Fig. 7From: Detecting data manipulation attacks on physiological sensor measurements in wearable medical systemsAn example of an image I obtained from a portrait GBack to article page