{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T23:57:15Z","timestamp":1770335835077,"version":"3.49.0"},"reference-count":46,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2018,3,26]],"date-time":"2018-03-26T00:00:00Z","timestamp":1522022400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSFC grant","award":["61370028"],"award-info":[{"award-number":["61370028"]}]},{"DOI":"10.13039\/501100012166","name":"National Key R&D Program of China","doi-asserted-by":"crossref","award":["No. 2017YFB1001801"],"award-info":[{"award-number":["No. 2017YFB1001801"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Collaborative Innovation Center of Novel Software Technology and Industrialization"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Interact. Mob. Wearable Ubiquitous Technol."],"published-print":{"date-parts":[[2018,3,26]]},"abstract":"<jats:p>This paper presents SilentKey, a new authentication framework to identify mobile device users through ultrasonic-based lip reading. The main idea is to generate ultrasonic signals from a mobile phone and analyze the fine-grained impact of mouth motions on the reflected signal. The new framework is effective since people have unique characteristics when performing mouth motions, which represent not only what people input, but also how they input. SilentKey is robust against attacks since the input cannot be recorded or imitated. We implement a prototype and demonstrate the effectiveness of the system by fifty volunteers. Such a non-intrusive identification mechanism provides a natural user interface which can also be applied by people with speaking or viewing difficulties.<\/jats:p>","DOI":"10.1145\/3191768","type":"journal-article","created":{"date-parts":[[2018,3,27]],"date-time":"2018-03-27T12:06:45Z","timestamp":1522152405000},"page":"1-18","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":52,"title":["SilentKey"],"prefix":"10.1145","volume":"2","author":[{"given":"Jiayao","family":"Tan","sequence":"first","affiliation":[{"name":"Nanjing University, China"}]},{"given":"Xiaoliang","family":"Wang","sequence":"additional","affiliation":[{"name":"Nanjing University, China"}]},{"given":"Cam-Tu","family":"Nguyen","sequence":"additional","affiliation":[{"name":"Nanjing University, China"}]},{"given":"Yu","family":"Shi","sequence":"additional","affiliation":[{"name":"Nanjing University, China"}]}],"member":"320","published-online":{"date-parts":[[2018,3,26]]},"reference":[{"key":"e_1_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/2449360.2449384"},{"key":"e_1_2_2_2_1","unstructured":"Apple. 2017. Face ID. https:\/\/www.apple.com\/iphone-x\/face-id. (2017)."},{"key":"e_1_2_2_3_1","doi-asserted-by":"publisher","unstructured":"Md Tanvir Islam Aumi Sidhant Gupta Mayank Goel Eric Larson and Shwetak Patel. 2013. DopLink: using the doppler effect for multi-device interaction. In 2013 ACM international joint conference on Pervasive and ubiquitous computing. ACM 583--586. 10.1145\/2493432.2493515","DOI":"10.1145\/2493432.2493515"},{"key":"e_1_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/1925004.1925009"},{"key":"e_1_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2011.09.002"},{"key":"e_1_2_2_6_1","volume-title":"Performance Computing and Communications Conference. 1--8.","author":"Bo Cheng","year":"2015","unstructured":"Cheng Bo, Lan Zhang, Taeho Jung, Junze Han, Xiang Yang Li, and Yu Wang. 2015. Continuous user identification via touch and movement behavioral biometrics. In Performance Computing and Communications Conference. 1--8."},{"key":"e_1_2_2_7_1","volume-title":"Qiuyuan Huang, and Yu Wang.","author":"Bo Cheng","year":"2013","unstructured":"Cheng Bo, Lan Zhang, Xiang Yang Li, Qiuyuan Huang, and Yu Wang. 2013. SilentSense: silent user identification via touch and movement behavioral biometrics. Computer Science (2013), 1--8."},{"key":"e_1_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1961189.1961199"},{"key":"e_1_2_2_9_1","unstructured":"J. Chen and L. Li. 2016. Liveness detection method and device and identity authentication method and device. (Dec. 15 2016). https:\/\/www.google.com\/patents\/US20160366129 US Patent App. 15\/176 515."},{"key":"e_1_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2632048.2632090"},{"key":"e_1_2_2_11_1","volume-title":"Time-frequency analysis","author":"Cohen Leon","unstructured":"Leon Cohen. 1995. Time-frequency analysis. Vol. 778. Prentice Hall PTR Englewood Cliffs, NJ:."},{"key":"e_1_2_2_12_1","unstructured":"Dan Goodin 2015. New data uncovers the surprising predictability of Android lock patterns. (2015). https:\/\/arstechnica.com\/security\/2015\/08\/new-data-uncovers-the-surprising-predictability-of-android-lock-patterns\/."