{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T06:35:29Z","timestamp":1772519729060,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":93,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,12]],"date-time":"2023-11-12T00:00:00Z","timestamp":1699747200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2238553"],"award-info":[{"award-number":["2238553"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2110193"],"award-info":[{"award-number":["2110193"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,12]]},"DOI":"10.1145\/3625687.3625813","type":"proceedings-article","created":{"date-parts":[[2024,4,26]],"date-time":"2024-04-26T12:07:18Z","timestamp":1714133238000},"page":"209-222","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Jawthenticate: Microphone-free Speech-based Authentication using Jaw Motion and Facial Vibrations"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0144-7931","authenticated-orcid":false,"given":"Tanmay","family":"Srivastava","sequence":"first","affiliation":[{"name":"Stony Brook University, Stony Brook, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3226-2318","authenticated-orcid":false,"given":"Shijia","family":"Pan","sequence":"additional","affiliation":[{"name":"University of California Merced, Merced, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8078-4463","authenticated-orcid":false,"given":"Phuc","family":"Nguyen","sequence":"additional","affiliation":[{"name":"University of Massachusetts Amherst, Amherst, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4864-6420","authenticated-orcid":false,"given":"Shubham","family":"Jain","sequence":"additional","affiliation":[{"name":"Stony Brook University, Stony Brook, United States of America"}]}],"member":"320","published-online":{"date-parts":[[2024,4,26]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Ear hooks. shorturl.at\/IPR35","unstructured":"Amazon. 2021. Ear hooks. shorturl.at\/IPR35"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3433210.3437518"},{"key":"e_1_3_2_1_3_1","unstructured":"auth0. 2022. Authenticating Users in Your VR Apps. https:\/\/auth0.com\/blog\/authenticating-users-in-your-vr-apps\/"},{"key":"e_1_3_2_1_4_1","unstructured":"Barcalys. 2016. Barclays rolls out voice biometrics for phone banking. https:\/\/www.finextra.com\/newsarticle\/29245\/barclays-rolls-out-voice-biometrics-for-phone-banking"},{"key":"e_1_3_2_1_5_1","volume-title":"Wavelet transforms: an introduction. Electronics & communication engineering journal 6, 4","author":"Bentley Paul M","year":"1994","unstructured":"Paul M Bentley and JTE McDonnell. 1994. Wavelet transforms: an introduction. Electronics & communication engineering journal 6, 4 (1994), 175--186."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-48881-3_56"},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings. (ICASSP'05)","volume":"5","author":"Brodzik Andrzej K","year":"2005","unstructured":"Andrzej K Brodzik and Olivia Peters. 2005. Symbol-balanced quaternionic periodicity transform for latent pattern detection in DNA sequences. In Proceedings. (ICASSP'05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005., Vol. 5. IEEE, v--373."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1111\/j.2517-6161.1992.tb01887.x","article-title":"Linear filters and non-linear systems","volume":"54","author":"Broomhead DS","year":"1992","unstructured":"DS Broomhead, JP Huke, and MR Muldoon. 1992. Linear filters and non-linear systems. Journal of the Royal Statistical Society: Series B (Methodological) 54, 2 (1992), 373--382.","journal-title":"Journal of the Royal Statistical Society: Series B (Methodological)"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2019.2897933"},{"key":"e_1_3_2_1_10_1","volume-title":"Smartphone continuous authentication using deep learning autoencoders. In 2017 15th annual conference on privacy, security and trust (pst)","author":"Centeno Mario Parre\u00f1o","unstructured":"Mario Parre\u00f1o Centeno, Aad van Moorsel, and Stefano Castruccio. 2017. Smartphone continuous authentication using deep learning autoencoders. In 2017 15th annual conference on privacy, security and trust (pst). IEEE, 147--1478."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2016.7472621"},{"key":"e_1_3_2_1_12_1","volume-title":"Sixth international conference on machine learning and applications (ICMLA","author":"Jong Cheol Jeong Chen","year":"2007","unstructured":"Xue-wen Chen and Jong Cheol Jeong. 2007. Enhanced recursive feature elimination. In Sixth international conference on machine learning and applications (ICMLA 2007). IEEE, 429--435."