{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T21:55:31Z","timestamp":1765230931933,"version":"build-2065373602"},"publisher-location":"Berlin, Heidelberg","reference-count":41,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642176098"},{"type":"electronic","value":"9783642176104"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-17610-4_4","type":"book-chapter","created":{"date-parts":[[2010,11,24]],"date-time":"2010-11-24T07:57:18Z","timestamp":1290585438000},"page":"29-38","source":"Crossref","is-referenced-by-count":8,"title":["Emerging Biometric Modalities: Challenges and Opportunities"],"prefix":"10.1007","author":[{"given":"Davrondzhon","family":"Gafurov","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","unstructured":"ISO\/IEC IS 19795-1: Information technology, biometric performance testing and reporting, part 1: Principles and framework (2006)"},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"Gafurov, D., Snekkenes, E.: Towards understanding the uniqueness of gait biometric. In: IEEE International Conference Automatic Face and Gesture Recognition (2008)","DOI":"10.1109\/AFGR.2008.4813383"},{"key":"4_CR3","unstructured":"Yamakawa, T., Taniguchi, K., Asari, K., Kobashi, S., Hata, Y.: Biometric personal identification based on gait pattern using both feet pressure change. In: World Automation Congress (2008)"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Gafurov, D., Snekkenes, E., Bours, P.: Spoof attacks on gait authentication system. IEEE Transactions on Information Forensics and Security\u00a02(3) (2007) (Special Issue on Human Detection and Recognition)","DOI":"10.1109\/TIFS.2007.902030"},{"key":"4_CR5","unstructured":"Sprager, S., Zazula, D.: Gait identification using cumulants of accelerometer data. In: 2nd WSEAS International Conference on Sensors, and Signals and Visualization, Imaging and Simulation and Materials Science (2009)"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Ailisto, H.J., Lindholm, M., M\u00e4ntyj\u00e4rvi, J., Vildjiounaite, E., M\u00e4kel\u00e4, S.-M.: Identifying people from gait pattern with accelerometers. In: Proceedings of SPIE. Biometric Technology for Human Identification II, vol.\u00a05779, pp. 7\u201314 (2005)","DOI":"10.1117\/12.603331"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Rong, L., Jianzhong, Z., Ming, L., Xiangfeng, H.: A wearable acceleration sensor system for gait recognition. In: 2nd IEEE Conference on Industrial Electronics and Applications (ICIEA) (2007)","DOI":"10.1109\/ICIEA.2007.4318894"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Gafurov, D., Snekkenes, E., Bours, P.: Gait authentication and identification using wearable accelerometer sensor. In: 5th IEEE Workshop on Automatic Identification Advanced Technologies (AutoID), Alghero, Italy, June 7-8, pp. 220\u2013225 (2007)","DOI":"10.1109\/AUTOID.2007.380623"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Gafurov, D., Snekkenes, E.: Arm swing as a weak biometric for unobtrusive user authentication. In: IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing (2008)","DOI":"10.1109\/IIH-MSP.2008.47"},{"key":"4_CR10","unstructured":"Jenkins, J., Ellis, C.S.: Using ground reaction forces from gait analysis: Body mass as a weak biometric. In: International Conference on Pervasive Computing (2007)"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Uhl, A., Wild, P.: Personal identification using eigenfeet, ballprint and foot geometry biometrics. In: IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS) (2007)","DOI":"10.1109\/BTAS.2007.4401924"},{"key":"4_CR12","unstructured":"Hocquet, S., Ramel, J.