ethic experts in the field of biometrics.
searching algorithm can be applied to the                    Interviews will also be conducted with people
data that it contains. This will determine                   who are expert biometric system operators.
whether the data is found or not found. Such                 These groups of people have an in-depth
an undertaking would involve an enormous                     understanding of the ethical implications
amount of off-line processing to insert every                associated with the use of biometric
binary brainwave in order to its binary                      technologies. Different focus groups will also
number. Insertion algorithms already exist                   be utilised.     This will be necessary to
which would successfully carry out this process,             determine the general attitudes, assumptions
therefore, the scope of the proposed research                and opinions of individuals in relation to
will not cover this aspect.                                  different ethical issues. Three groups will be
                                                             used, the first consisting of individuals who
The proposed research will focus on the search               have never used any sort of biometric
of the database during this stage. Secondary                 technology. The second will include people
research will be necessary to identify and                   who use biometric technologies on a daily
critically analyse the different comparison                  basis and the third will be made up of
algorithms in order to find the most                         individuals who are biometric system
appropriate one that will provide one                        operators. This will enable the authors to
hundred percent accuracy in the quickest time.               analyse the views of the different types of
Among these will be the hamming distance                     people who could be affected by this
algorithm.                                                   technology.

These three steps will serve to identify every               All of the people involved in this qualitative
pattern that has a match in the database. At                 research will be participating of their own free
the same time it is critical that such a process             will and will not be coerced i.e. through
does not produce a false match. To this end                  monetary means or deception in any way to
the proposed research will have to look in                   take part. The procedures and activities that
depth at previous work completed in the area                 will be undertaken during the activities will be
of baseline brainwave patterns to find the                   explained to all participates in detail prior to
proper number of bits that will be needed to                 the collection of the research data.          All
encode each individuals’ baseline brainwave                  participates will be allowed to remain
into a unique dataset. This will require the                 anonymous should they wish to do so. They
researchers to examine academic journals,                    shall also be able to leave the study at any
conference papers and research papers in                     time should they decide that they no longer
depth.                                                       want to take part. At all stages during the
                                                             research, the authors will behave in a
© Olivia Moran [www.oliviamoran.me] Baseline Brainwave Biometrics


respectful and honest manner towards all                     intensively. Weaknesses in the security of such
participants.     As argued by Willig (2000)                 a system will most likely occur at three main
‚Researchers should protect their participants               points. Firstly, when information is being sent
from any harm or loss, and they should aim to                from the scanner to the database it could
preserve their psychological well-being and                  possibly be intercepted.        It is therefore
dignity at all times‛.                                       essential that this information be encrypted.
                                                             In this instance, if malicious characters obtain
The secondary research will take the form of                 the message it is of no use to them, as they
examining      informational   and      technical            cannot decipher its content. Secondly, the
resources in an effort to compose a literature               sensor could be possibly tampered with and
review that will fully highlight work already                thirdly, an individual could enter an
done in this area. This will involve looking at              organisation under the disguise of an
academic journals, conference papers and                     employee and set up a profile. There are
accredited websites. From these the authors                  encryption techniques already available that
will be able to build upon the research already              would suffice which are already widely
conducted and acknowledge the contributions                  accepted and standardised. The other two
made by other researches in this field.                      weak points would need to be addressed.

4.3.3 Method for the achievement of                          This research also proposes to highlight the
Objective 3                                                  true extent of worldwide governmental
                                                             interest in this field of study. ‚Potential
The rapid progression of the use of Biometrics               impact that government might use of these
has raised concerns from a legal point of view,              technologies might have on personal freedom
especially the legislation concerning privacy                ... The government could use some unforeseen
and the protection of data. If a brainwave                   technological advances to compile biometric
biometric system was to be introduced it                     records for the real-time tracking of
would have to comply with legal requirements                 individuals‛ Wayman (2000).
that are currently in place. Take for example
‘The Data Protection Act (1998)’ in Ireland.                 The identification of the most influential
According to this act personal data can only be              legislation    as     well     as   establishing
collected for a specific purpose and should be               government’s level of interest will involve the
adequate, relevant and not excessive for the                 completion of both primary and secondary
purpose for which it is collected and                        research. This primary research will involve
processed. In addition it must be accurate and               carrying out interviews with legal experts who
up to date. Appropriate security measures                    are experts in the field of biometrics and
must be in place to protect it. If a company is              especially legislation governing people’s right
found to be in breech of the requirements of                 to privacy and protection of data. People who
this act they can be prosecuted.                             play a role in the creation of such legislation
                                                             and policy will also be interviewed, as they will
This legislation and others similar to it put a              be able to predict future legislative and policy
lot of pressure on system designers and                      trends.
operators to ensure that they create a system
that is absolutely secure. This makes security
an essential element that must be considered
© Olivia Moran [www.oliviamoran.me] Baseline Brainwave Biometrics


4.4 Timeline                                                 6. BIBILIOGRAPHY
It is predicted that the methodologies outlined              IBVA (2006) ‚The body is the soil of the mind‛
will take at least three years to complete given             [Internet], Accessed: 06 November 2006.
a team consisting of three researchers.                      Lawson, W.J. (2002) ‚The New Wave -
                                                             Biometric Access & Neural Control‛ [Internet],
5. CONCLUSION                                                Accessed: 06 November 2006.


