A Survey on Modality Characteristics, Performance Evaluation Metrics, and Security for Traditional and Wearable Biometric Systems

Biometric research is directed increasingly toward Wearable Biometric Systems (WBS) for user authentication and identification. However, prior to engaging in WBS research, how their operational dynamics and design considerations differ from those of Traditional Biometric Systems (TBS) must be understood. While the current literature is cognizant of those differences, there is no effective work that summarizes the factors where TBS and WBS differ, namely, their modality characteristics, performance, security, and privacy. To bridge the gap, this article accordingly reviews and compares the key characteristics of modalities, contrasts the metrics used to evaluate system performance, and highlights the divergence in critical vulnerabilities, attacks, and defenses for TBS and WBS. It further discusses how these factors affect the design considerations for WBS, the open challenges, and future directions of research in these areas. In doing so, the article provides a big-picture overview of the important avenues of challenges and potential solutions that researchers entering the field should be aware of. Hence, this survey aims to be a starting point for researchers in comprehending the fundamental differences between TBS and WBS before understanding the core challenges associated with WBS and its design.

[1]  Julian Fiérrez,et al.  On the Vulnerability of Iris-Based Systems to a Software Attack Based on a Genetic Algorithm , 2012, CIARP.

[2]  Imtiaz Parvez,et al.  RSS based loop-free compass routing protocol for data communication in advanced metering infrastructure (AMI) of Smart Grid , 2014, 2014 IEEE Symposium on Computational Intelligence Applications in Smart Grid (CIASG).

[3]  Steven Francis Leboeuf,et al.  Earbud-based sensor for the assessment of energy expenditure, HR, and VO2max. , 2014, Medicine and science in sports and exercise.

[4]  Jeffrey Montes,et al.  Validation and Reliability of the Hexoskin and FitBit Flex Wearable BIO Collection Devices , 2015 .

[5]  Farrukh Aslam Khan,et al.  Energy-efficient cluster-based security mechanism for intra-WBAN and inter-WBAN communications for healthcare applications , 2013, EURASIP J. Wirel. Commun. Netw..

[6]  Arun Ross,et al.  Relating ROC and CMC curves via the biometric menagerie , 2013, 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[7]  Nazneen Akhter,et al.  Heart-Based Biometrics and Possible Use of Heart Rate Variability in Biometric Recognition Systems , 2015, ACSS.

[8]  E. Felten,et al.  Cross-Site Request Forgeries : Exploitation and Prevention , 2008 .

[9]  Dimitrios Hatzinakos,et al.  Biometric Methods for Secure Communications in Body Sensor Networks: Resource-Efficient Key Management and Signal-Level Data Scrambling , 2008, EURASIP J. Adv. Signal Process..

[10]  Elena S. Izmailova,et al.  Wearable Devices in Clinical Trials: Hype and Hypothesis , 2018, Clinical pharmacology and therapeutics.

[11]  R. Manjusha,et al.  SHARING DATA IN CLOUD BASED ON TRUST ATTRIBUTE BASED ENCRYPTION (TABE) , 2015 .

[12]  Chris Roberts,et al.  Biometric attack vectors and defences , 2007, Comput. Secur..

[13]  Wendi Heinzelman,et al.  Energy-efficient communication protocol for wireless microsensor networks , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[14]  Michael S. Hsiao,et al.  Denial-of-service attacks on battery-powered mobile computers , 2004, Second IEEE Annual Conference on Pervasive Computing and Communications, 2004. Proceedings of the.

[15]  Alina Elena STANCIU,et al.  Considerations regarding the spectral efficiency of orthogonal frequency division multiplexing , .

[16]  Elaine Shi,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[17]  James L. Wayman,et al.  Error rate equations for the general biometric system , 1999, IEEE Robotics Autom. Mag..

[18]  A New Secure Storing System for Biometric Templates Based Encryption and Concealment , 2015 .

[19]  Feng Li,et al.  CRPCG—Clustering Routing Protocol based on Connected Graph , 2011 .

[20]  Arif I. Sarwat,et al.  Survey on synchrophasor data quality and cybersecurity challenges, and evaluation of their interdependencies , 2018, Journal of Modern Power Systems and Clean Energy.

[21]  Reema Bhagtani,et al.  BIOMETRICS : A FURTHER ECHELON OF SECURITY Siddhesh Angle , , 2005 .

[22]  Meikang Qiu,et al.  Keystroke Biometric Systems for User Authentication , 2017, J. Signal Process. Syst..

