Skip to main content

Privacy and Security Issues and Solutions for Mixed Reality Applications

  • Chapter
  • First Online:
Springer Handbook of Augmented Reality

Part of the book series: Springer Handbooks ((SHB))

Abstract

Mixed-reality (MR) technology development is now gaining momentum due to advances in computer vision, sensor fusion, and realistic display technologies. Despite this, most of the research and development has been focused on delivering the promise of MR; concerns on potential security and privacy risks are continuously being pointed out, and only a few are working on the privacy and security implications of the technology. We put into light these risks and look into the latest security and privacy work on MR. In this chapter, we present an exposition and categorization of the latest security and privacy work on MR.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 309.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 399.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Milgram, P., Kishino, F.: A taxonomy of mixed reality visual displays. IEICE Trans. Inf. Syst. 77(12), 1321–1329 (1994)

    Google Scholar 

  2. Benford, S., Brown, C., Reynard, G., Greenhalgh, C.: Shared spaces: transportation, artificiality, and spatiality (1996)

    Book  Google Scholar 

  3. Azuma, R.T.: A survey of augmented reality. Presence Teleoperators Virtual Environ. 6(4), 355–385 (1997)

    Article  Google Scholar 

  4. Azuma, R., Baillot, Y., Behringer, R., Feiner, S., Julier, S., MacIntyre, B.: Recent advances in augmented reality. IEEE Comput. Graphics Appl. 21(6), 34–47 (2001)

    Article  Google Scholar 

  5. Rabbi, I., Ullah, S.: A survey on augmented reality challenges and tracking. Acta Graphica znanstveni časopis za tiskarstvo i grafičke komunikacije 24(1–2), 29–46 (2013)

    Google Scholar 

  6. Heimo, O.I., Kimppa, K.K., Helle, S., Korkalainen, T., Lehtonen, T.: Augmented reality-towards an ethical fantasy? (2014)

    Book  Google Scholar 

  7. Friedman, B., Kahn Jr, P.H.: New directions: a value-sensitive design approach to augmented reality (2000)

    Book  Google Scholar 

  8. Baldassi, S., Kohno, T., Roesner, F., Tian, M.: Challenges and new directions in augmented reality, computer security, and neuroscience-part 1: Risks to sensation and perception (2018). arXiv preprint arXiv:1806.10557

    Google Scholar 

  9. Roesner, F., Kohno, T., Molnar, D.: Security and privacy for augmented reality systems. Commun. ACM 57(4), 88–96 (2014a)

    Article  Google Scholar 

  10. de Guzman, J.A., Thilakarathna, K., Seneviratne, A.: Security and privacy approaches in mixed reality: A literature survey. ACM Comput. Surv. 52(6), 110:1–110:37 (2019d)

    Google Scholar 

  11. Qiao, X., Ren, P., Dustdar, S., Liu, L., Ma, H., Chen, J.: Web ar: A promising future for mobile augmented reality-state of the art, challenges, and insights. Proc. IEEE 107(4), 651–666 (2019)

    Article  Google Scholar 

  12. Villari, M., Fazio, M., Dustdar, S., Rana, O., Ranjan, R.: Osmotic computing: a new paradigm for edge/cloud integration. IEEE Cloud Comput. 3(6), 76–83 (2016)

    Article  Google Scholar 

  13. Zhang, W., Han, B., Hui, P.: Jaguar: Low latency mobile augmented reality with flexible tracking. In: Proceedings of the 26th ACM international conference on Multimedia (2018)

    Google Scholar 

  14. Liu, L., Li, H., Gruteser, M.: Edge assisted real-time object detection for mobile augmented reality. The 25th Annual International Conference on Mobile Computing and Networking (MobiCom). ACM, New York (2019)

    Google Scholar 

  15. Qiu, H., Ahmad, F., Bai, F., Gruteser, M., Govindan, R.: Avr: Augmented vehicular reality (2018)

    Google Scholar 

  16. Liu, L., Zhong, R., Zhang, W., Liu, Y., Zhang, J., Zhang, L., Gruteser, M.: Cutting the cord: Designing a high-quality untethered vr system with low latency remote rendering. In: Proceedings of the 16th Annual International Conference on Mobile Systems, Applications, and Services (2018)

