{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T12:41:28Z","timestamp":1776084088778,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":83,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,4,19]],"date-time":"2023-04-19T00:00:00Z","timestamp":1681862400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["425869382"],"award-info":[{"award-number":["425869382"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,4,19]]},"DOI":"10.1145\/3544548.3580924","type":"proceedings-article","created":{"date-parts":[[2023,4,20]],"date-time":"2023-04-20T04:27:20Z","timestamp":1681964840000},"page":"1-13","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["HotFoot: Foot-Based User Identification Using Thermal Imaging"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9910-295X","authenticated-orcid":false,"given":"Alia","family":"Saad","sequence":"first","affiliation":[{"name":"HCI Group, University of Duisburg-Essen, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1045-5493","authenticated-orcid":false,"given":"Kian","family":"Izadi","sequence":"additional","affiliation":[{"name":"Ludwig Maximilian University, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1620-1902","authenticated-orcid":false,"given":"Anam","family":"Ahmad Khan","sequence":"additional","affiliation":[{"name":"Computing, National University of Science and\u00a0Technology, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9578-9953","authenticated-orcid":false,"given":"Pascal","family":"Knierim","sequence":"additional","affiliation":[{"name":"University of the Bundeswehr Munich, Germany and University of Innsbruck, Austria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0132-4934","authenticated-orcid":false,"given":"Stefan","family":"Schneegass","sequence":"additional","affiliation":[{"name":"HCI Group, University of Duisburg-Essen, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8354-2195","authenticated-orcid":false,"given":"Florian","family":"Alt","sequence":"additional","affiliation":[{"name":"University of the Bundeswehr Munich, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2859-7297","authenticated-orcid":false,"given":"Yomna","family":"Abdelrahman","sequence":"additional","affiliation":[{"name":"Bundeswehr University Munich, Germany and European Universities in Egypt, Egypt"}]}],"member":"320","published-online":{"date-parts":[[2023,4,19]]},"reference":[{"key":"e_1_3_3_3_1_1","volume-title":"2D and 3D face recognition: A survey. Pattern recognition letters 28, 14","author":"Abate F","year":"2007","unstructured":"Andrea\u00a0F Abate, Michele Nappi, Daniel Riccio, and Gabriele Sabatino. 2007. 2D and 3D face recognition: A survey. Pattern recognition letters 28, 14 (2007), 1885\u20131906."},{"key":"e_1_3_3_3_2_1","volume-title":"Mary Ann\u00a0F Harrison, and Mark\u00a0S Nixon","author":"Abaza Ayman","year":"2013","unstructured":"Ayman Abaza, Arun Ross, Christina Hebert, Mary Ann\u00a0F Harrison, and Mark\u00a0S Nixon. 2013. A survey on ear biometrics. ACM computing surveys (CSUR) 45, 2 (2013), 1\u201335."},{"key":"e_1_3_3_3_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025461"},{"key":"e_1_3_3_3_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3351227"},{"key":"e_1_3_3_3_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702290"},{"key":"e_1_3_3_3_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3297778"},{"key":"e_1_3_3_3_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3130898"},{"key":"e_1_3_3_3_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3365610.3365648"},{"key":"e_1_3_3_3_9_1","volume-title":"Some control strategies for radiant floor heating. Radiant times","author":"Adelman D","year":"1988","unstructured":"D Adelman. 1988. Some control strategies for radiant floor heating. Radiant times (1988), 4\u20135."},{"key":"e_1_3_3_3_10_1","article-title":"Using feature extraction for human footprints recognition","volume":"64","author":"Al-Dulaimi Khamael\u00a0Abbas","year":"2013","unstructured":"Khamael\u00a0Abbas Al-Dulaimi. 