{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:34:41Z","timestamp":1750221281589,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":49,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,11,3]],"date-time":"2017-11-03T00:00:00Z","timestamp":1509667200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["CNS 1547502"],"award-info":[{"award-number":["CNS 1547502"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Laboratory for Analytic Sciences"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,11,3]]},"DOI":"10.1145\/3140241.3140242","type":"proceedings-article","created":{"date-parts":[[2017,10,31]],"date-time":"2017-10-31T14:58:58Z","timestamp":1509461938000},"page":"111-122","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Remote Proofs of Video Freshness for Public Spaces"],"prefix":"10.1145","author":[{"given":"Junia","family":"Valente","sequence":"first","affiliation":[{"name":"University of Texas at Dallas, Richardson, TX, USA"}]},{"given":"Alvaro A.","family":"Cardenas","sequence":"additional","affiliation":[{"name":"University of Texas at Dallas, Richardson, TX, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,11,3]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"1099","article-title":"A sift-based forensic method for copy-move attack detection and transformation recovery. Information Forensics and Security","volume":"6","author":"Amerini Irene","year":"2011","unstructured":"Irene Amerini , Lamberto Ballan , Roberto Caldelli , Alberto Del Bimbo , and Giuseppe Serra . 2011 . A sift-based forensic method for copy-move attack detection and transformation recovery. Information Forensics and Security , IEEE Transactions on 6 , 3 (2011), 1099 -- 1110 . Irene Amerini, Lamberto Ballan, Roberto Caldelli, Alberto Del Bimbo, and Giuseppe Serra. 2011. A sift-based forensic method for copy-move attack detection and transformation recovery. Information Forensics and Security, IEEE Transactions on 6, 3 (2011), 1099--1110.","journal-title":"IEEE Transactions on"},{"key":"e_1_3_2_1_2_1","volume-title":"Google testing facial recognition payments on Android and iOS in San Francisco. (March","author":"Anderson Martin","year":"2016","unstructured":"Martin Anderson . 2016. Google testing facial recognition payments on Android and iOS in San Francisco. (March 2016 ). https:\/\/thestack.com\/cloud\/2016\/03\/03\/google-handsfree-facial-recognition-trial-san-francisco Martin Anderson. 2016. Google testing facial recognition payments on Android and iOS in San Francisco. (March 2016). https:\/\/thestack.com\/cloud\/2016\/03\/03\/google-handsfree-facial-recognition-trial-san-francisco"},{"key":"e_1_3_2_1_3_1","unstructured":"Business Insider. [n. d.]. Facebook Users Are Uploading 350 Million New Photos Each Day. http:\/\/www.businessinsider.com\/facebook-350-million-photos-each-day-2013-9. ([n. d.]).  Business Insider. [n. d.]. Facebook Users Are Uploading 350 Million New Photos Each Day. http:\/\/www.businessinsider.com\/facebook-350-million-photos-each-day-2013-9. ([n. d.])."},{"key":"e_1_3_2_1_4_1","volume-title":"Camera-based access to visual information. Assistive technology for blindness and low vision","author":"Coughlan James","year":"2013","unstructured":"James Coughlan and Roberto Manduchi . 2013. Camera-based access to visual information. Assistive technology for blindness and low vision ( 2013 ), 219--246. James Coughlan and Roberto Manduchi. 2013. Camera-based access to visual information. Assistive technology for blindness and low vision (2013), 219--246."},{"volume-title":"Advances in Cryptology (CRYPTO'14)","author":"Fisch Ben","key":"e_1_3_2_1_5_1","unstructured":"Ben Fisch , Daniel Freund , and Moni Naor . 