    Google Scholar 

  17. Oh, S.J., Benenson, R., Fritz, M., Schiele, B.: Faceless person recognition: Privacy implications in social media. In: European Conference on Computer Vision. Springer, Cham (2016)

    Google Scholar 

  18. Acquisti, A.: Privacy in the age of augmented reality. In: Proceedings of the National Academy of Sciences (2011)

    Google Scholar 

  19. Lebeck, K., Ruth, K., Kohno, T., Roesner, F.: Towards security and privacy for multi-user augmented reality: foundations with end users. In: Proceedings of the 2018 IEEE Symposium on Security and Privacy (SP). IEEE, New York (2018)

    Google Scholar 

  20. Jana, S., Narayanan, A., Shmatikov, V.: A scanner darkly: Protecting user privacy from perceptual applications. In: Proceedings of the 2013 IEEE symposium on security and privacy. IEEE, New York (2013b)

    Google Scholar 

  21. Raval, N., Srivastava, A., Lebeck, K., Cox, L., Machanavajjhala, A.: Markit: Privacy markers for protecting visual secrets. In: Proceedings of the 2014 ACM international joint conference on pervasive and ubiquitous computing: Adjunct publication (2014)

    Google Scholar 

  22. Raval, N., Srivastava, A., Razeen, A., Lebeck, K., Machanavajjhala, A., Cox, L.P.: What you mark is what apps see. In: Proceedings of the 14th annual international conference on mobile systems, applications, and services (2016)

    Google Scholar 

  23. Templeman, R., Korayem, M., Crandall, D.J., Kapadia, A.: Placeavoider: steering first-person cameras away from sensitive spaces. In: NDSS (2014)

    Google Scholar 

  24. Zarepour, E., Hosseini, M., Kanhere, S.S., Sowmya, A.: A context-based privacy preserving framework for wearable visual lifeloggers. In: 2016 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops). IEEE, New York (2016)

    Google Scholar 

  25. Shu, J., Zheng, R., Hui, P.: Cardea: Context-aware visual privacy protection from pervasive cameras. arXiv preprint arXiv:1610.00889 (2016)

    Google Scholar 

  26. Steil, J., Koelle, M., Heuten, W., Boll, S., Bulling, A.: Privaceye: Privacy-preserving first-person vision using image features and eye movement analysis. CoRR, abs/1801.04457 (2018)

    Google Scholar 

  27. Truong, K., Patel, S., Summet, J., Abowd, G.: Preventing camera recording by designing a capture-resistant environment. In: UbiComp 2005: Ubiquitous Computing, pp. 903–903 (2005)

    Google Scholar 

  28. Roesner, F., Molnar, D., Moshchuk, A., Kohno, T., Wang, H.J.: World-driven access control for continuous sensing. In: Proceedings of the 2014 ACM SIGSAC conference on computer and communications security (2014b)

    Google Scholar 

  29. Aditya, P., Sen, R., Druschel, P., Joon Oh, S., Benenson, R., Fritz, M., Schiele, B., Bhattacharjee, B., Wu, T.T.: I-pic: A platform for privacy-compliant image capture. In: Proceedings of the 14th annual international conference on mobile systems, applications, and services (2016)

    Google Scholar 

  30. Li, A., Li, Q., Gao, W.: Privacycamera: Cooperative privacy-aware photographing with mobile phones. In: 2016 13th Annual IEEE international conference on sensing, communication, and networking (SECON). IEEE, New York (2016a)

    Google Scholar 

  31. Sun, Y., Chen, S., Zhu, S., Chen, Y.: iRyP: a purely edge-based visual privacy-respecting system for mobile cameras. In: Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks (2020)

    Google Scholar 

  32. Jana, S., Molnar, D., Moshchuk, A., Dunn, A.M., Livshits, B., Wang, H.J., Ofek, E.: Enabling fine-grained permissions for augmented reality applications with recognizers. In: 22nd USENIX Security Symposium (USENIX Security 13) (2013a)

    Google Scholar 

  33. Vilk, J., Molnar, D., Ofek, E., Rossbach, C., Livshits, B., Moshchuk, A., Wang, H.J., Gal, R.: Least privilege rendering in a 3d web browser. In: Microsoft Research Technical Report MSR-TR-2014-25 (2014)

    Google Scholar 

  34. Figueiredo, L.S., Livshits, B., Molnar, D., Veanes, M.: Prepose: Privacy, security, and reliability for gesture-based programming. In: 2016 IEEE Symposium on Security and Privacy (SP), pp. 122–137. IEEE, New York (2016)

