Ayeswarya, S.; Singh, John - In: Cryptography, Biometrics, and Anonymity in …, (pp. 395-408). 2025
In an era where security and user authentication are paramount, continuous authentication methods have gained significant attention. This chapter aims to provide a comprehensive comparison of various biometric methods used for continuous user authentication. Biometric authentication techniques...