{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T20:07:47Z","timestamp":1776110867664,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,6,18]],"date-time":"2023-06-18T00:00:00Z","timestamp":1687046400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS2120396"],"award-info":[{"award-number":["CNS2120396"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,6,18]]},"DOI":"10.1145\/3581791.3596841","type":"proceedings-article","created":{"date-parts":[[2023,6,16]],"date-time":"2023-06-16T17:52:21Z","timestamp":1686937941000},"page":"397-409","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["BioCase: Privacy Protection via Acoustic Sensing of Finger Touches on Smartphone Case Mini-Structures"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3970-9917","authenticated-orcid":false,"given":"Yilin","family":"Yang","sequence":"first","affiliation":[{"name":"Rutgers University, Piscataway, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-1718-8938","authenticated-orcid":false,"given":"Xin","family":"Li","sequence":"additional","affiliation":[{"name":"Rutgers University, Piscataway, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-5528-0783","authenticated-orcid":false,"given":"Zhengkun","family":"Ye","sequence":"additional","affiliation":[{"name":"Temple University, Philadelphia, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3984-6973","authenticated-orcid":false,"given":"Yan","family":"Wang","sequence":"additional","affiliation":[{"name":"Temple University, Philadelphia, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3994-766X","authenticated-orcid":false,"given":"Yingying","family":"Chen","sequence":"additional","affiliation":[{"name":"Rutgers University, Piscataway, United States of America"}]}],"member":"320","published-online":{"date-parts":[[2023,6,18]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Shanaihi Sanjay Patel, and Bhoopesh Kumar Sharma","author":"Obaid Almheiri Abdulrahman Mohammed","year":"2022","unstructured":"Abdulrahman Mohammed Obaid Almheiri , Shanaihi Sanjay Patel, and Bhoopesh Kumar Sharma . 2022 . A Conceptual Study of Forgery of 3D Fingerprints and Its Threat to Biometric Security Systems. Journal of Positive School Psychology ( 2022), 4453--4462. Abdulrahman Mohammed Obaid Almheiri, Shanaihi Sanjay Patel, and Bhoopesh Kumar Sharma. 2022. A Conceptual Study of Forgery of 3D Fingerprints and Its Threat to Biometric Security Systems. Journal of Positive School Psychology (2022), 4453--4462."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2014.10.011"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.628714"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3081333.3081355"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594368.2594373"},{"key":"e_1_3_2_1_6_1","volume-title":"Symposium on Usable Privacy and Security (SOUPS). 257--276","author":"Cherapau Ivan","year":"2015","unstructured":"Ivan Cherapau , Ildar Muslukhov , Nalin Asanka , and Konstantin Beznosov . 2015 . On the Impact of Touch ID on iPhone Passcodes . In Symposium on Usable Privacy and Security (SOUPS). 257--276 . Ivan Cherapau, Ildar Muslukhov, Nalin Asanka, and Konstantin Beznosov. 2015. On the Impact of Touch ID on iPhone Passcodes. In Symposium on Usable Privacy and Security (SOUPS). 257--276."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74835-9_24"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2015.7178258"},{"key":"e_1_3_2_1_9_1","first-page":"5","article-title":"Unsupervised Biometric Anti-spoofing using Generative Adversarial Networks","volume":"11","author":"Gupta Vishu","year":"2019","unstructured":"Vishu Gupta , Masakatsu Nishigaki , and Tetsushi Ohki . 2019 . Unsupervised Biometric Anti-spoofing using Generative Adversarial Networks . International Journal of Informatics Society 11 , 1 (2019), 5 . Vishu Gupta, Masakatsu Nishigaki, and Tetsushi Ohki. 2019. Unsupervised Biometric Anti-spoofing using Generative Adversarial Networks. International Journal of Informatics Society 11, 1 (2019), 5.","journal-title":"International Journal of Informatics Society"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/APCC.2018.8633498"},{"key":"e_1_3_2_1_11_1","volume-title":"Text-dependent speaker recognition","author":"H\u00e9bert Matthieu","unstructured":"Matthieu H\u00e9bert . 