This document proposed the construction of                   MILLIAN, J. & Marcel, S. (2006) ‚Person
an algorithm that would enable baseline                      Authentication using Brainwaves (EEG) and
brainwave patterns to be measured in an                      Maximum A Posteriori Model Adaptation‛
effort to identify an individual. Research was               IEEE Transactions on Pattern Analysis and
also proposed that would bring to light the                  Machine Intelligence, Special Issue on
ethical and legal issues that arise from the use             Biometrics‛ [Internet], Accessed: 02 November
of such technology. It examined research                     2006.
previously undertaken in this field and the
contributions that it made. The objectives of                The United State’s Census Bureau (2006)
the proposed research were defined and the                   ‚Total Midyear Population for the World: 1920
importance of undertaking such work was                      – 2050‛ [Internet], Accessed: 02 December
argued.     The procedures and preliminary                   2006.
designs that the researchers intend to use to
achieve the objectives were clearly laid out.                THORPE, J. & OORSCHOT & SOMAYAJI, A
                                                             (2005) ‚Pass-thoughts: Authenticating with
The potential that lies in the construction of a             Our Minds‛ Highlights from the 2005 New
brainwave biometric technology knows no                      Security Paradigms Workshop      [Internet],
boundaries. Requiring no action from users it                Accessed: 6 November 2006.
would be the only biometric technology of its
kind. Security breaches would be no more                     TRAVIS, A. (2006) ‚Identity fraud cost
with people not foolishly turning off security               estimated by Home Office at ₤1.7bn a year‛
features because of the inconvience that they                The Guardian [Internet], Accessed: 10
cause and the systems themselves being                       December 2006
fooled. Identity theft would be relatively
impossible with credit card fraud being no                   Wayman, J.L. (2000) ‚Federal Biometric
more and unauthorised access being a thing of                Technology Legislation‛ Computer [Internet],
the past. Users with disabilities would no                   33(2), pp. 76-80. Accessed: 3 November 2006.
longer be bound to the limitations of the
physical world in which they live.          This             Willig, C. (2001) ‚Introducing qualitative
research should it be successful in the                      research in psychology: Adventures in theory
achievement of the proposed objectives, will                 and method‛ Buckingham: Open University
undoubtedly progress society towards the                     Press.
creation of a safer and a more inclusive
society.

Más contenido relacionado

La actualidad más candente

Biometric Class Attendace System
Biometric Class Attendace SystemBiometric Class Attendace System
Biometric Class Attendace SystemAgbona Azeez
 
Biometric recognition using deep learning
Biometric recognition using deep learningBiometric recognition using deep learning
Biometric recognition using deep learningSwatiNarkhede1
 
DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...
DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...
DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...Symeon Papadopoulos
 
Women's Engineering Society, UK; 11 September 2009
Women's Engineering Society, UK; 11 September 2009Women's Engineering Society, UK; 11 September 2009
Women's Engineering Society, UK; 11 September 2009Wendy Schultz
 
Biometrics
BiometricsBiometrics
BiometricsNA000000
 
Jss academy of technical education
Jss academy of technical educationJss academy of technical education
Jss academy of technical educationArhind Gautam
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentationrs2003
 
Electronic Surveillance by Kamal
Electronic Surveillance by KamalElectronic Surveillance by Kamal
Electronic Surveillance by KamalJotham Brad
 
Deepfakes: An Emerging Internet Threat and their Detection
Deepfakes: An Emerging Internet Threat and their DetectionDeepfakes: An Emerging Internet Threat and their Detection
Deepfakes: An Emerging Internet Threat and their DetectionSymeon Papadopoulos
 
A Survey on Human Ear Recognition
A Survey on Human Ear RecognitionA Survey on Human Ear Recognition
A Survey on Human Ear RecognitionIJERA Editor
 
Case study on Usage of Biometrics (Cryptography)
Case study on Usage of Biometrics (Cryptography)Case study on Usage of Biometrics (Cryptography)
Case study on Usage of Biometrics (Cryptography)Bhargav Amin
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology Ketan Sawakare
 
Biometics technology
Biometics technologyBiometics technology
Biometics technologyPraween Lakra
 

La actualidad más candente (20)

Biometric Class Attendace System
Biometric Class Attendace SystemBiometric Class Attendace System
Biometric Class Attendace System
 
(2007) Biometrics and Privacy
(2007) Biometrics and Privacy(2007) Biometrics and Privacy
(2007) Biometrics and Privacy
 
Biometric recognition using deep learning
Biometric recognition using deep learningBiometric recognition using deep learning
Biometric recognition using deep learning
 
DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...
DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...
DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...
 
Women's Engineering Society, UK; 11 September 2009
Women's Engineering Society, UK; 11 September 2009Women's Engineering Society, UK; 11 September 2009
Women's Engineering Society, UK; 11 September 2009
 
Biometrics
BiometricsBiometrics
Biometrics
 
Ear Biometrics
Ear BiometricsEar Biometrics
Ear Biometrics
 
Jss academy of technical education
Jss academy of technical educationJss academy of technical education
Jss academy of technical education
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
 
Electronic Surveillance by Kamal
Electronic Surveillance by KamalElectronic Surveillance by Kamal
Electronic Surveillance by Kamal
 
Seminar
SeminarSeminar
Seminar
 
Deepfakes: An Emerging Internet Threat and their Detection
Deepfakes: An Emerging Internet Threat and their DetectionDeepfakes: An Emerging Internet Threat and their Detection
Deepfakes: An Emerging Internet Threat and their Detection
 
BIOMETRICS
BIOMETRICSBIOMETRICS
BIOMETRICS
 
A Survey on Human Ear Recognition
A Survey on Human Ear RecognitionA Survey on Human Ear Recognition
A Survey on Human Ear Recognition
 