[23]  Tsuhan Chen,et al.  Biometrics-based cryptographic key generation , 2004, 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763).

[24]  Nasir D. Memon,et al.  Protecting Biometric Templates With Sketch: Theory and Practice , 2007, IEEE Transactions on Information Forensics and Security.

[25]  Pong C. Yuen,et al.  Entropy Measurement for Biometric Verification Systems , 2016, IEEE Transactions on Cybernetics.

[26]  Ashok Kumar Turuk,et al.  A Survey on Selective Forwarding Attack in Wireless Sensor Networks , 2011, 2011 International Conference on Devices and Communications (ICDeCom).

[27]  Madasu Hanmandlu,et al.  Score level fusion of multimodal biometrics using triangular norms , 2011, Pattern Recognit. Lett..

[29]  Julian Fierrez,et al.  Vulnerabilities in biometric systems: Attacks and recent advances in liveness detection , 2007 .

[30]  Stefan Schneegaß,et al.  SkullConduct: Biometric User Identification on Eyewear Computers Using Bone Conduction Through the Skull , 2016, CHI.

[31]  Sunilduth Baichoo,et al.  Choice of biometrics , 2014, 2014 IST-Africa Conference Proceedings.

[32]  George Poste,et al.  Big Data and Health , 2015 .

[33]  Igor Bilogrevic,et al.  (Smart)watch your taps: side-channel keystroke inference attacks using smartwatches , 2015, SEMWEB.

[34]  C. Rosenberger,et al.  Provisional chapter Evaluation of Biometric Systems , 2012 .

[35]  Abhishek Mitra,et al.  Voice based Biometric Security System , 2002 .

[36]  Young-Sil Lee,et al.  Mutual authentication in wireless body sensor networks (WBSN) based on Physical Unclonable Function (PUF) , 2013, 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC).

[37]  Kee-Young Yoo,et al.  An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography , 2016, PloS one.

[38]  Juan E. Tapiador,et al.  A Survey of Wearable Biometric Recognition Systems , 2016, ACM Comput. Surv..

[39]  Ashraf Darwish,et al.  Wearable and Implantable Wireless Sensor Network Solutions for Healthcare Monitoring , 2011, Sensors.

[40]  J. Wayman,et al.  ANALYSIS OF SECURITY VULNERABILITIES IN BIOMETRIC SYSTEMS , 2009 .

[41]  Sébastien Marcel,et al.  On the vulnerability of face verification systems to hill-climbing attacks , 2010, Pattern Recognit..

[42]  Maged Hamada Ibrahim,et al.  Secure anonymous mutual authentication for star two-tier wireless body area networks , 2016, Comput. Methods Programs Biomed..

[43]  Saad M. Darwish Design of adaptive biometric gait recognition algorithm with free walking directions , 2017, IET Biom..

[44]  Teerakiat Kerdcharoen,et al.  A Novel Wearable Electronic Nose for Healthcare Based on Flexible Printed Chemical Sensor Array , 2014, Sensors.

[45]  Dimitrios Hatzinakos,et al.  Evaluation of PPG Biometrics for Authentication in Different States , 2017, 2018 International Conference on Biometrics (ICB).

[46]  Yitao Duan,et al.  Protecting User Data in Ubiquitous Computing: Towards Trustworthy Environments , 2004, Privacy Enhancing Technologies.

[47]  Richard Youmaran,et al.  Towards a measure of biometric feature information , 2009, Pattern Analysis and Applications.

[48]  Hyun-Ju Lee,et al.  Wearable Devices ’ Security Risk Analysis and its Countermeasures : Korean cases , 2015 .

[49]  Brad Wing Information technology :: American National Standard for Information Systems-data format for the interchange of fingerprint, facial & other biometric information , 2011 .

[50]  C. Van Hoof,et al.  Thermoelectric MEMS generators as a power supply for a body area network , 2005, The 13th International Conference on Solid-State Sensors, Actuators and Microsystems, 2005. Digest of Technical Papers. TRANSDUCERS '05..

[51]  E. Sathiyamoorthy,et al.  A Prevention Model for Session Hijack Attacks in Wireless Networks Using Strong and Encrypted Session ID , 2014 .

[52]  Bruce Schneier,et al.  Cryptanalytic Attacks on Pseudorandom Number Generators , 1998, FSE.

[53]  Tim Oates,et al.  An ultra low power feature extraction and classification system for wearable seizure detection , 2015, 2015 37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC).

