Research Article

Experimentation Using Short-Term Spectral Features for Secure Mobile Internet Voting Authentication

Figure 27

Computational components of SHOG [23].