Authors: Ronen Kopito, Aia Haruvi, Noa Brande-Eilat, Shai Kalev, Eitan Kay, Dan Furman.
This paper is available in PDF format here.
ABSTRACT
Here we report on a field test where we asked if it is feasible to deliver a scalable, commercial-grade solution for brain-based authentication given currently available head wearables. In this study, forty-nine (49) participants completed multiple sessions in their natural home environment over a single week. Participants used an off-the-shelf brain signal measuring headband to record their own brain activity while completing various tasks. Recording sessions were self-operated by the participants and unsupervised by any expert or technician to simulate real world use cases, while also contrasting common research approaches to this topic that rely on data from controlled laboratory conditions. Although brain signals have a non-stationary, complex nature, when participants watched rapidly presented images, our authentication system was able to successfully construct a unique and robust “brain ID” for each participant. Based on this brain ID, we developed a simplified brain-based authentication method that captures distinguishable information with reliable, commercial-grade performance from participants at their own homes. We conclude that noninvasively measured brain signals are ideal for use in biometric authentication systems, especially in environments where head wearables such as headphones or AR/VR devices are used as these devices offer a natural form factor for capturing participant brain ID continuously.
1. Introduction
When a user requests access to a system or a device, an authentication process must confirm whether the identity claim of the user is genuine or whether they are an imposter. A simple example of an authentication method is an alphanumeric password like ‘abc123,’ while a more complex example is a digital fingerprint captured by a smartphone sensor. Effective authentication is critical to security for both consumers and enterprises. Because of the high frequency of use of authentication systems, methods need to be both convenient and secure. That balance - between convenience and security - is a defining performance characteristic of authentication systems. The strongest authentication systems are very secure and, often, very cumbersome to implement and maintain. In contrast, weak authentication methods are very convenient, but have been responsible for countless data breaches because of their equivalent ease of being hacked. The “password chaos” of modern life seems to have reached a boiling point and it is clear that future computing systems need improved methods that both deliver increased security along with an increased convenience that ensures adherence, at the human level of behavior, to security protocols.
Biometric authentication is any method that uses natural occurring information to verify a user’s identity. Many biometric authentication systems have already been developed based on fingerprints, faces, palm veins, irises, voices, gaits, and other metrics. There are significant advantages to using biometrics for authentication, since user experience is convenient and fast, it is non-transferable, and usually the system can reach very high performances (high false rejection rate, and low false acceptance rate) typically without requiring much attention, if any, from the user.
There are disadvantages as well however, since biometrics can be faked or stolen and when that happens, the victim cannot simply replace them to avoid impersonation. Certain biometrics, for example fingerprints or faces, can be easily captured today by cameras remotely without any knowledge from the individual that is being surveilled, and once a face or finger ID is compromised, the remedy is extremely difficult.
Brain-based authentication is the process of verifying an individual’s identity by using their brain signal, and as an approach it offers several distinct advantages over other biometric authentication methods. Since at least the late 1980s1 neuroscientists have observed that noninvasively measured human brain signals carry personally identifying information2,3 that differentiates between family members and across a broad population.4,5 Brain signals, unlike many other biomarkers are concealed: an invisible signal that is never exposed in daily life. Second, brain signals are dynamic, non-stationary and extremely complex. They are the result of a unique series of brain waves superpositioning in a given brain at any moment, and these waves reflect both personal brain function and anatomy. Taken together, this makes brain signals an ideal candidate for use as a biometric6,7,8 method. Indeed, many groups have attempted to build biometric authentication systems based on brain signals.9,10,11,12,13,14,15,16,17,18,19 Generally, the process involves a machine-learning classifier to identify if a given brain signal belongs to a genuine identity or to an imposter one (Figure 1).
The overall usability of brain-based authentication systems has been increasing since 2010,20 however most are still far from proving field-viability and bringing new value and utility to existing authentication providers.21,22 Brain data is commonly collected in a laboratory under controlled conditions in other studies, where a trained technician is an essential part of the brain measurement procedure. Often authentication performance tests are also done with a small number of people, with all measurements taking place in a single session despite the common industry knowledge that single session data maps poorly to daily consumer electronics usage, where individuals put devices on and off regularly.23,24,25,26
While brain biometric identity appears to be one of the most natural, powerful methods for head wearables, its robustness has not been sufficiently vetted in real world conditions that parallel the end use cases such as:
- Professionals who work remotely and wear headsets as part of their daily job, which requires them to be authenticated across different applications throughout the day.
