[
[1] A. K. Jain, A. Ross, and S. Prabhakar, “An introduction to biometric recognition,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 14, no. 1, p. 4–20, Jan. 2004. https://doi.org/10.1109/TCSVT.2003.81834910.1109/TCSVT.2003.818349
]Search in Google Scholar
[
[2] A. Drosou, D. Loannidis, D. Tzovaras, K. Moustakas, and M. Petrou, “Activity related authentication using prehension biometrics,” Pattern Recognition, vol. 48, no. 5, p. 1743–1759, May 2015. https://doi.org/10.1016/j.patcog.2014.12.00810.1016/j.patcog.2014.12.008
]Search in Google Scholar
[
[3] B. Miller, “Vital signs of identity [biometrics],” IEEE Spectrum, vol. 31, no. 2, p. 22–30, 1994. https://doi.org/10.1109/6.25948410.1109/6.259484
]Search in Google Scholar
[
[4] K. A. Reynolds, P. M. Watt, S. A. Boone, and C. P. Gerba, “Occurrence of bacteria and biochemical markers on public surfaces,” International Journal of Environmental Health Research, vol. 15, no. 3, p. 225–234, 2005. https://doi.org/10.1080/0960312050011529810.1080/0960312050011529816134485
]Search in Google Scholar
[
[5] R. Sahak, N. Tahir, A. I. M. Yassin, F. H. Kamaruzaman, and A. A. Misreb, “Human gait recognition using skeleton joint coordinates with orthogonal least square and locally linear embedded techniques,” International Journal of Simulation: Systems, Science and Technology, vol. 19, no. 5, p. 25.1–25.9, 2019. https://doi.org/10.5013/IJSSST.a.19.05.2510.5013/IJSSST.a.19.05.25
]Search in Google Scholar
[
[6] P. C. Cattin, “Biometric Authentication System Using Human Gait”, Doctoral Thesis, ETH Zurich, Zurich, Switzerland, 2002.
]Search in Google Scholar
[
[7] A. Kale, A. Sundaresan, A. N. Rajagopalan, N. P. Cuntoor, A. K. R. Roy-Chowdhury, V. Kruger, and R. Chellappa “Identification of humans using gait”, IEEE Transaction on Image Processing, vol. 13, no. 9, p. 1163–1173, Aug. 2004. https://doi.org/10.1109/TIP.2004.83286510.1109/TIP.2004.832865
]Search in Google Scholar
[
[8] N. Sadeghzadehyazdi, T. Batabyal, N. K. Dhar, B. O. Farmiloni, K. M. Iftekharuddin, and S. T. Acton, “GlidarCo: gait recognition by 3D skeleton estimation and biometric feature correction of flash lidar data”, arXiv preprint arXiv:1905.07058, 2019.
]Search in Google Scholar
[
[9] H. Fujiyoshi, and A. J. Lipton, “Real-time human motion analysis by image skeletonization,” in IEEE Workshop on Applications of Computer Vision, Princeton, NU, USA, Oct. 1998, pp. 15–21. https://doi.org/10.1109/ACV.1998.73285210.1109/ACV.1998.732852
]Search in Google Scholar
[
[10] H. Sarbolandi, D. Lefloch, and A. Kolb, “Kinect range sensing: Structured-light versus Time-of-Flight Kinect,” Computer Vision and Image Understanding, vol. 139, pp. 1–20, Oct. 2015. https://doi.org/10.1016/j.cviu.2015.05.00610.1016/j.cviu.2015.05.006
]Search in Google Scholar
[
[11] A. Bobick and A. Y. Johnson, “Gait recognition using static activity-specific parameters,” in IEEE 2001 Computer Society Conference on Computer Vision and Pattern Recognition, Kauai, USA, Dec. 2001. https://doi.org/10.1109/CVPR.2001.99050610.1109/CVPR.2001.990506
]Search in Google Scholar
[
[12] J. P. Singh and S. Jain, “Person identification based on gait using dynamic body parameters,” in Trendz in Information Sciences & Computing, Chennai, India, Dec. 2010, pp. 248–252. https://doi.org/10.1109/TISC.2010.571464910.1109/TISC.2010.5714649
]Search in Google Scholar
[
[13] N. Jianwattanapaisarn, N. Khamsemanan, and C. Nattee, “Gait recognition from freestyle walks using relative coordinates and random subsequence-based Sum-Rule classification,” in Joint 8th International Conference on Soft Computing and Intelligent Systems (SCIS) and 17th International Symposium on Advanced Intelligent Systems (ISIS), Sapporo, Japan, Aug. 2016, pp. 5–9. https://doi.org/10.1109/SCIS-ISIS.2016.001610.1109/SCIS-ISIS.2016.0016
]Search in Google Scholar
[
