{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:32:01Z","timestamp":1750307521377,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,7,15]],"date-time":"2008-07-15T00:00:00Z","timestamp":1216080000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,7,15]]},"DOI":"10.1145\/1600176.1600192","type":"proceedings-article","created":{"date-parts":[[2009,9,8]],"date-time":"2009-09-08T12:53:09Z","timestamp":1252414389000},"page":"89-101","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["VideoTicket"],"prefix":"10.1145","author":[{"given":"D.","family":"Nali","sequence":"first","affiliation":[{"name":"Carleton University, Ottawa, Canada"}]},{"given":"P. C.","family":"van Oorschot","sequence":"additional","affiliation":[{"name":"Carleton University, Ottawa, Canada"}]},{"given":"A.","family":"Adler","sequence":"additional","affiliation":[{"name":"Carleton University, Ottawa, Canada"}]}],"member":"320","published-online":{"date-parts":[[2008,7,15]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2007.907036"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.628714"},{"volume-title":"Client-Side Defense Against Web-Based Identity Theft. In Annual Network and Distributed System Security Symposium (NDSS '04)","year":"2004","author":"Chou N.","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","first-page":"176","volume-title":"International Conference on Audio and Video-Based Biometric Person Authentication","author":"Choudhury T.","year":"1999"},{"volume-title":"Inc.","year":"2005","author":"Cranor L.","key":"e_1_3_2_1_5_1"},{"key":"e_1_3_2_1_6_1","unstructured":"CypherMint. CypherMint PayCash System. http:\/\/www.cypermint.com. Site accessed in Nov. 2006.  CypherMint. CypherMint PayCash System. http:\/\/www.cypermint.com. Site accessed in Nov. 2006."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1073001.1073009"},{"key":"e_1_3_2_1_8_1","first-page":"858","volume-title":"International Conference on Pattern Recognition","volume":"4","author":"J.","year":"2000"},{"key":"e_1_3_2_1_9_1","first-page":"1","article-title":"Face recognition algorithms as models of the other race effect","volume":"96","author":"Furl N.","year":"2002","journal-title":"Cognitive Science"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1064009.1064026"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0042-6989(97)00439-2"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/2907327.2907456"},{"key":"e_1_3_2_1_13_1","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"crossref","first-page":"365","DOI":"10.1007\/11520153_19","volume-title":"Nonlinear Speech Modelling","author":"Karam W.","year":"2005"},{"key":"e_1_3_2_1_14_1","first-page":"365","volume-title":"Mobile Multimedia\/Image Processing for Military and Security Applications","author":"Karam W.","year":"2006"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1099-0720(199706)11:3<211::AID-ACP430>3.0.CO;2-O"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2005.126"},{"volume-title":"Multi-modal Biometric Authentication on the SecurePhone PDA. In Workshop on Multimodal User Authentication (MMUA '06)","year":"2006","author":"Koreman J.","key":"e_1_3_2_1_17_1"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1600176.1600191"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1037\/1076-898X.9.1.33"},{"key":"e_1_3_2_1_20_1","first-page":"340","volume-title":"Computer Vision and Pattern Recognition","volume":"1","author":"Liu X.","year":"2003"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/11507840_9"},{"key":"e_1_3_2_1_22_1","unstructured":"A. J. Mansfield and J. L. Wayman. Best Practices in Testing and Reporting Performance of Biometric Devices: Version 2.01 2002. National Physical Laboratory (UK). Report CMSC 14\/02. http:\/\/www.cesg.gov.uk\/site\/ast\/biometrics\/media\/BestPractice.pdf. Site accessed in April 2007.  