“…Table 2 provides the overview of authentication process in the surveyed paper and what authenticators are used for identity assurance and authorship assurance. Behaviour analysis [40] Face, Voice Writing/Plagiarism detection [41] Face, Keystroke Face, Keystroke [23] Face Face [42] Keystroke Keystroke [25] Face, Fingerprint, Keystroke [43] Face Eye-Gaze [44] Keystroke OLP [21] Keystroke Keystroke [26] Face, Mouse, Keystroke, Touch, Voice [45] Keystroke Keystroke [16] Face, Keystroke, Voice Behaviour analysis, Computer monitoring VL [46] Face Face tracking…”