{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,15]],"date-time":"2025-04-15T04:59:44Z","timestamp":1744693184344,"version":"3.37.3"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,2,21]],"date-time":"2021-02-21T00:00:00Z","timestamp":1613865600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,2,21]],"date-time":"2021-02-21T00:00:00Z","timestamp":1613865600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation, Korea","doi-asserted-by":"crossref","award":["2019R1A2C4069769"],"award-info":[{"award-number":["2019R1A2C4069769"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2022,2]]},"DOI":"10.1007\/s10207-021-00540-z","type":"journal-article","created":{"date-parts":[[2021,2,21]],"date-time":"2021-02-21T08:02:47Z","timestamp":1613894567000},"page":"25-36","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["A new smart smudge attack using CNN"],"prefix":"10.1007","volume":"21","author":[{"given":"Hansub","family":"Shin","sequence":"first","affiliation":[]},{"given":"Sungyong","family":"Sim","sequence":"additional","affiliation":[]},{"given":"Hyukyoon","family":"Kwon","sequence":"additional","affiliation":[]},{"given":"Sangheum","family":"Hwang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1767-6165","authenticated-orcid":false,"given":"Younho","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,21]]},"reference":[{"unstructured":"Number of Smartphone Users in Advanced and Emerging Economies . https:\/\/www.oberlo.com\/statistics\/how-many-people-have-smartphones. [Online; Accessed 06 Dec 2019]","key":"540_CR1"},{"key":"540_CR2","volume-title":"Managing Information Security Risks: The OCTAVE Approach","author":"CJ Alberts","year":"2002","unstructured":"Alberts, C.J., Dorofee, A.: Managing Information Security Risks: The OCTAVE Approach. Addison-Wesley Longman Publishing Co., Inc., Boston (2002)"},{"issue":"2","key":"540_CR3","first-page":"273","volume":"7","author":"H Tao","year":"2008","unstructured":"Tao, H., Adams, C.: Pass-go: a proposal to improve the usability of graphical passwords. IJ Netw. Sec. 7(2), 273 (2008)","journal-title":"IJ Netw. Sec."},{"unstructured":"Van\u00a0Bruggen, D.: Studying the impact of security awareness efforts on user behavior. Ph.D. thesis, University of Notre Dame (2014)","key":"540_CR4"},{"key":"540_CR5","first-page":"1","volume":"10","author":"AJ Aviv","year":"2010","unstructured":"Aviv, A.J., Gibson, K.L., Mossop, E., Blaze, M., Smith, J.M.: Smudge attacks on smartphone touch screens. Woot 10, 1 (2010)","journal-title":"Woot"},{"doi-asserted-by":"crossref","unstructured":"Cha, S., Kwag, S., Kim, H., Huh, J.H.: Boosting the guessing attack performance on android lock patterns with smudge attacks, In: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security (ACM, 2017), pp. 313\u2013326 (2017)","key":"540_CR6","DOI":"10.1145\/3052973.3052989"},{"key":"540_CR7","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/978-3-319-07620-1_11","volume-title":"International Conference on Human Aspects of Information Security, Privacy, and Trust","author":"P Andriotis","year":"2014","unstructured":"Andriotis, P., Tryfonas, T., Oikonomou, G.: Complexity metrics and user strength perceptions of the pattern-lock graphical authentication method. International Conference on Human Aspects of Information Security, Privacy, and Trust, pp. 115\u2013126. Springer, New York (2014)"},{"unstructured":"Corning. Mobile users can\u2019t leave their phone alone for six minutes and check it up to 150 times a day. https:\/\/www.dailymail.co.uk\/news\/article-2276752\/Mobile-users-leave-phone-minutes-check-150-times-day.html (2013). [Online; Accessed 21 Dec 2020]","key":"540_CR8"},{"doi-asserted-by":"crossref","unstructured":"Andriotis, P., Tryfonas, T., Oikonomou, G., Yildiz, C.: A pilot study on the security of pattern screen-lock methods and soft side channel attacks. In: Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp 1\u20136. ACM, New York (2013)","key":"540_CR9","DOI":"10.1145\/2462096.2462098"},{"issue":"4","key":"540_CR10","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1162\/neco.1989.1.4.541","volume":"1","author":"Y LeCun","year":"1989","unstructured":"LeCun, Y., Boser, B., Denker, J.S., Henderson, D., Howard, R.E., Hubbard, W., Jackel, L.D.: Backpropagation applied to handwritten zip code recognition. Neural Comput. 1(4), 541 (1989)","journal-title":"Neural Comput."