Case study on Usage of Biometrics (Cryptography)
Case study on Usage of Biometrics (Cryptography)Case study on Usage of Biometrics (Cryptography)
Case study on Usage of Biometrics (Cryptography)
 
Biometrics poster
Biometrics posterBiometrics poster
Biometrics poster
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
 
Ijetcas14 598
Ijetcas14 598Ijetcas14 598
Ijetcas14 598
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 

Destacado

Expose ouverturexpi sept-2009-settat-1
Expose ouverturexpi sept-2009-settat-1Expose ouverturexpi sept-2009-settat-1
Expose ouverturexpi sept-2009-settat-1pyramid0
 
Note120110829
Note120110829Note120110829
Note120110829pyramid0
 
Lesson 1: Introduction to HTML
Lesson 1: Introduction to HTMLLesson 1: Introduction to HTML
Lesson 1: Introduction to HTMLOlivia Moran
 
Complexity Versus Comprehendability: Simplifying Wireless Security
Complexity Versus Comprehendability: Simplifying Wireless SecurityComplexity Versus Comprehendability: Simplifying Wireless Security
Complexity Versus Comprehendability: Simplifying Wireless SecurityOlivia Moran
 
Galbreath. B.D. Owens Library
Galbreath. B.D. Owens LibraryGalbreath. B.D. Owens Library
Galbreath. B.D. Owens LibraryLeslie Galbreath
 
Lesson 2: Getting To Know HTML
Lesson 2: Getting To Know HTMLLesson 2: Getting To Know HTML
Lesson 2: Getting To Know HTMLOlivia Moran
 
Top Tips For Creating A Great CV
Top Tips For Creating A Great CVTop Tips For Creating A Great CV
Top Tips For Creating A Great CVOlivia Moran
 
Knowledge Management: A Literature Review
Knowledge Management: A Literature ReviewKnowledge Management: A Literature Review
Knowledge Management: A Literature ReviewOlivia Moran
 
Biometrics Iris Scanning: A Literature Review
Biometrics Iris Scanning: A Literature ReviewBiometrics Iris Scanning: A Literature Review
Biometrics Iris Scanning: A Literature ReviewOlivia Moran
 
Basic Html Tags Tutorial For Kids
Basic Html Tags Tutorial For KidsBasic Html Tags Tutorial For Kids
Basic Html Tags Tutorial For KidsOlivia Moran
 

Destacado (14)

Expose ouverturexpi sept-2009-settat-1
Expose ouverturexpi sept-2009-settat-1Expose ouverturexpi sept-2009-settat-1
Expose ouverturexpi sept-2009-settat-1
 
Storyboard
StoryboardStoryboard
Storyboard
 
Note120110829
Note120110829Note120110829
Note120110829
 
Lesson 1: Introduction to HTML
Lesson 1: Introduction to HTMLLesson 1: Introduction to HTML
Lesson 1: Introduction to HTML
 
Mai
MaiMai
Mai
 
Portafolio influencias
Portafolio influenciasPortafolio influencias
Portafolio influencias
 
Portafolio influencias
Portafolio influenciasPortafolio influencias
Portafolio influencias
 
Complexity Versus Comprehendability: Simplifying Wireless Security
Complexity Versus Comprehendability: Simplifying Wireless SecurityComplexity Versus Comprehendability: Simplifying Wireless Security
Complexity Versus Comprehendability: Simplifying Wireless Security
 
Galbreath. B.D. Owens Library
Galbreath. B.D. Owens LibraryGalbreath. B.D. Owens Library
Galbreath. B.D. Owens Library
 
Lesson 2: Getting To Know HTML
Lesson 2: Getting To Know HTMLLesson 2: Getting To Know HTML
Lesson 2: Getting To Know HTML
 
Top Tips For Creating A Great CV
Top Tips For Creating A Great CVTop Tips For Creating A Great CV
Top Tips For Creating A Great CV
 
Knowledge Management: A Literature Review
Knowledge Management: A Literature ReviewKnowledge Management: A Literature Review
Knowledge Management: A Literature Review
 
Biometrics Iris Scanning: A Literature Review
Biometrics Iris Scanning: A Literature ReviewBiometrics Iris Scanning: A Literature Review
Biometrics Iris Scanning: A Literature Review
 
Basic Html Tags Tutorial For Kids
Basic Html Tags Tutorial For KidsBasic Html Tags Tutorial For Kids
Basic Html Tags Tutorial For Kids
 

Similar a Baseline Brainwave Biometrics

hand vein structure authentication
hand vein structure authenticationhand vein structure authentication
hand vein structure authenticationKumar Goud
 
Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on BiometricsPathik504
 
Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis PaperSumaiya Ismail
 
A Privacy-Preserving Deep Learning Framework for CNN-Based Fake Face Detection
A Privacy-Preserving Deep Learning Framework for CNN-Based Fake Face DetectionA Privacy-Preserving Deep Learning Framework for CNN-Based Fake Face Detection
A Privacy-Preserving Deep Learning Framework for CNN-Based Fake Face DetectionIRJET Journal
 
Digital Identities and the Promise of the Technology Trio: PKI, Smart Cards, ...
Digital Identities and the Promise of the Technology Trio: PKI, Smart Cards, ...Digital Identities and the Promise of the Technology Trio: PKI, Smart Cards, ...
Digital Identities and the Promise of the Technology Trio: PKI, Smart Cards, ...Arab Federation for Digital Economy
 
HMM-Based Face Recognition System with SVD Parameter
HMM-Based Face Recognition System with SVD ParameterHMM-Based Face Recognition System with SVD Parameter
HMM-Based Face Recognition System with SVD Parameterijtsrd
 
