References
- [1] A. K. Jain, A. Ross, and S. Prabhakar, “An introduction to biometric recognition,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 14, no. 1, p. 4–20, Jan. 2004. https://doi.org/10.1109/TCSVT.2003.81834910.1109/TCSVT.2003.818349
- [2] A. Drosou, D. Loannidis, D. Tzovaras, K. Moustakas, and M. Petrou, “Activity related authentication using prehension biometrics,” Pattern Recognition, vol. 48, no. 5, p. 1743–1759, May 2015. https://doi.org/10.1016/j.patcog.2014.12.00810.1016/j.patcog.2014.12.008
- [3] B. Miller, “Vital signs of identity [biometrics],” IEEE Spectrum, vol. 31, no. 2, p. 22–30, 1994. https://doi.org/10.1109/6.25948410.1109/6.259484
- [4] K. A. Reynolds, P. M. Watt, S. A. Boone, and C. P. Gerba, “Occurrence of bacteria and biochemical markers on public surfaces,” International Journal of Environmental Health Research, vol. 15, no. 3, p. 225–234, 2005. https://doi.org/10.1080/0960312050011529810.1080/0960312050011529816134485
- [5] R. Sahak, N. Tahir, A. I. M. Yassin, F. H. Kamaruzaman, and A. A. Misreb, “Human gait recognition using skeleton joint coordinates with orthogonal least square and locally linear embedded techniques,” International Journal of Simulation: Systems, Science and Technology, vol. 19, no. 5, p. 25.1–25.9, 2019. https://doi.org/10.5013/IJSSST.a.19.05.2510.5013/IJSSST.a.19.05.25
- [6] P. C. Cattin, “Biometric Authentication System Using Human Gait”, Doctoral Thesis, ETH Zurich, Zurich, Switzerland, 2002.
- [7] A. Kale, A. Sundaresan, A. N. Rajagopalan, N. P. Cuntoor, A. K. R. Roy-Chowdhury, V. Kruger, and R. Chellappa “Identification of humans using gait”, IEEE Transaction on Image Processing, vol. 13, no. 9, p. 1163–1173, Aug. 2004. https://doi.org/10.1109/TIP.2004.83286510.1109/TIP.2004.832865
- [8] N. Sadeghzadehyazdi, T. Batabyal, N. K. Dhar, B. O. Farmiloni, K. M. Iftekharuddin, and S. T. Acton, “GlidarCo: gait recognition by 3D skeleton estimation and biometric feature correction of flash lidar data”, arXiv preprint arXiv:1905.07058, 2019.
- [9] H. Fujiyoshi, and A. J. Lipton, “Real-time human motion analysis by image skeletonization,” in IEEE Workshop on Applications of Computer Vision, Princeton, NU, USA, Oct. 1998, pp. 15–21. https://doi.org/10.1109/ACV.1998.73285210.1109/ACV.1998.732852
- [10] H. Sarbolandi, D. Lefloch, and A. Kolb, “Kinect range sensing: Structured-light versus Time-of-Flight Kinect,” Computer Vision and Image Understanding, vol. 139, pp. 1–20, Oct. 2015. https://doi.org/10.1016/j.cviu.2015.05.00610.1016/j.cviu.2015.05.006
- [11] A. Bobick and A. Y. Johnson, “Gait recognition using static activity-specific parameters,” in IEEE 2001 Computer Society Conference on Computer Vision and Pattern Recognition, Kauai, USA, Dec. 2001. https://doi.org/10.1109/CVPR.2001.99050610.1109/CVPR.2001.990506
- [12] J. P. Singh and S. Jain, “Person identification based on gait using dynamic body parameters,” in Trendz in Information Sciences & Computing, Chennai, India, Dec. 2010, pp. 248–252. https://doi.org/10.1109/TISC.2010.571464910.1109/TISC.2010.5714649
- [13] N. Jianwattanapaisarn, N. Khamsemanan, and C. Nattee, “Gait recognition from freestyle walks using relative coordinates and random subsequence-based Sum-Rule classification,” in Joint 8th International Conference on Soft Computing and Intelligent Systems (SCIS) and 17th International Symposium on Advanced Intelligent Systems (ISIS), Sapporo, Japan, Aug. 2016, pp. 5–9. https://doi.org/10.1109/SCIS-ISIS.2016.001610.1109/SCIS-ISIS.2016.0016
