Sensor-Based mHealth Authentication for Real-Time Remote Healthcare Monitoring System: A Multilayer Systematic Review

The new and groundbreaking real-time remote healthcare monitoring system on sensor-based mobile health (mHealth) authentication in telemedicine has considerably bounded and dispersed communication components. mHealth, an attractive part in telemedicine architecture, plays an imperative role in patient security and privacy and adapts different sensing technologies through many built-in sensors. This study aims to improve sensor-based defence and attack mechanisms to ensure patient privacy in client side when using mHealth. Thus, a multilayer taxonomy was conducted to attain the goal of this study. Within the first layer, real-time remote monitoring studies based on sensor technology for telemedicine application were reviewed and analysed to examine these technologies and provide researchers with a clear vision of security- and privacy-based sensors in the telemedicine area. An extensive search was conducted to find articles about security and privacy issues, review related applications comprehensively and establish the coherent taxonomy of these articles. ScienceDirect, IEEE Xplore and Web of Science databases were investigated for articles on mHealth in telemedicine-based sensor. A total of 3064 papers were collected from 2007 to 2017. The retrieved articles were filtered according to the security and privacy of sensor-based telemedicine applications. A total of 19 articles were selected and classified into two categories. The first category, 57.89% (n = 11/19), included survey on telemedicine articles and their applications. The second category, 42.1% (n = 8/19), included articles contributed to the three-tiered architecture of telemedicine. The collected studies improved the essential need to add another taxonomy layer and review the sensor-based smartphone authentication studies. This map matching for both taxonomies was developed for this study to investigate sensor field comprehensively and gain access to novel risks and benefits of the mHealth security in telemedicine application. The literature on sensor-based smartphones in the second layer of our taxonomy was analysed and reviewed. A total of 599 papers were collected from 2007 to 2017. In this layer, we obtained a final set of 81 articles classified into three categories. The first category of the articles [86.41% (n = 70/81)], where sensor-based smartphones were examined by utilising orientation sensors for user authentication, was used. The second category [7.40% (n = 6/81)] included attack articles, which were not intensively included in our literature analysis. The third category [8.64% (n = 7/81)] included ‘other’ articles. Factors were considered to understand fully the various contextual aspects of the field in published studies. The characteristics included the motivation and challenges related to sensor-based authentication of smartphones encountered by researchers and the recommendations to strengthen this critical area of research. Finally, many studies on the sensor-based smartphone in the second layer have focused on enhancing accurate authentication because sensor-based smartphones require sensors that could authentically secure mHealth.

[1]  B. B. Zaidan,et al.  New Classification Methods for Hiding Information into Two Parts: Multimedia Files and Non Multimedia Files , 2010, ArXiv.

[2]  Christoph Busch,et al.  Classifying accelerometer data via Hidden Markov Models to authenticate people by the way they walk , 2011, 2011 Carnahan Conference on Security Technology.

[3]  Joel J. P. C. Rodrigues,et al.  Mobile-health: A review of current state in 2015 , 2015, J. Biomed. Informatics.

[4]  Md Rafiqul Islam,et al.  "Stego-Analysis Chain, Session Two" Novel Approach of Stego-Analysis System for Image File , 2009, 2009 International Association of Computer Science and Information Technology - Spring Conference.

[5]  B. B. Zaidan,et al.  Secure Topology for Electronic Medical Record Transmissions , 2010 .

[6]  B. B. Zaidan,et al.  Optimization Digital Image Watermarking Technique for Patent Protection , 2010, ArXiv.

[7]  B. B. Zaidan,et al.  Commercialization Strategy and Implementation Plans for the Proposed Vitual Anti-Spam System based on Feasibility Study , 2015 .

[8]  Yang Xiao,et al.  Mobile Telemedicine: A Computing and Networking Perspective , 2008 .

[9]  A.Z.Ansaef Aos Securing cover-file of hidden data using statistical technique and aes encryption algorithm , 2009 .

[10]  B. B. Zaidan,et al.  A Systematic Review on Smartphone Skin Cancer Apps: Coherent Taxonomy, Motivations, Open Challenges and Recommendations, and New Research Direction , 2017, J. Circuits Syst. Comput..

[11]  Hamid A. Jalab,et al.  A new system for hidden data within header space for EXE-File using object oriented technique , 2010, 2010 3rd International Conference on Computer Science and Information Technology.

[12]  Hamid A. Jalab,et al.  Securing electronic medical records transmissions over unsecured communications: An overview for better medical governance , 2010 .

[13]  B. B. Zaidan,et al.  Multi-criteria analysis for OS-EMR software selection problem: A comparative study , 2015, Decis. Support Syst..

[14]  Seongil Lee,et al.  Access to an Automated Security System Using Gesture-Based Passwords , 2012, 2012 15th International Conference on Network-Based Information Systems.