Understanding Biometric Patterns
Understanding Biometric PatternsUnderstanding Biometric Patterns
Understanding Biometric PatternsBahaa Abdulhadi
 
Cybersecurity governance-1.docx
Cybersecurity governance-1.docxCybersecurity governance-1.docx
Cybersecurity governance-1.docxWaseelsultan
 
Biometric Facial Recognition
Biometric Facial RecognitionBiometric Facial Recognition
Biometric Facial RecognitionJennifer York
 
Iris based Human Identification
Iris based Human IdentificationIris based Human Identification
Iris based Human Identificationdswazalwar
 

Similar a Baseline Brainwave Biometrics (20)

Face Detection Technology
Face Detection TechnologyFace Detection Technology
Face Detection Technology
 
Face Detection Technology
Face Detection TechnologyFace Detection Technology
Face Detection Technology
 
hand vein structure authentication
hand vein structure authenticationhand vein structure authentication
hand vein structure authentication
 
Biometrics
BiometricsBiometrics
Biometrics
 
Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on Biometrics
 
Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis Paper
 
A Privacy-Preserving Deep Learning Framework for CNN-Based Fake Face Detection
A Privacy-Preserving Deep Learning Framework for CNN-Based Fake Face DetectionA Privacy-Preserving Deep Learning Framework for CNN-Based Fake Face Detection
A Privacy-Preserving Deep Learning Framework for CNN-Based Fake Face Detection
 
Digital Identities and the Promise of the Technology Trio: PKI, Smart Cards, ...
Digital Identities and the Promise of the Technology Trio: PKI, Smart Cards, ...Digital Identities and the Promise of the Technology Trio: PKI, Smart Cards, ...
Digital Identities and the Promise of the Technology Trio: PKI, Smart Cards, ...
 
Bio shiv
Bio shivBio shiv
Bio shiv
 
HMM-Based Face Recognition System with SVD Parameter
HMM-Based Face Recognition System with SVD ParameterHMM-Based Face Recognition System with SVD Parameter
HMM-Based Face Recognition System with SVD Parameter
 
Iris Scan
Iris ScanIris Scan
Iris Scan
 
Understanding Biometric Patterns
Understanding Biometric PatternsUnderstanding Biometric Patterns
Understanding Biometric Patterns
 
Iris scanning
Iris scanningIris scanning
Iris scanning
 
Cybersecurity governance-1.docx
Cybersecurity governance-1.docxCybersecurity governance-1.docx
Cybersecurity governance-1.docx
 
Biometric Facial Recognition
Biometric Facial RecognitionBiometric Facial Recognition
Biometric Facial Recognition
 
Biometrics Essay
Biometrics EssayBiometrics Essay
Biometrics Essay
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric by amin
Biometric by aminBiometric by amin
Biometric by amin
 
Biometrics
BiometricsBiometrics
Biometrics
 
Iris based Human Identification
Iris based Human IdentificationIris based Human Identification
Iris based Human Identification
 

Más de Olivia Moran

Olivia Moran, my linked in recommendations
Olivia Moran, my linked in recommendationsOlivia Moran, my linked in recommendations
Olivia Moran, my linked in recommendationsOlivia Moran
 
Lesson 3: Linking It All Together
Lesson 3: Linking It All Together Lesson 3: Linking It All Together
Lesson 3: Linking It All Together Olivia Moran
 
Social Media Strategy
Social Media StrategySocial Media Strategy
Social Media StrategyOlivia Moran
 
E-Learning @ The Library
E-Learning @ The LibraryE-Learning @ The Library
E-Learning @ The LibraryOlivia Moran
 
The E-Tutor: A Jack Of All Trades
The E-Tutor: A Jack Of All TradesThe E-Tutor: A Jack Of All Trades
The E-Tutor: A Jack Of All TradesOlivia Moran
 
Technology Infrastructure For The Pervasive Vision, Does It Exist Yet?
Technology Infrastructure For The Pervasive Vision, Does It Exist Yet?Technology Infrastructure For The Pervasive Vision, Does It Exist Yet?
Technology Infrastructure For The Pervasive Vision, Does It Exist Yet?Olivia Moran
 
Self Organisation: Inspiring Neural Network & IT Design
Self Organisation: Inspiring Neural Network & IT DesignSelf Organisation: Inspiring Neural Network & IT Design
Self Organisation: Inspiring Neural Network & IT DesignOlivia Moran
 
Project Management: A Critical Examination of the PPARS Project
Project Management: A Critical Examination of the PPARS ProjectProject Management: A Critical Examination of the PPARS Project
Project Management: A Critical Examination of the PPARS ProjectOlivia Moran
 
Brainwave Feature Extraction, Classification & Prediction
Brainwave Feature Extraction, Classification & PredictionBrainwave Feature Extraction, Classification & Prediction
Brainwave Feature Extraction, Classification & PredictionOlivia Moran
 

Más de Olivia Moran (12)

Olivia Moran, my linked in recommendations
Olivia Moran, my linked in recommendationsOlivia Moran, my linked in recommendations
Olivia Moran, my linked in recommendations
 
Lesson 3: Linking It All Together
Lesson 3: Linking It All Together Lesson 3: Linking It All Together
Lesson 3: Linking It All Together
 
E-College
E-CollegeE-College
E-College
 
Social Media Strategy
Social Media StrategySocial Media Strategy
Social Media Strategy
 
E-Learning @ The Library
E-Learning @ The LibraryE-Learning @ The Library
E-Learning @ The Library
 
Blended Learning
Blended LearningBlended Learning
Blended Learning
 
What is Moodle
What is MoodleWhat is Moodle
What is Moodle
 
The E-Tutor: A Jack Of All Trades
The E-Tutor: A Jack Of All TradesThe E-Tutor: A Jack Of All Trades
The E-Tutor: A Jack Of All Trades
 
Technology Infrastructure For The Pervasive Vision, Does It Exist Yet?
Technology Infrastructure For The Pervasive Vision, Does It Exist Yet?Technology Infrastructure For The Pervasive Vision, Does It Exist Yet?
Technology Infrastructure For The Pervasive Vision, Does It Exist Yet?
 