    Google Scholar 

  35. Vilk, J., Molnar, D., Livshits, B., Ofek, E., Rossbach, C., Moshchuk, A., Wang, H.J., Gal, R.: Surroundweb: Mitigating privacy concerns in a 3d web browser. In: 2015 IEEE Symposium on Security and Privacy. IEEE, New York (2015)

    Google Scholar 

  36. Jensen, J., Hu, J., Rahmati, A., LiKamWa, R.: Protecting visual information in augmented reality from malicious application developers. In: The 5th ACM Workshop on Wearable Systems and Applications (2019)

    Google Scholar 

  37. de Guzman, J.A., Thilakarathna, K., Seneviratne, A.: Safemr: Privacy-aware visual information protection for mobile mixed reality. In: 2019 IEEE 44th Conference on Local Computer Networks (LCN). IEEE, New York (2019c)

    Google Scholar 

  38. de Guzman, J.A., Thilakarathna, K., Seneviratne, A.: Demo: Privacy-aware visual information protection for mobile mixed reality. In: 2019 IEEE 44th Conference on Local Computer Networks (LCN). IEEE, New York (2019a)

    Google Scholar 

  39. Hsu, C.-Y., Lu, C.-S., Pei, S.-C.: Homomorphic encryption-based secure sift for privacy-preserving feature extraction. In: Media Watermarking, Security, and Forensics III, vol. 7880. International Society for Optics and Photonics, New York (2011)

    Google Scholar 

  40. Lowe, D.G.: Distinctive image features from scale-invariant keypoints. Int. J. Comput. Vision 60(2), 91–110 (2004)

    Article  Google Scholar 

  41. Jiang, L., Xu, C., Wang, X., Luo, B., Wang, H.: Secure outsourcing sift: Efficient and privacy-preserving image feature extraction in the encrypted domain. IEEE Trans. Dependable Secure Comput. 17(1), 179–193 (2017)

    Article  Google Scholar 

  42. Qin, Z., Yan, J., Ren, K., Chen, C.W., Wang, C.: Towards efficient privacy-preserving image feature extraction in cloud computing. In: Proceedings of the 22nd ACM international conference on multimedia (2014a)

    Google Scholar 

  43. Qin, Z., Yan, J., Ren, K., Chen, C.W., Wang, C.: Secsift: Secure image sift feature extraction in cloud computing. ACM Trans. Multimedia Comput. Commun. Appl. (TOMM) 12(4s), 65 (2016)

    Google Scholar 

  44. Zhang, L., Jung, T., Feng, P., Li, X.-Y., Liu, Y.: Cloud-based privacy preserving image storage, sharing and search. arXiv preprint arXiv:1410.6593 (2014)

    Google Scholar 

  45. Ziad, M.T.I., Alanwar, A., Alzantot, M., Srivastava, M.: Cryptoimg: Privacy preserving processing over encrypted images. In: 2016 IEEE Conference on Communications and Network Security (CNS) (2016)

    Google Scholar 

  46. Ra, M.-R., Govindan, R., Ortega, A.: P3: Toward privacy-preserving photo sharing. In: 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI 13) (2013)

    Google Scholar 

  47. Sekhavat, Y.A.: Privacy preserving cloth try-on using mobile augmented reality. IEEE Trans. Multimedia 19(5), 1041–1049 (2017)

    Article  Google Scholar 

  48. Newton, E.M., Sweeney, L., Malin, B.: Preserving privacy by de-identifying face images. IEEE Trans. Knowl. Data Eng. 17(2), 232–243 (2005)

    Article  Google Scholar 

  49. Gross, R., Sweeney, L., De la Torre, F., Baker, S.: Model-based face de-identification. In: 2006 Conference on computer vision and pattern recognition workshop (CVPRW’06). IEEE, New York (2006)

    Google Scholar 

  50. Gross, R., Sweeney, L., de la Torre, F., Baker, S.: Semi-supervised learning of multi-factor models for face de-identification. In: 2008 IEEE Conference on Computer Vision and Pattern Recognition (2008)

    Google Scholar 

  51. Du, L., Yi, M., Blasch, E., Ling, H.: Garp-face: Balancing privacy protection and utility preservation in face de-identification. In: IEEE International Joint Conference on Biometrics. IEEE, New York (2014)

