{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T08:58:53Z","timestamp":1767085133810,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,12,4]],"date-time":"2017-12-04T00:00:00Z","timestamp":1512345600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["No. NRF-2015R1A2A2A01004792"],"award-info":[{"award-number":["No. NRF-2015R1A2A2A01004792"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"name":"IITP","award":["No.2017-0-00380"],"award-info":[{"award-number":["No.2017-0-00380"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,12,4]]},"DOI":"10.1145\/3134600.3134643","type":"proceedings-article","created":{"date-parts":[[2017,12,4]],"date-time":"2017-12-04T19:18:32Z","timestamp":1512415112000},"page":"512-527","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Here Is Your Fingerprint!"],"prefix":"10.1145","author":[{"given":"Hoyeon","family":"Lee","sequence":"first","affiliation":[{"name":"Yonsei University, Seoul, Korea"}]},{"given":"Seungyeon","family":"Kim","sequence":"additional","affiliation":[{"name":"Yonsei University, Seoul, Korea"}]},{"given":"Taekyoung","family":"Kwon","sequence":"additional","affiliation":[{"name":"Yonsei University, Seoul, Korea"}]}],"member":"320","published-online":{"date-parts":[[2017,12,4]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Charles Arthur. 2013. iPhone 5S fingerprint sensor hacked by Germany's Chaos Computer Club. Retrieved from https:\/\/www.theguardian.com\/technology\/2013\/sep\/22\/apple-iphone-fingerprint-scanner-hacked.  Charles Arthur. 2013. iPhone 5S fingerprint sensor hacked by Germany's Chaos Computer Club. Retrieved from https:\/\/www.theguardian.com\/technology\/2013\/sep\/22\/apple-iphone-fingerprint-scanner-hacked."},{"key":"e_1_3_2_1_2_1","volume-title":"Smith","author":"Aviv Adam J.","year":"2010","unstructured":"Adam J. Aviv , Katherine Gibson , Evan Mossop , Matt Blaze , and Jonathan M . Smith . 2010 . Smudge attacks on smartphone touch screens. In Proceedings of WOOT '10, Vol. 10 . 1--7. Adam J. Aviv, Katherine Gibson, Evan Mossop, Matt Blaze, and Jonathan M. Smith. 2010. Smudge attacks on smartphone touch screens. In Proceedings of WOOT '10, Vol. 10. 1--7."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2371574.2371612"},{"key":"e_1_3_2_1_4_1","volume-title":"The Watershed Transformation Applied to Image Segmentation. SCANNING MICROSCOPY-SUPPLEMENT-","author":"Beucher Serge","year":"1992","unstructured":"Serge Beucher . 1992. The Watershed Transformation Applied to Image Segmentation. SCANNING MICROSCOPY-SUPPLEMENT- ( 1992 ), 299--299. Serge Beucher. 1992. The Watershed Transformation Applied to Image Segmentation. SCANNING MICROSCOPY-SUPPLEMENT- (1992), 299--299."},{"key":"e_1_3_2_1_5_1","first-page":"120","article-title":"The opencv library","volume":"25","author":"Gary Bradski","year":"2000","unstructured":"Gary Bradski et al. 2000 . The opencv library . Doctor Dobbs Journal 25 , 11 (2000), 120 -- 126 . Gary Bradski et al. 2000. The opencv library. Doctor Dobbs Journal 25, 11 (2000), 120--126.","journal-title":"Doctor Dobbs Journal"},{"key":"e_1_3_2_1_6_1","volume-title":"Jain","author":"Cao Kai","year":"2016","unstructured":"Kai Cao and Anil K . Jain . 2016 . Hacking mobile phones using 2D printed fingerprints. Technical Report. Department of Computer Science and Engineering, Michigan State University . Kai Cao and Anil K.Jain. 2016. Hacking mobile phones using 2D printed fingerprints. Technical Report. Department of Computer Science and Engineering, Michigan State University."},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of SOUPS '15","author":"Cherapau Ivan","year":"2015","unstructured":"Ivan Cherapau , Ildar Muslukhov , Nalin Asanka , and Konstantin Beznosov . 2015 . On the impact of Touch ID on iPhone passcodes . In Proceedings of SOUPS '15 . 