{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T02:20:00Z","timestamp":1774664400395,"version":"3.50.1"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2021,1,29]],"date-time":"2021-01-29T00:00:00Z","timestamp":1611878400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,29]],"date-time":"2021-01-29T00:00:00Z","timestamp":1611878400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,4]]},"DOI":"10.1007\/s11042-021-10524-9","type":"journal-article","created":{"date-parts":[[2021,1,29]],"date-time":"2021-01-29T20:02:49Z","timestamp":1611950569000},"page":"14807-14827","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":22,"title":["Robust multimodal biometric authentication on IoT device through ear shape and arm gesture"],"prefix":"10.1007","volume":"80","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7672-7917","authenticated-orcid":false,"given":"Feriel","family":"Cherifi","sequence":"first","affiliation":[]},{"given":"Kamal","family":"Amroun","sequence":"additional","affiliation":[]},{"given":"Mawloud","family":"Omar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,29]]},"reference":[{"issue":"3","key":"10524_CR1","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TSMC.2017.2698258","volume":"49","author":"AF Abate","year":"2019","unstructured":"Abate AF, Nappi M, Ricciardi S (2019) I-Am: Implicitly authenticate me person authentication on mobile devices through ear shape and arm gesture. IEEE Trans Syst Man Cybern Syst 49(3):469\u2013481. https:\/\/doi.org\/10.1109\/TSMC.2017.2698258","journal-title":"IEEE Trans Syst Man Cybern Syst"},{"key":"10524_CR2","doi-asserted-by":"publisher","unstructured":"Abozaid A, Haggag A, Kasban H, Eltokhy M (2018) Multimodal biometric scheme for human authentication technique based on voice and face recognition fusion. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-018-7012-3","DOI":"10.1007\/s11042-018-7012-3"},{"issue":"12","key":"10524_CR3","doi-asserted-by":"publisher","first-page":"2037","DOI":"10.1109\/TPAMI.2006.244","volume":"28","author":"T Ahonen","year":"2006","unstructured":"Ahonen T, Hadid A, Pietikainen M (2006) Face description with local binary patterns: Application to face recognition. IEEE Trans Pattern Anal Mach Intell 28(12):2037\u20132041. https:\/\/doi.org\/10.1109\/TPAMI.2006.244","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"10524_CR4","first-page":"46","volume":"4","author":"Z Akhtar","year":"2011","unstructured":"Akhtar Z, Sandeep K, Nasir A (2011) Spoof attacks on multimodal biometric systems. Int Conf Inf Netw Technol 4:46\u201351","journal-title":"Int Conf Inf Netw Technol"},{"key":"10524_CR5","doi-asserted-by":"publisher","unstructured":"Akhtar Z, Buriro A, Crispo B, Falk T. H. (2017) Multimodal smartphone user authentication using touchstroke, phone-movement and face patterns. In: Global conference on signal and information processing (GlobalSIP), pp 1368\u20131372. https:\/\/doi.org\/10.1109\/GlobalSIP.2017.8309185","DOI":"10.1109\/GlobalSIP.2017.8309185"},{"key":"10524_CR6","doi-asserted-by":"publisher","unstructured":"Aronowitz H, Li M, Toledo-Ronen O, Harary S, Geva A, Ben-David S, Rendel A, Hoory R, Ratha N, Pankanti S, Nahamoo D (2014) Multi-modal biometrics for mobile authentication. IEEE Int Jt Conf Biom, pp 1\u20138. https:\/\/doi.org\/10.1109\/BTAS.2014.6996269","DOI":"10.1109\/BTAS.2014.6996269"},{"key":"10524_CR7","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1016\/j.scs.2017.12.023","volume":"40","author":"JS Arteaga-Falconi","year":"2018","unstructured":"Arteaga-Falconi JS, Al Osman H, El Saddik A (2018) ECG and fingerprint bimodal