{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T22:33:46Z","timestamp":1757630026431,"version":"3.44.0"},"reference-count":54,"publisher":"Association for Computing Machinery (ACM)","issue":"5","funder":[{"DOI":"10.13039\/501100002241","name":"Japan Science and Technology Agency","doi-asserted-by":"publisher","award":["JPMJPR2134,JPMJCR25U4"],"award-info":[{"award-number":["JPMJPR2134,JPMJCR25U4"]}],"id":[{"id":"10.13039\/501100002241","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001691","name":"Japan Society for the Promotion of Science","doi-asserted-by":"publisher","award":["JP23KJ1884"],"award-info":[{"award-number":["JP23KJ1884"]}],"id":[{"id":"10.13039\/501100001691","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2025,9,30]]},"abstract":"<jats:p>\n            Smart rings are used for contactless payment, smart lock operation, and health monitoring. For applications such as electronic payment and unlocking smart locks, the implementation of a user authentication system in smart rings is essential; however, some challenges remain. Fingerprint authentication is sensitive to fingertip conditions, while face authentication faces difficulties with miniaturization, power efficiency, and privacy. This study proposes ScanRing, a hybrid authentication system using a distance sensor and an IMU sensor in a smart ring. By moving the ring device laterally in front of the face, the distance sensor captures facial structure data, while the IMU sensor records the user\u2019s motion characteristics. These combined datasets enable robust user authentication without relying on cameras, which enhances privacy while supporting a compact and power-efficient design. A user study (N = 30) demonstrated that ScanRing achieved an average authentication accuracy of 98.41\u00a0\n            <jats:inline-formula content-type=\"math\/tex\">\n              <jats:tex-math notation=\"LaTeX\" version=\"MathJax\">\\(\\%\\)<\/jats:tex-math>\n            <\/jats:inline-formula>\n            under stable conditions.\n          <\/jats:p>","DOI":"10.1145\/3743737","type":"journal-article","created":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T14:28:48Z","timestamp":1757428128000},"page":"1-23","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["ScanRing: Hybrid Authentication System in a Ring Device Using a Distance Sensor and an IMU Sensor MHCI026"],"prefix":"10.1145","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-3764-7414","authenticated-orcid":false,"given":"Kai","family":"Miyashita","sequence":"first","affiliation":[{"name":"Keio University","place":["Yokohama, Japan"]},{"name":"The University of Tokyo","place":["Yokohama, Japan"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0159-7681","authenticated-orcid":false,"given":"Takashi","family":"Amesaka","sequence":"additional","affiliation":[{"name":"Lifestyle Computing Lab","place":["Yokohama, Japan"]},{"name":"Keio University","place":["Yokohama, Japan"]},{"name":"The University of Osaka","place":["Yokohama, Japan"]}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-4347-9589","authenticated-orcid":false,"given":"Shogo","family":"Hanayama","sequence":"additional","affiliation":[{"name":"Keio University","place":["Yokohama, Japan"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9773-0656","authenticated-orcid":false,"given":"Takumi","family":"Yamamoto","sequence":"additional","affiliation":[{"name":"Keio University","place":["Yokohama, Japan"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3735-4809","authenticated-orcid":false,"given":"Yuta","family":"Sugiura","sequence":"additional","affiliation":[{"name":"Keio University","place":["Yokohama, Japan"]}]}],"member":"320","published-online":{"date-parts":[[2025,9,9]]},"reference":[{"key":"e_1_3_5_2_2","doi-asserted-by":"publisher","unstructured":"Takashi Amesaka Hiroki Watanabe Yuta Sugiura Masanori Sugimoto and Buntarou Shizuki. 