Abstract
Mixed-reality (MR) technology development is now gaining momentum due to advances in computer vision, sensor fusion, and realistic display technologies. Despite this, most of the research and development has been focused on delivering the promise of MR; concerns on potential security and privacy risks are continuously being pointed out, and only a few are working on the privacy and security implications of the technology. We put into light these risks and look into the latest security and privacy work on MR. In this chapter, we present an exposition and categorization of the latest security and privacy work on MR.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Milgram, P., Kishino, F.: A taxonomy of mixed reality visual displays. IEICE Trans. Inf. Syst. 77(12), 1321–1329 (1994)
Benford, S., Brown, C., Reynard, G., Greenhalgh, C.: Shared spaces: transportation, artificiality, and spatiality (1996)
Azuma, R.T.: A survey of augmented reality. Presence Teleoperators Virtual Environ. 6(4), 355–385 (1997)
Azuma, R., Baillot, Y., Behringer, R., Feiner, S., Julier, S., MacIntyre, B.: Recent advances in augmented reality. IEEE Comput. Graphics Appl. 21(6), 34–47 (2001)
Rabbi, I., Ullah, S.: A survey on augmented reality challenges and tracking. Acta Graphica znanstveni časopis za tiskarstvo i grafičke komunikacije 24(1–2), 29–46 (2013)
Heimo, O.I., Kimppa, K.K., Helle, S., Korkalainen, T., Lehtonen, T.: Augmented reality-towards an ethical fantasy? (2014)
Friedman, B., Kahn Jr, P.H.: New directions: a value-sensitive design approach to augmented reality (2000)
Baldassi, S., Kohno, T., Roesner, F., Tian, M.: Challenges and new directions in augmented reality, computer security, and neuroscience-part 1: Risks to sensation and perception (2018). arXiv preprint arXiv:1806.10557
Roesner, F., Kohno, T., Molnar, D.: Security and privacy for augmented reality systems. Commun. ACM 57(4), 88–96 (2014a)
de Guzman, J.A., Thilakarathna, K., Seneviratne, A.: Security and privacy approaches in mixed reality: A literature survey. ACM Comput. Surv. 52(6), 110:1–110:37 (2019d)
Qiao, X., Ren, P., Dustdar, S., Liu, L., Ma, H., Chen, J.: Web ar: A promising future for mobile augmented reality-state of the art, challenges, and insights. Proc. IEEE 107(4), 651–666 (2019)
Villari, M., Fazio, M., Dustdar, S., Rana, O., Ranjan, R.: Osmotic computing: a new paradigm for edge/cloud integration. IEEE Cloud Comput. 3(6), 76–83 (2016)
Zhang, W., Han, B., Hui, P.: Jaguar: Low latency mobile augmented reality with flexible tracking. In: Proceedings of the 26th ACM international conference on Multimedia (2018)
Liu, L., Li, H., Gruteser, M.: Edge assisted real-time object detection for mobile augmented reality. The 25th Annual International Conference on Mobile Computing and Networking (MobiCom). ACM, New York (2019)
Qiu, H., Ahmad, F., Bai, F., Gruteser, M., Govindan, R.: Avr: Augmented vehicular reality (2018)
Liu, L., Zhong, R., Zhang, W., Liu, Y., Zhang, J., Zhang, L., Gruteser, M.: Cutting the cord: Designing a high-quality untethered vr system with low latency remote rendering. In: Proceedings of the 16th Annual International Conference on Mobile Systems, Applications, and Services (2018)
Oh, S.J., Benenson, R., Fritz, M., Schiele, B.: Faceless person recognition: Privacy implications in social media. In: European Conference on Computer Vision. Springer, Cham (2016)
Acquisti, A.: Privacy in the age of augmented reality. In: Proceedings of the National Academy of Sciences (2011)
Lebeck, K., Ruth, K., Kohno, T., Roesner, F.: Towards security and privacy for multi-user augmented reality: foundations with end users. In: Proceedings of the 2018 IEEE Symposium on Security and Privacy (SP). IEEE, New York (2018)
Jana, S., Narayanan, A., Shmatikov, V.: A scanner darkly: Protecting user privacy from perceptual applications. In: Proceedings of the 2013 IEEE symposium on security and privacy. IEEE, New York (2013b)
Raval, N., Srivastava, A., Lebeck, K., Cox, L., Machanavajjhala, A.: Markit: Privacy markers for protecting visual secrets. In: Proceedings of the 2014 ACM international joint conference on pervasive and ubiquitous computing: Adjunct publication (2014)