[54]  Andy Adler,et al.  Biometric System Security , 2008 .

[55]  Paul C. Kocher,et al.  Differential Power Analysis , 1999, CRYPTO.

[56]  Maarten Lont,et al.  Wake-up Receiver Based Ultra-Low-Power WBAN , 2014 .

[57]  António Pereira,et al.  Wireless Body Area Networks for Healthcare Applications: Protocol Stack Review , 2015, Int. J. Distributed Sens. Networks.

[58]  Luca Palmerini,et al.  Performance Evaluation of State of the Art Systems for Physical Activity Classification of Older Subjects Using Inertial Sensors in a Real Life Scenario: A Benchmark Study , 2016, Sensors.

[59]  Edmund Spinella Biometric Scanning Technologies: Finger, Facial and Retinal Scanning , 2017 .

[60]  Sebastian Risi,et al.  Deep-Spying: Spying using Smartwatch and Deep Learning , 2015, ArXiv.

[61]  Luca Benini,et al.  Synchronization methods for Bluetooth based WBANs , 2013, 2013 IEEE International Conference on Body Sensor Networks.

[62]  Honggang Wang,et al.  Reliability modeling of relay-assisted wireless body area networks , 2016, 2016 Annual Reliability and Maintainability Symposium (RAMS).

[63]  Hao Chen,et al.  On the Practicality of Motion Based Keystroke Inference Attack , 2012, TRUST.

[64]  Giulio Ruffini,et al.  STARFAST : a Wireless Wearable EEG / ECG Biometric System based on the ENOBIO Sensor , 2008 .

[65]  Yuguang Fang,et al.  Efficient trust based information sharing schemes over distributed collaborative networks , 2011, 2011 - MILCOM 2011 Military Communications Conference.

[66]  Ryan J. Halter,et al.  A wearable system that knows who wears it , 2014, MobiSys.

[67]  Ahmed Bouridane,et al.  Threats models on biometric systems: A comparative study. , 2012, CASoN 2012.

[68]  Mahmudur Rahman,et al.  SensCrypt: A Secure Protocol for Managing Low Power Fitness Trackers , 2014, 2014 IEEE 22nd International Conference on Network Protocols.

[69]  Alexander P. Pons,et al.  Realization of a Universal Patient Identifier for Electronic Medical Records Through Biometric Technology , 2009, IEEE Transactions on Information Technology in Biomedicine.

[70]  Zhu Han,et al.  Bad Data Injection Attack and Defense in Electricity Market Using Game Theory Study , 2012, IEEE Transactions on Smart Grid.

[71]  Daniel T. H. Lai,et al.  An Overview of Intra-Body Communication Transceivers for Biomedical Applications , 2015 .

[72]  Christophe Rosenberger,et al.  Fast computation of the performance evaluation of biometric systems: Application to multibiometrics , 2012, Future Gener. Comput. Syst..

[73]  John A. Nelder,et al.  A Simplex Method for Function Minimization , 1965, Comput. J..

[74]  Bhagavatula Vijaya Kumar,et al.  Biometric Encryption using image processing , 1998, Electronic Imaging.

[75]  Simon Haykin,et al.  Cognitive radio: brain-empowered wireless communications , 2005, IEEE Journal on Selected Areas in Communications.

[76]  Carl A. Gunter,et al.  Inside Job: Understanding and Mitigating the Threat of External Device Mis-Binding on Android , 2014, NDSS.

[77]  Martin Wattenberg,et al.  A fuzzy commitment scheme , 1999, CCS '99.

[78]  John Chuang One-Step Two-Factor Authentication with Wearable BioSensors , 2014 .

[79]  Shuangquan Wang,et al.  Continuous Authentication With Touch Behavioral Biometrics and Voice on Wearable Glasses , 2017, IEEE Transactions on Human-Machine Systems.

[80]  Jaihie Kim,et al.  Error Correction Codes for Biometric Cryptosystem: An Overview , 2015 .

[81]  Lei Wang,et al.  Wearable biometric authentication based on human body communication , 2015, 2015 IEEE 12th International Conference on Wearable and Implantable Body Sensor Networks (BSN).

[82]  Samaher Al-Janabi,et al.  Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications , 2017 .

[83]  Ingrid Moerman,et al.  A survey on wireless body area networks , 2011, Wirel. Networks.

