skip to main content
survey
Public Access

A Survey on Modality Characteristics, Performance Evaluation Metrics, and Security for Traditional and Wearable Biometric Systems

Published: 07 May 2019 Publication History

Abstract

Biometric research is directed increasingly toward Wearable Biometric Systems (WBS) for user authentication and identification. However, prior to engaging in WBS research, how their operational dynamics and design considerations differ from those of Traditional Biometric Systems (TBS) must be understood. While the current literature is cognizant of those differences, there is no effective work that summarizes the factors where TBS and WBS differ, namely, their modality characteristics, performance, security, and privacy. To bridge the gap, this article accordingly reviews and compares the key characteristics of modalities, contrasts the metrics used to evaluate system performance, and highlights the divergence in critical vulnerabilities, attacks, and defenses for TBS and WBS. It further discusses how these factors affect the design considerations for WBS, the open challenges, and future directions of research in these areas. In doing so, the article provides a big-picture overview of the important avenues of challenges and potential solutions that researchers entering the field should be aware of. Hence, this survey aims to be a starting point for researchers in comprehending the fundamental differences between TBS and WBS before understanding the core challenges associated with WBS and its design.

References

[1]
2001. Nymi White Paper. Retrieved March, 2017 from https://www.nymi.com/wp-content/uploads/2013/11/NymiWhitePaper-1.pdf.
[2]
2007. M1.4 Ad Hoc Group on Biometric in E-Authentication. Study Report on Biometrics in E-Authentication. International Committee for Information Technology Standards (ICITS).
[3]
2012. IEEE Standard for Local and Metropolitan Area Networks--Part 15.6: Wireless Body Area Networks. IEEE Standards Association Std, 802.15.6. IEEE Computer Society.
[4]
2013. MOTOACTV User Manual. Motorola Global Portal Archives. Motorola. Retrieved on June, 2017.
[5]
2013. Performtek Precision Biometrics. Valencell White Paper. Valencell. Retrieved on June, 2017.
[6]
2014. Health Wearables: Early Days. PwC Report. PwC. Retrieved on July, 2017.
[7]
2014. Muse Technical Specification Sheet. InteraXon Technical Report. InteraXon. Retrieved from http://www.choosemuse.com.
[8]
2014. Understanding Biometric Performance Evaluation. Precise Biometrics White Paper. Precise Biometrics.
[9]
2015. IEEE Standard for Low-Rate Wireless Networks: IEEE Standards Association Revision of IEEE Std. 802.15.4-2011. IEEE Computer Society.
[10]
2015. Iris-Scanning Contact Lens Patented By Google. Technical Report. Retrieved August, 2017 from https://www.biometricupdate.com/201701/researchers-authenticate-handwritten-signatures-with-wearables.
[11]
2015. Threat Outlook: Integrity Attacks, Ransomware-as-a-service 8 Connected Cars. Threat Intelligence Times Technical Web Article. Threat Intelligence Times.
[12]
2015. Unisys Survey Finds Wearable Technology to Revolutionize Biometrics; Privacy Issues Yet to Be Addressed.
[13]
2015. Wearables: Driving User Outcomes in the Digital Age-the Next Leap. PwC Report. PwC.
[14]
2016. Accuracy in Biometric Wearables. A Valencell Report. Valencell, Inc.
[15]
2016. IEEE Standard for Low-Rate Wireless Networks Standard 802.15.4n: Amendment 1: Physical Layer Utilizing China Medical Bands. IEEE Standards Association.
[16]
2016. IEEE Standard for Low-Rate Wireless Networks Standard 802.15.4q: Amendment 2: Ultra-Low Power Physical Layer (2nd ed.). IEEE Standards Association.
[17]
2018. NIST Biometric and Forensic Research Database Catalog. Retrieved April, 2018 from https://tsapps.nist.gov/BDbC/.
[18]
Fargana Abdullayeva, Yadigar Imamverdiyev, Vugar Musayev, and James Wayman. 2009. Analysis of Security Vulnerabilities in Biometric Systems. Danish Biometrics Technical Report. Danish Biometrics. Archived.
[19]
Aditya Abhyankar, Shailesh Kulkarni, Rajendra Talware, and Stepahnie Schuckers. 2010. One time biometric transform to secure biometric templates. In 2nd International Conference on Computer and Automation Engineering.
[20]
Andy Adler, Richard Youmaran, and Sergey Loyka. 2009. Towards a measure of biometric feature information. Pattern Analysis and Applications 12, 3 (2009).
[21]
Andy Adlerr. 2008. Biometric system security. In Handbook of Biometrics. Springer, Chapter 19, 381--402.
[22]
Zahid Akhtar, Giorgio Fumera, Gian Luca Marcialis, and Fabio Roli. 2012. Evaluation of multimodal biometric score fusion rules under spoof attacks. In IAPR International Conference on Biometrics. IAPR.
[23]
Nazneen Akhter, Sumegh Tharewal, Vijay Kale, Ashish Bhalerao, and K. V. Kale. 2016. Heart-Based Biometrics and Possible Use of Heart Rate Variability in Biometric Recognition Systems. Springer.
[24]
Samaher Al-Janabi, Ibrahim Al-Shourbaji, Mohammad Shojafar, and Shahaboddin Shamshirband. 2017. Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications. Egyptian Informatics Journal (2017), 10.
[25]
Mohammed R. Al-Mulla and Francisco Speulveda. 2014. Novel pseudo-wavelet function for MMG signal extraction during dynamic fatiguing contractions. MDPI Sensors 14 (2014), 15.
[26]
Abdulmonam Omar Alaswad, Ahlal H. Montaser, and Fawzia Elhashmi Mohamad. 2014. An overview of face liveness detection. International Journal of Information 8 Computation Technology 4, 10 (2014), 9.
[27]
Aftab Ali and Farrukh Aslam Khan. 2013. Energy-efficient cluster-based security mechanism for intra-WBAN and inter-WBAN communications for healthcare applications. EURASIP Journal on Wireless Communications and Networking 216 (2013), 1--19.
[28]
Md Liakat Ali, John V. Monaco, Charles C. Tappert, and Meikang Qiu. 2016. Keystroke biometric systems for user authentication. Journal of Signal Processing Systems 86 (Mar. 2016), 15.
[29]
Byeong Wan An, Jung Hwal Shin, So-Yun Kim, Joohee Kim, Sangyoon Ji, Jihun Park, Youngjin Lee, Jiuk Jang, Young-Geun Park, Subin Jo Eunjin Cho, and Jang-Ung Park. 2017. Smart sensor systems for wearable electronic devices. MDPI Polymers (2017), 41.
