{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T22:35:13Z","timestamp":1770330913182,"version":"3.49.0"},"publisher-location":"Cham","reference-count":82,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030158866","type":"print"},{"value":"9783030158873","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-15887-3_2","type":"book-chapter","created":{"date-parts":[[2019,7,19]],"date-time":"2019-07-19T14:02:57Z","timestamp":1563544977000},"page":"15-35","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":29,"title":["An Overview of Biometrics Methods"],"prefix":"10.1007","author":[{"given":"Muhammad","family":"Sharif","sequence":"first","affiliation":[]},{"given":"Mudassar","family":"Raza","sequence":"additional","affiliation":[]},{"given":"Jamal Hussain","family":"Shah","sequence":"additional","affiliation":[]},{"given":"Mussarat","family":"Yasmin","sequence":"additional","affiliation":[]},{"given":"Steven Lawrence","family":"Fernandes","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,20]]},"reference":[{"issue":"03","key":"2_CR1","doi-asserted-by":"publisher","first-page":"166","DOI":"10.4236\/jis.2017.83011","volume":"08","author":"Rodney Alexander","year":"2017","unstructured":"R. Alexander, Using the Analytical Hierarchy Process Model in the Prioritization of Information Assurance Defense In-Depth Measures?\u2014A Quantitative Study, Journal of Information Security, 8 (2017) 166.","journal-title":"Journal of Information Security"},{"issue":"3","key":"2_CR2","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1016\/j.neuron.2016.01.026","volume":"89","author":"David\u00a0W. Sanders","year":"2016","unstructured":"D.W. Sanders, S.K. Kaufman, B.B. Holmes, M.I. Diamond, Prions and protein assemblies that convey biological information in health and disease, Neuron, 89 (2016) 433-448.","journal-title":"Neuron"},{"issue":"1","key":"2_CR3","doi-asserted-by":"publisher","first-page":"77","DOI":"10.3233\/jid-2016-0004","volume":"20","author":"Muhammad Waseem Khan","year":"2016","unstructured":"M.W. Khan, M. Sharif, M. Yasmin, S.L. Fernandes, A new approach of cup to disk ratio based glaucoma detection using fundus images, Journal of Integrated Design and Process Science, 20 (2016) 77-94.","journal-title":"Journal of Integrated Design and Process Science"},{"issue":"9","key":"2_CR4","doi-asserted-by":"publisher","first-page":"1348","DOI":"10.1109\/5.628669","volume":"85","author":"R.P. Wildes","year":"1997","unstructured":"R.P. Wildes, Iris recognition: an emerging biometric technology, Proceedings of the IEEE, 85 (1997) 1348-1363.","journal-title":"Proceedings of the IEEE"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"J.M. Colores-Vargas, M. Garc\u00eda-V\u00e1zquez, A. Ram\u00edrez-Acosta, H. P\u00e9rez-Meana, M. Nakano-Miyatake, Video images fusion to improve iris recognition accuracy in unconstrained environments, Mexican Conference on Pattern Recognition, (Springer2013), pp. 114-125.","DOI":"10.1007\/978-3-642-38989-4_12"},{"key":"2_CR6","unstructured":"M. Sharif, M.A. Ali, M. Raza, S. Mohsin, Face recognition using edge information and DCT, Sindh University Research Journal-SURJ (Science Series), 43 (2015)."},{"key":"2_CR7","unstructured":"J.H. Shah, M. Sharif, M. Raza, A. Azeem, A Survey: Linear and Nonlinear PCA Based Face Recognition Techniques, Int. Arab J. Inf. Technol., 10 (2013) 536-545."