I. Introduction
Person (user) authentication may be necessary in various domains ranging from online services over daily situations (banking, traveling) to forensic investigations. Conventional techniques rely on passwords, presence of a physical object (identity card, passport, bank card, dynamic token generator, etc.) and biometrics such as fingerprints, iris-patterns, electroencephalography (EEG) or electrocardiography (ECG).