{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,20]],"date-time":"2025-12-20T06:03:17Z","timestamp":1766210597758,"version":"3.48.0"},"reference-count":42,"publisher":"Information Processing Society of Japan","issue":"0","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Information Processing"],"published-print":{"date-parts":[[2025]]},"DOI":"10.2197\/ipsjjip.33.1154","type":"journal-article","created":{"date-parts":[[2025,12,14]],"date-time":"2025-12-14T22:09:20Z","timestamp":1765750160000},"page":"1154-1171","source":"Crossref","is-referenced-by-count":0,"title":["PinchKey: A Highly Accurate and Usable Behavioral Biometric Authentication Method for VR Users"],"prefix":"10.2197","volume":"33","author":[{"given":"Mei","family":"Suzuki","sequence":"first","affiliation":[{"name":"Waseda University"},{"name":"Deloitte Tohmatsu Cyber LLC"}]},{"given":"Ryo","family":"Iijima","sequence":"additional","affiliation":[{"name":"Waseda University"},{"name":"National Institute of Advanced Industrial Science and Technology"}]},{"given":"Kazuki","family":"Nomoto","sequence":"additional","affiliation":[{"name":"Waseda University"},{"name":"Deloitte Tohmatsu Cyber LLC"}]},{"given":"Tetsushi","family":"Ohki","sequence":"additional","affiliation":[{"name":"Shizuoka University"},{"name":"RIKEN Center for Advanced Intelligence Project"}]},{"given":"Tatsuya","family":"Mori","sequence":"additional","affiliation":[{"name":"Waseda University"},{"name":"RIKEN Center for Advanced Intelligence Project"},{"name":"National Institute of Information and Communications Technology"}]}],"member":"1012","reference":[{"key":"1","doi-asserted-by":"crossref","unstructured":"[1] Suzuki, M., Iijima, R., Nomoto, K., Ohki, T. and Mori, T.: PinchKey: A Natural and User-Friendly Approach to VR User Authentication, <i>Proc. 2023 European Symposium on Usable Security, EuroUSEC &apos;23<\/i>, pp.192-204, Association for Computing Machinery (online), DOI: 10.1145\/3617072.3617122 (2023).","DOI":"10.1145\/3617072.3617122"},{"key":"2","unstructured":"[2] GlobalData: Virtual reality to become a $51bn market by 2030, but is still chasing mainstream appeal, says GlobalData (2023), available from &lt;https:\/\/www.globaldata.com\/media\/thematic-research\/virtual-reality-become-51bn-market-2030-still-chasing-mainstream-appeal-says-globaldata\/&gt;."},{"key":"3","unstructured":"[3] Community, A.C.: Alibaba Rolls Out Deeper Immersive Luxury Shopping Experience In The Metaverse (2022), available from &lt;https:\/\/www.alibabacloud.com\/blog\/alibaba-rolls-out-deeper-immersive-luxury-shopping-experience-in-the-metaverse_599369&gt;."},{"key":"4","unstructured":"[4] MediaCenter, A.: Audi e-tron Sportback conquers the virtual world (2020), available from &lt;https:\/\/www.audi-mediacenter.com\/en\/press-releases\/audi-e-tron-sportback-conquers-the-virtual-world-12766&gt;."},{"key":"5","unstructured":"[5] Meta: Meta Quest 2 (2023), available from &lt;https:\/\/www.meta.com\/jp\/en\/quest\/&gt;."},{"key":"6","unstructured":"[6] Meta: Meta Quest Pro (2023), available from &lt;https:\/\/www.meta.com\/jp\/en\/quest\/quest-pro\/&gt;."},{"key":"7","unstructured":"[7] SONY: PlayStation VR (2023), available from &lt;https:\/\/www.playstation.com\/en-us\/ps-vr\/&gt;."},{"key":"8","unstructured":"[8] VIVE: Vive Focus 3 (2023), available from &lt;https:\/\/www.vive.com\/us\/product\/vive-focus3\/&gt;."