},{"key":"e_1_3_2_1_13_1","volume-title":"Support-vector networks. Machine learning 20","author":"Cortes Corinna","year":"1995","unstructured":"Corinna Cortes and Vladimir Vapnik. 1995. Support-vector networks. Machine learning 20 (1995), 273--297."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2019.8824958"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11265-016-1148-z"},{"key":"e_1_3_2_1_16_1","volume-title":"The attacker's perspective on automatic speaker verification: An overview. arXiv preprint arXiv:2004.08849","author":"Das Rohan Kumar","year":"2020","unstructured":"Rohan Kumar Das, Xiaohai Tian, Tomi Kinnunen, and Haizhou Li. 2020. The attacker's perspective on automatic speaker verification: An overview. arXiv preprint arXiv:2004.08849 (2020)."},{"key":"e_1_3_2_1_17_1","volume-title":"The essential guide to image processing","author":"Daugman John","unstructured":"John Daugman. 2009. How iris recognition works. In The essential guide to image processing. Elsevier, 715--739."},{"key":"e_1_3_2_1_18_1","unstructured":"DexCom. 2022. Dexcom G7 Receives FDA Clearance. https:\/\/investors.dexcom.com\/news\/news-details\/2022\/Dexcom-G7-Receives-FDA-Clearance-The-Most-Accurate-Continuous-Glucose-Monitoring-System-Cleared-in-the-U.S\/default.aspx#:~:text=(NASDAQ%3ADXCM)%2C%20the ages%20two%20years%20and%20older."},{"key":"e_1_3_2_1_19_1","article-title":"Physical therapy for patients with TMD: a descriptive study of treatment, disability, and health status","volume":"12","author":"Di Fabio Richard P","year":"1998","unstructured":"Richard P Di Fabio. 1998. Physical therapy for patients with TMD: a descriptive study of treatment, disability, and health status. Journal of orofacial pain 12, 2 (1998).","journal-title":"Journal of orofacial pain"},{"key":"e_1_3_2_1_20_1","unstructured":"H Ebelthite. 2016. Could your health be ruined by noises you can't hear? Some gadgets emit silent ultra-high whines that may hurt you. The Daily Mail. Available from: http:\/\/www.dailymail.co.uk\/femail\/article-3527060\/Could-health-ruined-noises-t-hear-gadgets-emit-silent-ultra-high-whines-hurt-you. html [Last viewed 2 August 2017] (2016)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3117811.3117823"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447993.3483240"},{"key":"e_1_3_2_1_23_1","volume-title":"Paul R White, Craig N Dolder, Timothy G Leighton, and Benjamin Lineton.","author":"Fletcher Mark D","year":"2018","unstructured":"Mark D Fletcher, Sian Lloyd Jones, Paul R White, Craig N Dolder, Timothy G Leighton, and Benjamin Lineton. 2018. Effects of very high-frequency sound and ultrasound on humans. Part I: Adverse symptoms after exposure to audible very-high frequency sound. The journal of the acoustical society of America 144, 4 (2018), 2511--2520."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3448113"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3351239"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Patrick J Grother Mei L Ngan and Kayee K Hanaoka. 2018. Ongoing face recognition vendor test (frvt) part 2: Identification. (2018).","DOI":"10.6028\/NIST.IR.8238"},{"key":"e_1_3_2_1_27_1","volume-title":"Neural control of speech","author":"Guenther Frank H","unstructured":"Frank H Guenther. 2016. Neural control of speech. Mit Press."},{"key":"e_1_3_2_1_28_1","volume-title":"2019 International Conference on Advanced Computing and Applications (ACOMP). IEEE, 97--102","author":"Ha Trung","year":"2019","unstructured":"Trung Ha, Tran Khanh Dang, Tran Tri Dang, Tuan Anh Truong, and Manh Tuan Nguyen. 2019. Differential privacy in deep learning: an overview. In 2019 International Conference on Advanced Computing and Applications (ACOMP). IEEE, 97--102."},{"key":"e_1_3_2_1_29_1","volume-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops. 113--118","author":"Hadid Abdenour","year":"2014","unstructured":"Abdenour Hadid. 2014. Face biometrics under spoofing attacks: Vulnerabilities, countermeasures, open issues, and research directions. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops. 113--118."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3560905.3568522"},{"key":"e_1_3_2_1_31_1","volume-title":"Statistical digital signal processing and modeling","author":"Hayes Monson H","unstructured":"Monson H Hayes. 1996. Statistical digital signal processing and modeling. John Wiley & Sons."