{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T18:03:42Z","timestamp":1755799422268,"version":"3.44.0"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030000202"},{"type":"electronic","value":"9783030000219"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00021-9_2","type":"book-chapter","created":{"date-parts":[[2018,9,25]],"date-time":"2018-09-25T11:21:11Z","timestamp":1537874471000},"page":"13-25","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Secure Device Pairing via Facial Image Similarity"],"prefix":"10.1007","author":[{"given":"Zhiping","family":"Jiang","sequence":"first","affiliation":[]},{"given":"Rui","family":"Li","sequence":"additional","affiliation":[]},{"given":"Kun","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Shuaiyu","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,26]]},"reference":[{"unstructured":"Cai, L., Zeng, K., Chen, H., Mohapatra, P.: Good neighbor: ad hoc pairing of nearby wireless devices by multiple antennas. In: Network and Distributed System Security Symposium, NDSS 2011, San Diego, California, U.S. (2011)","key":"2_CR1"},{"doi-asserted-by":"crossref","unstructured":"Cristinacce, D., Cootes, T.F.: Feature detection and tracking with constrained local models. In: British Machine Vision Conference 2006, Edinburgh, UK, pp. 929\u2013938 (2006)","key":"2_CR2","DOI":"10.5244\/C.20.95"},{"doi-asserted-by":"crossref","unstructured":"Farb, M., Lin, Y.H., Kim, H.J., Mccune, J., Perrig, A.: Safeslinger: easy-to-use and secure public-key exchange. In: ACM International Conference on Mobile Computing and Networking (ACM MobiCom), pp. 417\u2013428 (2013)","key":"2_CR3","DOI":"10.1145\/2500423.2500428"},{"issue":"1","key":"2_CR4","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1145\/1925861.1925870","volume":"41","author":"D Halperin","year":"2011","unstructured":"Halperin, D., Hu, W., Sheth, A., Wetherall, D.: Tool release: gathering 802.11n traces with channel state information. ACM SIGCOMM Comput. Commun. Rev. 41(1), 53 (2011)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"unstructured":"He, X., Cai, D., Niyogi, P.: Laplacian score for feature selection. In: International Conference on Neural Information Processing Systems, pp. 507\u2013514 (2005)","key":"2_CR5"},{"issue":"12","key":"2_CR6","doi-asserted-by":"publisher","first-page":"1167","DOI":"10.1016\/0031-3203(91)90143-S","volume":"24","author":"AK Jain","year":"1991","unstructured":"Jain, A.K., Farrokhnia, F.: Unsupervised texture segmentation using gabor filters. Pattern Recogn. 24(12), 1167\u20131186 (1991)","journal-title":"Pattern Recogn."},{"doi-asserted-by":"crossref","unstructured":"Kalal, Z., Mikolajczyk, K., Matas, J.: Forward-backward error: automatic detection of tracking failures. In: International Conference on Pattern Recognition, pp. 2756\u20132759 (2010)","key":"2_CR7","DOI":"10.1109\/ICPR.2010.675"},{"issue":"7","key":"2_CR8","doi-asserted-by":"publisher","first-page":"1409","DOI":"10.1109\/TPAMI.2011.239","volume":"34","author":"Z Kalal","year":"2012","unstructured":"Kalal, Z., Mikolajczyk, K., Matas, J.: Tracking-learning-detection. IEEE Trans. Pattern Anal. Mach. Intell. 34(7), 1409\u20131422 (2012)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"doi-asserted-by":"crossref","unstructured":"Kazemi, V., Sullivan, J.: One millisecond face alignment with an ensemble of regression trees. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 1867\u20131874 (2014)","key":"2_CR9","DOI":"10.1109\/CVPR.2014.241"},{"key":"2_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"679","DOI":"10.1007\/978-3-642-33712-3_49","volume-title":"Computer Vision \u2013 ECCV 2012","author":"V Le","year":"2012","unstructured":"Le, V., Brandt, J., Lin, Z., Bourdev, L., Huang, T.S.: Interactive facial feature localization. In: Fitzgibbon, A., Lazebnik, S., Perona, P., Sato, Y., Schmid, C. (eds.) ECCV 2012, Part III. LNCS, vol. 7574, pp. 679\u2013692. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-33712-3_49"},{"doi-asserted-by":"crossref","unstructured":"Lee, D., Park, H., Chang, D.Y.: Face alignment using cascade Gaussian process regression trees. In: Computer Vision and Pattern Recognition, pp. 4204\u20134212 (2015)","key":"2_CR11","DOI":"10.1109\/CVPR.2015.7299048"},{"doi-asserted-by":"crossref","unstructured":"Li, L., Zhao, X., Xue, G.: Near field authentication for smart devices. In: IEEE INFOCOM, pp. 375\u2013379 (2013)","key":"2_CR12","DOI":"10.1109\/INFCOM.2013.6566798"},{"doi-asserted-by":"crossref","unstructured":"Mathur, S., Miller, R., Varshavsky, A., Trappe, W., Mandayam, N.: Proximate: proximity-based secure pairing using ambient wireless signals. In: International Conference on Mobile Systems, Applications, and Services, pp. 211\u2013224 (2011)","key":"2_CR13","DOI":"10.1145\/1999995.2000016"},{"issue":"2","key":"2_CR14","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1023\/B:VISI.0000029666.37597.d3","volume":"60","author":"I Matthews","year":"2004","unstructured":"Matthews, I., Baker, S.: Active appearance models revisited. Int. J. Comput. Vis. 60(2), 135\u2013164 (2004)","journal-title":"Int. J. Comput. Vis."