{"id":"https://openalex.org/W4398131451","doi":"https://doi.org/10.1145/3643833.3656128","title":"Enhancing QR Code System Security by Verifying the Scanner's Gripping Hand Biometric","display_name":"Enhancing QR Code System Security by Verifying the Scanner's Gripping Hand Biometric","publication_year":2024,"publication_date":"2024-05-20","ids":{"openalex":"https://openalex.org/W4398131451","doi":"https://doi.org/10.1145/3643833.3656128"},"language":"en","primary_location":{"id":"doi:10.1145/3643833.3656128","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3643833.3656128","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5115001645","display_name":"Ruxin Wang","orcid":"https://orcid.org/0000-0001-8600-3752"},"institutions":[{"id":"https://openalex.org/I121820613","display_name":"Louisiana State University","ror":"https://ror.org/05ect4e57","country_code":"US","type":"education","lineage":["https://openalex.org/I121820613"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Ruxin Wang","raw_affiliation_strings":["Louisiana State University, Baton Rouge, USA"],"affiliations":[{"raw_affiliation_string":"Louisiana State University, Baton Rouge, USA","institution_ids":["https://openalex.org/I121820613"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070503574","display_name":"Long Huang","orcid":"https://orcid.org/0000-0001-7192-1024"},"institutions":[{"id":"https://openalex.org/I121820613","display_name":"Louisiana State University","ror":"https://ror.org/05ect4e57","country_code":"US","type":"education","lineage":["https://openalex.org/I121820613"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Long Huang","raw_affiliation_strings":["Louisiana State University, Baton Rouge, USA"],"affiliations":[{"raw_affiliation_string":"Louisiana State University, Baton Rouge, USA","institution_ids":["https://openalex.org/I121820613"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006727253","display_name":"Kaitlyn Madden","orcid":"https://orcid.org/0009-0007-3498-7199"},"institutions":[{"id":"https://openalex.org/I121820613","display_name":"Louisiana State University","ror":"https://ror.org/05ect4e57","country_code":"US","type":"education","lineage":["https://openalex.org/I121820613"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kaitlyn Madden","raw_affiliation_strings":["Louisiana State University, Baton Rouge, USA"],"affiliations":[{"raw_affiliation_string":"Louisiana State University, Baton Rouge, USA","institution_ids":["https://openalex.org/I121820613"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100337522","display_name":"Chen Wang","orcid":"https://orcid.org/0000-0001-9737-1673"},"institutions":[{"id":"https://openalex.org/I121820613","display_name":"Louisiana State University","ror":"https://ror.org/05ect4e57","country_code":"US","type":"education","lineage":["https://openalex.org/I121820613"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Chen Wang","raw_affiliation_strings":["Louisiana State University, Baton Rouge, USA"],"affiliations":[{"raw_affiliation_string":"Louisiana State University, Baton Rouge, USA","institution_ids":["https://openalex.org/I121820613"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5115001645"],"corresponding_institution_ids":["https://openalex.org/I121820613"],"apc_list":null,"apc_paid":null,"fwci":1.369,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.79874947,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"42","last_page":"53"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11448","display_name":"Face recognition and analysis","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.7474368810653687},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.671600341796875},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.5659053921699524},{"id":"https://openalex.org/keywords/scanner","display_name":"Scanner","score":0.5222638249397278},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.47393590211868286},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.32715168595314026},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.17256680130958557},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.1307101547718048}],"concepts":[{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.7474368810653687},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.671600341796875},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.5659053921699524},{"id":"https://openalex.org/C2779751349","wikidata":"https://www.wikidata.org/wiki/Q1474480","display_name":"Scanner","level":2,"score":0.5222638249397278},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.47393590211868286},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.32715168595314026},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.17256680130958557},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.1307101547718048},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3643833.3656128","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3643833.3656128","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G6744074107","display_name":null,"funder_award_id":"LEQSF(2020-23)-RD-A-11","funder_id":"https://openalex.org/F4320323817","funder_display_name":"Universitas Brawijaya"},{"id":"https://openalex.org/G8864224249","display_name":null,"funder_award_id":"CNS-2155131","funder_id":"https://openalex.org/F4320323817","funder_display_name":"Universitas