iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.3390/MTI2030045
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,19]],"date-time":"2024-09-19T15:52:36Z","timestamp":1726761156129},"reference-count":54,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2018,8,9]],"date-time":"2018-08-09T00:00:00Z","timestamp":1533772800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["MTI"],"abstract":"As mobile devices allow access to an increasing amount of private data, using them in public can potentially leak sensitive information through shoulder surfing. This includes personal private data (e.g., in chat conversations) and business-related content (e.g., in emails). Leaking the former might infringe on users\u2019 privacy, while leaking the latter is considered a breach of the EU\u2019s General Data Protection Regulation as of May 2018. This creates a need for systems that protect sensitive data in public. We introduce EyeSpot, a technique that displays content through a spot that follows the user\u2019s gaze while hiding the rest of the screen from an observer\u2019s view through overlaid masks. We explore different configurations for EyeSpot in a user study in terms of users\u2019 reading speed, text comprehension, and perceived workload. While our system is a proof of concept, we identify crystallized masks as a promising design candidate for further evaluation with regard to the security of the system in a shoulder surfing scenario.<\/jats:p>","DOI":"10.3390\/mti2030045","type":"journal-article","created":{"date-parts":[[2018,8,9]],"date-time":"2018-08-09T14:36:31Z","timestamp":1533825391000},"page":"45","source":"Crossref","is-referenced-by-count":10,"title":["EyeSpot: Leveraging Gaze to Protect Private Text Content on Mobile Devices from Shoulder Surfing"],"prefix":"10.3390","volume":"2","author":[{"ORCID":"http:\/\/orcid.org\/0000-0001-7051-5200","authenticated-orcid":false,"given":"Mohamed","family":"Khamis","sequence":"first","affiliation":[{"name":"Media Informatics Group, Ludwig Maximilian University of Munich, 80337 M\u00fcnchen, Germany"},{"name":"Glasgow Interactive Systems Section, School of Computing Science, University of Glasgow, Glasgow, G12 8RZ, UK"}]},{"given":"Malin","family":"Eiband","sequence":"additional","affiliation":[{"name":"Media Informatics Group, Ludwig Maximilian University of Munich, 80337 M\u00fcnchen, Germany"}]},{"given":"Martin","family":"Z\u00fcrn","sequence":"additional","affiliation":[{"name":"Media Informatics Group, Ludwig Maximilian University of Munich, 80337 M\u00fcnchen, Germany"}]},{"given":"Heinrich","family":"Hussmann","sequence":"additional","affiliation":[{"name":"Media Informatics Group, Ludwig Maximilian University of Munich, 80337 M\u00fcnchen, Germany"}]}],"member":"1968","published-online":{"date-parts":[[2018,8,9]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Eiband, M., Khamis, M., von Zezschwitz, E., Hussmann, H., and Alt, F. (2017, January 6\u201311). Understanding Shoulder Surfing in the Wild: Stories from Users and Observers. Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, Denver, CO, USA.","DOI":"10.1145\/3025453.3025636"},{"key":"ref_2","unstructured":"(2018, February 08). General Data Protection Regulation. Available online: ec.europa.eu\/justice\/data-protection\/."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Ali, M.E., Anwar, A., Ahmed, I., Hashem, T., Kulik, L., and Tanin, E. (2014, January 13\u201317). Protecting Mobile Users from Visual Privacy Attacks. Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication, Seattle, WA, USA.","DOI":"10.1145\/2638728.2638788"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Eiband, M., von Zezschwitz, E., Buschek, D., and Hu\u00dfmann, H. (2016, January 7\u201312). My Scrawl Hides It All: Protecting Text Messages Against Shoulder Surfing With Handwritten Fonts. Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems, San Jose, CA, USA.","DOI":"10.1145\/2851581.2892511"},{"key":"ref_5","unstructured":"De Luca, A., Harbach, M., von Zezschwitz, E., Maurer, M.E., Slawik, B.E., Hussmann, H., and Smith, M. (May, January 27). Now You See Me, Now You Don\u2019T: Protecting Smartphone Authentication from Shoulder Surfers. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Paris, France."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"von Zezschwitz, E., De Luca, A., Brunkow, B., and Hussmann, H. (2015, January 18\u201323). SwiPIN: Fast and Secure PIN-Entry on Smartphones. Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, Seoul, Korea.","DOI":"10.1145\/2702123.2702212"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Yang, Y., Clark, G.D., Lindqvist, J., and Oulasvirta, A. (2016, January 7\u201312). Free-Form Gesture Authentication in the Wild. Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, San Jose, CA, USA.","DOI":"10.1145\/2858036.2858270"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Zhou, H., Tearo, K., Waje, A., Alghamdi, E., Alves, T., Ferreira, V., Hawkey, K., and Reilly, D. (2016, January 7\u201312). Enhancing Mobile Content Privacy with Proxemics Aware Notifications and Protection. Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, San Jose, CA, USA.","DOI":"10.1145\/2858036.2858232"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"von Zezschwitz, E., Ebbinghaus, S., Hussmann, H., and De Luca, A. (2016, January 7\u201312). You Can\u2019t Watch This!: Privacy-Respectful Photo Browsing on Smartphones. Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, San Jose, CA, USA.","DOI":"10.1145\/2858036.2858120"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"De Luca, A., Denzel, M., and Hussmann, H. (2009, January 15\u201317). Look into My Eyes!: Can You Guess My Password?. Proceedings of the 5th Symposium on Usable Privacy and Security, Mountain View, CA, USA.","DOI":"10.1145\/1572532.1572542"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Liu, D., Dong, B., Gao, X., and Wang, H. (2015, January 2\u20135). Exploiting Eye Tracking for Smartphone Authentication. Proceedings of the 13th International Conference on Applied Cryptography and Network Security, New York, NY, USA.","DOI":"10.1007\/978-3-319-28166-7_22"},{"key":"ref_12","unstructured":"Probst, G. (2000). Analysis of the Effects of Privacy Filter Use on Horizontal Deviations in Posture of VDT Operators. [Master\u2019s Thesis, Virginia Polytechnic Institute and State University]."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Brudy, F., Ledo, D., Greenberg, S., and Butz, A. (2014, January 5\u20136). Is Anyone Looking? Mitigating Shoulder Surfing on Public Displays Through Awareness and Protection. Proceedings of the International Symposium on Pervasive Displays, Copenhagen, Denmark.","DOI":"10.1145\/2611009.2611028"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Zhou, H., Ferreira, V., Alves, T., Hawkey, K., and Reilly, D. (2015, January 18\u201323). Somebody Is Peeking!: A Proximity and Privacy Aware Tablet Interface. Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems, Seoul, Korea.","DOI":"10.1145\/2702613.2732726"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"95","DOI":"10.2307\/1423462","article-title":"Does the Generation Effect Occur for Pictures?","volume":"113","author":"Kinjo","year":"2000","journal-title":"Am. J. Psychol."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Denning, T., Bowers, K., van Dijk, M., and Juels, A. (2011, January 7\u201312). Exploring Implicit Memory for Painless Password Recovery. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Vancouver, BC, Canada.","DOI":"10.1145\/1978942.1979323"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Ijspeert, A.J., Masuzawa, T., and Kusumoto, S. (2006, January 26\u201327). A User Authentication System Using Schema of Visual Memory. Proceedings of the Second International Workshop on Biologically Inspired Approaches to Advanced Information Technology (BioADIT 2006), Osaka, Japan.","DOI":"10.1007\/11613022"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Hayashi, E., Dhamija, R., Christin, N., and Perrig, A. (2008, January 23\u201325). Use Your Illusion: Secure Authentication Usable Anywhere. Proceedings of the 4th Symposium on Usable Privacy and Security, Pittsburgh, PA, USA.","DOI":"10.1145\/1408664.1408670"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Khamis, M., Bulling, A., and Alt, F. (2015). Tackling Challenges of Interactive Public Displays Using Gaze. Adjunct Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2015 ACM International Symposium on Wearable Computers, ACM.","DOI":"10.1145\/2800835.2807951"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Best, D.S., and Duchowski, A.T. (2016, January 14\u201317). A Rotary Dial for Gaze-based PIN Entry. Proceedings of the Ninth Biennial ACM Symposium on Eye Tracking Research & Applications, Charleston, SC, USA.","DOI":"10.1145\/2857491.2857527"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Cymek, D.H., Venjakob, A.C., Ruff, S., Lutz, O.H.M., Hofmann, S., and Roetting, M. (2014). Entering PIN codes by smooth pursuit eye movements. J. Eye Mov. Res., 7.","DOI":"10.16910\/jemr.7.4.1"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"De Luca, A., Weiss, R., and Drewes, H. (2007, January 28\u201330). Evaluation of Eye-gaze Interaction Methods for Security Enhanced PIN-entry. Proceedings of the 19th Australasian Conference on Computer-Human Interaction: Entertaining User Interfaces, Adelaide, Australia.","DOI":"10.1145\/1324892.1324932"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Forget, A., Chiasson, S., and Biddle, R. (2010, January 10\u201315). Shoulder-surfing Resistance with Eye-gaze Entry in Cued-recall Graphical Passwords. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Atlanta, GA, USA.","DOI":"10.1145\/1753326.1753491"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Kumar, M., Garfinkel, T., Boneh, D., and Winograd, T. (2007, January 18\u201320). Reducing Shoulder-surfing by Using Gaze-based Password Entry. Proceedings of the 3rd Symposium on Usable Privacy and Security, Pittsburgh, PA, USA.","DOI":"10.1145\/1280680.1280683"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Sakai, D., Yamamoto, M., Nagamatsu, T., and Fukumori, S. (2016, January 14\u201317). Enter Your PIN Code Securely!: Utilization of Personal Difference of Angle Kappa. Proceedings of the Ninth Biennial ACM Symposium on Eye Tracking Research & Applications, Charleston, SC, USA.","DOI":"10.1145\/2857491.2884059"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Alt, F., Mikusz, M., Schneegass, S., and Bulling, A. (2016, January 12\u201315). Memorability of Cued-Recall Graphical Passwords with Saliency Masks. Proceedings of the 15th International Conference on Mobile and Ubiquitous Multimedia, Rovaniemi, Finland.","DOI":"10.1145\/3012709.3012730"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Bulling, A., Alt, F., and Schmidt, A. (2012, January 5\u201310). Increasing the Security of Gaze-based Cued-recall Graphical Passwords Using Saliency Masks. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Austin, TX, USA.","DOI":"10.1145\/2207676.2208712"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Kinnunen, T., Sedlak, F., and Bednarik, R. (2010, January 22\u201324). Towards Task-independent Person Authentication Using Eye Movement Signals. Proceedings of the 2010 Symposium on Eye-Tracking Research & Applications, Austin, TX, USA.","DOI":"10.1145\/1743666.1743712"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Hu, W., Xu, W., Chou, C.T., and Hu, J. (2018). Continuous Authentication Using Eye Movement Response of Implicit Visual Stimuli. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, ACM.","DOI":"10.1145\/3161410"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Khamis, M., Alt, F., and Bulling, A. (2018, January 3\u20136). The Past, Present, and Future of Gaze-enabled Handheld Mobile Devices: Survey and Lessons Learned. Proceedings of the 20th International Conference on Human-Computer Interaction with Mobile Devices and Services, Barcelona, Spain.","DOI":"10.1145\/3229434.3229452"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Khamis, M., Alt, F., Hassib, M., von Zezschwitz, E., Hasholzner, R., and Bulling, A. (2016, January 7\u201312). GazeTouchPass: Multimodal Authentication Using Gaze and Touch on Mobile Devices. Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems, San Jose, CA, USA.","DOI":"10.1145\/2851581.2892314"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Song, C., Wang, A., Ren, K., and Xu, W. (2016, January 10\u201315). EyeVeri: A Secure and Usable Approach for Smartphone User Authentication. Proceedings of the IEEE International Conference on Computer Communication (INFOCOM\u201916), San Francisco, CA, USA.","DOI":"10.1109\/INFOCOM.2016.7524367"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1109\/TCE.2013.6490252","article-title":"Smart privacy-preserving screen based on multiple sensor fusion","volume":"59","author":"Lian","year":"2013","journal-title":"IEEE Trans. Consum. Electron."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Khamis, M., Baier, A., Henze, N., Alt, F., and Bulling, A. (2018, January 21\u201326). Understanding Face and Eye Visibility in Front-Facing Cameras of Smartphones used in the Wild. Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, Montreal, QC, Canada.","DOI":"10.1145\/3173574.3173854"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"1121","DOI":"10.1098\/rstb.1997.0095","article-title":"Knowledge in perception and illusion","volume":"352","author":"Gregory","year":"1997","journal-title":"Phil. Trans. R. Soc. Lond. B"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Wang, Z., Jing, J., and Li, L. (2013, January 4\u20138). Time Evolving Graphical Password for Securing Mobile Devices. Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, Berlin, Germany.","DOI":"10.1145\/2484313.2484358"},{"key":"ref_37","unstructured":"Bennett, K. (2004). Linguistic Steganography: Survey, Analysis, and Robustness Concerns for Hiding Information in Text, Purdue University."