- Gamers who want a seamless, hands-free and voice-free method of profile loading and authorizing in-game purchases.
- e-Commerce consumers whose check-out experience is currently interrupted by passwords.
- Surgeons, heavy machinery operators, medical professionals and others working in high-strain, sanitary environments that require especially high reliability and convenience.
- Air gapped environments where there are strict demands on performance, confidentiality and all biometric processing and decisions need to be performed on-edge devices.
To model these use-cases, we set out to perform a generalizable field test of brain-based authentication using brain signals measured noninvasively from people in their natural home environment. In other words, their real world context. This feasibility test “in the wild” advances the applied science of brain biometric analysis towards scalable implementations as all participants were completely new (naïve users) to the system and enrolled themselves from home. They used a comfortable head wearable for hours during test sessions, and this device had minimal data and battery requirements. They performed repeated authentication attempts across several different days, and individual brain ID’s were shown to be robust against changes in brain state and ambient noise inherent to brain data.
2. Methods
a. Participants
Sixty-two (62) participants were recruited to complete four (4) sessions over a single (1) week at their own home. Adult participants were recruited from an opt-in screening panel and came from all five (5) major regions of the continental United States (Northeast, Southwest, West, Southeast, and Midwest). Only participants who reported normal vision, or vision that was corrected to normal with contact lenses were included. We excluded volunteers who reported using medication that might influence the experiment or other neurological or psychiatric conditions that could influence the results. Written informed consent was obtained from all participants before screening and the main experimental sessions. Thirteen (13) participants were ultimately excluded for problematic survey response patterns within the study and/or invalid brain data, leaving 49 participants (mean age= 36, SD=8.25, 16 females) enrolled and eligible to be included in the analysis.
b. Sessions
Individuals participated in the study by recording sessions from their own homes at their own pace, over one week as detailed in Haruvi et al 2021.27 Each participant received an Arctop technology kit that included headphones (Sony), a brain signal measuring headband (InteraXon) and a tablet computer (Samsung) with a designated app (Arctop). Each participant recorded four sessions, one hour long each where towards the end of each session, six (6) authentication events were presented. Each authentication event started with a message declaring the upcoming event and instructing the participant to stay steady. Then, a fixation period which enabled the participant to get prepared (2 seconds) before seeing the rapid serial visual presentation (RSVP) of selected images at 10Hz for 10 seconds (Figure 2).
c. Data Acquisition
Participants engaged in a variety of tasks during each session while their electrical brain activity was recorded using InteraXon’s Muse-S device, a portable, noninvasive electroencephalography (EEG) device weighing 41 grams (Figure 3, left panel). The device includes four dry fabric EEG sensors (sampling rate: 256 Hz), photoplethysmography (PPG) sensors (for heart rate) and motion sensors (gyroscope and accelerometer). The EEG sensors are located on the scalp, two frontal channels (AF7 and AF8) and two temporals which rest behind the ears (TP9 and TP10), with a reference channel at Fpz. The headbands were put on by the participants themselves, with the assistance of a Quality Assurance (QA) screen that started before each session. The QA showed the participants, in real-time, the channels’ quality, easily directing them to adjust the headband properly for optimal signal quality.
d. Preprocessing and feature extraction
Data analysis was performed only for periods within the RSVP events. A band-pass filter (0.5-46Hz) was applied on each channel. The filtered signal of RSVP event was segmented into 31 epochs of 2 seconds in length, using a sliding window with a stride of 250ms (Figure 3, middle panels). Comprehensive feature extraction and engineering was not the goal of this current study. Here we aimed for effective information capture without deeper optimization to first test the core principles. Accordingly, for each epoch and for each EEG channel, the following features were calculated: The average power for each of the traditional frequency bands (Alpha, Beta, Gamma, Delta, Theta), power spectrum interactions (engagement index, Alpha over Delta, Beta over Theta, Theta/Alpha), time domain features such as averages, standard-deviations, kurtosis, entropy and number of zero-crossing points, and pairwise correlations between channels for the various frequency bands. All together, for each epoch, a total of 140 features were extracted.
e. Models training and testing
For each participant we had a total of 24 RSVP events (Supp. Video 1), which we collected over the 4 sessions. For each participant, three sessions (18 events) were chosen randomly to be used for training (Figure 3, right panels). The fourth session was used for testing (6 events). Authentication prediction of an event acts in two steps, the first at the epoch level, where each epoch is determined to belong to a genuine or imposter. Second is the final decision regarding the whole event identity (genuine or imposter).
