“…Many biometric authentication protocols are computationally intensive and can well-utilize the emerging computational capabilities of low-power mobile devices. A broad range of biomedical data, from physiological signals/images to behavioral traits, has been explored for its biometric authentication and identification potential (Biel, et al, 2001;Chan, et al, 2008;Doi & Yamanaka, 2004;Duc, et al, 1997;Elsherief, et al, 2006;Faundez-Zanuy, 2005;Irvine, et al, 2001;Israel, et al, 2005;Shen, et al, 2002;Sullivan, et al, 2007;Yao & Wan, 2010;G. H. Zhang, et al, 2009).…”