{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T00:09:29Z","timestamp":1743120569816,"version":"3.40.3"},"publisher-location":"Cham","reference-count":47,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031471971"},{"type":"electronic","value":"9783031471988"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-47198-8_2","type":"book-chapter","created":{"date-parts":[[2023,10,29]],"date-time":"2023-10-29T10:01:17Z","timestamp":1698573677000},"page":"23-41","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Biometric-Based Password Management"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-5869-2668","authenticated-orcid":false,"given":"Pavlo","family":"Kolesnichenko","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1124-1497","authenticated-orcid":false,"given":"Dmytro","family":"Progonov","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5070-9905","authenticated-orcid":false,"given":"Valentyna","family":"Cherniakova","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0940-7731","authenticated-orcid":false,"given":"Andriy","family":"Oliynyk","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4116-9094","authenticated-orcid":false,"given":"Oleksandra","family":"Sokol","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,10,30]]},"reference":[{"key":"2_CR1","unstructured":"Most hacked passwords revealed as UK cyber survey exposes gaps in online security. National Cyber Secyurity Centre (2019). https:\/\/www.ncsc.gov.uk\/news\/most-hacked-passwords-revealed-as-uk-cyber-survey-exposes-gaps-in-online-security"},{"key":"2_CR2","unstructured":"2020 end-of-year data breach report. Technical report, Identity Theft Resource Center (2020). https:\/\/www.idtheftcenter.org\/data-breaches\/"},{"key":"2_CR3","unstructured":"Card-based crypto hardware wallet: Protecting crypto wallet private keys and transactions with a biometric card. Idemia Inc. report (2022). https:\/\/www.idemia.com\/card-based-crypto-hardware-wallet"},{"key":"2_CR4","unstructured":"Set up iCloud Keychain. Apple Inc. (2022). https:\/\/support.apple.com\/en-gb\/HT204085"},{"key":"2_CR5","unstructured":"The role of biometrics in the metaverse. CoinTelegraph Inc. report (2022). https:\/\/cointelegraph.com\/metaverse-for-beginners\/the-role-of-biometrics-in-the-metaverse"},{"key":"2_CR6","unstructured":"Top 200 most common passwords. NordPass Inc. (2022). https:\/\/nordpass.com\/most-common-passwords-list\/"},{"key":"2_CR7","unstructured":"Overview of One Tap sign-in on Android. Google Inc. (2023). https:\/\/developers.google.com\/identity\/one-tap\/android\/overview"},{"key":"2_CR8","unstructured":"User Authentication Specifications Overview. FIDO Alliance (2023). https:\/\/fidoalliance.org\/specifications\/"},{"key":"2_CR9","doi-asserted-by":"publisher","unstructured":"Ardila, R., et al.: Common voice: a massively-multilingual speech corpus (2019). https:\/\/doi.org\/10.48550\/ARXIV.1912.06670","DOI":"10.48550\/ARXIV.1912.06670"},{"key":"2_CR10","doi-asserted-by":"publisher","unstructured":"Aydar, M., Cetin, S.C., Ayvaz, S., Aygun, B.: Private key encryption and recovery in blockchain (2019). https:\/\/doi.org\/10.48550\/ARXIV.1907.04156","DOI":"10.48550\/ARXIV.1907.04156"},{"key":"2_CR11","doi-asserted-by":"publisher","unstructured":"Bae, G., et al.: DigiFace-1M: 1 million digital face images for face recognition (2022). https:\/\/doi.org\/10.48550\/ARXIV.2210.02579","DOI":"10.48550\/ARXIV.2210.02579"},{"key":"2_CR12","unstructured":"Ballard, L., Kamara, S., Reiter, M.: The practical subtleties of biometric key generation. In: 17th USENIX Security Symposium (2008)"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Bathen, L.A.D., et al.: SelfIs: self-sovereign biometric IDs. In: 2019 IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), pp. 2847\u20132856 (2019)","DOI":"10.1109\/CVPRW.2019.00344"},{"key":"2_CR14","unstructured":"Bradski, G.: The OpenCV library. Dr. Dobb\u2019s J. Softw. Tools (2000)"},{"key":"2_CR15","volume-title":"Matematica: Calcolo Infinitesimale e Algebra Lineare","author":"M Bramanti","year":"2004","unstructured":"Bramanti, M.: Matematica: Calcolo Infinitesimale e Algebra Lineare. Zanichelli, Bologna (2004)"},{"key":"2_CR16","unstructured":"Canetti, R., Fuller, B., Paneth, O., Reyzin, L., Smith, A.: Reusable fuzzy extractors for low-entropy distributions. Technical report, Cryptology ePrint Archive (2017). https:\/\/eprint.iacr.org\/2014\/243.pdf"},{"key":"2_CR17","unstructured":"Inernational Technical Committee: ISO\/IEC 24745:2011. Information technology - Security techniques - Biometric information protection. Technical report, International Organization for Standardization and International Electrotechnical Committee (2011). https:\/\/www.iso.org\/standard\/52946.html"},{"key":"2_CR18","doi-asserted-by":"publisher","first-page":"400","DOI":"10.1109\/TIFS.2015.2500196","volume":"11","author":"J Daugman","year":"2015","unstructured":"Daugman, J.: Information theory and the IrisCode. IEEE Trans. Inf. Forensics Secur. 