authentication. Sustain Cities Soc 40:274\u2013283. https:\/\/doi.org\/10.1016\/j.scs.2017.12.023","journal-title":"Sustain Cities Soc"},{"key":"10524_CR8","doi-asserted-by":"publisher","unstructured":"Barra S, Fenu G, De Marsico M, Castiglione A, Nappi M (2018) Have you permission to answer this phone?. In: 2018 International workshop on biometrics and forensics (IWBF), pp 1\u20137. https:\/\/doi.org\/10.1109\/IWBF.2018.8401563","DOI":"10.1109\/IWBF.2018.8401563"},{"key":"10524_CR9","doi-asserted-by":"publisher","unstructured":"Buriro A, Crispo B, Zhauniarovich Y (2017) Please hold on: Unobtrusive user authentication using smartphone\u2019s built-in sensors. In: IEEE International conference on identity, security and behavior analysis (ISBA). https:\/\/doi.org\/10.1109\/ISBA.2017.7947684. IEEE, New Delhi India, pp 1\u20138","DOI":"10.1109\/ISBA.2017.7947684"},{"key":"10524_CR10","doi-asserted-by":"publisher","unstructured":"Chhabria SA, Dharaskar RV, Thakare VM (2013) Survey of fusion techniques for design of efficient multimodal systems. In: International conference on machine intelligence research and advancement, pp 486\u2013492. https:\/\/doi.org\/10.1109\/ICMIRA.2013.103","DOI":"10.1109\/ICMIRA.2013.103"},{"key":"10524_CR11","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1016\/j.procs.2016.03.043","volume":"79","author":"S Dhvani","year":"2016","unstructured":"Dhvani S, Vinayak H (2016) IoT based biometrics implementation on raspberry Pi. Procedia Comput Sci 79:328\u2013336. https:\/\/doi.org\/10.1016\/j.procs.2016.03.043","journal-title":"Procedia Comput Sci"},{"key":"10524_CR12","doi-asserted-by":"publisher","unstructured":"Dornaika F, Moujahid A, El Merabet Y, Ruichek Y (2017) A comparative study of image segmentation algorithms and descriptors for building detection. In: Handbook of neural computation, pp 591\u2013606. https:\/\/doi.org\/10.1016\/B978-0-12-811318-9.00032-6","DOI":"10.1016\/B978-0-12-811318-9.00032-6"},{"key":"10524_CR13","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/j.neucom.2016.08.139","volume":"255","author":"Z Emersic","year":"2017","unstructured":"Emersic Z, Struc V, Peer P (2017) Ear recognition: More than a survey. Neurocomputing 255:26\u201339. https:\/\/doi.org\/10.1016\/j.neucom.2016.08.139","journal-title":"Neurocomputing"},{"issue":"4","key":"10524_CR14","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1145\/2818990","volume":"59","author":"M Gofman","year":"2016","unstructured":"Gofman M, Mitra S (2016) Multimodal biometrics for enhanced mobile device security. Commun ACM 59(4):58\u201365. https:\/\/doi.org\/10.1145\/2818990","journal-title":"Commun ACM"},{"key":"10524_CR15","unstructured":"Gofman M, Mitra S, Cheng K, Smith N (2015) Quality-based score-level fusion for secure and robust multimodal biometrics-based authentication on consumer mobile devices. In: ICSEA 2015 : The tenth international conference on software engineering advances, pp 274\u2013276"},{"key":"10524_CR16","doi-asserted-by":"publisher","unstructured":"Gofman M, Mitra S, Smith N (2016) Hidden Markov models for feature-level fusion of biometrics on mobile devices. In: IEEE\/ACS 13th International Conference of Computer Systems and Applications (AICCSA), pp 1\u20132. https:\/\/doi.org\/10.1109\/AICCSA.2016.7945755","DOI":"10.1109\/AICCSA.2016.7945755"},{"key":"10524_CR17","unstructured":"Gofman M, Sandico N, Mitra S, Suo E, Muhi S, Vu T (2018) multimodal biometrics via discriminant correlation analysis on mobile devices. In: Proceedings of the international conference on security and management (SAM). The steering committee of The World