{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T07:20:26Z","timestamp":1763018426082,"version":"3.28.0"},"reference-count":44,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,5,10]],"date-time":"2021-05-10T00:00:00Z","timestamp":1620604800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,5,10]],"date-time":"2021-05-10T00:00:00Z","timestamp":1620604800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,5,10]],"date-time":"2021-05-10T00:00:00Z","timestamp":1620604800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,5,10]]},"DOI":"10.1109\/infocom42981.2021.9488859","type":"proceedings-article","created":{"date-parts":[[2021,7,27]],"date-time":"2021-07-27T00:07:32Z","timestamp":1627344452000},"page":"1-10","source":"Crossref","is-referenced-by-count":6,"title":["ScreenID: Enhancing QRCode Security by Fingerprinting Screens"],"prefix":"10.1109","author":[{"given":"Yijie","family":"Li","sequence":"first","affiliation":[]},{"given":"Yi-Chao","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Xiaoyu","family":"Ji","sequence":"additional","affiliation":[]},{"given":"Hao","family":"Pan","sequence":"additional","affiliation":[]},{"given":"Lanqing","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Guangtao","family":"Xue","sequence":"additional","affiliation":[]},{"given":"Jiadi","family":"Yu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Learning OpenCV Computer Vision With the OpenCV Library","year":"2008","author":"bradski","key":"ref39"},{"article-title":"Fft zero padding","year":"2013","author":"hilbert","key":"ref38"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/4.996"},{"year":"2020","key":"ref32","article-title":"Sensor rolling shutter skew of camera2"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ISSCC.2014.6757524"},{"article-title":"Qr code scams rise in china, putting e-payment security in spotlight","year":"2019","author":"li","key":"ref30"},{"article-title":"Qr code data capacity","year":"2019","author":"steeman","key":"ref37"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TAU.1969.1162034"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2003.820437"},{"journal-title":"Discrete-Time Signal Processing","year":"1999","key":"ref34"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/IIHMSP.2011.10"},{"year":"2019","key":"ref40","article-title":"Hexagon dsp sdk"},{"key":"ref11","first-page":"19","article-title":"A new method for ciphering a message using qr code","volume":"6","author":"thamer","year":"2016","journal-title":"Comput Sci Eng"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3300061.3345428"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.19"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2601097.2601119"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2012.6477759"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2973750.2973767"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3081333.3081335"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3117811.3117821"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3117811.3117820"},{"year":"2019","key":"ref28","article-title":"Device specifications"},{"year":"2018","key":"ref4","article-title":"Your mobile money could be stolen by this attack!"},{"year":"2016","key":"ref27","article-title":"Adpd2212 datasheet"},{"key":"ref3","first-page":"593","article-title":"Picking up my tab: Understanding and mitigating synchronized token lifting and spending in mobile payment","author":"bai","year":"2017","journal-title":"26th USENIX Security Symposium ( USENIX Security 17)"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/4356038"},{"article-title":"Steals money sneakily by scanning people&#x2019;s qr code","year":"2019","author":"o\u2019donnell","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-49148-6_36"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-44350-8_19"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-016-0772-y"},{"year":"2020","key":"ref2","article-title":"Wechat pay: Beyond payment, leading mobile payment platform"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.2991\/aiie-16.2016.99"},{"year":"2020","key":"ref1","article-title":"Alipay: Experience fast, easy and safe online payments"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.5.8.937-941"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2017.1386249"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274721"},{"year":"2015","key":"ref42","article-title":"Lm36923 highly efficient triple-string white led driver"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICWMC.2007.26"},{"journal-title":"The Psychobiology of the Hand","year":"1998","author":"connolly","key":"ref41"},{"key":"ref23","first-page":"103","article-title":"Pulse width modulation","volume":"14","author":"barr","year":"2001","journal-title":"Embedded Systems Programming"},{"year":"2018","key":"ref44","article-title":"Shipments of flexible and rigid amoled panels worldwide from 2015 to 2022"},{"year":"2019","key":"ref26","article-title":"Pwm ranking - the best displays for the eyes"},{"key":"ref43","first-page":"6527","article-title":"Review on android and smartphone security","volume":"2320","author":"mohini","year":"2013","journal-title":"Research Journal of Computer and Information Technology Sciences"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2008.925384"}],"event":{"name":"IEEE INFOCOM 2021 - IEEE Conference on Computer Communications","start":{"date-parts":[[2021,5,10]]},"location":"Vancouver, BC, Canada","end":{"date-parts":[[2021,5,13]]}},"container-title":["IEEE INFOCOM 2021 - IEEE Conference on Computer Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9488422\/9488423\/09488859.pdf?arnumber=9488859","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:43:35Z","timestamp":1652197415000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9488859\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,10]]},"references-count":44,"URL":"https:\/\/doi.org\/10.1109\/infocom42981.2021.9488859","relation":{},"subject":[],"published":{"date-parts":[[2021,5,10]]}}}