2008. Text-dependent speaker recognition . In Springer handbook of speech processing. Springer , 743--762. Matthieu H\u00e9bert. 2008. Text-dependent speaker recognition. In Springer handbook of speech processing. Springer, 743--762."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833564"},{"key":"e_1_3_2_1_13_1","unstructured":"Apple IOS. 2019. Face ID. https:\/\/support.apple.com\/en-us\/HT208108.  Apple IOS. 2019. Face ID. https:\/\/support.apple.com\/en-us\/HT208108."},{"key":"e_1_3_2_1_14_1","unstructured":"Apple IOS. 2019. Siri. https:\/\/www.apple.com\/ios\/siri\/.  Apple IOS. 2019. Siri. https:\/\/www.apple.com\/ios\/siri\/."},{"key":"e_1_3_2_1_15_1","volume-title":"REVEALED: Here's Who Uses iPhone Cases And Why. https:\/\/www.businessinsider.com\/iphone-case-survey-2014-7.","author":"Kiersz Andy","year":"2014","unstructured":"Andy Kiersz . 2014 . REVEALED: Here's Who Uses iPhone Cases And Why. https:\/\/www.businessinsider.com\/iphone-case-survey-2014-7. Andy Kiersz. 2014. REVEALED: Here's Who Uses iPhone Cases And Why. https:\/\/www.businessinsider.com\/iphone-case-survey-2014-7."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74549-5_7"},{"key":"e_1_3_2_1_17_1","volume-title":"Comparison and combination of iris matchers for reliable personal authentication. Pattern recognition 43, 3","author":"Kumar Ajay","year":"2010","unstructured":"Ajay Kumar and Arun Passi . 2010. Comparison and combination of iris matchers for reliable personal authentication. Pattern recognition 43, 3 ( 2010 ), 1016--1026. Ajay Kumar and Arun Passi. 2010. Comparison and combination of iris matchers for reliable personal authentication. Pattern recognition 43, 3 (2010), 1016--1026."},{"key":"e_1_3_2_1_18_1","volume-title":"Protective case usage among U.S. smartphone owners","author":"Kunst Alexander","year":"2017","unstructured":"Alexander Kunst . 2019. Protective case usage among U.S. smartphone owners 2017 . https:\/\/www.statista.com\/statistics\/368627\/us-protective-case-usage-among-smartphone-owners\/. Alexander Kunst. 2019. Protective case usage among U.S. smartphone owners 2017. https:\/\/www.statista.com\/statistics\/368627\/us-protective-case-usage-among-smartphone-owners\/."},{"key":"e_1_3_2_1_19_1","volume-title":"Protective case usage among U.S. smartphone owners","author":"Kunst Alexander","year":"2017","unstructured":"Alexander Kunst . 2019. Protective case usage among U.S. smartphone owners 2017 . https:\/\/www.statista.com\/statistics\/368627\/us-protective-case-usage-among-smartphone-owners\/. Alexander Kunst. 2019. Protective case usage among U.S. smartphone owners 2017. https:\/\/www.statista.com\/statistics\/368627\/us-protective-case-usage-among-smartphone-owners\/."},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. 2161--2170","author":"Laput Gierad","year":"2015","unstructured":"Gierad Laput , Eric Brockmeyer , Scott E Hudson , and Chris Harrison . 2015 . Acoustruments: Passive, acoustically-driven, interactive controls for handheld devices . In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. 2161--2170 . Gierad Laput, Eric Brockmeyer, Scott E Hudson, and Chris Harrison. 2015. Acoustruments: Passive, acoustically-driven, interactive controls for handheld devices. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. 2161--2170."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354242"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICISCE50968.2020.00468"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2014.6854309"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486283"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1057\/sth.2015.3"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10044-005-0022-6"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359172"},{"key":"e_1_3_2_1_28_1","volume-title":"CVPR 2005. IEEE computer society conference on","volume":"1","author":"Phillips P Jonathon","year":"2005","unstructured":"P Jonathon Phillips , Patrick J Flynn , Todd Scruggs , Kevin W Bowyer , Jin Chang , Kevin Hoffman , Joe Marques , Jaesik Min , and William Worek . 2005 . Overview of the face recognition grand challenge. In Computer vision and pattern recognition, 2005 . CVPR 2005. IEEE computer society conference on , Vol. 1 . IEEE, 947--954. P Jonathon Phillips, Patrick J Flynn, Todd Scruggs, Kevin W Bowyer, Jin Chang, Kevin Hoffman, Joe Marques, Jaesik Min, and William Worek. 