2014. Physical zeroknowledge proofs of physical properties . In Advances in Cryptology (CRYPTO'14) . Springer , 313--336. Ben Fisch, Daniel Freund, and Moni Naor. 2014. Physical zeroknowledge proofs of physical properties. In Advances in Cryptology (CRYPTO'14). Springer, 313--336."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2661334.2661404"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1038\/nature13457"},{"key":"e_1_3_2_1_8_1","volume-title":"A Fort Knox for Web crypto keys: Inside Symantec's SSL certificate vault. (Nov","author":"Goodin Dan","year":"2012","unstructured":"Dan Goodin . 2012. A Fort Knox for Web crypto keys: Inside Symantec's SSL certificate vault. (Nov . 2012 ). https:\/\/arstechnica.com\/security\/2012\/11\/inside-symantecs-sslcertificate-vault\/ Dan Goodin. 2012. A Fort Knox for Web crypto keys: Inside Symantec's SSL certificate vault. (Nov. 2012). https:\/\/arstechnica.com\/security\/2012\/11\/inside-symantecs-sslcertificate-vault\/"},{"key":"e_1_3_2_1_9_1","volume-title":"Prosecutors suspect man hacked lottery computers to score winning ticket. (April","author":"Goodin Dan","year":"2015","unstructured":"Dan Goodin . 2015. Prosecutors suspect man hacked lottery computers to score winning ticket. (April 2015 ). https:\/\/arstechnica.com\/tech-policy\/2015\/04\/prosecutors-suspect-man-hacked-lottery-computers-to-score-winning-ticket\/ Dan Goodin. 2015. Prosecutors suspect man hacked lottery computers to score winning ticket. (April 2015). https:\/\/arstechnica.com\/tech-policy\/2015\/04\/prosecutors-suspect-man-hacked-lottery-computers-to-score-winning-ticket\/"},{"key":"e_1_3_2_1_10_1","unstructured":"Antti Haapala. [n. d.]. Levenshtein Python C. https:\/\/github.com\/ztane\/python-Levenshtein\/. ([n. d.]).  Antti Haapala. [n. d.]. Levenshtein Python C. https:\/\/github.com\/ztane\/python-Levenshtein\/. ([n. d.])."},{"key":"e_1_3_2_1_11_1","volume-title":"Exploiting Network Surveillance Cameras Like a Hollywood Hacker. https:\/\/youtu.be\/B8DjTcANBx0. (Nov","author":"Heffner Craig","year":"2013","unstructured":"Craig Heffner . 2013. Exploiting Network Surveillance Cameras Like a Hollywood Hacker. https:\/\/youtu.be\/B8DjTcANBx0. (Nov . 2013 ). Craig Heffner. 2013. Exploiting Network Surveillance Cameras Like a Hollywood Hacker. https:\/\/youtu.be\/B8DjTcANBx0. (Nov. 2013)."},{"key":"e_1_3_2_1_12_1","volume-title":"Arik Friedman, Guillaume Jourjon, Mohammad Ali Kaafar, and M. Zubair Shafiq.","author":"Ikram Muhammad","year":"2015","unstructured":"Muhammad Ikram , Lucky Onwuzurike , Shehroze Farooqi , Emiliano De Cristofaro , Arik Friedman, Guillaume Jourjon, Mohammad Ali Kaafar, and M. Zubair Shafiq. 2015 . Combating Fraud in Online Social Networks: Detecting Stealthy Facebook Like Farms . (2015). Muhammad Ikram, Lucky Onwuzurike, Shehroze Farooqi, Emiliano De Cristofaro, Arik Friedman, Guillaume Jourjon, Mohammad Ali Kaafar, and M. Zubair Shafiq. 2015. Combating Fraud in Online Social Networks: Detecting Stealthy Facebook Like Farms. (2015)."},{"key":"e_1_3_2_1_13_1","unstructured":"Instagram Press. [n. d.]. Instagram Stats. https:\/\/www.instagram.com\/press\/. ([n. d.]).  Instagram Press. [n. d.]. Instagram Stats. https:\/\/www.instagram.com\/press\/. ([n. d.])."},{"key":"e_1_3_2_1_14_1","volume-title":"Sound-Proof: Usable Two-Factor Authentication Based on Ambient Sound. In 24th USENIX Security Symposium. 483--498","author":"Karapanos Nikolaos","year":"2015","unstructured":"Nikolaos Karapanos , Claudio Marforio , Claudio Soriente , and Srdjan Capkun . 2015 . Sound-Proof: Usable Two-Factor Authentication Based on Ambient Sound. In 24th USENIX Security Symposium. 