{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T22:45:09Z","timestamp":1730328309583,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":53,"publisher":"ACM","funder":[{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-2155131"],"id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/100006952","name":"Louisiana Board of Regents","doi-asserted-by":"publisher","award":["LEQSF(2020-23)-RD-A-11"],"id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/100006952","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,27]]},"DOI":"10.1145\/3643833.3656128","type":"proceedings-article","created":{"date-parts":[[2024,5,20]],"date-time":"2024-05-20T23:25:07Z","timestamp":1716247507000},"page":"42-53","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Enhancing QR Code System Security by Verifying the Scanner's Gripping Hand Biometric"],"prefix":"10.1145","author":[{"ORCID":"http:\/\/orcid.org\/0000-0001-8600-3752","authenticated-orcid":false,"given":"Ruxin","family":"Wang","sequence":"first","affiliation":[{"name":"Louisiana State University, Baton Rouge, USA"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-7192-1024","authenticated-orcid":false,"given":"Long","family":"Huang","sequence":"additional","affiliation":[{"name":"Louisiana State University, Baton Rouge, USA"}]},{"ORCID":"http:\/\/orcid.org\/0009-0007-3498-7199","authenticated-orcid":false,"given":"Kaitlyn","family":"Madden","sequence":"additional","affiliation":[{"name":"Louisiana State University, Baton Rouge, USA"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-9737-1673","authenticated-orcid":false,"given":"Chen","family":"Wang","sequence":"additional","affiliation":[{"name":"Louisiana State University, Baton Rouge, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,5,27]]},"reference":[{"volume-title":"Hand recognition using palm and hand geometry features","author":"Ahmad Irfan","key":"e_1_3_2_1_1_1","unstructured":"Irfan Ahmad and Manzoor Khan. 2017. Hand recognition using palm and hand geometry features. LAP LAMBERT Academic Publishing."},{"key":"e_1_3_2_1_2_1","volume-title":"Heider AM Wahsheh, and Fawaz W Alsaade","author":"Al-Zahrani Mohammed S","year":"2021","unstructured":"Mohammed S Al-Zahrani, Heider AM Wahsheh, and Fawaz W Alsaade. 2021. Secure Real-Time Artificial Intelligence System against Malicious QR Code Links. Security and Communication Networks, Vol. 2021 (2021)."},{"key":"e_1_3_2_1_3_1","volume-title":"Multi-Factor Authentication for e-Government Services using a Smartphone Application and Biometric Identity Verification. Journal of Computer Science","author":"AlRousan Mohammad","year":"2020","unstructured":"Mohammad AlRousan and Benedetto Intrigila. 2020. Multi-Factor Authentication for e-Government Services using a Smartphone Application and Biometric Identity Verification. Journal of Computer Science (2020)."},{"key":"e_1_3_2_1_4_1","unstructured":"Zee Media Bureau. Nov 13 2021. QR Code Scam: User lost Rs 50 000 by scanning a code; here's how to stay safe. https:\/\/zeenews.india.com\/technology\/qr-code-scam-a-user-lost-rs-50000-by-scanning-a-code-here-s-how-to-stay-safe-2410046.html"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.1986.4767851"},{"key":"e_1_3_2_1_6_1","unstructured":"Electronic Privacy Information Center.epic.org. 2019. EPIC - State Facial Recognition Policy. https:\/\/epic.org\/state-policy\/facialrecognition\/"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3300061.3343384"},{"key":"e_1_3_2_1_8_1","unstructured":"Creality. 2020. Creality3D CR-10 V3 3D Printer - Creality 3D. https:\/\/creality3d.shop\/products\/creality3d-cr-10-v3--3d-printer"},{"key":"e_1_3_2_1_9_1","unstructured":"Nathan Daniels. Jan 17 2022. QR Code Fraud: What is it and How Can You Protect Yourself. https:\/\/vpnoverview.com\/internet-safety\/cybercrime\/qr-code-fraud\/"},{"key":"e_1_3_2_1_10_1","unstructured":"Alexey Dosovitskiy Lucas Beyer Alexander Kolesnikov Dirk Weissenborn Xiaohua Zhai Thomas Unterthiner Mostafa Dehghani Matthias Minderer Georg Heigold Sylvain Gelly et al. 2020. An image is worth 16x16 words: Transformers for image recognition at scale. arXiv preprint arXiv:2010.11929 (2020)."},{"key":"e_1_3_2_1_11_1","unstructured":"Grandviewresearch.com. 2020. Market Analysis Report. https:\/\/www.grandviewresearch.com\/industry-analysis\/interactive-kiosk-market"},{"key":"e_1_3_2_1_12_1","unstructured":"Nikunj Gundaniya. April 5 2022. Everything you need to know about QR Code Payments. https:\/\/www.digipay.guru\/blog\/everything-you-need-to-know-about-qr-code-payments\/"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.promfg.2015.07.977"},{"key":"e_1_3_2_1_14_1","unstructured":"HelloTechHow. 