{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T02:54:32Z","timestamp":1776394472369,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,9,13]],"date-time":"2014-09-13T00:00:00Z","timestamp":1410566400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,9,13]]},"DOI":"10.1145\/2632048.2636090","type":"proceedings-article","created":{"date-parts":[[2014,9,17]],"date-time":"2014-09-17T14:22:41Z","timestamp":1410963761000},"page":"775-786","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":54,"title":["SmudgeSafe"],"prefix":"10.1145","author":[{"given":"Stefan","family":"Schneegass","sequence":"first","affiliation":[{"name":"University of Stuttgart HCI Group"}]},{"given":"Frank","family":"Steimle","sequence":"additional","affiliation":[{"name":"University of Stuttgart HCI Group"}]},{"given":"Andreas","family":"Bulling","sequence":"additional","affiliation":[{"name":"Max Planck Institute for Informatics Perceptual User Interfaces Group"}]},{"given":"Florian","family":"Alt","sequence":"additional","affiliation":[{"name":"University of Munich Media Informatics Group"}]},{"given":"Albrecht","family":"Schmidt","sequence":"additional","affiliation":[{"name":"University of Stuttgart HCI Group"}]}],"member":"320","published-online":{"date-parts":[[2014,9,13]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/RVSP.2011.92"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462096.2462098"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/1925004.1925009"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208712"},{"key":"e_1_3_2_2_5_1","volume-title":"Computer Security--ESORICS","author":"Chiasson S.","year":"2007","unstructured":"Chiasson , S. , van Oorschot , P. C. , and Biddle , R . Graphical password authentication using cued click points . In Computer Security--ESORICS 2007 . Springer , 2007, 359--374. Chiasson, S., van Oorschot, P. C., and Biddle, R. Graphical password authentication using cued click points. In Computer Security--ESORICS 2007. Springer, 2007, 359--374."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335358"},{"key":"e_1_3_2_2_7_1","volume-title":"Tapi: touch-screen authentication using partitioned images","author":"Citty J.","year":"2010","unstructured":"Citty , J. , and Hutchings , D. R . Tapi: touch-screen authentication using partitioned images . In Elon University , Citeseer ( 2010 ). Citty, J., and Hutchings, D. R. Tapi: touch-screen authentication using partitioned images. In Elon University, Citeseer (2010)."},{"key":"e_1_3_2_2_8_1","volume-title":"Proceedings of the 13th USENIX Security Symposium","author":"Davis D.","year":"2004","unstructured":"Davis , D. , Monrose , F. , and Reiter , M. K . On user choice in graphical password schemes . In Proceedings of the 13th USENIX Security Symposium ( 2004 ), 11--11. Davis, D., Monrose, F., and Reiter, M. K. On user choice in graphical password schemes. In Proceedings of the 13th USENIX Security Symposium (2004), 11--11."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208544"},{"key":"e_1_3_2_2_10_1","volume-title":"Proceedings of the 9th USENIX Security Symposium","author":"Dhamija R.","year":"2000","unstructured":"Dhamija , R. , and Perrig , A . Deja vu: a user study using images for authentication . In Proceedings of the 9th USENIX Security Symposium ( 2000 ), 4--4. Dhamija, R., and Perrig, A. Deja vu: a user study using images for authentication. In Proceedings of the 9th USENIX Security Symposium (2000), 4--4."},{"key":"e_1_3_2_2_11_1","unstructured":"D\u00f6rflinger T. Voth A. Kr\u00e4mer J. and Fromm R. \"my smartphone is a safe!\" - the user's point of view regarding novel authentication methods and gradual security levels on smartphones. S. K. Katsikas and P. Samarati Eds. (2010) 155--164.  D\u00f6rflinger T. Voth A. Kr\u00e4mer J. and Fromm R. \"my smartphone is a safe!\" - the user's point of view regarding novel authentication methods and gradual security levels on smartphones. S. K. Katsikas and P. Samarati Eds. (2010) 155--164."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315252"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518837"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2428955.2429008"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1408664.1408670"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2013.202"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251421.1251422"},{"key":"e_1_3_2_2_18_1","volume-title":"June","author":"Kelion L.","year":"2013","unstructured":"Kelion , L. Google facial password patent aims to boost android security. BBC News -- Technology , June 2013 . http:\/\/www.bbc.co.uk\/news\/technology-22790221, last accessed: March 8, 2014. Kelion, L. Google facial password patent aims to boost android security. BBC News -- Technology, June 2013. http:\/\/www.bbc.co.uk\/news\/technology-22790221, last accessed: March 8, 2014."