[15]  B. B. Zaidan,et al.  Overview: Main Fundamentals for Steganography , 2010, ArXiv.

[16]  B. B. Zaidan,et al.  Intrusion Detection System: Overview , 2010, ArXiv.

[17]  Marcos A. Simplício,et al.  Mobile health in emerging countries: A survey of research initiatives in Brazil , 2013, Int. J. Medical Informatics.

[18]  Prasant Mohapatra,et al.  Sensor-assisted facial recognition: an enhanced biometric authentication system for smartphones , 2014, MobiSys.

[19]  L. Schulmeister Technology and the Transformation of Oncology Care. , 2016, Seminars in oncology nursing.

[20]  A. A. Zaidan,et al.  A review of audio based steganography and digital watermarking , 2011 .

[21]  A. A. Zaidan,et al.  High Securing Cover-File of Hidden Data Using Statistical Technique and AES Encryption Algorithm , 2009 .

[22]  A. A. Zaidan,et al.  Using the features of mosaic image and AES cryptosystem to implement an extremely high rate and high secure data hidden: analytical study , 2010 .

[23]  Sheikh Iqbal Ahamed,et al.  Seeing Beyond Visibility: A Four Way Fusion of User Authentication for Efficient Usable Security on Mobile Devices , 2014, 2014 IEEE Eighth International Conference on Software Security and Reliability-Companion.

[24]  Joel J P C Rodrigues,et al.  Looking at Fog Computing for E-Health through the Lens of Deployment Challenges and Applications , 2020, Sensors.

[25]  A. A. Zaidan,et al.  Novel simulation framework of three-dimensional skull bio-metric measurement , 2009 .

[26]  Ahmed Wathik Naji,et al.  Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography , 2009 .

[27]  A. A. Zaidan,et al.  Securing m-Government Transmission Based on Symmetric and Asymmetric Algorithms: A Review , 2013 .

[28]  Andrea F. Abate,et al.  I-Am: Implicitly Authenticate Me—Person Authentication on Mobile Devices Through Ear Shape and Arm Gesture , 2019, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[29]  B. B. Zaidan,et al.  Open source EMR software: Profiling, insights and hands-on analysis , 2014, Comput. Methods Programs Biomed..

[30]  T. Madhloom,et al.  Novel Approach for High Secure and High Rate Data Hidden in the Image Using Image Texture Analysis , 2009 .

[31]  Bilal Zaidan,et al.  Quality of Image vs. Quantity of Data Hidden in the Image , 2009, IPCV.

[32]  Miss Laiha Mat Kiah,et al.  Suitability of using SOAP protocol to secure electronic medical record databases transmission , 2010 .

[33]  A. A. Zaidan,et al.  Challenges of Hidden Data in the Unused Area Two within Executable Files , 2009 .

[34]  K. Andriole Security of electronic medical information and patient privacy: what you need to know. , 2014, Journal of the American College of Radiology : JACR.

[35]  B. B. Zaidan,et al.  A Security Framework for Nationwide Health Information Exchange based on Telehealth Strategy , 2015, Journal of Medical Systems.

[36]  A. A. Zaidan,et al.  StegoMos: a secure novel approach of high rate data hidden using mosaic image and ANN-BMP cryptosystem , 2010 .

[37]  Gueesang Lee,et al.  Implicit authentication based on ear shape biometrics using smartphone camera during a call , 2012, 2012 IEEE International Conference on Systems, Man, and Cybernetics (SMC).

[38]  Nasir D. Memon,et al.  An HMM-based multi-sensor approach for continuous mobile authentication , 2015, MILCOM 2015 - 2015 IEEE Military Communications Conference.

[39]  Gonzalo Bailador,et al.  Authentication in mobile devices through hand gesture recognition , 2012, International Journal of Information Security.

[40]  Anil K. Jain,et al.  Continuous authentication of mobile user: Fusion of face image and inertial Measurement Unit data , 2015, 2015 International Conference on Biometrics (ICB).

[41]  A. A. Zaidan,et al.  Comparative study on the evaluation and benchmarking information hiding approaches based multi-measurement analysis using TOPSIS method with different normalisation, separation and context techniques , 2018 .

[42]  Ming Yang,et al.  Secure fingertip mouse for mobile devices , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.

[43]  Guoyou Huang,et al.  Bioprinting-Based High-Throughput Fabrication of Three-Dimensional MCF-7 Human Breast Cancer Cellular Spheroids , 2015 .

[44]  B. B. Zaidan,et al.  Suitability of adopting S/MIME and OpenPGP email messages protocol to secure electronic medical records , 2013, Second International Conference on Future Generation Communication Technologies (FGCT 2013).