2022. How to Scan a QR Code on an iPhone or Android. https:\/\/www.hellotech.com\/guide\/for\/how-to-scan-qr-code-iphone-android"},{"key":"e_1_3_2_1_15_1","unstructured":"iClassPro. 2021. How Do QR Codes Work with the Check-In Kiosk? https:\/\/support.iclasspro.com\/hc\/en-us\/articles\/360024943634-How-Do-QR-Codes-Work-with-the-Check-In-Kiosk-"},{"key":"e_1_3_2_1_16_1","unstructured":"Harrison Jacobs. Oct 14 2019. One photo shows that China is already in a cashless future. https:\/\/www.businessinsider.com\/alipay-wechat-pay-china-mobile-payments-street-vendors-musicians-2018--5"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICISET.2018.8745620"},{"key":"e_1_3_2_1_18_1","unstructured":"KIBIS. 2019. Types of kiosks that are assisting us in everyday life. https:\/\/medium.com\/kibis\/types-of-kiosks-that-are-assisting-us-in-everyday-life-ed8337f8bead"},{"key":"e_1_3_2_1_19_1","unstructured":"Kemas kini terakhir. June 10 2021. Zelle Pay QR code: Ensuring convenient and paperless transaction. https:\/\/www.qrcode-tiger.com\/ms\/zelle-pay-qr-code#Use-cases_of_using_QR_code_for_Zelle"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2017.08.017"},{"key":"e_1_3_2_1_21_1","unstructured":"Venkat Krishnapur. Fab 4 2021. What is QR code phishing and how to protect yourself from it. https:\/\/indianexpress.com\/article\/technology\/opinion-technology\/what-is-qr-code-phishing-and-how-to-protect-yourself-from-it-7174553\/"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07620-1_8"},{"key":"e_1_3_2_1_23_1","volume-title":"Number of smartphone users in the United States who used a QR code scanner on their mobile devices from 2019 to","author":"Ceci L.","year":"2025","unstructured":"L.Ceci. Mar 28, 2022. Number of smartphone users in the United States who used a QR code scanner on their mobile devices from 2019 to 2025. https:\/\/www.statista.com\/statistics\/1297768\/us-smartphone-users-qr-scanner\/"},{"volume-title":"Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Internet of People and Smart City Innovation (SmartWorld\/SCALCOM\/UIC\/ATC\/IOP\/SCI)","author":"Lei Haibo","key":"e_1_3_2_1_24_1","unstructured":"Haibo Lei, Dan Wang, Zijian Pan, Yongpan Zou, and Kaishun Wu. 2021. iScreen: A Pure Software-based Screen Privacy Protection System for Mobile Devices. In 2021 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Internet of People and Smart City Innovation (SmartWorld\/SCALCOM\/UIC\/ATC\/IOP\/SCI). IEEE, 9--16."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2013.6490252"},{"key":"e_1_3_2_1_26_1","volume-title":"Assessment of geometric features for individual identification and verification in biometric hand systems. Expert systems with applications","author":"Luque-Baena Rafael M","year":"2013","unstructured":"Rafael M Luque-Baena, David Elizondo, Ezequiel L\u00f3pez-Rubio, Esteban J Palomo, and Tim Watson. 2013. Assessment of geometric features for individual identification and verification in biometric hand systems. Expert systems with applications, Vol. 40, 9 (2013), 3580--3594."},{"key":"e_1_3_2_1_27_1","unstructured":"Julien Maury. February 21 2022. QR Codes: A Growing Security Problem. https:\/\/www.esecurityplanet.com\/threats\/qr-code-security-problem\/"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/AIPR.2018.8707382"},{"key":"e_1_3_2_1_29_1","series-title":"Journal of Physics: Conference Series","volume-title":"Biometric identity Authentication System Using Hand Geometry Measurements","author":"Mohammed Hesham Hashim","unstructured":"Hesham Hashim Mohammed, Shatha A Baker, and Ahmed S Nori. 2021. Biometric identity Authentication System Using Hand Geometry Measurements. In Journal of Physics: Conference Series, Vol. 1804. IOP Publishing, 012144."},{"key":"e_1_3_2_1_30_1","unstructured":"Paul Mozur. Oct 14 2019. In Urban China Cash Is Rapidly Becoming Obsolete. https:\/\/www.nytimes.com\/2017\/07\/16\/business\/china-cash-smartphone-payments.html"},{"key":"e_1_3_2_1_31_1","first-page":"69","article-title":"QR codes and security solutions","volume":"3","author":"Narayanan A Sankara","year":"2012","unstructured":"A Sankara Narayanan. 2012. QR codes and security solutions. International Journal of Computer Science and Telecommunications, Vol. 3, 7 (2012), 69--72.","journal-title":"International Journal of Computer Science and Telecommunications"},{"key":"e_1_3_2_1_32_1","unstructured":"Kaiti Norton. July 29 2021. What are Common Types of Social Engineering Attacks. https:\/\/www.esecurityplanet.com\/threats\/social-engineering-attacks\/"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/SISY50555.2020.9217068"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/982507.982526"},{"key":"e_1_3_2_1_35_1","unstructured":"OpenCV. 