[84]  Hoon-Jae Lee,et al.  An Efficient Encryption Scheme using Elliptic Curve Cryptography (ECC) with Symmetric Algorithm for Healthcare System , 2014 .

[85]  Anil K. Jain,et al.  Biometric template transformation: a security analysis , 2010, Electronic Imaging.

[86]  Marko Kos,et al.  A Wearable Device and System for Movement and Biometric Data Acquisition for Sports Applications , 2017, IEEE Access.

[87]  Andreas Uhl,et al.  A survey on biometric cryptosystems and cancelable biometrics , 2011, EURASIP J. Inf. Secur..

[88]  Piotr Rapta,et al.  An improved algorithm for feature extraction from a fingerprint fuzzy image , 2013 .

[89]  Yuval Elovici,et al.  Handwritten Signature Verification Using Hand-Worn Devices , 2016, ArXiv.

[90]  Rafail Ostrovsky,et al.  Secure Remote Authentication Using Biometric Data , 2005, EUROCRYPT.

[91]  Anil K. Jain,et al.  Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..

[92]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[93]  Younghyun Kim,et al.  Photoplethysmography as a form of biometric authentication , 2015, 2015 IEEE SENSORS.

[94]  Ingrid Verbauwhede,et al.  Secure IRIS Verification , 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07.

[95]  Fengyuan Xu,et al.  IMDGuard: Securing implantable medical devices with the external wearable guardian , 2011, 2011 Proceedings IEEE INFOCOM.

[96]  Sharath Pankanti,et al.  Biometric Recognition: Security and Privacy Concerns , 2003, IEEE Secur. Priv..

[97]  S. Cerutti,et al.  Signal Processing and Feature Extraction for Sleep Evaluation in Wearable Devices , 2006, 2006 International Conference of the IEEE Engineering in Medicine and Biology Society.

[98]  Ekram Hossain,et al.  Evolution toward 5G multi-tier cellular wireless networks: An interference management perspective , 2014, IEEE Wireless Communications.

[99]  Rachana Kamble,et al.  Wireless Sensor Network MAC Protocol: SMAC & TMAC , 2013 .

[100]  Vinay Kumar Singh,et al.  Performanance Analysis of Mac Protocols for WBAN on Varying Transmitted Output Power of Nodes , 2013 .

[101]  Driss Aboutajdine,et al.  Vulnerabilities of fuzzy vault schemes using biometric data with traces , 2015, 2015 International Wireless Communications and Mobile Computing Conference (IWCMC).

[102]  Raymond N. J. Veldhuis,et al.  Practical Biometric Authentication with Template Protection , 2005, AVBPA.

[103]  Barry K. Gilbert,et al.  Towards real-time QRS feature extraction for wearable monitors , 2016, 2016 38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC).

[104]  Guang-Zhong Yang,et al.  Network Topologies, Communication Protocols, and Standards , 2014, Body Sensor Networks.

[105]  Ahmed Bouridane,et al.  Threats models on biometri systems: A comparative study , 2012, 2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN).

[106]  Loserian S. Laizer,et al.  Enhancing the Accuracy of Biometric Feature Extraction Fusion Using Gabor Filter and Mahalanobis Distance Algorithm , 2014, ArXiv.

[107]  Mehmet Rasit Yuce,et al.  MAC Protocols for UWB-Based WBAN Applications , 2014 .

[108]  Manmeet Mahinderjit Singh,et al.  WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS , 2016 .

[109]  Nissan Kunju,et al.  EMG Signal Analysis for Identifying Walking Patterns of Normal Healthy Individuals , 2009 .

[110]  Sébastien Marcel,et al.  Spoofing Face Recognition With 3D Masks , 2014, IEEE Transactions on Information Forensics and Security.

[111]  Ana L. N. Fred,et al.  ECG Biometrics: Principles and Applications , 2013, BIOSIGNALS.

[112]  Madhu Sudan,et al.  A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..

[113]  Zouheir Trabelsi,et al.  Resilience of fingerprint and iris readers against common denial of service attacks , 2014, 2014 World Congress on Computer Applications and Information Systems (WCCAIS).

[114]  Paolo Bonato,et al.  Advances in wearable technology and applications in physical medicine and rehabilitation , 2005, Journal of NeuroEngineering and Rehabilitation.

[115]  Einar Snekkenes,et al.  Gait Authentication and Identification Using Wearable Accelerometer Sensor , 2007, 2007 IEEE Workshop on Automatic Identification Advanced Technologies.

