Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Medusa3D: The Watchful Eye Freezing Illegitimate Users in Virtual Reality Interactions

Published: 24 September 2024 Publication History

Abstract

The remarkable growth of Virtual Reality (VR) in recent years has extended its applications beyond entertainment to sectors including education, e-commerce, and remote communication. Since VR devices contain user's private information, user authentication becomes increasingly important. Current authentication systems in VR, such as password-based or static biometric-based methods, are either cumbersome to use or vulnerable to attacks such as shoulder surfing. To address these limitations, we propose Medusa3D, a challenge-response authentication system for VR based on reflexive eye responses. Unlike existing methods, reflexive eye responses are involuntary and effortless, offering a secure and user-friendly credential for authentication. We implement Medusa3D on an off-the-shelf VR and conduct evaluations with 25 participants. The evaluation results show that Medusa3D achieves 0.21% FAR and 0.13% FRR, demonstrating high security under various ocular conditions and resilience against attacks such as zero-effort attack, replay attack, and mimicry attack. A user study indicates that Medusa3D is user-friendly and well-adopted among participants.

References

[1]
2023. Apple Vision Pro. https://www.apple.com/apple-vision-pro/.
[2]
2023. HTC VIVE Pro Eye. https://www.vive.com/hk/product/vive-pro-eye/overview/.
[3]
2023. Meta Quest Pro. https://www.meta.com/quest/quest-pro/.
[4]
2023. Pico Neo2 Eye. https://www.tobii.com/products/integration/xr-headsets/device-integrations/pico-neo-2-eye.
[5]
2023. Pico Neo3 Pro Eye. https://www.tobii.com/products/integration/xr-headsets/device-integrations/pico-neo-3-pro-eye.
[6]
2023. Varjo. https://varjo.com/xr-headsets/.
[7]
Yomna Abdelrahman, Florian Mathis, Pascal Knierim, Axel Kettler, Florian Alt, and Mohamed Khamis. 2022. Cuevr: Studying the usability of cue-based authentication for virtual reality. In Proceedings of the 2022 International Conference on Advanced Visual Interfaces. 1--9.
[8]
Karan Ahuja, Rahul Islam, Varun Parashar, Kuntal Dey, Chris Harrison, and Mayank Goel. 2018. Eyespyvr: Interactive eye sensing using off-the-shelf, smartphone-based vr headsets. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 2, 2 (2018), 1--10.
[9]
Hassoumi Almoctar, Pourang Irani, Vsevolod Peysakhovich, and Christophe Hurter. 2018. Path Word: A multimodal password entry method for ad-hoc authentication based on digits? shape and smooth pursuit eye movements. In Proceedings of the 20th ACM international conference on multimodal interaction. 268--277.
[10]
Richard Andersson, Linnea Larsson, Kenneth Holmqvist, Martin Stridh, and Marcus Nyström. 2017. One algorithm to rule them all? An evaluation and discussion of ten eye movement event-detection algorithms. Behavior research methods 49 (2017), 616--637.
[11]
Patricia Arias-Cabarcos, Thilo Habrich, Karen Becker, Christian Becker, and Thorsten Strufe. 2021. Inexpensive brainwave authentication: new techniques and insights on user acceptance. In 30th USENIX Security Symposium (USENIX Security 21). 55--72.
[12]
Gary Bargary, Jenny M Bosten, Patrick T Goodbourn, Adam J Lawrance-Owen, Ruth E Hogg, and John D Mollon. 2017. Individual differences in human eye movements: An oculomotor signature? Vision research 141 (2017), 157--169.
[13]
Akram Bayat and Marc Pomplun. 2018. Biometric identification through eye-movement patterns. In Advances in Human Factors in Simulation and Modeling: Proceedings of the AHFE 2017 International Conference on Human Factors in Simulation and Modeling. Springer, 583--594.
[14]
Henri Begleiter and Arthur Platz. 1972. The effects of alcohol on the central nervous system in humans. In The Biology of Alcoholism: Volume 2: Physiology and Behavior. Springer, 293--343.
[15]
Satish Rupraoji Billewar, Karuna Jadhav, VP Sriram, Dr A Arun, Sikandar Mohd Abdul, Kamal Gulati, and Dr Narinder Kumar Kumar Bhasin. 2022. The rise of 3D E-Commerce: the online shopping gets real with virtual reality and augmented reality during COVID-19. World Journal of Engineering 19, 2 (2022), 244--253.