2020. K-Means Clustering in OpenCV. https:\/\/docs.opencv.org\/4.x\/d1\/d5c\/tutorial_py_kmeans_opencv.html"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ECTI-CON51831.2021.9454779"},{"key":"e_1_3_2_1_37_1","unstructured":"Alison DeNisco Rayome. April 8 2021. Use PayPal for touch-free purchases in stores. Here's how. https:\/\/www.cnet.com\/tech\/services-and-software\/use-paypal-for-touch-free-purchases-in-stores-heres-how\/"},{"key":"e_1_3_2_1_38_1","unstructured":"Revopoint. 2022. POP 2 High-Precision 3D Scanner. https:\/\/shop.revopoint3d.com\/collections\/3d-scanners\/products\/pop2--3d-scanner?variant=42240758546667"},{"key":"e_1_3_2_1_39_1","volume-title":"Proceedings of 2nd conference on audio and video based biometric person authentication. 166--171","author":"Ross Arun","year":"1999","unstructured":"Arun Ross, Anil Jain, and S Pankati. 1999. A prototype hand geometry-based verification system. In Proceedings of 2nd conference on audio and video based biometric person authentication. 166--171."},{"key":"e_1_3_2_1_40_1","unstructured":"NATALLIA SAKOVICH. 2020. Benefits of Self-Service Kiosks for Businesses and Users. https:\/\/www.sam-solutions.com\/blog\/the-value-of-interactive-kiosks-for-your-business\/"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.879796"},{"key":"e_1_3_2_1_42_1","volume-title":"Facial Image Verification for Government Kiosk System. In 2020 17th International Joint Conference on Computer Science and Software Engineering (JCSSE). IEEE, 65--70","author":"Sawetsutipun Srirath","year":"2020","unstructured":"Srirath Sawetsutipun, Thananop Kobchaisawat, and Thanarat H Chalidabhongse. 2020. Facial Image Verification for Government Kiosk System. In 2020 17th International Joint Conference on Computer Science and Software Engineering (JCSSE). IEEE, 65--70."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/31336.31338"},{"key":"e_1_3_2_1_44_1","unstructured":"StackOverflow.com. 2021. What are some methods to analyze image brightness using Python? https:\/\/stackoverflow.com\/questions\/3490727\/what-are-some-methods-to-analyze-image-brightness-using-python"},{"key":"e_1_3_2_1_45_1","unstructured":"Ivan Stevanovic. May 12 2022. Cell Phone Identity Theft Learn To Protect Yourself. https:\/\/dataprot.net\/guides\/cell-phone-identity-theft\/"},{"key":"e_1_3_2_1_46_1","unstructured":"Sur-id. 2021. Contactless Check-In Kiosk. https:\/\/www.sur-id.com\/?gclid=CjwKCAjwoP6LBhBlEiwAvCcthKrwMIkDtwqv6-lw3rL5OMl2FXsIHw-blZbI1v1fPcHI5Ca-1vfNfRoCTpQQAvD_BwE"},{"key":"e_1_3_2_1_47_1","unstructured":"Jaime Rios Velasco. 3\/28\/2019. 3D Scanning 3D Modeling and 3D Printing a Human Head. https:\/\/all3dp.com\/2\/3d-scanning-3d-modeling-3d-printing-a-human-head-how-to\/"},{"key":"e_1_3_2_1_48_1","unstructured":"Venmo. July 21 2021. How to Pay with Venmo in Stores. https:\/\/help.venmo.com\/hc\/en-us\/articles\/360050514333-How-to-Pay-with-Venmo-in-Stores"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41320-9_4"},{"key":"e_1_3_2_1_50_1","unstructured":"Staff Writer. 2020. Facial Recognition Photo Kiosks. https:\/\/kioskindustry.org\/facial-recognition-photo-kiosks\/"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560553"},{"key":"e_1_3_2_1_52_1","volume-title":"Mediapipe hands: On-device real-time hand tracking. arXiv preprint arXiv:2006.10214","author":"Zhang Fan","year":"2020","unstructured":"Fan Zhang, Valentin Bazarevsky, Andrey Vakunov, Andrei Tkachenka, George Sung, Chuo-Ling Chang, and Matthias Grundmann. 2020. Mediapipe hands: On-device real-time hand tracking. arXiv preprint arXiv:2006.10214 (2020)."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3108189"}],"event":{"name":"WiSec '24: 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Seoul Republic of Korea","acronym":"WiSec '24"},"container-title":["Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3643833.3656128","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,27]],"date-time":"2024-06-27T10:29:35Z","timestamp":1719484175000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3643833.3656128"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,27]]},"references-count":53,"alternative-id":["10.1145\/3643833.3656128","10.1145\/3643833"],"URL":"https:\/\/doi.org\/10.1145\/3643833.3656128","relation":{},"subject":[],"published":{"date-parts":[[2024,5,27]]},"assertion":[{"value":"2024-05-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}