Signal Processing - July 2016 - 61

[30] N. Kumar, A. Berg, P. Belhumeur, and S. Nayar, "Describable visual attributes
for face verification and image search," IEEE Trans. Pattern Anal. and Mach. Intell.,
vol. 33, no. 10, pp. 1962-1977, 2011.
[31] P. Samangouei, V. M. Patel, and R. Chellappa, "Attribute-based continuous user
authentication on mobile devices," in Proc. IEEE Int. Conf. Biometrics: Theory,
Applicat. and Syst., 2015, pp. 1-8.
[32] J. Mantyjarvi, M. Lindholm, E. Vildjiounaite, S. M. Makela, and H. Ailisto,
"Identifying users of portable devices from gait pattern with accelerometers," in
Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Processing, March 2005, vol. 2,
pp. ii/973-ii/976.
[33] M. Derawi, C. Nickel, P. Bours, and C. Busch, "Unobtrusive user-authentication
on mobile phones using biometric gait recognition," in Proc. Int. Conf. Intelligent
Inform. Hiding and Multimedia Signal Processing, Oct. 2010, pp. 306-311.
[34] F. Juefei-Xu, C. Bhagavatula, A. Jaech, U. Prasad, and M. Savvides, "Gait-ID on
the move: Pace independent human identification using cell phone accelerometer
dynamics," in Proc. IEEE Int. Conf. Biometrics: Theory, Applicat. and Syst., Sept. 2012,
pp. 8-15.
[35] C. Nickel, C. Busch, S. Rangarajan, and M. Mobius, "Using Hidden Markov
Models for accelerometer-based biometric gait recognition," in Proc. IEEE Int. Colloq. Signal Processing and Its Applicat., March 2011, pp. 58-63.
[36] H. M. Thang, V. Q. Viet, N. D. Thuc, and D. Choi, "Gait identification using
accelerometer on mobile phone," in Proc. Int. Conf. Control, Automation and
Inform. Sci., Nov. 2012, pp. 344-348.

analysis," in Proc. 4th Int. Conf. Advances in Comput.-Human Interactions, 2011,
pp. 188-191.
[55] R. Woo, A. Park, and T. Hazen, "The MIT mobile device speaker verification
corpus: Data collection and preliminary experiments," in Proc. Odyssey, The Speaker
and Language Recognition Workshop, 2006, pp. 1-6.
[56] H. Saevanee, N. L. Clarke, and S. M. Furnell, "SMS linguistic profiling authentication on mobile devices," in Proc. 5th Int. Conf. Network and Syst. Security, 2011,
pp. 224-229.
[57] A. Primo, V. Phoha, R. Kumar, and A. Serwadda, "Context-aware active authentication using smartphone accelerometer measurements," in Proc. IEEE Conf. Comput. Vision and Pattern Recognition Workshops, June 2014, pp. 98-105.
[58] E. Hayashi, S. Das, S. Amini, J. Hong, and I. Oakley, "CASA: Context-aware
scalable authentication," in Proc. 9th Symp. Usable Privacy and Security, 2013, pp.
3:1-3:10.
[59] T. Feng, J. Yang, Z. Yan, E. M. Tapia, and W. Shi, "Tips: Context-aware implicit
user identification using touch screen in uncontrolled environments," in Proc. Workshop on Mobile Comput. Syst. and Applicat., 2014, pp. 9:1-9:6.
[60] A. Ross and A. K. Jain, "Multimodal biometrics: An overview," in Proc. Euro.
Signal Processing Conf., 2004, pp. 1221-1224.
[61] H. Zhang, V. M. Patel, and R. Chellappa, "Robust multimodal recognition via
multitask multivariate low-rank representations," in Proc. IEEE Int. Conf. Automatic
Face and Gesture Recognition, May 2015, vol. 1, pp. 1-8.

[37] M. Muaaz and R. Mayrhofer, "An analysis of different approaches to gait recognition using cell phone based accelerometers," in Proc. Int. Conf. Advances in
Mobile Computing and Multimedia, 2013, pp. 293:293-293:300.

[62] L. Fridman, S. Weber, R. Greenstadt, and M. Kam, "Active authentication on
mobile devices via stylometry, GPS location, web browsing behavior, and application usage patterns," IEEE Syst. J., 2015.