[30]
Michael L. Andersen, Thomas J. Stephens, and Todd Lovell. 2017. Wearable Retina/Iris Scan Authentication System, U.S. Patent US20170011263A1, August 29, 2017.
[31]
Siddhesh Angle, Reema Bhagtani, and Hemali Chheda. 2005. Biometrics: A further echelon of security. Retrieved August, 2017 online from https://pdfs.semanticscholar.org/68d5/e5d733729de294eb6a0f0b20092f2feedac9.pdf?_ga=2.231774427.513405598.1556197326-1543244733.1549841829.
[32]
Arxan. 2014. Precision Wearable Biometrics Provider, Valencell, Selects Arxan to Protect Intellectual Property. Case Study. Valencell.
[33]
Kat Austen. 2015. The trouble with wearables. In Nature. MacMillan.
[34]
Muhammad Awais, Luca Palmerini, Alan K. Bourke, Espen A. F. Ihlen, Jorunn L. Helbostad, and Lorenzo Chiari. 2016. Performance evaluation of state of the art systems for physical activity classification of older subjects using inertial sensors in a real life scenario: A benchmark study. MDPI Sensors 16 (2016), 2105.
[35]
Aleksandra Babich. 2012. Biometric Authentication. Types of Biometric Identifiers. Master’s thesis. Business and Information Technology.
[36]
Lucas Ballard, Seny Kamara, Michale K. Reiter, and Fabian Monrose. 2008. Towards practical biometric key generation with randomized biometric templates. (CCS’08).
[37]
Tony Beltramelli. 2015. Deep-Spying: Spying using Smartwatch and Deep Learning. Master’s thesis. IT University of Copenhagen, Copenhagen, Denmark.
[38]
Lena Berglin. 2011. Smart Textiles and Wearable Technology -- A Study of Smart Textiles in Fashion and Clothing. The Swedish School of Textiles Technical Report. The Swedish School of Textiles.
[39]
M. V. Bhalerao, S. S. Sonavane, and V. Kumar. 2013. A survey of wireless communication using visible light. International Journal of Advances in Engineering 8 Technology 5, 2 (2013), 9.
[40]
Anna M. Bianchi, Omar P. Villantieri, Martin O. Mendez, and Sergio Cerutti. 2006. Signal processing and feature extraction for sleep evaluation in wearable devices. In Proceedings of the 28th IEEE EMBS Annual International Conference.
[41]
Battista Biggio, Giorgio Fumera, Paolo Russu, Luca Didaci, and Fabio Roli. 2015. Adversarial biometric recognition: A review on biometric system security from the adversarial machine-learning perspective. IEEE Signal Processing Magazine 32 (2015), 10.
[42]
Jorge Blasco, Thomas M. Chen, Juan Tapiador, and Pedro Peris-Lopez. 2016. A survey of wearable biometric recognition systems. ACM Computing Surveys 49, 3 (2016), Article 43, 35 pages.
[43]
Paolo Bonato. 2005. Advances in wearable technology and applications in physical medicine and rehabilitation. Journal of Neuro-Engineering and Rehabilitation 2, 3 (2005).
[44]
Nazmeen Boodoo-Jahangeer and Suniduth Baichoo. 2014. Choice of biometrics. In IST-Africa 2014 Conference Proceedings. IIMC International Information Management Corporation.
[45]
Xavier Boyen, Yevgeniy Dodis, Jonathan Katz, Rafail Ostrovsky, and Adam Smith. 2005. Secure remote authentication using biometric data. In Annual International Conference on the Theory and Applications of Cryptographic Techniques. 147--163.
[46]
Francis Minhthang Bui and Dimitrios Hatzinakos. 2008. Biometric methods for secure communications in body sensor networks: Resource-efficient key management and signal-level data scrambling. EURASIP Journal on Advances in Signal Processing 2008 (2008), 1--16.
[47]
Chris Burt. 2017. Researchers Authenticate Handwritten Signatures with Wearables. Biometric Update Online Article. https://www.biometricupdate.com/201701/researchers-authenticate-handwritten-signatures-with-wearables.
[48]
Christoph Busch. 2017. The ISO/IEC Standards for Testing of Presentation Attack Detection. Technical Report. TTT Working Group Biometrics.
[49]
Leela Krishna Bysani and Ashok Kumar Turuk. 2011. A survey on selective forwarding attack in wireless sensor networks. In International Conference on Devices and Communications.
[50]
Liang Cai and Hao Chen. 2012. On the practicality of motion based keystroke inference attack. In International Conference on Trust and Trustworthy Computing.
[51]
Filippo Casamassima, Elisabetha Farella, and Luca Benini. 2013. Synchronization methods for Bluetooth based WBANs. In IEEE International Conference on Body Sensor Networks. IEEE.
[52]
Saptarshi Chakraborty and Dhrubajyoti Das. 2014. An overview of face liveness detection. International Journal on Information Theory (IJIT) 3, 2 (2014).
[53]
Samik Chakraborty and Saurabh Pal. 2016. Photoplethysmogram signal based biometric recognition using linear discriminant classifier. In 2nd International Conference on Control, Instrumentation, Energy 8 Communication (CIEC’16).
[54]
Yao-Jen Chang, Wende Zhang, and Tsuhan Chen. 2004. Biometrics-based cryptographic key generation. In IEEE International Conference on Multimedia and Expo. IEEE.
[55]
Huei-Huang Chen, Chien-Hsu, ChenZheng-Yu, and HoeZong-Xian Yin. 2016. Ergonomic consideration for wearable device design in Frozen shoulder rehabilitation. Advances in Intelligent Systems and Computing (2016), 10.
[56]
Ke Wan Ching and Manmeet Mahinderjit Singh. 2016. Wearable technology devices security and privacy vulnerability analysis. International Journal of Network Security 8 Its Applications 8, 3 (2016), 19--30.
[57]
John Chuang. 2014. One-step two-factor authentication with wearable bio-sensors. In Symposium on Usable Privacy and Security (SOUPS’14).
[58]
John Chuang. 2014. One-step two-factor authentication with wearable bio-sensors. In CMU Report.
[59]
Cory Cornelius, Zachary Marois, Jacob Sorber, Ron Peterson, Shirang Mare, and David Kotz. 2012. Passive biometrics for pervasive wearable devices (poster paper). In Workshop on Mobile Computing Systems and Applications (HotMobile). ACM Press, 1.
