{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T12:47:16Z","timestamp":1750337236845,"version":"3.40.3"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030588014"},{"type":"electronic","value":"9783030588021"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-58802-1_23","type":"book-chapter","created":{"date-parts":[[2020,10,1]],"date-time":"2020-10-01T15:07:37Z","timestamp":1601564857000},"page":"307-319","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["BodyLock: Human Identity Recogniser App from Walking Activity Data"],"prefix":"10.1007","author":[{"given":"Karolis","family":"Ka\u0161ys","sequence":"first","affiliation":[]},{"given":"Aurimas","family":"Dundulis","sequence":"additional","affiliation":[]},{"given":"Mindaugas","family":"Vasiljevas","sequence":"additional","affiliation":[]},{"given":"Rytis","family":"Maskeli\u016bnas","sequence":"additional","affiliation":[]},{"given":"Robertas","family":"Dama\u0161evi\u010dius","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,2]]},"reference":[{"key":"23_CR1","doi-asserted-by":"publisher","unstructured":"Crouse, D., Han, H., Chandra, D., Barbello, B., Jain, A.K.: Continuous authentication of mobile user: fusion of face image and inertial measurement unit data. In: International Conference on Biometrics, ICB 2015, pp. 135\u2013142 (2015). https:\/\/doi.org\/10.1109\/ICB.2015.7139043","DOI":"10.1109\/ICB.2015.7139043"},{"issue":"5","key":"23_CR2","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1109\/MITP.2012.93","volume":"14","author":"WM Keith","year":"2012","unstructured":"Keith, W.M., Jeffrey, M.V., George, F.H.: BYOD: security and privacy considerations. IT Prof. 14(5), 53\u201355 (2012)","journal-title":"IT Prof."},{"key":"23_CR3","doi-asserted-by":"publisher","unstructured":"Ohana, D.J., Phillips, L., Chen, L.: Preventing cell phone intrusion and theft using biometrics. In: IEEE CS Security and Privacy Workshops, SPW 2013, pp. 173\u2013180 (2013). https:\/\/doi.org\/10.1109\/SPW.2013.19","DOI":"10.1109\/SPW.2013.19"},{"issue":"4","key":"23_CR4","doi-asserted-by":"publisher","first-page":"1042","DOI":"10.1109\/TIFS.2017.2777787","volume":"13","author":"H Gunasinghe","year":"2018","unstructured":"Gunasinghe, H., Bertino, E.: PrivBioMTAuth: privacy preserving biometrics-based and user centric protocol for user authentication from mobile phones. IEEE Trans. Inf. Forensics Secur. 13(4), 1042\u20131057 (2018). https:\/\/doi.org\/10.1109\/TIFS.2017.2777787","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"23_CR5","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MSP.2015.2437652","volume":"32","author":"A Hadid","year":"2015","unstructured":"Hadid, A., Evans, N., Marcel, S., Fierrez, J.: Biometrics systems under spoofing attack: an evaluation methodology and lessons learned. IEEE Signal Process. Mag. 32, 20\u201330 (2015). https:\/\/doi.org\/10.1109\/MSP.2015.2437652","journal-title":"IEEE Signal Process. Mag."},{"key":"23_CR6","doi-asserted-by":"publisher","unstructured":"Sholokhov, A., Kinnunen, T., Vestman, V., Lee, K. A.: Voice biometrics security: extrapolating false alarm rate via hierarchical bayesian modeling of speaker verification scores. Comput. Speech Lang. 60 (2020). https:\/\/doi.org\/10.1016\/j.csl.2019.101024","DOI":"10.1016\/j.csl.2019.101024"},{"key":"23_CR7","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1016\/j.patcog.2018.08.010","volume":"86","author":"K Wang","year":"2019","unstructured":"Wang, K., Kumar, A.: Cross-spectral iris recognition using CNN and supervised discrete hashing. Pattern Recogn. 86, 85\u201398 (2019). https:\/\/doi.org\/10.1016\/j.patcog.2018.08.010","journal-title":"Pattern Recogn."