{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,5]],"date-time":"2025-04-05T10:44:57Z","timestamp":1743849897650},"reference-count":55,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2018,1,8]],"date-time":"2018-01-08T00:00:00Z","timestamp":1515369600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Interact. Mob. Wearable Ubiquitous Technol."],"published-print":{"date-parts":[[2018,1,8]]},"abstract":"Smart head-worn or head-mounted devices, including smart glasses and Virtual Reality (VR) headsets, are gaining popularity. Online shopping and in-app purchase from such headsets are presenting new e-commerce opportunities to the app developers. For convenience, users of these headsets may store account login, bank account and credit card details in order to perform quick in-app purchases. If the device is unattended, then an attacker, which can include insiders, can make use of the stored account and banking details to perform their own in-app purchases at the expense of the legitimate owner. To better protect the legitimate users of VR headsets (or head mounted displays in general) from such threats, in this paper, we propose to use eye movement to continuously authenticate the current wearer of the VR headset. We built a prototype device which allows us to apply visual stimuli to the wearer and to video the eye movements of the wearer at the same time. We use implicit visual stimuli (the contents of existing apps) which evoke eye movements from the headset wearer but without distracting them from their normal activities. This is so that we can continuously authenticate the wearer without them being aware of the authentication running in the background. We evaluated our proposed system experimentally with 30 subjects. Our results showed that the achievable authentication accuracy for implicit visual stimuli is comparable to that of using explicit visual stimuli. We also tested the time stability of our proposed method by collecting eye movement data on two different days that are two weeks apart. Our authentication method achieved an Equal Error Rate of 6.9% (resp. 9.7%) if data collected from the same day (resp. two weeks apart) were used for testing. In addition, we considered active impersonation attacks where attackers trying to imitate legitimate users' eye movements. We found that for a simple (resp. complex) eye tracking scene, a successful attack could be realised after on average 5.67 (13.50) attempts and our proposed authentication algorithm gave a false acceptance rate of 14.17% (3.61%). These results show that active impersonating attacks can be prevented using complex scenes and an appropriate limit on the number of authentication attempts. Lastly, we carried out a survey to study the user acceptability to our proposed implicit stimuli. We found that on a 5-point Likert scale, at least 60% of the respondents either agreed or strongly agreed that our proposed implicit stimuli were non-intrusive.<\/jats:p>","DOI":"10.1145\/3161410","type":"journal-article","created":{"date-parts":[[2018,1,9]],"date-time":"2018-01-09T13:26:11Z","timestamp":1515504371000},"page":"1-22","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":56,"title":["Continuous Authentication Using Eye Movement Response of Implicit Visual Stimuli"],"prefix":"10.1145","volume":"1","author":[{"given":"Yongtuo","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, The University of New South Wales, Sydney, NSW, Australia"}]},{"given":"Wen","family":"Hu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, The University of New South Wales, Sydney, NSW, Australia"}]},{"given":"Weitao","family":"Xu","sequence":"additional","affiliation":[{"name":"School of Information Technology and Electrical Engineering, The University of Queensland, Brisbane, QLD, Australia"}]},{"given":"Chun Tung","family":"Chou","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, The University of New South Wales, Sydney, NSW, Australia"}]},{"given":"Jiankun","family":"Hu","sequence":"additional","affiliation":[{"name":"Engineering and Information Technology, UNSW Canberra at the ADFA, Canberra, ACT, Australia"}]}],"member":"320","published-online":{"date-parts":[[2018,1,8]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Applications and Systems (BTAS), 2015 IEEE 7th International Conference on. IEEE, 1--8.","author":"Abdulin Evgeniy R","year":"2015","unstructured":"Evgeniy R Abdulin and Oleg V Komogortsev . 2015 . Person verification via eye movement-driven text reading model. In Biometrics Theory , Applications and Systems (BTAS), 2015 IEEE 7th International Conference on. IEEE, 1--8. Evgeniy R Abdulin and Oleg V Komogortsev. 2015. Person verification via eye movement-driven text reading model. In Biometrics Theory, Applications and Systems (BTAS), 2015 IEEE 7th International Conference on. IEEE, 1--8."},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2014.2374338"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-75773-3_4"},{"key":"e_1_2_1_4_1","volume-title":"Gian Luca Marcialis, and Fabio Roli","author":"Biggio Battista","year":"2012","unstructured":"Battista Biggio , Zahid Akhtar , Giorgio Fumera , Gian Luca Marcialis, and Fabio Roli . 