483--498 . Nikolaos Karapanos, Claudio Marforio, Claudio Soriente, and Srdjan Capkun. 2015. Sound-Proof: Usable Two-Factor Authentication Based on Ambient Sound. In 24th USENIX Security Symposium. 483--498."},{"key":"e_1_3_2_1_15_1","volume-title":"Amazon wants to replace passwords with selfies and videos. https:\/\/thestack.com\/security\/2016\/03\/15\/ amazon-wants-to-replace-passwords-with-selfies-and-videos\/. (March","author":"MacGregor Alice","year":"2016","unstructured":"Alice MacGregor . 2016. Amazon wants to replace passwords with selfies and videos. https:\/\/thestack.com\/security\/2016\/03\/15\/ amazon-wants-to-replace-passwords-with-selfies-and-videos\/. (March 2016 ). Alice MacGregor. 2016. Amazon wants to replace passwords with selfies and videos. https:\/\/thestack.com\/security\/2016\/03\/15\/ amazon-wants-to-replace-passwords-with-selfies-and-videos\/. (March 2016)."},{"key":"e_1_3_2_1_16_1","volume-title":"MasterCard rolls out 'selfie' verification for mobile payments. https:\/\/thestack.com\/iot\/2016\/02\/22\/mastercard-rolls-out-selfie-verification-for-mobile-payments\/. (Feb","author":"MacGregor Alice","year":"2016","unstructured":"Alice MacGregor . 2016. MasterCard rolls out 'selfie' verification for mobile payments. https:\/\/thestack.com\/iot\/2016\/02\/22\/mastercard-rolls-out-selfie-verification-for-mobile-payments\/. (Feb . 2016 ). Alice MacGregor. 2016. MasterCard rolls out 'selfie' verification for mobile payments. https:\/\/thestack.com\/iot\/2016\/02\/22\/mastercard-rolls-out-selfie-verification-for-mobile-payments\/. (Feb. 2016)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2063176.2063200"},{"volume-title":"IEEE Symposium on Security and Privacy (S&P). 110--124","author":"McCune J. M.","key":"e_1_3_2_1_18_1","unstructured":"J. M. McCune , A. Perrig , and M. K. Reiter . 2005. Seeing-isbelieving: using camera phones for human-verifiable authentication . In IEEE Symposium on Security and Privacy (S&P). 110--124 . J. M. McCune, A. Perrig, and M. K. Reiter. 2005. Seeing-isbelieving: using camera phones for human-verifiable authentication. In IEEE Symposium on Security and Privacy (S&P). 110--124."},{"key":"e_1_3_2_1_19_1","unstructured":"James McNair. 2011. What is the average reading speed and the best rate of reading. (2011).  James McNair. 2011. What is the average reading speed and the best rate of reading. (2011)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCST.2013.2280899"},{"key":"e_1_3_2_1_21_1","volume-title":"Black","author":"Pieterse Vreda","year":"2015","unstructured":"Vreda Pieterse and Paul E . Black . 2015 . Levenshtein distance. In Dictionary of Algorithms & Data Structures . (2015). Vreda Pieterse and Paul E. Black. 2015. Levenshtein distance. In Dictionary of Algorithms & Data Structures. (2015)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/496701"},{"key":"e_1_3_2_1_23_1","unstructured":"Angelo Racoma. 2012. Android Jelly Bean Face Unlock 'liveness' check easily hacked with photo editing. http:\/\/www.androidauthority.com\/android-jelly-bean-faceunlock-blink-hacking-105556\/. (Aug. 2012).  Angelo Racoma. 2012. Android Jelly Bean Face Unlock 'liveness' check easily hacked with photo editing. http:\/\/www.androidauthority.com\/android-jelly-bean-faceunlock-blink-hacking-105556\/. (Aug. 2012)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31534-3_91"},{"key":"e_1_3_2_1_25_1","volume-title":"Nartker","author":"Rice Stephen V.","year":"1996","unstructured":"Stephen V. Rice , Frank R. Jenkins , and Thomas A . Nartker . 