Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3290607.3312959acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
abstract

LookUnlock: Using Spatial-Targets for User-Authentication on HMDs

Published: 02 May 2019 Publication History

Abstract

With head-mounted displays (HMDs), users can access and interact with a broad range of applications and data. Although some of this information is privacy-sensitive or even confidential, no intuitive, unobtrusive and secure authentication technique is available yet for HMDs. We present LookUnlock, an authentication technique for HMDs that uses passwords that are composed of spatial and virtual targets. Through a proof-of-concept implementation and security evaluation, we demonstrate that this technique can be efficiently used by people and is resistant to shoulder-surfing attacks.

Supplementary Material

MP4 File (lbw0114p.mp4)
Preview video

References

[1]
Andrea Bianchi and Ian Oakley. 2016. Wearable authentication: Trends and opportunities. it-Information Technology 58, 5 (2016), 255--262.
[2]
Sebastian Büttner, Markus Funk, Oliver Sand, and Carsten Röcker. 2016. Using Head-Mounted Displays and In-Situ Projection for Assistive Systems: A Comparison. In Proceedings of the 9th ACM International Conference on PErvasive Technologies Related to Assistive Environments. ACM, 44.
[3]
Ceenu George, Mohamed Khamis, Emanuel von Zezschwitz, Marinus Burger, Henri Schmidt, Florian Alt, and Heinrich Hussmann. 2017. Seamless and secure vr: Adapting and evaluating established authentication systems for virtual reality. NDSS.
[4]
Valentin Heun, Shunichi Kasahara, and Pattie Maes. 2013. Smarter objects: using AR technology to program physical objects and their interactions. In CHI'13 Extended Abstracts on Human Factors in Computing Systems. ACM, 961--966.
[5]
Yi-Ta Hsieh, Antti Jylhä, Valeria Orso, Luciano Gamberini, and Giulio Jacucci. 2016. Designing a Willing-to-Use-in-Public Hand Gestural Interaction Technique for Smart Glasses. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. ACM, 4203--4215.
[6]
Kent Lyons, Thad Starner, Daniel Plaisted, James Fusia, Amanda Lyons, Aaron Drew, and EW Looney. 2004. Twiddler typing: one-handed chording text entry for mobile phones. In Proceedings of the SIGCHI conference on Human factors in computing systems. ACM, 671--678.
[7]
Caroline Lancelot Miltgen, Ales Popovic, and Tiago Oliveira. 2013. Determinants of end-user acceptance of biometrics: Integrating the "Big 3" of technology acceptance with privacy context. Decision Support Systems 56 (2013), 103--114.
[8]
Umair Rehman and Shi Cao. 2015. Augmented Reality-Based Indoor Navigation Using Google Glass as a Wearable Head-Mounted Display. In Systems, Man, and Cybernetics (SMC), 2015 IEEE International Conference on. IEEE, 1452--1457.
[9]
Stefan Schneegass, Youssef Oualil, and Andreas Bulling. 2016. SkullConduct: Biometric user identification on eyewear computers using bone conduction through the skull. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. ACM, 1379--1384.
[10]
Chun Yu, Yizheng Gu, Zhican Yang, Xin Yi, Hengliang Luo, and Yuanchun Shi. 2017. Tap, Dwell or Gesture?: Exploring Head-Based Text Entry Techniques for HMDs. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. ACM, 4479--4488.
[11]
Ruide Zhang, Ning Zhang, Changlai Du, Wenjing Lou, Y Thomas Hou, and Yuichi Kawamoto. 2017. AugAuth: ShoulderSurfing Resistant Authentication for Augmented Reality. In Proc. of the 2017 IEEE International Conference on Communications.

Cited By

View all
  • (2024)Recent Trends of Authentication Methods in Extended Reality: A SurveyApplied System Innovation10.3390/asi70300457:3(45)Online publication date: 28-May-2024
  • (2024)Pivot: Panoramic-image-based VR User Authentication against Side-Channel AttacksACM Transactions on Multimedia Computing, Communications, and Applications10.1145/3694975Online publication date: 9-Sep-2024
  • (2024)Medusa3D: The Watchful Eye Freezing Illegitimate Users in Virtual Reality InteractionsProceedings of the ACM on Human-Computer Interaction10.1145/36765158:MHCI(1-21)Online publication date: 24-Sep-2024
  • Show More Cited By

Index Terms

  1. LookUnlock: Using Spatial-Targets for User-Authentication on HMDs

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CHI EA '19: Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems
    May 2019
    3673 pages
    ISBN:9781450359719
    DOI:10.1145/3290607
    Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 02 May 2019

    Check for updates

    Author Tags

    1. augmented reality
    2. authentication
    3. head-mounted displays
    4. spatial passwords
    5. usable security

    Qualifiers

    • Abstract

    Conference

    CHI '19
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 6,164 of 23,696 submissions, 26%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)89
    • Downloads (Last 6 weeks)4
    Reflects downloads up to 22 Sep 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Recent Trends of Authentication Methods in Extended Reality: A SurveyApplied System Innovation10.3390/asi70300457:3(45)Online publication date: 28-May-2024
    • (2024)Pivot: Panoramic-image-based VR User Authentication against Side-Channel AttacksACM Transactions on Multimedia Computing, Communications, and Applications10.1145/3694975Online publication date: 9-Sep-2024
    • (2024)Medusa3D: The Watchful Eye Freezing Illegitimate Users in Virtual Reality InteractionsProceedings of the ACM on Human-Computer Interaction10.1145/36765158:MHCI(1-21)Online publication date: 24-Sep-2024
    • (2024)VibHead: An Authentication Scheme for Smart Headsets through VibrationACM Transactions on Sensor Networks10.1145/361443220:4(1-21)Online publication date: 11-May-2024
    • (2024)Using Motion Forecasting for Behavior-Based Virtual Reality (VR) Authentication2024 IEEE International Conference on Artificial Intelligence and eXtended and Virtual Reality (AIxVR)10.1109/AIxVR59861.2024.00012(31-40)Online publication date: 17-Jan-2024
    • (2023)Investigating security indicators for hyperlinking within the metaverseProceedings of the Nineteenth USENIX Conference on Usable Privacy and Security10.5555/3632186.3632219(605-620)Online publication date: 7-Aug-2023
    • (2023)User Authentication Mechanisms Based on Immersive Technologies: A Systematic ReviewInformation10.3390/info1410053814:10(538)Online publication date: 2-Oct-2023
    • (2023)SigA: rPPG-based Authentication for Virtual Reality Head-mounted DisplayProceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses10.1145/3607199.3607209(686-699)Online publication date: 16-Oct-2023
    • (2023)Passive Vital Sign Monitoring via Facial Vibrations Leveraging AR/VR HeadsetsProceedings of the 21st Annual International Conference on Mobile Systems, Applications and Services10.1145/3581791.3596848(96-109)Online publication date: 18-Jun-2023
    • (2023)Privacy Leakage via Unrestricted Motion-Position Sensors in the Age of Virtual Reality: A Study of Snooping Typed Input on Virtual Keyboards2023 IEEE Symposium on Security and Privacy (SP)10.1109/SP46215.2023.10179301(3382-3398)Online publication date: May-2023
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media