[45]  Adil Mehmood Khan,et al.  Gait fingerprinting-based user identification on smartphones , 2016, 2016 International Joint Conference on Neural Networks (IJCNN).

[46]  Christoph Busch,et al.  Authentication of Smartphone Users Based on the Way They Walk Using k-NN Algorithm , 2012, 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[47]  A. A. Zaidan,et al.  A novel embedding method to increase capacity and robustness of low-bit encoding audio steganography technique using noise gate software logic algorithm , 2010 .

[48]  Hai Huang,et al.  You Are How You Touch: User Verification on Smartphones via Tapping Behaviors , 2014, 2014 IEEE 22nd International Conference on Network Protocols.

[49]  B. B. Zaidan,et al.  Real-Time Fault-Tolerant mHealth System: Comprehensive Review of Healthcare Services, Opens Issues, Challenges and Methodological Aspects , 2018, Journal of Medical Systems.

[50]  Javier Guerra-Casanova,et al.  A SEQUENCE ALIGNMENT APPROACH APPLIED TO A MOBILE AUTHENTICATION TECHNIQUE BASED ON GESTURES , 2013 .

[51]  Maurizio Talamo,et al.  Movement based biometric authentication with smartphones , 2015, 2015 International Carnahan Conference on Security Technology (ICCST).

[52]  B. B. Zaidan,et al.  Conceptual framework for the security of mobile health applications on Android platform , 2018, Telematics Informatics.

[53]  Christoph Busch,et al.  Unobtrusive User-Authentication on Mobile Phones Using Biometric Gait Recognition , 2010, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[54]  Tao Feng,et al.  Continuous Mobile Authentication Using Virtual Key Typing Biometrics , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.

[55]  Kaigui Bian,et al.  TapLock: Exploit finger tap events for enhancing attack resilience of smartphone passwords , 2015, 2015 IEEE International Conference on Communications (ICC).

[56]  Jonathan Loo,et al.  Authentication of Smartphone Users Based on Activity Recognition and Mobile Sensing , 2017, Sensors.

[57]  Gonzalo Bailador,et al.  Score optimization and template updating in a biometric technique for authentication in mobiles based on gestures , 2011, J. Syst. Softw..

[58]  Dawu Gu,et al.  CLIP: Continuous Location Integrity and Provenance for Mobile Phones , 2015, 2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems.

[59]  R. Yaw Health care delivery. , 1971, Hospitals.

[60]  A. A. Zaidan,et al.  "Stego-Analysis Chain, Session One" Investigations on Steganography Weakness vs Stego-Analysis System for Multimedia File , 2009, 2009 International Association of Computer Science and Information Technology - Spring Conference.

[61]  Silvia Moreno,et al.  Remote monitoring system of vital signs for triage and detection of anomalous patient states in the emergency room , 2016, 2016 XXI Symposium on Signal Processing, Images and Artificial Vision (STSIVA).

[62]  Patrick Bours,et al.  Improved Cycle Detection for Accelerometer Based Gait Authentication , 2010, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[63]  B. B. Zaidan,et al.  Computerized Algorithm for Fetal Heart Rate Baseline and Baseline Variability Estimation based on Distance Between Signal Average and a Value , 2011 .

[64]  B. B. Zaidan,et al.  Software and Hardware FPGA-Based Digital Watermarking and Steganography Approaches: Toward New Methodology for Evaluation and Benchmarking Using Multi-Criteria Decision-Making Techniques , 2017, J. Circuits Syst. Comput..

[65]  Xiaohui Liang,et al.  PHDA: A priority based health data aggregation with privacy preservation for cloud assisted WBANs , 2014, Inf. Sci..

[66]  A. A. Zaidan,et al.  Mobile-Based Patient Monitoring Systems: A Prioritisation Framework Using Multi-Criteria Decision-Making Techniques , 2019, Journal of Medical Systems.

[67]  Adam J. Aviv,et al.  Practicality of accelerometer side channels on smartphones , 2012, ACSAC '12.

[68]  Zulfiqar Ali Memon,et al.  Biometric authentication technique using smartphone sensor , 2016, 2016 13th International Bhurban Conference on Applied Sciences and Technology (IBCAST).

[69]  Devu Manikantan Shila,et al.  A multi-faceted approach to user authentication for mobile devices — Using human movement, usage, and location patterns , 2016, 2016 IEEE Symposium on Technologies for Homeland Security (HST).

[70]  Ruby B. Lee,et al.  Implicit Authentication for Smartphone Security , 2015, ICISSP.

[71]  B. B. Zaidan,et al.  Design and Develop a Video Conferencing Framework for Real-Time Telemedicine Applications Using Secure Group-Based Communication Architecture , 2014, Journal of Medical Systems.

