Review Article

Demystifying Authentication Concepts in Smartphones: Ways and Types to Secure Access

Figure 4

(a) Fingerprint, (b) face, (c) iris, (d) voice, (e) gait, (f) swipe, and (g) touch.