{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T15:59:42Z","timestamp":1776182382828,"version":"3.50.1"},"reference-count":53,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2024,3,6]],"date-time":"2024-03-06T00:00:00Z","timestamp":1709683200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Youth Innovation Team of Shandong Provincial","award":["2022KJ043"],"award-info":[{"award-number":["2022KJ043"]}]},{"name":"Hainan Provincial Joint Project of Sanya Yazhou Bay Science and Technology City","award":["2021JJLH0060"],"award-info":[{"award-number":["2021JJLH0060"]}]},{"DOI":"10.13039\/501100006374","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62272427, 62072287"],"award-info":[{"award-number":["62272427, 62072287"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Interact. Mob. Wearable Ubiquitous Technol."],"published-print":{"date-parts":[[2024,3,6]]},"abstract":"<jats:p>User authentication on smartphones needs to balance both security and convenience. Many image-based face authentication methods are vulnerable to spoofing and are plagued by privacy breaches, so models based on acoustic sensing have emerged to achieve reliable user authentication. However, they can only achieve reasonable performance under specific conditions (i.e., a fixed range), and they can not resist 3D printing attacks. To address these limitations, we present a novel user authentication system, referred to as AFace. The system mainly consists of two parts: an iso-depth model and a range-adaptive (RA) algorithm. The iso-depth model establishes a connection between acoustic echoes and facial structures, while taking into account the influence of biological materials on echo energy, making it resistant to 3D printing attacks (as it's difficult to replicate material information in 3D printing). RA algorithm can adaptively compensate for the distance between the user and the smartphone, enabling flexible authentication modes. Results from experiments with 40 volunteers demonstrate that AFace achieves an average accuracy of 96.9% and an F1 score of 96.9%, and no image\/video-based attack is observed to succeed in spoofing.<\/jats:p>","DOI":"10.1145\/3643510","type":"journal-article","created":{"date-parts":[[2024,3,6]],"date-time":"2024-03-06T13:12:36Z","timestamp":1709730756000},"page":"1-33","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["AFace"],"prefix":"10.1145","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-9129-9787","authenticated-orcid":false,"given":"Zhaopeng","family":"Xu","sequence":"first","affiliation":[{"name":"Ocean University of China, Qingdao, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0485-839X","authenticated-orcid":false,"given":"Tong","family":"Liu","sequence":"additional","affiliation":[{"name":"Shanghai University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1209-078X","authenticated-orcid":false,"given":"Ruobing","family":"Jiang","sequence":"additional","affiliation":[{"name":"Ocean University of China, Qingdao, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7935-886X","authenticated-orcid":false,"given":"Pengfei","family":"Hu","sequence":"additional","affiliation":[{"name":"Shandong University, Qingdao, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6890-0107","authenticated-orcid":false,"given":"Zhongwen","family":"Guo","sequence":"additional","affiliation":[{"name":"Ocean University of China, Qingdao, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7363-1987","authenticated-orcid":false,"given":"Chao","family":"Liu","sequence":"additional","affiliation":[{"name":"Ocean University of China, Qingdao, China"}]}],"member":"320","published-online":{"date-parts":[[2024,3,6]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3532342.3532348"},{"key":"e_1_2_1_2_1","volume-title":"Recent trends in porous sound-absorbing materials. Sound & vibration 44, 7","author":"Arenas Jorge P","year":"2010","unstructured":"Jorge P Arenas and Malcolm J Crocker. 2010. Recent trends in porous sound-absorbing materials. Sound & vibration 44, 7 (2010), 12--18."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107447"},{"key":"e_1_2_1_4_1","first-page":"141","article-title":"Face Antispoofing Using Speeded-Up Robust Features and Fisher Vector Encoding","volume":"24","author":"Boulkenafet Z.","year":"2017","unstructured":"Z. Boulkenafet, J. Komulainen, and A. Hadid. 2017. Face Antispoofing Using Speeded-Up Robust Features and Fisher Vector Encoding. IEEE Signal Processing Letters 24, 2 (2017), 141--145.","journal-title":"IEEE Signal Processing Letters"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3026553"},{"key":"e_1_2_1_6_1","volume-title":"Automated latent fingerprint recognition","author":"Cao Kai","year":"2018","unstructured":"Kai Cao and Anil K Jain. 2018. Automated latent fingerprint recognition. IEEE transactions on pattern analysis and machine intelligence 41, 4 (2018), 788--800."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3081333.3081355"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2959203"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3569478"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057220"},{"key":"e_1_2_1_11_1","unstructured":"Bkav Corp. 2017. How Bkav tricked iPhone X's Face ID with a mask. https:\/\/www.youtube.com\/watch?v=i4YQRLQVixM."},{"key":"e_1_2_1_12_1","volume-title":"2013 BIOSIG - Proceedings of the 12th International Conference of Biometrics Special Interest Group","volume":"216","author":"Erdogmus Nesli","year":"2013","unstructured":"Nesli Erdogmus and S\u00e9bastien Marcel. 2013. Spoofing 2D Face Recognition Systems with 3D Masks. In 2013 BIOSIG - Proceedings of the 12th International Conference of Biometrics Special Interest Group, Darmstadt, Germany, September 4-6, 2013 (LNI, Vol. P-212), Arslan Br\u00f6mme and Christoph Busch (Eds.). GI, 209--216. https:\/\/dl.gi.de\/handle\/20.500.12116\/17670"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2322255"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372224.3419206"},{"key":"e_1_2_1_15_1","volume-title":"Single-Side Domain Generalization for Face Anti-Spoofing. In 2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR).","author":"Jia Y.","unstructured":"Y. Jia, J. Zhang, S. Shan, and X. Chen. 2020. Single-Side Domain Generalization for Face Anti-Spoofing. In 2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR)."