1996 . The fifth annual test of OCR accuracy. Information Science Research Institute . Stephen V. Rice, Frank R. Jenkins, and Thomas A. Nartker. 1996. The fifth annual test of OCR accuracy. Information Science Research Institute."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2010.5513103"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.12"},{"key":"e_1_3_2_1_28_1","volume-title":"24th USENIX Security Symposium. 1041--1056","author":"Sabottke Carl","year":"2015","unstructured":"Carl Sabottke , Octavian Suciu , and Tudor Dumitras . 2015 . Vulnerability disclosure in the age of social media: exploiting twitter for predicting real-world exploits . In 24th USENIX Security Symposium. 1041--1056 . Carl Sabottke, Octavian Suciu, and Tudor Dumitras. 2015. Vulnerability disclosure in the age of social media: exploiting twitter for predicting real-world exploits. In 24th USENIX Security Symposium. 1041--1056."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.35"},{"key":"e_1_3_2_1_30_1","volume-title":"https:\/\/www.youtube.com\/watch?v=RQzAbKdLfW8. (June","author":"County Sheriff Santa Clara","year":"2013","unstructured":"Santa Clara County Sheriff . 2013. PG& E Substation Surveillance Video . https:\/\/www.youtube.com\/watch?v=RQzAbKdLfW8. (June 2013 ). Santa Clara County Sheriff. 2013. PG&E Substation Surveillance Video. https:\/\/www.youtube.com\/watch?v=RQzAbKdLfW8. (June 2013)."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813679"},{"key":"e_1_3_2_1_32_1","first-page":"457","article-title":"Facial recognition. (June 4 2013)","volume":"8","author":"Sipe Michael Andrew","year":"2013","unstructured":"Michael Andrew Sipe , Henry Will Schneiderman , and Michael Christian Nechyba . 2013 . Facial recognition. (June 4 2013) . US Patent 8 , 457 ,367. Michael Andrew Sipe, Henry Will Schneiderman, and Michael Christian Nechyba. 2013. Facial recognition. (June 4 2013). US Patent 8,457,367.","journal-title":"US Patent"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978311"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2012.6288237"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2205568"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2013.2260814"},{"key":"e_1_3_2_1_37_1","volume-title":"How much monitoring of Iranian nuclear facilities is enough? http:\/\/thebulletin.org\/how-much-monitoring-iranian-nuclear-facilities-enough7923. (Jan","author":"Tabatabai Ariane","year":"2015","unstructured":"Ariane Tabatabai . 2015. How much monitoring of Iranian nuclear facilities is enough? http:\/\/thebulletin.org\/how-much-monitoring-iranian-nuclear-facilities-enough7923. (Jan . 2015 ). Ariane Tabatabai. 2015. How much monitoring of Iranian nuclear facilities is enough? http:\/\/thebulletin.org\/how-much-monitoring-iranian-nuclear-facilities-enough7923. (Jan. 2015)."},{"key":"e_1_3_2_1_38_1","volume-title":"IEEE Workshop on Applications of Computer Vision (WACV). 491--496","author":"Tekin Ender","year":"2011","unstructured":"Ender Tekin , James M. Coughlan , and Huiying Shen . 2011 . Realtime detection and reading of LED\/LCD displays for visually impaired persons . In IEEE Workshop on Applications of Computer Vision (WACV). 491--496 . Ender Tekin, James M. Coughlan, and Huiying Shen. 2011. Realtime detection and reading of LED\/LCD displays for visually impaired persons. In IEEE Workshop on Applications of Computer Vision (WACV). 491--496."},{"key":"e_1_3_2_1_39_1","unstructured":"Tesseract OCR. [n. d.]. Tesseract Open Source OCR Engine. https:\/\/github.com\/tesseract-ocr\/tesseract. ([n. d.]).  Tesseract OCR. [n. d.]. Tesseract Open Source OCR Engine. https:\/\/github.com\/tesseract-ocr\/tesseract. ([n. d.])."