2013. Using feature extraction for human footprints recognition. International Journal of Computer Applications 64, 3(2013).","journal-title":"International Journal of Computer Applications"},{"key":"e_1_3_3_3_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICEEOT.2016.7754900"},{"key":"e_1_3_3_3_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2021.3127459"},{"key":"e_1_3_3_3_13_1","doi-asserted-by":"publisher","DOI":"10.3233\/JIFS-190982"},{"key":"e_1_3_3_3_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/2887007.2887067"},{"key":"e_1_3_3_3_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208576"},{"key":"e_1_3_3_3_16_1","doi-asserted-by":"publisher","DOI":"10.13176\/11.427"},{"key":"e_1_3_3_3_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/11744023_32"},{"key":"e_1_3_3_3_18_1","volume-title":"Automated latent fingerprint recognition","author":"Cao Kai","year":"2018","unstructured":"Kai Cao and Anil\u00a0K Jain. 2018. Automated latent fingerprint recognition. IEEE transactions on pattern analysis and machine intelligence 41, 4(2018), 788\u2013800."},{"key":"e_1_3_3_3_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISBA.2016.7477241"},{"key":"e_1_3_3_3_20_1","doi-asserted-by":"publisher","DOI":"10.3390\/jimaging4010021"},{"key":"e_1_3_3_3_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/0017-9310(69)90011-8"},{"key":"e_1_3_3_3_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.113114"},{"key":"e_1_3_3_3_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSP.2016.7878049"},{"key":"e_1_3_3_3_24_1","doi-asserted-by":"publisher","DOI":"10.1049\/bme2.12024"},{"key":"e_1_3_3_3_25_1","volume-title":"VPID: Towards Vein Pattern Identification Using Thermal Imaging. i-com 18, 3","author":"Faltaous Sarah","year":"2019","unstructured":"Sarah Faltaous, Jonathan Liebers, Yomna Abdelrahman, Florian Alt, and Stefan Schneegass. 2019. VPID: Towards Vein Pattern Identification Using Thermal Imaging. i-com 18, 3 (2019), 259\u2013270."},{"key":"e_1_3_3_3_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3568444.3570597"},{"key":"e_1_3_3_3_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2018.2795609"},{"key":"e_1_3_3_3_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04962-0_53"},{"key":"e_1_3_3_3_29_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3350259"},{"key":"e_1_3_3_3_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ajic.2017.02.014"},{"key":"e_1_3_3_3_31_1","volume-title":"Integrating faces and fingerprints for personal identification","author":"Hong Lin","year":"1998","unstructured":"Lin Hong and Anil Jain. 1998. Integrating faces and fingerprints for personal identification. IEEE transactions on pattern analysis and machine intelligence 20, 12(1998), 1295\u20131307."},{"key":"e_1_3_3_3_32_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0079440"},{"key":"e_1_3_3_3_33_1","doi-asserted-by":"publisher","DOI":"10.1111\/psyp.12243"},{"key":"e_1_3_3_3_34_1","volume-title":"A survey of face recognition techniques. journal of information processing systems 5, 2","author":"Jafri Rabia","year":"2009","unstructured":"Rabia Jafri and Hamid\u00a0R Arabnia. 2009. A survey of face recognition techniques. journal of information processing systems 5, 2 (2009), 41\u201368."},{"key":"e_1_3_3_3_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/0-306-47044-6_1"},{"key":"e_1_3_3_3_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.818349"},{"key":"e_1_3_3_3_37_1","volume-title":"Macromolecular symposia, Vol.\u00a0347","author":"Khokher Rohit","unstructured":"Rohit Khokher, Ram\u00a0Chandra Singh, and Rahul Kumar. 2015. Footprint recognition with principal component analysis and independent component analysis. In Macromolecular symposia, Vol.\u00a0347. Wiley Online Library, 16\u201326."