mID: Tracing Screen Photos via Moiré Patterns. Cheng, Y., Ji, X., Wang, L., Pang, Q., Chen, Y., & Xu, W. In Bailey, M. & Greenstadt, R., editors, 30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021, pages 2969–2986, 2021. USENIX Association. Paper bibtex @inproceedings{DBLP:conf/uss/ChengJWP0X21,
author = {Yushi Cheng and
Xiaoyu Ji and
Lixu Wang and
Qi Pang and
Yi{-}Chao Chen and
Wenyuan Xu},
editor = {Michael Bailey and
Rachel Greenstadt},
title = {mID: Tracing Screen Photos via Moir{\'{e}} Patterns},
booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
2021},
pages = {2969--2986},
publisher = {{USENIX} Association},
year = {2021},
url = {https://www.usenix.org/conference/usenixsecurity21/presentation/cheng-yushi},
timestamp = {Wed, 10 Nov 2021 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/uss/ChengJWP0X21.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"z7EB8r29QoQDqktfW","bibbaseid":"cheng-ji-wang-pang-chen-xu-midtracingscreenphotosviamoirpatterns-2021","author_short":["Cheng, Y.","Ji, X.","Wang, L.","Pang, Q.","Chen, Y.","Xu, W."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Yushi"],"propositions":[],"lastnames":["Cheng"],"suffixes":[]},{"firstnames":["Xiaoyu"],"propositions":[],"lastnames":["Ji"],"suffixes":[]},{"firstnames":["Lixu"],"propositions":[],"lastnames":["Wang"],"suffixes":[]},{"firstnames":["Qi"],"propositions":[],"lastnames":["Pang"],"suffixes":[]},{"firstnames":["Yi-Chao"],"propositions":[],"lastnames":["Chen"],"suffixes":[]},{"firstnames":["Wenyuan"],"propositions":[],"lastnames":["Xu"],"suffixes":[]}],"editor":[{"firstnames":["Michael"],"propositions":[],"lastnames":["Bailey"],"suffixes":[]},{"firstnames":["Rachel"],"propositions":[],"lastnames":["Greenstadt"],"suffixes":[]}],"title":"mID: Tracing Screen Photos via Moiré Patterns","booktitle":"30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021","pages":"2969–2986","publisher":"USENIX Association","year":"2021","url":"https://www.usenix.org/conference/usenixsecurity21/presentation/cheng-yushi","timestamp":"Wed, 10 Nov 2021 00:00:00 +0100","biburl":"https://dblp.org/rec/conf/uss/ChengJWP0X21.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@inproceedings{DBLP:conf/uss/ChengJWP0X21,\n author = {Yushi Cheng and\n Xiaoyu Ji and\n Lixu Wang and\n Qi Pang and\n Yi{-}Chao Chen and\n Wenyuan Xu},\n editor = {Michael Bailey and\n Rachel Greenstadt},\n title = {mID: Tracing Screen Photos via Moir{\\'{e}} Patterns},\n booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,\n 2021},\n pages = {2969--2986},\n publisher = {{USENIX} Association},\n year = {2021},\n url = {https://www.usenix.org/conference/usenixsecurity21/presentation/cheng-yushi},\n timestamp = {Wed, 10 Nov 2021 00:00:00 +0100},\n biburl = {https://dblp.org/rec/conf/uss/ChengJWP0X21.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Cheng, Y.","Ji, X.","Wang, L.","Pang, Q.","Chen, Y.","Xu, W."],"editor_short":["Bailey, M.","Greenstadt, R."],"key":"DBLP:conf/uss/ChengJWP0X21","id":"DBLP:conf/uss/ChengJWP0X21","bibbaseid":"cheng-ji-wang-pang-chen-xu-midtracingscreenphotosviamoirpatterns-2021","role":"author","urls":{"Paper":"https://www.usenix.org/conference/usenixsecurity21/presentation/cheng-yushi"},"metadata":{"authorlinks":{}}},"bibtype":"inproceedings","biburl":"https://dblp.org/pid/39/1697-1.bib","dataSources":["9a3BsNB5omLjFWc3S"],"keywords":[],"search_terms":["mid","tracing","screen","photos","via","moir","patterns","cheng","ji","wang","pang","chen","xu"],"title":"mID: Tracing Screen Photos via Moiré Patterns","year":2021}