},{"key":"9","unstructured":"[9] VIVE: Vive Focus Plus (2023), available from &lt;https:\/\/business.vive.com\/eu\/product\/focus-plus\/&gt;."},{"key":"10","doi-asserted-by":"crossref","unstructured":"[10] Olade, I., Liang, H.-N., Fleming, C. and Champion, C.: Exploring the Vulnerabilities and Advantages of SWIPE or Pattern authentication in Virtual Reality (VR), <i>Proc. 2020 4th International Conference on Virtual and Augmented Reality Simulations<\/i>, pp.45-52, Association for Computing Machinery (ACM) (online), DOI: 10.1145\/3385378.3385385 (2020).","DOI":"10.1145\/3385378.3385385"},{"key":"11","doi-asserted-by":"crossref","unstructured":"[11] Kupin, A., Moeller, B., Jiang, Y., Banerjee, N.K. and Banerjee, S.: Task-Driven Biometric Authentication of Users in Virtual Reality (VR) Environments, <i>MultiMedia Modeling<\/i>, Lecture Notes in Computer Science, pp.55-67, Springer International Publishing (2018).","DOI":"10.1007\/978-3-030-05710-7_5"},{"key":"12","doi-asserted-by":"crossref","unstructured":"[12] Luo, S., Nguyen, A., Song, C., Lin, F., Xu, W. and Yan, Z.: OcuLock: Exploring Human Visual System for Authentication in Virtual Reality Head-mounted Display, <i>Proceedings 2020 Network and Distributed System Security Symposium<\/i> (online), DOI: 10.14722\/ndss.2020.24079 (2020).","DOI":"10.14722\/ndss.2020.24079"},{"key":"13","unstructured":"[13] REPORTOCEAN: BIOMETRIC SENSORS MARKET SIZE, SHARE &amp; TRENDS ANALYSIS - GLOBAL OPPORTUNITY ANALYSIS AND INDUSTRY FORECAST 2030 (2022), available from &lt;https:\/\/reportocean.com\/industry-verticals\/details?report_id=BWCC786&amp;cat_title=Information%20&amp;%20Communications%20Technology&gt;."},{"key":"14","doi-asserted-by":"crossref","unstructured":"[14] Alzubaidi, A. and Kalita, J.: Authentication of Smartphone Users Using Behavioral Biometrics, <i>IEEE Communications Surveys &amp; Tutorials<\/i>, Vol.18, No.3, pp.1998-2026 (online), DOI: 10.1109\/COMST. 2016.2537748 (2016).","DOI":"10.1109\/COMST.2016.2537748"},{"key":"15","doi-asserted-by":"publisher","unstructured":"[15] Liu, S., Shao, W., Li, T., Xu, W. and Song, L.: Recent advances in biometrics-based user authentication for wearable devices: A contemporary survey, <i>Digit. Signal Process.<\/i>, Vol.125, p.103120 (online), DOI: 10.1016\/j.dsp.2021.103120 (2022).","DOI":"10.1016\/j.dsp.2021.103120"},{"key":"16","doi-asserted-by":"crossref","unstructured":"[16] Olade, I., Fleming, C. and Liang, H.-N.: BioMove: Biometric User Identification from Human Kinesiological Movements for Virtual Reality Systems, <i>Sensors<\/i>, Vol.20, No.10, pp.1-19 (online), DOI: 10.3390\/s20102944 (2020).","DOI":"10.3390\/s20102944"},{"key":"17","doi-asserted-by":"crossref","unstructured":"[17] Zhao, J. and Tanaka, J.: Hand Gesture Authentication Using Depth Camera, <i>Advances in Information and Communication Networks<\/i>, Advances in Intelligent Systems and Computing, pp.641-654, Springer International Publishing (2018).","DOI":"10.1007\/978-3-030-03405-4_45"},{"key":"18","doi-asserted-by":"crossref","unstructured":"[18] Shin, J., Islam, M.R., Rahim, M.A. and Mun, H.