Brain–Computer Interface for EEG-Based Authentication: Advancements and Practical Implications

Authentication is a critical component of digital security, and traditional methods often encounter significant vulnerabilities and limitations. This study addresses the emerging field of EEG-based authentication systems, highlighting their theoretical advancements and practical applicability. We co...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:Sensors (Basel, Switzerland) Ročník 25; číslo 16; s. 4946
Hlavní autoři: Alahaideb, Lamia, Al-Nafjan, Abeer, Aljumah, Hessah, Aldayel, Mashael
Médium: Journal Article
Jazyk:angličtina
Vydáno: Switzerland MDPI AG 10.08.2025
MDPI
Témata:
ISSN:1424-8220, 1424-8220
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Popis
Shrnutí:Authentication is a critical component of digital security, and traditional methods often encounter significant vulnerabilities and limitations. This study addresses the emerging field of EEG-based authentication systems, highlighting their theoretical advancements and practical applicability. We conducted a systematic review of the existing literature, followed by an experimental evaluation to assess the feasibility, limitations, and scalability of these systems in real-world scenarios. Data were collected from nine subjects using various approaches. Our results indicate that the CNN model achieved the highest accuracy of 99%, while Random Forest (RF) and Gradient Boosting (GB) classifiers also demonstrated strong performance with 94% and 93%, respectively. In contrast, classifiers such as Support Vector Machine (SVM) and K-Nearest Neighbors (KNN) displayed significantly lower effectiveness, underscoring their limitations in capturing the complexities of EEG data. The findings suggest that EEG-based authentication systems have significant potential to enhance security measures, offering a promising alternative to traditional methods and paving the way for more robust and user-friendly authentication solutions.
Bibliografie:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
content type line 23
ObjectType-Undefined-3
ISSN:1424-8220
1424-8220
DOI:10.3390/s25164946