2012 . Security evaluation of biometric authentication systems under real spoofing attacks. IET biometrics 1, 1 (2012), 11--24. Battista Biggio, Zahid Akhtar, Giorgio Fumera, Gian Luca Marcialis, and Fabio Roli. 2012. Security evaluation of biometric authentication systems under real spoofing attacks. IET biometrics 1, 1 (2012), 11--24."},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/PRISMS.2013.6927175"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2371574.2371616"},{"key":"e_1_2_1_7_1","first-page":"532","article-title":"Portable authentication device and method using iris patterns. (March 11 2003)","volume":"6","author":"Cambier James L","year":"2003","unstructured":"James L Cambier and John E Siedlarz . 2003 . Portable authentication device and method using iris patterns. (March 11 2003) . US Patent 6 , 532 ,298. James L Cambier and John E Siedlarz. 2003. Portable authentication device and method using iris patterns. (March 11 2003). US Patent 6,532,298.","journal-title":"US Patent"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1961189.1961199"},{"key":"e_1_2_1_9_1","volume-title":"International Conference on Biometrics. Springer, 382--388","author":"Chong Siew Chin","year":"2006","unstructured":"Siew Chin Chong , Andrew Beng Jin Teoh , and David Chek Ling Ngo . 2006 . Iris authentication using privatized advanced correlation filter . In International Conference on Biometrics. Springer, 382--388 . Siew Chin Chong, Andrew Beng Jin Teoh, and David Chek Ling Ngo. 2006. Iris authentication using privatized advanced correlation filter. In International Conference on Biometrics. Springer, 382--388."},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1038\/eye.2009.275"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.929958"},{"key":"e_1_2_1_12_1","volume-title":"Vincent Lenders, and Ivan Martinovic.","author":"Eberz Simon","year":"2015","unstructured":"Simon Eberz , Kasper Bonne Rasmussen , Vincent Lenders, and Ivan Martinovic. 2015 . Preventing Lunchtime Attacks: Fighting Insider Threats With Eye Movement Biometrics.. In NDSS. Simon Eberz, Kasper Bonne Rasmussen, Vincent Lenders, and Ivan Martinovic. 2015. Preventing Lunchtime Attacks: Fighting Insider Threats With Eye Movement Biometrics.. In NDSS."},{"key":"e_1_2_1_13_1","unstructured":"FOVE. 2017. THE WORLD\u00e2\u0102ŹS FIRSTEYE TRACKING VIRTUAL REALITY HEADSET. (8 April 2017). Retrieved April 9 2017 from http:\/\/www.getfove.com\/ FOVE. 2017. THE WORLD\u00e2\u0102ŹS FIRSTEYE TRACKING VIRTUAL REALITY HEADSET. (8 April 2017). Retrieved April 9 2017 from http:\/\/www.getfove.com\/"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2225048"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2968219.2971384"},{"key":"e_1_2_1_16_1","volume-title":"A score level fusion method for eye movement biometrics. Pattern Recognition Letters","author":"George Anjith","year":"2015","unstructured":"Anjith George and Aurobinda Routray . 2015. A score level fusion method for eye movement biometrics. Pattern Recognition Letters ( 2015 ). Anjith George and Aurobinda Routray. 2015. A score level fusion method for eye movement biometrics. Pattern Recognition Letters (2015)."},{"key":"e_1_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Ceenu George Mohamed Khamis Emanuel von Zezschwitz Marinus Burger Henri Schmidt Florian Alt and Heinrich Hussmann. 2017. Seamless and Secure VR: Adapting and Evaluating Established Authentication Systems for Virtual Reality. (2017). Ceenu George Mohamed Khamis Emanuel von Zezschwitz Marinus Burger Henri Schmidt Florian Alt and Heinrich Hussmann. 2017. Seamless and Secure VR: Adapting and Evaluating Established Authentication Systems for Virtual Reality. (2017).","DOI":"10.14722\/usec.2017.23028"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2014.296"},{"key":"e_1_2_1_19_1","volume-title":"Ant Financial is to launch VR-based payments. (9","author":"Handford Richard","year":"2016","unstructured":"Richard Handford . 2016. Ant Financial is to launch VR-based payments. (9 Aug. 2016 ). Retrieved April 9, 2017 from https:\/\/www.mobileworldlive.com\/money\/news-money\/ant-financial-is-to-launch-vr-based-payments\/ Richard Handford. 2016. Ant Financial is to launch VR-based payments. (9 Aug. 2016). Retrieved April 9, 2017 from https:\/\/www.mobileworldlive.com\/money\/news-money\/ant-financial-is-to-launch-vr-based-payments\/"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858267"},{"key":"e_1_2_1_21_1","volume-title":"Symposium on usable privacy and security (SOUPS). 213--230","author":"Harbach Marian","year":"2014","unstructured":"Marian Harbach , Emanuel Von Zezschwitz , Andreas Fichtner , Alexander De Luca , and Matthew Smith . 2014 . It\u00e2\u0102Źsa hard lock life: A field study of smartphone (un) locking behavior and risk perception . In Symposium on usable privacy and security (SOUPS). 213--230 . Marian Harbach, Emanuel Von Zezschwitz, Andreas Fichtner, Alexander De Luca, and Matthew Smith. 2014. It\u00e2\u0102Źsa hard lock life: A field study of smartphone (un) locking behavior and risk perception. In Symposium on usable privacy and security (SOUPS). 213--230."},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2168556.2168563"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.3390\/s16040530"},{"key":"e_1_2_1_24_1","unstructured":"Chih-Wei Hsu Chih-Chung Chang Chih-Jen Lin etal 2003. A practical guide to support vector classification. (2003). Chih-Wei Hsu Chih-Chung Chang Chih-Jen Lin et al. 2003. A practical guide to support vector classification. (2003)."