[38] Y. Zhong, Y. Deng, and G. Meltzner, "Pace independent mobile gait biometrics," in Proc. IEEE Int. Conf. Biometrics Theory, Applicat. and Syst., Sept. 2015,
pp. 1-8.

[63] W. Shi, J. Yang, Y. Jiang, F. Yang, and Y. Xiong, "Senguard: Passive user identification on smartphones using multiple sensors," in Proc. IEEE Int. Conf. Wireless
and Mobile Comput., Networking and Commun., 2011, pp. 141-148.

[39] Y. Zhong and Y. Deng, "Sensor orientation invariant mobile gait biometrics," in
Proc. IEEE Int. Joint Conf. Biometrics, Sept. 2014, pp. 1-8.

[64] H. Lu, J. Yang, Z. Liu, N. D. Lane, T. Choudhury, and A. T. Campbell, "The jigsaw continuous sensing engine for mobile phone applications," in Proc. 8th ACM
Conf. Embedded Networked Sensor Syst., 2010, pp. 71-84.

[40] P. Gosset, "Aspect: Fraud detection concepts: Final report," Tech. Rep. AC095/
VOD/W22/DS/P/18/1, Jan. 1998.
[41] Y. Moreau, H. Verrelst, and J. Vandewalle, "Detection of mobile phone fraud
using supervised neural networks: A first prototype," in Proc. Int. Conf. Artificial
Neural Networks, 1997, pp. 1065-1070.

[65] C. McCool, S. Marcel, A. Hadid, M. Pietikainen, P. Matejka, J. Cernocky, N.
Poh, J. Kittler, A. Larcher, C. Levy, D. Matrouf, J. F. Bonastre, P. Tresadern, and T.
Cootes, "Bi-modal person recognition on a mobile phone: Using mobile phone
data," in Proc. IEEE Int. Conf. Multimedia and Expo Workshops, July 2012,
pp. 635-640.

[42] J. Hall, M. Barbeau, and E. Kranakis, "Anomaly-based intrusion detection
using mobility profiles of public transportation users," in Proc. IEEE Int. Conf.
Wireless and Mobile Computing, Networking and Commun., Aug. 2005, vol. 2,
pp. 17-24.

[66] Z. Sitová, J. Šedeˇnka, Q. Yang, G. Peng, G. Zhou, P. Gasti, and K. S. Balagani,
"HMOG: New behavioral biometric features for continuous authentication of smartphone users," IEEE Trans. Inform. Forensics Security, vol. 11, no. 5, pp. 877-892,
May 2016.

[43] F. Li, N. Clarke, M. Papadaki, and P. Dowland, "Behaviour profiling for transparent authentication for mobile devices," in Proc. Euro. Conf. Inform. Warfare and
Security, 2011, pp. 307-314.

[67] H. Saevanee, N. Clarke, S. Furnell, and V. Biscione, "Text-based active authentication for mobile devices," in ICT Systems Security and Privacy Protection, N.
Cuppens-Boulahia, F. Cuppens, S. Jajodia, A. Abou El Kalam, and T. Sans, Eds.
Berlin, Heidelberg: Springer, 2014, pp. 99-112.

[44] F. Li, N. Clarke, M. Papadaki, and P. Dowland, "Active authentication for
mobile devices utilising behaviour profiling," Int. J. Inform. Security, vol. 13, no. 3,
pp. 229-244, June 2014.
[45] D. Bassu, M. Cochinwala, and A. Jain, "A new mobile biometric based upon
usage context," in Proc. IEEE Int. Conf. Technol. for Homeland Security, Nov. 2013,
pp. 441-446.
[46] N. Eagle and A. Pentland, "Reality mining: Sensing complex social systems,"
Personal and Ubiquitous Computing, vol. 10, no. 4, pp. 255-268, May 2006.
[47] N. A. Safa, R. Safavi-Naini, and S. F. Shahandashti, "Privacy-Preserving
Implicit Authentication," in ICT Systems Security and Privacy Protection, N. Cuppens-Boulahia, F. Cuppens, S. Jajodia, A. Abou El Kalam, and T. Sans, Eds. Berlin,
Heidelberg: Springer Berlin Heidelberg, 2014, pp. 471-484.
[48] H. G. Kayacik, M. Just, L. Baillie, D. Aspinall, and N. Micallef, "Data driven
authentication: On the effectiveness of user behaviour modelling with mobile device
sensors," CoRR, 2014 vol. abs/1410.7743.
[49] T. Neal, D. Woodard, and A. Striegel, "Mobile device application, Bluetooth,
and Wi-Fi usage data as behavioral biometric traits," in Proc. IEEE Int. Conf. Biometrics Theory, Applicat. and Syst., Sept. 2015, pp. 1-6.
[50] T. Y. Chang, C. J. Tsai, and J. H. Lin, "A graphical-based password keystroke
dynamic authentication system for touch screen handheld mobile devices," J. Syst.
and Software, vol. 85, no. 5, pp. 1157-1165, 2012.
[51] N. Clarke and S. Furnell, "Advanced user authentication for mobile devices,"
Computers and Security, vol. 26, no. 2, pp. 109-119, 2007.
[52] N. L. Clarke and S. M. Furnell, "Authenticating mobile phone users using keystroke analysis," Int. J. Inform. Security, vol. 6, no. 1, pp. 1-14, Dec. 2006.
[53] H. Gascon, S. Uellenbeck, C. Wolf, and K. Rieck, "Continuous authentication
on mobile devices by analysis of typing motion behavior," presented at Proc. GI
Conf. Sicherheit (Sicherheit, Schutz und Verlsslichkeit), 2014.