257--276. Ivan Cherapau, Ildar Muslukhov, Nalin Asanka, and Konstantin Beznosov. 2015. On the impact of Touch ID on iPhone passcodes. In Proceedings of SOUPS '15. 257--276."},{"key":"e_1_3_2_1_8_1","unstructured":"Chaos Computer Club. 2004. How to fake fingerprints? Retrieved from https:\/\/biometrics.mainguet.org\/alive\/site_archive\/CCC_01_How_to_fake_fingerprints.htm.  Chaos Computer Club. 2004. How to fake fingerprints? Retrieved from https:\/\/biometrics.mainguet.org\/alive\/site_archive\/CCC_01_How_to_fake_fingerprints.htm."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/37.3-4.256"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1520\/JFS10373J"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702141"},{"key":"e_1_3_2_1_12_1","volume-title":"Marking comprising two patterns on a surface. (Aug","author":"Decoux Eric","year":"2017","unstructured":"Eric Decoux and Patrick Bovey . 2017. Marking comprising two patterns on a surface. (Aug . 2017 ). Eric Decoux and Patrick Bovey. 2017. Marking comprising two patterns on a surface. (Aug. 2017)."},{"key":"e_1_3_2_1_13_1","volume-title":"Vulnerabilities of fingerprint reader to fake fingerprints attacks. Forensic science international 204, 1","author":"Espinoza Marcela","year":"2011","unstructured":"Marcela Espinoza , Christophe Champod , and Pierre Margot . 2011. Vulnerabilities of fingerprint reader to fake fingerprints attacks. Forensic science international 204, 1 ( 2011 ), 41--49. Marcela Espinoza, Christophe Champod, and Pierre Margot. 2011. Vulnerabilities of fingerprint reader to fake fingerprints attacks. Forensic science international 204, 1 (2011), 41--49."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2012.155"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2015.0018"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-010-9316-0"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2481386"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0969-4765(14)70088-8"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/876865.877083"},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of AutoID '07","author":"Yan Bee","year":"2007","unstructured":"Bee Yan . Hiew, Andrew Beng Jin Teoh , and Ying-Han Pang . 2007 . Touch-less fingerprint recognition system . In Proceedings of AutoID '07 . IEEE, 24--29. Bee Yan. Hiew, Andrew Beng Jin Teoh, and Ying-Han Pang. 2007. Touch-less fingerprint recognition system. In Proceedings of AutoID '07. IEEE, 24--29."},{"key":"e_1_3_2_1_21_1","first-page":"772","article-title":"Ultrasound-Based Force Sensing and Touch Sensing. (Sept. 26 2017)","volume":"9","author":"Huppi Brian Q","year":"2017","unstructured":"Brian Q Huppi , Martin P. Grunthaner , John G. Elias , Sinan Filiz , and Steven P. Hotelling . 2017 . Ultrasound-Based Force Sensing and Touch Sensing. (Sept. 26 2017) . US Patent 9 , 772 ,721. Brian Q Huppi, Martin P. Grunthaner, John G. Elias, Sinan Filiz, and Steven P. Hotelling. 2017. Ultrasound-Based Force Sensing and Touch Sensing. (Sept. 26 2017). US Patent 9,772,721.","journal-title":"US Patent"},{"key":"e_1_3_2_1_22_1","unstructured":"ILuvTrading. 2014. How to hack the Samsung Galaxy S5 Fingerprint Scanner w Elmers Glue. Retrieved from https:\/\/www.youtube.com\/watch?v=KBMqoUYxUJs.  ILuvTrading. 2014. How to hack the Samsung Galaxy S5 Fingerprint Scanner w Elmers Glue. Retrieved from https:\/\/www.youtube.com\/watch?v=KBMqoUYxUJs."},{"key":"e_1_3_2_1_23_1","unstructured":"Apple Inc. 2015. About Touch ID security on iPhone and iPad. Retrieved from https:\/\/support.apple.com\/en-us\/HT204587.  Apple Inc. 2015. About Touch ID security on iPhone and iPad. Retrieved from https:\/\/support.apple.com\/en-us\/HT204587."},{"key":"e_1_3_2_1_24_1","unstructured":"JLaservideo. 