},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2012.364"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2004.830974"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compbiomed.2012.10.005"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-25976-3_23"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1743666.1743712"},{"key":"e_1_2_1_30_1","volume-title":"International Conference on Biometrics. Springer, 397--403","author":"Lee Eui Chul","year":"2006","unstructured":"Eui Chul Lee , Kang Ryoung Park , and Jaihie Kim . 2006 . Fake iris detection by using purkinje image . In International Conference on Biometrics. Springer, 397--403 . Eui Chul Lee, Kang Ryoung Park, and Jaihie Kim. 2006. Fake iris detection by using purkinje image. In International Conference on Biometrics. Springer, 397--403."},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2016.7456514"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSPCC.2012.6335584"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2005.1415569"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.visres.2016.01.009"},{"key":"e_1_2_1_35_1","unstructured":"Oculus. 2017. Documentation. (8 April 2017). Retrieved April 9 2017 from https:\/\/developer.oculus.com\/documentation\/ Oculus. 2017. Documentation. (8 April 2017). Retrieved April 9 2017 from https:\/\/developer.oculus.com\/documentation\/"},{"key":"e_1_2_1_36_1","volume-title":"Raspberry Pi 3 Model B. (8","author":"Raspberry Pi.","year":"2017","unstructured":"Raspberry Pi. 2017. Raspberry Pi 3 Model B. (8 April 2017 ). Retrieved April 9, 2017 from https:\/\/www.raspberrypi.org\/products\/raspberry-pi-3-model-b\/ Raspberry Pi. 2017. Raspberry Pi 3 Model B. (8 April 2017). Retrieved April 9, 2017 from https:\/\/www.raspberrypi.org\/products\/raspberry-pi-3-model-b\/"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2011.34"},{"key":"e_1_2_1_38_1","volume-title":"Biometric attack vectors and defences. Computers 8 Security 26, 1","author":"Roberts Chris","year":"2007","unstructured":"Chris Roberts . 2007. Biometric attack vectors and defences. Computers 8 Security 26, 1 ( 2007 ), 14--25. Chris Roberts. 2007. Biometric attack vectors and defences. Computers 8 Security 26, 1 (2007), 14--25."},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvlc.2009.01.010"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2013.109"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2014.6846756"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2809695.2817878"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978311"},{"key":"e_1_2_1_44_1","unstructured":"SMI. 2017. AR\/VR eye tracking kits. (8 April 2017). Retrieved April 9 2017 from https:\/\/www.smivision.com\/oem-eye-tracking\/ SMI. 2017. AR\/VR eye tracking kits. (8 April 2017). Retrieved April 9 2017 from https:\/\/www.smivision.com\/oem-eye-tracking\/"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2006.185"},{"volume-title":"M100 Smart Glasses - Enterprise. (8","year":"2017","key":"e_1_2_1_46_1","unstructured":"Vuzix. 2017. M100 Smart Glasses - Enterprise. (8 April 2017 ). Retrieved April 9, 2017 from https:\/\/www.vuzix.com\/consumer\/products_m100\/ Vuzix. 2017. M100 Smart Glasses - Enterprise. (8 April 2017). Retrieved April 9, 2017 from https:\/\/www.vuzix.com\/consumer\/products_m100\/"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1111\/ejn.12883"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517351.2517357"},{"key":"e_1_2_1_49_1","volume-title":"Factors affecting light-adapted pupil size in normal human subjects. Investigative Ophthalmology 8 Visual Science 35, 3","author":"Winn Barry","year":"1994","unstructured":"Barry Winn , David Whitaker , David B Elliott , and Nicholas J Phillips . 1994. Factors affecting light-adapted pupil size in normal human subjects. Investigative Ophthalmology 8 Visual Science 35, 3 ( 1994 ), 1132--1137. Barry Winn, David Whitaker, David B Elliott, and Nicholas J Phillips. 1994. Factors affecting light-adapted pupil size in normal human subjects. Investigative Ophthalmology 8 Visual Science 35, 3 (1994), 1132--1137."},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2008.79"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2016.7460726"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48051-9_21"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2328095"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.5555\/2893711.2893739"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJBM.2012.049736"}],"container-title":["Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3161410","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,31]],"date-time":"2022-12-31T20:04:39Z","timestamp":1672517079000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3161410"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1,8]]},"references-count":55,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2018,1,8]]}},"alternative-id":["10.1145\/3161410"],"URL":"https:\/\/doi.org\/10.1145\/3161410","relation":{},"ISSN":["2474-9567"],"issn-type":[{"type":"electronic","value":"2474-9567"}],"subject":[],"published":{"date-parts":[[2018,1,8]]},"assertion":[{"value":"2017-05-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-10-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-01-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}