},{"key":"2_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1007\/3-540-45539-6_24","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 2000","author":"U Maurer","year":"2000","unstructured":"Maurer, U., Wolf, S.: Information-theoretic key agreement: from weak to strong secrecy for free. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 351\u2013368. Springer, Heidelberg (2000). https:\/\/doi.org\/10.1007\/3-540-45539-6_24"},{"key":"2_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/978-3-540-72037-9_9","volume-title":"Pervasive Computing","author":"R Mayrhofer","year":"2007","unstructured":"Mayrhofer, R., Gellersen, H.: Shake well before use: authentication based on accelerometer data. In: LaMarca, A., Langheinrich, M., Truong, K.N. (eds.) Pervasive 2007. LNCS, vol. 4480, pp. 144\u2013161. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-72037-9_9"},{"key":"2_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1007\/978-3-540-88693-8_37","volume-title":"Computer Vision \u2013 ECCV 2008","author":"S Milborrow","year":"2008","unstructured":"Milborrow, S., Nicolls, F.: Locating Facial features with an extended active shape model. In: Forsyth, D., Torr, P., Zisserman, A. (eds.) ECCV 2008, Part IV. LNCS, vol. 5305, pp. 504\u2013513. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-88693-8_37"},{"issue":"4","key":"2_CR18","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1145\/2534169.2486037","volume":"43","author":"Rajalakshmi Nandakumar","year":"2013","unstructured":"Nandakumar, R., Chintalapudi, K.K., Padmanabhan, V., Venkatesan, R.: Dhwani: secure peer-to-peer acoustic NFC. In: ACM SIGCOMM, pp. 63\u201374 (2013)","journal-title":"ACM SIGCOMM Computer Communication Review"},{"doi-asserted-by":"crossref","unstructured":"Sauer, P., Cootes, T., Taylor, C.: Accurate regression procedures for active appearance models. In: BMVC, vol. 1(6), pp. 681\u2013685 (2011)","key":"2_CR19","DOI":"10.5244\/C.25.30"},{"issue":"2","key":"2_CR20","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1109\/TMC.2011.271","volume":"12","author":"D Schurmann","year":"2013","unstructured":"Schurmann, D., Sigg, S.: Secure communication based on ambient audio. IEEE Trans. Mob. Comput. 12(2), 358\u2013370 (2013)","journal-title":"IEEE Trans. Mob. Comput."},{"doi-asserted-by":"crossref","unstructured":"Seshadri, K., Savvides, M.: Robust modified active shape model for automatic facial landmark annotation of frontal faces. In: IEEE International Conference on Biometrics: Theory, Applications, and Systems, pp. 1\u20138 (2009)","key":"2_CR21","DOI":"10.1109\/BTAS.2009.5339057"},{"doi-asserted-by":"crossref","unstructured":"Sethi, M., Antikainen, M., Aura, T.: Commitment-based device pairing with synchronized drawing. In: IEEE PerCom 2014 (2014)","key":"2_CR22","DOI":"10.1109\/PerCom.2014.6813959"},{"doi-asserted-by":"crossref","unstructured":"Sun, Z., Purohit, A., Bose, R., Zhang, P.: Spartacus: spatially-aware interaction for mobile devices through energy-efficient audio sensing. In: Proceeding of the International Conference on Mobile Systems, Applications, and Services, pp. 263\u2013276 (2013)","key":"2_CR23","DOI":"10.1145\/2462456.2464437"},{"doi-asserted-by":"crossref","unstructured":"Viola, P., Jones, M.: Rapid object detection using a boosted cascade of simple features. In: IEEE Computer Society Conference on Computer Vision & Pattern Recognition, p. 511 (2001)","key":"2_CR24","DOI":"10.1109\/CVPR.2001.990517"},{"doi-asserted-by":"crossref","unstructured":"Xi, W., et al.: Keep: fast secret key extraction protocol for D2D communication. In: IEEE International Symposium of Quality of Service (IWQOS), pp. 350\u2013359 (2014)","key":"2_CR25","DOI":"10.1109\/IWQoS.2014.6914340"},{"doi-asserted-by":"crossref","unstructured":"Zhang, S., Bauckhage, C., Cremers, A.B.: Informed haar-like features improve pedestrian detection. In: Computer Vision and Pattern Recognition, pp. 947\u2013954 (2014)","key":"2_CR26","DOI":"10.1109\/CVPR.2014.126"}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00021-9_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,19]],"date-time":"2025-08-19T23:35:41Z","timestamp":1755646541000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00021-9_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030000202","9783030000219"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00021-9_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ICCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cloud Computing and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Haikou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icccsconf.org\/icccs2018.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}