},{"issue":"6","key":"2_CR8","doi-asserted-by":"publisher","first-page":"739","DOI":"10.1109\/TIP.2004.827237","volume":"13","author":"L. Ma","year":"2004","unstructured":"L. Ma, T. Tan, Y. Wang, D. Zhang, Efficient iris recognition by characterizing key local variations, IEEE Transactions on Image processing, 13 (2004) 739-750.","journal-title":"IEEE Transactions on Image Processing"},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"F. Bokhari, T. Syedia, M. Sharif, M. Yasmin, S.L. Fernandes, Fundus image segmentation and feature extraction for the detection of glaucoma: a new approach, Current Medical Imaging Reviews, 14 (2018) 77-87.","DOI":"10.2174\/1573405613666170405145913"},{"key":"2_CR10","unstructured":"P. Cofta, H. Lacoh\u00e9e, Understanding public perceptions: trust and engagement in ICT-mediated services (Intl. Engineering Consortiu, 2008)."},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"S. Akbar, M.U. Akram, M. Sharif, A. Tariq, U. ullah Yasin, Decision support system for detection of papilledema through fundus retinal images, Journal of medical systems, 41 (2017) 66.","DOI":"10.1007\/s10916-017-0712-9"},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"A. Panwar, P. Singla, M. Kaur, Techniques for Enhancing the Security of Fuzzy Vault: A Review, Progress in Intelligent Computing Techniques: Theory, Practice, and Applications, (Springer, 2018), pp. 205-213.","DOI":"10.1007\/978-981-10-3376-6_23"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"A. Manickam, E. Devarasan, G. Manogaran, M.K. Priyan, R. Varatharajan, C.-H. Hsu, R. Krishnamoorthi, Score level based latent fingerprint enhancement and matching using SIFT feature, Multimedia Tools and Applications, (2018) 1-21.","DOI":"10.1007\/s11042-018-5633-1"},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"M. Sharif, F. Naz, M. Yasmin, M.A. Shahid, A. Rehman, Face Recognition: A Survey, Journal of Engineering Science & Technology Review, 10 (2017).","DOI":"10.25103\/jestr.102.20"},{"issue":"1","key":"2_CR15","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1016\/S1665-6423(15)30008-0","volume":"13","author":"Jamal Hussain Shah","year":"2015","unstructured":"J. Hussain Shah, M. Sharif, M. Raza, M. Murtaza, S. Ur-Rehman, Robust Face Recognition Technique under Varying Illumination, Journal of applied research and technology, 13 (2015) 97-105.","journal-title":"Journal of Applied Research and Technology"},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"J.H. Shah, M. Sharif, M. Raza, A. Azeem, Face recognition across pose variation and the 3S problem, turkish journal of electrical engineering & computer sciences, 22 (2014) 1423-1436.","DOI":"10.3906\/elk-1108-70"},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"A. Aisha, S. Muhammad, S.J. Hussain, R. Mudassar, Face recognition invariant to partial occlusions, KSII Trans. Internet Inf. Syst.((TIIS)), 8 (2014) 2496-2511.","DOI":"10.3837\/tiis.2014.07.017"},{"key":"2_CR18","unstructured":"M. Murtaza, M. Sharif, M. Raza, J. Shah, Face recognition using adaptive margin fisher\u2019s criterion and linear discriminant analysis, International Arab Journal of Information Technology, 11 (2014) 1-11."},{"key":"2_CR19","unstructured":"M. Sharif, J.H. Shah, S. Mohsin, M. Raza, Facial Feature Detection and Recognition for Varying Poses, World Congress on Engineering and Computer Science2014), pp. 22-24."},{"key":"2_CR20","unstructured":"A. Azeem, M. Sharif, M. Raza, M. Murtaza, A survey: Face recognition techniques under partial occlusion, Int. Arab J. Inf. Technol., 11 (2014) 1-10."},{"key":"2_CR21","unstructured":"Large-scale dynamic face recognition system, 2014)."},{"key":"2_CR22","unstructured":"M. Sharif, A. Khalid, M. Raza, S. Mohsin, Face detection and recognition through hexagonal image processing, Sindh University Research Journal-SURJ (Science Series), 44 (2012)."},{"key":"2_CR23","unstructured":"M. Sharif, S. Mohsin, M.Y. Javed, A survey: face recognition techniques, Research Journal of Applied Sciences, Engineering and Technology, 4 (2012) 4979-4990."