},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1611835114"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.902037"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3202115"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590315"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313991.3314002"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488768"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3210240.3210325"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3264437.3264439"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.robot.2007.05.006"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2021.3097912"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2007.4409068"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2007.4409068"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2578288"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","unstructured":"Joaquin Qui\u00f1onero-Candela Masashi Sugiyama Anton Schwaighofer and Neil D. Lawrence. 2008. Dataset Shift in Machine Learning. The MIT Press. https:\/\/doi.org\/10.7551\/mitpress\/9780262170055.001.0001","DOI":"10.7551\/mitpress\/9780262170055.001.0001"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2014.09.006"},{"key":"e_1_2_1_31_1","unstructured":"Steve Ranger. [n. d.]. iPhone X: This is how much it costs to make one in components. https:\/\/www.zdnet.com\/article\/iphone-x-this-is-how-much-it-costs-to-make-in-components\/."},{"key":"e_1_2_1_32_1","volume-title":"Lampert","author":"Rebuffi Sylvestre-Alvise","year":"2017","unstructured":"Sylvestre-Alvise Rebuffi, Alexander Kolesnikov, Georg Sperl, and Christoph H. Lampert. 2017. iCaRL: Incremental Classifier and Representation Learning. (2017). arXiv:1611.07725 [cs.CV]"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1038\/d41586-020-03188-2"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.54"},{"key":"e_1_2_1_35_1","volume-title":"2012 BIOSIG-Proceedings of the International Conference of Biometrics Special Interest Group (BIOSIG). IEEE, 1--12","author":"Stein Chris","year":"2012","unstructured":"Chris Stein, Claudia Nickel, and Christoph Busch. 2012. Fingerphoto recognition with smartphone cameras. In 2012 BIOSIG-Proceedings of the International Conference of Biometrics Special Interest Group (BIOSIG). IEEE, 1--12."},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74549-5_27"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1143120.1143128"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.24963\/IJCAI.2021\/628"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM48880.2022.9796906"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3424220"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2971648.2971670"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447993.3482858"},{"key":"e_1_2_1_43_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3448098","article-title":"EarDynamic: An Ear Canal Deformation Based Continuous User Authentication Using In-Ear Wearables","volume":"5","author":"Wang Zi","year":"2021","unstructured":"Zi Wang, Sheng Tan, Linghan Zhang, Yili Ren, Zhi Wang, and Jie Yang. 2021. EarDynamic: An Ear Canal Deformation Based Continuous User Authentication Using In-Ear Wearables. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 5, 1 (2021), 1--27.","journal-title":"Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488737"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3495243.3560515"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3351273"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCC49849.2020.9238889"},{"key":"e_1_2_1_48_1","first-page":"1","article-title":"Revisiting Pixel-Wise Supervision for Face Anti-Spoofing","volume":"99","author":"Yu Z.","year":"2021","unstructured":"Z. Yu, X. Li, J. Shi, Z. Xia, and G. Zhao. 2021. Revisiting Pixel-Wise Supervision for Face Anti-Spoofing. IEEE Transactions on Biometrics Behavior and Identity Science PP, 99 (2021), 1--1.","journal-title":"IEEE Transactions on Biometrics Behavior and Identity Science PP"},{"key":"e_1_2_1_49_1","volume-title":"Privacy leakage in mobile sensing: Your unlock passwords can be leaked through wireless hotspot functionality. Mobile Information Systems 2016","author":"Zhang Jie","year":"2016","unstructured":"Jie Zhang, Xiaolong Zheng, Zhanyong Tang, Tianzhang Xing, Xiaojiang Chen, Dingyi Fang, Rong Li, Xiaoqing Gong, and Feng Chen. 2016. Privacy leakage in mobile sensing: Your unlock passwords can be leaked through wireless hotspot functionality. Mobile Information Systems 2016 (2016)."},{"key":"e_1_2_1_50_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3466638","article-title":"GaitSense: towards ubiquitous gait-based human identification with Wi-Fi","volume":"18","author":"Zhang Yi","year":"2021","unstructured":"Yi Zhang, Yue Zheng, Guidong Zhang, Kun Qian, Chen Qian, and Zheng Yang. 2021. GaitSense: towards ubiquitous gait-based human identification with Wi-Fi. ACM Transactions on Sensor Networks (TOSN) 18, 1 (2021), 1--24.","journal-title":"ACM Transactions on Sensor Networks (TOSN)"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3241539.3241575"},{"key":"e_1_2_1_52_1","volume-title":"Robust Human Face Authentication Leveraging Acoustic Sensing on Smartphones","author":"Zhou Bing","year":"2021","unstructured":"Bing Zhou, Zongxing Xie, Yinuo Zhang, Jay Lohokare, Ruipeng Gao, and Fan Ye. 2021. Robust Human Face Authentication Leveraging Acoustic Sensing on Smartphones. IEEE Transactions on Mobile Computing (2021)."},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243777"}],"container-title":["Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3643510","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3643510","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T13:04:57Z","timestamp":1755867897000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3643510"}},"subtitle":["Range-flexible Anti-spoofing Face Authentication via Smartphone Acoustic Sensing"],"short-title":[],"issued":{"date-parts":[[2024,3,6]]},"references-count":53,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,3,6]]}},"alternative-id":["10.1145\/3643510"],"URL":"https:\/\/doi.org\/10.1145\/3643510","relation":{},"ISSN":["2474-9567"],"issn-type":[{"value":"2474-9567","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,3,6]]},"assertion":[{"value":"2024-03-06","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}