- [14] Y. Wang, S. Rane, S. C. Draper, and P. Ishwar “A theoretical analysis of authentication, privacy and reusability across secure biometric systems,” IEEE Transactions on Information Forensics and Security, vol. 7, no. 6, pp. 1825–1840, Dec. 2012. https://doi.org/10.1109/TIFS.2012.221021510.1109/TIFS.2012.2210215
- [15] A. El-Sallam, F. Sohe, and M. Bennamoun, “Robust pose invariant shape-based hand recognition,” in IEEE 2011 6th Conference on Industrial Electronics and Applications, Beijing, China, June 2011, pp. 1–10. https://doi.org/10.1109/ICIEA.2011.597559510.1109/ICIEA.2011.5975595
- [16] K. Simoens, P. Tuyls, and B. Preneel, “Privacy weaknesses in biometric sketches,” in IEEE 2009 30th Symposium on Security and Privacy, Oakland, USA, May 2009, pp. 188–203, doi: 10.1109/SP.2009.24.10.1109/SP.2009.24
- [17] A. Eng and L. A. Wahsheh, “Look into my eyes: A survey of biometric security,” in 10th International Conference on Information Technology: New Generations, Las Vegas, USA, Apr. 2013, pp. 422–427. https://doi.org/10.1109/ITNG.2013.6510.1109/ITNG.2013.65
- [18] J. Lu, X. Yua, and T. Yahagi, “A method of face recognition based on fuzzy c-Means clustering and associated Sub-NNs,” IEEE Transactions on Neural Networks, vol. 18, no. 1, p. 150–160, Jan. 2007. https://doi.org/10.1109/TNN.2006.88467810.1109/TNN.2006.88467817278469
- [19] D. Souza, A. Burlamaqui, and G. Souza Filho, “Improving biometrics authentication with a multi-factor approach based on optical interference and chaotic maps,” Multimedia Tools Applications, vol. 77, p. 2013–2032, 2018. https://doi.org/10.1007/s11042-017-4374-x10.1007/s11042-017-4374-x
- [20] K. Dharavath, F. A. Talukdar, and R. H. Laskar, “Study on biometric authentication systems, challenges and future trends: A review,” in IEEE 2013 International Conference on Computational Intelligence and Computing Research, Enathi, India, Dec. 2013, pp. 1–7. https://doi.org/10.1109/ICCIC.2013.672427810.1109/ICCIC.2013.6724278
- [21] A. N. Kataria, D. M. Adhyaru, A. K. Sharma, and T. H. Zaveri, “A survey of automated biometric authentication techniques,” in IEEE 2013 Nirma University International Conference on Engineering, Ahmedabad, India, Nov. 2013, pp. 1–6. https://doi.org/10.1109/NUiCONE.2013.678019010.1109/NUiCONE.2013.6780190
- [22] W. Meng, D. S. Wong, S. Furnell, and J. Zhou, “Surveying the development of biometric user authentication on mobile phones,” IEEE Communications Surveys and Tutorials, vol. 17, no. 3, pp. 1268–1293, 2015. https://doi.org/10.1109/COMST.2014.238691510.1109/COMST.2014.2386915
- [23] S. Pal, U. Pal, and M. Blumenstein, “Signature-based biometric authentication,” in Computational Intelligence in Digital Forensics: Forensic Investigation and Applications. Studies in Computational Intelligence, A. Muda, Y. H. Choo, A. Abraham, N. S. Srihari, Eds., vol 555. Springer, Cham, pp. 285–314, 2014. https://doi.org/10.1007/978-3-319-05885-6_1310.1007/978-3-319-05885-6_13
- [24] D. Impedovo, G. Pirlo, L. Sarcinella, E. Stasolla, and C. A. Trull, “Analysis of stability in static signatures using Cosine similarity,” in International Conference on Frontiers in Handwriting Recognition, Bari, Italy, Sep. 2012, p. 231–235. https://doi.org/10.1109/ICFHR.2012.18010.1109/ICFHR.2012.180
- [25] R. Plamondon and M. A. Djioua, “Multi-level representation paradigm for handwriting stroke generation,” Human Movement Science, vol. 25, no. 4–5, p. 586–607, 2006. https://doi.org/10.1016/j.humov.2006.07.00410.1016/j.humov.2006.07.004