[14] Y. Wang, S. Rane, S. C. Draper, and P. Ishwar “A theoretical analysis of authentication, privacy and reusability across secure biometric systems,” IEEE Transactions on Information Forensics and Security, vol. 7, no. 6, pp. 1825–1840, Dec. 2012. https://doi.org/10.1109/TIFS.2012.221021510.1109/TIFS.2012.2210215
]Search in Google Scholar
[
[15] A. El-Sallam, F. Sohe, and M. Bennamoun, “Robust pose invariant shape-based hand recognition,” in IEEE 2011 6th Conference on Industrial Electronics and Applications, Beijing, China, June 2011, pp. 1–10. https://doi.org/10.1109/ICIEA.2011.597559510.1109/ICIEA.2011.5975595
]Search in Google Scholar
[
[16] K. Simoens, P. Tuyls, and B. Preneel, “Privacy weaknesses in biometric sketches,” in IEEE 2009 30th Symposium on Security and Privacy, Oakland, USA, May 2009, pp. 188–203, doi: 10.1109/SP.2009.24.10.1109/SP.2009.24
]Search in Google Scholar
[
[17] A. Eng and L. A. Wahsheh, “Look into my eyes: A survey of biometric security,” in 10th International Conference on Information Technology: New Generations, Las Vegas, USA, Apr. 2013, pp. 422–427. https://doi.org/10.1109/ITNG.2013.6510.1109/ITNG.2013.65
]Search in Google Scholar
[
[18] J. Lu, X. Yua, and T. Yahagi, “A method of face recognition based on fuzzy c-Means clustering and associated Sub-NNs,” IEEE Transactions on Neural Networks, vol. 18, no. 1, p. 150–160, Jan. 2007. https://doi.org/10.1109/TNN.2006.88467810.1109/TNN.2006.88467817278469
]Search in Google Scholar
[
[19] D. Souza, A. Burlamaqui, and G. Souza Filho, “Improving biometrics authentication with a multi-factor approach based on optical interference and chaotic maps,” Multimedia Tools Applications, vol. 77, p. 2013–2032, 2018. https://doi.org/10.1007/s11042-017-4374-x10.1007/s11042-017-4374-x
]Search in Google Scholar
[
[20] K. Dharavath, F. A. Talukdar, and R. H. Laskar, “Study on biometric authentication systems, challenges and future trends: A review,” in IEEE 2013 International Conference on Computational Intelligence and Computing Research, Enathi, India, Dec. 2013, pp. 1–7. https://doi.org/10.1109/ICCIC.2013.672427810.1109/ICCIC.2013.6724278
]Search in Google Scholar
[
[21] A. N. Kataria, D. M. Adhyaru, A. K. Sharma, and T. H. Zaveri, “A survey of automated biometric authentication techniques,” in IEEE 2013 Nirma University International Conference on Engineering, Ahmedabad, India, Nov. 2013, pp. 1–6. https://doi.org/10.1109/NUiCONE.2013.678019010.1109/NUiCONE.2013.6780190
]Search in Google Scholar
[
[22] W. Meng, D. S. Wong, S. Furnell, and J. Zhou, “Surveying the development of biometric user authentication on mobile phones,” IEEE Communications Surveys and Tutorials, vol. 17, no. 3, pp. 1268–1293, 2015. https://doi.org/10.1109/COMST.2014.238691510.1109/COMST.2014.2386915
]Search in Google Scholar
[
[23] S. Pal, U. Pal, and M. Blumenstein, “Signature-based biometric authentication,” in Computational Intelligence in Digital Forensics: Forensic Investigation and Applications. Studies in Computational Intelligence, A. Muda, Y. H. Choo, A. Abraham, N. S. Srihari, Eds., vol 555. Springer, Cham, pp. 285–314, 2014. https://doi.org/10.1007/978-3-319-05885-6_1310.1007/978-3-319-05885-6_13
]Search in Google Scholar
[
[24] D. Impedovo, G. Pirlo, L. Sarcinella, E. Stasolla, and C. A. Trull, “Analysis of stability in static signatures using Cosine similarity,” in International Conference on Frontiers in Handwriting Recognition, Bari, Italy, Sep. 2012, p. 231–235. https://doi.org/10.1109/ICFHR.2012.18010.1109/ICFHR.2012.180
]Search in Google Scholar
[
[25] R. Plamondon and M. A. Djioua, “Multi-level representation paradigm for handwriting stroke generation,” Human Movement Science, vol. 25, no. 4–5, p. 586–607, 2006. https://doi.org/10.1016/j.humov.2006.07.00410.1016/j.humov.2006.07.004
]Search in Google Scholar
[
