Single Trial Authentication with Mental Password Writing Sarah N. Abdulkader ( ) , Ayman Atia, and Mostafa-Sami M. Mostafa HCI-LAB, Department of Computer Science, Faculty of Computers and Information-Helwan University, Cairo, Egypt nabil.sarah@gmail.com, ayman@hci.fci.helwan.edu.eg, mostafa.sami@fci.helwan.edu.eg Abstract. This paper presents an authentication system that uses brain waves as a biometric discriminant trait. It utilizes Electroencephalogram (EEG) signals generated from mental writing of the user-owned password. Inde‐ pendent Component Analysis (ICA) and baseline correction has been used for preprocessing and noise removal. The effect of two types of features, multi‐ variate autoregressive (MVAR) model parameters and power spectral density (PSD) features, have been studied for this activity. Performance results based on single trial analysis have revealed that imagined password writing can reach average Half Total Error Rate (HTER) of 5 % for PSD features vs 3 % obtained with MVAR coefficients. The experiments have shown that mental password writing can be used for increasing the user acceptance for enrollment condi‐ tions while maintaining high performance results. Keywords: EEG · BCI verification · Biometric authentication · Mental writing 1 Introduction Technological revolution that characterizes this era has brought a lot of facilities and comfort to different aspects of human lives. It allows fast information exchange in the form of rapid mail delivery systems, distant communication and overseas transactions. These advantages come at the expense of increasing vulnerability of data secrecy. They cause the growing need for advanced authentication mechanisms. Approving or declining the claimed identity of the user is the responsibility of these mechanisms. There are three fundamental techniques used in authentication mechanisms, which are knowledge based, object based, and biometrics based authentication as stated in [1]. Knowledge based authentication requires the owning of some information exclusive to the user. It includes passwords and personal identification numbers. Different kinds of attacks can take this technique down like shoulder surfing and user carelessness. Some of the weakness associated with passwords can be overcome with object based authen‐ tication. In this technique, user possesses physical objects which are given for later identity confirmation as cards or tokens. They cannot be shared with the same freedom as exchanging the passwords. However, this category can still be broken with card-theft. Biometrics based authentication, which is concerned with the measurement of phys‐ ical characteristics or personal traits, fights the stealing vulnerability associated with the © Springer International Publishing Switzerland 2015 T. Tryfonas and I. Askoxylakis (Eds.): HAS 2015, LNCS 9190, pp. 3–12, 2015. DOI: 10.1007/978-3-319-20376-8_1