-J.: Arm movement activity based user authentication in P2P systems, <i>Peer-to-peer networking and applications<\/i>, Vol.13, No.2, pp.635-646 (2019).","DOI":"10.1007\/s12083-019-00775-7"},{"key":"19","doi-asserted-by":"crossref","unstructured":"[19] Micucci, M. and Iula, A.: Recognition Performance Analysis of a Multimodal Biometric System Based on the Fusion of 3D Ultrasound Hand-Geometry and Palmprint, <i>Sensors<\/i>, Vol.23, No.7, p.3653 (online), DOI: 10.3390\/s23073653 (2023).","DOI":"10.3390\/s23073653"},{"key":"20","doi-asserted-by":"publisher","unstructured":"[20] Zhang, Y., Yu, S., Pu, S., Wang, Y., Wang, K., Sun, H. and Wang, H.: 3D CNN-based fingerprint anti-spoofing through optical coherence tomography, <i>Heliyon<\/i>, Vol.9, No.9, p.e20052 (online), DOI: 10.1016\/j.heliyon.2023.e20052 (2023).","DOI":"10.1016\/j.heliyon.2023.e20052"},{"key":"21","doi-asserted-by":"crossref","unstructured":"[21] Jain, A.K., Ross, A. and Prabhakar, S.: An introduction to biometric recognition, <i>IEEE Trans. Circuits and Systems for Video Technology<\/i>, Vol.14, No.1, pp.4-20 (2004).","DOI":"10.1109\/TCSVT.2003.818349"},{"key":"22","doi-asserted-by":"crossref","unstructured":"[22] Zhu, H., Xiao, M., Sherman, D. and Li, M.: SoundLock: A Novel User Authentication Scheme for VR Devices Using Auditory-Pupillary Response, <i>30th Annual Network and Distributed System Security Symposium, NDSS<\/i> (2023).","DOI":"10.14722\/ndss.2023.24298"},{"key":"23","doi-asserted-by":"crossref","unstructured":"[23] Funk, M., Marky, K., Mizutani, I., Kritzler, M., Mayer, S. and Michahelles, F.: LookUnlock: Using Spatial-Targets for User-Authentication on HMDs, <i>Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems, CHI EA &apos;19<\/i>, pp.1-6, Association for Computing Machinery (online), DOI: 10.1145\/ 3290607.3312959 (2019).","DOI":"10.1145\/3290607.3312959"},{"key":"24","doi-asserted-by":"crossref","unstructured":"[24] Mathis, F., Fawaz, H. and Khamis, M.: Knowledge-driven Biometric Authentication in Virtual Reality, <i>Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems, CHI EA &apos;20<\/i>, pp.1-10, ACM (2020).","DOI":"10.1145\/3334480.3382799"},{"key":"25","doi-asserted-by":"crossref","unstructured":"[25] Stephenson, S., Pal, B., Fan, S., Fernandes, E., Zhao, Y. and Chatterjee, R.: SoK: Authentication in Augmented and Virtual Reality, <i>2022 IEEE Symposium on Security and Privacy<\/i> (<i>SP<\/i>), pp.267-284 (online), DOI: 10.1109\/SP46214.2022.9833742 (2022).","DOI":"10.1109\/SP46214.2022.9833742"},{"key":"26","unstructured":"[26] ISO: ISO 9241-11:2018 Ergonomics of human-system interaction \u2014 Part 11: Usability: Definitions and concepts (2018), available from &lt;https:\/\/www.iso.org\/standard\/63500.html&gt;."},{"key":"27","unstructured":"[27] Zhang, Y., Slocum, C., Chen, J. and Abu-Ghazaleh, N.: It&apos;s all in your head(set): Side-channel attacks on AR\/VR systems, <i>USENIX Security Symposium<\/i> (2023)."},{"key":"28","unstructured":"[28] Slocum, C., Zhang, Y., Chen, J. and Abu-Ghazaleh, N.: Going through the motions: AR\/VR keylogging from user head motions, <i>USENIX Security Symposium<\/i> (2023)."},{"key":"29","doi-asserted-by":"crossref","unstructured":"[29] Arafat, A.A., Guo, Z. and Awad, A.: VR-Spy: A Side-Channel Attack on Virtual Key-Logging in VR Headsets, <i>2021 IEEE Virtual Reality and 3D User Interfaces<\/i> (<i>VR<\/i>), pp.564-572 (online), DOI: 10.1109\/VR50410.2021.00081 (2021).","DOI":"10.1109\/VR50410.2021.00081"},{"key":"30","unstructured":"[30] Meta: Getting started with Hand Tracking on Meta Quest headsets (2022), available from &lt;https:\/\/www.meta.com\/help\/quest\/articles\/headsets-and-accessories\/controllers-and-hand-tracking\/hand-tracking-quest-2\/&gt;."