},{"key":"ref_38","unstructured":"Shirali-Shahreza, M.H., and Shirali-Shahreza, M. (2006, January 10\u201312). A New Approach to Persian\/Arabic Text Steganography. Proceedings of the 5th IEEE\/ACIS International Conference on Computer and Information Science and 1st IEEE\/ACIS International Workshop on Component-Based Software Engineering, Software Architecture and Reuse (ICIS-COMSAR\u201906), Honolulu, HI, USA."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"1062","DOI":"10.1109\/5.771065","article-title":"Information Hiding\u2013A Survey","volume":"87","author":"Petitcolas","year":"1999","journal-title":"Proc. IEEE"},{"key":"ref_40","unstructured":"Davies, D. (2016, December 08). RandomText API. Available online: http:\/\/www.randomtext.me\/."},{"key":"ref_41","unstructured":"Wayner, P. (2016, December 08). Spam Mimic. Available online: http:\/\/www.spammimic.com\/."},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Fairclough, S.H., and Gilleade, K. (2014). Eye Tracking and Eye-Based Human\u2014Computer Interaction. Advances in Physiological Computing, Springer.","DOI":"10.1007\/978-1-4471-6392-3"},{"key":"ref_43","unstructured":"Duchowski, A., and Vertegaal, R. (2000). Eye-Based Interaction in Graphical Systems: Theory & Practice, ACM."},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Ho, J., Pointner, R., Shih, H.C., Lin, Y.C., Chen, H.Y., Tseng, W.L., and Chen, M.Y. (2015, January 24\u201327). EyeProtector: Encouraging a Healthy Viewing Distance when Using Smartphones. Proceedings of the 17th International Conference on Human-Computer Interaction with Mobile Devices and Services, Copenhagen, Denmark.","DOI":"10.1145\/2785830.2785836"},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Huang, M.X., Li, J., Ngai, G., and Leong, H.V. (2017, January 6\u201311). ScreenGlint: Practical, In-situ Gaze Estimation on Smartphones. Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, Denver, CO, USA.","DOI":"10.1145\/3025453.3025794"},{"key":"ref_46","unstructured":"(2018, January 29). Core Image Filter Reference. Available online: https:\/\/developer.apple.com\/library\/content\/documentation\/GraphicsImaging\/Reference\/CoreImageFilterReference\/index.html."},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Wood, E., and Bulling, A. (2014, January 26\u201328). EyeTab: Model-based Gaze Estimation on Unmodified Tablet Computers. Proceedings of the Symposium on Eye Tracking Research and Applications, Safety Harbor, FL, USA.","DOI":"10.1145\/2578153.2578185"},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Krafka, K., Khosla, A., Kellnhofer, P., Kannan, H., Bhandarkar, S., Matusik, W., and Torralba, A. (July, January 26). Eye Tracking for Everyone. Proceedings of the 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Las Vegas, NV, USA.","DOI":"10.1109\/CVPR.2016.239"},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Kassner, M., Patera, W., and Bulling, A. (2014, January 13\u201317). Pupil: An Open Source Platform for Pervasive Eye Tracking and Mobile Gaze-based Interaction. Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication, Seattle, WA, USA.","DOI":"10.1145\/2638728.2641695"},{"key":"ref_50","unstructured":"Ponemon Institute (2016). Global Visual Hacking Experimental Study: Analysis, Ponemon Institute."},{"key":"ref_51","unstructured":"(2018, January 29). S\u00fcddeutschen-Zeitung Jetzt.de\u2014WhatsApp Column. Available online: http:\/\/www.jetzt.de\/tag\/whatsapp-kolumne."},{"key":"ref_52","unstructured":"(2018, January 29). American Association of Teachers of German. Practice Exams. Available online: http:\/\/www.aatg.org\/?page=NGEPracExams."},{"key":"ref_53","unstructured":"De Luca, A., von Zezschwitz, E., Pichler, L., and Hussmann, H. (May, January 27). Using Fake Cursors to Secure On-screen Password Entry. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Paris, France."},{"key":"ref_54","first-page":"223","article-title":"High-quality Capture of Eyes","volume":"33","author":"Bradley","year":"2014","journal-title":"ACM Trans. Graph."}],"container-title":["Multimodal Technologies and Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2414-4088\/2\/3\/45\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,12]],"date-time":"2024-06-12T03:06:38Z","timestamp":1718161598000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2414-4088\/2\/3\/45"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,9]]},"references-count":54,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2018,9]]}},"alternative-id":["mti2030045"],"URL":"http:\/\/dx.doi.org\/10.3390\/mti2030045","relation":{},"ISSN":["2414-4088"],"issn-type":[{"value":"2414-4088","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,8,9]]}}}