- [26] N. K. Hosseini and M. J. Nordin, “Human gait recognition: A silhouette based approach,” Journal of Automation and Control Engineering, vol. 1, no. 2, p. 103–105, 2013. https://doi.org/10.12720/joace.1.2.103-10510.12720/joace.1.2.103-105
- [27] A. Veeraraghavan, A.K.R. Chowdhury, and R. Chellappa, “Role of shape and kinematics in human movement analysis,” in IEEE 2004 Computer Society Conference on Computer Vision and Pattern Recognition, Washington, USA, June-July 2004, pp. I–I. https://doi.org/10.1109/CVPR.2004.131510410.1109/CVPR.2004.1315104
- [28] D. Cunado, M. S. Nixon, and J. N. Carter, “Automatic extraction and description of human gait models for recognition purposes”, Computer Vision and Image Understanding, vol. 90, no. 1, pp. 1–41, 2003. https://doi.org/10.1016/S1077-3142(03)00008-010.1016/S1077-3142(03)00008-0
- [29] J. P. Singh, S. Jain, S. Arora, and U. P. Singh, “A survey of behavioural biometric gait recognition: Current success and future perspectives,” Archives of Computational Methods in Engineering, vol. 28, pp. 107–148, Nov. 2021. https://doi.org/10.1007/s11831-019-09375-310.1007/s11831-019-09375-3
- [30] C. Yam, M. S. Nixon, and J. N. Carter, “Automated person recognition by walking and running via model-based approaches,” Pattern Recognition, vol. 37, no. 5, pp. 1057–1072, 2004. https://doi.org/10.1016/j.patcog.2003.09.01210.1016/j.patcog.2003.09.012
- [31] J. Y., Kang, R. Kim, H. Kim, Y. Kang, S. Hahn, Z. Fu, M. I. Khalid, E. Schenck, and T. Thesen, “Automated tracking and quantification of autistic behavioural symptoms using Microsoft Kinect,” Studies in Health Technology and Informatics, vol. 220, pp. 167–170, Jan. 2016.
- [32] E. Gianaria and M. Grangetto, “Robust gait identification using Kinect dynamic skeleton data”, Multimedia Tools and Application, vol. 78, pp. 13925–13948, 2019. https://doi.org/10.1007/s11042-018-6865-910.1007/s11042-018-6865-9
- [33] M. W. Rahman and M. L. Gavrilova, “Kinect gait skeletal joint feature-based person identification,” in IEEE 2017 16th International Conference on Cognitive Informatics and Cognitive Computing, Oxford, UK, July 2017, pp. 423–430. https://doi.org/10.1109/ICCI-CC.2017.810978310.1109/ICCI-CC.2017.8109783
- [34] W. R. Hamilton, “II. On quaternions, or on a new system of imaginaries in algebra,” The London, Edinburgh, and Dublin Philosophical Magazine and Journal of Science, vol. 25, no. 163, pp. 10–13, 1844. https://doi.org/10.1080/1478644440864492310.1080/14786444408644923
- [35] W. R. Hamilton, “XXXIX. On quaternions, or on a new system of imaginaries in algebra,” The London, Edinburgh, and Dublin Philosophical Magazine and Journal of Science, vol. 25, no. 166, pp. 241–246, 1844. https://doi.org/10.1080/1478644440864498410.1080/14786444408644984
- [36] Y. Wang, J. Sun, J. Li, and D. Zhao, “Gait recognition based on 3D skeleton joints captured by Kinect,” in IEEE 2016 International Conference on Image Processing, Phoenix, USA, Sep. 2016, pp. 3151–3155. https://doi.org/10.1109/ICIP.2016.753294010.1109/ICIP.2016.7532940
- [37] S. Jiang, Y. Wang, Y. Zhang, and J. Sun, “Real time gait recognition system based on Kinect skeleton feature,” in Asian Conference on Computer Vision, Singapore, Nov. 2014, pp. 1–11. https://doi.org/10.1007/978-3-319-16628-5_410.1007/978-3-319-16628-5_4
- [38] S. Choi, J. Kim, W. Kim, and C. Kim, “Skeleton-based gait recognition via robust frame-level matching,” IEEE Transactions on Information Forensics and Security, vol. 14, no. 10, pp. 2577–2592, 2019. https://doi.org/10.1109/TIFS.2019.290182310.1109/TIFS.2019.2901823