Abstract: As the need for information security protection continues to increase, contactless and continuous user authentication solutions are gaining attentions. However, most of the existing schemes ...