[16]
Hongyun Cai, Vincent W Zheng, and Kevin Chen-Chuan Chang. 2018. A comprehensive survey of graph embedding: Problems, techniques, and applications. IEEE transactions on knowledge and data engineering 30, 9 (2018), 1616--1637.
[17]
Virginio Cantoni, Chiara Galdi, Michele Nappi, Marco Porta, and Daniel Riccio. 2015. GANT: Gaze analysis technique for human identification. Pattern Recognition 48, 4 (2015), 1027--1038.
[18]
Jiani Cao, Chengdong Lin, Yang Liu, and Zhenjiang Li. 2022. Gaze Tracking on Any Surface with Your Phone. In Proceedings of the 20th ACM Conference on Embedded Networked Sensor Systems. 320--333.
[19]
Dario Cazzato, Marco Leo, Andrea Evangelista, and Cosimo Distante. 2015. Soft biometrics by modeling temporal series of gaze cues extracted in the wild. In Advanced Concepts for Intelligent Vision Systems: 16th International Conference, ACIVS 2015. Proceedings 16. Springer, 391--402.
[20]
Pan Chan, Tzipora Halevi, and Nasir Memon. 2015. Glass otp: Secure and convenient user authentication on google glass. In Financial Cryptography and Data Security: FC 2015 International Workshops, BITCOIN, WAHC, and Wearable. Springer, 298--308.
[21]
Jagmohan Chauhan, Young D Kwon, Pan Hui, and Cecilia Mascolo. 2020. Contauth: Continual learning framework for behavioral-based user authentication. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT) 4, 4 (2020), 1--23.
[22]
Yongliang Chen, Tao Ni, Weitao Xu, and Tao Gu. 2022. SwipePass: Acoustic-based second-factor user authentication for smartphones. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT) 6, 3 (2022), 1--25.
[23]
Yuxin Chen, Zhuolin Yang, Ruben Abbou, Pedro Lopes, Ben Y Zhao, and Haitao Zheng. 2021. User authentication via electrical muscle stimulation. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems. 1--15.
[24]
Elena N Cherepovskaya and Andrey V Lyamin. 2017. An evaluation of biometrie identification approach on lowfrequency eye tracking data. In 2017 IEEE 15th International Symposium on Applied Machine Intelligence and Informatics (SAMI). IEEE, 000123--000128.
[25]
Viviane Clay, Peter König, and Sabine Koenig. 2019. Eye tracking in virtual reality. Journal of eye movement research 12, 1 (2019).
[26]
M Thyge Corfitsen. 1994. Tiredness and visual reaction time among young male nighttime drivers: a roadside survey. Accident Analysis & Prevention 26, 5 (1994), 617--624.
[27]
Heiko Drewes, Mohamed Khamis, and Florian Alt. 2019. Dialplates: Enabling pursuits-based user interfaces with large target numbers. In Proceedings of the 18th International Conference on Mobile and Ubiquitous Multimedia. 1--10.
[28]
Di Duan, Zehua Sun, Tao Ni, Shuaicheng Li, Xiaohua Jia, Weitao Xu, and Tianxing Li. 2024. F2Key: Dynamically Converting Your Face into a Private Key Based on COTS Headphones for Reliable Voice Interaction. In Proceedings of the 22nd Annual International Conference on Mobile Systems, Applications and Services (MobiSys). 127--140.
[29]
Di Duan, Huanqi Yang, Guohao Lan, Tianxing Li, Xiaohua Jia, and Weitao Xu. 2023. EMGSense: A Low-Effort Self-Supervised Domain Adaptation Framework for EMG Sensing. In 2023 IEEE International Conference on Pervasive Computing and Communications (PerCom). IEEE, 160--170.
[30]
Simon Eberz, Nicola Paoletti, Marc Roeschlin, Marta Kwiatkowska, I Martinovic, and A Patané. 2017. Broken hearted: How to attack ECG biometrics. In Network and Distributed System Security (NDSS) Symposium 2017. Internet Society.
[31]
Simon Eberz, Kasper Rasmussen, Vincent Lenders, and Ivan Martinovic. 2015. Preventing lunchtime attacks: Fighting insider threats with eye movement biometrics. In Network and Distributed System Security (NDSS) Symposium 2015. Internet Society.
[32]
EyeLink. 2023. EyeLink 1000 Plus. https://www.sr-research.com/eyelink-1000-plus/.
[33]
Markus Funk, Karola Marky, Iori Mizutani, Mareike Kritzler, Simon Mayer, and Florian Michahelles. 2019. Lookunlock: Using spatial-targets for user-authentication on hmds. In Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems. 1--6.
[34]
Anjith George and Aurobinda Routray. 2016. A score level fusion method for eye movement biometrics. Pattern Recognition Letters 82 (2016), 207--215.
[35]
