[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3338286.3340129acmconferencesArticle/Chapter ViewAbstractPublication PagesmobilehciConference Proceedingsconference-collections
research-article
Public Access

Private Reader: Using Eye Tracking to Improve Reading Privacy in Public Spaces

Published: 01 October 2019 Publication History

Abstract

Reading in public spaces can often be tricky if we wish to keep the contents away from the prying eye. We propose Private Reader, an eye-tracking approach towards maintaining privacy while reading by rendering only the portion of text that is gazed by the reader. We conducted a user study by evaluating for both the reader and observer in terms of privacy, reading comfort, and reading speed for three reading modes; normal, underscored, and scrambled text. "Scrambled" performs best in terms of perceived effort and frustration for the shoulder surfer. Our contribution is threefold; we developed a system to preserve privacy by rendering only the text at gaze-point of the reader, we conducted a user study to evaluate user preferences and subjective task load, and we suggested several scenarios where Private Reader is useful in public spaces.

References

[1]
Ion P Beldie, Siegmund Pastoor, and Elmar Schwarz. 1983. Fixed versus Variable Letter Width for Televised Text. Human Factors 25, 3 (1983), 273--277.
[2]
John Brooke et al. 1996. SUS-A quick and dirty usability scale. Usability evaluation in industry 189, 194 (1996), 4--7.
[3]
Frederik Brudy, David Ledo, Saul Greenberg, and Andreas Butz. 2014. Is Anyone Looking? Mitigating Shoulder Surfing on Public Displays Through Awareness and Protection. In Proceedings of The International Symposium on Pervasive Displays (PerDis '14). ACM, New York, NY, USA, Article 1, 6 pages. https://doi.org/10.1145/2611009.2611028
[4]
Geoffrey B Duggan and Stephen J Payne. 2011. Skim reading by satisficing: evidence from eye tracking. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 1141--1150.
[5]
Malin Eiband, Mohamed Khamis, Emanuel Von Zezschwitz, Heinrich Hussmann, and Florian Alt. 2017. Understanding shoulder surfing in the wild: Stories from users and observers. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. ACM, 4254--4265.
[6]
Alain Forget, Sonia Chiasson, and Robert Biddle. 2010. Shoulder-surfing resistance with eye-gaze entry in cued-recall graphical passwords. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 1107--1110.
[7]
Stevanus Kevin, Yun Suen Pai, and Kai Kunze. 2018. Virtual gaze: exploring use of gaze as rich interaction method with virtual agent in interactive virtual reality content. In Proceedings of the 24th ACM Symposium on Virtual Reality Software and Technology. ACM, 130.
[8]
Mohamed Khamis, Florian Alt, and Andreas Bulling. 2018. The past, present, and future of gaze-enabled handheld mobile devices: survey and lessons learned. In Proceedings of the 20th International Conference on Human-Computer Interaction with Mobile Devices and Services. ACM, 38.
[9]
Mohamed Khamis, Linda Bandelow, Stina Schick, Dario Casadevall, Andreas Bulling, and Florian Alt. 2017. They Are All After You: Investigating the Viability of a Threat Model That Involves Multiple Shoulder Surfers. In Proceedings of the 16th International Conference on Mobile and Ubiquitous Multimedia (MUM '17). ACM, New York, NY, USA, 31--35. https://doi.org/10.1145/3152832.3152851
[10]
Mohamed Khamis, Malin Eiband, Martin Zürn, and Heinrich Hussmann. 2018. EyeSpot: Leveraging Gaze to Protect Private Text Content on Mobile Devices from Shoulder Surfing. Multimodal Technologies and Interaction 2, 3 (2018), 45.
[11]
Mohamed Khamis, Mariam Hassib, Emanuel von Zezschwitz, Andreas Bulling, and Florian Alt. 2017. GazeTouchPIN: protecting sensitive data on mobile devices using secure multimodal authentication. In Proceedings of the 19th ACM International Conference on Multimodal Interaction. ACM, 446--450.
[12]
Manu Kumar, Tal Garfinkel, Dan Boneh, and Terry Winograd. 2007. Reducing shoulder-surfing by using gaze-based password entry. In Proceedings of the 3rd symposium on Usable privacy and security. ACM, 13--19.
[13]