},{"key":"31","doi-asserted-by":"crossref","unstructured":"[31] Huang, E., Troia, F.D., Stamp, M. and Sundaravaradhan, P.: A New Dataset for Smartphone Gesture-based Authentication, <i>Proc. 7th International Conference on Information Systems Security and Privacy, ICISSP 2021, Online Streaming, February 11-13, 2021<\/i>, Mori, P., Lenzini, G. and Furnell, S. (Eds.), pp.771-780, SCITEPRESS (online), DOI: 10.5220\/0010425807710780 (2021).","DOI":"10.5220\/0010425807710780"},{"key":"32","doi-asserted-by":"crossref","unstructured":"[32] Wu, J., Konrad, J. and Ishwar, P.: Dynamic time warping for gesture-based user identification and authentication with Kinect, <i>2013 IEEE International Conference on Acoustics, Speech and Signal Processing<\/i>, pp.2371-2375 (online), DOI: 10.1109\/ICASSP.2013.6638079 (2013).","DOI":"10.1109\/ICASSP.2013.6638079"},{"key":"33","unstructured":"[33] unity (2021), available from &lt;https:\/\/unity.com\/releases\/editor\/whats-new\/2020.3.0&gt;."},{"key":"34","unstructured":"[34] Jupyter (2021), available from &lt;https:\/\/jupyter.org\/&gt;."},{"key":"35","unstructured":"[35] The MathWorks, Inc. (2020), available from &lt;https:\/\/www.mathworks.com\/products\/new_products\/release2020a.html&gt;."},{"key":"36","unstructured":"[36] Takagi, K.: <i>Biometrics: From Principles to Programming<\/i>, Corona Publishing Co., Ltd. (2021). In Japanese."},{"key":"37","unstructured":"[37] Brooke, J.: SUS: A quick and dirty usability scale, <i>Usability Eval. Ind.<\/i>, Vol.189, pp.3-4 (1995)."},{"key":"38","unstructured":"[38] Jeff, S.: <i>A Practical Guide to the System Usability Scale: Background, Benchmarks &amp; Best Practices<\/i>, Measuring Usability LLC (2011)."},{"key":"39","doi-asserted-by":"crossref","unstructured":"[39] D\u00fczg\u00fcn, R., Mayer, P. and Volkamer, M.: Shoulder-Surfing Resistant Authentication for Augmented Reality, <i>Nordic Human-Computer Interaction Conference, NordiCHI &apos;22<\/i>, Association for Computing Machinery (online), DOI: 10.1145\/3546155.3546663 (2022).","DOI":"10.1145\/3546155.3546663"},{"key":"40","doi-asserted-by":"publisher","unstructured":"[40] Li, F., Zhao, J., Yang, H., Yu, D., Zhou, Y. and Shen, Y.: VibHead: An Authentication Scheme for Smart Headsets through Vibration, <i>ACM Trans. Sen. Netw.<\/i> (online), DOI: 10.1145\/3614432 (2023). Just Accepted.","DOI":"10.1145\/3614432"},{"key":"41","doi-asserted-by":"publisher","unstructured":"[41] Mathis, F., Williamson, J.H., Vaniea, K. and Khamis, M.: Fast and Secure Authentication in Virtual Reality Using Coordinated 3D Manipulation and Pointing, <i>ACM Trans. Comput.-Hum. Interact.<\/i>, Vol.28, No.1 (online), DOI: 10.1145\/3428121 (2021).","DOI":"10.1145\/3428121"},{"key":"42","doi-asserted-by":"crossref","unstructured":"[42] Bailey, K.O., Okolica, J.S. and Peterson, G.L.: User Identification and Authentication using Multi-Modal Behavioral Biometrics (2014).","DOI":"10.1016\/j.cose.2014.03.005"}],"container-title":["Journal of Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/ipsjjip\/33\/0\/33_1154\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,20]],"date-time":"2025-12-20T03:53:33Z","timestamp":1766202813000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/ipsjjip\/33\/0\/33_1154\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":42,"journal-issue":{"issue":"0","published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.2197\/ipsjjip.33.1154","relation":{},"ISSN":["1882-6652"],"issn-type":[{"type":"electronic","value":"1882-6652"}],"subject":[],"published":{"date-parts":[[2025]]}}}