{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,2]],"date-time":"2025-12-02T19:47:29Z","timestamp":1764704849603,"version":"3.46.0"},"reference-count":62,"publisher":"Association for Computing Machinery (ACM)","issue":"4","funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62272427"],"award-info":[{"award-number":["62272427"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Youth Innovation Team of Shandong Province","award":["2022KJ04"],"award-info":[{"award-number":["2022KJ04"]}]},{"name":"Key Project of Key Laboratory of Computing Power Network and Information Security, Ministry of Education","award":["2024ZD003"],"award-info":[{"award-number":["2024ZD003"]}]},{"DOI":"10.13039\/501100007129","name":"Shandong Provincial Natural Science Foundation","doi-asserted-by":"crossref","award":["ZR2025QB43 and ZR2025QC1536"],"award-info":[{"award-number":["ZR2025QB43 and ZR2025QC1536"]}],"id":[{"id":"10.13039\/501100007129","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Interact. Mob. Wearable Ubiquitous Technol."],"published-print":{"date-parts":[[2025,12,2]]},"abstract":"<jats:p>\n                    With the widespread adoption of smart devices, traditional authentication methods are increasingly vulnerable to security risks. Recently, acoustic fingerprint authentication based on finger friction sound has gained attention as a cost-effective solution with distinctive acoustic properties. However, challenges persist in ensuring the distinctiveness, stability, and adaptability of acoustic fingerprints across devices. In this paper, we propose S\n                    <jats:sup>3<\/jats:sup>\n                    <jats:italic toggle=\"yes\">Guard<\/jats:italic>\n                    , a user authentication system based on acoustic fingerprints. It uses a low-cost passive fingerprint sticker to physically standardize the acoustic environment during interaction. This approach amplify finger friction sound and combines the physiological features with user behavior characteristics to form a unique acoustic fingerprint for user authentication. The fingerprint sticker features a simple design, integrates easily into smart devices with microphones, and is nearly cost-free. We propose a FrictionES algorithm that efficiently separates clean finger friction sound from noise. Then, we employ a user authentication network model to dynamically extract features and perform authentication, integrating one-shot learning to tackle the cross-device transfer challenge. Compared to existing methods,\n                    <jats:italic toggle=\"yes\">S<\/jats:italic>\n                    <jats:sup>3<\/jats:sup>\n                    <jats:italic toggle=\"yes\">Guard<\/jats:italic>\n                    offers a lower-cost solution, stronger cross-device migration, effective amplification of acoustic features, and greater feature stability. Experimental results with 100 volunteers show that\n                    <jats:italic toggle=\"yes\">S<\/jats:italic>\n                    <jats:sup>3<\/jats:sup>\n                    <jats:italic toggle=\"yes\">Guard<\/jats:italic>\n                    achieves an average accuracy of 96.26%, effectively defending against spoofing, replay, and puppet attacks.\n                  <\/jats:p>","DOI":"10.1145\/3770636","type":"journal-article","created":{"date-parts":[[2025,12,2]],"date-time":"2025-12-02T19:42:32Z","timestamp":1764704552000},"page":"1-30","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Stick, Swipe, Secure: Acoustic Cross-Device User Authentication via a Low-Cost Passive Fingerprint Sticker"],"prefix":"10.1145","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-3947-9370","authenticated-orcid":false,"given":"Xue","family":"Gong","sequence":"first","affiliation":[{"name":"Ocean University of China, Qingdao, Shandong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8759-8874","authenticated-orcid":false,"given":"Kaiwen","family":"Guo","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Ocean University of China, Qingdao, Shandong, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-0071-2159","authenticated-orcid":false,"given":"Hao","family":"Chen","sequence":"additional","affiliation":[{"name":"Ocean University of China, Qingdao, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3746-2132","authenticated-orcid":false,"given":"Feng","family":"Li","sequence":"additional","affiliation":[{"name":"Shandong University, Qingdao, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7363-1987","authenticated-orcid":false,"given":"Chao","family":"Liu","sequence":"additional","affiliation":[{"name":"Ocean University of China, Qingdao, China"}]}],"member":"320","published-online":{"date-parts":[[2025,12,2]]},"reference":[{"key":"e_1_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1987.13917"},{"key":"e_1_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3532342.3532348"},{"key":"e_1_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1121\/1.1456514"},{"key":"e_1_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2014.10.011"},{"key":"e_1_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2500423.2504572"},{"key":"e_1_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2023.3333214"},{"key":"e_1_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411809"},{"key":"e_1_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2023.3318753"},{"key":"e_1_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1198\/tech.2001.s49"},{"key":"e_1_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3643832.3661860"},{"key":"e_1_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2322255"},{"key":"e_1_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3351239"},{"key":"e_1_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3677017"},{"key":"e_1_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2024.3453412"},{"key":"e_1_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3678594"},{"key":"e_1_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3569473"},{"key":"e_1_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.04.008"},{"key":"e_1_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3070478"},{"key":"e_1_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2022.3207830"},{"key":"e_1_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3163024"},{"key":"e_1_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2020.2973052"},{"key":"e_1_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45226-3_169"},{"key":"e_1_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3675095.3676614"},{"key":"e_1_2_2_24_1","volume-title":"Adam: A Method for Stochastic Optimization. Computer Science","author":"Kingma Diederik","year":"2014","unstructured":"Diederik Kingma and Jimmy Ba. 2014. Adam: A Method for Stochastic Optimization. Computer Science (2014)."},{"key":"e_1_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.2994955"},{"key":"e_1_2_2_26_1","volume-title":"Smartphone Usage Statistics 2025 (Worldwide Data)","author":"Kumar Naveen","year":"2025","unstructured":"Naveen Kumar. 2025. Smartphone Usage Statistics 2025 (Worldwide Data). DemandSage. https:\/\/www.demandsage.com\/smartphone-usage-statistics\/ Accessed: 2025-05-26."},{"key":"e_1_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3416047"},{"key":"e_1_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3678590"},{"key":"e_1_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3699734"},{"key":"e_1_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590315"},{"key":"e_1_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313991.3314002"},{"key":"e_1_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2822818"},{"key":"e_1_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133964"},{"key":"e_1_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1080\/10298436.2015.1095897"},{"key":"e_1_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3191751"},{"key":"e_1_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2617756"},{"key":"e_1_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3264437.3264439"},{"key":"e_1_2_2_38_1","volume-title":"\u201cgummy","author":"Matsumoto Tsutomu","unstructured":"Tsutomu Matsumoto, Hiroyuki Matsumoto, Koji Yamada, and Satoshi Hoshino. 2002. Impact of artificial \u201cgummy\u201d fingers on fingerprint systems. In IS&T\/SPIE Electronic Imaging. https:\/\/api.semanticscholar.org\/CorpusID:16897825"},{"key":"e_1_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2014.09.006"},{"key":"e_1_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3386901.3388939"},{"key":"e_1_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2018.1700365"},{"key":"e_1_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM53939.2023.10229054"},{"key":"e_1_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2899367"},{"key":"e_1_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS56603.2022.00013"},{"key":"e_1_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2024.3356719"},{"key":"e_1_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.3045635"},{"key":"e_1_2_2_47_1","volume-title":"Davies-Ekpo","author":"Valentine Ndianabasi H.","year":"2024","unstructured":"Ndianabasi H. Valentine, Emmanuel I. Akaerue, Mfon G. Etido, and Christopher S. Davies-Ekpo. 2024. A 3-factor authentication access control system using RFID, fingerprint, token and code. Multimedia Tools Applications 83, 15 (2024)."},{"key":"e_1_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2022.3230665"},{"key":"e_1_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3387130"},{"key":"e_1_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2639108.2639143"},{"key":"e_1_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.23919\/cje.2022.00.031"},{"key":"e_1_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3534606"},{"key":"e_1_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3643515"},{"key":"e_1_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2017.2671435"},{"key":"e_1_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3643510"},{"key":"e_1_2_2_56_1","volume-title":"Optical Coherence Tomography in Fingertip Biometrics. Optics and Lasers in Engineering","author":"Yu Yang","year":"2022","unstructured":"Yang Yu, Haixia Wang, Hao Sun, Yilong Zhang, Peng Chen, and Ronghua Liang. 2022. Optical Coherence Tomography in Fingertip Biometrics. Optics and Lasers in Engineering (2022). https:\/\/api.semanticscholar.org\/CorpusID:245340655"},{"key":"e_1_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133962"},{"key":"e_1_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3147504"},{"key":"e_1_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103623"},{"key":"e_1_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2023.3338148"},{"key":"e_1_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274721"},{"key":"e_1_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2023.3313097"}],"container-title":["Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3770636","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,2]],"date-time":"2025-12-02T19:45:03Z","timestamp":1764704703000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3770636"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,2]]},"references-count":62,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,12,2]]}},"alternative-id":["10.1145\/3770636"],"URL":"https:\/\/doi.org\/10.1145\/3770636","relation":{},"ISSN":["2474-9567"],"issn-type":[{"value":"2474-9567","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12,2]]},"assertion":[{"value":"2025-12-02","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}