Brawijaya"}],"funders":[{"id":"https://openalex.org/F4320323817","display_name":"Universitas Brawijaya","ror":"https://ror.org/01wk3d929"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W1765876518","https://openalex.org/W1899673144","https://openalex.org/W1993236041","https://openalex.org/W2100743375","https://openalex.org/W2119332272","https://openalex.org/W2145023731","https://openalex.org/W2155476561","https://openalex.org/W2197958301","https://openalex.org/W2401551220","https://openalex.org/W2584727065","https://openalex.org/W2748856638","https://openalex.org/W2944203686","https://openalex.org/W2956067313","https://openalex.org/W2990714382","https://openalex.org/W3092130699","https://openalex.org/W3174315784","https://openalex.org/W3198895706","https://openalex.org/W3216443764","https://openalex.org/W4232226532","https://openalex.org/W4308643316","https://openalex.org/W6712741130"],"related_works":["https://openalex.org/W2076845124","https://openalex.org/W2183964146","https://openalex.org/W2379932303","https://openalex.org/W3147744369","https://openalex.org/W4241440711","https://openalex.org/W2062586268","https://openalex.org/W2019582947","https://openalex.org/W3212688212","https://openalex.org/W4300873085","https://openalex.org/W4232857084"],"abstract_inverted_index":{"Because":[0],"of":[1,23,86,165,180,199,266,348],"the":[2,84,87,103,115,138,162,166,176,182,197,224,232,255,273,286,295,319,326,337,345,354],"great":[3],"convenience":[4],"and":[5,35,58,118,147,253,257,281,328,331,353],"being":[6,17],"not":[7],"readable":[8],"to":[9,19,26,66,71,82,108,114,125,132,140,155,173,184,189,217,228,251,262,298,302,336],"humans,":[10],"Quick":[11],"Response":[12],"(QR)":[13],"codes":[14,45],"are":[15,63],"increasingly":[16],"utilized":[18],"offer":[20],"a":[21,92,96,150,157,186,206,214,246,259,310],"variety":[22],"security":[24,42,73],"applications":[25],"mobile":[27],"users,":[28],"such":[29,50],"as":[30,51],"online":[31],"payments,":[32],"website":[33],"logins,":[34],"private":[36],"data":[37,121],"sharing.":[38],"To":[39],"facilitate":[40],"these":[41],"applications,":[43],"QR":[44,93,134,158,225,304],"usually":[46],"contain":[47],"sensitive":[48,120],"information,":[49],"bank":[52],"account":[53],"details,":[54],"credit":[55],"card":[56],"numbers,":[57],"personal/organizational/device":[59],"data,":[60],"or":[61,98,171],"they":[62],"specifically":[64],"designed":[65],"work":[67,130],"with":[68,137],"cloud":[69],"servers":[70],"provide":[72],"services.":[74],"However,":[75],"there":[76],"is":[77,106,122,152,208],"currently":[78],"no":[79],"existing":[80],"solution":[81],"verify":[83,141,175,263],"identity":[85,105],"smartphone":[88],"user":[89,296,327],"who":[90],"scans":[91],"code":[94,135,167,305],"from":[95,272],"Kiosk":[97,170],"another":[99],"phone's":[100],"screen.":[101],"Verifying":[102],"scanner's":[104,177,233],"essential":[107],"ensure":[109],"that":[110,119,196,318],"financial":[111],"transactions":[112],"go":[113],"correct":[116],"recipient":[117],"securely":[123],"shared":[124],"its":[126],"intended":[127],"destination.":[128],"This":[129],"aims":[131],"equip":[133],"providers":[136],"ability":[139],"human":[142],"scanners'":[143],"identities,":[144],"facilitating":[145],"authorization":[146],"auditing.":[148],"When":[149],"phone":[151],"held":[153],"close":[154],"scan":[156],"code,":[159],"we":[160,194],"utilize":[161],"front":[163],"camera":[164],"provider":[168],"(a":[169],"phone)":[172],"simultaneously":[174],"hand.":[178],"Instead":[179],"requiring":[181],"scanner":[183],"present":[185],"stretched":[187],"palm":[188],"obtain":[190],"traditional":[191],"hand":[192,220,247,256,268,274,277,288],"geometries,":[193],"find":[195],"geometry":[198],"an":[200],"individual's":[201],"hand,":[202,235],"when":[203],"it":[204],"grips":[205],"phone,":[207],"also":[209],"identifiable.":[210],"We":[211,222,243,283],"thus":[212],"design":[213],"vision-based":[215],"approach":[216,343],"extract":[218],"gripping":[219,234,267],"biometrics.":[221],"leverage":[223],"code's":[226],"screen":[227],"cast":[229],"light":[230],"onto":[231],"ensuring":[236],"adequate":[237],"illumination":[238],"even":[239],"in":[240,324],"low-light":[241],"conditions.":[242],"then":[244],"use":[245],"tracking":[248],"tool,":[249],"MediaPipe,":[250],"detect":[252],"localize":[254],"develop":[258],"transformer-based":[260],"algorithm":[261],"four":[264],"types":[265],"biometric":[269],"features":[270],"extracted":[271],"image,":[275],"including":[276,309],"contour,":[278],"skeleton,":[279],"color,":[280],"surface.":[282],"further":[284],"capture":[285],"subtle":[287],"joint":[289],"movements":[290],"for":[291],"liveness":[292],"validation,":[293],"because":[294],"needs":[297],"click":[299],"touchscreen":[300],"buttons":[301],"start":[303],"scanning.":[306],"Extensive":[307],"experiments,":[308],"long-term":[311],"study":[312],"spanning":[313],"over":[314],"32":[315],"months,":[316],"show":[317],"system":[320],"achieves":[321],"98.3%":[322],"accuracy":[323],"verifying":[325],"mitigating":[329],"2D":[330],"3D":[332],"replay":[333],"attacks.":[334],"Compared":[335],"widely":[338],"used":[339],"facial":[340],"recognition,":[341],"this":[342],"addresses":[344],"recent":[346],"struggles":[347],"identifying":[349],"faces":[350],"behind":[351],"masks":[352],"public":[355],"concerns":[356],"about":[357],"privacy":[358],"erosion.":[359]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
