{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,12,20]],"date-time":"2023-12-20T01:54:44Z","timestamp":1703037284601},"reference-count":57,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2014,10,15]],"date-time":"2014-10-15T00:00:00Z","timestamp":1413331200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1007\/s12652-014-0248-5","type":"journal-article","created":{"date-parts":[[2014,10,14]],"date-time":"2014-10-14T14:22:06Z","timestamp":1413296526000},"page":"909-918","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["On user authentication by means of video events recognition"],"prefix":"10.1007","volume":"5","author":[{"given":"Luigi","family":"Catuogno","sequence":"first","affiliation":[]},{"given":"Clemente","family":"Galdi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,10,15]]},"reference":[{"key":"248_CR1","unstructured":"Bellard F (2013) FFMPEG official web site. http:\/\/www.ffmpeg.org"},{"key":"248_CR2","unstructured":"Bertini M, Del Bimbo A, Torniai C, Cucchiara R, Grana C (2006) Mom: multimedia ontology manager. a framework for automatic annotation and semantic retrieval of video sequences. In: Proceedings of the 14th annual ACM international conference on Multimedia, ACM, pp 787\u2013788"},{"key":"248_CR3","doi-asserted-by":"crossref","unstructured":"Bicakci K, Atalay N, Yuceel M, Gurbaslar H, Erdeniz B (2009) Towards Usable Solutions to Graphical Password Hotspot Problem. In: 2009 33rd Annual IEEE International Computer Software and Applications Conference, IEEE, pp 318\u2013323","DOI":"10.1109\/COMPSAC.2009.153"},{"key":"248_CR4","unstructured":"Blonder GE (1996) Graphical passwords. Lucent Technologies Inc, Murray Hill, NJ (US), US Patent no. 5559961"},{"issue":"1\u20132","key":"248_CR5","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1016\/S0164-1212(03)00004-9","volume":"71","author":"C Blundo","year":"2004","unstructured":"Blundo C, D\u2019Arco P, Santis AD, Galdi C (2004) Hyppocrates: a new proactive password checker. J Syst Softw 71(1\u20132):163\u2013175","journal-title":"J Syst Softw"},{"issue":"3","key":"248_CR6","doi-asserted-by":"crossref","first-page":"416","DOI":"10.1109\/TSMCC.2008.919173","volume":"38","author":"D Brezeale","year":"2008","unstructured":"Brezeale D, Cook DJ (2008) Automatic video classification: a survey of the literature. IEEE Trans Syst, Man, Cyber, Part C 38(3):416\u2013430","journal-title":"IEEE Trans Syst, Man, Cyber, Part C"},{"key":"248_CR7","doi-asserted-by":"crossref","unstructured":"Bursztein E, Martin M, Mitchell J (2011) Text-based captcha strengths and weaknesses. In: Proceedings of the 18th ACM conference on Computer and communications security, ACM, pp 125\u2013138","DOI":"10.1145\/2046707.2046724"},{"key":"248_CR8","doi-asserted-by":"crossref","unstructured":"Catuogno L, Galdi C (2008) A graphical pin authentication mechanism for smart cards and low-cost devices. In: Proceedings of the 2nd Workshop on Information Security Theory and Practices (WISTP 08) Sevilla (Spain), May 13\u201316, Springer-Verlag, Lecture Notes in Computer Science, vol 5019","DOI":"10.1007\/978-3-540-79966-5_2"},{"key":"248_CR9","doi-asserted-by":"crossref","unstructured":"Catuogno L, Galdi C (2010) On the security of a two-factor authentication scheme. In: Proceedings of the 4th Workshop on Information Security Theory and Practices (WISTP 2010) Passau (Germany), April 12\u201314, 2010, Springer, Lecture Notes in Computer Science, vol 6033","DOI":"10.1007\/978-3-642-12368-9_19"},{"key":"248_CR10","doi-asserted-by":"crossref","unstructured":"Catuogno L, Galdi C (2013) Towards the design of a film-based