    Google Scholar 

  52. Brkic, K., Sikiric, I., Hrkac, T., Kalafatic, Z.: I know that person: Generative full body and face de-identification of people in images. In: 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW). IEEE, New York (2017)

    Google Scholar 

  53. Wu, Y., Yang, F., Ling, H.: Privacy-protective-gan for face de-identification. arXiv preprint arXiv:1806.08906 (2018)

    Google Scholar 

  54. Waegel, K.: [poster] a reconstructive see-through display (2014)

    Google Scholar 

  55. Pittaluga, F., Koppal, S.J., Kang, S.B., Sinha, S.N.: Revealing scenes by inverting structure from motion reconstructions. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (2019)

    Google Scholar 

  56. Speciale, P., Schonberger, J.L., Kang, S.B., Sinha, S.N., Pollefeys, M.: Privacy preserving image-based localization. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (2019)

    Google Scholar 

  57. de Guzman, J.A., Thilakarathna, K., Seneviratne, A.: A first look into privacy leakage in 3d mixed reality data. In: European Symposium on Research in Computer Security. Springer, Cham (2019b)

    Google Scholar 

  58. de Guzman, J.A., Thilakarathna, K., Seneviratne, A.: Conservative plane releasing for spatial privacy protection in mixed reality. arXiv preprint arXiv:2004.08029 (2020)

    Google Scholar 

  59. Casey, P., Baggili, I., Yarramreddy, A.: Immersive virtual reality attacks and the human joystick. In: IEEE Transactions on Dependable and Secure Computing (2019)

    Google Scholar 

  60. Lebeck, K., Kohno, T., Roesner, F.: How to safely augment reality: Challenges and directions. In: Proceedings of the 17th International Workshop on Mobile Computing Systems and Applications (2016)

    Google Scholar 

  61. Lebeck, K., Ruth, K., Kohno, T., Roesner, F.: Securing augmented reality output. In: 2017 IEEE symposium on security and privacy (SP). IEEE, New York (2017)

    Google Scholar 

  62. Lebeck, K., Kohno, T., Roesner, F.: Enabling multiple applications to simultaneously augment reality: Challenges and directions. In: Proceedings of the 20th International Workshop on Mobile Computing Systems and Applications (2019)

    Google Scholar 

  63. Ahn, S., Gorlatova, M., Naghizadeh, P., Chiang, M., Mittal, P.: Adaptive fog-based output security for augmented reality. In: Proceedings of the 2018 Morning Workshop on Virtual Reality and Augmented Reality Network (2018)

    Google Scholar 

  64. Eaddy, M., Blasko, G., Babcock, J., Feiner, S.: My own private kiosk: Privacy-preserving public displays. In: Eighth International Symposium on Wearable Computers, vol. 1. IEEE, New York (2004)

    Google Scholar 

  65. Woo, G., Lippman, A., Raskar, R.: Vrcodes: Unobtrusive and active visual codes for interaction by exploiting rolling shutter. In: 2012 IEEE International Symposium on Mixed and Augmented Reality (ISMAR). IEEE, New York (2012)

    Google Scholar 

  66. Yerazunis, W., Carbone, M.: Privacy-enhanced displays by time-masking images. In: Australian Conference on Computer-Human Interaction (2002)

    Google Scholar 

  67. Lin, P.-Y., You, B., Lu, X.: Video exhibition with adjustable augmented reality system based on temporal psycho-visual modulation. EURASIP J. Image Video Process. 2017(1), 7 (2017)

    Article  Google Scholar 

  68. Chang, J.J.-Y., Li, M.-J., Wang, Y.-C., Juan, J.S.-T.: Two-image encryption by random grids. In: 2010 10th International Symposium on Communications and Information Technologies. IEEE, New York (2010)

    Google Scholar 

  69. Simkin, M., Schröder, D., Bulling, A., Fritz, M.: Ubic: Bridging the gap between digital cryptography and the physical world. In: European Symposium on Research in Computer Security. Springer, Cham (2014)

    Google Scholar 

  70. Lantz, P., Johansson, B., Hell, M., Smeets, B.: Visual cryptography and obfuscation: A use-case for decrypting and deobfuscating information using augmented reality. In: International Conference on Financial Cryptography and Data Security. Springer, Berlin (2015)