},{"key":"e_1_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025991"},{"key":"e_1_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2481330"},{"key":"e_1_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837114"},{"key":"e_1_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2225048"},{"key":"e_1_2_2_17_1","unstructured":"Davrondzhon Gafurov. 2007. A survey of biometric gait recognition: Approaches security and challenges. In Annual Norwegian computer science conference. Citeseer 19--21."},{"key":"e_1_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.4304\/jcp.1.7.51-59"},{"key":"e_1_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/BioCAS.2011.6107823"},{"key":"e_1_2_2_20_1","doi-asserted-by":"publisher","unstructured":"Sidhant Gupta Daniel Morris Shwetak Patel and Desney Tan. 2012. SoundWave:using the doppler effect to sense gestures. (2012) 1911--1914. 10.1145\/2207676.2208331","DOI":"10.1145\/2207676.2208331"},{"key":"e_1_2_2_21_1","unstructured":"Xiaoliang Wang Jiayao Tan Cam-Tu Nguyen. 2017. SilentTalk: Lip Reading through Ultrasonic Sensing on Mobile Phones. In Infocom."},{"key":"e_1_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/75577.75582"},{"key":"e_1_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2009.4959977"},{"key":"e_1_2_2_24_1","doi-asserted-by":"crossref","unstructured":"Rachael-Anne Knight. 2012. Phonetics \u00e2\u0102\u015e A course book. (2012) 27.","DOI":"10.1017\/CBO9781139060714"},{"key":"e_1_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2010.5634532"},{"key":"e_1_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/AVSS.2012.66"},{"key":"e_1_2_2_27_1","unstructured":"Microsoft. 2013. Kinect. https:\/\/www.xbox.com\/kinect\/. (2013)."},{"key":"e_1_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2742647.2742674"},{"key":"e_1_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2500423.2500436"},{"key":"e_1_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2012.17"},{"key":"e_1_2_2_31_1","first-page":"561","article-title":"Please enter your four-digit pin","volume":"4","author":"Rogers J","year":"2007","unstructured":"J Rogers. 2007. Please enter your four-digit pin. Financial Services Technology, US Edition 4 (2007), 561--572.","journal-title":"Financial Services Technology, US Edition"},{"key":"e_1_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208543"},{"key":"e_1_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/1367985.1367993"},{"key":"e_1_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2406367.2406384"},{"key":"e_1_2_2_35_1","volume-title":"Seventh International Conference on Mobile Computing and Ubiquitous NETWORKING. 56--61","author":"Sen S.","unstructured":"S. Sen and K. Muralidharan. 2014. Putting \u00e2\u0102&Yuml;pressure\u00e2\u0102&Zacute; on mobile authentication. In Seventh International Conference on Mobile Computing and Ubiquitous NETWORKING. 56--61."},{"key":"e_1_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2500423.2500434"},{"key":"e_1_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594368.2594375"},{"key":"e_1_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594368.2602429"},{"key":"e_1_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2016.2517630"},{"key":"e_1_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2971648.2971670"},{"key":"e_1_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2973750.2973764"},{"key":"e_1_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-012-0250-5"},{"key":"e_1_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2493988.2494335"},{"key":"e_1_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2790113"},{"key":"e_1_2_2_45_1","volume-title":"Guidelines for the Use of Multimedia in Instruction. Human Factors and Ergonomics Society Annual Meeting 42","author":"Williams James R","year":"1998","unstructured":"James R Williams. 1998. Guidelines for the Use of Multimedia in Instruction. Human Factors and Ergonomics Society Annual Meeting 42, 20 (1998), 1447--1451."},{"key":"e_1_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1622176.1622194"}],"container-title":["Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3191768","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3191768","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:26:42Z","timestamp":1750213602000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3191768"}},"subtitle":["A New Authentication Framework through Ultrasonic-based Lip Reading"],"short-title":[],"issued":{"date-parts":[[2018,3,26]]},"references-count":46,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,3,26]]}},"alternative-id":["10.1145\/3191768"],"URL":"https:\/\/doi.org\/10.1145\/3191768","relation":{},"ISSN":["2474-9567"],"issn-type":[{"value":"2474-9567","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,3,26]]},"assertion":[{"value":"2017-05-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-01-01","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-03-26","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}