Self Organisation: Inspiring Neural Network & IT Design
Self Organisation: Inspiring Neural Network & IT DesignSelf Organisation: Inspiring Neural Network & IT Design
Self Organisation: Inspiring Neural Network & IT Design
 
Project Management: A Critical Examination of the PPARS Project
Project Management: A Critical Examination of the PPARS ProjectProject Management: A Critical Examination of the PPARS Project
Project Management: A Critical Examination of the PPARS Project
 
Brainwave Feature Extraction, Classification & Prediction
Brainwave Feature Extraction, Classification & PredictionBrainwave Feature Extraction, Classification & Prediction
Brainwave Feature Extraction, Classification & Prediction
 

Último

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxNikitaBankoti2
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 

Último (20)

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 

Baseline Brainwave Biometrics

  • 1. A RESEARCH PROPOSAL Baseline Brainwave Biometrics
  • 2. Baseline Brainwave Biometrics www.oliviamoran.me Olivia Moran is a leading training specialist who specialises in E-Learning instructional design and is a certified Moodle expert. She has been working as a trainer and course developer for 3 years developing and delivery training courses for traditional classroom, blended learning and E-learning. Courses Olivia Moran Has Delivered: ● MOS ● ECDL ● Internet Marketing ● Social Media ● Google [Getting Irish Businesses Online] ● Web Design [FETAC Level 5] ● Adobe Dreamweaver ● Adobe Flash ● Moodle Specialties: ★Moodle [MCCC Moodle Certified Expert] ★ E Learning Tools/ Technologies [Commercial & Open Source] ★ Microsoft Office Specialist ★ Web Design & Online Content Writer ★ Adobe Dreamweaver, Flash & Photoshop ABOUT THIS PAPER This paper was written as part of a group collaboration between Olivia Moran, Eric Nichols and Barry Feehily. It was submitted to the University of Ulster as part of the Masters in Computing and Information Systems Management, Intelligent Systems and Design.
  • 3. © Olivia Moran [www.oliviamoran.me] Baseline Brainwave Biometrics 1. ABSTRACT remain oblivious to the community of card scanners, shoulder surfers and thieves who constantly strive to come up with new and Traditional as well as modern methods of more innovative ways to steal their money and identification are not capable of protecting more importantly their identities. The the vast amounts of confidential data that majority of passwords do not provide a exists worldwide. Identity fraud has become a satisfactory level of security. They can easily billion pound industry (Travis 2006). This be forgotten, stolen should they be written document proposes the development of an down, overheard and even guessed. algorithm that can be used to identify an individual using their unique baseline Modern approaches namely biometrics offer brainwave pattern. It addresses the need to much more acceptable levels of security and anticipate the ethical issues that will arise protection for both individuals and from the use of this biometric. It also corporations. The concept of biometrics is not purposes to determine the legal position of new. It has been around since the 1920’s such a biometric technology in light of current when the Federal Bureau of Investigation legislation. Relevant research previously (F.B.I) in the United States (U.S.) introduced conducted and their contributions are fingerprinting technologies for the purpose of examined in depth. The aims and objectives identifying criminals. Since the beginning of of the proposed research are clearly defined its existence biometrics has developed into and the rationale underlying this choice of many forms, but not without each bringing research is explained. All the methods and their own limitations and shortfalls. The types preliminary design required for the most widely used today include retina, facial, achievement of the proposed objectives are Deoxyribonucleic Acid (D.N.A.) and iris highlighted. The necessity of the proposed recognition. Retina scanning has not been research along with the potential introduced to the same extent as facial, D.N.A. contributions it could make to the field of and iris recognition. Retina scanning is biometrics is argued. concerned with the measurement of the retina’s blood vessel patterns. The process of 2. INTRODUCTION obtaining the retina scan is considered personally invasive; time consuming and The current methods available for requires a very skilled operator. identification of individual’s to present date have had limited success in the fight against Facial recognition examines the different fraud, identity theft and terrorism. features found on an individual’s face and Techniques traditionally used such as personal then analyses them in an attempt to establish identification numbers (P.I.N.’s) and passwords their identity. Challenges in terms of have many weaknesses and can easily be taken developing hardware that will successfully advantage of by well clued in criminals. map the features of the face reliably and Everyday, people worldwide key their P.I.N.’s accurately have not yet been fully addressed. into automatic teller machines (A.T.M.’s), send A number of ethical issues have been raised them over unsecured and unencrypted about the widespread use of this type of networks and enter them in full view into technology mainly relating to the privacy credit card machines in retail shops. They rights of individual’s. In 2001, facial scanning
  • 4. © Olivia Moran [www.oliviamoran.me] Baseline Brainwave Biometrics received a substantial amount of bad press Iris scanning along with the other forms of when the F.B.I. in the U.S. tested out this biometrics mentioned cannot be used in technology on every person entering the isolation if they wish to be effective. They ‘Raymond James Stadium’ during the need to offer a multimodal means of superbowl. This process was undertaken in identification. A system only offering iris complete secrecy thus creating a climate of recognition would exclude a substantial part distrust towards such technologies. of the population who have either been born without an iris or lost it through an accident. D.N.A. testing is used to measure the genetic The exclusion of users with disabilities could make up i.e. genetic signature, which makes be deemed unethical and discriminatory and an individual unique. The results of the test even illegal under the legislation currently can take a long time to compile compared to governing certain countries. other methods such as facial and iris recognition. It is also incapable of The limitations and weaknesses associated distinguishing monozygotic twins i.e. twins with the biometric technologies mentioned who come from the same embryo. D.N.A. could be overcome by a relatively new testing requires the acquisition of a sample of biometric technology called ‘Baseline an