skip to main content
research-article

Revisiting the Security of Biometric Authentication Systems Against Statistical Attacks

Published:12 April 2023Publication History
Skip Abstract Section

Abstract

The uniqueness of behavioral biometrics (e.g., voice or keystroke patterns) has been challenged by recent works. Statistical attacks have been proposed that infer general population statistics and target behavioral biometrics against a particular victim. We show that despite their success, these approaches require several attempts for successful attacks against different biometrics due to the different nature of overlap in users’ behavior for these biometrics. Furthermore, no mechanism has been proposed to date that detects statistical attacks. In this work, we propose a new hypervolumes-based statistical attack and show that unlike existing methods, it (1) is successful against a variety of biometrics, (2) is successful against more users, and (3) requires fewest attempts for successful attacks. More specifically, across five diverse biometrics, for the first attempt, on average our attack is 18 percentage points more successful than the second best (37% vs. 19%). Similarly, for the fifth attack attempt, on average our attack is 18 percentage points more successful than the second best (67% vs. 49%). We propose and evaluate a mechanism that can detect the more devastating statistical attacks. False rejects in biometric systems are common, and by distinguishing statistical attacks from false rejects, our defense improves usability and security. The evaluation of the proposed detection mechanism shows its ability to detect on average 94% of the tested statistical attacks with an average probability of 3% to detect false rejects as a statistical attack. Given the serious threat posed by statistical attacks to biometrics that are used today (e.g., voice), our work highlights the need for defending against these attacks.