-Y., Cardot, H.: Fusion of methods for keystroke dynamic authentication. In: Fourth IEEE Workshop on Automatic Identification Advanced Technologies (2005)"},{"key":"4_CR13","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10207-006-0006-6","volume":"ISSN","author":"N.L. Clarke","year":"2006","unstructured":"Clarke, N.L., Furnell, S.M.: Authenticating mobile phone users using keystroke analysis. International Journal of Information Security, 1-14 (2006) ISSN:1615-5262","journal-title":"International Journal of Information Security"},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"Hosseinzadeh, D., Krishnan, S.: Gaussian mixture modeling of keystroke patterns for biometric applications. IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews (2008)","DOI":"10.1109\/TSMCC.2008.2001696"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Everitt, R.A.J., McOwan, P.W.: Java-based internet biometric authentication system. IEEE Transactions on Pattern Analysis and Machine Intelligence (2003)","DOI":"10.1109\/TPAMI.2003.1227991"},{"key":"4_CR16","doi-asserted-by":"crossref","unstructured":"Schulz, D.A.: Mouse curve biometrics. In: Biometric Consortium Conference (2006)","DOI":"10.1109\/BCC.2006.4341626"},{"key":"4_CR17","doi-asserted-by":"crossref","unstructured":"Ahmed, A.A.E., Traore, I.: A new biometric technology based on mouse dynamics. IEEE Transactions on Dependable and Secure Computing (2007)","DOI":"10.1109\/TDSC.2007.70207"},{"key":"4_CR18","doi-asserted-by":"crossref","unstructured":"Riera, A., Soria-Frisch, A., Caparrini, M., Grau, C., Ruffini, G.: Unobtrusive biometric system based on electroencephalogram analysis. EURASIP Journal on Advances in Signal Processing (2008)","DOI":"10.1155\/2008\/143728"},{"key":"4_CR19","unstructured":"Biel, L., Pettersson, O., Philipson, L., Wide, P.: ECG analysis: a new approach in human identification. In: 16th IEEE Instrumentation and Measurement Technology Conference (1999)"},{"key":"4_CR20","doi-asserted-by":"crossref","unstructured":"Biel, L., Pettersson, O., Philipson, L., Wide, P.: ECG analysis: a new approach in human identification. IEEE Transactions on Instrumentation and Measurement (2001)","DOI":"10.1109\/19.930458"},{"key":"4_CR21","doi-asserted-by":"crossref","unstructured":"Irvine, J.M., Israel, S.A.: A sequential procedure for individual identity verification using ECG. EURASIP Journal on Advances in Signal Processing (2009)","DOI":"10.1155\/2009\/243215"},{"key":"4_CR22","doi-asserted-by":"crossref","unstructured":"Boumbarov, O., Velchev, Y., Sokolov, S.: ECG personal identification in subspaces using radial basis neural networks. In: IEEE International Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (2009)","DOI":"10.1109\/IDAACS.2009.5342942"},{"key":"4_CR23","doi-asserted-by":"crossref","unstructured":"Fatemian, S.Z., Hatzinakos, D.: A new ECG feature extractor for biometric recognition. In: 16th International Conference on Digital Signal Processing (2009)","DOI":"10.1109\/ICDSP.2009.5201143"},{"key":"4_CR24","unstructured":"Micheli-Tzanakou, E., Plataniotis, K., Boulgouris, N.: Electrocardiogram (ECG) biometric for robust identification and secure communication. Biometrics: Theory, Methods, and Applications (2009)"},{"key":"4_CR25","unstructured":"Akkermans, A.H.M., Kevenaar, T.A.M., Schobben, D.W.E.: Acoustic ear recognition for person identification. In: Fourth IEEE Workshop on Automatic Identification Advanced Technologies (2005)"},{"key":"4_CR26","doi-asserted-by":"crossref","unstructured":"Yamada, M., Kamiya, K., Kudo, M., Nonaka, H., Toyama, J.: Soft authentication and behavior analysis using a chair with sensors attached: hipprint authentication. Pattern Analysis & Applications (2009)","DOI":"10.1007\/s10044-008-0124-z"},{"key":"4_CR27","doi-asserted-by":"crossref","unstructured":"Kumar, A., Ravikanth, C.: Personal authentication using finger knuckle surface. IEEE Transactions on Information Forensics and Security (2009)","DOI":"10.1109\/TIFS.2008.2011089"},{"key":"4_CR28","doi-asserted-by":"crossref","unstructured":"Choras, M.: The lip as a biometric. Pattern Analysis & Applications (2010)","DOI":"10.1007\/s10044-008-0144-8"},{"key":"4_CR29","unstructured":"Zhang, D., Liu, Z., Yan, J.q., Shi, P.f.: Tongue-print: A novel biometrics pattern. In: 2nd International Conference on Biometrics (2007)"},{"key":"4_CR30","doi-asserted-by":"crossref","unstructured":"Zhang, D., Liu, Z., Yan, J.q.: Dynamic tongueprint: A novel biometric identifier. Pattern Recognition (2010)","DOI":"10.1016\/j.patcog.2009.09.002"},{"key":"4_CR31","unstructured":"bioChec, \n                  \n                    http:\/\/www.biochec.com\/\n                  \n                  \n                 (Online accessed: 13.04.2010)"},{"key":"4_CR32","unstructured":"Authenware Corp., \n                  \n                    http:\/\/www.authenware.com\/\n                  \n                  \n                 (Online accessed: 13.04.2010)"},{"key":"4_CR33","unstructured":"Plantiga\u00a0Technologies Inc., \n                  \n                    http:\/\/www.plantiga.com\/\n                  \n                  \n                 (Online accessed: 13.04.2010)"},{"key":"4_CR34","doi-asserted-by":"crossref","unstructured":"Campisi, P., Maiorana, E., Lo Bosco, M., Neri, A.: User authentication using keystroke dynamics for cellular phones. IET Signal Processing (2009)","DOI":"10.1049\/iet-spr.2008.0171"},{"key":"4_CR35","doi-asserted-by":"crossref","unstructured":"Mann, W.C.: The aging population and its needs. IEEE Pervasive Computing (2004)","DOI":"10.1109\/MPRV.2004.1316812"},{"key":"4_CR36","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-29488-9","volume-title":"Human Identification Based on Gait","author":"M.S. Nixon","year":"2006","unstructured":"Nixon, M.S., Tan, T.N., Chellappa, R.: Human Identification Based on Gait. Springer, Heidelberg (2006)"},{"key":"4_CR37","doi-asserted-by":"crossref","unstructured":"Giot, R., El-Abed, M., Rosenberger, C.: GREYC keystroke: A benchmark for keystroke dynamics biometric systems. In: IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems (2009)","DOI":"10.1109\/BTAS.2009.5339051"},{"key":"4_CR38","doi-asserted-by":"crossref","unstructured":"Gafurov, D.: Security analysis of impostor attempts with respect to gender in gait biometrics. In: IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS), Washington, D.C., USA, September 27-29 (2007)","DOI":"10.1109\/BTAS.2007.4401905"},{"key":"4_CR39","doi-asserted-by":"crossref","unstructured":"Yang, B., Busch, C., Gafurov, D., Bours, P.: Renewable minutiae templates with tunable size and security. In: 20th International Conference on Pattern Recognition (ICPR) (2010)","DOI":"10.1109\/ICPR.2010.221"},{"key":"4_CR40","doi-asserted-by":"crossref","unstructured":"Bringer, J., Chabanne, H., Kindarji, B.: Anonymous identification with cancelable biometrics. In: International Symposium on Image and Signal Processing and Analysis (2009)","DOI":"10.1109\/ISPA.2009.5297678"},{"key":"4_CR41","unstructured":"Apple\u2019s iphone with integrated accelerometer, \n                  \n                    http:\/\/www.apple.com\/iphone\/features\/index.html\n                  \n                  \n                 (Last visit: 09.04.2008)"}],"container-title":["Communications in Computer and Information Science","Security Technology, Disaster Recovery and Business Continuity"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-17610-4_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T21:42:53Z","timestamp":1558388573000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-17610-4_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642176098","9783642176104"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-17610-4_4","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2010]]}}}