individual’s D.N.A.. This sample is obtained Brainwave Biometrics’. Such a technology by taking a sample of cells from the inner side could be used in isolation as studies show of the cheek using a swab. Again, ethical ‚every single individual has a unique and issues arise with the application of this unchanging baseline brainwave pattern‛ technology. Some religions consider the Lawson (2002). This process would require no collection of such a sample to be a breech of action on the part of the user once enrolled their religious beliefs. and a biometric profile constructed. A remote brainwave biometric system would not be Iris recognition involves analysing an personally invasive in any way and therefore individual’s iris. The iris is made up of a would cause no discomfort or inconvenience unique pattern, which is different in each eye to the user. It would also not pose any health and even among monzygotic twins. The risks, as the scanners would not emit any process of identifying people using this infrared lights. It would also be relatively technology involves standing at a camera that impossible to replicate the baseline brainwave uses an infrared light in order to obtain an in a manner that could trick such a system. image of the iris. The medical effect of this light on the health of individual’s still remains This document proposes the development of debatable. Independent medical personnel an algorithm to analyse baseline brainwave who do not have an interest in the commercial patterns, for the express purpose of application of this technololgy need to carry identification of individuals. It aims to identify out further studies to find a conclusive answer. the ethical issues that will arise from the use Problems arise when the subject being of baseline brainwave biometrics. It proposes identified suddenly moves their head or turns that the legality of using such a biometric away from the scanner. In this case, it is technology also be established. It will unable to successfully carry out identification. examine the work already done in this field of study as well as the contributions that are relevant and lay the foundation for the
  • 5. © Olivia Moran [www.oliviamoran.me] Baseline Brainwave Biometrics proposed work. The aims and objectives are defined and the rationale for undertaking Some of the same concepts considered during such work is argued. The methods and their research apply to the proposed research preliminary design used to accomplish these being put forward in this document. The defined objectives are explained in detail. The process used by Thorpe et al (2005) involved significance of this proposed research as well the capture of the subjects EEG signals which as its contribution to this field of study will be they describe as representations of ‚the highlighted. electrical activity in the brain as measured from outside of the skull . . . EEG’s are 3. BACKGROUND normally acquired by using a set of electrodes that must make contact with the skin on the LITERATURE scalp. These signals are amplified and digitized‛ Thorpe et al (2005). Presently Lawson carried out some of the earliest work technology does not exist that enables done in the field of brainwave biometrics. capturing to be carried out remotely and, Lawson conducted numerous experiments therefore, a similar means of capturing EEG involving people with disabilities. The signals will be used by the authors. It is hoped objective of these tests was ‚to help people that such technology will be developed in the overcome mental disabilities, by teaching future. them how to alter or normalize a specific brainwave pattern‛. During this study he Millan & Marcel (2006) have conducted a found that ‚A person has the ability to alter significant amount of research into the area of most of their own brainwave patterns, they brain computer interfaces. This work is cannot alter what is referred to as their concerned mostly with the ‚bulk response of baseline brainwave pattern‛ Lawson (2002). the brain‛ when exposed to a mental stimulus Lawson concluded that since such a brainwave i.e. making a person think of an image and is unique to an individual, and can be then reading the brain’s total bulk response. measured, then it could be used as a Similar principles apply to Millians’ research as biometric. These brainwaves are basically that being proposed but differ due to the fact electrical signals called electroencephalogr that it would only be concerned with one type -aphy (EEG’s), which emit from the brain. of brainwave the baseline brainwave. It Lawson coined the term ‚EEG Fingerprint‛. would not require a subject to think about a particular thing i.e. an image. His work Another study was undertaken by Thorpe et al concentrated on the authentication of (2005), which involved anlaysing individuals individuals whereas the proposed research brainwave patterns to extract information would focus on identification only. that could be used to control certain functions on a computer. They argue that this kind of research focusing on the brainwave patterns 4. PROPOSED WORK has only been made possible due to the fact that ‚in recent years the cost of computers 4.1 Objectives with sufficient processing power to analyze EEG signals in real-time has become 1. To develop an algorithm which will affordable‛. successfully identify an individuals’
  • 6. © Olivia Moran [www.oliviamoran.me] Baseline Brainwave Biometrics baseline brainwave pattern from a aspects if not managed correctly could have a database consisting of ten billion binary detrimental effect on the implementation of patterns. this technology and ultimately its success. 2. To highlight the ethical issues associated It is also essential to establish how such a with the use of baseline brainwave biometric technology would stand against biometric technologies and the potential current legislation. There is obviously no point impacts of these issues on the introduction creating a technology that cannot be used of these technologies. because it is both illegal and unethical. 3. To identify the legality of the utilisation of 4.3 Methodology & Preliminary baseline brainwave biometric technologies Design in terms of the current legislation governing the European Union (E.U.), the This section outlines the methods and designs U.S. as well as International Law. that will be used for the achievement of the stated objectives. 4.2 Rationale 4.3.1. Method for the achievement of Presently, technology does not exist which Objective 1 allows remote identification of individuals using biometric techniques. Brainwave biometrics has the potential to overcome this An algorithm will be produced through the current limitation. Such a system would completion of both primary and secondary require an algorithm to compare baseline research. The primary research will involve brainwave patterns and distinguish unique creating something new; the techniques that identifiers within these patterns. These will be used to develop and use the algorithm patterns could potentially be checked against to identify individuals. a database consisting of ten billion binary patterns. The United State’s Census Bureau’s The algorithm will be concerned with three have made a prediction that the world’s main areas. population will reach between nine and ten billion people by 2050 (See Appendix 1). 