[60]
Cory Cornelius, Zachary Marois, Jacob Sorber, Ron Peterson, Shirang Mare, and David Kotz. 2014. Vocal Resonance as a Passive Biometric. Computer Science Technical Report Series 1. Dartmouth College.
[61]
Cory Cornelius, Ronald Peterson, Joseph Skinner, Ryan Halter, and David Kotz. 2014. A wearable system that knows who wears it. In Proceedings of the 12th Annual International Conference on Mobile Systems, Applications and Services. IEEE, 55--67.
[62]
Jia Cui, Jian-Ping Li, and Xiao-Jun Lu. 2008. Study on multi-biometric feature fusion and recognition model. In International Conference on Apperceiving Computing and Intelligence Analysis.
[63]
Ashraf Darwish and Aboul Ella Hassanien. 2011. Wearable and implantable wireless sensor network solutions for healthcare monitoring. MDPI Sensors 11 (2011), 34.
[64]
Saad M. Darwish. 2016. Design of adaptive biometric gait recognition algorithm with free walking directions. IET Biometrics Journal 6, 2 (2016), 53--60.
[65]
Brian DeCann and Arun Ross. 2013. Relating ROC and CMC curves via the biometric menagerie. In IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems. IEEE.
[66]
Anthony Delehante. 2011. Security issues in biometric identification. In University of Minnesota Computer Science Spring Seminar. Springer.
[67]
Dua Dheeru and Efi Karra Taniskidou. 2017. UCI Machine Learning Repository. http://archive.ics.uci.edu/ml.
[68]
Michael Dorn, Peter Wackersreuther, and Christian Bohm. 2012. Efficient comparison of encrypted biometric templates. Springer-Verlag.
[69]
Yitao Duan and John Canny. 2005. Protecting user data in ubiquitous computing: Towards trustworthy environments. Privacy Enhancing Technologies 3424 (2005), 18.
[70]
Mohammad El-Abed and Christophe Charrier. 2012. Evaluation of biometric systems. In New Trends and Developments in Biometrics. 149--169.
[71]
Mohamad El-Abed, Romain Giot, Baptiste Hemery, Jean-Jacques Schwartzmann, and Christophe Rosenberger. 2012. Towards the security evaluation of biometric authentication systems. International Journal of Engineering and Technology 4 (2012).
[72]
Jocelyne Elias and Ahmed Mehaoua. 2012. Energy-aware topology design for wireless body area networks. In IEEE International Conference on Communications.
[73]
N. Erdogmus and S. Marcel. 2014. Spoofing face recognition with 3D masks. IEEE Transactions on Information Forensics and Security 9, 7 (2014), 1084--1097.
[74]
Chris Eschbach. {n.d.}. Validation and Reliability of PerformTek Earbud Heart Rate Sensor Utilizing 12 Lead ECG. Valencell White Paper. Valencell.
[75]
L. C. Eschbach, S. Long, B. Stillwaggon, and J. A. Bunn. {n.d.}. Applicability of a Forearm-Based Biometric Sensor for Measuring Heartrate During Exercise. Valencell White Paper. Valencell.
[76]
Mohammad Esmalifalak, Zhu Han Ge Shi, and Lingyang Song. 2013. Bad data injection attack and defense in electricity market using game theory study. IEEE Transactions on Smart Grid 4, 1 (2013).
[77]
Javier Espina. 2014. Network Topologies, Communication Protocols, and Standards (2nd. ed.). Springer-Verlag, London.
[78]
Belen Fernandez-Saavedra, Raul Sanchez-Reillo, Judith Liu-Jimenez, and Oscar Miguel-Hurtado. 2013. Evaluation of biometric system performance in the context of common criteria. Journal of Information Sciences: An International Journal (2013), 14.
[79]
Luis Filipe, Florentino Fdez-Riverola, Nuno Costa, and Antonio Pereira. 2015. Wireless body area networks for healthcare applications: Protocol stack review. International Journal of Distributed Sensor Networks 11, 10 (2015), 1--23.
[80]
Shaun Fynn. 2014. 10 Considerations for Making Wearable Devices More Wearable. Retrieved November 2017 from http://www.studiofynn.com/journal/10-considerations-making-wearable-devices-more-wearable.
[81]
Davrondzhon Gafurov, Einar Snekkenes, and Patrick Bours. 2007. Gait authentication and identification using wearable accelerometer sensor. In IEEE Workshop on Automatic Identification Advanced Technologies. IEEE.
[82]
Javier Galbally, Julian Fierrez, and Javier Ortega-Garcia. 2007. Vulnerabilities in biometric systems: Attacks and recent advances in liveness detection. In Spanish Workshop on Biometrics. Springer.
[83]
Javier Galbally, Marta Gomez-Barrero, Arun Ross, Julian Fierrez, and Javier Ortega-Garcia. 2014. Securing iris recognition systems against masquerade attacks. In Biometric and Surveillance Technology for Human and Activity Identification Proceedings of SPIE, Vol. 8172. SPIE.
[84]
Javier Galbally, Chris McCool, Julian Fierrez, Sebastian Marcel, and Javier Ortega-Garcia. 2010. On the vulnerability of face verification systems to hill-climbing attacks. Pattern Recognition 43, 3 (2010), 11.
[85]
Romain Giot, Mohamad El-Abed, and Christophe Rosenberger. 2013. Fast computation of the performance evaluation of biometric systems: Application to multibiometrics. Future Generation Computer Systems 29, 3 (2013), 788--799.
[86]
Ines Goicoechea-Telleria, Belen Fernandez-Saavedra, Judith Liu-Jimenez, and Raul Sanchez-Reillo. 2016. An evaluation of presentation attack detection of fingerprint biometric systems applying ISO/IEC 30107-3. In International Biometric Performance Conference.
[87]
Alex Goldschmidt. 2016. Intercept-Replay Attack Vulnerabilities and Mitigation Strategies. ECE Senior Capstone Project 2016 Tech Notes. Tufts University.
[88]
Marta Gomez-Barrero, Javier Galbally, Pedro Tome, and Julian Fierrez. 2012. On the vulnerability of iris-based systems to a software attack based on a genetic algorithm. In CIARP. Springer-Verlag, 114--121.
[89]
Dmitry O. Gorodnichy. 2009. Evolution and evaluation of biometric systems. In IEEE Symposium on Computational Intelligence for Security and Defense Applications.