Ceenu George, Mohamed Khamis, Emanuel von Zezschwitz, Marinus Burger, Henri Schmidt, Florian Alt, and Heinrich Hussmann. 2017. Seamless and secure vr: Adapting and evaluating established authentication systems for virtual reality. NDSS.
[36]
Anhong Guo, Robert Xiao, and Chris Harrison. 2015. Capauth: Identifying and differentiating user handprints on commodity capacitive touchscreens. In Proceedings of the 2015 International Conference on Interactive Tabletops & Surfaces. 59--62.
[37]
Kenneth Holmqvist and R Andersson. 2017. Eye tracking: A comprehensive guide to methods. Paradigms and measures (2017).
[38]
Christian Holz and Patrick Baudisch. 2013. Fiberio: a touchscreen that senses fingerprints. In Proceedings of the 26th annual ACM symposium on User interface software and technology. 41--50.
[39]
Yu Imaoka, Andri Flury, and Eling D De Bruin. 2020. Assessing saccadic eye movements with head-mounted display virtual reality technology. Frontiers in Psychiatry 11 (2020), 572938.
[40]
Mohd Javaid and Abid Haleem. 2020. Virtual reality applications toward medical field. Clinical Epidemiology and Global Health 8, 2 (2020), 600--605.
[41]
Christina Katsini, Yasmeen Abdrabou, George E Raptis, Mohamed Khamis, and Florian Alt. 2020. The role of eye gaze in security and privacy applications: Survey and future HCI research directions. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. 1--21.
[42]
Mohamed Khamis, Florian Alt, Mariam Hassib, Emanuel von Zezschwitz, Regina Hasholzner, and Andreas Bulling. 2016. Gazetouchpass: Multimodal authentication using gaze and touch on mobile devices. In Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems. 2156--2164.
[43]
Tomi Kinnunen, Md Sahidullah, Héctor Delgado, Massimiliano Todisco, Nicholas Evans, Junichi Yamagishi, and Kong Aik Lee. 2017. The ASVspoof 2017 challenge: Assessing the limits of replay spoofing attack detection. In Interspeech 2017. International Speech Communication Association, 2--6.
[44]
Michael F. Land. 2011. Oculomotor behaviour in vertebrates and invertebrates. In The Oxford Handbook of Eye Movements. Oxford University Press.
[45]
R John Leigh and David S Zee. 2015. The neurology of eye movements. Contemporary Neurology.
[46]
Feng Li, Jiayi Zhao, Huan Yang, Dongxiao Yu, Yuanfeng Zhou, and Yiran Shen. 2023. Vibhead: An authentication scheme for smart headsets through vibration. ACM Transactions on Sensor Networks (2023).
[47]
Jingjie Li, Kassem Fawaz, and Younghyun Kim. 2019. Velody: Nonlinear vibration challenge-response for resilient user authentication. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. 1201--1213.
[48]
Feng Lin, Kun Woo Cho, Chen Song, Wenyao Xu, and Zhanpeng Jin. 2018. Brain password: A secure and truly cancelable brain biometrics for smart headwear. In Proceedings of the 16th Annual International Conference on Mobile Systems, Applications, and Services. 296--309.
[49]
Jian Liu, Chen Wang, Yingying Chen, and Nitesh Saxena. 2017. VibWrite: Towards finger-input authentication on ubiquitous surfaces via physical vibration. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. 73--87.
[50]
Shiqing Luo, Anh Nguyen, Chen Song, Feng Lin, Wenyao Xu, and Zhisheng Yan. 2020. OcuLock: Exploring human visual system for authentication in virtual reality head-mounted display. In 2020 Network and Distributed System Security Symposium (NDSS).
[51]
Florian Mathis, Hassan Ismail Fawaz, and Mohamed Khamis. 2020. Knowledge-driven biometric authentication in virtual reality. In Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems. 1--10.
[52]
Florian Mathis, John H Williamson, Kami Vaniea, and Mohamed Khamis. 2021. Fast and secure authentication in virtual reality using coordinated 3d manipulation and pointing. ACM Transactions on Computer-Human Interaction (ToCHI) 28, 1 (2021), 1--44.
[53]
Volker Mellert, Ingo Baumann, Nils Freese, and Reinhard Weber. 2008. Impact of sound and vibration on health, travel comfort and performance of flight attendants and pilots. Aerospace Science and Technology 12, 1 (2008), 18--25.
[54]
Robert Miller, Natasha Kholgade Banerjee, and Sean Banerjee. 2020. Within-system and cross-system behavior-based biometric authentication in virtual reality. In 2020 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW). IEEE, 311--316.