congress in computer science, Computer engineering and applied computing (WorldComp)"},{"key":"10524_CR18","doi-asserted-by":"publisher","unstructured":"Habib K, Arild T, Leister W (2014) A novel authentication framework based on biometric and radio fingerprinting for the IoT in eHealth. In: Proceedings of international conference on smart systems devices and technologies (SMART), pp 32\u201337. https:\/\/doi.org\/10.13140\/2.1.3944.1286","DOI":"10.13140\/2.1.3944.1286"},{"key":"10524_CR19","unstructured":"Introduction to USTB ear image databases (2002) University of Science and Technology of Beijing, http:\/\/www1.ustb.edu.cn\/resb\/en\/doc\/Imagedb123introen.pdf"},{"issue":"1","key":"10524_CR20","doi-asserted-by":"publisher","first-page":"88","DOI":"10.17697\/ibmrd\/2015\/v4i1\/60357","volume":"4","author":"TV Kandgaonkar","year":"2015","unstructured":"Kandgaonkar TV, Mente RS, Shinde AR, Raut SD (2015) Ear biometrics: A survey on ear image databases and techniques for ear detection and recognition. IBMRD\u2019s J Manag Res 4(1):88\u2013103. https:\/\/doi.org\/10.17697\/ibmrd\/2015\/v4i1\/60357","journal-title":"IBMRD\u2019s J Manag Res"},{"key":"10524_CR21","unstructured":"Kannala J, Rahtu E (2012) BSIf: binarized statistical image features. In: Proceedings of the International Conference on Pattern Recognition (ICPR), pp 1363\u20131366"},{"issue":"5","key":"10524_CR22","first-page":"162","volume":"45","author":"DJ Kim","year":"2008","unstructured":"Kim DJ, Kil-Ram H, Kwang-Seok H (2008) An implementation of multimodal speaker verification system using teeth image and voice on mobile environment. J Inst Electron Eng Korea CI 45(5):162\u2013172","journal-title":"J Inst Electron Eng Korea CI"},{"key":"10524_CR23","doi-asserted-by":"publisher","unstructured":"Krizaj J, Struc V, Pavesic N (2010) Adaptation of SIFT features for robust face recognition. Int Conf Image Anal Recog, pp 394\u2013404. https:\/\/doi.org\/10.1007\/978-3-642-13772-3\u2216_40","DOI":"10.1007\/978-3-642-13772-3\u2216_40"},{"issue":"3","key":"10524_CR24","doi-asserted-by":"publisher","first-page":"956","DOI":"10.1016\/j.patcog.2011.06.005","volume":"45","author":"A Kumar","year":"2012","unstructured":"Kumar A, Wu C (2012) Automated human identification using ear imaging. Pattern Recognit 45(3):956\u2013968. https:\/\/doi.org\/10.1016\/j.patcog.2011.06.005","journal-title":"Pattern Recognit"},{"key":"10524_CR25","unstructured":"Macek N, Franc I, Bogdanoski M, Mirkovic A (2016) Multimodal biometric authentication in IoT: Single camera case study. In: 8th International conference on business information security (BISEC\u20192016), pp 33\u201337"},{"issue":"1","key":"10524_CR26","doi-asserted-by":"publisher","first-page":"67","DOI":"10.4018\/IJSKD.2020010104","volume":"12","author":"RO Mahmoud","year":"2020","unstructured":"Mahmoud RO, Selim MM, Muhi OA (2020) Fusion time reduction of a feature level based multimodal biometric authentication system. Int J Sociotechnol Knowl Dev 12(1):67\u201383. https:\/\/doi.org\/10.4018\/IJSKD.2020010104","journal-title":"Int J Sociotechnol Knowl Dev"},{"key":"10524_CR27","doi-asserted-by":"publisher","unstructured":"Malhotra A, Sankaran A, Mittal A, Vatsa M, Singh R (2017) Chapter 6 - Fingerphoto authentication using smartphone camera captured under varying environmental conditions. In: Human recognition in unconstrained environments, pp 119\u2013144. https:\/\/doi.org\/10.1016\/B978-0-08-100705-1.00006-3","DOI":"10.1016\/B978-0-08-100705-1.00006-3"},{"issue":"8","key":"10524_CR28","doi-asserted-by":"publisher","first-page":"837","DOI":"10.1109\/34.531803","volume":"18","author":"BS