REFERENCES

  1. Abadi Martín, Barham Paul, Chen Jianmin, Chen Zhifeng, Davis Andy, Dean Jeffrey, Devin Matthieu, et al. 2016. TensorFlow: A system for large-scale machine learning. In Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI’16). 265283.Google ScholarGoogle Scholar
  2. Acar Abbas, Aksu Hidayet, Uluagac A. Selcuk, and Akkaya Kemal. 2020. A usable and robust continuous authentication framework using wearables. IEEE Transactions on Mobile Computing 20, 6 (2020), 21402153.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Ahmed Ahmed Awad E. and Traore Issa. 2007. A new biometric technology based on mouse dynamics. IEEE Transactions on Dependable and Secure Computing 4, 3 (2007), 165179.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Ballard Lucas, Monrose Fabian, and Lopresti Daniel P.. 2006. Biometric authentication revisited: Understanding the impact of wolves in sheep’s clothing. In Proceedings of the USENIX Security Symposium.Google ScholarGoogle Scholar
  5. BehavioSec. 2021. Continuous Authentication Solutions. Retrieved September 1, 2021 from https://www.behaviosec.com/.Google ScholarGoogle Scholar
  6. Bergadano Francesco, Gunetti Daniele, and Picardi Claudia. 2002. User authentication through keystroke dynamics. ACM Transactions on Information and System Security 5, 4 (2002), 367397.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Blonder Benjamin. 2018. Hypervolume concepts in niche-and trait-based ecology. Ecography 41, 9 (2018), 14411455.Google ScholarGoogle ScholarCross RefCross Ref
  8. Blonder Benjamin and Harris David J.. 2019. Hypervolume: High Dimensional Geometry and Set Operations Using Kernel Density Estimation, Support Vector Machines, and Convex Hulls (Version 2.0.12). Retrieved November 25, 2022 from https://CRAN.R-project.org/package=hypervolume.Google ScholarGoogle Scholar
  9. Blonder Benjamin, Morrow Cecina Babich, Maitner Brian, Harris David J., Lamanna Christine, Violle Cyrille, Enquist Brian J., and Kerkhoff Andrew J.. 2018. New approaches for delineating n-dimensional hypervolumes. Methods in Ecology and Evolution 9, 2 (2018), 305319.Google ScholarGoogle ScholarCross RefCross Ref
  10. Boulgouris Nikolaos V., Hatzinakos Dimitrios, and Plataniotis Konstantinos N.. 2005. Gait recognition: A challenging signal processing technology for biometric identification. IEEE Signal Processing Magazine 22, 6 (2005), 78–90.Google ScholarGoogle ScholarCross RefCross Ref
  11. Brocardo Marcelo Luiz, Traore Issa, and Woungang Isaac. 2014. Toward a framework for continuous authentication using stylometry. In Proceedings of the 2014 IEEE 28th International Conference on Advanced Information Networking and Applications. IEEE, Los Alamitos, CA, 106115.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Buitinck Lars, Louppe Gilles, Blondel Mathieu, Pedregosa Fabian, Mueller Andreas, Grisel Olivier, Niculae Vlad, et al. 2013. API design for machine learning software: Experiences from the scikit-learn project. In Proceedings of the European Conference on Machine Learning andPrinciples and Practices of Knowledge Discovery in Databases.Google ScholarGoogle Scholar
  13. Burt Chris. 2018. Biometrics-Secured Voice Banking with Amazon Alexa Now Available from Two Canadian Credit Unions. Retrieved July 1, 2021 from https://www.biometricupdate.com/201811/biometrics-secured-voice-banking-with-amazon-alexa-now-available-from-two-canadian-credit-unions.Google ScholarGoogle Scholar
  14. Buschek Daniel, Luca Alexander De, and Alt Florian. 2015. Improving accuracy, applicability and usability of keystroke biometrics on mobile touchscreen devices. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. ACM, New York, NY.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Chung Joon Son, Nagrani Arsha, and Zisserman Andrew. 2018. VoxCeleb2: Deep speaker recognition. In Proceedings of the Conference of the International Speech Communication Association (INTERSPEECH’18).Google ScholarGoogle Scholar
  16. Clarke Nathan L. and Furnell S. M.. 2007. Authenticating mobile phone users using keystroke analysis. International Journal of Information Security 6, 1 (2007), 114.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Corder Gregory W. and Foreman Dale I.. 2011. Nonparametric Statistics for Non-Statisticians: A Step-by-Step Approach. Wiley.Google ScholarGoogle Scholar
  18. D’Agostino Ralph. 1971. An omnibus test of normality for moderate and large sample sizes. Biometrika 58, 34 (1971), 1348.Google ScholarGoogle Scholar
  19. D’Agostino Ralph and Pearson Egon S.. 1973. Tests for departure from normality. Empirical results for the distributions of \(b^2\) and \(\sqrt {b}\). Biometrika 60, 3 (1973), 613622.Google ScholarGoogle Scholar
  20. Eberz Simon, Lovisotto Giulio, Patane Andrea, Kwiatkowska Marta, Lenders Vincent, and Martinovic Ivan. 2018. When your fitness tracker betrays you: Quantifying the predictability of biometric features across contexts. In Proceedings of the 2018 IEEE Symposium on Security and Privacy (SP’18). IEEE, Los Alamitos, CA, 889905.Google ScholarGoogle ScholarCross RefCross Ref