    Google Scholar 

  71. Andrabi, S.J., Reiter, M.K., Sturton, C.: Usability of augmented reality for revealing secret messages to users but not their devices. In: Eleventh Symposium On Usable Privacy and Security (SOUPS 2015) (2015)

    Google Scholar 

  72. Benford, S., Greenhalgh, C., Reynard, G., Brown, C., Koleva, B.: Understanding and constructing shared spaces with mixed-reality boundaries. ACM Trans. Comput.-Hum. Interact. (TOCHI) 5(3), 185–223 (1998)

    Google Scholar 

  73. Scott, S.D., Carpendale, M.S.T., Inkpen, K.M.: Territoriality in collaborative tabletop workspaces. In: Proceedings of the 2004 ACM conference on Computer supported cooperative work (2004)

    Google Scholar 

  74. Butz, A., Beshers, C., Feiner, S.: Of vampire mirrors and privacy lamps: Privacy management in multi-user augmented environments. In: Proceedings of the 11th annual ACM symposium on User interface software and technology (1998)

    Google Scholar 

  75. Butz, A., Höllerer, T., Feiner, S., MacIntyre, B., Beshers, C.: Enveloping users and computers in a collaborative 3d augmented reality. In: Proceedings 2nd IEEE and ACM International Workshop on Augmented Reality (IWAR’99). IEEE, New York (1999)

    Google Scholar 

  76. Wu, M., Balakrishnan, R.: Multi-finger and whole hand gestural interaction techniques for multi-user tabletop displays. In: Proceedings of the 16th annual ACM symposium on User interface software and technology (2003)

    Google Scholar 

  77. Morris, M.R., Cassanego, A., Paepcke, A., Winograd, T., Piper, A.M., Huang, A.: Mediating group dynamics through tabletop interface design. IEEE Comput. Graphics Appl. 26(5), 65–73 (2006a)

    Article  Google Scholar 

  78. Morris, M.R., Huang, A., Paepcke, A., Winograd, T.: Cooperative gestures: multi-user gestural interactions for co-located groupware. In: Proceedings of the SIGCHI conference on Human Factors in computing systems (2006b)

    Google Scholar 

  79. DeVincenzi, A., Yao, L., Ishii, H., Raskar, R.: Kinected conference: augmenting video imaging with calibrated depth and audio. In: Proceedings of the ACM 2011 conference on Computer supported cooperative work (2011)

    Google Scholar 

  80. Reilly, D., Salimian, M., MacKay, B., Mathiasen, N., Edwards, W.K., Franz, J.: Secspace: prototyping usable privacy and security for mixed reality collaborative environments. In: Proceedings of the 2014 ACM SIGCHI symposium on Engineering interactive computing systems (2014)

    Google Scholar 

  81. Ens, B., Grossman, T., Anderson, F., Matejka, J., Fitzmaurice, G.: Candid interaction: Revealing hidden mobile and wearable computing activities. In: Proceedings of the 28th Annual ACM Symposium on User Interface Software and Technology (2015)

    Google Scholar 

  82. Szalavári, Z., Eckstein, E., Gervautz, M.: Collaborative gaming in augmented reality. In: Proceedings of the ACM symposium on Virtual reality software and technology (1998)

    Google Scholar 

  83. Cheok, A.D., Yang, X., Ying, Z.Z., Billinghurst, M., Kato, H.: Touch-space: Mixed reality game space based on ubiquitous, tangible, and social computing. Personal Ubiquitous Comput. 6(5–6), 430–442 (2002)

    Article  Google Scholar 

  84. Xu, Y., Gandy, M., Deen, S., Schrank, B., Spreen, K., Gorbsky, M., White, T., Barba, E., Radu, I., Bolter, J., et al.: Bragfish: exploring physical and social interaction in co-located handheld augmented reality games. In: Proceedings of the 2008 international conference on advances in computer entertainment technology (2008)

    Google Scholar 

  85. Henrysson, A., Billinghurst, M., Ollila, M.: Face to face collaborative ar on mobile phones. In: Fourth ieee and acm international symposium on mixed and augmented reality (ISMAR’05). IEEE, New York (2005)

    Google Scholar 

  86. Gaebel, E., Zhang, N., Lou, W., Hou, Y.T.: Looks good to me: Authentication for augmented reality. In: Proceedings of the 6th international workshop on trustworthy embedded devices (2016)