11, 400\u2013409 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"2_CR19","unstructured":"Delpy, B., Le Toux, V.: mimikatz. GitHub repository (2020). https:\/\/github.com\/ParrotSec\/mimikatz"},{"key":"2_CR20","unstructured":"Google: Measuring Biomentric Unlock Security (2020). https:\/\/source.android.com\/security\/biometric\/measure"},{"key":"2_CR21","doi-asserted-by":"crossref","unstructured":"Gray, R., Neuhoff, D.: Quantization. IEEE Trans. Inf. Theory IT-44(6), 2325\u20132383 (1998)","DOI":"10.1109\/18.720541"},{"issue":"1","key":"2_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13634-016-0353-z","volume":"2016","author":"J de Groot","year":"2016","unstructured":"de Groot, J., \u0160kori\u0107, B., de Vreede, N., Linnartz, J.-P.: Quantization in zero leakage helper data schemes. EURASIP J. Adv. Sig. Process. 2016(1), 1\u201313 (2016). https:\/\/doi.org\/10.1186\/s13634-016-0353-z","journal-title":"EURASIP J. Adv. Sig. Process."},{"key":"2_CR23","unstructured":"Grother, P., Ngan, M., Hanaoka, K., Yang, J.C., Hom, A.: FRVT 1:1 verification. Technical report, National Institute of Standards and Technology (2022). https:\/\/pages.nist.gov\/frvt\/html\/frvt11.html"},{"key":"2_CR24","doi-asserted-by":"crossref","unstructured":"Herder, C., Ren, L., van Dijk, M., Mandel\u00a0Yu, M., Devadas, S.: Trapdoor computational fuzzy extractors and stateless cryptographically-secure physical unclonable functions. IEEE Trans. Depend. Secure Comput. 14, 65\u201382 (2017)","DOI":"10.1109\/TDSC.2016.2536609"},{"key":"2_CR25","unstructured":"Hersey, F.: Iris biometrics integrated with DIDH for \u2018most secured\u2019 data system for blockchain, metaverse. BiometricUpdate Site, News (2022). https:\/\/www.biometricupdate.com\/202207\/iris-biometrics-integrated-with-didh-for-most-secured-data-system-for-blockchain-metaverse"},{"key":"2_CR26","doi-asserted-by":"crossref","unstructured":"Jarecki, S., Krawczyk, H., Shirvanian, M., Saxena, N.: Device-enhanced password protocols with optimal online-offline protection. In: ACM Asia Conference on Computer and Communications Security (ASIACCS 2016). ACM (2016)","DOI":"10.1145\/2897845.2897880"},{"key":"2_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1007\/978-3-030-69541-5_22","volume-title":"Computer Vision \u2013 ACCV 2020","author":"I Kim","year":"2021","unstructured":"Kim, I., et al.: DiscFace: minimum discrepancy learning for deep face recognition. In: Ishikawa, H., Liu, C.-L., Pajdla, T., Shi, J. (eds.) ACCV 2020. LNCS, vol. 12626, pp. 358\u2013374. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-69541-5_22"},{"key":"2_CR28","doi-asserted-by":"publisher","first-page":"1065","DOI":"10.1109\/TCYB.2015.2423271","volume":"46","author":"MH Lim","year":"2015","unstructured":"Lim, M.H., Yuen, P.: Entropy measurement for biometric verification systems. IEEE Trans. Cybern. 46, 1065\u20131077 (2015)","journal-title":"IEEE Trans. Cybern."},{"key":"2_CR29","doi-asserted-by":"crossref","unstructured":"Liu, W., Wen, Y., Yu, Z., Li, M., Raj, B., Song, L.: SphereFace: deep hypersphere embedding for face recognition. In: The IEEE Conference on Computer Vision and Pattern Recognition (CVPR 2017) (2017)","DOI":"10.1109\/CVPR.2017.713"},{"key":"2_CR30","doi-asserted-by":"publisher","unstructured":"Meng, Q., Zhao, S., Huang, Z., Zhou, F.: MagFace: a universal representation for face recognition and quality assessment (2021). https:\/\/doi.org\/10.48550\/ARXIV.2103.06627","DOI":"10.48550\/ARXIV.2103.06627"},{"key":"2_CR31","unstructured":"Miessler, D., Haddix, J.: SecList: the Pentester\u2019s companion. GitHub repository (2022). https:\/\/github.com\/danielmiessler\/SecLists"},{"key":"2_CR32","doi-asserted-by":"crossref","unstructured":"Parkhi, O.M., Vedaldi, A., Zisserman, A.: Deep face recognition. In: British Machine Vision Conference (2015)","DOI":"10.5244\/C.29.41"},{"key":"2_CR33","doi-asserted-by":"crossref","unstructured":"Phillips, P., Moon, H., Rizvi, S., Rauss, P.: The FERET evaluation methodology for face recognition algorithms. IEEE Trans. Pattern Anal. Mach. Intell. 22, 1090\u20131104 (2000)","DOI":"10.1109\/34.879790"},{"issue":"5","key":"2_CR34","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1016\/S0262-8856(97)00070-X","volume":"16","author":"P Phillips","year":"1998","unstructured":"Phillips, P., Wechsler, H., Huang, J., Rauss, P.: The FERET database and evaluation procedure for face recognition algorithms. Image Vis. Comput. 