2005. Overview of the face recognition grand challenge. In Computer vision and pattern recognition, 2005. CVPR 2005. IEEE computer society conference on, Vol. 1. IEEE, 947--954."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3271553.3271618"},{"key":"e_1_3_2_1_30_1","volume-title":"Neuroscience","author":"Purves Dale","year":"2001","unstructured":"Dale Purves and Stephen Mark Williams . 2001. Neuroscience . 2 nd edition. Sinauer Associates 2001 . http:\/\/lib.ugent.be\/catalog\/ebk01:3450000000002013 Dale Purves and Stephen Mark Williams. 2001. Neuroscience. 2nd edition. Sinauer Associates 2001. http:\/\/lib.ugent.be\/catalog\/ebk01:3450000000002013","edition":"2"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2015.7139044"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3386901.3388939"},{"key":"e_1_3_2_1_33_1","unstructured":"Spotify. 2022. Storage information. https:\/\/support.spotify.com\/us\/article\/storage-information\/.  Spotify. 2022. Storage information. https:\/\/support.spotify.com\/us\/article\/storage-information\/."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3241539.3241568"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2005.27"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2899359"},{"key":"e_1_3_2_1_37_1","unstructured":"Petroc Taylor. 2023. Global smartphone fingerprint sensor penetration rate 2014--2018. https:\/\/www.statista.com\/statistics\/804269\/global-smartphone-fingerprint-sensor-penetration-rate\/.  Petroc Taylor. 2023. Global smartphone fingerprint sensor penetration rate 2014--2018. https:\/\/www.statista.com\/statistics\/804269\/global-smartphone-fingerprint-sensor-penetration-rate\/."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516700"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560553"},{"key":"e_1_3_2_1_40_1","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Wu Cong","year":"2020","unstructured":"Cong Wu , Kun He , Jing Chen , Ziming Zhao , and Ruiying Du . 2020 . Liveness is Not Enough: Enhancing Fingerprint Authentication with Behavioral Biometrics to Defeat Puppet Attacks . In 29th USENIX Security Symposium (USENIX Security 20) . USENIX Association, 2219--2236. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/wu Cong Wu, Kun He, Jing Chen, Ziming Zhao, and Ruiying Du. 2020. Liveness is Not Enough: Enhancing Fingerprint Authentication with Behavioral Biometrics to Defeat Puppet Attacks. In 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, 2219--2236. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/wu"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.3390\/sym11020141"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3320269.3384741"},{"key":"e_1_3_2_1_43_1","volume-title":"Black Hat Conference.","author":"Zhang Yulong","year":"2015","unstructured":"Yulong Zhang , Zhaonfeng Chen , Hui Xue , and Tao Wei . 2015 . Fingerprints on mobile devices: Abusing and leaking . In Black Hat Conference. Yulong Zhang, Zhaonfeng Chen, Hui Xue, and Tao Wei. 2015. Fingerprints on mobile devices: Abusing and leaking. In Black Hat Conference."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381934.2381947"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3241539.3241575"}],"event":{"name":"MobiSys '23: 21st Annual International Conference on Mobile Systems, Applications and Services","location":"Helsinki Finland","acronym":"MobiSys '23","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGOPS ACM Special Interest Group on Operating Systems"]},"container-title":["Proceedings of the 21st Annual International Conference on Mobile Systems, Applications and Services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3581791.3596841","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3581791.3596841","content-type":"text\/html","content-version":"vor","intended-application":"syndication"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:30Z","timestamp":1750178190000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3581791.3596841"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,18]]},"references-count":45,"alternative-id":["10.1145\/3581791.3596841","10.1145\/3581791"],"URL":"https:\/\/doi.org\/10.1145\/3581791.3596841","relation":{},"subject":[],"published":{"date-parts":[[2023,6,18]]},"assertion":[{"value":"2023-06-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}