    Google Scholar 

  87. Sluganovic, I., Serbec, M., Derek, A., Martinovic, I.: Holopair: Securing shared augmented reality using microsoft hololens. In: Proceedings of the 33rd annual computer security applications conference (2017)

    Google Scholar 

  88. Sluganovic, I., Liskij, M., Derek, A., Martinovic, I.: Tap-pair: Using spatial secrets for single-tap device pairing of augmented reality headsets. In: Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy (2020)

    Google Scholar 

  89. Dickinson, B.: 5 authentication methods putting passwords to shame (2016)

    Google Scholar 

  90. Aslan, I., Uhl, A., Meschtscherjakov, A., Tscheligi, M.: Mid-air authentication gestures: an exploration of authentication based on palm and finger motions. In: Proceedings of the 16th International Conference on Multimodal Interaction (2014)

    Google Scholar 

  91. Rogers, C.E., Witt, A.W., Solomon, A.D., Venkatasubramanian, K.K.: An approach for user identification for head-mounted displays. In: Proceedings of the 2015 ACM International Symposium on Wearable Computers (2015)

    Google Scholar 

  92. Li, S., Ashok, A., Zhang, Y., Xu, C., Lindqvist, J., Gruteser, M.: Whose move is it anyway? authenticating smart wearable devices using unique head movement patterns. In: 2016 IEEE International Conference on Pervasive Computing and Communications (PerCom). IEEE, New York (2016b)

    Google Scholar 

  93. Chauhan, J., Hu, Y., Seneviratne, S., Misra, A., Seneviratne, A., Lee, Y.: Breathprint: Breathing acoustics-based user authentication. In: Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services (2017)

    Google Scholar 

  94. Venkatasubramanian, K.K., Banerjee, A., Gupta, S.K.S.: Pska: Usable and secure key agreement scheme for body area networks. IEEE Trans. Inf. Technol. Biomed. 14(1), 60–68 (2010)

    Article  Google Scholar 

  95. Schneegass, S., Oualil, Y., Bulling, A.: Skullconduct: Biometric user identification on eyewear computers using bone conduction through the skull. In: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (2016)

    Google Scholar 

  96. Raja, K.B., Raghavendra, R., Stokkenes, M., Busch, C.: Multi-modal authentication system for smartphones using face, IRIS and periocular. In: International Conference on Biometrics (ICB), pp. 143–150. IEEE, New York (2015)

    Google Scholar 

  97. Khamis, M., Alt, F., Hassib, M., von Zezschwitz, E., Hasholzner, R., Bulling, A.: Gazetouchpass: Multimodal authentication using gaze and touch on mobile devices. In: Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems (2016)

    Google Scholar 

  98. Forte, A.G., Garay, J.A., Jim, T., Vahlis, Y.: Eyedecrypt—private interactions in plain sight. In: International Conference on Security and Cryptography for Networks. Springer, Cham (2014)

    Google Scholar 

  99. Maiti, A., Jadliwala, M., Weber, C.: Preventing shoulder surfing using randomized augmented reality keyboards. In: 2017 IEEE international conference on pervasive computing and communications workshops (PerCom Workshops) (2017)

    Google Scholar 

  100. Kohno, T., Kollin, J., Molnar, D., Roesner, F.: Display leakage and transparent wearable displays: Investigation of risk, root causes, and defenses. Technical report (2016)

    Google Scholar 

  101. Möllers, M., Borchers, J.: TaPS widgets: interacting with tangible private spaces. In: Proceedings of the ACM International Conference on Interactive Tabletops and Surfaces (2011)

    Google Scholar 

  102. Pearson, J., Robinson, S., Jones, M., Joshi, A., Ahire, S., Sahoo, D., Subramanian, S.: Chameleon devices: investigating more secure and discreet mobile interactions via active camouflaging. In: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (2017)

    Google Scholar 

  103. Rubio-Medrano, C.E., Jogani, S., Leitner, M., Zhao, Z., Ahn, G.-J.: Effectively enforcing authorization constraints for emerging space-sensitive technologies. In: Proceedings of the 24th ACM Symposium on Access Control Models and Technologies (2019)

    Google Scholar 

  104. Xu, Z., Zhu, S.: Semadroid: A privacy-aware sensor management framework for smartphones. In: Proceedings of the 5th ACM Conference on Data and Application Security and Privacy (2015)