},{"key":"2_CR24","unstructured":"M. Sharif, S. Mohsin, M.Y. Javed, M.A. Ali, Single Image Face Recognition Using Laplacian of Gaussian and Discrete Cosine Transforms, Int. Arab J. Inf. Technol., 9 (2012) 562-570."},{"key":"2_CR25","unstructured":"M. Sharif, M.Y. Javed, S. Mohsin, Face recognition based on facial features, Research Journal of Applied Sciences, Engineering and Technology, 4 (2012) 2879-2886."},{"key":"2_CR26","unstructured":"M. Sharif, K. Ayub, D. Sattar, M. Raza, S. Mohsin, Enhanced and fast face recognition by hashing algorithm, Journal of applied research and technology, 10 (2012) 607-617."},{"key":"2_CR27","unstructured":"M. Sharif, S. Anis, M. Raza, S. Mohsin, Enhanced SVD Based Face Recognition, Journal of Applied Computer Science & Mathematics, (2012)."},{"key":"2_CR28","unstructured":"M. Sharif, A. Khalid, M. Raza, S. Mohsin, Face Recognition using Gabor Filters, Journal of Applied Computer Science & Mathematics, (2011)."},{"key":"2_CR29","unstructured":"M. Sharif, S. Mohsin, R.A. Hanan, M.Y. Javed, M. Raza, Using nose heuristics for efficient face recognition, Sindh University Research Journal-SURJ (Science Series), 43 (2011)."},{"key":"2_CR30","unstructured":"M. Sharif, S. Mohsin, M.J. Jamal, M.Y. Javed, M. Raza, Face recognition for disguised variations using gabor feature extraction, Australian Journal of Basic and Applied Sciences, 5 (2011) 1648-1656."},{"key":"2_CR31","unstructured":"M. Sharif, S. Mohsin, M.J. Jamal, M. Raza, Illumination Normalization Preprocessing for face recognition, Environmental Science and Information Application Technology (ESIAT), 2010 International Conference on, (IEEE2010), pp. 44-47."},{"key":"2_CR32","doi-asserted-by":"crossref","unstructured":"D.P. Chowdhury, S. Bakshi, G. Guo, P.K. Sa, On applicability of tunable filter bank based feature for ear biometrics: a study from constrained to unconstrained, Journal of medical systems, 42 (2018) 11.","DOI":"10.1007\/s10916-017-0855-8"},{"key":"2_CR33","doi-asserted-by":"crossref","unstructured":"D. Zhang, G. Lu, L. Zhang, Online 3D Ear Recognition, Advanced Biometrics, (Springer, 2018), pp. 309-328.","DOI":"10.1007\/978-3-319-61545-5_14"},{"key":"2_CR34","unstructured":"M. Boczek, Ear biometric capture, authentication, and identification method and system, (Google Patents2017)."},{"key":"2_CR35","doi-asserted-by":"crossref","unstructured":"I.B. Barbosa, T. Theoharis, A.E. Abdallah, On the use of fingernail images as transient biometric identifiers, Machine Vision and Applications, 27 (2016) 65-76.","DOI":"10.1007\/s00138-015-0721-y"},{"issue":"1","key":"2_CR36","doi-asserted-by":"publisher","first-page":"011016","DOI":"10.1117\/1.2892674","volume":"17","author":"Andreas Uhl","year":"2008","unstructured":"A. Uhl, P. Wild, Footprint-based biometric verification, Journal of Electronic Imaging, 17 (2008) 011016.","journal-title":"Journal of Electronic Imaging"},{"key":"2_CR37","doi-asserted-by":"crossref","unstructured":"X. Wang, H. Wang, Q. Cheng, N.L. Nankabirwa, T. Zhang, Single 2D pressure footprint based person identification, Biometrics (IJCB), 2017 IEEE International Joint Conference on, (IEEE2017), pp. 413-419.","DOI":"10.1109\/BTAS.2017.8272725"},{"issue":"4","key":"2_CR38","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1016\/S1355-0306(98)73036-9","volume":"38","author":"A. Brown","year":"1998","unstructured":"A. Brown, DNA as an investigative technique, Science and Justice, 38 (1998) 263-265.","journal-title":"Science & Justice"},{"key":"2_CR39","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1016\/j.forsciint.2017.12.025","volume":"283","author":"Camilla Forr","year":"2018","unstructured":"C. Forr, B. Schei, L.E. Stene, K. Ormstad, C.T. Hagemann, Factors associated with trace evidence analyses and DNA findings