  21. Eberz Simon, Rasmussen Kasper B., Lenders Vincent, and Martinovic Ivan. 2017. Evaluating behavioral biometrics for continuous authentication: Challenges and metrics. In Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security. ACM, New York, NY, 386399.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Frank Mario, Biedert Ralf, Ma Eugene, Martinovic Ivan, and Song Dawn. 2013. Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE Transactions on Information Forensics and Security 8, 1 (2013), 136148.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Fridman Lex, Weber Steven, Greenstadt Rachel, and Kam Moshe. 2016. Active authentication on mobile devices via stylometry, application usage, web browsing, and GPS location. IEEE Systems Journal 11, 2 (2016), 513–521.Google ScholarGoogle ScholarCross RefCross Ref
  24. Gafurov Davrondzhon, Snekkenes Einar, and Bours Patrick. 2007. Spoof attacks on gait authentication system. IEEE Transactions on Information Forensics and Security 2, 3 (2007), 491502.Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Gao Yang, Singh Rita, and Raj Bhiksha. 2018. Voice impersonation using generative adversarial networks. In Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP’18). IEEE, Los Alamitos, CA, 25062510.Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Hautamäki Rosa González, Kinnunen Tomi, Hautamäki Ville, and Laukkanen Anne-Maria. 2015. Automatic versus human speaker verification: The case of voice mimicry. Speech Communication 72 (2015), 1331.Google ScholarGoogle ScholarCross RefCross Ref
  27. Herman Edwin, Strang Gilbert, Radulovich William, Rutter Erica A., Smith David, Messer Kirsten R., Mulzet Alfred K., Bila Nicoleta Virginia, et al. 2016. Calculus: Volume 2. XanEdu Publishing.Google ScholarGoogle Scholar
  28. Hutchinson G. Evelyn. 1957. A Treatise on Liminology. Wiley.Google ScholarGoogle Scholar
  29. Jain Anil K., Ross Arun, and Prabhakar Salil. 2004. An introduction to biometric recognition. IEEE Transactions on Circuits and Systems for Video Technology 14, 1 (2004), 4–20.Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Jorgensen Zach and Yu Ting. 2011. On mouse dynamics as a behavioral biometric for authentication. In Proceedings of the 6th ACM Symposium on Information, Computer, and Communications Security. ACM, New York, NY.Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Junker Robert R., Kuppler Jonas, Bathke Arne C., Schreyer Manuela L., and Trutschnig Wolfgang. 2016. Dynamic range boxes—A robust nonparametric approach to quantify size and overlap of n-dimensional hypervolumes. Methods in Ecology and Evolution 7, 12 (2016), 15031513.Google ScholarGoogle ScholarCross RefCross Ref
  32. Khan Hassan, Hengartner Urs, and Vogel Daniel. 2016. Targeted mimicry attacks on touch input based implicit authentication schemes. In Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services. ACM, New York, NY.Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Khan Hassan, Hengartner Urs, and Vogel Daniel. 2018. Augmented reality-based mimicry attacks on behaviour-based smartphone authentication. In Proceedings of the 16th Annual International Conference on Mobile Systems, Applications, and Services. ACM, New York, NY.Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Khan Hassan, Hengartner Urs, and Vogel Daniel. 2020. Mimicry attacks on smartphone keystroke authentication. ACM Transactions on Privacy and Security 23, 1 (2020), 134.Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Killourhy Kevin S. and Maxion Roy A.. 2009. Comparing anomaly-detection algorithms for keystroke dynamics. In Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks. IEEE, Los Alamitos, CA.Google ScholarGoogle ScholarCross RefCross Ref
  36. Klenke Achim. 2007. Probability Theory: A Comprehensive Course. Springer Science & Business Media.Google ScholarGoogle Scholar
  37. Kruskal William H. and Wallis W. Allen. 1952. Use of ranks in one-criterion variance analysis. Journal of the American Statistical Association 47, 260 (1952), 583621.Google ScholarGoogle ScholarCross RefCross Ref
  38. Lee Justin. 2016. NuData More Than Doubles Behavioral Transaction Volume. Retrieved September 1, 2021 from http://www.biometricupdate.com/201605/nudata-security-more-than-doubles-behavioral-transaction-volume.Google ScholarGoogle Scholar
  39. Li Lingjun, Zhao Xinxin, and Xue Guoliang. 2013. Unobservable reauthentication for smart phones. In Proceedings of the 20th Network and Distributed System Security Symposium.Google ScholarGoogle Scholar
  40. Liu Dachuan, Dong Bo, Gao Xing, and Wang Haining. 2015. Exploiting eye tracking for smartphone authentication. In Proceedings of the International Conference on Applied Cryptography and Network Security. 457477.Google ScholarGoogle ScholarCross RefCross Ref
  41. Liu Zongyi and Sarkar Sudeep. 2006. Improved gait recognition by gait dynamics normalization. IEEE Transactions on Pattern Analysis & Machine Intelligence6 (2006), 863876.Google ScholarGoogle Scholar
