{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:05:48Z","timestamp":1750309548311,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,4,25]],"date-time":"2025-04-25T00:00:00Z","timestamp":1745539200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-2107057, CNS-2318664, CSR-2403249, CNS-2431596"],"award-info":[{"award-number":["CNS-2107057, CNS-2318664, CSR-2403249, CNS-2431596"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,4,26]]},"DOI":"10.1145\/3706599.3719788","type":"proceedings-article","created":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T20:48:52Z","timestamp":1745441332000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Leveraging Binary Ear Canal Scanning Code for User Authentication in Earbuds"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0494-2631","authenticated-orcid":false,"given":"Chenpei","family":"Huang","sequence":"first","affiliation":[{"name":"University of Houston, Houston, Texas, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-7952-007X","authenticated-orcid":false,"given":"Hui","family":"Zhong","sequence":"additional","affiliation":[{"name":"University of Houston, Houston, Texas, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8423-3375","authenticated-orcid":false,"given":"Zhen","family":"Chen","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0602-476X","authenticated-orcid":false,"given":"Xiaoqi","family":"Qin","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7718-6128","authenticated-orcid":false,"given":"Lan","family":"Zhang","sequence":"additional","affiliation":[{"name":"Clemson University, Clemson, South Carolina, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0782-4187","authenticated-orcid":false,"given":"Xiaoyong (Biran)","family":"Yuan","sequence":"additional","affiliation":[{"name":"Clemson University, Clemson, South Carolina, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2138-4413","authenticated-orcid":false,"given":"Miao","family":"Pan","sequence":"additional","affiliation":[{"name":"Electrical and Computer Engineering, University of Houston, Houston, Texas, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,4,25]]},"reference":[{"key":"e_1_3_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/CCECE.2006.277447"},{"volume-title":"Alexa Smart Home","year":"2024","key":"e_1_3_3_2_3_2","unstructured":"Amazon. 2024. Alexa Smart Home. Amazon. https:\/\/www.amazon.com\/alexa-smart-home\/"},{"key":"e_1_3_3_2_4_2","doi-asserted-by":"crossref","unstructured":"Fr\u00e9d\u00e9ric Bimbot Jean-Fran\u00e7ois Bonastre Corinne Fredouille Guillaume Gravier Ivan Magrin-Chagnolleau Sylvain Meignier Teva Merlin Javier Ortega-Garc\u00eda Dijana Petrovska-Delacr\u00e9taz and Douglas\u00a0A Reynolds. 2004. A tutorial on text-independent speaker verification. EURASIP Journal on Advances in Signal Processing 2004 (2004) 1\u201322.","DOI":"10.1155\/S1110865704310024"},{"key":"e_1_3_3_2_5_2","doi-asserted-by":"crossref","unstructured":"Raj\u00a0Chandra Bose and Dwijendra\u00a0K Ray-Chaudhuri. 1960. On a class of error correcting binary group codes. Information and control 3 1 (1960) 68\u201379.","DOI":"10.1016\/S0019-9958(60)90287-4"},{"key":"e_1_3_3_2_6_2","doi-asserted-by":"crossref","unstructured":"Yetong Cao Chao Cai Anbo Yu Fan Li and Jun Luo. 2023. EarACE: Empowering Versatile Acoustic Sensing via Earable Active Noise Cancellation Platform. Proceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies 7 2 (2023) 1\u201323.","DOI":"10.1145\/3596242"},{"key":"e_1_3_3_2_7_2","unstructured":"CUI Devices. 2024. DigiKey Page: CMC-3015-44L100 Product. https:\/\/www.digikey.com\/en\/products\/detail\/cui-devices\/CMC-3015-44L100\/7398899 Accessed: 2024-05-25."},{"key":"e_1_3_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1145\/3447993.3448624"},{"key":"e_1_3_3_2_9_2","doi-asserted-by":"crossref","unstructured":"Robert Gallager. 1962. Low-density parity-check codes. IRE Transactions on information theory 8 1 (1962) 21\u201328.","DOI":"10.1109\/TIT.1962.1057683"},{"key":"e_1_3_3_2_10_2","doi-asserted-by":"crossref","unstructured":"Yang Gao Wei Wang Vir\u00a0V Phoha Wei Sun and Zhanpeng Jin. 2019. EarEcho: Using ear canal echo for wearable authentication. Proceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies 3 3 (2019) 1\u201324.","DOI":"10.1145\/3351239"},{"key":"e_1_3_3_2_11_2","volume-title":"About Touch ID advanced security technology","author":"Inc. Apple","year":"2023","unstructured":"Apple Inc.2023. About Touch ID advanced security technology. Apple Inc. https:\/\/support.apple.com\/en-us\/105095"},{"key":"e_1_3_3_2_12_2","doi-asserted-by":"crossref","unstructured":"Andrew Teoh\u00a0Beng Jin David Ngo\u00a0Chek Ling and Alwyn Goh. 2004. Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern recognition 37 11 (2004) 2245\u20132255.","DOI":"10.1016\/j.patcog.2004.04.011"},{"key":"e_1_3_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1145\/319709.319714"},{"key":"e_1_3_3_2_14_2","unstructured":"P\u0131nar K\u00fcrt\u00fcnl\u00fco\u011flu Beste Akdik and Enis Karaarslan. 2022. Security of virtual reality authentication methods in metaverse: An overview. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2209.06447 (2022) 1\u20135."},{"key":"e_1_3_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.23919\/EUSIPCO.2018.8553015"},{"key":"e_1_3_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84882-254-2"},{"key":"e_1_3_3_2_17_2","doi-asserted-by":"crossref","unstructured":"Kren\u00a0Rahbek N\u00f8rgaard Karolina\u00a0K Charaziak and Christopher\u00a0A Shera. 2019. A comparison of ear-canal-reflectance measurement methods in an ear simulator. The Journal of the Acoustical Society of America 146 2 (2019) 1350\u20131361.","DOI":"10.1121\/1.5123379"},{"key":"e_1_3_3_2_18_2","volume-title":"Signals & Systems","author":"Oppenheim A.V.","year":"1997","unstructured":"A.V. Oppenheim, A.S. Willsky, and S.H. Nawab. 1997. Signals & Systems. Prentice Hall, Upper Saddle River, NJ. https:\/\/books.google.com\/books?id=LwQqAQAAMAAJ"},{"key":"e_1_3_3_2_19_2","doi-asserted-by":"publisher","unstructured":"Nobuyuki Otsu. 1979. A Threshold Selection Method from Gray-Level Histograms. IEEE Transactions on Systems Man and Cybernetics 9 1 (1979) 62\u201366. 10.1109\/TSMC.1979.4310076","DOI":"10.1109\/TSMC.1979.4310076"},{"volume-title":"PayByFace \u2013 Face Recognition Payment System","year":"2024","key":"e_1_3_3_2_20_2","unstructured":"PayByFace. 2024. PayByFace \u2013 Face Recognition Payment System. PayByFace Company. https:\/\/paybyface.io"},{"key":"e_1_3_3_2_21_2","unstructured":"Sony. 2024. Amazon Page: Sony MDREX15AP\/B Black Earbuds. https:\/\/www.amazon.com\/Sony-MDREX15AP-B-Black\/dp\/B00JG2WRUO Accessed: 2024-05-25."},{"key":"e_1_3_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833742"},{"key":"e_1_3_3_2_23_2","doi-asserted-by":"crossref","unstructured":"Susan\u00a0E Voss Gabrielle\u00a0R Merchant and Nicholas\u00a0J Horton. 2012. Effects of middle-ear disorders on power reflectance measured in cadaveric ear canals. Ear and hearing 33 2 (2012) 195\u2013208.","DOI":"10.1097\/AUD.0b013e31823235b5"},{"key":"e_1_3_3_2_24_2","doi-asserted-by":"crossref","unstructured":"Zi Wang Sheng Tan Linghan Zhang Yili Ren Zhi Wang and Jie Yang. 2021. Eardynamic: An ear canal deformation based continuous user authentication using in-ear wearables. Proceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies 5 1 (2021) 1\u201327.","DOI":"10.1145\/3448098"},{"key":"e_1_3_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.5555\/554634"},{"key":"e_1_3_3_2_26_2","doi-asserted-by":"crossref","unstructured":"Masaki Yasuhara Isao Nambu and Shohei Yano. 2022. Bilateral ear acoustic authentication: A biometric authentication system using both ears and a special earphone. Applied Sciences 12 6 (2022) 3167.","DOI":"10.3390\/app12063167"},{"key":"e_1_3_3_2_27_2","doi-asserted-by":"crossref","unstructured":"Wenyi Zhao Rama Chellappa P\u00a0Jonathon Phillips and Azriel Rosenfeld. 2003. Face recognition: A literature survey. ACM computing surveys (CSUR) 35 4 (2003) 399\u2013458.","DOI":"10.1145\/954339.954342"},{"key":"e_1_3_3_2_28_2","doi-asserted-by":"crossref","unstructured":"Hui Zhong Chenpei Huang Xinyue Zhang and Miao Pan. 2023. Metaverse CAN: Embracing Continuous Active and Non-intrusive Biometric Authentication. IEEE Network 37 6 (2023) 67\u201373.","DOI":"10.1109\/MNET.2023.3318890"}],"event":{"name":"CHI EA '25: Extended Abstracts of the CHI Conference on Human Factors in Computing Systems","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Yokohama Japan","acronym":"CHI EA '25"},"container-title":["Proceedings of the Extended Abstracts of the CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3706599.3719788","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3706599.3719788","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3706599.3719788","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3706599.3719788","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:44Z","timestamp":1750295924000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3706599.3719788"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,25]]},"references-count":27,"alternative-id":["10.1145\/3706599.3719788","10.1145\/3706599"],"URL":"https:\/\/doi.org\/10.1145\/3706599.3719788","relation":{},"subject":[],"published":{"date-parts":[[2025,4,25]]},"assertion":[{"value":"2025-04-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}