2025. EarLock: Personal Authentication System for Hearables Using Sound Leakage Signals. IEEE Transactions on Mobile Computing 24 7 (2025) 6183\u20136196. 10.1109\/TMC.2025.3540584","DOI":"10.1109\/TMC.2025.3540584"},{"key":"e_1_3_5_3_2","doi-asserted-by":"publisher","unstructured":"Hongliang Bi Yuanyuan Sun Jiajia Liu and Lihao Cao. 2022. SmartEar: Rhythm-Based Tap Authentication Using Earphone in Information-Centric Wireless Sensor Network. IEEE Internet of Things Journal 9 2 (2022) 885\u2013896. 10.1109\/JIOT.2021.3063479","DOI":"10.1109\/JIOT.2021.3063479"},{"key":"e_1_3_5_4_2","doi-asserted-by":"publisher","unstructured":"Haibo Bian Tim Bai Mohammad\u00a0A. Salahuddin Noura Limam Abbas\u00a0Abou Daya and Raouf Boutaba. 2021. Uncovering Lateral Movement Using Authentication Logs. IEEE Transactions on Network and Service Management 18 1 (2021) 1049\u20131063. 10.1109\/TNSM.2021.3054356","DOI":"10.1109\/TNSM.2021.3054356"},{"key":"e_1_3_5_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/3662009.3662019"},{"key":"e_1_3_5_6_2","doi-asserted-by":"publisher","unstructured":"Huangxun Chen Wei Wang Jin Zhang and Qian Zhang. 2020. EchoFace: Acoustic Sensor-Based Media Attack Detection for Face Authentication. IEEE Internet of Things Journal 7 3 (2020) 2152\u20132159. 10.1109\/JIOT.2019.2959203","DOI":"10.1109\/JIOT.2019.2959203"},{"key":"e_1_3_5_7_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411763.3451563"},{"key":"e_1_3_5_8_2","doi-asserted-by":"publisher","DOI":"10.1145\/3170427.3188590"},{"key":"e_1_3_5_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICAICA50127.2020.9182691"},{"key":"e_1_3_5_10_2","doi-asserted-by":"publisher","unstructured":"Atsuhiro Fujii and Kazuya Murao. 2021. User Identification Method based on Head Shape Using Pressure Sensors Embedded in a Helmet. Journal of Information Processing 29 (2021) 610\u2013619. 10.2197\/ipsjjip.29.610","DOI":"10.2197\/ipsjjip.29.610"},{"key":"e_1_3_5_11_2","doi-asserted-by":"publisher","DOI":"10.1145\/3487664.3487761"},{"key":"e_1_3_5_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/SSP.2016.7551815"},{"key":"e_1_3_5_13_2","doi-asserted-by":"publisher","DOI":"10.1145\/3576914.3589562"},{"key":"e_1_3_5_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICNSC62968.2024.10760196"},{"key":"e_1_3_5_15_2","doi-asserted-by":"publisher","unstructured":"Sandeep Gupta Attaullah Buriro and Bruno Crispo. 2018. Demystifying Authentication Concepts in Smartphones: Ways and Types to Secure Access. Mobile Information Systems 2018 1 (2018) 2649598. 10.1155\/2018\/2649598 arXiv:https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2018\/2649598","DOI":"10.1155\/2018\/2649598"},{"key":"e_1_3_5_16_2","doi-asserted-by":"publisher","DOI":"10.1145\/3529399.3529422"},{"key":"e_1_3_5_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/SII59315.2025.10871054"},{"key":"e_1_3_5_18_2","doi-asserted-by":"publisher","unstructured":"Mingming Hu Kun Zhang Ruibang You and Bibo Tu. 2023. AuthConFormer: Sensor-based Continuous Authentication of Smartphone Users Using A Convolutional Transformer. Computers & Security 127 (2023) 103122. 