Kai Kunze, Hitoshi Kawaichi, Kazuyo Yoshimura, and Koichi Kise. 2013. The Wordometer--Estimating the Number of Words Read Using Document Image Retrieval and Mobile Eye Tracking. In 2013 12th International Conference on Document Analysis and Recognition. IEEE, 25--29.
[14]
Kai Kunze, Yuzuko Utsumi, Yuki Shiga, Koichi Kise, and Andreas Bulling. 2013. I know what you are reading: recognition of document types using mobile eye tracking. In Proceedings of the 2013 International Symposium on Wearable Computers. ACM, 113--116.
[15]
Luis A Leiva. 2018. Responsive snippets: adaptive skim-reading for mobile devices. In Proceedings of the 20th International Conference on Human-Computer Interaction with Mobile Devices and Services Adjunct. ACM, 327--331.
[16]
Zhenjiang Li, Mo Li, Prasant Mohapatra, Jinsong Han, and Shuaiyu Chen. 2017. iType: Using eye gaze to enhance typing privacy. In INFOCOM 2017-IEEE Conference on Computer Communications, IEEE. IEEE, 1--9.
[17]
Daniel J. Liebling and Sören Preibusch. 2014. Privacy Considerations for a Pervasive Eye Tracking World. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication (UbiComp '14 Adjunct). ACM, New York, NY, USA, 1169--1177. https://doi.org/10.1145/2638728.2641688
[18]
David Lyon. 2003. Surveillance as social sorting: Privacy, risk, and digital discrimination. Psychology Press.
[19]
Max Melchior et al. 2001. Perceptually guided scrolling for reading continuous text on small screen devices. In Proceedings of Mobile HCI. Citeseer.
[20]
Benjamin I Outram, Yun Suen Pai, Tanner Person, Kouta Minamizawa, and Kai Kunze. 2018. Anyorbit: orbital navigation in virtual environments with eye-tracking. In Proceedings of the 2018 ACM Symposium on Eye Tracking Research & Applications. ACM, 45.
[21]
Yun Suen Pai, Tilman Dingler, and Kai Kunze. 2018. Assessing hands-free interactions for VR using eye gaze and electromyography. Virtual Reality (2018), 1--13.
[22]
Ken Pfeuffer and Hans Gellersen. 2016. Gaze and touch interaction on tablets. In Proceedings of the 29th Annual Symposium on User Interface Software and Technology. ACM, 301--311.
[23]
Ken Pfeuffer, Benedikt Mayer, Diako Mardanbegi, and Hans Gellersen. 2017. Gaze+ pinch interaction in virtual reality. In Proceedings of the 5th Symposium on Spatial User Interaction. ACM, 99--108.
[24]
Vijay Rajanna, Seth Polsley, Paul Taele, and Tracy Hammond. 2017. A gaze gesture-based user authentication system to counter shoulder-surfing attacks. In Proceedings of the 2017 CHI Conference Extended Abstracts on Human Factors in Computing Systems. ACM, 1978-1986.
[25]
Milena Roetting and Olaf Zukunft. 2014. Don't touch that tablet: An evaluation of gaze-based interfaces for tablet computers. In 6th International Conference on Mobile Computing, Applications and Services. IEEE, 49--56.
[26]
Alia Saad, Michael Chukwu, and Stefan Schneegass. 2018. Communicating Shoulder Surfing Attacks to Users. In Proceedings of the 17th International Conference on Mobile and Ubiquitous Multimedia. ACM, 147--152.
[27]
Desney S. Tan and Mary Czerwinski. 2003. Information Voyeurism: Social Impact of Physically Large Displays on Information Privacy. In CHI '03 Extended Abstracts on Human Factors in Computing Systems (CHI EA '03). ACM, New York, NY, USA, 748--749. https://doi.org/10.1145/765891.765967
[28]
Desney S. Tan, Pedram Keyani, and Mary Czerwinski. 2005. Spy-resistant Keyboard: More Secure Password Entry on Public Touch Screen Displays. In Proceedings of the 17th Australia Conference on Computer-Human Interaction: Citizens Online: Considerations for Today and the Future (OZCHI '05). Computer-Human Interaction Special Interest Group (CHISIG) of Australia, Narrabundah, Australia, Australia, 1--10. http://dl.acm.org/citation.cfm?id=1108368.1108393
[29]
Peter Tarasewich, Jun Gong, and Richard Conlan. 2006. Protecting Private Data in Public. In CHI '06 Extended Abstracts on Human Factors in Computing Systems (CHI EA '06). ACM, New York, NY, USA, 1409--1414. https://doi.org/10.1145/1125451.1125711
[30]
Nur Haryani Zakaria, David Griffiths, Sacha Brostoff, and Jeff Yan. 2011. Shoulder Surfing Defence for Recall-based Graphical Passwords. In Proceedings of the Seventh Symposium on Usable Privacy and Security (SOUPS '11). ACM, New York, NY, USA, Article 6, 12 pages. https://doi.org/10.1145/2078827.2078835