Raval, N., Srivastava, A., Razeen, A., Lebeck, K., Machanavajjhala, A., Cox, L.P.: What you mark is what apps see. In: Proceedings of the 14th annual international conference on mobile systems, applications, and services (2016)
Templeman, R., Korayem, M., Crandall, D.J., Kapadia, A.: Placeavoider: steering first-person cameras away from sensitive spaces. In: NDSS (2014)
Zarepour, E., Hosseini, M., Kanhere, S.S., Sowmya, A.: A context-based privacy preserving framework for wearable visual lifeloggers. In: 2016 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops). IEEE, New York (2016)
Shu, J., Zheng, R., Hui, P.: Cardea: Context-aware visual privacy protection from pervasive cameras. arXiv preprint arXiv:1610.00889 (2016)
Steil, J., Koelle, M., Heuten, W., Boll, S., Bulling, A.: Privaceye: Privacy-preserving first-person vision using image features and eye movement analysis. CoRR, abs/1801.04457 (2018)
Truong, K., Patel, S., Summet, J., Abowd, G.: Preventing camera recording by designing a capture-resistant environment. In: UbiComp 2005: Ubiquitous Computing, pp. 903–903 (2005)
Roesner, F., Molnar, D., Moshchuk, A., Kohno, T., Wang, H.J.: World-driven access control for continuous sensing. In: Proceedings of the 2014 ACM SIGSAC conference on computer and communications security (2014b)
Aditya, P., Sen, R., Druschel, P., Joon Oh, S., Benenson, R., Fritz, M., Schiele, B., Bhattacharjee, B., Wu, T.T.: I-pic: A platform for privacy-compliant image capture. In: Proceedings of the 14th annual international conference on mobile systems, applications, and services (2016)
Li, A., Li, Q., Gao, W.: Privacycamera: Cooperative privacy-aware photographing with mobile phones. In: 2016 13th Annual IEEE international conference on sensing, communication, and networking (SECON). IEEE, New York (2016a)
Sun, Y., Chen, S., Zhu, S., Chen, Y.: iRyP: a purely edge-based visual privacy-respecting system for mobile cameras. In: Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks (2020)
Jana, S., Molnar, D., Moshchuk, A., Dunn, A.M., Livshits, B., Wang, H.J., Ofek, E.: Enabling fine-grained permissions for augmented reality applications with recognizers. In: 22nd USENIX Security Symposium (USENIX Security 13) (2013a)
Vilk, J., Molnar, D., Ofek, E., Rossbach, C., Livshits, B., Moshchuk, A., Wang, H.J., Gal, R.: Least privilege rendering in a 3d web browser. In: Microsoft Research Technical Report MSR-TR-2014-25 (2014)
Figueiredo, L.S., Livshits, B., Molnar, D., Veanes, M.: Prepose: Privacy, security, and reliability for gesture-based programming. In: 2016 IEEE Symposium on Security and Privacy (SP), pp. 122–137. IEEE, New York (2016)
Vilk, J., Molnar, D., Livshits, B., Ofek, E., Rossbach, C., Moshchuk, A., Wang, H.J., Gal, R.: Surroundweb: Mitigating privacy concerns in a 3d web browser. In: 2015 IEEE Symposium on Security and Privacy. IEEE, New York (2015)
Jensen, J., Hu, J., Rahmati, A., LiKamWa, R.: Protecting visual information in augmented reality from malicious application developers. In: The 5th ACM Workshop on Wearable Systems and Applications (2019)
de Guzman, J.A., Thilakarathna, K., Seneviratne, A.: Safemr: Privacy-aware visual information protection for mobile mixed reality. In: 2019 IEEE 44th Conference on Local Computer Networks (LCN). IEEE, New York (2019c)
de Guzman, J.A., Thilakarathna, K., Seneviratne, A.: Demo: Privacy-aware visual information protection for mobile mixed reality. In: 2019 IEEE 44th Conference on Local Computer Networks (LCN). IEEE, New York (2019a)
Hsu, C.-Y., Lu, C.-S., Pei, S.-C.: Homomorphic encryption-based secure sift for privacy-preserving feature extraction. In: Media Watermarking, Security, and Forensics III, vol. 7880. International Society for Optics and Photonics, New York (2011)
Lowe, D.G.: Distinctive image features from scale-invariant keypoints. Int. J. Comput. Vision 60(2), 91–110 (2004)
