Demo of PassFrame: Generating image-based passwords from egocentric videos
暂无分享,去创建一个
[1] Andreas Bulling,et al. Pupil: an open source platform for pervasive eye tracking and mobile gaze-based interaction , 2014, UbiComp Adjunct.
[2] James M. Rehg,et al. Gaze-enabled egocentric video summarization via constrained submodular maximization , 2015, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[3] Jason I. Hong,et al. Exploring capturable everyday memory for autobiographical authentication , 2013, UbiComp.
[4] Hans-Peter Kriegel,et al. A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise , 1996, KDD.
[5] Robert Biddle,et al. Graphical passwords: Learning from the first twelve years , 2012, CSUR.
[6] James M. Rehg,et al. CENTRIST: A Visual Descriptor for Scene Categorization , 2011, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[7] Ashwin Ashok,et al. Whose move is it anyway? Authenticating smart wearable devices using unique head movement patterns , 2016, 2016 IEEE International Conference on Pervasive Computing and Communications (PerCom).
[8] Patricia Ladret,et al. The blur effect: perception and estimation with a new no-reference perceptual blur metric , 2007, Electronic Imaging.
[9] Steven Furnell,et al. Surveying the Development of Biometric User Authentication on Mobile Phones , 2015, IEEE Communications Surveys & Tutorials.
[10] Andrew Zisserman,et al. Representing shape with a spatial pyramid kernel , 2007, CIVR '07.
[11] Kristen Grauman,et al. Story-Driven Summarization for Egocentric Video , 2013, 2013 IEEE Conference on Computer Vision and Pattern Recognition.
[12] L. O'Gorman,et al. Comparing passwords, tokens, and biometrics for user authentication , 2003, Proceedings of the IEEE.
[13] Qing Yang,et al. HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users , 2015, IEEE Transactions on Information Forensics and Security.
[14] D. Schacter. Implicit memory: History and current status. , 1987 .
[15] Adam J. Aviv,et al. Smudge Attacks on Smartphone Touch Screens , 2010, WOOT.
[16] Adrian Perrig,et al. This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. Déjà Vu: A User Study Using Images for Authentication , 2000 .
[17] Heinrich Hußmann,et al. I Know What You Did Last Week! Do You?: Dynamic Security Questions for Fallback Authentication on Smartphones , 2015, CHI.
[18] Tadayoshi Kohno,et al. A comprehensive study of frequency, interference, and training of multiple graphical passwords , 2009, CHI.
[19] Shmuel Peleg,et al. An Egocentric Look at Video Photographer Identity , 2014, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).