{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T21:04:26Z","timestamp":1726002266813},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030051709"},{"type":"electronic","value":"9783030051716"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-05171-6_23","type":"book-chapter","created":{"date-parts":[[2018,12,5]],"date-time":"2018-12-05T10:52:06Z","timestamp":1544007126000},"page":"448-461","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Gaze-Based Graphical Password Using Webcam"],"prefix":"10.1007","author":[{"given":"Abhishek","family":"Tiwari","sequence":"first","affiliation":[]},{"given":"Rajarshi","family":"Pal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,5]]},"reference":[{"key":"23_CR1","unstructured":"Sobrado, L., Birget, J.C.: Graphical passwords. The Rutgers Scholar, An Electronic Bulletin for Undergraduate Research, vol. 4 (2002)"},{"issue":"1\u20132","key":"23_CR2","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1016\/j.ijhcs.2005.04.010","volume":"63","author":"S Wiedenbeck","year":"2005","unstructured":"Wiedenbeck, S., Waters, J., Birget, J., Brodskiy, A., Memon, N.: PassPoints: design and longitudinal evaluation of a graphical password system. Int. J. Hum.-Comput. Stud. Special issue: HCI Res. Priv. Secur. Crit. 63(1\u20132), 102\u2013127 (2005)","journal-title":"Int. J. Hum.-Comput. Stud. Special issue: HCI Res. Priv. Secur. Crit."},{"issue":"3","key":"23_CR3","doi-asserted-by":"publisher","first-page":"380","DOI":"10.1109\/THMS.2015.2487511","volume":"46","author":"A Bianchi","year":"2016","unstructured":"Bianchi, A., Oakley, I., Kim, H.: PassBYOP: bring your own picture for securing graphical passwords. IEEE Trans. Hum.-Mach. Syst. 46(3), 380\u2013389 (2016)","journal-title":"IEEE Trans. Hum.-Mach. Syst."},{"issue":"4","key":"23_CR4","doi-asserted-by":"publisher","first-page":"607","DOI":"10.1109\/THMS.2015.2504101","volume":"46","author":"M Diaz","year":"2016","unstructured":"Diaz, M., Fierrez, J., Galbally, J.: Graphical password-based user authentication with free-form doodles. IEEE Trans. Hum.- Mach. Syst. 46(4), 607\u2013614 (2016)","journal-title":"IEEE Trans. Hum.- Mach. Syst."},{"key":"23_CR5","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/j.compeleceng.2016.12.007","volume":"59","author":"S Azad","year":"2017","unstructured":"Azad, S., et al.: VAP code: a secure graphical password for smart devices. Comput. Electr. Eng. 59, 99\u2013109 (2017)","journal-title":"Comput. Electr. Eng."},{"key":"23_CR6","doi-asserted-by":"crossref","unstructured":"Cherepovskaya, E.N., Lyamin, A.V.: An evaluation of biometric identification approach on low-frequency eye tracking data. In: Proceeding of IEEE 15th International Symposium on Applied Machine Intelligence and Informatics, January 2017","DOI":"10.1109\/SAMI.2017.7880288"},{"issue":"2","key":"23_CR7","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1016\/j.patrec.2015.10.015","volume":"82","author":"D Cazzato","year":"2016","unstructured":"Cazzato, D., Evangelista, A., Leo, M., Carcagni, P., Distante, C.: A low-cost and calibration-free gaze estimator for soft biometrics: an explorative study. Pattern Recognit. Lett. 82(2), 196\u2013206 (2016)","journal-title":"Pattern Recognit. Lett."},{"key":"23_CR8","doi-asserted-by":"crossref","unstructured":"Liang, Z., Tan, F., Chi, Z.: Video-based biometric identification using eye tracking technique. In: Proceeding of IEEE International Conference on Signal Processing, Communication and Computing, August 2012","DOI":"10.1109\/ICSPCC.2012.6335584"},{"key":"23_CR9","doi-asserted-by":"crossref","unstructured":"Darwish, A., Pasquier, M.: Biometric identification using the dynamic features of the eyes. In: Proceeding of IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems, September-October 2013","DOI":"10.1109\/BTAS.2013.6712724"},{"key":"23_CR10","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/j.imavis.2016.03.014","volume":"58","author":"I Rigas","year":"2017","unstructured":"Rigas, I., Komogortsev, O.: Current research in eye movement biometrics: an analysis based on BioEye 2015 cometition. Proc. Image Vis. Comput. 58, 129\u2013141 (2017)","journal-title":"Proc. Image Vis. Comput."},{"key":"23_CR11","doi-asserted-by":"crossref","unstructured":"Weaver, J., Mock, K., Hoanca, B.: Gaze-based password authentication through automatic clustering of gaze points. IEEE International Conference on Systems, Man, and Cybernetics (2011)","DOI":"10.1109\/ICSMC.2011.6084072"},{"key":"23_CR12","doi-asserted-by":"crossref","unstructured":"Viola, P., Jones, M.: Rapid object detection using a boosted cascade of simple features. In: Proceedings of the 2001 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, vol. 1, pp. 511\u2013518 (2001)","DOI":"10.1109\/CVPR.2001.990517"},{"key":"23_CR13","unstructured":"Shiqi Yu\u2019s Homepage. http:\/\/yushiqi.cn\/research\/eyedetection"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-05171-6_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,6]],"date-time":"2019-11-06T15:27:11Z","timestamp":1573054031000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-05171-6_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030051709","9783030051716"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-05171-6_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ICISS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Systems Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bangalore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 December 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 December 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iciss2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.iciss.org.in","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"51","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"23","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"45% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}