},{"key":"e_1_3_2_1_32_1","volume-title":"Proceedings of the AAAI Conference on Artificial Intelligence","volume":"36","author":"He Xuanli","year":"2022","unstructured":"Xuanli He, Qiongkai Xu, Lingjuan Lyu, Fangzhao Wu, and Chenguang Wang. 2022. Protecting intellectual property of language generation apis with lexical watermark. In Proceedings of the AAAI Conference on Artificial Intelligence, Vol. 36. 10758--10766."},{"key":"e_1_3_2_1_33_1","unstructured":"HSBC. 2016. HSBC rolls out voice and touch ID security for bank customers. https:\/\/www.theguardian.com\/business\/2016\/feb\/19\/hsbc-rolls-out-voice-touch-id-security-bank-customers"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3572864.3580332"},{"key":"e_1_3_2_1_35_1","volume-title":"2008 3rd IEEE Conference on Industrial Electronics and Applications. IEEE, 2133--2138","author":"Hu Jiankun","year":"2008","unstructured":"Jiankun Hu. 2008. Mobile fingerprint template protection: Progress and open issues. In 2008 3rd IEEE Conference on Industrial Electronics and Applications. IEEE, 2133--2138."},{"key":"e_1_3_2_1_36_1","volume-title":"Articulation rate across dialect, age, and gender. Language variation and change 21, 2","author":"Jacewicz Ewa","year":"2009","unstructured":"Ewa Jacewicz, Robert A Fox, Caitlin O'Neill, and Joseph Salmons. 2009. Articulation rate across dialect, age, and gender. Language variation and change 21, 2 (2009), 233--256."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2019.2914621"},{"key":"e_1_3_2_1_38_1","volume-title":"Likert scale: Explored and explained. British journal of applied science & technology 7, 4","author":"Joshi Ankur","year":"2015","unstructured":"Ankur Joshi, Saket Kale, Satish Chandel, and D Kumar Pal. 2015. Likert scale: Explored and explained. British journal of applied science & technology 7, 4 (2015), 396."},{"key":"e_1_3_2_1_39_1","volume-title":"Proceedings of the 22nd International Workshop on Mobile Computing Systems and Applications. 44--49","author":"Khanna Prerna","year":"2021","unstructured":"Prerna Khanna, Tanmay Srivastava, Shijia Pan, Shubham Jain, and Phuc Nguyen. 2021. Jawsense: recognizing unvoiced sound using a low-cost ear-worn system. In Proceedings of the 22nd International Workshop on Mobile Computing Systems and Applications. 44--49."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.58325"},{"key":"e_1_3_2_1_41_1","volume-title":"Patch Pumps: What are the advantages for people with diabetes? Diabetes Research and Clinical Practice","author":"Kulzer Bernhard","year":"2022","unstructured":"Bernhard Kulzer, Guido Freckmann, Lutz Heinemann, Oliver Schnell, Rolf Hinzmann, and Ralph Ziegler. 2022. Patch Pumps: What are the advantages for people with diabetes? Diabetes Research and Clinical Practice (2022), 109858."},{"key":"e_1_3_2_1_42_1","unstructured":"Hyeokhyen Kwon Catherine Tong Harish Haresamudram Yan Gao Gregory D. Abowd Nicholas D. Lane and Thomas Ploetz. 2020. IMUTube: Automatic Extraction of Virtual on-body Accelerometry from Video for Human Activity Recognition. arXiv:2006.05675 [cs.CV]"},{"key":"e_1_3_2_1_43_1","unstructured":"Mbient Lab. 2020. Mbient IMU. https:\/\/mbientlab.com\/metamotionr\/"},{"key":"e_1_3_2_1_44_1","unstructured":"BW Lawton. 2013. Exposure limits for airborne sound of very high frequency and ultrasonic frequency. (2013)."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1098\/rspa.2015.0624"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/6393.001.0001"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2018.1455307"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3384419.3430779"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS51616.2021.00070"},{"key":"e_1_3_2_1_50_1","first-page":"1","article-title":"Vocal resonance: Using internal body voice for wearable authentication","volume":"2","author":"Liu Rui","year":"2018","unstructured":"Rui Liu, Cory Cornelius, Reza Rawassizadeh, Ronald Peterson, and David Kotz. 2018. Vocal resonance: Using internal body voice for wearable authentication. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 2, 1 (2018), 1--23.","journal-title":"Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3450268.3453537"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.23919\/EUSIPCO.2018.8553015"},{"key":"e_1_3_2_1_53_1","volume-title":"Facial anatomy. Clinics in dermatology 32, 1","author":"Marur Tania","year":"2014","unstructured":"Tania Marur, Yakup Tuna, and Selman Demirci. 2014. Facial anatomy. Clinics in dermatology 32, 1 (2014), 14--23."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"crossref","first-page":"713","DOI":"10.1093\/ejo\/20.6.713","article-title":"An ultrasound investigation of the lip levator musculature","volume":"20","author":"McAlister RW","year":"1998","unstructured":"RW McAlister, EM Harkness, and JJ Nicoll. 