},{"key":"23_CR8","doi-asserted-by":"publisher","unstructured":"Olanrewaju, L., Oyebiyi, O., Misra, S., Maskeliunas, R., Damasevicius, R.: Secure ear biometrics using circular kernel principal component analysis, Chebyshev transform hashing and Bose\u2013Chaudhuri\u2013Hocquenghem error-correcting codes. Signal Image Video Process. (2020). https:\/\/doi.org\/10.1007\/s11760-019-01609-y","DOI":"10.1007\/s11760-019-01609-y"},{"key":"23_CR9","doi-asserted-by":"publisher","unstructured":"Dama\u0161evi\u010dius, R., Maskeliunas, R., Kazanavi\u010dius, E., Wo\u017aniak, M.: Combining cryptography with EEG biometrics. Comput. Intell. Neurosci. 2018 (2018). https:\/\/doi.org\/10.1155\/2018\/1867548","DOI":"10.1155\/2018\/1867548"},{"key":"23_CR10","doi-asserted-by":"publisher","unstructured":"Cola, G., Avvenuti, M., Musso, F., Vecchio, A.: Gait-based authentication using a wrist-worn device. In: ACM International Conference Proceeding Series, pp. 208\u2013217 (2016). https:\/\/doi.org\/10.1145\/2994374.2994393","DOI":"10.1145\/2994374.2994393"},{"issue":"4","key":"23_CR11","doi-asserted-by":"publisher","first-page":"4713","DOI":"10.1007\/s11042-016-3654-1","volume":"76","author":"MD Marsico","year":"2016","unstructured":"Marsico, M.D., Mecca, A.: Biometric walk recognizer. Multimed. Tools Appl. 76(4), 4713\u20134745 (2016). https:\/\/doi.org\/10.1007\/s11042-016-3654-1","journal-title":"Multimed. Tools Appl."},{"key":"23_CR12","doi-asserted-by":"publisher","unstructured":"Derawi, M., Bours, P.: Gait and activity recognition using commercial phones. Comput. Secur. 39(PART B), 137\u2013144 (2013). https:\/\/doi.org\/10.1016\/j.cose.2013.07.004","DOI":"10.1016\/j.cose.2013.07.004"},{"key":"23_CR13","doi-asserted-by":"publisher","unstructured":"Hoang, T., Choi, D.: Secure and privacy enhanced gait authentication on smart phone. Sci. World J. 2014 (2014). https:\/\/doi.org\/10.1155\/2014\/438254. Article ID 438254, 8 p.","DOI":"10.1155\/2014\/438254"},{"key":"23_CR14","doi-asserted-by":"publisher","first-page":"1790","DOI":"10.1016\/j.procs.2016.08.228","volume":"96","author":"Y Watanabe","year":"2016","unstructured":"Watanabe, Y., Sara, S.: Toward an immunity-based gait recognition on smart phone: a study of feature selection and walking state classification. Procedia Comput. Sci. 96, 1790\u20131800 (2016). https:\/\/doi.org\/10.1016\/j.procs.2016.08.228","journal-title":"Procedia Comput. Sci."},{"key":"23_CR15","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"386","DOI":"10.1007\/978-3-319-30222-5_18","volume-title":"E-Business and Telecommunications","author":"H Nguyen","year":"2016","unstructured":"Nguyen, H., Nguyen, H.H., Hoang, T., Choi, D., Nguyen, T.D.: A generalized authentication scheme for mobile phones using gait signals. In: Obaidat, M.S., Lorenz, P. (eds.) ICETE 2015. CCIS, vol. 585, pp. 386\u2013407. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-30222-5_18"},{"key":"23_CR16","doi-asserted-by":"publisher","first-page":"1181","DOI":"10.1016\/j.procs.2015.01.031","volume":"46","author":"G Chetty","year":"2015","unstructured":"Chetty, G., White, M., Akther, F.: Smart phone based data mining for human activity recognition. Procedia Comput. Sci. 46, 1181\u20131187 (2015). https:\/\/doi.org\/10.1016\/j.procs.2015.01.031","journal-title":"Procedia Comput. Sci."