For each participant an authentication model was trained first at the epoch level. Model classification was done with XGBoost classifier (binary classification). The labeling of the data was changed in accordance to the identity under training. Epochs (feature space, 140 features per epoch) of genuine identity were labeled as one (558 epochs), while epochs from the rest of the participants were of imposter identity, and labeled as zero (26784 epochs). Thirty percent of training data (random and balance split) was dedicated for validation and to determine epoch thresholding.
Standardization procedure over the training epochs was applied. Later, standardization means and stds (standard deviation values) of the training features were used to normalize the validation and testing data. Epoch’s threshold for classification was optimized to minimize false acceptance rate (FAR), while maximizing true rejection rate (see Supp. Figure 3). Identity predictions of validation data epochs, after thresholding, exhibited high accuracy for all participants (average accuracy=0.9865, STD=0.00929).
A final decision about participant identity was given at the event level. Event threshold, as before, was determined by an optimization algorithm, but here it was done over the validation data. For the validation data, after thresholding, the average event authentication accuracy over all participants was 0.9965, with STD=0.00041. Since per each participant validation data included 264 events, it suggests that on the average, after thresholding all events were identified correctly except one.
Test data included 294 events and 9114 epochs. Training model predicted the identity probability of each epoch. Probabilities above the epoch threshold were determined to be of a genuine identity, while those below the threshold are of imposter identity (Supp. Figure 4A-C). Test event was declared to be of genuine identity only if 40% of its epochs were above the epoch threshold (Supp. Figure 4A1-C1).
3. Results
In our authentication system we derive from non-invasively recorded brain signals a “brain ID” abstraction that proved to be representative of each participant, and differentiating from one another. The brain response during a RSVP event is used as a brain biometric ID for identity verification. In order to demonstrate characteristics of this brain ID, we will follow the example presented in Figure 4. In our system, the authentication period depends on the event length, here it is approximately 10 seconds (one RSVP event). The event is composed of 4 channels (256Hz), segmented into 31 epochs, 2 seconds long, with a stride of 250ms (Figure 4A-B). The non-stationary nature of the brain signal, and the fact that it is a superposition of hundreds of simultaneous processes in the brain, makes the signal unique in time, unrepeatable, and unpredictable. Even when a user’s brain is stimulated by identical stimuli, no two epochs are alike (Figure 4B), nor are two events alike. In Figure 4C and in Figure 4D the epochs of two events (the brain signal space) of the same participant are presented respectively. For each event, the epochs are aligned vertically, ordered in time, creating a visualization of the brain ID. This representation enables us to see easily that none of the epochs are identical, nor are the full events.
In contrast, the brain ID data becomes highly correlated when the same events shown previously in Figure 4C-D are now presented at a higher level of analysis (the features space) (Figure 4E-F). High correlation is visible among epochs of the same event, creating a clear brain ID pattern. As one can note, a similar pattern is carried by brain data captured at different occasions, and we can conclude that usage of an event instead of a single epoch for deriving the brain ID increases the pattern robustness and increases both the sensitivity (true acceptance rate) and specificity (true rejection rate) of the system.
In Figure 5A-D, four brain IDs examples of different participants are presented. It is apparent that each brain ID carries a unique pattern that is distinguishable from the others. We would like to generalize the idea of using RSVP events brain IDs as a verification method in our authentication system over all the participants. If the event brain ID is used as an identity verification two criteria must be fulfilled:
- The similarity between different events brain IDs of the same person is kept high: even and especially, for events which were recorded at different occasions.
- The brain ID of each participant is unique, and distinguishable.
The similarity between two events (at the feature space) can be measured by the Pearson correlation coefficient between the means of the events. Thus the similarity between two participants is the mean of all pairwise events correlations of these participants. In Figure 5E, the normalized correlation matrix across all participants is presented. Values are represented by colors (colorbar 0.2-1), higher values suggest higher similarity. The order of participants along the axes was determined using a hierarchical clustering algorithm (see Supp. Figure 1). The averaged similarity between events belonging to the same participant (intra correlation) are along the diagonal elements of the correlation matrix, while the averaged similarity between events of two different participants (inter correlation), are the off diagonal matrix. In general, we have found that for all participants, the similarity of intra correlation is higher than the inter correlation (Figure 5E, Supp. Figure 2).