1998. An ultrasound investigation of the lip levator musculature. The European Journal of Orthodontics 20, 6 (1998), 713--720.","journal-title":"The European Journal of Orthodontics"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1177\/154193120805200505"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASRU.2017.8268946"},{"key":"e_1_3_2_1_57_1","unstructured":"NicoDerm. 2023. NicoDerm CQ Step 2. https:\/\/www.walmart.com\/ip\/NicoDerm-CQ-Step-2-Extended-Release-Nicotine-Patches-to-Quit-Smoking-14-Mg-14-Count\/1115576?wl13=2906&selectedSellerId=0"},{"key":"e_1_3_2_1_58_1","unstructured":"The University of Reading. 2021. The production of speech sounds. http:\/\/www.personal.rdg.ac.uk\/~llsroach\/phon2\/artic-basics.htm"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/CA.2002.1017500"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2006.12.010"},{"key":"e_1_3_2_1_61_1","volume-title":"Cheng H Yuan, Jason Aydelotte, and Jaime R Garza.","author":"Pessa Joel E","year":"1998","unstructured":"Joel E Pessa, Vikram P Zadoo, Earle K Adrian Jr, Cheng H Yuan, Jason Aydelotte, and Jaime R Garza. 1998. Variability of the midfacial muscles: analysis of 50 hemifacial cadaver dissections. Plastic and reconstructive surgery 102, 6 (1998), 1888--1893."},{"key":"e_1_3_2_1_62_1","volume-title":"Speech rhythms and their neural foundations. Nature reviews neuroscience 21, 6","author":"Poeppel David","year":"2020","unstructured":"David Poeppel and M Florencia Assaneo. 2020. Speech rhythms and their neural foundations. Nature reviews neuroscience 21, 6 (2020), 322--334."},{"key":"e_1_3_2_1_63_1","volume-title":"Share & Trends Report Earphones & Headphones Market Size, Share & Trends Analysis Report By Product (Earphones, Headphones), By Price, By Technology, By Application, By Region, And Segment Forecasts","author":"Research Grand View","year":"2020","unstructured":"Grand View Research. 2022. GVR Report coverEarphones & Headphones Market Size, Share & Trends Report Earphones & Headphones Market Size, Share & Trends Analysis Report By Product (Earphones, Headphones), By Price, By Technology, By Application, By Region, And Segment Forecasts, 2020 - 2027."},{"key":"e_1_3_2_1_64_1","volume-title":"Speaker identification and verification using Gaussian mixture speaker models. Speech communication 17, 1--2","author":"Reynolds Douglas A","year":"1995","unstructured":"Douglas A Reynolds. 1995. Speaker identification and verification using Gaussian mixture speaker models. Speech communication 17, 1--2 (1995), 91--108."},{"key":"e_1_3_2_1_65_1","volume-title":"15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18)","author":"Roy Nirupam","year":"2018","unstructured":"Nirupam Roy, Sheng Shen, Haitham Hassanieh, and Romit Roy Choudhury. 2018. Inaudible Voice Commands: The {Long-Range} Attack and Defense. In 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18). 547--560."},{"key":"e_1_3_2_1_66_1","first-page":"2276","article-title":"A comprehensive survey on various biometric systems","volume":"13","author":"Sabhanayagam T","year":"2018","unstructured":"T Sabhanayagam, V Prasanna Venkatesan, and K Senthamaraikannan. 2018. A comprehensive survey on various biometric systems. International Journal of Applied Engineering Research 13, 5 (2018), 2276--2297.","journal-title":"International Journal of Applied Engineering Research"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSSC.2017.8335440"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858152"},{"key":"e_1_3_2_1_69_1","volume-title":"Proc. 4th WSEAS Int. Conf. Comput. Eng. Appl.(CEA). 150--158","author":"Sepasian Mojtaba","year":"2009","unstructured":"Mojtaba Sepasian, Cristinel Mares, and Wamadeva Balachandran. 2009. Liveness and spoofing in fingerprint identification: Issues and challenges. In Proc. 4th WSEAS Int. Conf. Comput. Eng. Appl.(CEA). 150--158."},{"key":"e_1_3_2_1_70_1","volume-title":"Rhythm and transforms","author":"Sethares William A","unstructured":"William A Sethares and Diego Ba\u00f1uelos. 2007. Rhythm and transforms. Vol. 1. Springer."},{"key":"e_1_3_2_1_71_1","volume-title":"Periodicity transforms","author":"Sethares William A","year":"1999","unstructured":"William A Sethares and Thomas W Staley. 1999. Periodicity transforms. IEEE transactions on Signal Processing 47, 11 (1999), 2953--2964."