{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T17:28:38Z","timestamp":1725902918219},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319615417"},{"type":"electronic","value":"9783319615424"}],"license":[{"start":{"date-parts":[[2017,7,5]],"date-time":"2017-07-05T00:00:00Z","timestamp":1499212800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-61542-4_14","type":"book-chapter","created":{"date-parts":[[2017,7,4]],"date-time":"2017-07-04T04:02:27Z","timestamp":1499140947000},"page":"156-161","source":"Crossref","is-referenced-by-count":4,"title":["Security Assessment of the Image-Based Authentication Using Screen-Capture Tools"],"prefix":"10.1007","author":[{"given":"Insu","family":"Oh","sequence":"first","affiliation":[]},{"given":"Yeunsu","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Hyeji","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Kyungroul","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Kangbin","family":"Yim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,5]]},"reference":[{"unstructured":"Wikipedia, Authentication. \nhttps:\/\/en.wikipedia.org\/wiki\/Authentication","key":"14_CR1"},{"issue":"4","key":"14_CR2","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1145\/583800.583803","volume":"36","author":"C-C Lee","year":"2002","unstructured":"Lee, C.-C., Li, L.-H., Hwang, M.-S.: A remote user authentication scheme using hash functions. ACM SIGOPS Oper. Syst. Rev. 36(4), 23\u201329 (2002)","journal-title":"ACM SIGOPS Oper. Syst. Rev."},{"unstructured":"Wikipedia, Personal identification number. \nhttps:\/\/en.wikipedia.org\/wiki\/Personal_identification_number","key":"14_CR3"},{"doi-asserted-by":"crossref","unstructured":"Liao, I.-E., Lee, C.-C., Hwang, M.-S.: A password authentication scheme over insecure networks. J. Comput. Syst. Sci. 72(4), 727\u2013740 (2006)","key":"14_CR4","DOI":"10.1016\/j.jcss.2005.10.001"},{"unstructured":"Suo, X., Zhu, Y., Owen, G.S.: Graphical passwords: a survey. In: Proceedings of the ACSA (Annual Computer Security Applications Conference), pp. 463\u2013472, December 2005","key":"14_CR5"},{"doi-asserted-by":"crossref","unstructured":"Wiedenbeck, S., Waters, J., Birget, J.-C., Brodskiy, A., Memon, N.: PassPoints: design and longitudinal evaluation of a graphical password system. J. Hum. Comput. Stud. 63(1), 102\u2013127 (2005)","key":"14_CR6","DOI":"10.1016\/j.ijhcs.2005.04.010"},{"unstructured":"Wikipedia, Virtual Keyboard. \nhttps:\/\/en.wikipedia.org\/wiki\/Virtual_keyboard","key":"14_CR7"},{"unstructured":"Wikipedia, Screen capture. \nhttps:\/\/en.wikipedia.org\/wiki\/Screen_capture","key":"14_CR8"},{"doi-asserted-by":"crossref","unstructured":"Chia, A.Y.-S., Bandara, U., Wang, X., Hirano, H.: Protecting against screenshots: an image processing approach. In: Proceedings of the CVPR (Computer Vision and Pattern Recognition), pp. 1437\u20131445, June 2015","key":"14_CR9","DOI":"10.1109\/CVPR.2015.7298750"},{"unstructured":"Bandicamera. \nhttps:\/\/www.bandisoft.co.kr\/bandicamera\/","key":"14_CR10"},{"unstructured":"Dr.Capture. \nhttp:\/\/www.drcapture.com\/ko\/","key":"14_CR11"},{"unstructured":"PicPick. \nhttp:\/\/wiziple.tistory.com\/","key":"14_CR12"},{"unstructured":"Snagit 12. \nhttps:\/\/www.techsmith.com\/snagit.html","key":"14_CR13"},{"unstructured":"Capsun 6.02. \nhttp:\/\/www.kbench.com\/software\/?q=node\/49215","key":"14_CR14"},{"unstructured":"ShareX. \nhttps:\/\/getsharex.com\/","key":"14_CR15"},{"unstructured":"Kalmuri. \nhttp:\/\/kalmuri.kilho.net\/","key":"14_CR16"}],"container-title":["Advances in Intelligent Systems and Computing","Innovative Mobile and Internet Services in Ubiquitous Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-61542-4_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,7,4]],"date-time":"2017-07-04T04:09:01Z","timestamp":1499141341000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-61542-4_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,5]]},"ISBN":["9783319615417","9783319615424"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-61542-4_14","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017,7,5]]}}}