},{"key":"23_CR17","doi-asserted-by":"publisher","unstructured":"Ferrero, R., Gandino, F., Montrucchio, B., Rebaudengo, M., Velasco, A., Benkhelifa, I.: On gait recognition with smartphone accelerometer. In: 4th Mediterranean Conference on Embedded Computing, MECO 2015, pp. 368\u2013373 (2015). https:\/\/doi.org\/10.1109\/MECO.2015.7181946","DOI":"10.1109\/MECO.2015.7181946"},{"key":"23_CR18","doi-asserted-by":"publisher","unstructured":"Fernandez-Lopez, P., Liu-Jimenez, J., Sanchez-Redondo, C., Sanchez-Reillo, R.: Gait recognition using smartphone. In: International Carnahan Conference on Security Technology, pp. 1\u20137 (2016). https:\/\/doi.org\/10.1109\/CCST.2016.7815698","DOI":"10.1109\/CCST.2016.7815698"},{"key":"23_CR19","doi-asserted-by":"publisher","unstructured":"Lai, Q., Chen, B., Xu, C.: Using weighted SVM for identifying user from gait with smart phone. In: 7th International Conference on Cloud Computing and Big Data, CCBD 2016, pp. 41\u201345 (2017). https:\/\/doi.org\/10.1109\/CCBD.2016.019","DOI":"10.1109\/CCBD.2016.019"},{"key":"23_CR20","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/978-981-13-2853-4_10","volume-title":"Methods and Applications for Modeling and Simulation of Complex Systems","author":"W Yuan","year":"2018","unstructured":"Yuan, W., Zhang, L.: Gait classification and identity authentication using CNN. In: Li, L., Hasegawa, K., Tanaka, S. (eds.) AsiaSim 2018. CCIS, vol. 946, pp. 119\u2013128. Springer, Singapore (2018). https:\/\/doi.org\/10.1007\/978-981-13-2853-4_10"},{"key":"23_CR21","doi-asserted-by":"publisher","unstructured":"Anusha, R., Jaidhar, C.D.: Human gait recognition based on histogram of oriented gradients and Haralick texture descriptor. Multimed. Tools Appl. (2020). https:\/\/doi.org\/10.1007\/s11042-019-08469-1","DOI":"10.1007\/s11042-019-08469-1"},{"issue":"1","key":"23_CR22","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1109\/TIFS.2018.2844819","volume":"14","author":"Y He","year":"2019","unstructured":"He, Y., Zhang, J., Shan, H., Wang, L.: Multi-task GANs for view-specific feature learning in gait recognition. IEEE Trans. Inf. Forensics Secur. 14(1), 102\u2013113 (2019). https:\/\/doi.org\/10.1109\/TIFS.2018.2844819","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"23_CR23","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1016\/j.patcog.2019.04.023","volume":"93","author":"Y Zhang","year":"2019","unstructured":"Zhang, Y., Huang, Y., Wang, L., Yu, S.: A comprehensive study on gait biometrics using a joint CNN-based method. Pattern Recogn. 93, 228\u2013236 (2019). https:\/\/doi.org\/10.1016\/j.patcog.2019.04.023","journal-title":"Pattern Recogn."},{"key":"23_CR24","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1007\/978-981-13-7025-0_14","volume-title":"Geo-informatics in Sustainable Ecosystem and Society","author":"C Liu","year":"2019","unstructured":"Liu, C., Zhao, J., Wei, Z.: A review of gait behavior recognition methods based on wearable devices. In: Xie, Y., Zhang, A., Liu, H., Feng, L. (eds.) GSES 2018. CCIS, vol. 980, pp. 134\u2013145. Springer, Singapore (2019). https:\/\/doi.org\/10.1007\/978-981-13-7025-0_14"},{"key":"23_CR25","doi-asserted-by":"crossref","unstructured":"Denman, S.: Why multi-layered security is still the best defence. Network Security, 5\u20137 (2012)","DOI":"10.1016\/S1353-4858(12)70043-0"},{"key":"23_CR26","doi-asserted-by":"publisher","unstructured":"Primo, A., Phoha, V.V., Kumar, R., Serwadda, A.: Context-Aware active authentication using smartphone accelerometer measurements. In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR) Workshops, pp. 98\u2013105 (2014). https:\/\/doi.org\/10.1109\/CVPRW.2014.20","DOI":"10.1109\/CVPRW.2014.20"},{"key":"23_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2016\/4073584","volume":"2016","author":"R Damasevicius","year":"2016","unstructured":"Damasevicius, R., Vasiljevas, M., Salkevicius, J., Wozniak, M.: Human activity recognition in AAL environments using random projections. Comput. Math. Methods Med. 2016, 1\u201317 (2016). https:\/\/doi.org\/10.1155\/2016\/4073584","journal-title":"Comput. Math. Methods Med."