[26] N. K. Hosseini and M. J. Nordin, “Human gait recognition: A silhouette based approach,” Journal of Automation and Control Engineering, vol. 1, no. 2, p. 103–105, 2013. https://doi.org/10.12720/joace.1.2.103-10510.12720/joace.1.2.103-105
]Search in Google Scholar
[
[27] A. Veeraraghavan, A.K.R. Chowdhury, and R. Chellappa, “Role of shape and kinematics in human movement analysis,” in IEEE 2004 Computer Society Conference on Computer Vision and Pattern Recognition, Washington, USA, June-July 2004, pp. I–I. https://doi.org/10.1109/CVPR.2004.131510410.1109/CVPR.2004.1315104
]Search in Google Scholar
[
[28] D. Cunado, M. S. Nixon, and J. N. Carter, “Automatic extraction and description of human gait models for recognition purposes”, Computer Vision and Image Understanding, vol. 90, no. 1, pp. 1–41, 2003. https://doi.org/10.1016/S1077-3142(03)00008-010.1016/S1077-3142(03)00008-0
]Search in Google Scholar
[
[29] J. P. Singh, S. Jain, S. Arora, and U. P. Singh, “A survey of behavioural biometric gait recognition: Current success and future perspectives,” Archives of Computational Methods in Engineering, vol. 28, pp. 107–148, Nov. 2021. https://doi.org/10.1007/s11831-019-09375-310.1007/s11831-019-09375-3
]Search in Google Scholar
[
[30] C. Yam, M. S. Nixon, and J. N. Carter, “Automated person recognition by walking and running via model-based approaches,” Pattern Recognition, vol. 37, no. 5, pp. 1057–1072, 2004. https://doi.org/10.1016/j.patcog.2003.09.01210.1016/j.patcog.2003.09.012
]Search in Google Scholar
[
[31] J. Y., Kang, R. Kim, H. Kim, Y. Kang, S. Hahn, Z. Fu, M. I. Khalid, E. Schenck, and T. Thesen, “Automated tracking and quantification of autistic behavioural symptoms using Microsoft Kinect,” Studies in Health Technology and Informatics, vol. 220, pp. 167–170, Jan. 2016.
]Search in Google Scholar
[
[32] E. Gianaria and M. Grangetto, “Robust gait identification using Kinect dynamic skeleton data”, Multimedia Tools and Application, vol. 78, pp. 13925–13948, 2019. https://doi.org/10.1007/s11042-018-6865-910.1007/s11042-018-6865-9
]Search in Google Scholar
[
[33] M. W. Rahman and M. L. Gavrilova, “Kinect gait skeletal joint feature-based person identification,” in IEEE 2017 16th International Conference on Cognitive Informatics and Cognitive Computing, Oxford, UK, July 2017, pp. 423–430. https://doi.org/10.1109/ICCI-CC.2017.810978310.1109/ICCI-CC.2017.8109783
]Search in Google Scholar
[
[34] W. R. Hamilton, “II. On quaternions, or on a new system of imaginaries in algebra,” The London, Edinburgh, and Dublin Philosophical Magazine and Journal of Science, vol. 25, no. 163, pp. 10–13, 1844. https://doi.org/10.1080/1478644440864492310.1080/14786444408644923
]Search in Google Scholar
[
[35] W. R. Hamilton, “XXXIX. On quaternions, or on a new system of imaginaries in algebra,” The London, Edinburgh, and Dublin Philosophical Magazine and Journal of Science, vol. 25, no. 166, pp. 241–246, 1844. https://doi.org/10.1080/1478644440864498410.1080/14786444408644984
]Search in Google Scholar
[
[36] Y. Wang, J. Sun, J. Li, and D. Zhao, “Gait recognition based on 3D skeleton joints captured by Kinect,” in IEEE 2016 International Conference on Image Processing, Phoenix, USA, Sep. 2016, pp. 3151–3155. https://doi.org/10.1109/ICIP.2016.753294010.1109/ICIP.2016.7532940
]Search in Google Scholar
[
[37] S. Jiang, Y. Wang, Y. Zhang, and J. Sun, “Real time gait recognition system based on Kinect skeleton feature,” in Asian Conference on Computer Vision, Singapore, Nov. 2014, pp. 1–11. https://doi.org/10.1007/978-3-319-16628-5_410.1007/978-3-319-16628-5_4
]Search in Google Scholar
[
[38] S. Choi, J. Kim, W. Kim, and C. Kim, “Skeleton-based gait recognition via robust frame-level matching,” IEEE Transactions on Information Forensics and Security, vol. 14, no. 10, pp. 2577–2592, 2019. https://doi.org/10.1109/TIFS.2019.290182310.1109/TIFS.2019.2901823
]Search in Google Scholar