among police reported cases of rape, Forensic science international, 283 (2018) 136-143.","journal-title":"Forensic Science International"},{"issue":"3","key":"2_CR40","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1093\/jb\/mvr090","volume":"150","author":"M. Shirasu","year":"2011","unstructured":"M. Shirasu, K. Touhara, The scent of disease: volatile organic compounds of the human body related to disease and disorder, The Journal of Biochemistry, 150 (2011) 257-266.","journal-title":"Journal of Biochemistry"},{"issue":"4","key":"2_CR41","doi-asserted-by":"publisher","first-page":"520","DOI":"10.1046\/j.0022-202x.2001.01287.x","volume":"116","author":"Shinichiro Haze","year":"2001","unstructured":"S. Haze, Y. Gozu, S. Nakamura, Y. Kohno, K. Sawano, H. Ohta, K. Yamazaki, 2-Nonenal newly found in human body odor tends to increase with aging, Journal of investigative dermatology, 116 (2001) 520-524.","journal-title":"Journal of Investigative Dermatology"},{"key":"2_CR42","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1016\/j.knosys.2013.08.002","volume":"52","author":"Irene Rodriguez-Lujan","year":"2013","unstructured":"I. Rodriguez-Lujan, G. Bailador, C. Sanchez-Avila, A. Herrero, G. Vidal-De-Miguel, Analysis of pattern recognition and dimensionality reduction techniques for odor biometrics, Knowledge-Based Systems, 52 (2013) 279-289.","journal-title":"Knowledge-Based Systems"},{"key":"2_CR43","unstructured":"Hand, finger geometry, 2018)."},{"issue":"14-15","key":"2_CR44","doi-asserted-by":"publisher","first-page":"2407","DOI":"10.1016\/j.neucom.2011.03.012","volume":"74","author":"Carlos M. Travieso","year":"2011","unstructured":"C.M. Travieso, J. Zhang, P. Miller, J.B. Alonso, M.A. Ferrer, Bimodal biometric verification based on face and lips, Neurocomputing, 74 (2011) 2407-2410.","journal-title":"Neurocomputing"},{"key":"2_CR45","doi-asserted-by":"crossref","unstructured":"Y. Vasquez, C. Beltr\u00e1n, M. G\u00f3mez, M. Fl\u00f3rez, J.L. V\u00e1zquez-Gonz\u00e1lez, Features extraction in images on finger veins with hybrid curves, Humanitarian Technology Conference (MHTC), IEEE Mexican, (IEEE2017), pp. 34-38.","DOI":"10.1109\/MHTC.2017.7926196"},{"key":"2_CR46","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1016\/j.patcog.2018.01.026","volume":"78","author":"Wencheng Yang","year":"2018","unstructured":"W. Yang, S. Wang, J. Hu, G. Zheng, C. Valli, A fingerprint and finger-vein based cancelable multi-biometric system, Pattern Recognition, 78 (2018) 242-251.","journal-title":"Pattern Recognition"},{"key":"2_CR47","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/j.knosys.2016.04.008","volume":"103","author":"Puneet Gupta","year":"2016","unstructured":"P. Gupta, S. Srivastava, P. Gupta, An accurate infrared hand geometry and vein pattern based authentication system, Knowledge-Based Systems, 103 (2016) 143-155.","journal-title":"Knowledge-Based Systems"},{"key":"2_CR48","unstructured":"E.J. Esekhaigbe, Contributions to Biometric Recognition: Fingerprint For Identity Verification, Cardiff Metropolitan University, 2016."},{"issue":"6","key":"2_CR49","doi-asserted-by":"publisher","first-page":"1211","DOI":"10.1021\/acs.accounts.6b00128","volume":"49","author":"Dong-Hoon Park","year":"2016","unstructured":"D.-H. Park, B.J. Park, J.-M. Kim, Hydrochromic approaches to mapping human sweat pores, Accounts of chemical research, 49 (2016) 1211-1222.","journal-title":"Accounts of Chemical Research"},{"key":"2_CR50","doi-asserted-by":"crossref","unstructured":"A. Genovese, E. Munoz, V. Piuri, F. Scotti, G. Sforza, Towards touchless pore fingerprint biometrics: a neural approach, Evolutionary Computation (CEC), 2016 IEEE Congress on, (IEEE2016), pp. 4265-4272.","DOI":"10.1109\/CEC.2016.7744332"},{"key":"2_CR51","doi-asserted-by":"crossref","unstructured":"M.