  42. Lovisotto Giulio, Eberz Simon, and Martinovic Ivan. 2020. Biometric backdoors: A poisoning attack against unsupervised template updating. In Proceedings of the 2020 IEEE European Symposium on Security and Privacy (EuroS&P’20). IEEE, Los Alamitos, CA, 184197.Google ScholarGoogle ScholarCross RefCross Ref
  43. Maeder Anthony, Fookes Clinton, and Sridharan Sridha. 2004. Gaze based user authentication for personal computer applications. In Proceedings of 2004 International Symposium on Intelligent Multimedia, Video, and Speech Processing. IEEE, Los Alamitos, CA, 727730.Google ScholarGoogle ScholarCross RefCross Ref
  44. Markert Philipp, Bailey Daniel V., Golla Maximilian, Dürmuth Markus, and Aviv Adam J.. 2020. This pin can be easily guessed: Analyzing the security of smartphone unlock pins. In Proceedings of the IEEE Symposium on Security and Privacy. IEEE, Los Alamitos, CA.Google ScholarGoogle ScholarCross RefCross Ref
  45. Mayhew Stephen. 2016. Nationwide Mobile Banking App Uses Behavioral Biometrics. Retrieved September 1, 2016 from http://www.biometricupdate.com/201604/nationwide-mobile-banking-app-uses-behavioral-biometrics.Google ScholarGoogle Scholar
  46. Mohamed Manar, Shrestha Babins, and Saxena Nitesh. 2016. SMASheD: Sniffing and manipulating android sensor data for offensive purposes. IEEE Transactions on Information Forensics and Security 12, 4 (2016), 901–913.Google ScholarGoogle ScholarCross RefCross Ref
  47. Monrose Fabian and Rubin Aviel. 1997. Authentication via keystroke dynamics. In Proceedings of the 4th ACM Conference on Computer and Communications Security. 4856.Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. Nagrani Arsha, Chung Joon Son, Xie Weidi, and Zisserman Andrew. 2020. VoxCeleb: Large-scale speaker verification in the wild. Computer Speech & Language 60 (2020), 101027.Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. Nagrani Arsha, Chung Joon Son, and Zisserman Andrew. 2017. VoxCeleb: A large-scale speaker identification dataset. In Proceedings of the Conference of the International Speech Communication Association (INTERSPEECH’17).Google ScholarGoogle ScholarCross RefCross Ref
  50. Negi Parimarjan, Sharma Prafull, Jain Vivek, and Bahmani Bahman. 2018. K-means++ vs. behavioral biometrics: One loop to rule them all. In Proceedings of the 25th Network and Distributed System Security Symposium.Google ScholarGoogle ScholarCross RefCross Ref
  51. Panjwani Saurabh and Prakash Achintya. 2014. Crowdsourcing attacks on biometric systems. In Proceedings of the 10th Symposium on Usable Privacy and Security.Google ScholarGoogle Scholar
  52. Rousseeuw Peter J.. 1987. Silhouettes: A graphical aid to the interpretation and validation of cluster analysis. Journal of Computational and Applied Mathematics 20 (1987), 5365.Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. SDS Samsung. 2021. Nexsign: Behavioral Biometrics for Continuous Frictionless Identity Authentication. Retrieved September 1, 2021 from https://www.samsungsds.com/us/behavioral/biometrics.html.Google ScholarGoogle Scholar
  54. Satopaa Ville, Albrecht Jeannie, Irwin David, and Raghavan Barath. 2011. Finding a “ kneedle” in a haystack: Detecting knee points in system behavior. In Proceedings of the 2011 31st International Conference on Distributed Computing Systems Workshops. IEEE, Los Alamitos, CA, 166171.Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. Schreyer Manuela, Trutschnig Robert R. Junker, Wolfgang, Kuppler Jonas, Bathke Arne, Parkinson Judith H., and Kutil Raoul. 2018. dynRB: Dynamic Range Boxes (Version 0.15). Retrieved November 25, 2022 from https://CRAN.R-project.org/package=dynRB.Google ScholarGoogle Scholar
  56. Serwadda Abdul and Phoha Vir V.. 2013a. Examining a large keystroke biometrics dataset for statistical-attack openings. ACM Transactions on Information and System Security 16, 2 (2013), 8.Google ScholarGoogle ScholarDigital LibraryDigital Library
  57. Serwadda Abdul and Phoha Vir V.. 2013b. When kids’ toys breach mobile phone security. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. ACM, New York, NY.Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. Serwadda Abdul, Phoha Vir V., and Kiremire Ankunda. 2011. Using global knowledge of users’ typing traits to attack keystroke biometrics templates. In Proceedings of the 13th ACM Multimedia Workshop on Multimedia and Security.Google ScholarGoogle ScholarDigital LibraryDigital Library
  59. Serwadda Abdul, Phoha Vir V., Wang Zibo, Kumar Rajesh, and Shukla Diksha. 2016. Toward robotic robbery on the touch screen. ACM Transactions on Information and System Security 18, 4 (2016), 125.Google ScholarGoogle ScholarDigital LibraryDigital Library
  60. Sidney Siegel. 1957. Nonparametric statistics for the behavioral sciences. Journal of Nervous and Mental Disease 125, 3 (1957), 497.Google ScholarGoogle ScholarCross RefCross Ref
  61. Singh Kesar and Xie Minge. 2008. Bootstrap: A statistical method. Unpublished manuscript. Rutgers University.Google ScholarGoogle Scholar