},{"key":"e_1_3_3_3_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2927079"},{"key":"e_1_3_3_3_39_1","doi-asserted-by":"publisher","DOI":"10.3390\/s20020342"},{"key":"e_1_3_3_3_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979317"},{"key":"e_1_3_3_3_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.183"},{"key":"e_1_3_3_3_42_1","first-page":"91","article-title":"Sift-the scale invariant feature transform","volume":"2","author":"Lowe G","year":"2004","unstructured":"G Lowe. 2004. Sift-the scale invariant feature transform. Int. J 2, 91-110 (2004), 2.","journal-title":"Int. J"},{"key":"e_1_3_3_3_43_1","unstructured":"Scott\u00a0M Lundberg and Su-In Lee. 2017. A unified approach to interpreting model predictions. In Advances in neural information processing systems. 4765\u20134774."},{"key":"e_1_3_3_3_44_1","volume-title":"Thermal symmetry of healthy feet: a precursor to a thermal study of diabetic feet prior to skin breakdown. Physiological measurement 38, 1","author":"Macdonald Audrey","year":"2016","unstructured":"Audrey Macdonald, Nina Petrova, Suhail Ainarkar, John Allen, Peter Plassmann, Aaron Whittam, John Bevans, Francis Ring, Ben Kluwe, Rob Simpson, 2016. Thermal symmetry of healthy feet: a precursor to a thermal study of diabetic feet prior to skin breakdown. Physiological measurement 38, 1 (2016), 33."},{"key":"e_1_3_3_3_45_1","doi-asserted-by":"publisher","DOI":"10.5815\/ijigsp.2014.02.06"},{"key":"e_1_3_3_3_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2945183"},{"key":"e_1_3_3_3_47_1","volume-title":"International conference on information security and cryptology. Springer, 331\u2013350","author":"Meng Yuxin","year":"2012","unstructured":"Yuxin Meng, Duncan\u00a0S Wong, Roman Schlegel, 2012. Touch gestures based biometric authentication scheme for touchscreen mobile phones. In International conference on information security and cryptology. Springer, 331\u2013350."},{"key":"e_1_3_3_3_48_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2019.04.007"},{"key":"e_1_3_3_3_49_1","doi-asserted-by":"publisher","DOI":"10.5120\/ijais12-450568"},{"key":"e_1_3_3_3_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/10.880106"},{"key":"e_1_3_3_3_51_1","volume-title":"2015 International Conference on Computing, Communication and Security (ICCCS). IEEE, 1\u20134.","author":"Ngwira SM","year":"2015","unstructured":"SM Ngwira. 2015. Survey of biometric authentication for e-assessment. In 2015 International Conference on Computing, Communication and Security (ICCCS). IEEE, 1\u20134."},{"key":"e_1_3_3_3_52_1","volume-title":"Proc. ICEE.","author":"Parsons KC","year":"1992","unstructured":"KC Parsons. 1992. Contact between human skin & hot surfaces equivalent contact temperature. In Proc. ICEE."},{"key":"e_1_3_3_3_53_1","volume-title":"Continuous authentication with touch behavioral biometrics and voice on wearable glasses","author":"Peng Ge","year":"2016","unstructured":"Ge Peng, Gang Zhou, David\u00a0T Nguyen, Xin Qi, Qing Yang, and Shuangquan Wang. 2016. Continuous authentication with touch behavioral biometrics and voice on wearable glasses. IEEE transactions on human-machine systems 47, 3 (2016), 404\u2013416."},{"key":"e_1_3_3_3_54_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13047-018-0266-1"},{"key":"e_1_3_3_3_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445067"},{"key":"e_1_3_3_3_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/MMUL.2014.65"},{"key":"e_1_3_3_3_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208577"},{"key":"e_1_3_3_3_58_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2018.5063"},{"key":"e_1_3_3_3_59_1","volume-title":"Pattern recognition and neural networks","author":"Ripley D","unstructured":"Brian\u00a0D Ripley. 2007. Pattern recognition and neural networks. Cambridge university press."},{"key":"e_1_3_3_3_60_1","volume-title":"Associations of foot posture and function to lower extremity pain: results from a population-based foot study. Arthritis care & research 65, 11","author":"Riskowski L","year":"2013","unstructured":"Jody\u00a0L Riskowski, Alyssa\u00a0B Dufour, Thomas\u00a0J Hagedorn, Howard\u00a0J Hillstrom, Virginia\u00a0A Casey, and Marian\u00a0T Hannan. 