Manjunath","year":"1996","unstructured":"Manjunath BS, Ma WY (1996) Texture features for browsing and retrieval of image data. IEEE Trans Pattern Anal Mach Intell 18(8):837\u2013848. https:\/\/doi.org\/10.1109\/34.531803","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"7","key":"10524_CR29","doi-asserted-by":"publisher","first-page":"6","DOI":"10.5120\/17825-8597","volume":"102","author":"TK Mohanta","year":"2014","unstructured":"Mohanta TK, Mohapatra S (2014) Development of multimodal biometric framework for smartphone authentication system. Int J Comput Appl 102 (7):6\u201311. https:\/\/doi.org\/10.5120\/17825-8597","journal-title":"Int J Comput Appl"},{"issue":"1","key":"10524_CR30","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/0031-3203(95)00067-4","volume":"29","author":"T Ojala","year":"1996","unstructured":"Ojala T, Pietikainen M, Harwood D (1996) A comparative study of texture measures with classification based on feature distributions. Pattern Recogn 29(1):51\u201359. https:\/\/doi.org\/10.1016\/0031-3203(95)00067-4","journal-title":"Pattern Recogn"},{"key":"10524_CR31","doi-asserted-by":"publisher","unstructured":"Ojansivu V, Heikkila J (2008) Blur insensitive texture classification using local phase quantization. In: Image and Signal Processing: 3rd International Conference, ICISP 2008. https:\/\/doi.org\/10.1007\/978-3-540-69905-7_27. Springer, Berlin, pp 236\u2013243","DOI":"10.1007\/978-3-540-69905-7_27"},{"key":"10524_CR32","doi-asserted-by":"publisher","unstructured":"Ojansivu V, Rahtu E, Heikkila J (2008) Rotation invariant local phase quantization for blur insensitive texture analysis. In: 19th International conference on pattern recognition, pp 236\u2013243. https:\/\/doi.org\/10.1109\/ICPR.2008.4761377","DOI":"10.1109\/ICPR.2008.4761377"},{"key":"10524_CR33","doi-asserted-by":"publisher","unstructured":"Olazabal O, Gofman M, Bai Y, Choi Y, Sandico N, Mitra S, Pham K (2019) Multimodal Biometrics for Enhanced IoT Security. In: 2019 IEEE 9th annual computing and communication workshop and conference (CCWC), pp 886\u2013893. https:\/\/doi.org\/10.1109\/CCWC.2019.8666599","DOI":"10.1109\/CCWC.2019.8666599"},{"issue":"11","key":"10524_CR34","doi-asserted-by":"publisher","first-page":"1522","DOI":"10.1109\/TSMC.2014.2331920","volume":"44","author":"PP Paul","year":"2014","unstructured":"Paul PP, Gavrilova ML, Alhajj R (2014) Decision fusion for multimodal biometrics using social network analysis. IEEE Trans Syst Man Cybern Syst 44(11):1522\u20131533. https:\/\/doi.org\/10.1109\/TSMC.2014.2331920","journal-title":"IEEE Trans Syst Man Cybern Syst"},{"key":"10524_CR35","doi-asserted-by":"publisher","unstructured":"Pflug A, Paul PN, Busch C (2014) A comparative study on texture and surface descriptors for ear biometrics. In: 2014 International carnahan conference on security technology (ICCST), pp 1\u20138. https:\/\/doi.org\/10.1109\/BTAS.2014.6996239","DOI":"10.1109\/BTAS.2014.6996239"},{"key":"10524_CR36","doi-asserted-by":"publisher","unstructured":"Pflug A, Busch C, Ross A (2014) 2D ear classification based on unsupervised clustering. In: Proceedings of the international joint conference on biometrics, pp 1\u20138. https:\/\/doi.org\/10.1109\/BTAS.2014.6996239","DOI":"10.1109\/BTAS.2014.6996239"},{"issue":"3","key":"10524_CR37","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1016\/j.jvlc.2009.01.010","volume":"20","author":"RN Rodrigues","year":"2009","unstructured":"Rodrigues RN, Lee LL, Venu G (2009) Robustness of multimodal biometric fusion methods against spoof attacks. J Vis Lang Comput 