{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T12:05:19Z","timestamp":1742990719741,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030011673"},{"type":"electronic","value":"9783030011680"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-01168-0_28","type":"book-chapter","created":{"date-parts":[[2018,9,28]],"date-time":"2018-09-28T04:03:17Z","timestamp":1538107397000},"page":"299-311","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Signing Documents by Hand: Model for Multi-Factor Authentication"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0924-6221","authenticated-orcid":false,"given":"Sergey","family":"Bezzateev","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9435-9580","authenticated-orcid":false,"given":"Natalia","family":"Voloshina","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5544-2434","authenticated-orcid":false,"given":"Vadim","family":"Davydov","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3198-1580","authenticated-orcid":false,"given":"Tamara","family":"Minaeva","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4643-2875","authenticated-orcid":false,"given":"Nikolay","family":"Rudavin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,29]]},"reference":[{"issue":"2","key":"28_CR1","doi-asserted-by":"publisher","first-page":"458","DOI":"10.1016\/j.patcog.2014.08.024","volume":"48","author":"SH Khan","year":"2015","unstructured":"Khan, S.H., Akbar, M.A., Shahzad, F., Farooq, M., Khan, Z.: Secure biometric template generation for multi-factor authentication. Pattern Recognit. 48(2), 458\u2013472 (2015)","journal-title":"Pattern Recognit."},{"issue":"1","key":"28_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/cryptography2010001","volume":"2","author":"A Ometov","year":"2018","unstructured":"Ometov, A., Bezzateev, S., M\u00e4kitalo, N., Andreev, S., Mikkonen, T., Koucheryavy, Y.: Multi-factor authentication: a survey. Cryptography 2(1), 1 (2018)","journal-title":"Cryptography"},{"key":"28_CR3","doi-asserted-by":"crossref","unstructured":"Weir, M., Aggarwal, S., De Medeiros, B., Glodek, B.: Password cracking using probabilistic context-free grammars. In: 2009 30th IEEE Symposium on Security and Privacy, pp. 391\u2013405. IEEE (2009)","DOI":"10.1109\/SP.2009.8"},{"key":"28_CR4","doi-asserted-by":"crossref","unstructured":"De Luca, A., Hang, A., Von Zezschwitz, E., Hussmann, H.: I feel like I\u2019m taking selfies all day! Towards understanding biometric authentication on smartphones. In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, pp. 1411\u20131414. ACM (2015)","DOI":"10.1145\/2702123.2702141"},{"key":"28_CR5","doi-asserted-by":"crossref","unstructured":"Grankin, M., Khavkina, E., Ometov, A.: Research of MEMS accelerometers features in mobile phone. In: Proceedings of the 12th Conference of Open Innovations Association FRUCT, pp. 31\u201336 (2012)","DOI":"10.23919\/FRUCT.2012.8122083"},{"key":"28_CR6","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84882-254-2","volume-title":"Handbook of Fingerprint Recognition","author":"Davide Maltoni","year":"2009","unstructured":"Maltoni, D., Maio, D., Jain, A.K., Prabhakar, S.: Handbook of fingerprint recognition. Springer, London (2009). https:\/\/doi.org\/10.1007\/978-1-84882-254-2"},{"key":"28_CR7","doi-asserted-by":"crossref","unstructured":"Ometov, A., Bezzateev, S.: Multi-factor authentication: a survey and challenges in V2X applications. In: Proceedings of 9th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), pp. 129\u2013136. IEEE (2017)","DOI":"10.1109\/ICUMT.2017.8255200"},{"key":"28_CR8","series-title":"SpringerBriefs in Electrical and Computer Engineering","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-0506-0","volume-title":"Watermarking Security","author":"Patrick Bas","year":"2016","unstructured":"Bas, P., Furon, T., Cayre, F., Do\u00ebrr, G., Mathon, B.: Watermarking Security: Fundamentals. Springer, Secure Designs and Attacks. Springer, Singapore (2016). https:\/\/doi.org\/10.1007\/978-981-10-0506-0"},{"key":"28_CR9","unstructured":"Xu, H., Zhou, Y., Lyu, M.R.: Towards continuous and passive authentication via touch biometrics: an experimental study on smartphones. In: Proceedings of Symposium on Usable Privacy and Security, SOUPS. vol. 14, pp. 187\u2013198 (2014)"},{"key":"28_CR10","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/978-3-319-29504-6_29","volume-title":"Proceedings of the Second International Afro-European Conference for Industrial Advancement AECIA 2015","author":"S Bezzateev","year":"2016","unstructured":"Bezzateev, S., Voloshina, N., Zhidanov, K.: Multi-level significant bit (MLSB) embedding based on weighted container model and weighted F5 concept. In: Abraham, A., Wegrzyn-Wolska, K., Hassanien, A.E., Snasel, V., Alimi, A.M. (eds.) Proceedings of the Second International Afro-European Conference for Industrial Advancement AECIA 2015. AISC, vol. 427, pp. 293\u2013303. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-29504-6_29"},{"key":"28_CR11","doi-asserted-by":"crossref","unstructured":"Voloshina, N., Zhidanov, K., Bezzateev, S.: Optimal weighted watermarking for still images. In: Proceedings of XIV International Symposium on Problems of Redundancy in Information and Control Systems (REDUNDANCY), pp. 98\u2013102. IEEE (2014)","DOI":"10.1109\/RED.2014.7016714"},{"key":"28_CR12","unstructured":"Topaz Systems INC.: [company website]. https:\/\/www.topazsystems.com\/ . Accessed 25 May 2018"},{"key":"28_CR13","unstructured":"Wacom Business Solutions: [company website]. https:\/\/www.wacom.com\/ru-ru\/enterprise\/business-solutions\/hardware\/signature-pads . Accessed 25 May 2018"},{"key":"28_CR14","unstructured":"Comsigntrust: [company website]. https:\/\/www.comsigntrust.com\/products\/secure-portable-e-signature-token\/ . Accessed 25 May 2018"},{"key":"28_CR15","unstructured":"eSign: [company website]. https:\/\/www.esign.bg\/ . Accessed 25 May 2018"},{"issue":"3","key":"28_CR16","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1002\/lom3.10012","volume":"13","author":"M Gandra","year":"2015","unstructured":"Gandra, M., Seabra, R., Lima, F.P.: A low-cost, versatile data logging system for ecological applications. Limnol. Ocean. Methods 13(3), 115\u2013126 (2015)","journal-title":"Limnol. Ocean. Methods"},{"key":"28_CR17","unstructured":"Grunthaner, M.P., Richards, P.W., Hotelling, S.P.: Frustrated total internal reflection and capacitive sensing (2018), uS Patent 9,891,759"},{"key":"28_CR18","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/978-1-84628-984-2_11","volume-title":"Security with Noisy Data","author":"Tom Kevenaar","year":"2007","unstructured":"Kevenaar, T.: Protection of biometric information. In: Tuyls, P., Skoric, B., Kevenaar, T. (eds.) Security with Noisy Data. Springer, London (2007). https:\/\/doi.org\/10.1007\/978-1-84628-984-2_11"},{"issue":"1","key":"28_CR19","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1137\/060651380","volume":"38","author":"Y Dodis","year":"2008","unstructured":"Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. SIAM J. Comput. 38(1), 97\u2013139 (2008)","journal-title":"SIAM J. Comput."},{"issue":"3","key":"28_CR20","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/BF00196725","volume":"4","author":"CP Schnorr","year":"1991","unstructured":"Schnorr, C.P.: Efficient signature generation by smart cards. J. Cryptol. 4(3), 161\u2013174 (1991)","journal-title":"J. Cryptol."},{"key":"28_CR21","doi-asserted-by":"crossref","unstructured":"Bezzateev, S., Voloshina, N., Zhidanov, K.: Weighted digital watermarking approaches comparison. In: Proceedings of International Symposium on Problems of Redundancy in Information and Control Systems (RED), pp. 172\u2013174. IEEE (2016)","DOI":"10.1109\/RED.2016.7779356"},{"key":"28_CR22","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Long, M.: Steganalysis of LSB encoding in color images. In: 2000 IEEE International Conference on Multimedia and Expo, ICME 2000, vol. 3, pp. 1279\u20131282. IEEE (2000)","DOI":"10.1109\/ICME.2000.871000"},{"issue":"8","key":"28_CR23","first-page":"906","volume":"4","author":"K Anand","year":"2014","unstructured":"Anand, K., Sharma, E.R.: Comparison of LSB and MSB based image steganography. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 4(8), 906\u2013909 (2014)","journal-title":"Int. J. Adv. Res. Comput. Sci. Softw. Eng."},{"issue":"66","key":"28_CR24","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1007\/s10623-012-9739-6","volume":"1","author":"S Bezzateev","year":"2013","unstructured":"Bezzateev, S., Shekhunova, N.: Class of generalized Goppa codes perfect in weighted Hamming metric. Des. Codes Cryptography 1(66), 391\u2013399 (2013)","journal-title":"Des. Codes Cryptography"}],"container-title":["Lecture Notes in Computer Science","Internet of Things, Smart Spaces, and Next Generation Networks and Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-01168-0_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,5]],"date-time":"2023-09-05T12:52:14Z","timestamp":1693918334000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-01168-0_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030011673","9783030011680"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-01168-0_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"NEW2AN","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Next Generation Wired\/Wireless Networking","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"St. Petersburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Russia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 August 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 August 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"new2an2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.new2an.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"EDAS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"186","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"64","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"34% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}