[90]
Madasu Hanmandlu, Jyotsana Grover, Ankit Gureja, and H. M. Gupta. 2011. Score-level fusion of multimodal biometrics using triangular norms. Pattern Recognition Letters 32, 14 (2011), 1843--1850.
[91]
Dimitrios Hatzinakos and Umang Yadav. 2017. BioSec.Lab PPG Dataset - Benchmark Dataset for PPG Biometrics. https://www.comm.utoronto.ca/biometrics/PPG_Dataset/contact.html.
[92]
Simon Haykin. 2005. Cognitive radio: Brain-empowered wireless communications. IEEE Journal on Selected Areas in Communications 23, 2 (2005).
[93]
Mingxing He, Shi-Jinn Horngg, Pingzhi Fan, Ray-Shine Run, Rong-Jian Chen, Jui-Lin Lai, Muhammad Khurram Khan, and Kevin Octavius Sentosa. 2010. Performance evaluation of score level fusion in multimodal biometric systems. Pattern Recognition 43, 3 (2010), 1789--1800.
[94]
Wendi Rabiner Heinzelman, Anantha Chandrakasan, and Hari Balakrishnan. 2000. Energy-efficient communication protocol for wireless microsensor networks. In Proceedings of the Hawaii International Conference on System Sciences.
[95]
Charlotte Hill. 2015. Wearables -- The Future of Biometric Technology? Biometric Technology Today 2015, 8 (2015), 7--9.
[96]
Ekram Hossain, Mehdi Rasti, Hina Tabassum, and Amr Abdelnasser. 2014. Evolution toward 5G-multi-tier cellular wireless networks: An interference management perspective. IEEE Wireless Communications 21, 3 (2014), 118--127.
[97]
Katrin Hänsel, Natalie Wilde, Hamed Haddadi, and Akram Alomainy. 2015. Challenges with current wearable technology in monitoring health data and providing positive behavioural support. In Proceedings of the 5th EAI International Conference on Wireless Mobile Communication and Healthcare.
[98]
Maged Hamada Ibrahim, Saru Kumari, Ashok Kumar Das, Mohammad Wazid, and Vanga Odelu. 2016. Secure anonymous mutual authentication for star two-tier wireless body area networks. Computer Methods and Programs in Biomedicine 135 (2016), 37--50.
[99]
Assessing Identity Theft in the Internet of Things. 2014. IT CoNvergence PRActice (INPRA). In Nature, Vol. 2. 15--21.
[100]
ISO-IEC. 2016. Information Technology -- Biometric Presentation Attack Detection Part 1: Framework. ISO Standard for Biometric Presentation Attack Detection. ISO/IEC 30107-1:2016.
[101]
ISO-IEC. 2017. Information Technology -- Biometric Presentation Attack Detection Part 3: Testing and Reporting. ISO Standard for Biometric PAD. ISO/IEC 30107-3:2017.
[102]
Elena S. Izmailova, John A. Wagner, and Eric D. Perakslis. 2018. Wearable devices in clinical trials: Hype and hypothesis. Journal of American Society of Clinical Pharmacology and Therapeutics 104, 1 (2018).
[103]
Anil K. Jain, Karthik Nandakumar, and Abhishek Nagar. 2008. Biometric template security: Review article. EURASIP Journal on Advances in Signal Processing 2008 (2008), 1--17.
[104]
Anil K. Jain, Arun Ross, and Umut Uludag. 2005. Biometric template security: Challenges and solutions. In 13th European Signal Processing Conference.
[105]
Prabhakar Pankanti Jain. 2003. Biometric recognition: Security and privacy concerns. IEEE Security 8 Privacy 99, 2 (2003), 33--42.
[106]
Adehayo Kolawole John, Adekoya Adewale M., and Ekwonna Chinnasa. 2016. Temperament and mood detection using case-based reasoning. International Journal of Intelligent Systems and Applications 3 (2016), 11.
[107]
Ari Juels and Madhu Sudan. 2006. A fuzzy vault scheme. Designs, Codes and Cryptography 38, 2 (2006), 237--257.
[108]
Ari Juels and Martin Wattenberg. 1998. A fuzzy commitment scheme. In Proceedings of the 6th ACM Conference on Computer and Communications Society. 28--36.
[109]
Chris Karlof and David Wagner. 2003. Secure routing in wireless sensor networks: Attacks and countermeasures. In IEEE International Workshop on Sensor Network Protocols and Applications.
[110]
Manvjeet Kaur, Dr. Sanjeev Sofat, and Deepak Saraswat. 2010. Template and database security in biometric systems: A challenging task. International Journal of Computer Applications 4, 5 (2010).
[111]
Emad Taha Khalaf and Norrozila Sulaiman. 2015. A new secure storing system for biometric templates based encryption and concealment. Journal of Applied Sciences 15, 5 (2015), 773--782.
[112]
Arjun Kharpal. 2015. Biggest Hacking Threat to Business? Wearables. Technical Web Report. CNBC.
[113]
Sarika Khatarkar and Rachana Kamble. 2013. Wireless sensor network MAC protocol: SMAC 8 TMAC. Indian Journal of Computer Science 8 Engineering 4, 4 (2013).
[114]
Paul Kocher, Joshua Jaffe, and Benjamin Jun. 1999. Differential power analysis. In Advances in Cryptology. 388--397.
[115]
Markos Kos and Iztok Kramberger. 2017. A wearable device and system for movement and biometric data acquisition for sports applications. IEEE Access 5 (2017), 6411--6420.
[116]
Nissan Kunju, Neelesh Kumar, Dinesh Pankaj, Aseem Dhawan, and Amod Kumar. 2009. EMG signal analysis for identifying walking patterns of normal healthy individuals. Indian Journal of Biomechanics: Special Issue (2009).
[117]
Maryam Lafikh, Patrick Lacharme, Chsirtophe Rosenberger, Mounia Mikram, and Sanaa Ghouzali. 2015. Vulnerabilities of fuzzy vault schemes using biometric data with traces. In International Wireless Communications and Mobile Computing Conference.
[118]
Benoit Latre, Bart Braem, Ingrid Moerman, Chris Blondia, and Piet Demeester. 2010. A survey on wireless body area networks. Journal of Wireless Networks 17, 1 (Nov. 2010), 18.
[119]
S. Leboeuf. 2016. Medical Active Signal Characterization Boosts Accuracy of Wearables. Sensors Online Article. Valencell, Inc. Retrieved on August, 2017.