10.1016\/j.cose.2023.103122","DOI":"10.1016\/j.cose.2023.103122"},{"key":"e_1_3_5_19_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544794.3558458"},{"key":"e_1_3_5_20_2","doi-asserted-by":"publisher","DOI":"10.1145\/3594738.3611357"},{"key":"e_1_3_5_21_2","doi-asserted-by":"publisher","DOI":"10.23919\/SICE56594.2022.9905842"},{"key":"e_1_3_5_22_2","doi-asserted-by":"publisher","DOI":"10.1145\/2642918.2647376"},{"key":"e_1_3_5_23_2","doi-asserted-by":"publisher","DOI":"10.1145\/3098279.3098538"},{"key":"e_1_3_5_24_2","doi-asserted-by":"publisher","DOI":"10.1145\/3594738.3611371"},{"key":"e_1_3_5_25_2","doi-asserted-by":"publisher","DOI":"10.1145\/3516492.3558790"},{"key":"e_1_3_5_26_2","doi-asserted-by":"publisher","DOI":"10.1145\/3605764.3623909"},{"key":"e_1_3_5_27_2","unstructured":"Rajesh Kumar Vir\u00a0V Phoha and Rahul Raina. 2016. Authenticating users through their arm movement patterns. arxiv:https:\/\/arXiv.org\/abs\/1603.02211\u00a0[cs.CV] https:\/\/arxiv.org\/abs\/1603.02211"},{"key":"e_1_3_5_28_2","doi-asserted-by":"publisher","DOI":"10.1145\/3415255.3422886"},{"key":"e_1_3_5_29_2","doi-asserted-by":"publisher","unstructured":"Yunji Liang Sagar Samtani Bin Guo and Zhiwen Yu. 2020. Behavioral Biometrics for Continuous Authentication in the Internet-of-Things Era: An Artificial Intelligence Perspective. IEEE Internet of Things Journal 7 9 (2020) 9128\u20139143. 10.1109\/JIOT.2020.3004077","DOI":"10.1109\/JIOT.2020.3004077"},{"key":"e_1_3_5_30_2","doi-asserted-by":"publisher","unstructured":"Jianwei Liu Wenfan Song Leming Shen Jinsong Han and Kui Ren. 2023. Secure User Verification and Continuous Authentication via Earphone IMU. IEEE Transactions on Mobile Computing 22 11 (2023) 6755\u20136769. 10.1109\/TMC.2022.3193847","DOI":"10.1109\/TMC.2022.3193847"},{"key":"e_1_3_5_31_2","doi-asserted-by":"publisher","unstructured":"Katsutoshi Masai Kai Kunze Yuta Sugiura Masa Ogata Masahiko Inami and Maki Sugimoto. 2017. Evaluation of Facial Expression Recognition by a Smart Eyewear for Facial Direction Changes Repeatability and Positional Drift. ACM Trans. Interact. Intell. Syst. 7 4 Article 15 (Dec. 2017) 23\u00a0pages. 10.1145\/3012941","DOI":"10.1145\/3012941"},{"key":"e_1_3_5_32_2","doi-asserted-by":"publisher","DOI":"10.1145\/2856767.2856770"},{"key":"e_1_3_5_33_2","doi-asserted-by":"publisher","DOI":"10.1145\/3174910.3174924"},{"key":"e_1_3_5_34_2","doi-asserted-by":"publisher","DOI":"10.1145\/2735711.2735830"},{"key":"e_1_3_5_35_2","doi-asserted-by":"publisher","DOI":"10.1145\/2380116.2380135"},{"key":"e_1_3_5_36_2","doi-asserted-by":"publisher","unstructured":"C.R Rahul and A. Rengarajan. 2024. Behavioural Biometrics as a User Authentication Mechanism in ISMS. International Journal of Innovative Research in Computer and Communication Engineering 12 3 (2024) 1699\u20131706. 10.15680\/ijircce.2024.1203054","DOI":"10.15680\/ijircce.2024.1203054"},{"key":"e_1_3_5_37_2","doi-asserted-by":"publisher","DOI":"10.1145\/2968219.2971370"},{"key":"e_1_3_5_38_2","unstructured":"Token Ring. 2025. Phishing-Resistant Multifactor Authentication. Retrieved January 2 2025 from https:\/\/www.tokenring.com"},{"key":"e_1_3_5_39_2","doi-asserted-by":"publisher","unstructured":"Zhang Rui and Zheng Yan. 2019. A Survey on Biometric Authentication: Toward Secure and Privacy-Preserving Identification. IEEE Access 7 (2019) 5994\u20136009. 