1. The acquisition of a baseline brainwave Assuming this predication to be relatively pattern. accurate the algorithm proposed will be sufficient to meet the needs of a worldwide 2. The transference of the collected population for at least the next 40 years. brainwave into a unique binary format, which can be analysed to identify unique It is necessary to carry out research to identify characteristics. the ethical issues that will arise from using a biometric technology of this kind. This field of 3. The comparison of the baseline brainwave research is in its early stages and the impacts to stored records for a match. of this technology on areas such as such as privacy, users with disabilities and religious concerns have not yet been established. These
  • 7. © Olivia Moran [www.oliviamoran.me] Baseline Brainwave Biometrics It is hoped that a scanner would be developed guaranteed by using the following pseudo which would enable the scanning of an code: individuals’ baseline brainwave pattern to be carried out remotely. Such technology would  The subject brainwave is obtained. ensure complete ease of use as no action would be required from users. The hardware  While this process is undertaken the needed to detect these extremely weak following will be done. (wave being read brainwaves has not yet been developed. != start of wave); //will last milliseconds However when it is, an algorithm will be required that will separate brainwaves from  Read in and record start to end of wave. the baseline brainwave. Next, the collected brainwave patterns need The proposed research will require full user to be transformed into a binary format so that participation as a result of these limitations it can then be analysed to extract the baseline with existing hardware. It will be concerned brainwave pattern and its unique identifiers. only with the collection of brainwaves from a A number of factors need to be considered single individual at any one time. The design during this stage, including the wavelength, of the algorithm will be such that it will use amplitude and frequency of each crest and low coupling. This will ensure that the trough found in the brainwave pattern. These algorithm can be altered at a later date to parameters must be converted into their allow for the separation of brainwaves from corresponding binary codes. Each baseline multiple persons, when hardware is advanced brainwave pattern is unique and therefore, enough to cater for this implementation. the resulting binary data will be absolutely distinct. The acquisition of the baseline brainwave pattern will involve the use of a device that A system comprising of a database containing must be worn by the subject as outlined in up to 10,000,000,000 binary digits is proposed. figure 1. This device amplifies the brainwaves There will be no duplication of these binary so that they are strong enough to be detected digits with each corresponding directly to the by an E.E.G. reader. parameters of up to 10,000,000,000 unique individuals’ baseline brainwaves. Figure 1: Finally, the algorithm will compare the subjects’ baseline brainwave pattern to stored records to determine a match. The comparison of brainwaves against a database of ten billion brainwaves would take an Source: http://www.ibva.com unacceptable and unreasonable amount of time. Consequently, a method that uses a The brainwave will then be stored. This binary searching algorithm is proposed. This brainwave for comparison reasons will have will conduct a search on an ordered list with both a start and an end to its binary structure. data being stored in multiple databases. For a The efficiency of this process will be process such as this to work, a number of steps need to be taken. The first would involve
  • 8. © Olivia Moran [www.oliviamoran.me] Baseline Brainwave Biometrics determining exactly which database should be 4.3.2 Method for the achievement of searched. The first few binary numbers of Objective 2 each brainwave pattern could satisfy this purpose. For example, all patterns starting The main ethical issues arising from the use of with 00101 would be in one database and all brainwave biometrics will be identified. The the patterns with a pattern of 00110 would be identification will be made possible through in another database. both primary and secondary research. The primary research will involve interviewing Once the relevant database is located a binary ethic experts in the field of biometrics. searching algorithm can be applied to the Interviews will also be conducted with people data that it contains. This will determine who are expert biometric system operators. whether the data is found or not found. Such These groups of people have an in-depth an undertaking would involve an enormous understanding of the ethical implications amount of off-line processing to insert every associated with the use of biometric binary brainwave in order to its binary technologies. Different focus groups will also number. Insertion algorithms already exist be utilised. This will be necessary to which would successfully carry out this process, determine the general attitudes, assumptions therefore, the scope of the proposed research and opinions of individuals in relation to will not cover this aspect. different ethical issues. Three groups will be used, the first consisting of individuals who The proposed research will focus on the search have never used any sort of biometric of the database during this stage. Secondary technology. The second will include people research will be necessary to identify and who use biometric technologies on a daily critically analyse the different comparison basis and the third will be made up of algorithms in order to find the most individuals who are biometric system appropriate one that will provide one operators. This will enable the authors to hundred percent accuracy in the quickest time. analyse the views of the different types of Among these will be the hamming distance people who could be affected by this algorithm. technology. These three steps will serve to identify every All of the people involved in this qualitative pattern that has a match in the database. At research will be participating of their own free the same time it is critical that such a process will and will not be coerced i.e. through does not produce a false match. To this end monetary means or deception in any way to the proposed research will have to look in take part. The procedures and activities that depth at previous work completed in the area will be undertaken during the activities will be of baseline brainwave patterns to find the explained to all participates in detail prior to proper number of bits that will be needed to the collection of the research data. All encode each individuals’ baseline brainwave participates will be allowed to remain into a unique dataset. This will require the anonymous should they wish to do so. They researchers to examine academic journals, shall also be able to leave the study at any conference papers and research papers in time should they decide that they no longer depth. want to take part. At all stages during the research, the authors will behave in a