[120]
Steven Francis Leboeuf, Michael E. Aumera, William E. Kraus, Johanna L. Johnson, and Brian Duscha. 2014. Earbud-based sensor for the assessment of energy expenditure, HR, and VO2max. Medicine 8 Science in Sports 8 Exercise 46, 5 (2014).
[121]
Steven Francis LeBoeuf, Jesse Berkley Tucker, Michael Edward Aumer, Eric Douglas Romesburg, and Joseph Norman Morris. 2014. Apparatus and methods for monitoring physiological data during environmental interference. United States Patent Application Publication Number US 8,888,701 B2.
[122]
Dan Ledger and Daniel McCaffrey. {n.d.}. Inside Wearables: How the Science of Human Behavior Change Offers the Secret to Long-Term Engagement. Endeavor Partners LLC Technical White Paper Report. Endeavor Partners LLC.
[123]
Anthony Lee and Younghyun Kim. 2015. Photoplethysmography as a form of biometric authentication. IEEE Sensors (2015).
[124]
Hyun-Ju Lee, Woo-Young Kim, and Ji-Yeon Yoo. 2015. Wearable devices’ security risk analysis and its countermeasures: Korean cases. International Journal of Innovative Science, Engineering 8 Technology 2, 7 (2015).
[125]
Justin Lee. 2015. STMicroelectronics, Valencell Launch Biometric Sensor Platform for Wearables, IoT. Retrieved March, 2017 from https://www.biometricupdate.com/201612/stmicroelectronics-valencell-launch-biometric-sensor-platform-for-wearables-iot.
[126]
Justin Lee. 2017. University of Surrey Testing Blockchain for Wearable Biometric Data Storage and Analysis. Biometric Update Online Article. https://www.biometricupdate.com/201705/university-of-surrey-testing-blockchain-for-wearable-biometric-data%e2%80%8e-storage-and-analysis.
[127]
Young Sil Lee, Esko Alasaarela, and Hoon Jae Lee. 2014. An efficient encryption scheme using elliptic curve cryptography (ECC) with symmetric algorithm for healthcare system. International Journal of Security and Its Applications 8, 3 (2014), 63--70.
[128]
Young Sil Lee, Hoon Jae Lee, and Esko Alasaarela. 2013. Mutual authentication in wireless body sensor networks (WBSN) based on physical unclonable function (PUF). In 9th International Wireless Communications and Mobile Computing Conference.
[129]
D. C. Leonard, A. Pons, and S. Asfour. 2009. Realization of a universal patient identifier through biometric technology. IEEE Transactions of Biomedicine 13, 4 (2009).
[130]
V. Leonov, P. Fiorini, S. Sedky, T. Torfs, and C. Van Hoof. 2005. Thermoelectric MEMS generators as a power supply for a body area network. In 13th International Conference on Solid-State Sensors, Actuators and Microsystems.
[131]
Miaoxin Li and Mingjie Zhuang. 2012. An overview of physical layers on wireless body area network. In International Conference on Anti-Counterfeiting, Security and Identification.
[132]
Meng-Hui Lim and Pong C. Yuen. 2016. Entropy measurement for biometric verification systems. IEEE Transactions on Cybernetics 46, 5 (2016).
[133]
Huang Lin, Xiaoyan Zhu, Y. Fang, Chi Zhang, and Zhenfu Cao. 2011. Efficient trust based information sharing schemes over distributed collaborative networks. In Military Communications Conference. 1399--1403.
[134]
M. Lont. 2014. Wake-up Receiver based Ultra-Low-Power WBAN. Analog Circuits and Signal Processing. Springer.
[135]
Panida Lorwongtragool, Enrico Sowade, Natthapol Watthanawisuth, Reinhard R. Baumann, and Teerakiat Kerdcharoen. 2014. A novel wearable electronic nose for healthcare based on flexible printed chemical sensor array. MDPI Sensors 14 (2014), 12.
[136]
A. Lymberis. 2003. Smart wearable systems for personalised health management: Current R8D and future challenges. In Proceedings of the 25th Annual International Conference of the IEEE EMBS.
[137]
Molly Mackinlay. 2013. Phases of accuracy diagnosis: (In) visibility of system status in the fitbit. Intersect Stanford University Journals 6, 2 (2013), 9.
[138]
Magpi. 2016. Big Data and Health. Technical Magazine. Magpi. Retrieved July, 2018 from https://home.magpi.com/cta/big-data-and-health/.
[139]
Emanuele Maiorana, Gabriel Emile Hine, and Patrizio Campisi. 2015. Hill-climbing attacks on multibiometrics recognition systems. IEEE Transactions on Information Forensics and Security 10, 5 (2015), 900--915.
[140]
Anindya Maiti, Murtuza Jadliwala, Jibo He, and Igor Bilogrevic. 2015. (Smart)watch your taps: Side-channel keystroke inference attacks using smartwatches. In ISWC. 27--30.
[141]
Ayodeji S. Makinde, Yaw Nkansah-Gyekye, and Loserian S. Laizer. 2014. Enhancing the accuracy of biometric feature extraction fusion using Gabor filter and Mahalanobis distance algorithm. International Journal of Computer Science and Information Security 12, 7 (2014).
[142]
Mohammed Mana, Mohammed Feham, and Boucif Amar Bensaber. 2011. Trust key management scheme for wireless body area networks. International Journal of Network Security 12, 2 (2011), 8.
[143]
S. S. Manivannan and E. Sathiyamoorthy. 2016. A prevention model for session hijack attacks in wireless networks using strong and encrypted session ID. Cybernetics and Information Technologies 14, 3 (2016), 46--60.
[144]
R. Manjusha and R. Ramachandran. 2015. Sharing data in cloud based on trust attribute based encryption (TABE). ARPN Journal of Engineering and Applied Sciences 10, 9 (2015), 3.
[145]
Stevan Marinkovic, Emanuel Popovici, and Emil Jovanov. 2012. Improving power efficiency in WBAN communication using wake up methods. In International Conference on Wireless Mobile Communication and Healthcare. Springer, 303--317.
[146]
Thomas Martin, Michael Hsiao, Dong Ha, and Jayan Krishnaswami. 2004. Denial-of-service attacks on battery-powered mobile computers. In 2nd IEEE International Conference on Pervasive Computing and Communications.
[147]
Ignacio Martin-Diaz, Daniel Morinigo-Sotelo, Oscar Duque-Perez, and Rene De J. Romero-Troncoso. 2016. Advances in classifier evaluation: Novel insights for an electric data-driven motor diagnosis. IEEE Access 4 (2016), 14.
