{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:08:31Z","timestamp":1750306111365,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,5,14]],"date-time":"2017-05-14T00:00:00Z","timestamp":1494720000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,5,14]]},"DOI":"10.1145\/3093293.3093296","type":"proceedings-article","created":{"date-parts":[[2017,6,28]],"date-time":"2017-06-28T12:30:41Z","timestamp":1498653041000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Behavioral Fingerprint Authentication"],"prefix":"10.1145","author":[{"given":"Chuan-Chin","family":"Teo","sequence":"first","affiliation":[{"name":"Multimedia University, Malacca, Malaysia"}]},{"given":"Han-Foon","family":"Neo","sequence":"additional","affiliation":[{"name":"Multimedia University, Malacca, Malaysia"}]}],"member":"320","published-online":{"date-parts":[[2017,5,14]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11265-016-1114-9"},{"key":"e_1_3_2_1_2_1","article-title":"Minutiae-based Triangular Acreage Fingerprint Match Method","volume":"9","author":"Wang G.","year":"2015","journal-title":"International Journal of Security and Its Applications."},{"key":"e_1_3_2_1_3_1","unstructured":"Costigan N. 2015. Behavioral biometrics: The password you can't forget. DOI= https:\/\/www.helpnetsecurity.com\/2015\/03\/26\/behavioral-biometrics-the-password-you-cant-forget\/.  Costigan N. 2015. Behavioral biometrics: The password you can't forget. DOI= https:\/\/www.helpnetsecurity.com\/2015\/03\/26\/behavioral-biometrics-the-password-you-cant-forget\/."},{"volume-title":"Minutiae-Based Template Synthesis and Matching Using Hierarchical Delaunay Triangulations. International Conference on Biometrics: Theory, Applications and Systems. (Sept.","year":"2007","author":"Uz T.","key":"e_1_3_2_1_4_1"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2006.250"},{"key":"e_1_3_2_1_6_1","unstructured":"Peterson A. 2015. OPM says 5.6 million fingerprints stolen in cyberattack five times as many as previously thought. DOI= https:\/\/www.washingtonpost.com\/news\/the-switch\/wp\/2015\/09\/23\/opm-now-says-more-than-five-million-fingerprints-compromised-in-breaches\/?utm_term=.9f0343804b40.  Peterson A. 2015. OPM says 5.6 million fingerprints stolen in cyberattack five times as many as previously thought. DOI= https:\/\/www.washingtonpost.com\/news\/the-switch\/wp\/2015\/09\/23\/opm-now-says-more-than-five-million-fingerprints-compromised-in-breaches\/?utm_term=.9f0343804b40."},{"key":"e_1_3_2_1_7_1","unstructured":"McGoogan C. and Demetriou D. 2017. Peace sign selfies could let hackers copy your fingerprints. DOI= http:\/\/www.telegraph.co.uk\/technology\/2017\/01\/12\/peace-sign-selfies-could-let-hackers-copy-fingerprints\/.  McGoogan C. and Demetriou D. 2017. Peace sign selfies could let hackers copy your fingerprints. DOI= http:\/\/www.telegraph.co.uk\/technology\/2017\/01\/12\/peace-sign-selfies-could-let-hackers-copy-fingerprints\/."},{"key":"e_1_3_2_1_8_1","unstructured":"Feng J. Jain A. and Ross A. 2009. Fingerprint Alteration. MSU Technical Report MSU-CSE-09-30 (Dec 2009) DOI= http:\/\/www.cse.msu.edu\/~rossarun\/pubs\/FengJainRoss_AlteredFingerprint_TechReport09.pdf  Feng J. Jain A. and Ross A. 2009. Fingerprint Alteration. MSU Technical Report MSU-CSE-09-30 (Dec 2009) DOI= http:\/\/www.cse.msu.edu\/~rossarun\/pubs\/FengJainRoss_AlteredFingerprint_TechReport09.pdf"},{"key":"e_1_3_2_1_9_1","unstructured":"Kent J. 2005. Malaysia car thieves steal finger. DOI= http:\/\/news.bbc.co.uk\/2\/hi\/asia-pacific\/4396831.stm.  Kent J. 2005. Malaysia car thieves steal finger. DOI= http:\/\/news.bbc.co.uk\/2\/hi\/asia-pacific\/4396831.stm."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2013.830347"},{"volume-title":"Proceedings of the IEEE, 91","year":"2003","author":"Lawrence O. G.","key":"e_1_3_2_1_11_1"},{"key":"e_1_3_2_1_12_1","first-page":"1","article-title":"A Survey of Biometric keystroke Dynamics: Approaches, Security and Challenges","volume":"5","author":"Shanmugapriya D.","year":"2009","journal-title":"International Journal of Computer Science and Information Security."