[72]  B. B. Zaidan,et al.  Challenges, Alternatives, and Paths to Sustainability: Better Public Health Promotion Using Social Networking Pages as Key Tools , 2015, Journal of Medical Systems.

[73]  B. B. Zaidan,et al.  Frame Selected Approach for Hiding Data within MPEG Video Using Bit Plane Complexity Segmentation , 2009, ArXiv.

[74]  Fazidah Othman,et al.  Securing cover-file without limitation of hidden data size using computation between cryptography and steganography , 2009 .

[75]  B. Zaidan,et al.  New Framework for High Secure Data Hidden in the MPEG Using AES Encryption Algorithm , 2009 .

[76]  A. A. Zaidan,et al.  Review of mobile short message service security issues and techniques towards the solution , 2011 .

[77]  Hamed Ketabdar,et al.  MagiThings: Gestural Interaction with Mobile Devices Based on Using Embedded Compass (Magnetic Field) Sensor , 2013, Int. J. Mob. Hum. Comput. Interact..

[78]  Ashley Fisher,et al.  Review of mobile health technology for military mental health. , 2014, Military medicine.

[79]  Zarinah Mohd Kasirun,et al.  Hiding Data in Video File: An Overview , 2010 .

[80]  A. A. Zaidan,et al.  A new digital watermarking evaluation and benchmarking methodology using an external group of evaluators and multi‐criteria analysis based on ‘large‐scale data’ , 2017, Softw. Pract. Exp..

[81]  Yu Zhong,et al.  Pace independent mobile gait biometrics , 2015, 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS).

[82]  A. A. Zaidan,et al.  A Systematic Review for Enabling of Develop a Blockchain Technology in Healthcare Application: Taxonomy, Substantially Analysis, Motivations, Challenges, Recommendations and Future Direction , 2019, Journal of Medical Systems.

[83]  Othman Omran Khalifa,et al.  A review on multimedia communications cryptography , 2011 .

[84]  Zarinah Mohd Kasirun,et al.  On the accuracy of hiding information metrics: counterfeit protection for education and important certificates , 2010 .

[85]  André Carlos Ponce de Leon Ferreira de Carvalho,et al.  Adaptive Algorithms in Accelerometer Biometrics , 2014, 2014 Brazilian Conference on Intelligent Systems.

[86]  Rami Alnaqeib,et al.  Towards Corrosion Detection System , 2010 .

[87]  B. B. Zaidan,et al.  Systematic Review of Real-time Remote Health Monitoring System in Triage and Priority-Based Sensor Technology: Taxonomy, Open Challenges, Motivation and Recommendations , 2018, Journal of Medical Systems.

[88]  Christoph Busch,et al.  Classification of Acceleration Data for Biometric Gait Recognition on Mobile Devices , 2011, BIOSIG.

[89]  R B Roth Health care delivery. , 1972, JAMA.

[90]  B. B. Zaidan,et al.  Approved Undetectable-Antivirus Steganography for Multimedia Information in PE-File , 2009, 2009 International Association of Computer Science and Information Technology - Spring Conference.

[91]  A. A. Zaidan,et al.  Comprehensive Insights Into the Criteria of Student Performance in Various Educational Domains , 2018, IEEE Access.

[92]  B. B. Zaidan,et al.  A review of the automated detection and classification of acute leukaemia: Coherent taxonomy, datasets, validation and performance measurements, motivation, open challenges and recommendations , 2018, Comput. Methods Programs Biomed..

[93]  Zarinah Mohd Kasirun,et al.  On the capacity and security of steganography approaches: An overview , 2010 .

[94]  B. B. Zaidan,et al.  A Systematic Review for Human EEG Brain Signals Based Emotion Classification, Feature Extraction, Brain Condition, Group Comparison , 2018, Journal of Medical Systems.

[95]  Thuc Dinh Nguyen,et al.  Gait authentication on mobile phone using biometric cryptosystem and fuzzy commitment scheme , 2015, International Journal of Information Security.

[96]  René Mayrhofer,et al.  An Analysis of Different Approaches to Gait Recognition Using Cell Phone Based Accelerometers , 2013, MoMM '13.

[97]  Chunming Qiao,et al.  SESAME: Smartphone enabled secure access to multiple entities , 2013, 2013 International Conference on Computing, Networking and Communications (ICNC).

[98]  A. A. Zaidan,et al.  On the Differences between Hiding Information and Cryptography Techniques: An Overview , 2010 .

[99]  Fazida Othman,et al.  An Extensive Empirical Study for the Impact of Increasing Data Hidden on the Images Texture , 2009, 2009 International Conference on Future Computer and Communication.