20(3):169\u2013179. https:\/\/doi.org\/10.1016\/j.jvlc.2009.01.010","journal-title":"J Vis Lang Comput"},{"key":"10524_CR38","doi-asserted-by":"publisher","unstructured":"Rodrigues RN, Niranjan K, Venu G (2010) Evaluation of biometric spoofing in a multimodal system. In: 2010 Fourth IEEE international conference on biometrics: Theory applications and systems (BTAS). https:\/\/doi.org\/10.1109\/BTAS.2010.5634531","DOI":"10.1109\/BTAS.2010.5634531"},{"key":"10524_CR39","unstructured":"Sequeira AF, Monteiro JC, Rebelo A, Oliveira HP (2014) MobBIO: A multimodal database captured with a portable handheld device. In: 2014 International conference on computer vision theory and applications (VISAPP), vol 3"},{"issue":"5","key":"10524_CR40","doi-asserted-by":"publisher","first-page":"877","DOI":"10.1109\/TIFS.2015.2506542","volume":"11","author":"Z Sitova","year":"2016","unstructured":"Sitova Z, Sedenka J, Yang Q, Peng G, Zhou G, Gasti P, Balagani KS (2016) HMOG: New behavioral biometric features for continuous authentication of smartphone users. IEEE Trans Inf Forensic Secur 11 (5):877\u2013892. https:\/\/doi.org\/10.1109\/TIFS.2015.2506542","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"10524_CR41","doi-asserted-by":"publisher","unstructured":"Vu NS, Caplier A (2010) Face recognition with patterns of oriented edge magnitudes. Comp Vision pp 313\u2013326. https:\/\/doi.org\/10.1007\/978-3-642-15549-9\u2216_23","DOI":"10.1007\/978-3-642-15549-9\u2216_23"},{"key":"10524_CR42","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TIFS.2019.2944058","volume":"15","author":"L Wu","year":"2020","unstructured":"Wu L, Yang J, Zhou M, Chen Y, Wang Q (2020) LVID: A multimodal biometrics authenticationsystem on smartphones. IEEE Trans Inf Forensic Secur 15:1\u20136. https:\/\/doi.org\/10.1109\/TIFS.2019.2944058","journal-title":"IEEE Trans Inf Forensic Secur"},{"issue":"11","key":"10524_CR43","doi-asserted-by":"publisher","first-page":"2897","DOI":"10.1109\/TIFS.2018.2833033","volume":"13","author":"Q Zhang","year":"2018","unstructured":"Zhang Q, Li H, Sun Z, Tan T (2018) Deep feature fusion for iris and periocular biometrics on mobile devices. IEEE Trans Inf Forensic Secur 13(11):2897\u20132912. https:\/\/doi.org\/10.1109\/TIFS.2018.2833033","journal-title":"IEEE Trans Inf Forensic Secur"},{"issue":"3","key":"10524_CR44","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1049\/iet-bmt.2017.0176","volume":"7","author":"Y Zhang","year":"2018","unstructured":"Zhang Y, Mu Z, Yuan L, Yu C (2018) Ear verification under uncontrolled conditions with convolutional neural networks. IET Biometrics 7(3):185\u2013198. https:\/\/doi.org\/10.1049\/iet-bmt.2017.0176","journal-title":"IET Biometrics"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10524-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-10524-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10524-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T05:56:07Z","timestamp":1619502967000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-10524-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,29]]},"references-count":44,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2021,4]]}},"alternative-id":["10524"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-10524-9","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1,29]]},"assertion":[{"value":"7 July 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 November 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 January 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 January 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Conflict of interests"}}]}}