-j. Kim, W.-Y. Kim, J. Paik, Optimum Geometric Transformation and Bipartite Graph-Based Approach to Sweat Pore Matching for Biometric Identification, Symmetry, 10 (2018) 175.","DOI":"10.3390\/sym10050175"},{"issue":"5","key":"2_CR52","doi-asserted-by":"publisher","first-page":"782","DOI":"10.1109\/TIFS.2014.2308640","volume":"9","author":"Patrizio Campisi","year":"2014","unstructured":"P. Campisi, D. La Rocca, Brain waves for automatic biometric-based user recognition, IEEE transactions on information forensics and security, 9 (2014) 782-800.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"11","key":"2_CR53","doi-asserted-by":"publisher","first-page":"5285","DOI":"10.1016\/j.eswa.2014.02.043","volume":"41","author":"Pedro J. Garc\u00eda-Laencina","year":"2014","unstructured":"P.J. Garc\u00eda-Laencina, G. Rodr\u00edguez-Bermudez, J. Roca-Dorda, Exploring dimensionality reduction of EEG features in motor imagery task classification, Expert Systems with Applications, 41 (2014) 5285-5295.","journal-title":"Expert Systems with Applications"},{"issue":"1","key":"2_CR54","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1007\/s10439-008-9589-6","volume":"37","author":"S. Romero","year":"2008","unstructured":"S. Romero, M. Ma\u00f1anas, M. Barbanoj, Ocular reduction in EEG signals based on adaptive filtering, regression and blind source separation, Annals of biomedical engineering, 37 (2009) 176-191.","journal-title":"Annals of Biomedical Engineering"},{"issue":"3","key":"2_CR55","doi-asserted-by":"publisher","first-page":"906","DOI":"10.1016\/j.patcog.2007.07.018","volume":"41","author":"Koksoon Phua","year":"2008","unstructured":"K. Phua, J. Chen, T.H. Dat, L. Shue, Heart sound as a biometric, Pattern Recognition, 41 (2008) 906-919.","journal-title":"Pattern Recognition"},{"key":"2_CR56","unstructured":"M.S.N. Dere, A. Gurjar, Identification of Human using Palm-Vein Images: A new trend in biometrics, International Journal Of Engineering And Computer Science ISSN, 2319-7242."},{"issue":"2","key":"2_CR57","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1109\/5.554220","volume":"85","author":"V.S. Nalwa","year":"1997","unstructured":"V.S. Nalwa, Automatic on-line signature verification, Proceedings of the IEEE, 85 (1997) 215-239.","journal-title":"Proceedings of the IEEE"},{"key":"2_CR58","unstructured":"D.B.S. Netto, M. Fornazin, M.A. Cavenaghi, R. Spolon, R.S. Lobato, A practical approach for biometric authentication based on smartcards, Information Systems and Technologies (CISTI), 2010 5th Iberian Conference on2010), pp. 1-5."},{"key":"2_CR59","doi-asserted-by":"crossref","unstructured":"M. Sharif, M.A. Khan, M. Faisal, M. Yasmin, S.L. Fernandes, A framework for offline signature verification system: Best features selection approach, Pattern Recognition Letters, (2018).","DOI":"10.1016\/j.patrec.2018.01.021"},{"issue":"2","key":"2_CR60","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1016\/S0969-4765(13)70036-5","volume":"2013","author":"Mikhail Khitrov","year":"2013","unstructured":"M. Khitrov, Talking passwords: voice biometrics for data access and security, Biometric Technology Today, 2013 (2013) 9-11.","journal-title":"Biometric Technology Today"},{"issue":"1","key":"2_CR61","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/LSP.2005.860538","volume":"13","author":"K.S.R. Murty","year":"2006","unstructured":"K.S.R. Murty, B. Yegnanarayana, Combining evidence from residual phase and MFCC features for speaker recognition, IEEE signal processing letters, 13 (2006) 52-55.","journal-title":"IEEE Signal Processing Letters"},{"key":"2_CR62","doi-asserted-by":"crossref","unstructured":"M. Bezoui, A. Elmoutaouakkil, A. Beni-hssane, Feature