2016. How To Copy a Fingerprint Like a Spy - iPhone Touch ID Hack!!! Retrieved from https:\/\/www.youtube.com\/watch?v=bp-MrrAmprA.  JLaservideo. 2016. How To Copy a Fingerprint Like a Spy - iPhone Touch ID Hack!!! Retrieved from https:\/\/www.youtube.com\/watch?v=bp-MrrAmprA."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2008.4712049"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3138832"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.12.001"},{"key":"e_1_3_2_1_28_1","volume-title":"Gaensslen","author":"Lee Henry C.","year":"2001","unstructured":"Henry C. Lee , Robert Ramotowski , and Robert E . Gaensslen . 2001 . Advances in fingerprint technology. CRC press . Henry C. Lee, Robert Ramotowski, and Robert E. Gaensslen. 2001. Advances in fingerprint technology. CRC press."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:VISI.0000029664.99615.94"},{"key":"e_1_3_2_1_30_1","volume-title":"Proceedings of SPIE '02","volume":"4677","author":"Matsumoto Tsutomu","year":"2002","unstructured":"Tsutomu Matsumoto , Hiroyuki Matsumoto , Koji Yamada , and Satoshi Hoshino . 2002 . Impact of artificial \"Gummy\" fingers on fingerprint systems . In Proceedings of SPIE '02 , Vol. 4677 . 275--289. Tsutomu Matsumoto, Hiroyuki Matsumoto, Koji Yamada, and Satoshi Hoshino. 2002. Impact of artificial \"Gummy\" fingers on fingerprint systems. In Proceedings of SPIE '02, Vol. 4677. 275--289."},{"volume-title":"Mobile ID device best practice recommendation, version 1. 0","author":"Orandi Shahram","key":"e_1_3_2_1_31_1","unstructured":"Shahram Orandi . 2010. Mobile ID device best practice recommendation, version 1. 0 . Vol. 500 . DIANE Publishing . Shahram Orandi. 2010. Mobile ID device best practice recommendation, version 1. 0. Vol. 500. DIANE Publishing."},{"key":"e_1_3_2_1_32_1","volume-title":"Smart phone thefts rose to 3.1 million","author":"Reports Consumer","year":"2013","unstructured":"Consumer Reports . 2014. Smart phone thefts rose to 3.1 million in 2013 . Retrieved from http:\/\/www.consumerreports.org\/cro\/news\/2014\/04\/smart-phone-thefts-rose-to-3-1-million-last-year\/index.htm. Consumer Reports. 2014. Smart phone thefts rose to 3.1 million in 2013. Retrieved from http:\/\/www.consumerreports.org\/cro\/news\/2014\/04\/smart-phone-thefts-rose-to-3-1-million-last-year\/index.htm."},{"key":"e_1_3_2_1_33_1","unstructured":"Marc Rogers. 2014. Hacking Apple TouchID on the iPhone 6. Retrieved from https:\/\/www.youtube.com\/watch?v=GPLiEC_tG1k.  Marc Rogers. 2014. Hacking Apple TouchID on the iPhone 6. Retrieved from https:\/\/www.youtube.com\/watch?v=GPLiEC_tG1k."},{"key":"e_1_3_2_1_34_1","unstructured":"Oki Rosgani. 2013. faking the Apple trackID fingerprint sensor. Retrieved from https:\/\/www.youtube.com\/watch?v=qjRD8_ZoGuE.  Oki Rosgani. 2013. faking the Apple trackID fingerprint sensor. Retrieved from https:\/\/www.youtube.com\/watch?v=qjRD8_ZoGuE."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2691658"},{"key":"e_1_3_2_1_36_1","first-page":"582","article-title":"Electronic device including finger biometric sensor carried by a touch display and related methods. (Feb. 28 2017)","volume":"9","author":"Setlak Dale R.","year":"2017","unstructured":"Dale R. Setlak . 2017 . Electronic device including finger biometric sensor carried by a touch display and related methods. (Feb. 28 2017) . US Patent 9 , 582 ,102. Dale R. Setlak. 2017. Electronic device including finger biometric sensor carried by a touch display and related methods. (Feb. 28 2017). US Patent 9,582,102.","journal-title":"US Patent"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0379-0738(00)00465-5"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2013.0020"},{"key":"e_1_3_2_1_39_1","unstructured":"M.Hasan Qureshi 68575548 views. 