Jiang, L., Xu, C., Wang, X., Luo, B., Wang, H.: Secure outsourcing sift: Efficient and privacy-preserving image feature extraction in the encrypted domain. IEEE Trans. Dependable Secure Comput. 17(1), 179–193 (2017)
Qin, Z., Yan, J., Ren, K., Chen, C.W., Wang, C.: Towards efficient privacy-preserving image feature extraction in cloud computing. In: Proceedings of the 22nd ACM international conference on multimedia (2014a)
Qin, Z., Yan, J., Ren, K., Chen, C.W., Wang, C.: Secsift: Secure image sift feature extraction in cloud computing. ACM Trans. Multimedia Comput. Commun. Appl. (TOMM) 12(4s), 65 (2016)
Zhang, L., Jung, T., Feng, P., Li, X.-Y., Liu, Y.: Cloud-based privacy preserving image storage, sharing and search. arXiv preprint arXiv:1410.6593 (2014)
Ziad, M.T.I., Alanwar, A., Alzantot, M., Srivastava, M.: Cryptoimg: Privacy preserving processing over encrypted images. In: 2016 IEEE Conference on Communications and Network Security (CNS) (2016)
Ra, M.-R., Govindan, R., Ortega, A.: P3: Toward privacy-preserving photo sharing. In: 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI 13) (2013)
Sekhavat, Y.A.: Privacy preserving cloth try-on using mobile augmented reality. IEEE Trans. Multimedia 19(5), 1041–1049 (2017)
Newton, E.M., Sweeney, L., Malin, B.: Preserving privacy by de-identifying face images. IEEE Trans. Knowl. Data Eng. 17(2), 232–243 (2005)
Gross, R., Sweeney, L., De la Torre, F., Baker, S.: Model-based face de-identification. In: 2006 Conference on computer vision and pattern recognition workshop (CVPRW’06). IEEE, New York (2006)
Gross, R., Sweeney, L., de la Torre, F., Baker, S.: Semi-supervised learning of multi-factor models for face de-identification. In: 2008 IEEE Conference on Computer Vision and Pattern Recognition (2008)
Du, L., Yi, M., Blasch, E., Ling, H.: Garp-face: Balancing privacy protection and utility preservation in face de-identification. In: IEEE International Joint Conference on Biometrics. IEEE, New York (2014)
Brkic, K., Sikiric, I., Hrkac, T., Kalafatic, Z.: I know that person: Generative full body and face de-identification of people in images. In: 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW). IEEE, New York (2017)
Wu, Y., Yang, F., Ling, H.: Privacy-protective-gan for face de-identification. arXiv preprint arXiv:1806.08906 (2018)
Waegel, K.: [poster] a reconstructive see-through display (2014)
Pittaluga, F., Koppal, S.J., Kang, S.B., Sinha, S.N.: Revealing scenes by inverting structure from motion reconstructions. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (2019)
Speciale, P., Schonberger, J.L., Kang, S.B., Sinha, S.N., Pollefeys, M.: Privacy preserving image-based localization. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (2019)
de Guzman, J.A., Thilakarathna, K., Seneviratne, A.: A first look into privacy leakage in 3d mixed reality data. In: European Symposium on Research in Computer Security. Springer, Cham (2019b)
de Guzman, J.A., Thilakarathna, K., Seneviratne, A.: Conservative plane releasing for spatial privacy protection in mixed reality. arXiv preprint arXiv:2004.08029 (2020)
Casey, P., Baggili, I., Yarramreddy, A.: Immersive virtual reality attacks and the human joystick. In: IEEE Transactions on Dependable and Secure Computing (2019)
Lebeck, K., Kohno, T., Roesner, F.: How to safely augment reality: Challenges and directions. In: Proceedings of the 17th International Workshop on Mobile Computing Systems and Applications (2016)
Lebeck, K., Ruth, K., Kohno, T., Roesner, F.: Securing augmented reality output. In: 2017 IEEE symposium on security and privacy (SP). IEEE, New York (2017)
Lebeck, K., Kohno, T., Roesner, F.: Enabling multiple applications to simultaneously augment reality: Challenges and directions. In: Proceedings of the 20th International Workshop on Mobile Computing Systems and Applications (2019)
Ahn, S., Gorlatova, M., Naghizadeh, P., Chiang, M., Mittal, P.: Adaptive fog-based output security for augmented reality. In: Proceedings of the 2018 Morning Workshop on Virtual Reality and Augmented Reality Network (2018)
Eaddy, M., Blasko, G., Babcock, J., Feiner, S.: My own private kiosk: Privacy-preserving public displays. In: Eighth International Symposium on Wearable Computers, vol. 1. IEEE, New York (2004)