[148]
Garima Mehta, Malay Kishore Dutta, and Pyung Soo Kim. 2016. A secure encryption method for biometric templates based on chaotic theory. Transactions on Computational Science XXVII 9570 (2016), 120--140.
[149]
Abhishek Mitra, Saurabh Bisht, and Vikas Ranjan. 2002. Voice based Biometric Security System. Student project report.
[150]
Jeffrey Montes. 2015. Validation and Reliability of the Hexoskin and FitBit Wearable BIO Collection Devices. Master’s thesis. UNLV.
[151]
Vivian Genaro Motti and Kelly Caine. 2014. Human factors considerations in the design of wearable devices. In Proceedings of the Human Factors and Ergonomics Society 58th Annual Meeting.
[152]
Judith M. Myerson. 2012. What is New? Data Security Management. Auerbach Publications.CRC Press, LLC.
[153]
Dellys Hachemi Nabil, Benatchba Karima, Koudil Mouloud, and Bouridane Ahmed. 2013. Threat models on biometric systems: A comparative study. In 4th International Conference on Computational Aspects of Social Networks.
[154]
Abhishek Nagar, Karthik Nandakumar, and Anil K. Jain. 2010. Biometric template transformation: A security analysis. In Proceedings of SPIE 7541, Media Forensics and Security II. SPIE.
[155]
Ani Nahapetian. 2016. Side-channel attacks on mobile and wearable systems. In 13th IEEE Annual Consumer Communications 8 Networking Conference.
[156]
Ben Nassi, Alona Levy, Yuval Elovici, and Erez Shmueli. 2016. Handwritten signature verification using hand-worn devices. arXiv (2016).
[157]
Muhammad Naveed, Xiaoyong Zhou, Soteris Demetriou, XiaoFeng Wang, and Carl A. Gunter. 2014. Inside job: Understanding and mitigating the threat to external device mis-bonding on Android. Internet Society (2014).
[158]
J. A. Nelder and R. Mead. 1965. A simplex method for function minimization. Journal of Computation (1965).
[159]
Caitlin Newark. 2016. Trends in Biometric Data Collections. Technical Report. https://www.novetta.com/2016/03/trends-in-biometric-data-collections/.
[160]
James Newsome, Elaine Shi, Dawn Song, and Adrian Perrig. 2004. The sybil attack in sensor networks: Analysis 8 defenses. In 3rd International Symposium on Information Processing in Sensor Networks.
[161]
Zedong Nie, Yuhang Liu, Changjiang Duan, Zhongzhou Ruan, Jingzhen Li, and Lei Wang. 2015. Wearable biometric authentication based on human body communication. In 12th International Conference on Wearable and Implantable Body Sensor Networks.
[162]
Ifeoma U. Ohaeri, Michael Esifarienrhe, and Naison Gasela. 2005. Multimodal biometrics as attacks measure in biometric systems. In International Conference on Wireless Networks.
[163]
Adam Page, Siddharth Pramod, Tim Oates, and Tinoosh Mohsenin. 2015. An ultra low power feature extraction and classification system for wearable seizure detection. In 37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society.
[164]
Pascal Paillier. {n.d.}. Paillier Encryption and Signature Schemes. PEM: Privacy-Enhanced Mail.
[165]
Tom Parker, Gertjan Halkes, Maarten Bezemer, and Koen Langendoen. 2010. The λMAC framework: Redefining MAC protocols for wireless sensor networks. Wireless Networks 16, 7 (2010), 16.
[166]
Imtiaz Parvez, Mahdi Jamei, Aditya Sundararajan, and Arif I. Sarwat. 2014. RSS based loop-free compass routing protocol for data communication in advanced metering infrastructure (AMI) of smart grid. In IEEE Symposium Series on Computational Intelligence. IEEE.
[167]
G. Peng, G. Zhou, D. T. Nguyen, X. Qi, Q. Yang, and S. Wang. 2017. Continuous authentication with touch behavioral biometrics and voice on wearable glasses. IEEE Transactions on Human-Machine Systems 47, 3 (June 2017), 404--416.
[168]
N. Poh, C. H. Chan, J. Kittler, Julian Fierrez, and Javier Galbally. 2015. Description of Metrics for the Evaluation of Biometric Performance. Retrieved March, 2017 from http://www.beat-eu.org/.
[169]
Drew Prindle. 2015. Kokoon EEG Headphones Can Detect when You’re in Deep Sleep, Trigger Lucid Dreams. Retrieved March, 2017 from http://www.digitaltrends.com/cool-tech/kokoon-eeg-headphones/.
[170]
Mahmudur Rahman, Bogdan Carbunar, and Umut Topkara. 2014. Concise paper: SensCrypt: A secure protocol for managing low power fitness trackers. In IEEE 2nd International Conference on Network Protocols.
[171]
Mahmudur Rahman, Bogdan Carbunar, and Umut Topkara. 2016. Secure management of low power fitness trackers. IEEE Transactions on Mobile Computing 15, 2 (2016).
[172]
Mahmudur Rahman, Umut Topkara, and Bogdan Carbunar. 2015. Movee: Video liveness verification for mobile devices using built-in motion sensors. IEEE Transactions on Mobile Computing (2015).
[173]
Raghavendra Ramachandra and Christoph Busch. 2017. Presentation attack detection methods for face recognition systems: A comprehensive survey. ACM Computing Surveys 50, 8 (2017).
[174]
Christian Rathgeb and Andreas Uhl. 2011. A survey on biometric cryptosystems and cancelable biometrics. EURASIP Journal on Information Security (2011).
[175]
Abhimanyu Rathore. 2015. Wearable and Big Data: Potential Challenges, Potential Rewards. Retrieved November 2017 from http://electronicsofthings.com/expert-opinion/wearable-and-big-data-potential-challenges-potential-rewards/.
[176]
Alvalapati Goutham Reddy, Ashok Kumar Das, Vanga Odelu, and Kee-Young Yoo. 2016. An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography. ECE Senior Capstone Project 2016 Tech Notes. PLoS One.
[177]
Deloitte Technical Report. 2015. Harnessing Safety Data from Wearable Devices. Technical Report. https://www2.deloitte.com/content/dam/Deloitte/us/Documents/life-sciences-health-care/us-lshc-harnessing-safety-data-from-wearable-devices.pdf.
[178]
ABI Research. 2014. Internet of Things vs. Internet of Everything: What’s the Difference? ABI Research Technical Report. ABI Research.