graphical password scheme. In: Information Science and Technology (ICIST), 2013 International Conference on, IEEE, pp 388\u2013393","DOI":"10.1109\/ICIST.2013.6747577"},{"key":"248_CR11","doi-asserted-by":"crossref","unstructured":"Catuogno L, Galdi C (2014) Analysis of a two-factor graphical password scheme. Intern J Inform Sec pp 1\u201317. doi: 10.1007\/s10207-014-0228-y","DOI":"10.1007\/s10207-014-0228-y"},{"issue":"4","key":"248_CR12","doi-asserted-by":"crossref","first-page":"327","DOI":"10.1109\/TDSC.2006.53","volume":"3","author":"A Ciaramella","year":"2006","unstructured":"Ciaramella A, D\u2019Arco P, De Santis A, Galdi C, Tagliaferri R (2006) Neural network techniques for proactive password checking. IEEE Trans Dependable Secure Compu 3(4):327\u2013339","journal-title":"IEEE Trans Dependable Secure Compu"},{"issue":"1","key":"248_CR13","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1016\/j.ijhcs.2005.04.020","volume":"63","author":"A Angeli De","year":"2005","unstructured":"De Angeli A, Coventry L, Johnson G, Renaud K (2005) Is a picture really worth a thousand words? exploring the feasibility of graphical authentication systems. Intern J Human-comp Stud 63(1):128\u2013152","journal-title":"Intern J Human-comp Stud"},{"key":"248_CR14","doi-asserted-by":"crossref","unstructured":"De Luca A, Denzel M, Hussmann H (2009) Look into my eyes!: can you guess my password? In: Proceedings of the 5th Symposium on Usable Privacy and Security, ACM, p 7","DOI":"10.1145\/1572532.1572542"},{"key":"248_CR15","unstructured":"Dhamija R, Perring A (2000) D\u00e8j\u00e1 vu: a user study using images for authentication. In: IX USENIX UNIX Security Symposium, Denver, Colorado (USA)"},{"key":"248_CR16","doi-asserted-by":"crossref","unstructured":"Gao H, Liu X (2009) A new graphical password scheme against spyware by using captcha. In: Proceedings of the 5th Symposium on Usable Privacy and Security, SOUPS 2009, Mountain View, California, USA, July 15\u201317, 2009, ACM, ACM International Conference Proceeding Series","DOI":"10.1145\/1572532.1572560"},{"key":"248_CR17","doi-asserted-by":"crossref","unstructured":"Gibson M, Renaud K, Conrad M, Maple C (2009) Musipass: authenticating me softly with my song. In: Proceedings of the 2009 workshop on New security paradigms workshop, ACM, pp 85\u2013100","DOI":"10.1145\/1719030.1719043"},{"key":"248_CR18","doi-asserted-by":"crossref","unstructured":"Golle P (2008) Machine learning attacks against the asirra captcha. In: Proceedings of the 15th ACM conference on Computer and communications security, ACM, pp 535\u2013542","DOI":"10.1145\/1455770.1455838"},{"key":"248_CR19","doi-asserted-by":"crossref","unstructured":"Golle P, Wagner D (2007) Cryptanalysis of a cognitive authentication scheme (extended abstract). In: IEEE Symposium on Security and Privacy, IEEE Comp Soc, pp 66\u201370","DOI":"10.1109\/SP.2007.13"},{"key":"248_CR20","unstructured":"Gomes L (2006) Will all of us get our 15 minutes on a youtube video? The Wall Street Journal online, August 30, 2006"},{"key":"248_CR21","doi-asserted-by":"crossref","first-page":"2703","DOI":"10.1073\/pnas.95.5.2703","volume":"95","author":"CL Grady","year":"1998","unstructured":"Grady CL, Mcintosh AR, Rajah MN, Craik FIM (1998) Neural correlates of the episodic encoding of pictures and words. Proc Natl Acad Sci USA 95:2703\u20132708","journal-title":"Proc Natl Acad Sci USA"},{"key":"248_CR22","unstructured":"Haller NM (1994) The S\/KEY one-time password system. In: Proceedings of the Symposium on Network and Distributed System Security, pp 151\u2013157"},{"key":"248_CR23","doi-asserted-by":"crossref","unstructured":"Harada