[116]  Kat Austen THE TROUBLE WITH WEARABLES , 2015, Nature.

[117]  Ani Nahapetian Side-channel attacks on mobile and wearable systems , 2016, 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC).

[118]  Song Han,et al.  MBStar: A Real-time Communication Protocol for Wireless Body Area Networks , 2011, 2011 23rd Euromicro Conference on Real-Time Systems.

[119]  Saurabh Pal,et al.  Photoplethysmogram signal based biometric recognition using linear discriminant classifier , 2016, 2016 2nd International Conference on Control, Instrumentation, Energy & Communication (CIEC).

[120]  Vivian Genaro Motti,et al.  Human Factors Considerations in the Design of Wearable Devices , 2014 .

[121]  Emil Jovanov,et al.  Improving Power Efficiency in WBAN Communication Using Wake Up Methods , 2012, MobiHealth.

[122]  Injong Rhee,et al.  Z-MAC: a hybrid MAC for wireless sensor networks , 2005, SenSys '05.

[123]  David Kotz,et al.  Vocal resonance as a passive biometric , 2014 .

[124]  Arif I. Sarwat,et al.  A Multi-Step Predictive Model to Estimate Li-Ion State of Charge for Higher C-Rates , 2019, 2019 IEEE International Conference on Environment and Electrical Engineering and 2019 IEEE Industrial and Commercial Power Systems Europe (EEEIC / I&CPS Europe).

[125]  Fabio Roli,et al.  Adversarial Biometric Recognition : A review on biometric system security from the adversarial machine-learning perspective , 2015, IEEE Signal Processing Magazine.

[126]  Judith Liu-Jimenez,et al.  Evaluation of biometric system performance in the context of Common Criteria , 2013, Inf. Sci..

[127]  Akram Alomainy,et al.  Challenges with Current Wearable Technology in Monitoring Health Data and Providing Positive Behavioural Support , 2015, EAI Endorsed Trans. Future Intell. Educ. Environ..

[128]  Arun Ross,et al.  Biometric template security: Challenges and solutions , 2005, 2005 13th European Signal Processing Conference.

[129]  Kat Austen,et al.  What could derail the wearables revolution? , 2015, Nature.

[130]  M. Tarata Mechanomyography versus Electromyography, in monitoring the muscular fatigue , 2003, Biomedical engineering online.

[131]  Markus Schatten,et al.  Towards a General Definition of Biometric Systems , 2009, ArXiv.

[132]  Gian Luca Marcialis,et al.  Evaluation of multimodal biometric score fusion rules under spoof attacks , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).

[133]  Charlotte Hill,et al.  Wearables – the future of biometric technology? , 2015 .

[134]  Thoams Guthrie Zimmerman Personal area networks (PAN) : near-field intra-body communication , 1995 .

[135]  Raymond N. J. Veldhuis,et al.  Performance Evaluation of Fusing Protected Fingerprint Minutiae Templates on the Decision Level , 2012, Sensors.

[136]  Ramachandra Raghavendra,et al.  Presentation Attack Detection Methods for Face Recognition Systems , 2017, ACM Comput. Surv..

[137]  Saptarshi Chakraborty,et al.  An Overview of Face Liveness Detection , 2014, ArXiv.

[138]  Mingjie Zhuang,et al.  An overview of Physical layers on wireless body area network , 2012, Anti-counterfeiting, Security, and Identification.

[139]  Arun Ross,et al.  Securing iris recognition systems against masquerade attacks , 2013, Defense, Security, and Sensing.

[140]  Sanjeev Sofat,et al.  Template and Database Security in Biometrics Systems: A Challenging Task , 2010 .

[142]  Torben Pedersen PEM, Privacy-Enhanced Mail , 2011, Encyclopedia of Cryptography and Security.

[143]  K. Langendoen,et al.  The k MAC framework : redefining MAC protocols for wireless sensor networks , 2010 .

[144]  Michael Snyder,et al.  Big data and health. , 2019, The Lancet. Digital health.

[145]  Oscar Duque,et al.  Advances in Classifier Evaluation: Novel Insights for an Electric Data-Driven Motor Diagnosis , 2016, IEEE Access.

[146]  Mohammed Feham,et al.  Trust Key Management Scheme for Wireless Body Area Networks , 2011, Int. J. Netw. Secur..

[147]  Lena Berglin Smart Textiles and Wearable Technology , 2013 .

[148]  Denis Speicher Vulnerability Analysis of Biometric Systems Using Attack Trees , 2006 .