[179]
Injong Rhee, Ajit Warrier, Mahesh Aia, Jeongki Min, and Mihail L. Sichitiu. 2008. Z-MAC: A hybrid MAC for wireless sensor networks. IEEE/ACM Transactions on Networking 3, 7 (2008), 16.
[180]
Alejandro Riera, Stephen Dunne, Ivan Cester, and Giulio Ruffini. 2011. STARFAST: A Wireless Wearable EEG/ECG Biometric System based on the ENOBIO Sensor. Technical Report.
[181]
Chris Roberts. 2006. Biometric Attack Vectors and Defenses. Danish Biometrics Technical Report. Danish Biometrics. Archived.
[182]
Eric Douglas Romesburg. 2015. Reduction of physiological metric error due to internal cadence. Patent. United States Patent Application Publication.
[183]
Markus Schatten, Miroslav Baca, and Mirko Cubrilo. 2009. Towards a general definition of biometric systems. International Journal of Computer Science Issues (IJCSI) 2 (2009), 7.
[184]
Stefan Schneegass, Youssef Oualil, and Andreas Bulling. 2016. SkullConduct: Biometric user identification on eyewear computers using bone conduction through the skull. In CHI Conference on Human Factors in Computing Systems. 1379--1384.
[185]
MirHojjat Seyedi, Behailu Kibret, Sravanreddy Salibindla, and Daniel T. H. Lai. 2015. An overview of intra-body communication transceivers for biomedical applications. In IGI Global. IGI.
[186]
B. Shanthini and S. Swamynathan. 2012. A novel multimodal biometric fusion technique for security. In International Conference on Information and Knowledge Management. IACSIT Press.
[187]
Hugo Silva, Andre Lourenco, Filipe Canento, Ana Fred, and Nuno Raposo. 2015. ECG biometrics: Principles and applications. In Proceedings of the International Conference on the Bio-Inspired Systems and Signal Processing. 215--220.
[188]
Vinay Singh and Rahul Sharma. 2013. Performance analysis of Mac protocols for WBAN on varying transmitted output power of nodes. International Journal of Computer Applications 67, 7 (2013).
[189]
Lukas Smital, Clifton Haider, Pavel Leinveber, Pavel Jurak, Barry Gilbert, and David Holmes. 2016. Towards real-time QRS feature extraction for wearable monitors. In 38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society.
[190]
Nicko Van Someren. 2015. 3 Tips for Securing Wearable Technology in the Work Place. Review Article. Wearable Tech.
[191]
Ctirad Sousedik and Christoph Busch. 2013. Presentation attack detection methods for fingerprint recognition systems: A survey. IET Biometrics (2013).
[192]
Colin Soutar, Danny Roberge, Alex Stoianov, Rene Gilroy, and B. V. K. Vijaya Kumar. 1998. Biometric encryption TM using image processing. In Proceedings of SPIE, Vol. 3314. 422--431.
[193]
Denis Speicher. 2006. Vulnerability Analysis of Biometric Systems Using Attack Trees. Master’s Thesis.
[194]
Edmund Spinella. 2003. Biometric Scanning Technologies: Finger, Facial and Retinal Scanning. SANS Institute InfoSec Reading Room Report. SANS Institute.
[195]
Edmund Spinella. 2004. An Exploration of Voice Biometrics. SANS Institute InfoSec Reading Room Report. SANS Institute.
[196]
Alina Elena Stanciu, Lacramiora-Mihaela Nemtol, and Ilona Madalina Moise. 2012. Considerations regarding the spectral efficiency of orthogonal frequency division multiplexing. In 11th International Conference on Development and Application Systems.
[197]
Aditya Sundararajan, Alexander Pons, and Arif Sarwat. 2014. A generic framework for eeg-based biometric authentication. In 12th International Conference on Information Technology—New Generations. IEEE, 139--144.
[198]
Kamil Surmacz, Khalid Saeed, and Piotr Rapta. 2013. An improved algorithm for feature extraction from a fingerprint fuzzy image. Optica Applicata XLIII, 3 (2013).
[199]
Yagiz Sutcu, Qiming Li, and Nasir Memon. 2007. Protecting biometric templates with sketch: Theory and practice. IEEE Transactions on Information Forensics and Security 2, 3 (2007).
[200]
Yagiz Sutcu, Qiming Li, and Nasir Memon. 2007. Security and Privacy in Biometrics (1st. ed.). Vol. 9. Springer-Verlag, London, Chapter 4, 69--104.
[201]
Mihai T. Tarata. 2003. Mechanomyography versus Electromyography, in monitoring the muscular fatigue. Biomedical Engineering Online.
[202]
Andrew Beng Jin Teoh and Jaihie Kim. 2015. Error Correction Codes for Biometric Cryptosystem: An Overview. ECE Senior Capstone Project 2016 Tech Notes. Yonsie University.
[203]
K. M. S. Thotahewa. 2014. MAC Protocols for UWB-Based WBAN Applications. Springer.
[204]
Zouheir Trabelsi, Mohamed Al Hemairy, and Mohammad M. Masud. 2014. Resilience of fingerprint and iris readers against common denial of service attacks. In World Congress on Computer Applications and Information Systems.
[205]
Pim Tuyls, Anton H. M. Akkermans, Tom A. M. Kevenaar, Geert-Jan Schrijen, Asker M. Bazen, and Raymond N. J. Veldhuis. 2005. Pratical biometric authentication with template protection. In International Conference on Audio- and Video-Based Biometric Person Authentication, Vol. 92. Springer.
[206]
Umut Uludag, Sharath Pankanti, Salil Prabhakar, and Anil K. Jain. 2010. Biometric cryptosystems: Issues and challenges. In Proceedings of the IEEE, Vol. 92. IEEE.
[207]
John Kelsey Bruce Schneier David Wagner and Chris Hall. 1998. Cryptanalytic attacks on pseudorandom number generators. In 5th International Workshop on Fast Software Encryption.
[208]
Yujie Wang, Liudong Xing, and Honggang Wang. 2016. Reliability modeling of relay-assisted wireless body area networks. In Annual Reliability and Maintainability Symposium.
[209]
James L. Wayman. 1999. Error-rate equations for the general biometric system. In IEEE Robotics 8 Automation Magazine. IEEE.
[210]
J. Wei. 2014. How wearables intersect with the cloud and the internet of things: Considerations for the developers of wearables. IEEE Consumer Electronics Magazine 3, 3 (2014), 3.
[211]
Bruce R. Wilkins. 2014. Wearable Technology and Its Associated Security Risk. Technical Survey Report. ISACA.