2013. Associations of foot posture and function to lower extremity pain: results from a population-based foot study. Arthritis care & research 65, 11 (2013), 1804\u20131812."},{"key":"e_1_3_3_3_61_1","volume-title":"Biometric technology for human identification II, Vol.\u00a05779","author":"Ross A","unstructured":"Arun\u00a0A Ross and Rohin Govindarajan. 2005. Feature level fusion of hand and face biometrics. In Biometric technology for human identification II, Vol.\u00a05779. International Society for Optics and Photonics, 196\u2013204."},{"key":"e_1_3_3_3_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557208"},{"key":"e_1_3_3_3_63_1","doi-asserted-by":"publisher","DOI":"10.17485\/ijst\/2016\/v9i6\/82084"},{"key":"e_1_3_3_3_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2012.2221932"},{"key":"e_1_3_3_3_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376534"},{"key":"e_1_3_3_3_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"e_1_3_3_3_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/2611009.2611015"},{"key":"e_1_3_3_3_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2017.7952518"},{"key":"e_1_3_3_3_69_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-71273-4_19"},{"key":"e_1_3_3_3_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/3190618"},{"key":"e_1_3_3_3_71_1","doi-asserted-by":"publisher","DOI":"10.1117\/1.2892674"},{"key":"e_1_3_3_3_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/2816455"},{"key":"e_1_3_3_3_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2013.6613014"},{"key":"e_1_3_3_3_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230633"},{"key":"e_1_3_3_3_75_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.237456"},{"key":"e_1_3_3_3_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/2907069"},{"key":"e_1_3_3_3_77_1","doi-asserted-by":"publisher","DOI":"10.3390\/s20030782"},{"key":"e_1_3_3_3_78_1","volume-title":"2008 World Automation Congress. IEEE, 1\u20136.","author":"Yamakawa Takeshi","year":"2008","unstructured":"Takeshi Yamakawa, Kazuhiko Taniguchi, Kazunari Asari, Syoji Kobashi, and Yutaka Hata. 2008. Biometric personal identification based on gait pattern using both feet pressure change. In 2008 World Automation Congress. IEEE, 1\u20136."},{"key":"e_1_3_3_3_79_1","doi-asserted-by":"publisher","DOI":"10.1109\/CISP.2015.7407957"},{"key":"e_1_3_3_3_80_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1410272112"},{"key":"e_1_3_3_3_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046725"},{"key":"e_1_3_3_3_82_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2018.03.081"},{"key":"e_1_3_3_3_83_1","volume-title":"Recent Advances in User Authentication Using Keystroke Dynamics Biometrics. Number\u00a01","author":"Zhong Yu","unstructured":"Yu Zhong and Yunbin Deng. 2015. A survey on keystroke dynamics biometrics: approaches, advances, and evaluations. In Recent Advances in User Authentication Using Keystroke Dynamics Biometrics. Number\u00a01. Science Gate Publishing, 1\u201322."}],"event":{"name":"CHI '23: CHI Conference on Human Factors in Computing Systems","location":"Hamburg Germany","acronym":"CHI '23","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3544548.3580924","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3544548.3580924","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:47:19Z","timestamp":1750178839000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3544548.3580924"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,19]]},"references-count":83,"alternative-id":["10.1145\/3544548.3580924","10.1145\/3544548"],"URL":"https:\/\/doi.org\/10.1145\/3544548.3580924","relation":{},"subject":[],"published":{"date-parts":[[2023,4,19]]},"assertion":[{"value":"2023-04-19","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}