[100]  Vincent Sritapan,et al.  At Your Fingertips: Considering Finger Distinctness in Continuous Touch-Based Authentication for Mobile Devices , 2016, 2016 IEEE Security and Privacy Workshops (SPW).

[101]  Nor Badrul Anuar,et al.  The rise of keyloggers on smartphones: A survey and insight into motion-based tap inference attacks , 2016, Pervasive Mob. Comput..

[102]  B. B. Zaidan,et al.  Systematic Review of an Automated Multiclass Detection and Classification System for Acute Leukaemia in Terms of Evaluation and Benchmarking, Open Challenges, Issues and Methodological Aspects , 2018, Journal of Medical Systems.

[103]  Bachar El Hassan,et al.  A novel identification/verification model using smartphone's sensors and user behavior , 2013, 2013 2nd International Conference on Advances in Biomedical Engineering.

[104]  Xiao Wang,et al.  SenSec: Mobile security through passive sensing , 2013, 2013 International Conference on Computing, Networking and Communications (ICNC).

[105]  A. A. Zaidan,et al.  New Approach of Hidden Data in the portable Executable File without Change the Size of Carrier File Using Statistical Technique , 2009 .

[106]  Yang Xiao,et al.  Mobile, Secure Tele-Cardiology Based on Wireless and Sensor Networks , 2008 .

[107]  Gary M. Weiss,et al.  Cell phone-based biometric identification , 2010, 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[108]  Nor Badrul Anuar,et al.  The landscape of research on smartphone medical apps: Coherent taxonomy, motivations, open challenges and recommendations , 2015, Comput. Methods Programs Biomed..

[109]  Robert H. Deng,et al.  Seeing Your Face Is Not Enough: An Inertial Sensor-Based Liveness Detection for Face Authentication , 2015, CCS.

[110]  Othman Omran Khalifa,et al.  Suitability of using symmetric key to secure multimedia data: an overview, , 2010 .

[111]  B. B. Zaidan,et al.  Evaluation and selection of open-source EMR software packages based on integrated AHP and TOPSIS , 2015, J. Biomed. Informatics.

[112]  B. B. Zaidan,et al.  A review of disability EEG based wheelchair control system: Coherent taxonomy, open challenges and recommendations , 2018, Comput. Methods Programs Biomed..

[113]  André Carlos Ponce de Leon Ferreira de Carvalho,et al.  Adaptive algorithms applied to accelerometer biometrics in a data stream context , 2017, Intell. Data Anal..

[114]  A. A. Zaidan,et al.  New Design for Information Hiding with in Steganography Using Distortion Techniques , 2010 .

[115]  Qiang Liu,et al.  A behavioral authentication method for mobile gesture against resilient user posture , 2016, 2016 3rd International Conference on Systems and Informatics (ICSAI).

[116]  B. B. Zaidan,et al.  Multiclass Benchmarking Framework for Automated Acute Leukaemia Detection and Classification Based on BWM and Group-VIKOR , 2019, Journal of Medical Systems.

[117]  A. A. Zaidan,et al.  New Comprehensive Study to Assess Comparatively the QKD, XKMS, KDM in the PKI encryption algorithms , 2009 .

[118]  B. B. Zaidan,et al.  MIRASS: Medical Informatics Research Activity Support System Using Information Mashup Network , 2014, Journal of Medical Systems.

[119]  B. B. Zaidan,et al.  Based on Real Time Remote Health Monitoring Systems: A New Approach for Prioritization “Large Scales Data” Patients with Chronic Heart Diseases Using Body Sensors and Communication Technology , 2018, Journal of Medical Systems.

[120]  B. B. Zaidan,et al.  Real-time-based E-health systems: design and implementation of a lightweight key management protocol for securing sensitive information of patients , 2018, Health and Technology.

[121]  René Mayrhofer,et al.  Cross Pocket Gait Authentication Using Mobile Phone Based Accelerometer Sensor , 2015, EUROCAST.

[122]  B. B. Zaidan,et al.  Novel Methodology for Triage and Prioritizing Using "Big Data" Patients with Chronic Heart Diseases Through Telemedicine Environmental , 2017, Int. J. Inf. Technol. Decis. Mak..

[123]  B. B. Zaidan,et al.  Electronic medical record systems: decision support examination framework for individual, security and privacy concerns using multi-perspective analysis , 2018, Health and Technology.

[124]  Jun Han,et al.  ACCessory: password inference using accelerometers on smartphones , 2012, HotMobile '12.

[125]  B. B. Zaidan,et al.  Meeting the Security Requirements of Electronic Medical Records in the ERA of High-Speed Computing , 2014, Journal of Medical Systems.

[126]  B. B. Zaidan,et al.  A survey on communication components for IoT-based technologies in smart homes , 2018, Telecommunication Systems.