[68] N. Clarke, S. Karatzouni, and S. Furnell, "Flexible and Transparent User
Authentication for Mobile Devices," in Emerging Challenges for Security, Privacy
and Trust, D. Gritzalis and J. Lopez, Eds. Berlin, Heidelberg: Springer, 2009,
pp. 1-12.
[69] H. Crawford and K. Renaud, "Understanding user perceptions of transparent authentication on a mobile device," J. Trust Manage., vol. 1, no. 7, pp. 1-28
2014.
[70] C. Braz and J.-M. Robert, "Security and usability: The case of the user authentication methods," in Proc. 18th Conf. L'Interaction Homme-Machine, 2006, pp. 199-
203.
[71] V. M. Patel, R. Gopalan, R. Li, and R. Chellappa, "Visual domain adaptation: A
survey of recent advances," IEEE Signal Processing Mag., vol. 32, no. 3, pp. 53-69,
May 2015.
[72] H. Zhang, V. M. Patel, S. Shekhar, and R. Chellappa, "Domain adaptive sparse
representation-based classification," in Proc. IEEE Int. Conf. Automatic Face and
Gesture Recognition, vol. 1, May 2015, pp. 1-8.
[73] J. Sedenka, S. Govindarajan, P. Gasti, and K. Balagani, "Secure outsourced biometric authentication with performance evaluation on smartphones," IEEE Trans.
Inform. Forensics and Security, vol. 10, no. 2, pp. 384-396, Feb. 2015.
[74] D. F. Smith, A. Wiliem, and B. C. Lovell, "Binary watermarks: A practical
method to address face recognition replay attacks on consumer mobile devices," in
Proc. IEEE Int. Conf. Identity, Security and Behavior Anal., Mar. 2015, pp. 1-6.
[75] D. F. Smith, A. Wiliem, and B. C. Lovell, "Face recognition on consumer devices: Reflections on replay attacks," IEEE Trans. Inform. Forensics and Security,
vol. 10, no. 4, pp. 736-745, Apr. 2015.
[76] V. M. Patel, N. K. Ratha, and R. Chellappa, "Cancelable biometrics: A review,"
IEEE Signal Processing Mag., vol. 32, no. 5, pp. 54-65, Sept. 2015.

[54] H. Ketabdar, M. Roshandel, and D. Skripko, "Towards implicit enhancement of
security and user authentication in mobile devices based on movement and audio