[55]
Subhadeep Mukhopadhyay and Shinjini Nandi. 2018. LPiTrack: Eye movement pattern recognition algorithm and application to biometric identification. Machine Learning 107 (2018), 313--331.
[56]
Tahrima Mustafa, Richard Matovu, Abdul Serwadda, and Nicholas Muirhead. 2018. Unsure how to authenticate on your vr headset? come on, use your head!. In Proceedings of the Fourth ACM International Workshop on Security and Privacy Analytics. 23--30.
[57]
Kien Nguyen, Hugo Proença, and Fernando Alonso-Fernandez. 2022. Deep Learning for Iris Recognition: A Survey. arXiv preprint arXiv:2210.05866 (2022).
[58]
Marcus Nyström and Kenneth Holmqvist. 2010. An adaptive algorithm for fixation, saccade, and glissade detection in eyetracking data. Behavior research methods 42, 1 (2010), 188--204.
[59]
Ilesanmi Olade, Hai-Ning Liang, Charles Fleming, and Christopher Champion. 2020. Exploring the vulnerabilities and advantages of swipe or pattern authentication in virtual reality (vr). In Proceedings of the 2020 4th International Conference on Virtual and Augmented Reality Simulations. 45--52.
[60]
Maria Papathanasaki, Leandros Maglaras, and Nick Ayres. 2022. Modern authentication methods: A comprehensive survey. AI, Computer Science and Robotics Technology (2022).
[61]
Ken Pfeuffer, Matthias J Geiger, Sarah Prange, Lukas Mecke, Daniel Buschek, and Florian Alt. 2019. Behavioural biometrics in VR: Identifying people from body motion and relations in virtual reality. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. 1--12.
[62]
Logan Pinter, Marcos Izquierdo, and Mohammad Faridul Haque Siddiqui. 2023. Revolutionizing Learning: An Interactive VR Application for Solids of Revolution. In Proceedings of the 7th International Conference on Education and Multimedia Technology. 35--40.
[63]
Paulo Henrique Pisani, Abir Mhenni, Romain Giot, Estelle Cherrier, Norman Poh, André Carlos Ponce de Leon Ferreira de Carvalho, Christophe Rosenberger, and Najoua Essoukri Ben Amara. 2019. Adaptive biometric systems: Review and perspectives. ACM Computing Surveys (CSUR) 52, 5 (2019), 1--38.
[64]
William H Press and Saul A Teukolsky. 1990. Savitzky-Golay smoothing filters. Computers in Physics 4, 6 (1990), 669--672.
[65]
Huajian Qiu, Paul Streli, Tiffany Luong, Christoph Gebhardt, and Christian Holz. 2023. ViGather: Inclusive Virtual Conferencing with a Joint Experience Across Traditional Screen Devices and Mixed Reality Headsets. Proceedings of the ACM on Human-Computer Interaction 7, MHCI (2023), 1--27.
[66]
Vijay Rajanna, Seth Polsley, Paul Taele, and Tracy Hammond. 2017. A gaze gesture-based user authentication system to counter shoulder-surfing attacks. In Proceedings of the 2017 CHI conference extended abstracts on human factors in computing systems. 1978--1986.
[67]
Keith Rayner. 2009. The 35th Sir Frederick Bartlett Lecture: Eye movements and attention in reading, scene perception, and visual search. Quarterly journal of experimental psychology 62, 8 (2009), 1457--1506.
[68]
Stefan Schneegass, Youssef Oualil, and Andreas Bulling. 2016. SkullConduct: Biometric user identification on eyewear computers using bone conduction through the skull. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. 1379--1384.
[69]
Caroline KL Schraa-Tam, Phillippus van Broekhoven, Josef N van der Geest, Maarten A Frens, Marion Smits, and Aad van der Lugt. 2009. Cortical and cerebellar activation induced by reflexive and voluntary saccades. Experimental brain research 192 (2009), 175--187.
[70]
Mythreya Seetharama, Volker Paelke, and Carsten Röcker. 2015. Safetypin: Secure pin entry through eye tracking. In Human Aspects of Information Security, Privacy, and Trust: Third International Conference, HAS 2015. Proceedings 3. Springer, 426--435.
[71]
Sherif Seha, Georgios Papangelakis, Dimitrios Hatzinakos, Ali Shahidi Zandi, and Felix JE Comeau. 2019. Improving eye movement biometrics using remote registration of eye blinking patterns. In ICASSP 2019--2019 IEEE international conference on acoustics, speech and signal processing (ICASSP). IEEE, 2562--2566.
[72]
Yiran Shen, Hongkai Wen, Chengwen Luo, Weitao Xu, Tao Zhang, Wen Hu, and Daniela Rus. 2018. GaitLock: Protect virtual and augmented reality headsets using gait. IEEE Transactions on Dependable and Secure Computing 16, 3 (2018), 484--497.