},{"key":"e_1_3_2_2_19_1","unstructured":"Microsoft. Personalize your PC. http:\/\/windows.microsoft.com\/en-us\/windows-8\/picture-passwords last accessed: March 8 2014.  Microsoft. Personalize your PC. http:\/\/windows.microsoft.com\/en-us\/windows-8\/picture-passwords last accessed: March 8 2014."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240758"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDEW.2012.83"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2493190.2493223"},{"key":"e_1_3_2_2_23_1","unstructured":"Nielsen Norman Group. Usability 101: Introduction to Usability. http:\/\/www.nngroup.com\/articles\/usability-101-introduction-to-usability\/ last accessed: March 8 2014.  Nielsen Norman Group. Usability 101: Introduction to Usability. http:\/\/www.nngroup.com\/articles\/usability-101-introduction-to-usability\/ last accessed: March 8 2014."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370329"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1054972.1055101"},{"key":"e_1_3_2_2_26_1","unstructured":"Passfaces Corporation. Passfaces: Two Factor Authentication for the Enterprise. http:\/\/www.passfaces.com\/ last accessed: March 8 2014.  Passfaces Corporation. Passfaces: Two Factor Authentication for the Enterprise. http:\/\/www.passfaces.com\/ last accessed: March 8 2014."},{"key":"e_1_3_2_2_27_1","volume-title":"Automatic Target Recognizer System and Technology Conference","author":"Peters R. A.","year":"1990","unstructured":"Peters , R. A. , and Strickland , R. N . Image complexity metrics for automatic target recognizers . In Automatic Target Recognizer System and Technology Conference ( 1990 ), 1--17. Peters, R. A., and Strickland, R. N. Image complexity metrics for automatic target recognizers. In Automatic Target Recognizer System and Technology Conference (1990), 1--17."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1203221"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2468356.2468497"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501615"},{"key":"e_1_3_2_2_31_1","first-page":"2","article-title":"Pass-go: A proposal to improve the usability of graphical passwords","volume":"7","author":"Tao H.","year":"2008","unstructured":"Tao , H. , and Adams , C . Pass-go: A proposal to improve the usability of graphical passwords . IJ Network Security 7 , 2 ( 2008 ), 273--292. Tao, H., and Adams, C. Pass-go: A proposal to improve the usability of graphical passwords. IJ Network Security 7, 2 (2008), 273--292.","journal-title":"IJ Network Security"},{"key":"e_1_3_2_2_32_1","volume-title":"Proceedings of 16th USENIX Security Symposium","author":"Thorpe J.","year":"2007","unstructured":"Thorpe , J. , and van Oorschot , P. C. Human-seeded attacks and exploiting hot-spots in graphical passwords . In Proceedings of 16th USENIX Security Symposium ( 2007 ), 8:1--8:16. Thorpe, J., and van Oorschot, P. C. Human-seeded attacks and exploiting hot-spots in graphical passwords. In Proceedings of 16th USENIX Security Symposium (2007), 8:1--8:16."},{"key":"e_1_3_2_2_33_1","volume-title":"Exploratory data analysis","author":"Tukey J. W.","year":"1977","unstructured":"Tukey , J. W. Exploratory data analysis . Addison-Wesley , Reading, Mass . {u.a.}, 1977 . Tukey, J. W. Exploratory data analysis. Addison-Wesley, Reading, Mass. {u.a.}, 1977."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2493190.2493231"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2449396.2449432"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.04.010"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381934.2381947"}],"event":{"name":"UbiComp '14: The 2014 ACM Conference on Ubiquitous Computing","location":"Seattle Washington","acronym":"UbiComp '14","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGCHI ACM Special Interest Group on Computer-Human Interaction","SIGSPATIAL ACM Special Interest Group on Spatial Information"]},"container-title":["Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2632048.2636090","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2632048.2636090","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:56:12Z","timestamp":1750229772000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2632048.2636090"}},"subtitle":["geometric image transformations for smudge-resistant user authentication"],"short-title":[],"issued":{"date-parts":[[2014,9,13]]},"references-count":37,"alternative-id":["10.1145\/2632048.2636090","10.1145\/2632048"],"URL":"https:\/\/doi.org\/10.1145\/2632048.2636090","relation":{},"subject":[],"published":{"date-parts":[[2014,9,13]]},"assertion":[{"value":"2014-09-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}