10.1109\/ACCESS.2018.2889996","DOI":"10.1109\/ACCESS.2018.2889996"},{"key":"e_1_3_5_40_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2006.83"},{"key":"e_1_3_5_41_2","doi-asserted-by":"publisher","DOI":"10.1145\/3543758.3547542"},{"key":"e_1_3_5_42_2","doi-asserted-by":"publisher","DOI":"10.1145\/3625687.3625813"},{"key":"e_1_3_5_43_2","unstructured":"J Sturgess. 2023. Authentication in systems with limited input capabilities. Ph.\u00a0D. Dissertation. University of Oxford."},{"key":"e_1_3_5_44_2","unstructured":"Jack Sturgess Simon Birnbach Simon Eberz and Ivan Martinovic. 2022. RingAuth: Wearable Authentication using a Smart Ring. arxiv:https:\/\/arXiv.org\/abs\/2301.03594\u00a0[cs.CR] https:\/\/arxiv.org\/abs\/2301.03594"},{"key":"e_1_3_5_45_2","doi-asserted-by":"publisher","unstructured":"Ioannis Stylios Spyros Kokolakis Olga Thanou and Sotirios Chatzis. 2021. Behavioral biometrics & continuous user authentication on mobile devices: A survey. Information Fusion 66 (2021) 76\u201399. 10.1016\/j.inffus.2020.08.021","DOI":"10.1016\/j.inffus.2020.08.021"},{"key":"e_1_3_5_46_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179367"},{"key":"e_1_3_5_47_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411763.3451769"},{"key":"e_1_3_5_48_2","doi-asserted-by":"publisher","unstructured":"Yong Wang Tianyu Yang Chunxiao Wang Feng Li Pengfei Hu and Yiran Shen. 2024. BudsAuth: Toward Gesture-Wise Continuous User Authentication Through Earbuds Vibration Sensing. IEEE Internet of Things Journal 11 12 (2024) 22007\u201322020. 10.1109\/JIOT.2024.3380811","DOI":"10.1109\/JIOT.2024.3380811"},{"key":"e_1_3_5_49_2","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702371"},{"key":"e_1_3_5_50_2","doi-asserted-by":"publisher","DOI":"10.1109\/MHS56725.2022.10092178"},{"key":"e_1_3_5_51_2","doi-asserted-by":"publisher","DOI":"10.1145\/3581641.3584062"},{"key":"e_1_3_5_52_2","doi-asserted-by":"publisher","DOI":"10.1145\/3139131.3139146"},{"key":"e_1_3_5_53_2","doi-asserted-by":"publisher","unstructured":"Xiaojing Yu Zhijun Zhou Lan Zhang and Xiang-Yang Li. 2024. ThumbUp: Secure Smartwatch Controller for Smart Homes Using Simple Hand Gestures. IEEE Transactions on Mobile Computing 23 1 (2024) 865\u2013878. 10.1109\/TMC.2022.3216927","DOI":"10.1109\/TMC.2022.3216927"},{"key":"e_1_3_5_54_2","doi-asserted-by":"publisher","unstructured":"Bing Zhou Zongxing Xie Yinuo Zhang Jay Lohokare Ruipeng Gao and Fan Ye. 2022. Robust Human Face Authentication Leveraging Acoustic Sensing on Smartphones. IEEE Transactions on Mobile Computing 21 8 (2022) 3009\u20133023. 10.1109\/TMC.2020.3048659","DOI":"10.1109\/TMC.2020.3048659"},{"key":"e_1_3_5_55_2","doi-asserted-by":"publisher","DOI":"10.1145\/3576842.3582382"}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3743737","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T16:06:40Z","timestamp":1757520400000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3743737"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,9]]},"references-count":54,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025,9,30]]}},"alternative-id":["10.1145\/3743737"],"URL":"https:\/\/doi.org\/10.1145\/3743737","relation":{},"ISSN":["2573-0142"],"issn-type":[{"value":"2573-0142","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,9]]},"assertion":[{"value":"2025-09-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}