A, Isarida T, Mizuno T, Nishigaki M (2006) A user authentication system using schema of visual memory. In: Biologically Inspired Approaches to Advanced Information Technology: Second International Workshop, Bioadit 2006, Osaka, Japan 26\u201327, 2006, Proceedings, Springer, Lecture Notes in Computer Science, vol 3853, pp 338\u2013345","DOI":"10.1007\/11613022_28"},{"key":"248_CR24","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1145\/1408664.1408670","volume-title":"Proceedings of the 4th symposium on Usable privacy and security","author":"E Hayashi","year":"2008","unstructured":"Hayashi E, Dhamija R, Christin N, Perrig A (2008) Use your illusion: Secure authentication usable anywhere. Proceedings of the 4th symposium on Usable privacy and security. ACM New York, NY, USA, pp 35\u201345"},{"key":"248_CR25","unstructured":"Hitchcock A (1955) To catch a thief. http:\/\/www.imdb.com\/title\/tt0048728\/"},{"key":"248_CR26","unstructured":"Hopper NJ, Blum M (2001) Secure Human Identification Protocols. In: ASIACRYPT 2001, Springer, Lecture Notes in Computer Science, vol 2248, pp 52\u201366"},{"key":"248_CR27","unstructured":"Hoque E, Hoeber O, Strong G, Gong M (2013) Combining conceptual query expansion and visual search results exploration for web image retrieval. J Amb Intell Human Compu 4(3):389\u2013400, http:\/\/www.scopus.com\/inward\/record.url?eid=2-s2.0-84878537451&partnerID=40&md5=a14779b5761ae42396369f31fec49759, cited By (since 1996)2"},{"key":"248_CR28","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1007\/11967668_5","volume":"4377","author":"H Jameel","year":"2006","unstructured":"Jameel H, Shaikh R, Lee H, Lee S (2006) Human identification through image evaluation using secret predicates. Lect Notes Comp Sci 4377:67","journal-title":"Lect Notes Comp Sci"},{"key":"248_CR29","doi-asserted-by":"crossref","unstructured":"Jensen W, Gavrila S, Korolev V, Ayers R, Swanstrom R (2003) Picture password: a visual login technique for mobile devices. In: National Institute of Standards and Technologies Interagency Report, vol NISTIR 7030","DOI":"10.6028\/NIST.IR.7030"},{"key":"248_CR30","unstructured":"Jermyn I, Mayer A, Monrose F, Reiter MK, Rubin AD (1999) The design and analysis of graphical passwords. In: Proceedings of the 8th USENIX security Symposium, Washington"},{"key":"248_CR31","unstructured":"Jones MJ, Viola P (2001) Robust real-time object detection. In: Workshop on Statistical and Computational Theories of Vision, vol 266"},{"key":"248_CR32","doi-asserted-by":"crossref","unstructured":"Ko T (2008) A survey on behavior analysis in video surveillance for homeland security applications. In: AIPR, IEEE Comp Soc, pp 1\u20138","DOI":"10.1109\/AIPR.2008.4906450"},{"key":"248_CR33","doi-asserted-by":"crossref","unstructured":"Kumar M, Garfinkel T, Boneh D, Winograd T (2007) Reducing shoulder-surfing by using gaze-based password entry. In: Symposium On Usable Privacy and Security (SOUPS)","DOI":"10.1145\/1280680.1280683"},{"issue":"6","key":"248_CR34","doi-asserted-by":"crossref","first-page":"705","DOI":"10.1007\/s12652-012-0147-6","volume":"4","author":"A Lanat","year":"2013","unstructured":"Lanat A, Valenza G, Scilingo E (2013) Eye gaze patterns in emotional pictures. J Ambi Intell Human Compu 4(6):705\u2013715","journal-title":"J Ambi Intell Human Compu"},{"issue":"5","key":"248_CR35","doi-asserted-by":"crossref","first-page":"489","DOI":"10.1109\/TSMCC.2009.2023380","volume":"39","author":"G Lavee","year":"2009","unstructured":"Lavee G, Rivlin E, Rudzsky M (2009) Understanding video events: A survey of methods for