[127]  B. B. Zaidan,et al.  A distributed framework for health information exchange using smartphone technologies , 2017, J. Biomed. Informatics.

[128]  Matt Wolff Behavioral Biometric Identification on Mobile Devices , 2013, HCI.

[129]  A. A. Zaidan,et al.  A New System for Hiding Data within (Unused Area Two + Image Page) of Portable Executable File using Statistical Technique and Advance Encryption Standared , 2010 .

[130]  Yuji Watanabe,et al.  Influence of Holding Smart Phone for Acceleration-Based Gait Authentication , 2014, 2014 Fifth International Conference on Emerging Security Technologies.

[131]  Sheikh Iqbal Ahamed,et al.  ePet: when cellular phone learns to recognize its owner , 2009, SafeConfig '09.

[132]  A. A. Zaidan,et al.  An accurate method to obtain bio-metric measurements for three dimensional skull , 2010 .

[133]  Toshio Obi,et al.  Promoting ICT innovations for the ageing population in Japan , 2013, Int. J. Medical Informatics.

[134]  Charles C. Tappert,et al.  A Behavioral Biometrics User Authentication Study Using Motion Data from Android Smartphones , 2016, 2016 European Intelligence and Security Informatics Conference (EISIC).

[135]  B. B. Zaidan,et al.  Real-Time Remote Health-Monitoring Systems in a Medical Centre: A Review of the Provision of Healthcare Services-Based Body Sensor Information, Open Challenges and Methodological Aspects , 2018, Journal of Medical Systems.

[136]  Marcus Schwarting,et al.  On the Obfuscation of Image Sensor Fingerprints , 2015, 2015 Annual Global Online Conference on Information and Computer Technology (GOCICT).

[137]  Thuc Dinh Nguyen,et al.  A Generalized Authentication Scheme for Mobile Phones Using Gait Signals , 2015, ICETE.

[138]  B. B. Zaidan,et al.  Based Real Time Remote Health Monitoring Systems: A Review on Patients Prioritization and Related "Big Data" Using Body Sensors information and Communication Technology , 2018, Journal of Medical Systems.

[139]  Cuong Pham,et al.  SigVer3D: Accelerometer Based Verification of 3-D Signatures on Mobile Devices , 2014, KSE.

[140]  Thuc Dinh Nguyen,et al.  Adaptive Cross-Device Gait Recognition Using a Mobile Accelerometer , 2013, J. Inf. Process. Syst..

[141]  Timothy H. Riehle,et al.  Distance bounded energy detecting ultra-wideband impulse radio secure protocol , 2014, 2014 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society.

[142]  Noureddine Boudriga,et al.  Powerless security for Cardiac Implantable Medical Devices: Use of Wireless Identification and Sensing Platform , 2018, J. Netw. Comput. Appl..

[143]  Ruby B. Lee,et al.  Multi-sensor authentication to improve smartphone security , 2015, 2015 International Conference on Information Systems Security and Privacy (ICISSP).

[144]  Omar Zakaria,et al.  Enhancing Selective Encryption for H.264/AVC Using Advanced Encryption Standard , 2010, ArXiv.

[145]  René Mayrhofer,et al.  Accelerometer based Gait Recognition using Adapted Gaussian Mixture Models , 2016, MoMM.

[146]  Thuc Dinh Nguyen,et al.  On the instability of sensor orientation in gait verification on mobile phone , 2015, 2015 12th International Joint Conference on e-Business and Telecommunications (ICETE).

[147]  Rajesh Kumar,et al.  Treadmill attack on gait-based authentication systems , 2015, 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS).

[148]  Ahmed Wathik Naji,et al.  Optimizing security and flexibility by designing a high security system for e-government servers , 2009 .

[149]  Khaled Harfoush,et al.  On the practicality of elliptic curve cryptography for medical sensor networks , 2014, 2014 11th Annual High Capacity Optical Networks and Emerging/Enabling Technologies (Photonics for Energy).

[150]  A. A. Zaidan,et al.  A review on smartphone skin cancer diagnosis apps in evaluation and benchmarking: coherent taxonomy, open issues and recommendation pathway solution , 2018, Health and Technology.

[151]  Babak Naderi,et al.  Magnetic signatures in air for mobile devices , 2012, Mobile HCI.

[152]  Patrick Bours,et al.  Towards an automatic gait recognition system using activity recognition (wearable based) , 2011, 2011 Third International Workshop on Security and Communication Networks (IWSCN).

[153]  B. B. Zaidan,et al.  Real-Time Medical Systems Based on Human Biometric Steganography: a Systematic Review , 2018, Journal of Medical Systems.

[154]  Abdelfettah Belghith,et al.  Wireless Body Area Networks: Applications and Technologies , 2016, ANT/SEIT.