[73]
Zhihao Shen, Shun Li, Xi Zhao, and Jianhua Zou. 2023. IncreAuth: Incremental learning based behavioral biometric authentication on smartphones. IEEE Internet of Things Journal (IOTJ) (2023).
[74]
Ivo Sluganovic, Marc Roeschlin, Kasper B Rasmussen, and Ivan Martinovic. 2016. Using reflexive eye movements for fast challenge-response authentication. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS). 1056--1067.
[75]
Chen Song, Aosen Wang, Kui Ren, and Wenyao Xu. 2016. Eyeveri: A secure and usable approach for smartphone user authentication. In IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer Communications. IEEE, 1--9.
[76]
Mikhail Startsev and Raimondas Zemblys. 2023. Evaluating eye movement event detection: A review of the state of the art. Behavior Research Methods 55, 4 (2023), 1653--1714.
[77]
Sophie Stephenson, Bijeeta Pal, Stephen Fan, Earlence Fernandes, Yuhang Zhao, and Rahul Chatterjee. 2022. Sok: Authentication in augmented and virtual reality. In 2022 IEEE Symposium on Security and Privacy (SP). IEEE, 267--284.
[78]
Tobii. 2023. Glasses, lenses and eye surgery. https://help.tobii.com/hc/en-us/articles/210249865-Glasses-lenses-andeye- surgery.
[79]
HTC VIVE. 2023. VIVE Pro Eye Specs. https://www.vive.com/hk/product/vive-pro-eye/specs/.
[80]
HTC VIVE. 2023. VIVE Sense: Eye and Facial Tracking SDK. https://developer.vive.com/resources/vive-sense/eyeand- facial-tracking-sdk/.
[81]
Robin Walker, David G Walker, Masud Husain, and Christopher Kennard. 2000. Control of voluntary and reflexive saccades. Experimental Brain Research 130 (2000), 540--544.
[82]
RuxinWang, Long Huang, and ChenWang. 2023. Low-effort VR Headset User Authentication Using Head-reverberated Sounds with Replay Resistance. In 2023 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society, 3450-- 3465.
[83]
Xue Wang and Yang Zhang. 2021. Nod to auth: Fluent ar/vr authentication with user head-neck modeling. In Extended Abstracts of the 2021 CHI Conference on Human Factors in Computing Systems. 1--7.
[84]
Richard P Wildes. 1997. Iris recognition: an emerging biometric technology. Proc. IEEE 85, 9 (1997), 1348--1363.
[85]
Yi Xu, True Price, Jan-Michael Frahm, and Fabian Monrose. 2016. Virtual u: Defeating face liveness detection by building virtual models from your public photos. In 25th USENIX Security Symposium (USENIX Security 16). 497--512.
[86]
Konstantina G Yiannopoulou, Georgios I Papagiannis, Athanasios I Triantafyllou, Panayiotis Koulouvaris, Aikaterini I Anastasiou, Konstantinos Kontoangelos, and Ioannis P Anastasiou. 2021. Neurological and neurourological complications of electrical injuries. Neurologia i Neurochirurgia Polska 55, 1 (2021), 12--23.
[87]
Yongtuo Zhang, Wen Hu, Weitao Xu, Chun Tung Chou, and Jiankun Hu. 2018. Continuous authentication using eye movement response of implicit visual stimuli. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 1, 4 (2018), 1--22.
[88]
Huadi Zhu, Wenqiang Jin, Mingyan Xiao, Srinivasan Murali, and Ming Li. 2020. Blinkey: A two-factor user authentication method for virtual reality devices. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 4, 4 (2020), 1--29.
[89]
Huadi Zhu, Mingyan Xiao, Demoria Sherman, and Ming Li. 2023. SoundLock: A Novel User Authentication Scheme for VR Devices Using Auditory-Pupillary Response. In Network and Distributed System Security Symposium (NDSS).

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Proceedings of the ACM on Human-Computer Interaction
Proceedings of the ACM on Human-Computer Interaction  Volume 8, Issue MHCI
MHCI
September 2024
1136 pages
EISSN:2573-0142
DOI:10.1145/3697825
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 24 September 2024
Published in PACMHCI Volume 8, Issue MHCI

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. gaze
  2. user authentication
  3. vr

Qualifiers

  • Research-article

Funding Sources

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 147
    Total Downloads
  • Downloads (Last 12 months)147
  • Downloads (Last 6 weeks)29
Reflects downloads up to 28 Nov 2024

Other Metrics

Citations

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media