{"id":"https://openalex.org/W2772111263","doi":"https://doi.org/10.1145/3134600.3134643","title":"Here Is Your Fingerprint!","display_name":"Here Is Your Fingerprint!","publication_year":2017,"publication_date":"2017-12-04","ids":{"openalex":"https://openalex.org/W2772111263","doi":"https://doi.org/10.1145/3134600.3134643","mag":"2772111263"},"language":"en","primary_location":{"id":"doi:10.1145/3134600.3134643","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3134600.3134643","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 33rd Annual Computer Security Applications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5040581340","display_name":"Hoyeon Lee","orcid":"https://orcid.org/0000-0002-1165-1509"},"institutions":[{"id":"https://openalex.org/I193775966","display_name":"Yonsei University","ror":"https://ror.org/01wjejq96","country_code":"KR","type":"education","lineage":["https://openalex.org/I193775966"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Hoyeon Lee","raw_affiliation_strings":["Yonsei University, Seoul, Korea"],"affiliations":[{"raw_affiliation_string":"Yonsei University, Seoul, Korea","institution_ids":["https://openalex.org/I193775966"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100730147","display_name":"Seungyeon Kim","orcid":"https://orcid.org/0000-0001-6708-5684"},"institutions":[{"id":"https://openalex.org/I193775966","display_name":"Yonsei University","ror":"https://ror.org/01wjejq96","country_code":"KR","type":"education","lineage":["https://openalex.org/I193775966"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Seungyeon Kim","raw_affiliation_strings":["Yonsei University, Seoul, Korea"],"affiliations":[{"raw_affiliation_string":"Yonsei University, Seoul, Korea","institution_ids":["https://openalex.org/I193775966"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5090551692","display_name":"Taekyoung Kwon","orcid":"https://orcid.org/0000-0002-5513-0836"},"institutions":[{"id":"https://openalex.org/I193775966","display_name":"Yonsei University","ror":"https://ror.org/01wjejq96","country_code":"KR","type":"education","lineage":["https://openalex.org/I193775966"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Taekyoung Kwon","raw_affiliation_strings":["Yonsei University, Seoul, Korea"],"affiliations":[{"raw_affiliation_string":"Yonsei University, Seoul, Korea","institution_ids":["https://openalex.org/I193775966"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5040581340"],"corresponding_institution_ids":["https://openalex.org/I193775966"],"apc_list":null,"apc_paid":null,"fwci":0.7397,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.72497068,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"512","last_page":"527"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9909999966621399,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/fingerprint","display_name":"Fingerprint (computing)","score":0.6916523575782776},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6696445941925049},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.6603602170944214},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.5844323635101318},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.48513922095298767},{"id":"https://openalex.org/keywords/perception","display_name":"Perception","score":0.4834102392196655},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.4674822688102722},{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.4595026671886444},{"id":"https://openalex.org/keywords/fingerprint-recognition","display_name":"Fingerprint recognition","score":0.45703163743019104},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.4153417944908142},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4137459397315979},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.3437618017196655},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.13053524494171143}],"concepts":[{"id":"https://openalex.org/C2777826928","wikidata":"https://www.wikidata.org/wiki/Q3745713","display_name":"Fingerprint (computing)","level":2,"score":0.6916523575782776},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6696445941925049},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.6603602170944214},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.5844323635101318},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.48513922095298767},{"id":"https://openalex.org/C26760741","wikidata":"https://www.wikidata.org/wiki/Q160402","display_name":"Perception","level":2,"score":0.4834102392196655},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.4674822688102722},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.4595026671886444},{"id":"https://openalex.org/C168406668","wikidata":"https://www.wikidata.org/wiki/Q178022","display_name":"Fingerprint