IEEE Signal Processing Magazine

SP

|

July 2016

|

61



Table of Contents for the Digital Edition of Signal Processing - July 2016

Signal Processing - July 2016 - Cover1
Signal Processing - July 2016 - Cover2
Signal Processing - July 2016 - 1
Signal Processing - July 2016 - 2
Signal Processing - July 2016 - 3
Signal Processing - July 2016 - 4
Signal Processing - July 2016 - 5
Signal Processing - July 2016 - 6
Signal Processing - July 2016 - 7
Signal Processing - July 2016 - 8
Signal Processing - July 2016 - 9
Signal Processing - July 2016 - 10
Signal Processing - July 2016 - 11
Signal Processing - July 2016 - 12
Signal Processing - July 2016 - 13
Signal Processing - July 2016 - 14
Signal Processing - July 2016 - 15
Signal Processing - July 2016 - 16
Signal Processing - July 2016 - 17
Signal Processing - July 2016 - 18
Signal Processing - July 2016 - 19
Signal Processing - July 2016 - 20
Signal Processing - July 2016 - 21
Signal Processing - July 2016 - 22
Signal Processing - July 2016 - 23
Signal Processing - July 2016 - 24
Signal Processing - July 2016 - 25
Signal Processing - July 2016 - 26
Signal Processing - July 2016 - 27
Signal Processing - July 2016 - 28
Signal Processing - July 2016 - 29
Signal Processing - July 2016 - 30
Signal Processing - July 2016 - 31
Signal Processing - July 2016 - 32
Signal Processing - July 2016 - 33
Signal Processing - July 2016 - 34
Signal Processing - July 2016 - 35
Signal Processing - July 2016 - 36
Signal Processing - July 2016 - 37
Signal Processing - July 2016 - 38
Signal Processing - July 2016 - 39
Signal Processing - July 2016 - 40
Signal Processing - July 2016 - 41
Signal Processing - July 2016 - 42
Signal Processing - July 2016 - 43
Signal Processing - July 2016 - 44
Signal Processing - July 2016 - 45
Signal Processing - July 2016 - 46
Signal Processing - July 2016 - 47
Signal Processing - July 2016 - 48
Signal Processing - July 2016 - 49
Signal Processing - July 2016 - 50
Signal Processing - July 2016 - 51
Signal Processing - July 2016 - 52
Signal Processing - July 2016 - 53
Signal Processing - July 2016 - 54
Signal Processing - July 2016 - 55
Signal Processing - July 2016 - 56
Signal Processing - July 2016 - 57
Signal Processing - July 2016 - 58
Signal Processing - July 2016 - 59
Signal Processing - July 2016 - 60
Signal Processing - July 2016 - 61
Signal Processing - July 2016 - 62
Signal Processing - July 2016 - 63
Signal Processing - July 2016 - 64
Signal Processing - July 2016 - 65
Signal Processing - July 2016 - 66
Signal Processing - July 2016 - 67
Signal Processing - July 2016 - 68
Signal Processing - July 2016 - 69
Signal Processing - July 2016 - 70
Signal Processing - July 2016 - 71
Signal Processing - July 2016 - 72
Signal Processing - July 2016 - 73
Signal Processing - July 2016 - 74
Signal Processing - July 2016 - 75
Signal Processing - July 2016 - 76
Signal Processing - July 2016 - 77
Signal Processing - July 2016 - 78
Signal Processing - July 2016 - 79
Signal Processing - July 2016 - 80
Signal Processing - July 2016 - 81
Signal Processing - July 2016 - 82
Signal Processing - July 2016 - 83
Signal Processing - July 2016 - 84
Signal Processing - July 2016 - 85
Signal Processing - July 2016 - 86
Signal Processing - July 2016 - 87
Signal Processing - July 2016 - 88
Signal Processing - July 2016 - 89
Signal Processing - July 2016 - 90
Signal Processing - July 2016 - 91
Signal Processing - July 2016 - 92
Signal Processing - July 2016 - 93
Signal Processing - July 2016 - 94
Signal Processing - July 2016 - 95
Signal Processing - July 2016 - 96
Signal Processing - July 2016 - 97
Signal Processing - July 2016 - 98
Signal Processing - July 2016 - 99
Signal Processing - July 2016 - 100
Signal Processing - July 2016 - 101
Signal Processing - July 2016 - 102
Signal Processing - July 2016 - 103
Signal Processing - July 2016 - 104
Signal Processing - July 2016 - Cover3
Signal Processing - July 2016 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_201809
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_201807
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_201805
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_201803
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_201801
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_1117
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0917
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0717
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0517
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0317
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0117
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_1116
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0916
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0716
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0516
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0316
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0116
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_1115
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0915
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0715
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0515
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0315
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0115
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_1114
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0914
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0714
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0514
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0314
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0114
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_1113
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0913
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0713
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0513
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0313
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0113
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_1112
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0912
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0712
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0512
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0312
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0112
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_1111
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0911
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0711
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0511
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0311
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0111
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_1110
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0910
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0710
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0510
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0310
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0110
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_1109
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0909
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0709
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0509
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0309
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0109
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_1108
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0908
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0708
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0508
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0308
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0108
https://www.nxtbookmedia.com