[149]  Dmitry O. Gorodnichy,et al.  Evolution and evaluation of biometric systems , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.

[150]  Koen Langendoen,et al.  The λMAC framework: redefining MAC protocols for wireless sensor networks , 2010, Wirel. Networks.

[151]  Ahmed Mehaoua,et al.  Energy-aware topology design for wireless body area networks , 2012, 2012 IEEE International Conference on Communications (ICC).

[152]  Molly Zellweger Mackinlay Phases of Accuracy Diagnosis: (In)visibility of System Status in the Fitbit , 2013 .

[153]  Patrizio Campisi,et al.  Hill-Climbing Attacks on Multibiometrics Recognition Systems , 2015, IEEE Transactions on Information Forensics and Security.

[154]  Arif I. Sarwat,et al.  A Generic Framework for EEG-Based Biometric Authentication , 2015, 2015 12th International Conference on Information Technology - New Generations.

[155]  S. Swamynathan,et al.  A Novel Multimodal Biometric Fusion Technique for Security , 2022 .

[156]  Baptiste Hemery,et al.  Towards the Security Evaluation of Biometric Authentication Systems , 2011 .

[157]  Mahmudur Rahman,et al.  Secure Management of Low Power Fitness Trackers , 2013, IEEE Transactions on Mobile Computing.

[158]  Stilianos Vidalis,et al.  Assessing Identity Theft in the Internet of Things , 2014 .

[159]  Pingzhi Fan,et al.  Performance evaluation of score level fusion in multimodal biometric systems , 2010, Pattern Recognit..

[160]  L. E. Myers An Exploration of Voice Biometrics , 2004 .

[161]  Michael K. Reiter,et al.  Towards practical biometric key generation with randomized biometric templates , 2008, CCS.

[162]  Arif I. Sarwat,et al.  Prediction of Li-Ion Battery State of Charge Using Multilayer Perceptron and Long Short-Term Memory Models , 2019, 2019 IEEE Transportation Electrification Conference and Expo (ITEC).

[163]  Chien-Hsu Chen,et al.  Ergonomic Consideration for Wearable Device Design in Frozen Shoulder Rehabilitation , 2016 .

[164]  Joseph Wei,et al.  How Wearables Intersect with the Cloud and the Internet of Things : Considerations for the developers of wearables. , 2014, IEEE Consumer Electronics Magazine.

[165]  Jian-Ping Li,et al.  Study on Multi-Biometric Feature Fusion and Recognition Model , 2008, 2008 International Conference on Apperceiving Computing and Intelligence Analysis.

[166]  Malay Kishore Dutta,et al.  A Secure Encryption Method for Biometric Templates Based on Chaotic Theory , 2016, Trans. Comput. Sci..

[167]  Young-Geun Park,et al.  Smart Sensor Systems for Wearable Electronic Devices , 2017, Polymers.

[168]  D 3 . 3 : Description of Metrics For the Evaluation of Biometric Performance , 2022 .

[169]  Christoph Busch,et al.  Presentation attack detection methods for fingerprint recognition systems: a survey , 2014, IET Biom..

[170]  A. Lymberis,et al.  Smart wearable systems for personalised health management: current R&D and future challenges , 2003, Proceedings of the 25th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (IEEE Cat. No.03CH37439).

[171]  Anil K. Jain,et al.  Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.

[172]  Aleksandra Babich,et al.  Biometric Authentication. Types of biometric identifiers , 2012 .

[173]  Zhenfu Cao,et al.  Efficient Trust Based Information Sharing Schemes over Distributed Collaborative Networks , 2013 .

[174]  Christian Böhm,et al.  Efficient Comparison of Encrypted Biometric Templates , 2012, TrustBus.

[175]  Adebayo Kolawole John,et al.  Temperament and Mood Detection Using Case- Based Reasoning , 2014 .

[176]  Stephanie Schuckers,et al.  One Time Biometric Transform to secure biometric templates , 2010, 2010 The 2nd International Conference on Computer and Automation Engineering (ICCAE).

[177]  Mahmudur Rahman,et al.  Movee: Video Liveness Verification for Mobile Devices Using Built-In Motion Sensors , 2016, IEEE Transactions on Mobile Computing.

[178]  Mohammed R. Al-Mulla,et al.  Novel Pseudo-Wavelet Function for MMG Signal Extraction during Dynamic Fatiguing Contractions , 2014, Sensors.