},{"issue":"10","key":"23_CR28","doi-asserted-by":"publisher","first-page":"100","DOI":"10.3390\/sym8100100","volume":"8","author":"R Damasevicius","year":"2016","unstructured":"Damasevicius, R., Maskeliunas, R., Venckauskas, A., Wozniak, M.: Smartphone user identity verification using gait characteristics. Symmetry 8(10), 100 (2016). https:\/\/doi.org\/10.3390\/sym8100100","journal-title":"Symmetry"},{"key":"23_CR29","first-page":"273","volume":"20","author":"C Cortes","year":"1995","unstructured":"Cortes, C., Vapnik, V.: Support vector networks. Mach. Learn. 20, 273\u2013297 (1995)","journal-title":"Mach. Learn."},{"key":"23_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1007\/978-3-319-62404-4_19","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2017","author":"V Raudonis","year":"2017","unstructured":"Raudonis, V., Maskeli\u016bnas, R., Stankevi\u010dius, K., Dama\u0161evi\u010dius, R.: Gender, age, colour, position and stress: how they influence attention at workplace? In: Gervasi, O., et al. (eds.) ICCSA 2017. LNCS, vol. 10408, pp. 248\u2013264. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-62404-4_19"},{"key":"23_CR31","doi-asserted-by":"publisher","first-page":"947","DOI":"10.1016\/j.procs.2018.04.094","volume":"130","author":"M Ulinskas","year":"2018","unstructured":"Ulinskas, M., Dama\u0161evi\u010dius, R., Maskeliunas, R., Wo\u017aniak, M.: Recognition of human daytime fatigue using keystroke data. Procedia Comput. Sci. 130, 947\u2013952 (2018). https:\/\/doi.org\/10.1016\/j.procs.2018.04.094","journal-title":"Procedia Comput. Sci."},{"key":"23_CR32","doi-asserted-by":"publisher","unstructured":"Al-Madani, B., Orujov, F., Maskeli\u016bnas, R., Dama\u0161evi\u010dius, R., Ven\u010dkauskas, A.: Fuzzy logic type-2 based wireless indoor localization system for navigation of visually impaired people in buildings. Sensors 19(9) (2019). https:\/\/doi.org\/10.3390\/s19092114","DOI":"10.3390\/s19092114"},{"key":"23_CR33","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1016\/j.future.2018.06.030","volume":"89","author":"F Orujov","year":"2018","unstructured":"Orujov, F., Maskeli\u016bnas, R., Dama\u0161evi\u010dius, R., Wei, W., Li, Y.: Smartphone based intelligent indoor positioning using fuzzy logic. Future Gener. Comput. Syst. 89, 335\u2013348 (2018). https:\/\/doi.org\/10.1016\/j.future.2018.06.030","journal-title":"Future Gener. Comput. Syst."}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2020"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-58802-1_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,23]],"date-time":"2021-04-23T10:22:58Z","timestamp":1619173378000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-58802-1_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030588014","9783030588021"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-58802-1_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"2 October 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCSA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Science and Its Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cagliari","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 July 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 July 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccsa2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.iccsa.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Cyber chair 4","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1450","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"466","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Conference was held virtually due to COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}