recognition","level":3,"score":0.45703163743019104},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.4153417944908142},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4137459397315979},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.3437618017196655},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.13053524494171143},{"id":"https://openalex.org/C169760540","wikidata":"https://www.wikidata.org/wiki/Q207011","display_name":"Neuroscience","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3134600.3134643","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3134600.3134643","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 33rd Annual Computer Security Applications Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.6800000071525574,"id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G4320978394","display_name":null,"funder_award_id":"No. NRF-2015R1A2A2A01004792","funder_id":"https://openalex.org/F4320322120","funder_display_name":"National Research Foundation of Korea"}],"funders":[{"id":"https://openalex.org/F4320322120","display_name":"National Research Foundation of Korea","ror":"https://ror.org/013aysd81"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W1494059999","https://openalex.org/W1585431621","https://openalex.org/W1964320810","https://openalex.org/W1986702455","https://openalex.org/W2020937129","https://openalex.org/W2028810589","https://openalex.org/W2043609845","https://openalex.org/W2044852454","https://openalex.org/W2049468186","https://openalex.org/W2107845065","https://openalex.org/W2113893685","https://openalex.org/W2133990837","https://openalex.org/W2151103935","https://openalex.org/W2152164036","https://openalex.org/W2157134953","https://openalex.org/W2164940355","https://openalex.org/W2171654212","https://openalex.org/W2266307175","https://openalex.org/W2561381909","https://openalex.org/W2605024226","https://openalex.org/W2617489966","https://openalex.org/W2745332024","https://openalex.org/W2745726059","https://openalex.org/W2746962056","https://openalex.org/W2765620065","https://openalex.org/W2898196560","https://openalex.org/W4231915598"],"related_works":["https://openalex.org/W4233349824","https://openalex.org/W3014822659","https://openalex.org/W2117826006","https://openalex.org/W4362496757","https://openalex.org/W2051501574","https://openalex.org/W2020816142","https://openalex.org/W2124627279","https://openalex.org/W2050967184","https://openalex.org/W2566091814","https://openalex.org/W4200422973"],"abstract_inverted_index":{"A":[0],"small":[1,53,177],"touch":[2,54,92,129,178,185,201,224],"sensor":[3],"employed":[4],"in":[5,73,102,139,158],"smartphones":[6],"can":[7,47],"only":[8],"capture":[9],"a":[10,30,223,227],"partial":[11],"limited":[12],"portion":[13],"of":[14,98],"the":[15,44,52,65,70,78,88,99,112,124,128,156,161,176,183,209,217,231,234],"full":[16],"fingerprint,":[17],"and":[18,76,91,132,154,187,197,203,226,233,246],"so":[19],"it":[20,35],"is":[21,36,172,238],"more":[22],"vulnerable":[23],"to":[24,50,63,94,110,175],"fingerprint":[25,66,80,101],"spoofing":[26],"attacks":[27],"that":[28,169,216],"leverage":[29],"user's":[31,184,235],"firm":[32],"impression.":[33],"However,":[34],"still":[37],"unknown":[38],"whether":[39],"daily":[40,74],"smudges":[41,67,85,125],"remaining":[42,86],"on":[43,69,87,127,222],"smartphone":[45,71],"surface":[46,72],"be":[48],"exploited":[49],"circumvent":[51],"sensor.":[55],"In":[56],"this":[57,116],"paper,":[58],"we":[59,150],"first":[60],"study":[61,109,166],"how":[62],"exploit":[64],"left":[68,126],"use,":[75],"present":[77],"so-called":[79],"SCRAP":[81],"attack,":[82],"which":[83],"uses":[84],"home":[89,133,228],"button":[90,229],"screen":[93,225],"reconstruct":[95],"an":[96,107],"image":[97],"enrolled":[100],"good":[103],"quality.":[104],"We":[105,118,180,190,241],"conduct":[106,191],"experimental":[108],"show":[111,215],"actual":[113,173],"risk":[114,174,206,236],"regarding":[115,208],"attack.":[117],"collect":[119],"403":[120],"latent":[121,210],"fingerprints":[122],"from":[123],"screens":[130],"(361)":[131],"buttons":[134],"(42)":[135],"by":[136],"seven":[137],"users":[138],"six":[140],"conditions":[141],"(tapping,":[142],"passcode-typing,":[143],"text-typing,":[144],"facebook,":[145],"in-pocket,":[146],"wiping).":[147],"Using":[148],"them,":[149],"perform":[151],"our":[152,170],"attack":[153,171],"evaluate":[155],"results":[157,167,214],"comparison":[159],"with":[160],"firmly":[162],"impressed":[163],"fingerprints.":[164,211],"The":[165,212],"indicate":[168],"sensors.":[179],"then":[181],"investigate":[182],"behavior":[186],"perception":[188,207,237],"gap.":[189],"in-person":[192],"surveys":[193],"involving":[194],"82":[195],"participants,":[196],"ask":[198],"about":[199],"their":[200,205],"behaviors":[202],"also":[204],"survey":[213],"fingers":[218],"most":[219],"frequently":[220],"used":[221],"are":[230],"same,":[232],"very":[239],"low.":[240],"finally":[242],"discuss":[243],"mitigation":[244],"methods":[245],"future":[247],"directions.":[248]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":3},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":3},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