automatic interpretation of semantic occurrences in video.IEEE Trans Syst, Man, Cybern, Part C 39(5):489\u2013504","journal-title":"IEEE Trans Syst, Man, Cybern, Part C"},{"key":"248_CR36","doi-asserted-by":"crossref","unstructured":"Li S, Shah S, Khan M, Khayam S, Sadeghi A, Schmitz R (2010) Breaking e-banking CAPTCHAs. In: Proceedings of the 26th Annual Computer Security Applications Conference, ACM, pp 171\u2013180","DOI":"10.1145\/1920261.1920288"},{"key":"248_CR37","doi-asserted-by":"crossref","unstructured":"Maetz Y, Onno S, Heen O (2009) Recall-a-story, a story-telling graphical password system. In: Proceedings of the 5th Symposium on Usable Privacy and Security, ACM, p 27","DOI":"10.1145\/1572532.1572566"},{"key":"248_CR38","doi-asserted-by":"crossref","unstructured":"Matsumoto T (1996) Human-computer cryptography: An attempt. In: ACM Conference on Computer and Communications Security, pp 68\u201375","DOI":"10.1145\/238168.238190"},{"key":"248_CR39","unstructured":"McDonald DL, Atkinson RJ, Metz C (1995) One time passwords in everything (OPIE): Experiences with building and using stronger authentication. In: Fifth USENIX UNIX Security Symposium, Salt Lake City, Utah (USA)"},{"issue":"1","key":"248_CR40","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1109\/TMM.2011.2168948","volume":"14","author":"M Merler","year":"2012","unstructured":"Merler M, Huang B, Xie L, Hua G, Natsev A (2012) Semantic model vectors for complex video event recognition. IIEEE Trans Multimed 14(1):88\u2013101","journal-title":"IEEE Trans Multimed"},{"key":"248_CR41","unstructured":"Real User Coorp (1998) Pass faces. http:\/\/www.realuser.com"},{"key":"248_CR42","doi-asserted-by":"crossref","first-page":"236","DOI":"10.1145\/1030083.1030116","volume-title":"CCS \u201904: Proceedings of the 11th ACM conference on Computer and communications security","author":"V Roth","year":"2004","unstructured":"Roth V, Richter K, Freidinger R (2004) A pin-entry method resilient against shoulder surfing. CCS \u201904: Proceedings of the 11th ACM conference on Computer and communications security. ACM Press, New York, NY, USA, pp 236\u2013245"},{"key":"248_CR43","doi-asserted-by":"crossref","unstructured":"Ryoo MS, Chen CC, Aggarwal JK, Roy-Chowdhury A (2010) An overview of contest on semantic description of human activities (sdha) 2010. In: Proceedings of the 20th International conference on Recognizing patterns in signals, speech, images, and videos, Springer-Verlag, Berlin, Heidelberg, ICPR\u201910, pp 270\u2013285, http:\/\/dl.acm.org\/citation.cfm?id=1939170.1939208","DOI":"10.1007\/978-3-642-17711-8_28"},{"key":"248_CR44","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1109\/ACSAC.2008.18","volume-title":"Proceedings of the 2008 Annual Computer Security Applications Conference","author":"A Salehi-Abari","year":"2008","unstructured":"Salehi-Abari A, Thorpe J, van Oorschot P (2008) On purely automated attacks and click-based graphical passwords. Proceedings of the 2008 Annual Computer Security Applications Conference. IEEE Computer Society, Washington, DC, USA, pp 111\u2013120"},{"key":"248_CR45","doi-asserted-by":"crossref","unstructured":"Sasamoto H, Christin N, Hayashi E (2008) Undercover: authentication usable in front of prying eyes. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ACM, pp 183\u2013192","DOI":"10.1145\/1357054.1357085"},{"issue":"1","key":"248_CR46","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1023\/B:MTAP.0000046380.27575.a5","volume":"25","author":"CGM Snoek","year":"2005","unstructured":"Snoek CGM, Worring M (2005) Multimodal video indexing: A review of the state-of-the-art. Multimed Tools Appl 25(1):5\u201335. doi: 10.1023\/B:MTAP.0000046380.27575.a5","journal-title":"Multimed Tools Appl"},{"key":"248_CR47","unstructured":"Sobrado L, Birget JC (2002) Graphical password. \u201cThe Rutgers Scholar, an electronic Bulletin for undergraduate research\u201d 4"},{"key":"248_CR48","unstructured":"Suo X, Zhu Y, Owen GS (2005) Graphical passwords: a survey. In: Proceedings of 21st Annual Computer Security Application Conference (ACSAC 2005) december 5\u20139, Tucson AZ (US), pp 463\u2013472"},{"key":"248_CR49","unstructured":"The Blender Foundation (2013) Blender official web site. http:\/\/www.blender.org"},{"key":"248_CR50","unstructured":"Thorpe J, van Oorschot P (2007) Human-seeded attacks and exploiting hot-spots in graphical passwords. In: Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium table of contents, USENIX Association Berkeley, CA, USA"},{"key":"248_CR51","unstructured":"Tompkins DAD, Hoos HH (2004) UBCSAT: An implementation and experimentation environment for SLS algorithms for SAT and MAX-SAT. In: Proceedings of the Seventh International Conference on Theory and Applications of Satisfiability Testing (SAT 2004), pp 37\u201346"},{"key":"248_CR52","unstructured":"Weinshall D (2006) Cognitive authentication schemes safe against spyware (short paper). In: IEEE Symposium on Security and Privacy, IEEE Computer Society, pp 295\u2013300"},{"issue":"1\u20132","key":"248_CR53","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1016\/j.ijhcs.2005.04.010","volume":"63","author":"S Wiedenbeck","year":"2005","unstructured":"Wiedenbeck S, Waters J, Birget J, Brodskiy A, Memon N (2005) PassPoints: Design and longitudinal evaluation of a graphical password system. Intern J Human-Comp Stud 63(1\u20132):102\u2013127","journal-title":"Intern J Human-Comp Stud"},{"key":"248_CR54","doi-asserted-by":"crossref","unstructured":"Wiedenbeck S, Waters J, Sobrado L, Birget JC (2006) Design and evaluation of a shoulder-surfing resistant graphical password scheme. In: Proceedings of Advanced Visual Interfaces AVI 2006, Venice ITALY","DOI":"10.1145\/1133265.1133303"},{"key":"248_CR55","doi-asserted-by":"crossref","unstructured":"Worring M, Snoek CG, De Rooij O, Nguyen G, Smeulders A (2007) The mediamill semantic video search engine. In: Acoustics, Speech and Signal Processing, 2007. ICASSP 2007. IEEE International Conference on, IEEE, vol 4, pp IV-1213","DOI":"10.1109\/ICASSP.2007.367294"},{"key":"248_CR56","doi-asserted-by":"crossref","unstructured":"Yan J, El Ahmad AS (2008) A low-cost attack on a microsoft captcha. In: Proceedings of the 15th ACM conference on Computer and communications security, ACM, pp 543\u2013554","DOI":"10.1145\/1455770.1455839"},{"key":"248_CR57","unstructured":"YouTube LLC (2013) Youtube fact sheet. http:\/\/www.youtube.com\/t\/fact_sheet"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-014-0248-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12652-014-0248-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-014-0248-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,16]],"date-time":"2019-08-16T05:25:53Z","timestamp":1565933153000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12652-014-0248-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10,15]]},"references-count":57,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2014,12]]}},"alternative-id":["248"],"URL":"https:\/\/doi.org\/10.1007\/s12652-014-0248-5","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"value":"1868-5137","type":"print"},{"value":"1868-5145","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,10,15]]}}}