References
- Qinggang Yue, Zhen Ling, Xinwen Fu, Benyuan Liu, Kui Ren and Wei Zhao, "Blind Recognition of Touched Keys on Mobile Devices," ACM CCS 2014, pp. 1403-1414, Nov 2014.
- Luis von Ahn, Manuel Blum and John Langford, "Telling Humans and Computers Apart Automatically," Communications of the ACM, Vol. 47, pp. 56-60, Feb 2004.
- Tsutomu Matsumoto, Hiroyuki Matsumoto, Koji Yamada and Satoshi Hoshino, "Impact of Artificial "Gummy" Fingers on Fingerprint Systems," Proceedings of SPIE, Vol. 4677, pp. 275-289, Apr 2002.
- Anil K. Jain, Karthik Nandakumar and Abhishek Nagar, "Biometric Template Security," EURASIP Journal on Advances in Signal Processing, Vol. 2008, No. 113, Jan 2008.
- Virginia Ruiz-Albacete, Pedro Tome-Gonzalez, Fernando Alonso-Fernandez, Javier Galbally, Julian Fierrez and Javier Ortega-Garcia, "Direct Attacks Using Fake Images in Iris Verification," Lecture Notes in Computer Science, Vol. 5372, pp. 181-190, 2008.
- Tomi Kinnunen, Haizhou Li, "An Overview of Text-Independent Speaker Recognition: from Features to Supervectors," Speech Communication, Vol. 52, pp. 12-40, Jan 2010. https://doi.org/10.1016/j.specom.2009.08.009
- 박현신, 김성웅, 진민호, 유창동, "최신 기계학습 기반 음성인식 기술 동향," 전자공학회지, Vol. 41, pp. 18-27, Mar 2014.
- 권철홍, "열악한 환경에 강인한 화자인증을 위한 위상 기반 특징 추출 기법," 한국정보통신학회논문지, Vol. 14, pp. 613-620, Mar 2010.
- K. A. Kluever, "Evaluating the Usability and Security of a Video CAPTCHA," Master's thesis, Rochester Institute of Technology, 2008.
- Jennifer Tam, Jiri Simsa, David Huggins-Daines, Luis von Ahn and Manuel Blum, "Improving Audio CAPTCHAs," In Proc. of the 4th Symp. on Usability, Privacy and Security (SOUPS '08), Pittsburgh, PA, USA, July 2008.
- Michael T. Goodrich, Michael Sirivianos, John Solis, Gene Tsudik and Ersin Uzun, "Loud and Clear: Human-Verifiable Authentication Based on Audio," In Proceedings of the IEEE International Conference on Distributed Computing Systems, 2006.
- A. Bianchi, I. Oakley, V. Kostakos, and D. S. Kwon, "The phone lock: audio and haptic shoulder-surfing resistant PIN entry methods for mobile devices.", Proc. Conf. on Tangible, embedded, and embodied interaction, TEI '11, pp. 197-200, January 2011.
- 김종욱, 강석인, 홍만표, "소리를 이용한 릴레이 공격 공격의 탐지," 정보보호학회논문지, Vol, 23, No. 4, Aug 2013.