16(5), 295\u2013306 (1998)","journal-title":"Image Vis. Comput."},{"key":"2_CR35","doi-asserted-by":"crossref","unstructured":"Rathgeb, C., Merkle, J., Scholz, J., Tams, B., Nesterowicz, V.: Deep face fuzzy vault: implementation and performance, November 2021","DOI":"10.1016\/j.cose.2021.102539"},{"key":"2_CR36","unstructured":"Ross, B., Jackson, C., Miyake, N., Boneh, D., Mitchell, J.: Stronger password authentication using browser extensions. In: USENIX Security Symposium (USENIX 2005) (2005)"},{"key":"2_CR37","doi-asserted-by":"crossref","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 22 (1979)","DOI":"10.1145\/359168.359176"},{"key":"2_CR38","doi-asserted-by":"crossref","unstructured":"Shirvanian, M., Jareckiy, S., Krawczykz, H., Saxena, N.: SPHINX: a password store that perfectly hides passwords from itself. In: IEEE 37th International Conference on Distributed Computing Systems (ICDCS 2017). IEEE (2017)","DOI":"10.1109\/ICDCS.2017.64"},{"key":"2_CR39","doi-asserted-by":"publisher","unstructured":"Snyder, D., Garcia-Romero, D., Sell, G., Povey, D., Khudanpur, S.: X-Vectors: robust DNN embeddings for speaker recognition. In: 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 5329\u20135333 (2018). https:\/\/doi.org\/10.1109\/ICASSP.2018.8461375","DOI":"10.1109\/ICASSP.2018.8461375"},{"key":"2_CR40","doi-asserted-by":"publisher","unstructured":"Suresh, K., Pal, R., Balasundaram, S.R.: Two-factor-based RSA key generation from fingerprint biometrics and password for secure communication, 8, 3247\u20133261 (2022). https:\/\/doi.org\/10.1007\/s40747-022-00663-3","DOI":"10.1007\/s40747-022-00663-3"},{"key":"2_CR41","doi-asserted-by":"publisher","unstructured":"Tambay, A.A.: Testing fuzzy extractors for face biometrics: generating deep datasets. Master\u2019s thesis, University of Ottawa, Ottawa, Canada (2020). https:\/\/doi.org\/10.20381\/ruor-25653","DOI":"10.20381\/ruor-25653"},{"key":"2_CR42","unstructured":"Team, S.D.: Personalized Hey Siri. Technical report, Apple Inc. (2018). https:\/\/machinelearning.apple.com\/research\/personalized-hey-siri"},{"key":"2_CR43","unstructured":"Tian, Y., Li, Y., Deng, R.H., Sengupta, B., Yang, G.: Lattice-Based Remote User Authentication from Reusable Fuzzy Signature. IACR Cryptology ePrint Archive 2019, 743 (2019)"},{"key":"2_CR44","unstructured":"Toubba, K.: Notice of recent security incident in 2022 year. Technical report, LastPass Inc. (2022). https:\/\/blog.lastpass.com\/2022\/12\/notice-of-recent-security-incident\/"},{"key":"2_CR45","doi-asserted-by":"publisher","first-page":"581","DOI":"10.1049\/iet-bmt.2017.0052","volume":"7","author":"Y Wang","year":"2018","unstructured":"Wang, Y., Yang, C., Shark, L.K.: Method for estimating potential recognition capacity of texture-based biometrics. IET Biometrics 7, 581\u2013588 (2018)","journal-title":"IET Biometrics"},{"key":"2_CR46","unstructured":"Whittaker, Z.: Norton LifeLock says thousands of customer accounts breached. Technical report, TechCrunch Inc. (2023). https:\/\/techcrunch.com\/2023\/01\/15\/norton-lifelock-password-manager-data\/"},{"key":"2_CR47","unstructured":"Zhang, K., Cui, H., Yu, Y.: Facial template protection via lattice-based fuzzy extractors. Cryptology ePrint Archive, Paper 2021\/1559 (2021). https:\/\/eprint.iacr.org\/2021\/1559"}],"container-title":["Lecture Notes in Computer Science","Security and Trust Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-47198-8_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T16:33:20Z","timestamp":1709829200000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-47198-8_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031471971","9783031471988"],"references-count":47,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-47198-8_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"30 October 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"STM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Security and Trust Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The Hague","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The Netherlands","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 September 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 September 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"stm2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.nics.uma.es\/stm2023\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"15","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}