A. J. Mansfield and J. L. Wayman. Best Practices in Testing and Reporting Performance of Biometric Devices: Version 2.01 2002. National Physical Laboratory (UK). Report CMSC 14\/02. http:\/\/www.cesg.gov.uk\/site\/ast\/biometrics\/media\/BestPractice.pdf. Site accessed in April 2007."},{"key":"e_1_3_2_1_23_1","unstructured":"A. Martin and M. Przybocki. NIST Speaker Recognition Evaluation Chronicles 2004. NIST. http:\/\/www.nist.gov\/speech\/publications\/papersrc\/ody2004NIST-v1.pdf. Site accessed in April 2007.  A. Martin and M. Przybocki. NIST Speaker Recognition Evaluation Chronicles 2004. NIST. http:\/\/www.nist.gov\/speech\/publications\/papersrc\/ody2004NIST-v1.pdf. Site accessed in April 2007."},{"key":"e_1_3_2_1_24_1","unstructured":"A. Martin and M. Przybocki. Biometric Sample Quality Standard Draft (Revision 4) 2005. International Committee for IT Standards. Document number M1\/06-0003. http:\/\/www.nist.gov\/speech\/publications\/papersrc\/ody2004NIST-v1.pdf. Site accessed in April 2007.  A. Martin and M. Przybocki. Biometric Sample Quality Standard Draft (Revision 4) 2005. International Committee for IT Standards. Document number M1\/06-0003. http:\/\/www.nist.gov\/speech\/publications\/papersrc\/ody2004NIST-v1.pdf. Site accessed in April 2007."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/10958513_14"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2004.827358"},{"key":"e_1_3_2_1_27_1","unstructured":"Mobiqa. Mobi-Pass 2006. http:\/\/www.mobiqa.com\/prod_pass.html. Site accessed in July 2006.  Mobiqa. Mobi-Pass 2006. http:\/\/www.mobiqa.com\/prod_pass.html. Site accessed in July 2006."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.1107"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1364-6613(02)01908-3"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"P. Phillips P. Grother R. Micheals D. Blackburn E. Tabassi and M. Bone. Face Recognition Vendor Test 2002 Overview and Summary 2003. NIST. http:\/\/www.frvt.org\/DLs\/FRVT_2002_Overview_and_Summary.pdf. Site accessed in April 2007.  P. Phillips P. Grother R. Micheals D. Blackburn E. Tabassi and M. Bone. Face Recognition Vendor Test 2002 Overview and Summary 2003. NIST. http:\/\/www.frvt.org\/DLs\/FRVT_2002_Overview_and_Summary.pdf. Site accessed in April 2007.","DOI":"10.6028\/NIST.IR.6965"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.820040"},{"key":"e_1_3_2_1_32_1","unstructured":"P. Phillips W. Scruggs A. O\u0160Toole P. Flynn K. Bowyer C. Schott and M. Sharpe. Face Recognition Vendor Test 2006 and Iris Challenge Evaluation 2006 Large-Scale Results 2007. NIST. http:\/\/www.frvt.org\/FRVT2006\/docs\/FRVT2006andICE2006LargeScaleReport.pdf. Site accessed in April 2007.  P. Phillips W. Scruggs A. O\u0160Toole P. Flynn K. Bowyer C. Schott and M. Sharpe. Face Recognition Vendor Test 2006 and Iris Challenge Evaluation 2006 Large-Scale Results 2007. NIST. http:\/\/www.frvt.org\/FRVT2006\/docs\/FRVT2006andICE2006LargeScaleReport.pdf. Site accessed in April 2007."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.268"},{"key":"e_1_3_2_1_34_1","first-page":"95","volume-title":"Joint Audio-Visual Speech Processing for Recognition and Enhancement. In Conference on Audio-Visual Speech Processing","author":"Potamianos G.","year":"2003"},{"key":"e_1_3_2_1_35_1","unstructured":"J. S. Research. 2006 Identity Fraud Survey Report 2006. http:\/\/www.javelinstrategy.com\/research. Site accessed in June 2006.  J. S. Research. 