2016. Hack Any Fingerprint Using Glue Paste --- Biometric Hacking --- Fingerprint Sensor Hack. Retrieved from https:\/\/www.youtube.com\/watch?v=mqsPEmfCvTA.  M.Hasan Qureshi 68575548 views. 2016. Hack Any Fingerprint Using Glue Paste --- Biometric Hacking --- Fingerprint Sensor Hack. Retrieved from https:\/\/www.youtube.com\/watch?v=mqsPEmfCvTA."},{"key":"e_1_3_2_1_40_1","first-page":"2","article-title":"The NBIS-EC software is subject to U.S. export control laws. NIST, Gaithersburg MD, USA","volume":"1","author":"Watson Craig I.","year":"2007","unstructured":"Craig I. Watson , Michael D. Garris , Elham Tabassi , Charles L. Wilson , R. Michael McCabe , Stanley Janet , and Kenneth Ko . 2007 . The NBIS-EC software is subject to U.S. export control laws. NIST, Gaithersburg MD, USA , Tech. Rep 1 (2007), 2 . Craig I. Watson, Michael D. Garris, Elham Tabassi, Charles L. Wilson, R. Michael McCabe, Stanley Janet, and Kenneth Ko. 2007. The NBIS-EC software is subject to U.S. export control laws. NIST, Gaithersburg MD, USA, Tech. Rep 1 (2007), 2.","journal-title":"Tech. Rep"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"crossref","unstructured":"Craig I. Watson Michael D. Garris Elham Tabassi Charles L. Wilson R. Michael Mccabe Stanley Janet and Kenneth Ko. 2007. User's guide to NIST Biometric Image Software (NBIS). (2007).  Craig I. Watson Michael D. Garris Elham Tabassi Charles L. Wilson R. Michael Mccabe Stanley Janet and Kenneth Ko. 2007. User's guide to NIST Biometric Image Software (NBIS). (2007).","DOI":"10.6028\/NIST.IR.7392"},{"key":"e_1_3_2_1_42_1","volume-title":"Wilson","author":"Watson Craig I.","year":"2005","unstructured":"Craig I. Watson and Charles L . Wilson . 2005 . Effect of image size and compression on one-to-one fingerprint matching. US Department of Commerce, National Institute of Standards and Technology . Craig I. Watson and Charles L. Wilson. 2005. Effect of image size and compression on one-to-one fingerprint matching. US Department of Commerce, National Institute of Standards and Technology."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786567.2793704"},{"key":"e_1_3_2_1_44_1","volume-title":"Jain","author":"Yoon Soweon","year":"2013","unstructured":"Soweon Yoon , KaiCao, Eryun Liu , and Anil K . Jain . 2013 . LFIQ : Latent Fingerprint Image Quality. In Proceedings of BTAS '13. IEEE , 1--8. Soweon Yoon, KaiCao, Eryun Liu, and Anil K.Jain. 2013. LFIQ: Latent Fingerprint Image Quality. In Proceedings of BTAS '13. IEEE, 1--8."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381934.2381947"},{"volume-title":"Graphics gems IV","author":"Zuiderveld Karel","key":"e_1_3_2_1_46_1","unstructured":"Karel Zuiderveld . 1994. Contrast limited adaptive histogram equalization . In Graphics gems IV . Academic Press Professional, Inc. , 474--485. Karel Zuiderveld. 1994. Contrast limited adaptive histogram equalization. In Graphics gems IV. Academic Press Professional, Inc., 474--485."}],"event":{"name":"ACSAC 2017: 2017 Annual Computer Security Applications Conference","acronym":"ACSAC 2017","location":"Orlando FL USA"},"container-title":["Proceedings of the 33rd Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3134600.3134643","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3134600.3134643","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:11Z","timestamp":1750217411000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3134600.3134643"}},"subtitle":["Actual Risk versus User Perception of Latent Fingerprints and Smudges Remaining on Smartphones"],"short-title":[],"issued":{"date-parts":[[2017,12,4]]},"references-count":46,"alternative-id":["10.1145\/3134600.3134643","10.1145\/3134600"],"URL":"https:\/\/doi.org\/10.1145\/3134600.3134643","relation":{},"subject":[],"published":{"date-parts":[[2017,12,4]]},"assertion":[{"value":"2017-12-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}