},{"key":"540_CR11","doi-asserted-by":"publisher","DOI":"10.1007\/b11963","volume-title":"Hierarchical Neural Networks for Image Interpretation","author":"S Behnke","year":"2003","unstructured":"Behnke, S.: Hierarchical Neural Networks for Image Interpretation, vol. 2766. Springer, New York (2003)"},{"doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Identity mappings in deep residual networks. In: European Conference on Computer Vision, pp. 630\u2013645. Springer, New York (2016)","key":"540_CR12","DOI":"10.1007\/978-3-319-46493-0_38"},{"doi-asserted-by":"crossref","unstructured":"Huang, G., Liu, Z., Van Der\u00a0Maaten, L., Weinberger, K.Q.: Densely connected convolutional networks. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 4700\u20134708 (2017)","key":"540_CR13","DOI":"10.1109\/CVPR.2017.243"},{"issue":"1","key":"540_CR14","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1109\/72.363444","volume":"6","author":"R Anand","year":"1995","unstructured":"Anand, R., Mehrotra, K., Mohan, C.K., Ranka, S.: Efficient classification for multiclass problems using modular neural networks. IEEE Trans. Neural Netw. 6(1), 117 (1995)","journal-title":"IEEE Trans. Neural Netw."},{"issue":"Dec","key":"540_CR15","first-page":"113","volume":"1","author":"EL Allwein","year":"2000","unstructured":"Allwein, E.L., Schapire, R.E., Singer, Y.: Reducing multiclass to binary: a unifying approach for margin classifiers. J. Mach. Learn. Res. 1(Dec), 113 (2000)","journal-title":"J. Mach. Learn. Res."},{"issue":"3","key":"540_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/jdwm.2007070101","volume":"3","author":"G Tsoumakas","year":"2007","unstructured":"Tsoumakas, G., Katakis, I.: Multi-label classification: an overview. Int. J. Data Warehous. Min. (IJDWM) 3(3), 1 (2007)","journal-title":"Int. J. Data Warehous. Min. (IJDWM)"},{"doi-asserted-by":"crossref","unstructured":"Lee, H., Kim, S., Kwon, T.: Here is your fingerprint!: Actual risk versus user perception of latent fingerprints and smudges remaining on smartphones. In: Proceedings of the 33rd Annual Computer Security Applications Conference, pp. 512\u2013527. ACM (2017)","key":"540_CR17","DOI":"10.1145\/3134600.3134643"},{"unstructured":"Corning. Corning Gorilla Glass 6 Production Information Sheet. https:\/\/www.corning.com\/microsites\/csm\/gorillaglass\/PI_Sheets\/2020\/Corning%20Gorilla%20Glass%206_PI%20Sheet.pdf (2018). [Online; Accessed 15 Oct 2020]","key":"540_CR18"},{"unstructured":"Liaro, S.: Why your brand-new smartphone will scratch just as easily as your old one? https:\/\/www.theverge.com\/circuitbreaker\/2018\/10\/19\/17514174\/gorilla-glass-scratch-resistance-google-pixel-3- samsung-galaxy-s9-note (2018). [Online; Accessed 15 Oct 2020]","key":"540_CR19"},{"unstructured":"Brookes, T.: How to protect and restore your smartphone\u2019s oleophobic coating. https:\/\/www.howtogeek.com\/662731\/how-to-protect-and-restore-your-smartphones- oleophobic-coating\/ (2020). [Online; Accessed 15 Oct 2020]","key":"540_CR20"},{"unstructured":"Amazon Web Service. https:\/\/aws.amazon.com\/. [Online; Accessed 15 Nov 2019]","key":"540_CR21"},{"unstructured":"Python Library Opencv. https:\/\/pypi.org\/project\/opencv-python\/. [Online; Accessed 15 Nov 2019]","key":"540_CR22"},{"unstructured":"Python Library Keras. https:\/\/www.tensorflow.org\/guide\/keras. [Online; Accessed 15 Nov 2019]","key":"540_CR23"},{"unstructured":"Mobile device security. https:\/\/www.channelpronetwork.com\/article\/mobile-device-security-startling-statistics-data -loss-and-data-breaches. [Online; Accessed 15 Nov 2019]","key":"540_CR24"},{"unstructured":"Smartphone theft vulnerability. https:\/\/slate.com\/technology\/2014\/12\/smartphone-theft-is-a-big-problem-says-fccs -subcommittee-on-mobile-device-theft-prevention.html. [Online; Accessed 15 Nov 2019]","key":"540_CR25"},{"issue":"9","key":"540_CR26","doi-asserted-by":"publisher","first-page":"2272","DOI":"10.6109\/jkiice.2014.18.9.2272","volume":"18","author":"D Park","year":"2014","unstructured":"Park, D., Kim, S.: A design and implementation of mobile application usage pattern analysis system. J. Korea Instit. Inf. Commun. Eng. 18(9), 2272 (2014)","journal-title":"J. Korea Instit. Inf. Commun. Eng."},{"doi-asserted-by":"crossref","unstructured":"Ling, C.X., Huang, J., Zhang, H.: Auc: a better measure than accuracy in comparing learning algorithms. In: Conference of the Canadian Society for Computational Studies of Intelligence, pp. 329\u2013341. Springer, New York (2003)","key":"540_CR27","DOI":"10.1007\/3-540-44886-1_25"},{"unstructured":"Liu, Y., Liu, J., Lin, Z., Luo, X., Duan, J.: I know it\u2019s you: Touch behavioral characteristics recognition on smartphone based on pattern password., In PACIS, p. 118 (2015)","key":"540_CR28"},{"doi-asserted-by":"crossref","unstructured":"Aviv, A.J., Maguire, J., Prak, J.L.: Analyzing the impact of collection methods and demographics for android\u2019s pattern unlock. In: Proceedings of the Workshop on Usable Security (USEC). Internet Society (2016)","key":"540_CR29","DOI":"10.14722\/usec.2016.23025"},{"doi-asserted-by":"crossref","unstructured":"Ye, G., Tang, Z., Fang, D., Chen, X.,. Kim, K.I, Taylor, B., Wang, Z.: Cracking android pattern lock in five attempts. In: Proceedings of the 2017 Network and Distributed System Security Symposium 2017 (NDSS 17) (Internet Society, 2017) (2017)","key":"540_CR30","DOI":"10.14722\/ndss.2017.23130"},{"unstructured":"Harbach, M., Von\u00a0Zezschwitz, E., Fichtner, A., De\u00a0Luca, A., Smith, M.: It\u2019s a hard lock life: A field study of smartphone (un) locking behavior and risk perception. In: Proceedings of the 10th Symposium on Usable Privacy and Security, pp. 213\u2013230. $$\\{$$SOUPS$$\\}$$ (2014)","key":"540_CR31"},{"unstructured":"Andriotis, P., Tryfonas, T., Yu, Z.: Poster: breaking the android pattern lock screen with neural networks and smudge attacks. In: Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec\u201914) (2014)","key":"540_CR32"},{"doi-asserted-by":"crossref","unstructured":"Aviv, A.J., Budzitowski, D., Kuber, R.: Is bigger better? comparing user-generated passwords on 3 $$\\times $$ 3 vs. 4 $$\\times $$ 4 grid sizes for android\u2019s pattern unlock. In: Proceedings of the 31st Annual Computer Security Applications Conference, pp. 301\u2013310. ACM (2015)","key":"540_CR33","DOI":"10.1145\/2818000.2818014"},{"key":"540_CR34","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1016\/j.cose.2013.12.001","volume":"42","author":"T Kwon","year":"2014","unstructured":"Kwon, T., Na, S.: Tinylock: Affordable defense against smudge attacks on smartphone pattern lock systems. Comput. Sec. 42, 137 (2014)","journal-title":"Comput. Sec."},{"issue":"1","key":"540_CR35","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1587\/transinf.2017MUP0012","volume":"101","author":"S Higashikawa","year":"2018","unstructured":"Higashikawa, S., Kosugi, T., Kitajima, S., Mambo, M.: Shoulder-surfing resistant authentication using pass pattern of pattern lock. IEICE Trans. Inf. Syst. 101(1), 45 (2018)","journal-title":"IEICE Trans. Inf. Syst."},{"key":"540_CR36","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1007\/978-3-319-23258-4_3","volume-title":"Intelligent Systems Technologies and Applications","author":"M Amruth","year":"2016","unstructured":"Amruth, M., Praveen, K.: Intelligent Systems Technologies and Applications, pp. 23\u201331. Springer, New York (2016)"},{"issue":"2","key":"540_CR37","first-page":"64","volume":"8","author":"M Guerar","year":"2017","unstructured":"Guerar, M., Merlo, A., Migliardi, M.: Clickpattern: a pattern lock system resilient to smudge and side-channel attacks. JoWUA 8(2), 64 (2017)","journal-title":"JoWUA"},{"issue":"5","key":"540_CR38","first-page":"1113","volume":"28","author":"S Kim","year":"2018","unstructured":"Kim, S., Ku, Y., Kwon, T.: Smudge-based smart device fingerprint authentication attack study. J. Korea Instit. Inf. Sec. Cryptol. 28(5), 1113 (2018)","journal-title":"J. Korea Instit. Inf. Sec. Cryptol."},{"doi-asserted-by":"crossref","unstructured":"Abdelrahman, Y., Khamis, M., Schneegass, S., Alt, F.: Stay cool! understanding thermal attacks on mobile-based user authentication. In: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, pp. 3751\u20133763. ACM (2017)","key":"540_CR39","DOI":"10.1145\/3025453.3025461"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-021-00540-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-021-00540-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-021-00540-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,10]],"date-time":"2022-02-10T13:15:59Z","timestamp":1644498959000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-021-00540-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2,21]]},"references-count":39,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,2]]}},"alternative-id":["540"],"URL":"https:\/\/doi.org\/10.1007\/s10207-021-00540-z","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"type":"print","value":"1615-5262"},{"type":"electronic","value":"1615-5270"}],"subject":[],"published":{"date-parts":[[2021,2,21]]},"assertion":[{"value":"21 February 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"All procedures performed in studies involving human participants were in accordance with the ethical standards of the institutional and\/or national research committee and with the 1964 Helsinki declaration and its later amendments or comparable ethical standards.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"Informed consent was obtained from each study participant after they were told of the potential risks and benefits as well as the investigational nature of the study.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}]}}