[212]
Meredydd Williams, Louise Axon, Jason R. C. Nurse, and Sadie Creese. 2016. Protecting user data in ubiquitous computing: Towards trustworthy environments. In IEEE 2nd International Forum on Research and Technologies for Society and Industry Leveraging a Better Tomorrow (RTSI’16). 6.
[213]
Brad Wing. 2014. Information Technology: American National Standard for Information Systems. NIST SP-500-290 1.
[214]
Fengyuan Xu, Zhengrui Qin, Chiu C. Tan, Baosheng Wang, and Qun Li. 2011. IMDGuard: Securing implantable medical devices with the external wearable guardian. In IEEE INFOCOM. IEEE.
[215]
Bian Yang, Christoph Busch, Koen de Groot, Haiyun Xu, and Raymond N. J. Veldhuis. 2012. Performance evaluation of fusing protected fingerprint minutiae templates on the decision level. MDPI Sensors (2012).
[216]
Shenglin Yang and Ingrid Verbauwhede. 2010. Secure iris verification. In IEEE International Conference on Acoustics, Speech and Signal Processing, Vol. 2. SPIE.
[217]
Zamboni. 2013. Attacking Biometric Access Control Systems. Retrieved March, 2017 from https://www.defcon.org/images/defcon-13/dc13-presentations/DC_13-Zamboni.pdf.
[218]
William Zeller and Edward W. Felten. 2008. Cross-Site Request Forgeries: Exploitation and Prevention. Technical Report. Princeton University.
[219]
Xuebing Zhou, Stephen D. Wolthusen, Christoph Busch, and Arjan Kuijper. 2009. Vulnerabilities of fuzzy vault schemes using biometric data with traces. In 5th International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[220]
Ziuming Zhu, Song Han, Pei-Chi Huang, Aloysius K. Mok, and Deji Chen. 2011. MBStar: A real-time communication protocol for wireless body area networks. In Euromicro Conference on Real-Time Systems.
[221]
Thomas Guthrie Zimmerman. 1995. Personal Area Networks (PAN): Near-Field Intra-Body Communication. Master’s Thesis. Media Arts and Sciences.
[222]
A. Khalid. 2012. Electricity usage monitoring using face recognition technique. International Journal of Emerging Technology and Advanced Engineering 2, 10 (2012), 274--276.
[223]
A. Khalid, A. Sundararajan, and A. I. Sarwat. 2019. A multi-step predictive model to estimate Li-Ion state of charge for higher C-Rates. IEEE Conference on Environment and Electrical Engineering and I8CPS. Genoa, Italy, In Press.
[224]
A. Khalid, A. Sundararajan, I. Acharya, and A. I. Sarwat. 2019. Prediction of Li-Ion battery state of charge using multilayer perceptron and long short-term memory models. IEEE Transportation Electrification Conference 8 Expo (ITEC). Novi, Michigan, USA, In Press.
[225]
A. Sundararajan, T. Khan, A. Moghadasi, and A. I. Sarwat. 2018. Survey on synchrophasor data quality and cybersecurity challenges, and evaluation of their interdependencies. Journal of Modern Power Systems and Clean Energy 6, 7 (2018), 1--19.

Cited By

View all
  • (2024)Unveiling wearables: exploring the global landscape of biometric applications and vital signs and behavioral impactBioData Mining10.1186/s13040-024-00368-y17:1Online publication date: 11-Jun-2024
  • (2024)BIOWISH: Biometric Recognition Using Wearable Inertial Sensors Detecting Heart ActivityIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.326836021:2(987-1000)Online publication date: 1-Mar-2024
  • (2024)NeuroIDBench: An open-source benchmark framework for the standardization of methodology in brainwave-based authentication researchJournal of Information Security and Applications10.1016/j.jisa.2024.10383285(103832)Online publication date: Sep-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Computing Surveys
ACM Computing Surveys  Volume 52, Issue 2
March 2020
770 pages
ISSN:0360-0300
EISSN:1557-7341
DOI:10.1145/3320149
  • Editor:
  • Sartaj Sahni
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 07 May 2019
Accepted: 01 January 2019
Revised: 01 November 2018
Received: 01 November 2017
Published in CSUR Volume 52, Issue 2

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Biometrics
  2. WBAN
  3. attacks
  4. metrics
  5. threats
  6. vulnerabilities
  7. wearables

Qualifiers

  • Survey
  • Research
  • Refereed

Funding Sources

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)404
  • Downloads (Last 6 weeks)42
Reflects downloads up to 14 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Unveiling wearables: exploring the global landscape of biometric applications and vital signs and behavioral impactBioData Mining10.1186/s13040-024-00368-y17:1Online publication date: 11-Jun-2024
  • (2024)BIOWISH: Biometric Recognition Using Wearable Inertial Sensors Detecting Heart ActivityIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.326836021:2(987-1000)Online publication date: 1-Mar-2024
  • (2024)NeuroIDBench: An open-source benchmark framework for the standardization of methodology in brainwave-based authentication researchJournal of Information Security and Applications10.1016/j.jisa.2024.10383285(103832)Online publication date: Sep-2024
  • (2024)Robust biometric scheme against replay attacks using one-time biometric templatesComputers & Security10.1016/j.cose.2023.103586137(103586)Online publication date: Feb-2024
  • (2024)Coordinate-wise monotonic transformations enable privacy-preserving age estimation with 3D face point cloudScience China Life Sciences10.1007/s11427-023-2518-867:7(1489-1501)Online publication date: 2-Apr-2024
  • (2023)Multi-Biometrics: Survey and Projection of a New Biometric SystemInternational Journal of Engineering and Advanced Technology10.35940/ijeat.C4008.021232312:3(80-87)Online publication date: 28-Feb-2023
  • (2023)Research on wearable technologies for learning: a systematic reviewFrontiers in Education10.3389/feduc.2023.12703898Online publication date: 9-Nov-2023
  • (2023)Z-Ring: Single-Point Bio-Impedance Sensing for Gesture, Touch, Object and User RecognitionProceedings of the 2023 CHI Conference on Human Factors in Computing Systems10.1145/3544548.3581422(1-18)Online publication date: 19-Apr-2023
  • (2023)A Review on Protection and Cancelable Techniques in Biometric SystemsIEEE Access10.1109/ACCESS.2023.323938711(8531-8568)Online publication date: 2023
  • (2023)A Survey of PPG's Application in AuthenticationComputers & Security10.1016/j.cose.2023.103488135(103488)Online publication date: Dec-2023
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Get Access

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media