I. Introduction
With the increasing reliance on digital systems in our daily lives, authentication methods have become essential for protecting our personal data, controlling access to resources, preventing identity theft, and complying with regulations [1]. It constructs a solid layer that verifies the identity of users and restricts access to specific individuals or groups [2]. Conventionally, authentication methods can be broadly categorized into knowledge-based authentication methods (e.g., passwords and graphical locks) and biometric-based authentication methods (e.g., fingerprints and facial recognition) [3]. However, such methods exhibit certain shortcomings. For example, passwords might be captured during the user's input through a recording attack, and shoulder-surfing attack [4]. Similarly, biometric data could be imitated through video recording [5]. On the other hand, the growing prevalence of smart wearable devices offers alternative approaches to user authentication like smartwatch [6] and virtual reality device [7]. Nevertheless, it requires extra effort from users to perform large-scale gestures [8] and is still susceptible to recording attacks [9].