extraction of some Quranic recitation using mel-frequency cepstral coeficients (MFCC), Multimedia Computing and Systems (ICMCS), 2016 5th International Conference on, (IEEE2016), pp. 127-131.","DOI":"10.1109\/ICMCS.2016.7905619"},{"issue":"1","key":"2_CR63","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1049\/iet-bmt.2014.0011","volume":"4","author":"Noor Almaadeed","year":"2015","unstructured":"N. Almaadeed, A. Aggoun, A. Amira, Speaker identification using multimodal neural networks and wavelet analysis, IET Biometrics, 4 (2015) 18-28.","journal-title":"IET Biometrics"},{"key":"2_CR64","doi-asserted-by":"crossref","unstructured":"L. Lu, L. Liu, M.J. Hussain, Y. Liu, I sense you by Breath: Speaker Recognition via Breath Biometrics, IEEE Transactions on Dependable and Secure Computing, (2017) 1-1.","DOI":"10.1109\/TDSC.2017.2767587"},{"key":"2_CR65","doi-asserted-by":"crossref","unstructured":"J. Chauhan, Y. Hu, S. Seneviratne, A. Misra, A. Seneviratne, Y. Lee, BreathPrint: Breathing acoustics-based user authentication, Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services, (ACM2017), pp. 278-291.","DOI":"10.1145\/3081333.3081355"},{"issue":"1","key":"2_CR66","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1049\/iet-bmt.2012.0021","volume":"2","author":"Darryl Stewart","year":"2013","unstructured":"D. Stewart, A. Pass, J. Zhang, Gender classification via lips: static and dynamic features, IET biometrics, 2 (2013) 28-34.","journal-title":"IET Biometrics"},{"issue":"9","key":"2_CR67","doi-asserted-by":"publisher","first-page":"3328","DOI":"10.1016\/j.patcog.2012.02.016","volume":"45","author":"Shi-Lin Wang","year":"2012","unstructured":"S.-L. Wang, A.W.-C. Liew, Physiological and behavioral lip biometrics: A comprehensive study of their discriminative power, Pattern Recognition, 45 (2012) 3328-3335.","journal-title":"Pattern Recognition"},{"key":"2_CR68","unstructured":"M. Raza, M. Iqbal, M. Sharif, W. Haider, A survey of password attacks and comparative analysis on methods for secure authentication, World Applied Sciences Journal, 19 (2012) 439-444."},{"key":"2_CR69","doi-asserted-by":"crossref","unstructured":"M. Sharif, T. Faiz, M. Raza, Time signatures-an implementation of keystroke and click patterns for practical and secure authentication, Digital Information Management, 2008. ICDIM 2008. Third International Conference on, (IEEE2008), pp. 559-562.","DOI":"10.1109\/ICDIM.2008.4746782"},{"issue":"1","key":"2_CR70","doi-asserted-by":"publisher","first-page":"116","DOI":"10.13176\/11.427","volume":"7","author":"Salil Partha Banerjee","year":"2012","unstructured":"S.P. Banerjee, D.L. Woodard, Biometric authentication and identification using keystroke dynamics: A survey, Journal of Pattern Recognition Research, 7 (2012) 116-139.","journal-title":"Journal of Pattern Recognition Research"},{"key":"2_CR71","doi-asserted-by":"crossref","unstructured":"M.H. Khan, F. Li, M.S. Farid, M. Grzegorzek, Gait recognition using motion trajectory analysis, International Conference on Computer Recognition Systems, (Springer2017), pp. 73-82.","DOI":"10.1007\/978-3-319-59162-9_8"},{"key":"2_CR72","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1016\/j.neucom.2017.02.006","volume":"239","author":"Shiqi Yu","year":"2017","unstructured":"S. Yu, H. Chen, Q. Wang, L. Shen, Y. Huang, Invariant feature extraction for gait recognition using only one uniform model, Neurocomputing, 239 (2017) 81-93.","journal-title":"Neurocomputing"},{"key":"2_CR73","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.patrec.2016.05.009","volume":"80","author":"Sruti Das Choudhury","year":"2016","unstructured":"S.D. Choudhury, T. Tjahjadi, Clothing