  • 9. © Olivia Moran [www.oliviamoran.me] Baseline Brainwave Biometrics respectful and honest manner towards all intensively. Weaknesses in the security of such participants. As argued by Willig (2000) a system will most likely occur at three main ‚Researchers should protect their participants points. Firstly, when information is being sent from any harm or loss, and they should aim to from the scanner to the database it could preserve their psychological well-being and possibly be intercepted. It is therefore dignity at all times‛. essential that this information be encrypted. In this instance, if malicious characters obtain The secondary research will take the form of the message it is of no use to them, as they examining informational and technical cannot decipher its content. Secondly, the resources in an effort to compose a literature sensor could be possibly tampered with and review that will fully highlight work already thirdly, an individual could enter an done in this area. This will involve looking at organisation under the disguise of an academic journals, conference papers and employee and set up a profile. There are accredited websites. From these the authors encryption techniques already available that will be able to build upon the research already would suffice which are already widely conducted and acknowledge the contributions accepted and standardised. The other two made by other researches in this field. weak points would need to be addressed. 4.3.3 Method for the achievement of This research also proposes to highlight the Objective 3 true extent of worldwide governmental interest in this field of study. ‚Potential The rapid progression of the use of Biometrics impact that government might use of these has raised concerns from a legal point of view, technologies might have on personal freedom especially the legislation concerning privacy ... The government could use some unforeseen and the protection of data. If a brainwave technological advances to compile biometric biometric system was to be introduced it records for the real-time tracking of would have to comply with legal requirements individuals‛ Wayman (2000). that are currently in place. Take for example ‘The Data Protection Act (1998)’ in Ireland. The identification of the most influential According to this act personal data can only be legislation as well as establishing collected for a specific purpose and should be government’s level of interest will involve the adequate, relevant and not excessive for the completion of both primary and secondary purpose for which it is collected and research. This primary research will involve processed. In addition it must be accurate and carrying out interviews with legal experts who up to date. Appropriate security measures are experts in the field of biometrics and must be in place to protect it. If a company is especially legislation governing people’s right found to be in breech of the requirements of to privacy and protection of data. People who this act they can be prosecuted. play a role in the creation of such legislation and policy will also be interviewed, as they will This legislation and others similar to it put a be able to predict future legislative and policy lot of pressure on system designers and trends. operators to ensure that they create a system that is absolutely secure. This makes security an essential element that must be considered
  • 10. © Olivia Moran [www.oliviamoran.me] Baseline Brainwave Biometrics 4.4 Timeline 6. BIBILIOGRAPHY It is predicted that the methodologies outlined IBVA (2006) ‚The body is the soil of the mind‛ will take at least three years to complete given [Internet], Accessed: 06 November 2006. a team consisting of three researchers. Lawson, W.J. (2002) ‚The New Wave - Biometric Access & Neural Control‛ [Internet], 5. CONCLUSION Accessed: 06 November 2006. This document proposed the construction of MILLIAN, J. & Marcel, S. (2006) ‚Person an algorithm that would enable baseline Authentication using Brainwaves (EEG) and brainwave patterns to be measured in an Maximum A Posteriori Model Adaptation‛ effort to identify an individual. Research was IEEE Transactions on Pattern Analysis and also proposed that would bring to light the Machine Intelligence, Special Issue on ethical and legal issues that arise from the use Biometrics‛ [Internet], Accessed: 02 November of such technology. It examined research 2006. previously undertaken in this field and the contributions that it made. The objectives of The United State’s Census Bureau (2006) the proposed research were defined and the ‚Total Midyear Population for the World: 1920 importance of undertaking such work was – 2050‛ [Internet], Accessed: 02 December argued. The procedures and preliminary 2006. designs that the researchers intend to use to achieve the objectives were clearly laid out. THORPE, J. & OORSCHOT & SOMAYAJI, A (2005) ‚Pass-thoughts: Authenticating with The potential that lies in the construction of a Our Minds‛ Highlights from the 2005 New brainwave biometric technology knows no Security Paradigms Workshop [Internet], boundaries. Requiring no action from users it Accessed: 6 November 2006. would be the only biometric technology of its kind. Security breaches would be no more TRAVIS, A. (2006) ‚Identity fraud cost with people not foolishly turning off security estimated by Home Office at ₤1.7bn a year‛ features because of the inconvience that they The Guardian [Internet], Accessed: 10 cause and the systems themselves being December 2006 fooled. Identity theft would be relatively impossible with credit card fraud being no Wayman, J.L. (2000) ‚Federal Biometric more and unauthorised access being a thing of Technology Legislation‛ Computer [Internet], the past. Users with disabilities would no 33(2), pp. 76-80. Accessed: 3 November 2006. longer be bound to the limitations of the physical world in which they live. This Willig, C. (2001) ‚Introducing qualitative research should it be successful in the research in psychology: Adventures in theory achievement of the proposed objectives, will and method‛ Buckingham: Open University undoubtedly progress society towards the Press. creation of a safer and a more inclusive society.