Woo, G., Lippman, A., Raskar, R.: Vrcodes: Unobtrusive and active visual codes for interaction by exploiting rolling shutter. In: 2012 IEEE International Symposium on Mixed and Augmented Reality (ISMAR). IEEE, New York (2012)
Yerazunis, W., Carbone, M.: Privacy-enhanced displays by time-masking images. In: Australian Conference on Computer-Human Interaction (2002)
Lin, P.-Y., You, B., Lu, X.: Video exhibition with adjustable augmented reality system based on temporal psycho-visual modulation. EURASIP J. Image Video Process. 2017(1), 7 (2017)
Chang, J.J.-Y., Li, M.-J., Wang, Y.-C., Juan, J.S.-T.: Two-image encryption by random grids. In: 2010 10th International Symposium on Communications and Information Technologies. IEEE, New York (2010)
Simkin, M., Schröder, D., Bulling, A., Fritz, M.: Ubic: Bridging the gap between digital cryptography and the physical world. In: European Symposium on Research in Computer Security. Springer, Cham (2014)
Lantz, P., Johansson, B., Hell, M., Smeets, B.: Visual cryptography and obfuscation: A use-case for decrypting and deobfuscating information using augmented reality. In: International Conference on Financial Cryptography and Data Security. Springer, Berlin (2015)
Andrabi, S.J., Reiter, M.K., Sturton, C.: Usability of augmented reality for revealing secret messages to users but not their devices. In: Eleventh Symposium On Usable Privacy and Security (SOUPS 2015) (2015)
Benford, S., Greenhalgh, C., Reynard, G., Brown, C., Koleva, B.: Understanding and constructing shared spaces with mixed-reality boundaries. ACM Trans. Comput.-Hum. Interact. (TOCHI) 5(3), 185–223 (1998)
Scott, S.D., Carpendale, M.S.T., Inkpen, K.M.: Territoriality in collaborative tabletop workspaces. In: Proceedings of the 2004 ACM conference on Computer supported cooperative work (2004)
Butz, A., Beshers, C., Feiner, S.: Of vampire mirrors and privacy lamps: Privacy management in multi-user augmented environments. In: Proceedings of the 11th annual ACM symposium on User interface software and technology (1998)
Butz, A., Höllerer, T., Feiner, S., MacIntyre, B., Beshers, C.: Enveloping users and computers in a collaborative 3d augmented reality. In: Proceedings 2nd IEEE and ACM International Workshop on Augmented Reality (IWAR’99). IEEE, New York (1999)
Wu, M., Balakrishnan, R.: Multi-finger and whole hand gestural interaction techniques for multi-user tabletop displays. In: Proceedings of the 16th annual ACM symposium on User interface software and technology (2003)
Morris, M.R., Cassanego, A., Paepcke, A., Winograd, T., Piper, A.M., Huang, A.: Mediating group dynamics through tabletop interface design. IEEE Comput. Graphics Appl. 26(5), 65–73 (2006a)
Morris, M.R., Huang, A., Paepcke, A., Winograd, T.: Cooperative gestures: multi-user gestural interactions for co-located groupware. In: Proceedings of the SIGCHI conference on Human Factors in computing systems (2006b)
DeVincenzi, A., Yao, L., Ishii, H., Raskar, R.: Kinected conference: augmenting video imaging with calibrated depth and audio. In: Proceedings of the ACM 2011 conference on Computer supported cooperative work (2011)
Reilly, D., Salimian, M., MacKay, B., Mathiasen, N., Edwards, W.K., Franz, J.: Secspace: prototyping usable privacy and security for mixed reality collaborative environments. In: Proceedings of the 2014 ACM SIGCHI symposium on Engineering interactive computing systems (2014)
Ens, B., Grossman, T., Anderson, F., Matejka, J., Fitzmaurice, G.: Candid interaction: Revealing hidden mobile and wearable computing activities. In: Proceedings of the 28th Annual ACM Symposium on User Interface Software and Technology (2015)
Szalavári, Z., Eckstein, E., Gervautz, M.: Collaborative gaming in augmented reality. In: Proceedings of the ACM symposium on Virtual reality software and technology (1998)
Cheok, A.D., Yang, X., Ying, Z.Z., Billinghurst, M., Kato, H.: Touch-space: Mixed reality game space based on ubiquitous, tangible, and social computing. Personal Ubiquitous Comput. 6(5–6), 430–442 (2002)