[155]  Gang Qu,et al.  A 3-D hand gesture signature based biometric authentication system for smartphones , 2016, Secur. Commun. Networks.

[156]  B. B. Zaidan,et al.  Spam influence on business and economy: Theoretical and experimental studies for textual anti-spam filtering using mature document processingand naive Bayesian classifier , 2011 .

[157]  Carla Kmett Danielson,et al.  Mobile devices for the remote acquisition of physiological and behavioral biomarkers in psychiatric clinical research. , 2017, Journal of psychiatric research.

[158]  D. Ben-Zeev,et al.  Mobile health (mHealth) for mental health in Asia: objectives, strategies, and limitations. , 2014, Asian journal of psychiatry.

[159]  A. A. Zaidan,et al.  A New Approach based on Multi-Dimensional Evaluation and Benchmarking for Data Hiding Techniques , 2017 .

[160]  René Mayrhofer,et al.  Orientation Independent Cell Phone Based Gait Authentication , 2014, MoMM.

[161]  Jie Liu,et al.  Sensor-Based User Authentication , 2015, EWSN.

[162]  Miss Laiha Mat Kiah Impact of data privacy and confidentiality on developing telemedicine applications: A review participates opinion and expert concerns , 2011 .

[163]  A. A. Zaidan,et al.  Securing peer-to-peer mobile communications using public key cryptography: New security strategy , 2011 .

[164]  A. A. Zaidan,et al.  Novel multi-cover steganography using remote sensing image and general recursion neural cryptosystem , 2010 .

[165]  Samira Moussaoui,et al.  Performance Evaluation of IEEE 802.15.6 MAC in Monitoring of a Cardiac Patient , 2016, 2016 IEEE 41st Conference on Local Computer Networks Workshops (LCN Workshops).

[166]  Marlies Rybnicek,et al.  A roadmap to continuous biometric authentication on mobile devices , 2014, 2014 International Wireless Communications and Mobile Computing Conference (IWCMC).

[167]  S. Palanivel Rajan Review and investigations on future research directions of mobile based telecare system for cardiac surveillance , 2015 .

[168]  Omar Zakaria,et al.  An experiment of scalable video security solution using H.264/AVC and advanced encryption standard (AES): Selective cryptography , 2011 .

[169]  Muhammad Modi bin Lakulu,et al.  A Review on Systems-Based Sensory Gloves for Sign Language Recognition State of the Art between 2007 and 2017 , 2018, Sensors.

[170]  B. B. Zaidan,et al.  Real-Time Remote Health Monitoring Systems Using Body Sensor Information and Finger Vein Biometric Verification: A Multi-Layer Systematic Review , 2018, Journal of Medical Systems.

[171]  Omessaad Hamdi,et al.  eHealth: Survey on research projects, comparative study of telemonitoring architectures and main issues , 2014, Journal of Network and Computer Applications.

[172]  Larry A. Vea,et al.  Mobile User Identification through Authentication Using Keystroke Dynamics and Accelerometer Biometrics , 2016, 2016 IEEE/ACM International Conference on Mobile Software Engineering and Systems (MOBILESoft).

[173]  Abeer Alsadoon,et al.  Designing Touch-Based Hybrid Authentication Method for Smartphones , 2015 .

[174]  Deron Liang,et al.  A New Non-Intrusive Authentication Method Based on the Orientation Sensor for Smartphone Users , 2012, 2012 IEEE Sixth International Conference on Software Security and Reliability.

[175]  A. A. Zaidan,et al.  Security improvement of credit card online purchasing system , 2011 .

[176]  Lei Yang,et al.  Unlocking Smart Phone through Handwaving Biometrics , 2015, IEEE Transactions on Mobile Computing.

[177]  A. A. Zaidan,et al.  High capacity, transparent and secure audio steganography model based on fractal coding and chaotic map in temporal domain , 2018, Multimedia Tools and Applications.

[178]  Xi Wang,et al.  Secure session on mobile: An exploration on combining biometric, trustzone, and user behavior , 2014, 6th International Conference on Mobile Computing, Applications and Services.

[179]  Mamadou Bilo Doumbouya,et al.  A framework for decision making on teleexpertise with traceability of the reasoning , 2015 .

[180]  Bruno Crispo,et al.  Hold and Sign: A Novel Behavioral Biometrics for Smartphone User Authentication , 2016, 2016 IEEE Security and Privacy Workshops (SPW).

[181]  A. A. Zaidan,et al.  An overview of laser principle, laser–tissue interaction mechanisms and laser safety precautions for medical laser users , 2011 .

[182]  Habib Youssef,et al.  Lightweight and confidential data aggregation in healthcare wireless sensor networks , 2016, Trans. Emerg. Telecommun. Technol..