Looking more deeply, histograms in Supp. Figure 2, shows that most of the inter- and intra-participant correlation are indeed separated: for more than half of the participants the intra-correlation is higher than 0.7, where most of the inter-correlations are lower than 0.35. The inset in Supp. Figure 2 also suggests a linear relation between the mean inter-correlation of a participant and its intra correlation. Namely, participants having relatively low intra-correlation (~0.5), their inter-correlations will be low as well (~0.25). These results reflect that criteria 1 and 2 (above) are fulfilled, and the brain IDs can be used for identity classification.
As described in the Method section, for each participant an authentication model and relevant thresholds were found. These models were tested on the test data which in total included 249 genuine events, and 14112 imposter events. The general performance of our authentication system is summarized in Figure 6. The averaged false acceptance rate (FAR) is 9% and the false rejection rate (FRR) is 13%, making the solution sufficient for certain commercial authentication use-cases, but not all. The averages shown here are the means over the individuals’ FAR, FRR.
Out of the total number of participants in this experiment (49), 37 participants have FRR=0, where 24 participants have FRR=0 and FAR<=9% (Supp. Table 1).
Next we asked what will be the performance of the authentication system when only certain brain signal information is considered. Explicitly, we repeated the training procedure (Methods) but this time with only the power spectrum features of the following brainwave modes: Delta(0.5-4Hz), Theta(4-8Hz), Alpha(8-12.5), Beta(12.5-30Hz) and Gamma(30-48), and with some combinations (Alpha-Beta, and Theta-Alpha-Beta). We found that usually for these features, FRR can reach low values while the FAR is always kept high (Table 1). As the number of features is increasing, the better the performances of the authentication system. This implies that more sophisticated models such as deep neural networks will greatly improve the performance of the authentication system. We will report on the results of different systems such as these in future field test reports.
4. Discussion
We performed a generalizable field test of a brain-based authentication system that uses non-invasively measured brain signals to verify user identity. All participants were completely new (naïve users) to the system, enrolled themselves from home in a self-guided tutorial, used a comfortable head wearable for hours at a time without issue and performed repeated authentication measures across multiple days. On the whole, this amounts to a reasonable simulation of real contexts that enterprise and consumer authentication methods need to operate in to be commercially viable. Specifically, these methods must work regardless of time of day and be robust to changes in brain state (pre/post-coffee, hunger, wakefulness, awareness, etc.) and the ambient noise inherent to measurements made outside of controlled laboratory conditions.
The main goal of this field test was to evaluate the base feasibility of a scalable, commercial-grade brain ID authentication system; advanced data engineering methods were not applied to boost performance further. A simplified feature set and simple machine learning methods were applied over a minimal training period of less than three minutes enrollment data per participant. Amidst these severe constraints on performance, brain-based authentication proved to be approaching commercial-grade levels. In future tests the parameters used will be optimized, here our authentication system ran on suboptimal parameters that were fast calculated to serve as more heuristics than anything. For example the epoch length, the authentication event duration, selection of features by their importance, or the amount of training data we know have an impact on performance from previous and ongoing work. These are all tunable parameters depending on the demands of the authentication task: future research will clarify the timescales at which the optimal information for identification verification occurs for each tier of authentication system. We are confident that more sophisticated machine-learning architectures together with other parameters optimization will deliver superior, product level authentication performance that will match or exceed the performance of top non-brain authentication biometrics available today.
Wearables that touch the head, such as headphones or AR/VR, are a natural form factor for brain-based authentication and we anticipate that demand from enterprises and consumers will necessitate that these devices evolve beyond passwords and fingerprints to iris ID based on eye scanning and eventually brain ID, based on brain scanning. The demand for both strong and convenient authentication solutions for future head-worn devices drove our design of the paradigm for prompt-response analysis here, and it is notable that the rapid image prompt-response paradigm evaluated (with users watching images on a tablet while wearing a headband) has been validated by us elsewhere in AR (Supp. Video 2) using Microsoft Hololens.
Given the performance obtained in this field test and the ease-of-use of this method for head wearables, brain ID seems to be one of the most intuitive and powerful authentication solutions for next generation head-worn computers. Brain identities, like any other biometric identity, will need to conform to privacy standards and be offered within protected software and chip architectures such as those pioneered for fingerprint scanners and face recognition, but this is no limitation on the adoption of such a beneficial method.
Biometrics as a class are uniquely comfortable and convenient to use because they do not require the user to remember anything (like a password), or carry anything (like a physical key). Biometrics offset the cognitive load of password management plus the risks associated with alphanumeric passwords, and even offer the promise of obviating passwords altogether in future computing ecosystems. For now, brain ID is at a nascent stage of industry adoption and the solution presented here represents one of the more scalable designs, since we can easily increase the dataset to more participants and more events within the principled framework of forcing divergences in inter-participant data and convergences in intra-participant data.
