[1] |
WEISS R , DE LUCA A . PassShapes:utilizing stroke based authentication to increase password memorability[C]// Proceedings of the 5th Nordic Conference on Human-computer Interaction:Building Bridges. 2008: 383-392.
|
[2] |
YE G X , TANG Z Y , FANG D Y ,et al. Cracking android pattern lock in five attempts[C]// Proceedings 2017 Network and Distributed System Security Symposium. 2017.
|
[3] |
AVIV A J , GIBSON K L , MOSSOP E ,et al. Smudge attacks on smartphone touch screens[J]. Woot, 2010,10: 1-7.
|
[4] |
ZHANG J , ZHENG X L , TANG Z Y ,et al. Privacy leakage in mobile sensing:your unlock passwords can be leaked through wireless hotspot functionality[J]. Mobile Information Systems, 2016,(2016):8793025.
|
[5] |
ABDELRAHMAN Y , KHAMIS M , SCHNEEGASS S ,et al. Stay cool! understanding thermal attacks on mobile-based user authentication[C]// Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. 2017: 3751-3763.
|
[6] |
ZHOU M , WANG Q , YANG J X ,et al. PatternListener:cracking android pattern lock using acoustic signals[C]// Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. 2018: 1775-1787.
|
[7] |
EIBAND M , KHAMIS M , VON ZEZSCHWITZ E ,et al. Understanding shoulder surfing in the wild:stories from users and observers[C]// Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. 2017: 4254-4265.
|
[8] |
WIEDENBECK S , WATERS J , SOBRADO L ,et al. Design and evaluation of a shoulder-surfing resistant graphical password scheme[C]// Proceedings of the Working Conference on Advanced Visual Interfaces. 2006: 177-184.
|
[9] |
KUMAR M , GARFINKEL T , BONEH D ,et al. Reducing shoulder-surfing by using gaze-based password entry[C]// Proceedings of the 3rd Symposium on Usable Privacy and Security -SOUPS '07. 2007: 13-19.
|
[10] |
ROTH V , RICHTER K , FREIDINGER R . A PIN-entry method resilient against shoulder surfing[C]// Proceedings of the 11th ACM Conference on Computer and Communications Security. 2004: 236-245.
|
[11] |
WINKLER T , RINNER B . User-centric privacy awareness in video surveillance[J]. Multimedia Systems, 2012,18(2): 99-121.
|
[12] |
GELBORD B , ROELOFSEN G . New surveillance techniques raise privacy concerns[J]. Communications of the ACM, 2002,45(11): 23-24.
|
[13] |
WINKLER T , RINNER B . Security and privacy protection in visual sensor networks:a survey[J]. ACM Computing Surveys, 2014,47(1): 2.
|
[14] |
SCHIFF J , MEINGAST M , MULLIGAN D K ,et al. Respectful cameras:detecting visual markers in real-time to address privacy concerns[M]// Protecting Privacy in Video Surveillance, 2009: 65-89.
|
[15] |
KORSHUNOV P , EBRAHIMI T . Using warping for privacy protection in video surveillance[C]// Proceedings of 2013 18th International Conference on Digital Signal Processing (DSP). 2013: 1-6.
|
[16] |
GUERAR M , MIGLIARDI M , PALMIERI F ,et al. Securing PIN-based authentication in smartwatches with just two gestures[J]. Concurrency and Computation:Practice and Experience, 2020,32(18): e5549.
|
[17] |
LU C X , DU B W , WEN H K ,et al. Snoopy[J]. Proceedings of the ACM on Interactive,Mobile,Wearable and Ubiquitous Technologies, 2018,1(4): 1-29.
|
[18] |
WANG C , GUO X N , CHEN Y Y ,et al. Personal PIN leakage from wearable devices[J]. IEEE Transactions on Mobile Computing, 2018,17(3): 646-660.
|
[19] |
SHUKLA D , PHOHA V V . Stealing passwords by observing hands movement[J]. IEEE Transactions on Information Forensics and Security, 2019,14(12): 3086-3101.
|
[20] |
SHUKLA D , KUMAR R , SERWADDA A ,et al. Beware,your hands reveal your secrets![C]// Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. 2014: 904-917.
|
[21] |
CHEN T , FARCASIN M , CHAN-TIN E , . Smartphone passcode prediction[J]. IET Information Security, 2018,12(5): 431-437.
|
[22] |
BALAGANI K S , CONTI M , GASTI P ,et al. SILK-TV:secret information leakage from keystroke timing videos[M]// Computer Security. Cham: Springer International Publishing, 2018: 263-280.
|
[23] |
BALAGANI K , CARDAIOLI M , CONTI M ,et al. PILOT:password and PIN information leakage from obfuscated typing videos[J]. Journal of Computer Security, 2019,27(4): 405-425.
|
[24] |
XU Y , HEINLY J , WHITE A M ,et al. Seeing double:reconstructing obscured typed input from repeated compromising reflections[C]// Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security. 2013: 1063-1074.
|
[25] |
YUE Q G , LING Z , FU X W ,et al. Blind recognition of touched keys on mobile devices[C]// Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. 2014: 1403-1414.
|
[26] |
Barrett D . One surveillance camera for every 11 people in Britain,says CCTV survey[J]. The Telegraph, 2013,10.
|
[27] |
REDMON J , FARHADI A . YOLOv3:an incremental improvement[J]. arXiv preprint arXiv:1804.02767, 2018.
|
[28] |
SIMON T , JOO H , MATTHEWS I ,et al. Hand keypoint detection in single images using multiview bootstrapping[C]// Proceedings of 2017 IEEE Conference on Computer Vision and Pattern Recognition. 2017: 4645-4653.
|
[29] |
LUKE?IC A , VOJíR T , ZAJC L C ,et al. Discriminative correlation filter with channel and spatial reliability[C]// Proceedings of 2017 IEEE Conference on Computer Vision and Pattern Recognition. 2017: 4847-4856.
|
[30] |
DOUGLAS D H , PEUCKER T K . Algorithms for the reduction of the number of points required to represent a digitized line or its caricature[J]. Cartographica:the International Journal for Geographic Information and Geovisualization, 1973,10(2): 112-122.
|
[31] |
KENDALL M G . Rank correlation methods[J]. Biometrika, 1957,44(1/2): 298.
|
[32] |
SPEARMAN C . General intelligence,objectively determined and measured[J]. The American Journal of Psychology, 1904,15(2): 201-292.
|
[33] |
SUN C , WANG Y , ZHENG J . Dissecting pattern unlock:the effect of pattern strength meter on pattern selection[J]. Journal of Information Security and Applications, 2014,19(4/5): 308-320.
|