    Google Scholar 

  105. Ruth, K., Kohno, T., Roesner, F.: Secure multi-user content sharing for augmented reality applications. In: 28th USENIX Security Symposium (USENIX Security 19) (2019)

    Google Scholar 

  106. Guzman, J.A.d., Seneviratne, A., Thilakarathna, K.: Unravelling spatial privacy risks of mobile mixed reality data. In: Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, vol. 5(1), pp. 1–26 (2021)

    Google Scholar 

  107. Arthur, C.: Google glass security failings may threaten owner’s privacy. In: The Guardian: Dostupnona. https://www.theguardian.com/technology/2013/may/01/google-glass-security-privacyrisk [pristupljeno: 08.08. 2019] (2013)

  108. Denning, T., Dehlawi, Z., Kohno, T.: In situ with bystanders of augmented reality glasses: Perspectives on recording and privacy-mediating technologies. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (2014)

    Google Scholar 

  109. Siriwardhana, Y., Porambage, P., Liyanage, M., Ylinattila, M.: A survey on mobile augmented reality with 5g mobile edge computing: Architectures, applications and technical aspects. IEEE Commun. Surv. Tutorials 23(2), 1160–1192 (2021)

    Article  Google Scholar 

  110. Roman, R., Lopez, J., Mambo, M.: Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges. Future Gener. Comput. Syst. 78, 680–698 (2018)

    Google Scholar 

  111. Szczuko, P.: Augmented reality for privacy-sensitive visual monitoring. In: International Conference on Multimedia Communications, Services and Security. Springer, Cham (2014)

    Google Scholar 

  112. Wang, J., Amos, B., Das, A., Pillai, P., Sadeh, N., Satyanarayanan, M.: A scalable and privacy-aware iot service for live video analytics. In: Proceedings of the 8th ACM on Multimedia Systems Conference (2017)

    Google Scholar 

  113. Hayashi, M., Yoshida, R., Kitahara, I., Kameda, Y., Ohta, Y.: An installation of privacy-safe see-through vision. Procedia-Social Behav. Sci. 2(1), 125–128 (2010)

    Article  Google Scholar 

  114. Qin, Z., Yan, J., Ren, K., Chen, C.W., Wang, C., Fu, X.: Privacy-preserving outsourcing of image global feature detection. In: 2014 IEEE global communications conference. IEEE, New York (2014b)

    Google Scholar 

  115. Fang, C., Chang, E.-C.: Securing interactive sessions using mobile device through visual channel and visual inspection. In: Proceedings of the 26th Annual Computer Security Applications Conference (2010)

    Google Scholar 

  116. Szalavári, Z., Gervautz, M.: The personal interaction panel-a two-handed interface for augmented reality. In: Computer graphics forum, vol. 16(3), pp. C335–C346. Blackwell Publishers Ltd., Oxford (1997)

    Google Scholar 

  117. George, C., Khamis, M., von Zezschwitz, E., Burger, M., Schmidt, H., Alt, F., Hussmann, H.: Seamless and secure vr: Adapting and evaluating established authentication systems for virtual reality. In: NDSS (2017)

    Google Scholar 

  118. Mulloni, A., Wagner, D., Schmalstieg, D.: Mobility and social interaction as core gameplay elements in multi-player augmented reality. In: Proceedings of the 3rd international conference on Digital Interactive Media in Entertainment and Arts, pp. 472–478. ACM (2008)

    Google Scholar 

Download references

Acknowledgements

We would like to thank Kwon Nung Choi for working on the packet analysis shown in Fig. 7.4. We also would like to thank Facebook Reality Labs for partially funding this work through Facebook Research Awards 2020.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jaybie A. De Guzman .

Editor information

Editors and Affiliations

Section Editor information

Rights and permissions

Reprints and permissions

Copyright information

© 2023 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Guzman, J.A.D., Thilakarathna, K., Seneviratne, A. (2023). Privacy and Security Issues and Solutions for Mixed Reality Applications. In: Nee, A.Y.C., Ong, S.K. (eds) Springer Handbook of Augmented Reality. Springer Handbooks. Springer, Cham. https://doi.org/10.1007/978-3-030-67822-7_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-67822-7_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-67821-0

  • Online ISBN: 978-3-030-67822-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics