Initiative heuristic to inaugurate intelligence in human brain biometric security system

Ijaz Ali Shoukat, Mohsin Iftikhar

Research output: Contribution to journalArticlepeer-review

1 Citation (Scopus)

Abstract

Biometric security systems are considered as more worth full and secure entity due to the natural biometric traits which are tricky to fake. Traditional systems can not identify, whether the authenticating user is real or someone else with password or Personal Identification Number (PIN) privileges but the biometric systems can identify the originality of the authenticating person. The generation of patterns of human brain signals against any action or attention are uniquely identified in humans and considered as a human brain biometric key. By using this human brain biometric key, the realness or originality of user can be accomplished. But just to find out the realness of user is not enough because security system with expert predictions through a human brain biometric is the need of current era for security enhancements. Existing biometric systems cannot identify whether the authenticating user is man or woman, his/her age approximation, IQ level and Handedness. This paper discuses the innovative discovery related framework with proposed algorithms which may be used to make a human brain biometric system as an expert security system like a human being up to some extent. The proposed frame work with algorithms is theoretically justified with strong literature support. This study also draws the attention of researchers and scientists towards the discrepancies of human brain biometric system and open a painstaking gate for the forthcoming decade to depict novelty breakthroughs related to Brain Computer Interface (BCI)
Original languageEnglish
Pages (from-to)1-10
Number of pages10
JournalEngineering Intelligent Systems
Volume19
Issue number2
Publication statusPublished - 2011

Fingerprint

Dive into the research topics of 'Initiative heuristic to inaugurate intelligence in human brain biometric security system'. Together they form a unique fingerprint.

Cite this