[183]  Fazida Othman,et al.  Stego-Image vs Stego-Analysis System , 2009 .

[184]  Yacine Challal,et al.  Healing on the cloud: Secure cloud architecture for medical wireless sensor networks , 2016, Future Gener. Comput. Syst..

[185]  Yiran Chen,et al.  Mobile user classification and authorization based on gesture usage recognition , 2013, 2013 18th Asia and South Pacific Design Automation Conference (ASP-DAC).

[186]  Abdelouahid Derhab,et al.  Human-oriented design of secure Machine-to-Machine communication system for e-Healthcare society , 2015, Comput. Hum. Behav..

[187]  Varun Prakash,et al.  Touch panel with integrated fingerprint sensors based user identity management , 2013, 2013 IEEE International Conference on Technologies for Homeland Security (HST).

[188]  B. B. Zaidan,et al.  New System for Secure Cover File of Hidden Data in the Image Page within Executable File Using Statistical Steganography Techniques , 2010, ArXiv.

[189]  B. B. Zaidan,et al.  A security framework for mHealth apps on Android platform , 2018, Comput. Secur..

[190]  Bilal Bahaa Zaidan,et al.  High Rate Video Streaming Steganography , 2009, 2009 International Conference on Future Computer and Communication.

[191]  Thorsten Holz,et al.  Leveraging Sensor Fingerprinting for Mobile Device Authentication , 2016, DIMVA.

[192]  Ragib Hasan,et al.  Secure techniques and methods for authenticating visually impaired mobile phone users , 2013, 2013 IEEE International Conference on Technologies for Homeland Security (HST).

[193]  George Demiris,et al.  Framing the evidence for health smart homes and home-based consumer health technologies as a public health intervention for independent aging: A systematic review , 2013, Int. J. Medical Informatics.

[194]  A. A. Zaidan,et al.  New Technique of Hidden Data in PE-File with in Unused Area One , 2009 .

[195]  A. A. Zaidan,et al.  Investigate the Capability of Applying Hidden Data in Text File: An Overview , 2010 .

[196]  B. B. Zaidan,et al.  An Enhanced Security Solution for Electronic Medical Records Based on AES Hybrid Technique with SOAP/XML and SHA-1 , 2013, Journal of Medical Systems.

[197]  Christoph Busch,et al.  Scenario test of accelerometer-based biometric gait recognition , 2011, 2011 Third International Workshop on Security and Communication Networks (IWSCN).

[198]  Ming-Hung Shih,et al.  A flick biometric authentication mechanism on mobile devices , 2015, 2015 International Conference on Informative and Cybernetics for Computational Social Systems (ICCSS).

[199]  An Braeken,et al.  Secure Event Logging in Sensor Networks , 2011, EuroPKI.

[200]  B. B. Zaidan,et al.  New Comparative Study Between DES, 3DES and AES within Nine Factors , 2010, ArXiv.

[201]  Bilal Bahaa Zaidan,et al.  Impact of spam advertisement through e-mail: A study to assess the influence of the anti-spam on the e-mail marketing , 2010 .

[202]  Tsutomu Fujita,et al.  Toward Introduction of Immunity-based Model to Continuous Behavior-based User Authentication on Smart Phone , 2013, KES.

[203]  Christoph Busch,et al.  Context-Aware Mobile Biometric Authentication based on Support Vector Machines , 2013, 2013 Fourth International Conference on Emerging Security Technologies.

[204]  Vivek Kanhangad,et al.  Exploring orientation and accelerometer sensor data for personal authentication in smartphones using touchscreen gestures , 2015, Pattern Recognit. Lett..

[205]  Hamid A. Jalab,et al.  An Overview on Hiding Information Technique in Images , 2010 .

[206]  B. B. Zaidan,et al.  Real-Time Remote-Health Monitoring Systems: a Review on Patients Prioritisation for Multiple-Chronic Diseases, Taxonomy Analysis, Concerns and Solution Procedure , 2019, Journal of Medical Systems.

[207]  Gonzalo Bailador,et al.  A Real-Time In-Air Signature Biometric Technique Using a Mobile Device Embedding an Accelerometer , 2010, NDT.

[208]  Yufei Chen,et al.  Performance Analysis of Multi-Motion Sensor Behavior for Active Smartphone Authentication , 2018, IEEE Transactions on Information Forensics and Security.

[209]  Pong C. Yuen,et al.  Finger gesture recognition through sweep sensor , 2009, IMCE '09.

[210]  B. B. Zaidan,et al.  Novel Framework for Hidden Data in the Image Page within Executable File Using Computation between Advanced Encryption Standard and Distortion Techniques , 2009, ArXiv.

[211]  Abdullah Gani Novel approach for high (secure and rate) data hidden within triplex space for executable file , 2010 .