Xu, Y., Gandy, M., Deen, S., Schrank, B., Spreen, K., Gorbsky, M., White, T., Barba, E., Radu, I., Bolter, J., et al.: Bragfish: exploring physical and social interaction in co-located handheld augmented reality games. In: Proceedings of the 2008 international conference on advances in computer entertainment technology (2008)
Henrysson, A., Billinghurst, M., Ollila, M.: Face to face collaborative ar on mobile phones. In: Fourth ieee and acm international symposium on mixed and augmented reality (ISMAR’05). IEEE, New York (2005)
Gaebel, E., Zhang, N., Lou, W., Hou, Y.T.: Looks good to me: Authentication for augmented reality. In: Proceedings of the 6th international workshop on trustworthy embedded devices (2016)
Sluganovic, I., Serbec, M., Derek, A., Martinovic, I.: Holopair: Securing shared augmented reality using microsoft hololens. In: Proceedings of the 33rd annual computer security applications conference (2017)
Sluganovic, I., Liskij, M., Derek, A., Martinovic, I.: Tap-pair: Using spatial secrets for single-tap device pairing of augmented reality headsets. In: Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy (2020)
Dickinson, B.: 5 authentication methods putting passwords to shame (2016)
Aslan, I., Uhl, A., Meschtscherjakov, A., Tscheligi, M.: Mid-air authentication gestures: an exploration of authentication based on palm and finger motions. In: Proceedings of the 16th International Conference on Multimodal Interaction (2014)
Rogers, C.E., Witt, A.W., Solomon, A.D., Venkatasubramanian, K.K.: An approach for user identification for head-mounted displays. In: Proceedings of the 2015 ACM International Symposium on Wearable Computers (2015)
Li, S., Ashok, A., Zhang, Y., Xu, C., Lindqvist, J., Gruteser, M.: Whose move is it anyway? authenticating smart wearable devices using unique head movement patterns. In: 2016 IEEE International Conference on Pervasive Computing and Communications (PerCom). IEEE, New York (2016b)
Chauhan, J., Hu, Y., Seneviratne, S., Misra, A., Seneviratne, A., Lee, Y.: Breathprint: Breathing acoustics-based user authentication. In: Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services (2017)
Venkatasubramanian, K.K., Banerjee, A., Gupta, S.K.S.: Pska: Usable and secure key agreement scheme for body area networks. IEEE Trans. Inf. Technol. Biomed. 14(1), 60–68 (2010)
Schneegass, S., Oualil, Y., Bulling, A.: Skullconduct: Biometric user identification on eyewear computers using bone conduction through the skull. In: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (2016)
Raja, K.B., Raghavendra, R., Stokkenes, M., Busch, C.: Multi-modal authentication system for smartphones using face, IRIS and periocular. In: International Conference on Biometrics (ICB), pp. 143–150. IEEE, New York (2015)
Khamis, M., Alt, F., Hassib, M., von Zezschwitz, E., Hasholzner, R., Bulling, A.: Gazetouchpass: Multimodal authentication using gaze and touch on mobile devices. In: Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems (2016)
Forte, A.G., Garay, J.A., Jim, T., Vahlis, Y.: Eyedecrypt—private interactions in plain sight. In: International Conference on Security and Cryptography for Networks. Springer, Cham (2014)
Maiti, A., Jadliwala, M., Weber, C.: Preventing shoulder surfing using randomized augmented reality keyboards. In: 2017 IEEE international conference on pervasive computing and communications workshops (PerCom Workshops) (2017)
Kohno, T., Kollin, J., Molnar, D., Roesner, F.: Display leakage and transparent wearable displays: Investigation of risk, root causes, and defenses. Technical report (2016)
Möllers, M., Borchers, J.: TaPS widgets: interacting with tangible private spaces. In: Proceedings of the ACM International Conference on Interactive Tabletops and Surfaces (2011)
Pearson, J., Robinson, S., Jones, M., Joshi, A., Ahire, S., Sahoo, D., Subramanian, S.: Chameleon devices: investigating more secure and discreet mobile interactions via active camouflaging. In: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (2017)