2006 Identity Fraud Survey Report 2006. http:\/\/www.javelinstrategy.com\/research. Site accessed in June 2006."},{"key":"e_1_3_2_1_36_1","first-page":"4072","volume-title":"An Overview of Automatic Speaker Recognition Technology. In International Conference on Acoustics, Speech, and Signal Processing","volume":"4","author":"Reynolds D.","year":"2002"},{"key":"e_1_3_2_1_37_1","first-page":"36","volume-title":"Human Recognition of Familiar and Unfamiliar People in Naturalistic Video Analysis and Modeling of Faces and Gestures. In International Workshop on Analysis Models for Faces and Gestures","author":"Roark D.","year":"2003"},{"key":"e_1_3_2_1_38_1","series-title":"Lecture Notes in Computer Science","first-page":"1611","volume-title":"Audio- and Video-Based Biometric Person Authentication","author":"Ross A.","year":"2001"},{"key":"e_1_3_2_1_39_1","first-page":"17","volume-title":"Stronger Password Authentication Using Browser Extensions. In USENIX Security Symposium","author":"Ross B.","year":"2005"},{"key":"e_1_3_2_1_40_1","unstructured":"S. Schuckers L. Hornak T. Norman R. Derakhshani and S. Parthasaradhi. Issues for Liveness Detection in Biometrics. 2002. Biometrics Consortium Conferene. http:\/\/www.biometrics.org\/html\/bc2002_sept_program\/2_bc0130_DerakhshabiBrief.pdf. Site accessed in April 2007.  S. Schuckers L. Hornak T. Norman R. Derakhshani and S. Parthasaradhi. Issues for Liveness Detection in Biometrics. 2002. Biometrics Consortium Conferene. http:\/\/www.biometrics.org\/html\/bc2002_sept_program\/2_bc0130_DerakhshabiBrief.pdf. Site accessed in April 2007."},{"key":"e_1_3_2_1_41_1","unstructured":"C. Technologies. Cinepak. http:\/\/www.cinepak.com\/begin.html. Site accessed in Aug. 2006.  C. Technologies. Cinepak. http:\/\/www.cinepak.com\/begin.html. Site accessed in Aug. 2006."},{"key":"e_1_3_2_1_42_1","unstructured":"J. Wayman. A Definition of \"Biometrics\" 2001. National Biometrics Test Center Colllected Works. http:\/\/www.engr.sjsu.edu\/biometrics\/nbtccw.pdf. Site accessed in April 2007.  J. Wayman. A Definition of \"Biometrics\" 2001. National Biometrics Test Center Colllected Works. http:\/\/www.engr.sjsu.edu\/biometrics\/nbtccw.pdf. Site accessed in April 2007."},{"key":"e_1_3_2_1_43_1","first-page":"117","volume-title":"Conference on Audio-Visual Speech Processing","author":"Yoshinaga T.","year":"2003"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/954339.954342"},{"key":"e_1_3_2_1_45_1","first-page":"226","volume-title":"Computer Vision and Pattern Recognition","author":"Zhou S.","year":"2002"}],"event":{"name":"NSPW '07: Proceedings of the 2007 New Security Paradigms Workshop","sponsor":["San Diego Super Computing Ctr San Diego Super Computing Ctr","James Madison University","ACSA Applied Computing Security Assoc"],"location":"New Hampshire","acronym":"NSPW '07"},"container-title":["Proceedings of the 2007 Workshop on New Security Paradigms"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1600176.1600192","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1600176.1600192","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:18:16Z","timestamp":1750249096000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1600176.1600192"}},"subtitle":["detecting identity fraud attempts via audiovisual certificates and signatures"],"short-title":[],"issued":{"date-parts":[[2008,7,15]]},"references-count":45,"alternative-id":["10.1145\/1600176.1600192","10.1145\/1600176"],"URL":"https:\/\/doi.org\/10.1145\/1600176.1600192","relation":{},"subject":[],"published":{"date-parts":[[2008,7,15]]},"assertion":[{"value":"2008-07-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}