Furthermore, the head wearable that people put on themselves in this test to measure their brain signal is a consumer device that is currently available worldwide, highlighting the lack of need for exotic or rare materials to acquire sufficient brain signal to measure brain IDs, nor the need for specialized laboratories or facilities. More information in the brain signal remains unexplored here, being outside the scope of the current field test and report. Future research will develop concepts related to the theoretical and practical information boundaries in brain signal, since for head wearables in particular, brain biometric identity warrants continued testing across expanded participant populations and implementation in commercial devices that are optimized for given use-cases and environments.
5. Conclusion
We showed that a relatively simple brain-based authentication system can use non-invasively measured brain signals from consumer quality head wearable devices to differentiate between users with a high degree of certainty. Authentication using non-invasively-measured brain signals in this way was found to not only be feasible, but robust: the correlation matrices derived from the current test find our computed brain identities to be readily distinguishable between different participants and consistently similar among participants, satisfying the core requirements of a commercial-grade biometric authentication system. The complexity inherent to human brain signals was, therefore, found to not be too volatile to be leveraged for steady, reliable use as a passwordless authentication method.
We built and validated the method through a scalable software infrastructure that was able to deliver brain-based authentication at a commercial-grade, within a generalized framework that provides for continual performance improvement with additions of new participants. As the methods were designed around characteristic patterns observable during limited windows of time, at any time, it is clear that there is value to continued data collection at larger scales and across additional contexts. For both inter-subject variability and to further clarify the invariant patterns underlying intra-participant variability, expanded data collection can be beneficial. The present sample is sufficient however to conclude that brain-based authentication is already a viable method for certain commercial uses, and has the potential to serve many more in the future.
Ethics declarations
All authors are employees of Arctop Inc.
SUPPLEMENTARY MATERIALS
Supp. Video 1: Rapid Serial Visual Presentation (RSVP) Stimuli. Example of a stream of images watched by participants while brain signals were recorded by their headband. https://youtu.be/TWUzbX3Q8sk
Supp. Video 2: Brain-based Authentication: Living Room Demo. Microsoft HoloLens 1, retrofitted with BCI sensors, delivers passwordless authentication. https://youtu.be/n6v9z3lNs2M
References
- Stassen, H. H., G. Bomben, and P. Propping. “Genetic aspects of the EEG: an investigation into the within-pair similarity of monozygotic and dizygotic twins with a new method of analysis.” Electroencephalography and clinical neurophysiology 66, no. 6 (1987): 489–501.
- Poulos, Marios, Maria Rangoussi, and Nikolaos Alexandris. “Neural network based person identification using EEG features.” In 1999 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings. ICASSP99 (Cat. No. 99CH36258), vol. 2, pp. 1117–1120. IEEE, 1999.
- Poulos, M., M. Rangoussi, N. Alexandris, and A. Evangelou. “Person identification from the EEG using nonlinear signal classification.” Methods of information in Medicine 41, no. 1 (2002): 64–75.
- Marcel, Sebastien, and José del R. Millán. “Person authentication using brainwaves (EEG) and maximum a posteriori model adaptation.” IEEE transactions on pattern analysis and machine intelligence 29, no. 4 (2007): 743–752.
- Van Beijsterveldt, C. E. M., and G. C. M. Van Baal. “Twin and family studies of the human electroencephalogram: a review and a meta-analysis.” Biological psychology 61, no. 1-2 (2002): 111–138.
- Thorpe, Julie, Paul C. Van Oorschot, and Anil Somayaji. “Pass-thoughts: authenticating with our minds.” In Proceedings of the 2005 workshop on New security paradigms, pp. 45–56. 2005.
- Wang, Min, Jiankun Hu, and Hussein A. Abbass. “BrainPrint: EEG biometric identification based on analyzing brain connectivity graphs.” Pattern Recognition 105 (2020): 107381.
- Piplani, Tanya, Nick Merill, and John Chuang. “Faking it, Making it: Fooling and Improving Brain-Based Authentication with Generative Adversarial Networks.” In 2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS), pp. 1–7. IEEE, 2018.
- Abo-Zahhad, Mohammed, Sabah Mohammed Ahmed, and Sherif Nagib Abbas. “State-of-the-art methods and future perspectives for personal recognition based on electroencephalogram signals.” IET Biometrics 4, no. 3 (2015): 179–190.