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660282"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1167\/iovs.11-8284"},{"key":"e_1_3_2_1_42_1","unstructured":"Twitter. [n. d.]. API Rate Limits Per User or Per Application. https:\/\/dev.twitter.com\/rest\/public\/rate-limiting. ([n. d.]).  Twitter. [n. d.]. API Rate Limits Per User or Per Application. https:\/\/dev.twitter.com\/rest\/public\/rate-limiting. ([n. d.])."},{"key":"e_1_3_2_1_43_1","unstructured":"Twitter. [n. d.]. The Streaming APIs Overview. https:\/\/dev.twitter.com\/streaming\/overview. ([n. d.]).  Twitter. [n. d.]. The Streaming APIs Overview. https:\/\/dev.twitter.com\/streaming\/overview. ([n. d.])."},{"key":"e_1_3_2_1_44_1","unstructured":"Twitter. [n. d.]. Twitter API. https:\/\/dev.twitter.com. ([n. d.]).  Twitter. [n. d.]. Twitter API. https:\/\/dev.twitter.com. ([n. d.])."},{"key":"e_1_3_2_1_45_1","unstructured":"Twitter. [n. d.]. Twitter Brand Policy. https:\/\/about.twitter.com\/press\/twitter-brand-policy. ([n. d.]).  Twitter. [n. d.]. Twitter Brand Policy. https:\/\/about.twitter.com\/press\/twitter-brand-policy. ([n. d.])."},{"volume-title":"Announcing an Application Process for Verified Accounts. https:\/\/blog.twitter.com\/2016\/announcing-an-application-process-for-verified-accounts-0. (July","year":"2016","key":"e_1_3_2_1_46_1","unstructured":"Twitter. 2016. Announcing an Application Process for Verified Accounts. https:\/\/blog.twitter.com\/2016\/announcing-an-application-process-for-verified-accounts-0. (July 2016 ). Twitter. 2016. Announcing an Application Process for Verified Accounts. https:\/\/blog.twitter.com\/2016\/announcing-an-application-process-for-verified-accounts-0. (July 2016)."},{"key":"e_1_3_2_1_47_1","volume-title":"New Tweets per second record, and how! https:\/\/blog.twitter.com\/2013\/new-tweets-per-second-record-and-how. (Aug","author":"Blog Twitter","year":"2013","unstructured":"Twitter Blog . 2013. New Tweets per second record, and how! https:\/\/blog.twitter.com\/2013\/new-tweets-per-second-record-and-how. (Aug . 2013 ). Twitter Blog. 2013. New Tweets per second record, and how! https:\/\/blog.twitter.com\/2013\/new-tweets-per-second-record-and-how. (Aug. 2013)."},{"key":"e_1_3_2_1_48_1","unstructured":"Lisa Vaas. 2015. Man arrested after posting Facebook videos of him tampering with traffic cameras. https:\/\/nakedsecurity.sophos.com\/2015\/08\/28\/man-arrested-after-posting-facebook-videos-of-him-tampering-with-traffic-cameras\/. (Aug. 2015).  Lisa Vaas. 2015. Man arrested after posting Facebook videos of him tampering with traffic cameras. https:\/\/nakedsecurity.sophos.com\/2015\/08\/28\/man-arrested-after-posting-facebook-videos-of-him-tampering-with-traffic-cameras\/. (Aug. 2015)."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818000.2818045"}],"event":{"name":"CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Dallas Texas USA","acronym":"CCS '17"},"container-title":["Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3140241.3140242","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3140241.3140242","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3140241.3140242","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:11:20Z","timestamp":1750212680000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3140241.3140242"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,3]]},"references-count":49,"alternative-id":["10.1145\/3140241.3140242","10.1145\/3140241"],"URL":"https:\/\/doi.org\/10.1145\/3140241.3140242","relation":{},"subject":[],"published":{"date-parts":[[2017,11,3]]},"assertion":[{"value":"2017-11-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}