and carrying condition invariant gait recognition based on rotation forest, Pattern Recognition Letters, 80 (2016) 1-7.","journal-title":"Pattern Recognition Letters"},{"key":"2_CR74","doi-asserted-by":"crossref","unstructured":"R. Amin, T. Gaber, G. ElTaweel, A.E. Hassanien, Biometric and traditional mobile authentication techniques: Overviews and open issues, Bio-inspiring cyber security and cloud services: trends and innovations, (Springer, 2014), pp. 423-446.","DOI":"10.1007\/978-3-662-43616-5_16"},{"key":"2_CR75","doi-asserted-by":"crossref","unstructured":"J.N. Mogan, C.P. Lee, A.W. Tan, Gait recognition using temporal gradient patterns, Information and Communication Technology (ICoIC7), 2017 5th International Conference on, (IEEE2017), pp. 1-4.","DOI":"10.1109\/ICoICT.2017.8074680"},{"issue":"8","key":"2_CR76","doi-asserted-by":"publisher","first-page":"997","DOI":"10.1080\/02533839.2016.1230028","volume":"39","author":"Chin-Chun Huang","year":"2016","unstructured":"C.-C. Huang, C.-C. Hsu, H.-Y. Liao, S.-H. Yang, L.-L. Wang, S.-Y. Chen, Frontal gait recognition based on spatio-temporal interest points, Journal of the Chinese Institute of Engineers, 39 (2016) 997-1002.","journal-title":"Journal of the Chinese Institute of Engineers"},{"key":"2_CR77","doi-asserted-by":"crossref","unstructured":"S. Tao, X. Zhang, H. Cai, Z. Lv, C. Hu, H. Xie, Gait based biometric personal authentication by using MEMS inertial sensors, Journal of Ambient Intelligence and Humanized Computing, (2018) 1-8.","DOI":"10.1007\/s12652-018-0880-6"},{"key":"2_CR78","doi-asserted-by":"crossref","unstructured":"A. Byrnes, A. Mudge, A. Young, M. Banks, J. Bauer, Use of hand grip strength in nutrition risk screening of older patients admitted to general surgical wards, Nutrition & Dietetics, (2018).","DOI":"10.1111\/1747-0080.12422"},{"key":"2_CR79","doi-asserted-by":"crossref","unstructured":"A. Wichelhaus, C. Harms, J. Neumann, S. Ziegler, G. Kundt, K.J. Prommersberger, T. Mittlmeier, M. M\u00fchldorfer-Fodor, Parameters influencing hand grip strength measured with the manugraphy system, BMC musculoskeletal disorders, 19 (2018) 54.","DOI":"10.1186\/s12891-018-1971-4"},{"key":"2_CR80","doi-asserted-by":"crossref","unstructured":"M.S. Islam, M. Ali, K.H. Zubaer, S. Sarmin, M.T. Islam, B. Islam, A.A. Al Islam, A.M. Sadri, Trusted Worrier: A low-cost and high-accuracy user authentication system for firearm exploiting dynamic hand pressure biometrics, Networking, Systems and Security (NSysS), 2017 International Conference on, (IEEE2017), pp. 87-95.","DOI":"10.1109\/NSysS.2017.7885807"},{"key":"2_CR81","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1016\/j.ergon.2018.05.002","volume":"67","author":"B\u00fclent \u00c7akmak","year":"2018","unstructured":"B. \u00c7akmak, E. Erg\u00fcl, Interactions of personal and occupational risk factors on hand grip strength of winter pruners, International Journal of Industrial Ergonomics, 67 (2018) 192-200.","journal-title":"International Journal of Industrial Ergonomics"},{"key":"2_CR82","unstructured":"K. Howell, 3 Reasons Biometrics Are Not Secure, (ipswitch2017)."}],"container-title":["Handbook of Multimedia Information Security: Techniques and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-15887-3_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,19]],"date-time":"2019-07-19T14:34:51Z","timestamp":1563546891000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-15887-3_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030158866","9783030158873"],"references-count":82,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-15887-3_2","relation":{},"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"20 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}