{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,4,27]],"date-time":"2024-04-27T18:34:14Z","timestamp":1714242854330},"reference-count":43,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2016,4,1]],"date-time":"2016-04-01T00:00:00Z","timestamp":1459468800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Consumer Electron. Mag."],"published-print":{"date-parts":[[2016,4]]},"DOI":"10.1109\/mce.2016.2522018","type":"journal-article","created":{"date-parts":[[2016,4,11]],"date-time":"2016-04-11T18:07:48Z","timestamp":1460398068000},"page":"87-93","source":"Crossref","is-referenced-by-count":23,"title":["User Authentication on Smartphones: Focusing on iris biometrics"],"prefix":"10.1109","volume":"5","author":[{"given":"Shejin","family":"Thavalengal","sequence":"first","affiliation":[]},{"given":"Peter","family":"Corcoran","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2013.06.003"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2108288"},{"key":"ref33","author":"sultana","year":"2015","journal-title":"The question When will biometrics take over from passwords? The Guardian"},{"key":"ref32","author":"gross","year":"2013","journal-title":"Three of 10 smartphone owners don't use passwords CNN com"},{"key":"ref31","author":"griffiths","year":"2015","journal-title":"Beware your lock screen passcode probably isn't very secure 75% of us start secret patterns from a corner study reveals The Daily Mail"},{"key":"ref30","first-page":"1","article-title":"Smudge attacks on smartphone touch screens","author":"aviv","year":"0","journal-title":"Proc 4th Usenix Conf Offensive Technologies"},{"key":"ref37","first-page":"1","article-title":"Cancelable iris biometric","author":"zuo","year":"0","journal-title":"19th Int Conf Pattern Recognition"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1147\/sj.403.0614"},{"key":"ref35","article-title":"NTT Docomo takes another step into a future without passwords","author":"martin","year":"2015","journal-title":"Wall Street Journal"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPHOT.2014.6831801"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2014.10.011"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2398815"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2014.09.014"},{"key":"ref12","article-title":"ISO\/IEC 19794–6 Information Technology-Biometric Data Interchange Formats—Part 6: Iris image","volume":"44","year":"2011","journal-title":"JTC1\/SC37 international standard edition"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE-Berlin.2014.7034328"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2015.7150600"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2015.7150566"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"931","DOI":"10.1007\/978-0-387-73003-5_179","article-title":"Liveness detection: Iris","author":"toth","year":"2009","journal-title":"Encyclopedia of Biometrics"},{"key":"ref17","article-title":"A life revealed","author":"newman","year":"2002","journal-title":"National Geographic Magazine"},{"key":"ref18","article-title":"How the Afghan girl was identified by her iris patterns","author":"daugman","year":"0"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2014.6996276"},{"key":"ref28","author":"goldman","year":"2010","journal-title":"Your smartphone will run your life CNN Money"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.818349"},{"key":"ref27","author":"richmond","year":"2012","journal-title":"Smartphones hardly used for calls The Telegraph"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2005.08.003"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.818350"},{"key":"ref29","article-title":"Top ten smartphone risks","year":"0","journal-title":"European Union Agency for Network and Information Security (ENISA)"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2013.2239152"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2015.7301318"},{"key":"ref7","first-page":"970","article-title":"UBIRIS: A noisy iris image database","author":"proen\u00e7a","year":"0","journal-title":"Proc Int Conf Image Analysis and Processing"},{"key":"ref2","year":"2015","journal-title":"The Smartphone Difference"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1155\/2008\/281943"},{"key":"ref1","article-title":"Quarter of the world will be using smartphones in 2016","author":"curtis","year":"2014","journal-title":"The Telegraph"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2011.6107909"},{"key":"ref22","article-title":"Biometrics at the frontiers: Assessing the impact on society: Executive summary","year":"0"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2013.6613010"},{"key":"ref42","author":"thavalengal","year":"2016","journal-title":"Contributions to practical iris biometrics on smartphones"},{"key":"ref24","author":"curtis","year":"2014","journal-title":"Smartphone at 20 IBM Simon to iPhone 6 The Telegraph"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2440188"},{"key":"ref23","year":"2015","journal-title":"Cambridge English Dictionary and Thesaurus"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2012.6281134"},{"key":"ref43","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1007\/978-0-387-73003-5_253","article-title":"Anatomy of eyes","author":"irsch","year":"2009","journal-title":"Encyclopedia of Biometrics"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2013.48"}],"container-title":["IEEE Consumer Electronics Magazine"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/5962380\/7450702\/07450770.pdf?arnumber=7450770","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:11:03Z","timestamp":1642003863000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7450770\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,4]]},"references-count":43,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/mce.2016.2522018","relation":{},"ISSN":["2162-2248","2162-2256"],"issn-type":[{"value":"2162-2248","type":"print"},{"value":"2162-2256","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,4]]}}}