帳號:guest(18.119.136.146)          離開系統
字體大小: 字級放大   字級縮小   預設字形  

詳目顯示

以作者查詢圖書館館藏以作者查詢臺灣博碩士論文系統以作者查詢全國書目勘誤回報
作者:邱維揚
作者(英文):Wei-Yang Chiu
論文名稱:腦波作為身分鑒別之可靠性
論文名稱(英文):The reliability assessment of using brainwave (EEG) as an authentication token.
指導教授:葉國暉
指導教授(英文):Kuo-Hui Yeh
口試委員:羅嘉寧
劉英和
口試委員(英文):Jia-Ning Luo
Ying-Ho Liu
學位類別:碩士
校院名稱:國立東華大學
系所名稱:資訊管理碩士學位學程
學號:610639007
出版年(民國):108
畢業學年度:107
語文別:英文
論文頁數:50
關鍵詞:身分鑒別腦波資訊安全
關鍵詞(英文):Transparent AuthenticationBrainwaveSecurity
相關次數:
  • 推薦推薦:0
  • 點閱點閱:30
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:5
  • 收藏收藏:0
由於非侵入式腦波(EEG)偵測耳機之商業化,讓腦機介面(BCI)之領域與應用日漸普及,雖然使用腦波作為身分鑒別的應用仍然很少,不過不同個體間腦波清晰之差異使腦波成為身份鑑別可能的選項之一。身分鑒別的可靠程度決定了驗證系統的安全程度。然而對於「使用腦波作為身分鑑別」領域之論文進行調查時,我們發現,儘管系統最終都有十分良好的結果(精準度落在90 至 100% 左右),然而這些研究中,對於腦波資料未進行最佳化前,精準度約落在60 至 70% 之間,或甚至更低。
我們希望從不同的面相對於腦波是否適合作為身分鑒別之選項進行測試。例如: 區分個體、區分所進行的活動,最後,對於分類演算法是否會產生不同的結果進行探討。
The availability of commercial non-invasive brainwave (EEG) headsets supports the growing popularity of BCI (Brain Computer Interface) domain. Although currently, only small interests among applications of applying brainwave as an authentication token, the clear presentation of brainwave between different individuals stand its foundation of a possible token for au-thentication. But, reliability of an authentication token is the basis of a reliable authentication system. We scanned through researches of using brainwave as authentication token and found that, although the final result of accuracy may vary a bit from 90% to 100%, in most cases, the result of accuracy without optimization may as low as 60% to 70%. We want to test the reliability of brainwave as an authentication token from a different perspective: Differenti-ate Individuals, Differentiate Activities, and finally, how results may differ between popular classification algorithms.
第一章 Introduction  15
第二章 Related Works  19
第三章 The Proposed Test  25
第四章 Result  43
第五章 Conclusion and Future Work  49
[1] Wikipedia, “Brain-Computer Interface,” https://en.wikipedia.org/wiki/Brain%E2%80%93computer_interface, Accessed on 2019/1/20
[2] V. Straebel, “Alvin Lucier’s Music for Solo Performer: Experimental music beyond sonification,” Organised Sound, vol. 19, pp. 17-29, April 2014.
[3] 1V. Tulceanu, “Comprehensive Brainwave Authentication Using Emotional Stimuli,” 2012 Proceedings of the 20th European Signal Processing Conference (EUSIPCO), Romania, 2012.
[4] S. H. Liew, “Fuzzy-Rough Nearest Neighbour Classifier for Person Authentication using EEG signals,” 2013 International Conference on Fuzzy Theory and Its Applications (iFUZZY), Taiwan, 2013.
[5] University of California, Irvine, “UCI Machine Learning Repository,” https://archive.ics.uci.edu/ml/datasets/eeg+database, Accessed on 2019/03/09.
[6] S. Marcel, “Person Authentication Using Brainwaves (EEG) and Maximum A Posteriori Model Adaption,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol 29, pp. 743-752, April 2007.
[7] S. H. Liew, “Incrementing FRNN model with simple heuristic update for brainwaves person authentication,” 2016 IEEE EMBS Conference on Biomedical Engineering and Sciences (IECBES), Malaysia, 2016.