},{"volume-title":"International Journal on Security and its Application, 8, 3 (May","year":"2014","author":"Wu","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","first-page":"95","article-title":"Review on Authentication Methods","volume":"7","author":"Idrus S. Z. S.","year":"2013","journal-title":"Australian Journal of Basic and Applied Sciences"},{"key":"e_1_3_2_1_15_1","article-title":"Review of Iris Recognition: An evolving Biometrics Identification Technology","volume":"2","author":"Sarode N. S.","year":"2014","journal-title":"International Journal of Innovative Science and Modern Engineering."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.3745\/JIPS.2009.5.2.041"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.244676"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2003.1251145"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.735803"},{"key":"e_1_3_2_1_20_1","article-title":"Human Identity Verification by Using Physiological and Behavioural Biometric Traits","volume":"1","author":"Hossain S. M. E.","year":"2011","journal-title":"International Journal of Bioscience, Biochemistry and Bioinformatics"},{"key":"e_1_3_2_1_21_1","first-page":"6","article-title":"Behavioural Biometrics and Cognitive Security Authentication Comparison Study","volume":"4","author":"Khare K.","year":"2013","journal-title":"Advanced Computing An International Journal (ACIJ)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.13176\/11.764"},{"volume-title":"An Exploration of Usable Authentication Mechanism for Virtual Reality System. 2016 IEEE Asia Pacific Conference on Circuits and Systems (APCCAS). 458--460","author":"Yu Z.","key":"e_1_3_2_1_23_1"},{"key":"e_1_3_2_1_24_1","unstructured":"Paul A. G. James L. F Elaine M. N. Ray A. P. Andrew R. R. William E. B. Justin P. R.2017. DRAFT NIST Special Publication 800-63B Digital Identity Guidelines. National Institute of Standards and Technology Special Publication 800-63B DOI= https:\/\/pages.nist.gov\/800-63-3\/sp800-63b.html  Paul A. G. James L. F Elaine M. N. Ray A. P. Andrew R. R. William E. B. Justin P. R.2017. DRAFT NIST Special Publication 800-63B Digital Identity Guidelines. National Institute of Standards and Technology Special Publication 800-63B DOI= https:\/\/pages.nist.gov\/800-63-3\/sp800-63b.html"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1093\/nar\/gkh340"},{"key":"e_1_3_2_1_26_1","first-page":"649","article-title":"On Interpreting the Effects of Repetition: Solving a Problem Versus Remembering a Solution","volume":"7","author":"Larry L. J.","year":"1978","journal-title":"Journal of Verbal Learning and Verbal Behavior"}],"event":{"name":"ICBBT '17: 9th International Conference on Bioinformatics and Biomedical Technology","sponsor":["Department of Computer Science, University of Szeged Department of Computer Science, University of Szeged","University of Lisbon University of Lisbon"],"location":"Lisbon Portugal","acronym":"ICBBT '17"},"container-title":["Proceedings of the 9th International Conference on Bioinformatics and Biomedical Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3093293.3093296","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3093293.3093296","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:36:23Z","timestamp":1750217783000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3093293.3093296"}},"subtitle":["The Next Future"],"short-title":[],"issued":{"date-parts":[[2017,5,14]]},"references-count":26,"alternative-id":["10.1145\/3093293.3093296","10.1145\/3093293"],"URL":"https:\/\/doi.org\/10.1145\/3093293.3093296","relation":{},"subject":[],"published":{"date-parts":[[2017,5,14]]},"assertion":[{"value":"2017-05-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}