Cited By

View all
  • (2024)Ngintip.in: Implementation of Machine Learning Based on Google's Teachable Machine and Waterfall Method to Detect Shoulder Surfing Attack2024 IEEE International Conference on Artificial Intelligence and Mechatronics Systems (AIMS)10.1109/AIMS61812.2024.10513033(1-6)Online publication date: 21-Feb-2024
  • (2023)Identification With Your Mind: A Hybrid BCI-Based Authentication Approach for Anti-Shoulder-Surfing Attacks Using EEG and Eye Movement DataIEEE Transactions on Instrumentation and Measurement10.1109/TIM.2023.324108172(1-14)Online publication date: 2023
  • (2023)Privacy Protection Against Shoulder Surfing in Mobile EnvironmentsMobile and Ubiquitous Systems: Computing, Networking and Services10.1007/978-3-031-34776-4_8(133-152)Online publication date: 27-Jun-2023
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
MobileHCI '19: Proceedings of the 21st International Conference on Human-Computer Interaction with Mobile Devices and Services
October 2019
646 pages
ISBN:9781450368254
DOI:10.1145/3338286
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 October 2019

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. display
  2. eye gaze
  3. eye tracking
  4. privacy
  5. public space
  6. reading
  7. shoulder surfing
  8. tablet
  9. text interactions

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Funding Sources

Conference

MobileHCI '19
Sponsor:

Acceptance Rates

Overall Acceptance Rate 202 of 906 submissions, 22%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)141
  • Downloads (Last 6 weeks)20
Reflects downloads up to 05 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Ngintip.in: Implementation of Machine Learning Based on Google's Teachable Machine and Waterfall Method to Detect Shoulder Surfing Attack2024 IEEE International Conference on Artificial Intelligence and Mechatronics Systems (AIMS)10.1109/AIMS61812.2024.10513033(1-6)Online publication date: 21-Feb-2024
  • (2023)Identification With Your Mind: A Hybrid BCI-Based Authentication Approach for Anti-Shoulder-Surfing Attacks Using EEG and Eye Movement DataIEEE Transactions on Instrumentation and Measurement10.1109/TIM.2023.324108172(1-14)Online publication date: 2023
  • (2023)Privacy Protection Against Shoulder Surfing in Mobile EnvironmentsMobile and Ubiquitous Systems: Computing, Networking and Services10.1007/978-3-031-34776-4_8(133-152)Online publication date: 27-Jun-2023
  • (2023)“They see me scrollin”—Lessons Learned from Investigating Shoulder Surfing Behavior and Attack Mitigation StrategiesHuman Factors in Privacy Research10.1007/978-3-031-28643-8_10(199-218)Online publication date: 10-Mar-2023
  • (2022)Shoulder Surfing through the Social Lens: A Longitudinal Investigation & Insights from an Exploratory Diary StudyProceedings of the 2022 European Symposium on Usable Security10.1145/3549015.3554211(85-97)Online publication date: 29-Sep-2022
  • (2022)Privacy Intelligence: A Survey on Image Privacy in Online Social NetworksACM Computing Surveys10.1145/354729955:8(1-35)Online publication date: 23-Dec-2022
  • (2022)Virtual Reality Observations: Using Virtual Reality to Augment Lab-Based Shoulder Surfing Research2022 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)10.1109/VR51125.2022.00048(291-300)Online publication date: Mar-2022
  • (2021)The Interplay between Personal Relationships & Shoulder Surfing MitigationProceedings of Mensch und Computer 202110.1145/3473856.3474006(338-343)Online publication date: 5-Sep-2021
  • (2021)The Trial of Posit in Shared Offices: Controlling Disclosure Levels of Schedule Data for Privacy by Changing the Placement of a Personal Interactive CalendarProceedings of the 2021 ACM Designing Interactive Systems Conference10.1145/3461778.3462073(149-159)Online publication date: 28-Jun-2021
  • (2021)Prototyping Usable Privacy and Security Systems: Insights from ExpertsInternational Journal of Human–Computer Interaction10.1080/10447318.2021.194913438:5(468-490)Online publication date: 5-Aug-2021
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media