- Armstrong, Blair C., Maria V. Ruiz-Blondet, Negin Khalifian, Kenneth J. Kurtz, Zhanpeng Jin, and Sarah Laszlo. “Brainprint: Assessing the uniqueness, collectability, and permanence of a novel method for ERP biometrics.” Neurocomputing 166 (2015): 59–67.
- Ashby, Corey, Amit Bhatia, Francesco Tenore, and Jacob Vogelstein. “Low-cost electroencephalogram (EEG) based authentication.” In 2011 5th International IEEE/EMBS Conference on Neural Engineering, pp. 442–445. IEEE, 2011.
- Campisi, Patrizio, and Daria La Rocca. “Brain waves for automatic biometric-based user recognition.” IEEE transactions on information forensics and security 9, no. 5 (2014): 782–800.
- Maiorana, Emanuele, Daria La Rocca, and Patrizio Campisi. “On the permanence of EEG signals for biometric recognition.” IEEE Transactions on Information Forensics and Security 11, no. 1 (2015): 163–175.
- Mohanchandra, Kusuma, G. M. Lingaraju, Prashanth Kambli, and Vinay Krishnamurthy. “Using brain waves as new biometric feature for authenticating a computer user in real-time.” International Journal of Biometrics and Bioinformatics (IJBB) 7, no. 1 (2013): 49.
- Mu, Zhendong, Jianfeng Hu, and Jianliang Min. “EEG-based person authentication using a fuzzy entropy-related approach with two electrodes.” Entropy 18, no. 12 (2016): 432.
- Palaniappan, Ramaswamy. “Two-stage biometric authentication method using thought activity brain waves.” International journal of neural systems 18, no. 01 (2008): 59–66.
- Paranjape, R. B., J. Mahovsky, L. Benedicenti, and Z. Koles. “The electroencephalogram as a biometric.” In Canadian Conference on Electrical and Computer Engineering 2001. Conference Proceedings (Cat. No. 01TH8555), vol. 2, pp. 1363–1366. IEEE, 2001.
- Ruiz-Blondet, Maria V., Zhanpeng Jin, and Sarah Laszlo. “CEREBRE: A novel method for very high accuracy event-related potential biometric identification.” IEEE Transactions on Information Forensics and Security 11, no. 7 (2016): 1618–1629.
- Thomas, Kavitha P., and A. Prasad Vinod. “EEG-based biometric authentication using gamma band power during rest state.” Circuits, Systems, and Signal Processing 37, no. 1 (2018): 277–289.
- Yang, Su, and Farzin Deravi. “On the usability of electroencephalographic signals for biometric recognition: A survey.” IEEE Transactions on Human-Machine Systems 47, no. 6 (2017): 958–969.
- Revett, Kenneth, and Sergio Tenreiro de Magalhães. “Cognitive biometrics: Challenges for the future.” In International Conference on Global Security, Safety, and Sustainability, pp. 79–86. Springer, Berlin, Heidelberg, 2010.
- Curran, Max T., Jong-kai Yang, Nick Merrill, and John Chuang. “Passthoughts authentication with low cost EarEEG.” In 2016 38th Annual international conference of the IEEE engineering in medicine and biology society (EMBC), pp. 1979–1982. IEEE, 2016
- Del Pozo-Banos, Marcos, Jesús B. Alonso, Jaime R. Ticay-Rivas, and Carlos M. Travieso. “Electroencephalogram subject identification: A review.” Expert Systems with Applications 41, no. 15 (2014): 6537–6554.
- Marcel, Sebastien, and José del R. Millán. “Person authentication using brainwaves (EEG) and maximum a posteriori model adaptation.” IEEE transactions on pattern analysis and machine intelligence 29, no. 4 (2007): 743–752.
- Näpflin, Markus, Marc Wildi, and Johannes Sarnthein. “Test–retest reliability of resting EEG spectra validates a statistical signature of persons.” Clinical Neurophysiology 118, no. 11 (2007): 2519–2524.
- Näpflin, Markus, Marc Wildi, and Johannes Sarnthein. “Test–retest reliability of EEG spectra during a working memory task.” Neuroimage 43, no. 4 (2008): 687–693.
- Haruvi Aia, Ronen Kopito, Noa Brande-Eilat, Shai Kalev, Eitan Kay, and Dan Furman. “Differences in the effects on human focus of music playlists and personalized soundscapes, as measured by brain signals.” Biorxiv (2021).