[8] L. Zhou, “You Think, Therefore You Are: Transparent Authentication System with Brainwave-oriented Bio-features for IoT Networks,” IEEE Transactions on Emerging Topics in Computer (Early Access)
[9] M. Sidana, “Types of classification algorithms in Machine Learning,” https://medium.com/@Mandysidana/machine-learning-types-of-classification-9497bd4f2e14, Accessed on 2019/03/10
[10] F. Lotte, “A review of classification algorithms for EEG-based brain-computer interfaces,” Journal of Neural Engineering, vol 4, April 2007.
[11] F. Lotte, “A review of classification algorithms for EEG-based brain-computer interfaces: a ten year update,” Journal of Neural Engineering, vol 15, April 2018.
[12] Wikipedia, “Linear Classifier,” https://en.wikipedia.org/wiki/Linear_classifier, Accessed on 2019/03/10
[13] J. Jian, “Lecture Notes for Algorithm – Classification,” http://www.csie.ntnu.edu.tw/~u91029/Classification.html, Accessed on 2019/03/10
[14] J. Jang, “5-2 K-nearest neighbor Classifiers,” http://mirlab.org/jang/books/dcpr/prKnnc.asp?title=5-2%20K-nearest-neighbor%20Classifiers&language=english, Accessed on 2019/03/11
[15] Wikipedia, “K-nearest neighbors algorithm,” https://en.wikipedia.org/wiki/K-nearest_neighbors_algorithm, Accessed on 2019/03/11
[16] Wikipedia, “Artificial Neural Network,” https://en.wikipedia.org/wiki/Artificial_neural_network, Accessed on 2019/03/12
[17] Wikipedia, “Expectation Maximization,” https://en.wikipedia.org/wiki/Expectation%E2%80%93maximization_algorithm, Accessed on 2019/03/12
[18] J. Jang, “7-1 GMM Introduction”, http://mirlab.org/jang/books/dcpr/gmmIntro.asp?title=7-1%20GMM%20Introduction, Accessed on 2019/03/12
[19] W. Liao, “Advanced Computer Vision – 08 GMM”, http://www.cs.nccu.edu.tw/~whliao/acv2008/08gmm.pdf, Accessed on 2019/03/12
[20] Wikipedia, “Normal Distribution,” https://en.wikipedia.org/wiki/Normal_distribution, Accessed on 2019/03/12
[21] ShortID, “EM – Gaussian Mixture Model,” https://ithelp.ithome.com.tw/articles/10195700, Accessed on 2019/03/12
[22] L. Chen, “An evaluation system and computer game development as ADHD treatment,” 2015 The 9th International Conference on Advanced Information Technologies/ Consumer Electronics Forum (AIT/CEF 2015), Taiwan, 2015
[23] Wikipedia, “Motor Imagery,” https://en.wikipedia.org/wiki/Motor_imagery, Accessed on 2019/03/12
[24] A. M. Batula, “Virtual and Actual Humanoid Robot Control with Four-Class Motor-Imagery-Based Optical Brain-Computer Interface,” BioMed Research International, Vol 2017, July 2017.
[25] J. Fietkau, “Swipe Your Fingerprints!, How Biometric Authentication Simplifies Payment, Access and Identity Fraud,” WOOT ’18 12th USENIX Workshop on Offensive Technologies, U.S.A., August 2018
[26] Chaos Computer Clubs, “Chaos Computer Clubs breaks iris recognition system of the Samsung Galaxy S8”, https://www.ccc.de/en/updates/2017/iriden, Accessed on 2019/03/12
[27] Chaos Computer Clubs, “Chaos Computer Club breaks Apple TouchID,” https://www.ccc.de/en/updates/2013/ccc-breaks-apple-touchid, Accessed on 2019/03/12
[28] Wikipedia, “Naïve Bayes Classifier,” https://en.wikipedia.org/wiki/Naive_Bayes_classifier, Accessed on: 2019/04/08
[29] Siuly, “Detection of motor imagery EEG signals employing Naïve Bayes based learning process,” Measurement, vol 86, pp 148-158, May 2016.
[30] Reza Yaghoobi, “EEG signal classification using Bayes and Naïve Bayes Classifiers and extracted features of Continuous Wavelet Transform,” Majlesi Journal of Multimedia Processing, vol 3, March 2014.
[31] H. Crawford.: Understanding user perceptions of transparent authentication on a mobile device. Journal of Trust Management (2017)
[32] Nicholas Gillian, “SVM,” http://www.nickgillian.com/wiki/pmwiki.php/GRT/SVM/, Accessed on 2019/04/28
[33] BRI, “Brain Partition,” http://www.bri.com.tw/, Accessed on 2018/4/12
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
* *