Rubio-Medrano, C.E., Jogani, S., Leitner, M., Zhao, Z., Ahn, G.-J.: Effectively enforcing authorization constraints for emerging space-sensitive technologies. In: Proceedings of the 24th ACM Symposium on Access Control Models and Technologies (2019)
Xu, Z., Zhu, S.: Semadroid: A privacy-aware sensor management framework for smartphones. In: Proceedings of the 5th ACM Conference on Data and Application Security and Privacy (2015)
Ruth, K., Kohno, T., Roesner, F.: Secure multi-user content sharing for augmented reality applications. In: 28th USENIX Security Symposium (USENIX Security 19) (2019)
Guzman, J.A.d., Seneviratne, A., Thilakarathna, K.: Unravelling spatial privacy risks of mobile mixed reality data. In: Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, vol. 5(1), pp. 1–26 (2021)
Arthur, C.: Google glass security failings may threaten owner’s privacy. In: The Guardian: Dostupnona. https://www.theguardian.com/technology/2013/may/01/google-glass-security-privacyrisk [pristupljeno: 08.08. 2019] (2013)
Denning, T., Dehlawi, Z., Kohno, T.: In situ with bystanders of augmented reality glasses: Perspectives on recording and privacy-mediating technologies. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (2014)
Siriwardhana, Y., Porambage, P., Liyanage, M., Ylinattila, M.: A survey on mobile augmented reality with 5g mobile edge computing: Architectures, applications and technical aspects. IEEE Commun. Surv. Tutorials 23(2), 1160–1192 (2021)
Roman, R., Lopez, J., Mambo, M.: Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges. Future Gener. Comput. Syst. 78, 680–698 (2018)
Szczuko, P.: Augmented reality for privacy-sensitive visual monitoring. In: International Conference on Multimedia Communications, Services and Security. Springer, Cham (2014)
Wang, J., Amos, B., Das, A., Pillai, P., Sadeh, N., Satyanarayanan, M.: A scalable and privacy-aware iot service for live video analytics. In: Proceedings of the 8th ACM on Multimedia Systems Conference (2017)
Hayashi, M., Yoshida, R., Kitahara, I., Kameda, Y., Ohta, Y.: An installation of privacy-safe see-through vision. Procedia-Social Behav. Sci. 2(1), 125–128 (2010)
Qin, Z., Yan, J., Ren, K., Chen, C.W., Wang, C., Fu, X.: Privacy-preserving outsourcing of image global feature detection. In: 2014 IEEE global communications conference. IEEE, New York (2014b)
Fang, C., Chang, E.-C.: Securing interactive sessions using mobile device through visual channel and visual inspection. In: Proceedings of the 26th Annual Computer Security Applications Conference (2010)
Szalavári, Z., Gervautz, M.: The personal interaction panel-a two-handed interface for augmented reality. In: Computer graphics forum, vol. 16(3), pp. C335–C346. Blackwell Publishers Ltd., Oxford (1997)
George, C., Khamis, M., von Zezschwitz, E., Burger, M., Schmidt, H., Alt, F., Hussmann, H.: Seamless and secure vr: Adapting and evaluating established authentication systems for virtual reality. In: NDSS (2017)
Mulloni, A., Wagner, D., Schmalstieg, D.: Mobility and social interaction as core gameplay elements in multi-player augmented reality. In: Proceedings of the 3rd international conference on Digital Interactive Media in Entertainment and Arts, pp. 472–478. ACM (2008)
Acknowledgements
We would like to thank Kwon Nung Choi for working on the packet analysis shown in Fig. 7.4. We also would like to thank Facebook Reality Labs for partially funding this work through Facebook Research Awards 2020.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Section Editor information
Rights and permissions
Copyright information
© 2023 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Guzman, J.A.D., Thilakarathna, K., Seneviratne, A. (2023). Privacy and Security Issues and Solutions for Mixed Reality Applications. In: Nee, A.Y.C., Ong, S.K. (eds) Springer Handbook of Augmented Reality. Springer Handbooks. Springer, Cham. https://doi.org/10.1007/978-3-030-67822-7_7
Download citation
DOI: https://doi.org/10.1007/978-3-030-67822-7_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-67821-0
Online ISBN: 978-3-030-67822-7
eBook Packages: Computer ScienceComputer Science (R0)