},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1076\/jnmr.30.2.149.7111"},{"key":"e_1_3_2_1_73_1","volume-title":"A mathematical theory of communication. The Bell system technical journal 27, 3","author":"Shannon Claude Elwood","year":"1948","unstructured":"Claude Elwood Shannon. 1948. A mathematical theory of communication. The Bell system technical journal 27, 3 (1948), 379--423."},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447993.3483272"},{"key":"e_1_3_2_1_75_1","unstructured":"Shokz. 2023. Shokz - OpenRun Bone Conduction Open-Ear Endurance Headphones - Black. https:\/\/www.bestbuy.com\/site\/shokz-openrun-bone-conduction-open-ear-endurance-headphones-black\/6492431.p?skuId=6492431&extStoreId=498&ref=212&loc=1&gclid=Cj0KCQjw4s-kBhDqARIsAN-ipH1_M-i6_ujf5ADFF-EA4M30q1n_KNNLEcrdWYHCCdUCxcH5JmQ9zlAaAqhKEALw_wcB&gclsrc=aw.ds"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/3212480.3212501"},{"key":"e_1_3_2_1_77_1","first-page":"7","article-title":"Voice biometric: A technology for voice based authentication","volume":"10","author":"Singh Nilu","year":"2018","unstructured":"Nilu Singh, Alka Agrawal, and RA Khan. 2018. Voice biometric: A technology for voice based authentication. Advanced Science, Engineering and Medicine 10, 7--8 (2018), 754--759.","journal-title":"Advanced Science, Engineering and Medicine"},{"key":"e_1_3_2_1_78_1","unstructured":"Sony. 2023. Sony Xperia Ear Duo True Wireless headset - Black. https:\/\/www.amazon.com\/Sony-Xperia-True-Wireless-headset\/dp\/B079WDK6S3"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/3550281"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/3550281"},{"key":"e_1_3_2_1_81_1","volume-title":"Why use the S-transform. Pseudo-differential operators: partial differential equations and time-frequency analysis 52","author":"Stockwell RG","year":"2007","unstructured":"RG Stockwell. 2007. Why use the S-transform. Pseudo-differential operators: partial differential equations and time-frequency analysis 52 (2007), 279--309."},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/78.492555"},{"key":"e_1_3_2_1_83_1","unstructured":"SugarBEAT. 2022. SugarBEAT: \"The World's First Non-Invasive Glucose Monitor\". https:\/\/www.healthline.com\/diabetesmine\/non-invasive-sugarbeat-cgm-diabetes#Winning-at-glucose-measurement-without-needles?"},{"key":"e_1_3_2_1_84_1","first-page":"409","article-title":"Video authentication: Issues and challenges","volume":"9","author":"Upadhyay Saurabh","year":"2012","unstructured":"Saurabh Upadhyay and Sanjay Kumar Singh. 2012. Video authentication: Issues and challenges. International Journal of Computer Science Issues (IJCSI) 9, 1 (2012), 409.","journal-title":"International Journal of Computer Science Issues (IJCSI)"},{"key":"e_1_3_2_1_85_1","unstructured":"Upright. 2023. The Simplest Way to Transform Your Posture. https:\/\/www.uprightpose.com\/"},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0095-4470(95)80035-2"},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/3369812"},{"key":"e_1_3_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1145\/3534606"},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1145\/3448098"},{"key":"e_1_3_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485730.3485937"},{"key":"e_1_3_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.3390\/sym11020141"},{"key":"e_1_3_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1145\/3410530.3414329"},{"key":"e_1_3_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2021.3134654"}],"event":{"name":"SenSys '23: 21st ACM Conference on Embedded Networked Sensor Systems","location":"Istanbul Turkiye","acronym":"SenSys '23","sponsor":["SIGARCH ACM Special Interest Group on Computer Architecture","SIGBED ACM Special Interest Group on Embedded Systems","SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGOPS ACM Special Interest Group on Operating Systems"]},"container-title":["Proceedings of the 21st ACM Conference on Embedded Networked Sensor Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3625687.3625813","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3625687.3625813","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:11Z","timestamp":1750182551000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3625687.3625813"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,12]]},"references-count":93,"alternative-id":["10.1145\/3625687.3625813","10.1145\/3625687"],"URL":"https:\/\/doi.org\/10.1145\/3625687.3625813","relation":{},"subject":[],"published":{"date-parts":[[2023,11,12]]},"assertion":[{"value":"2024-04-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}