  62. Sitová Zdeňka, Šeděnka Jaroslav, Yang Qing, Peng Ge, Zhou Gang, Gasti Paolo, and Balagani Kiran S.. 2015. HMOG: New behavioral biometric features for continuous authentication of smartphone users. IEEE Transactions on Information Forensics and Security 11, 5 (2015), 877892.Google ScholarGoogle ScholarDigital LibraryDigital Library
  63. Stanciu Valeriu-Daniel, Spolaor Riccardo, Conti Mauro, and Giuffrida Cristiano. 2016. On the effectiveness of sensor-enhanced keystroke dynamics against statistical attacks. In Proceedings of the 6th ACM Conference on Data and Application Security and Privacy. 105112.Google ScholarGoogle ScholarDigital LibraryDigital Library
  64. Stang Øyvind. 2007. Gait Analysis: Is it Easy to Learn to Walk Like Someone Else?Master’s thesis. Gjøvik University College, Norway.Google ScholarGoogle Scholar
  65. Sugrim Shridatt, Liu Can, McLean Meghan, and Lindqvist Janne. 2019. Robust performance metrics for authentication systems. In Proceedings of the Network and Distributed Systems Security Symposium (NDSS’19).Google ScholarGoogle ScholarCross RefCross Ref
  66. Swanson Heidi K., Lysy Martin, Power Michael, Stasko Ashley D., Johnson Jim D., and Reist James D.. 2015. A new probabilistic method for quantifying n-dimensional ecological niches and niche overlap. Ecology 96, 2 (2015), 318–324.Google ScholarGoogle ScholarCross RefCross Ref
  67. Tey Chee Meng, Gupta Payas, and Gao Debin. 2013. I can be you: Questioning the use of keystroke dynamics as biometrics. In Proceedings of the Annual Network and Distributed System Security Symposium.Google ScholarGoogle Scholar
  68. Thang Hoang Minh, Viet Vo Quang, Thuc Nguyen Dinh, and Choi Deokjai. 2012. Gait identification using accelerometer on mobile phone. In Proceedings of the International Conference on Control, Automation, and Information Sciences. IEEE, Los Alamitos, CA.Google ScholarGoogle ScholarCross RefCross Ref
  69. Vaart Aad W. Van der. 2007. Asymptotic Statistics. Vol. 3. Cambridge University Press.Google ScholarGoogle Scholar
  70. Vassilvitskii Sergei and Arthur David. 2006. K-means++: The advantages of careful seeding. In Proceedings of the 18th Annual ACM-SIAM Symposium on Discrete Algorithms. 10271035.Google ScholarGoogle Scholar
  71. Villéger Sébastien, Mason Norman W. H., and Mouillot David. 2008. New multidimensional functional diversity indices for a multifaceted framework in functional ecology. Ecology 89, 8 (2008), 22902301.Google ScholarGoogle ScholarCross RefCross Ref
  72. Weir Matt, Aggarwal Sudhir, Collins Michael, and Stern Henry. 2010. Testing metrics for password creation policies by attacking large sets of revealed passwords. In Proceedings of the 17th ACM Conference on Computer and Communications Security. 162175.Google ScholarGoogle ScholarDigital LibraryDigital Library
  73. Xu Hui, Zhou Yangfan, and Lyu Michael R.. 2014. Towards continuous and passive authentication via touch biometrics: An experimental study on smartphones. In Proceedings of the Symposium on Usable Privacy and Security.Google ScholarGoogle Scholar
  74. Zhao Benjamin Zi Hao, Asghar Hassan Jameel, and Kaafar Mohamed Ali. 2020. On the resilience of biometric authentication systems against random inputs. In Proceedings of the Network and Distributed Systems Security Symposium (NDSS’20).Google ScholarGoogle ScholarCross RefCross Ref
  75. Zheng Nan, Paloski Aaron, and Wang Haining. 2011. An efficient user verification system via mouse movements. In Proceedings of the 18th ACM Conference on Computer and Communications Security.Google ScholarGoogle ScholarDigital LibraryDigital Library
  76. Zhu Tiantian, Fu Lei, Liu Qiang, Lin Zi, Chen Yan, and Chen Tieming. 2020. One cycle attack: Fool sensor-based personal gait authentication with clustering. IEEE Transactions on Information Forensics and Security 16 (2020), 553–568.Google ScholarGoogle Scholar
  77. Zou Qin, Wang Yanling, Wang Qian, Zhao Yi, and Li Qingquan. 2020. Deep learning-based gait recognition using smartphones in the wild. IEEE Transactions on Information Forensics and Security 15 (2020), 31973212.Google ScholarGoogle Scholar

Index Terms

  1. Revisiting the Security of Biometric Authentication Systems Against Statistical Attacks

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM Transactions on Privacy and Security
      ACM Transactions on Privacy and Security  Volume 26, Issue 2
      May 2023
      335 pages
      ISSN:2471-2566
      EISSN:2471-2574
      DOI:10.1145/3572849
      Issue’s Table of Contents

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 12 April 2023
      • Online AM: 19 November 2022
      • Accepted: 31 October 2022
      • Revised: 21 August 2022
      • Received: 10 March 2022
      Published in tops Volume 26, Issue 2

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
    • Article Metrics

      • Downloads (Last 12 months)259
      • Downloads (Last 6 weeks)19

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Full Text

    View this article in Full Text.

    View Full Text

    HTML Format

    View this article in HTML Format .

    View HTML Format
    About Cookies On This Site

    We use cookies to ensure that we give you the best experience on our website.

    Learn more

    Got it!