{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,19]],"date-time":"2025-11-19T06:54:55Z","timestamp":1763535295789},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319108780"},{"type":"electronic","value":"9783319108797"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-10879-7_15","type":"book-chapter","created":{"date-parts":[[2014,8,21]],"date-time":"2014-08-21T01:19:04Z","timestamp":1408583944000},"page":"255-276","source":"Crossref","is-referenced-by-count":14,"title":["EyeDecrypt \u2014 Private Interactions in Plain Sight"],"prefix":"10.1007","author":[{"given":"Andrea G.","family":"Forte","sequence":"first","affiliation":[]},{"given":"Juan A.","family":"Garay","sequence":"additional","affiliation":[]},{"given":"Trevor","family":"Jim","sequence":"additional","affiliation":[]},{"given":"Yevgeniy","family":"Vahlis","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","doi-asserted-by":"crossref","unstructured":"Backes, M., Chen, T., Drmuth, M., Lensch, H.P.A., Welk, M.: Tempest in a teapot: Compromising reflections revisited. In: IEEE Symposium on Security and Privacy, pp. 315\u2013327 (2009)","DOI":"10.1109\/SP.2009.20"},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"Backes, M., Drmuth, M., Unruh, D.: Compromising reflections-or-how to read LCD monitors around the corner. In: IEEE Symposium on Security and Privacy, pp. 158\u2013169 (2008)","DOI":"10.1109\/SP.2008.25"},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"Conde-Lagoa, D., Costa-Montenegro, E., Gonzalez-Castao, F., Gil-Castieira, F.: Secure eTickets based on QR-Codes with user-encrypted content. In: 2010 Digest of Technical Papers International Conference on Consumer Electronics (ICCE), pp. 257\u2013258 (2010)","DOI":"10.1109\/ICCE.2010.5418880"},{"key":"15_CR4","first-page":"401","volume-title":"Proceedings of the 21st Annual Conference of the Australian Computer-Human Interaction Special Interest Group","author":"A. Luca De","year":"2009","unstructured":"De Luca, A., Frauendienst, B., Boring, S., Hussmann, H.: My phone is my keypad: Privacy-enhanced PIN-entry on public terminals. In: Proceedings of the 21st Annual Conference of the Australian Computer-Human Interaction Special Interest Group, pp. 401\u2013404. ACM, New York (2009), http:\/\/doi.acm.org\/10.1145\/1738826.1738909"},{"key":"15_CR5","doi-asserted-by":"crossref","first-page":"1103","DOI":"10.1145\/1753326.1753490","volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems","author":"A. Luca De","year":"2010","unstructured":"De Luca, A., Hertzschuch, K., Hussmann, H.: ColorPIN: Securing PIN entry through indirect input. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 1103\u20131106. ACM, New York (2010), http:\/\/doi.acm.org\/10.1145\/1753326.1753490"},{"key":"15_CR6","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1145\/1920261.1920272","volume-title":"Proceedings of the 26th Annual Computer Security Applications Conference, ACSAC 2010","author":"C. Fang","year":"2010","unstructured":"Fang, C., Chang, E.C.: Securing interactive sessions using mobile device through visual channel and visual inspection. In: Proceedings of the 26th Annual Computer Security Applications Conference, ACSAC 2010, pp. 69\u201378. ACM, New York (2010), http:\/\/doi.acm.org\/10.1145\/1920261.1920272"},{"key":"15_CR7","unstructured":"Fiat, A., Naor, M.: Broadcast encryption. In: Stinson, D.R. (ed.) Advances in Cryptology - CRYPT0 1993. LNCS, vol.\u00a0773, pp. 480\u2013491. Springer, Heidelberg (1994), http:\/\/dl.acm.org\/citation.cfm?id=646758.705697"},{"key":"15_CR8","doi-asserted-by":"crossref","first-page":"1107","DOI":"10.1145\/1753326.1753491","volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems","author":"A. Forget","year":"2010","unstructured":"Forget, A., Chiasson, S., Biddle, R.: Shoulder-surfing resistance with eye-gaze entry in cued-recall graphical passwords. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 1107\u20131110. ACM, New York (2010), http:\/\/doi.acm.org\/10.1145\/1753326.1753491"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Forte, A., Garay, J., Jim, T., Vahlis, Y.: Eyedecrypt \u2013 private interactions in plain sight. Cryptology ePrint Archive, Report 2013\/590 (2013), http:\/\/eprint.iacr.org\/","DOI":"10.1007\/978-3-319-10879-7_15"},{"issue":"2","key":"15_CR10","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1016\/0022-0000(84)90070-9","volume":"28","author":"S. Goldwasser","year":"1984","unstructured":"Goldwasser, S., Micali, S.: Probabilistic encryption. Journal of Computer and System Sciences\u00a028(2), 270\u2013299 (1984), http:\/\/www.sciencedirect.com\/science\/article\/pii\/0022000084900709","journal-title":"Journal of Computer and System Sciences"},{"key":"15_CR11","unstructured":"Google: Google Glass, http:\/\/www.google.com\/glass"},{"key":"15_CR12","unstructured":"ISO: Information technology \u2013 Automatic identification and data capture techniques \u2013 Data Matrix bar code symbology specification. ISO 16022:2006. International Organization for Standardization, Geneva, Switzerland (2006)"},{"key":"15_CR13","unstructured":"ISO: Information technology \u2013 Automatic identification and data capture techniques \u2013 QR Code 2005 bar code symbology specification. ISO 18004:2006. International Organization for Standardization, Geneva, Switzerland (2006)"},{"key":"15_CR14","unstructured":"Itseez: Open Source Computer Vision (OpenCV) Library, http:\/\/opencv.org"},{"key":"15_CR15","first-page":"13","volume-title":"Proceedings of the 3rd Symposium on Usable Privacy and Security, SOUPS 2007","author":"M. Kumar","year":"2007","unstructured":"Kumar, M., Garfinkel, T., Boneh, D., Winograd, T.: Reducing shoulder-surfing by using gaze-based password entry. In: Proceedings of the 3rd Symposium on Usable Privacy and Security, SOUPS 2007, pp. 13\u201319. ACM, New York (2007), http:\/\/doi.acm.org\/10.1145\/1280680.1280683"},{"issue":"2-3","key":"15_CR16","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1007\/s10032-004-0138-z","volume":"7","author":"J. Liang","year":"2005","unstructured":"Liang, J., Doermann, D., Li, H.: Camera-based analysis of text and documents: A survey. International Journal of Document Analysis and Recognition (IJDAR)\u00a07(2-3), 84\u2013104 (2005), http:\/\/link.springer.com\/article\/10.1007\/s10032-004-0138-z","journal-title":"International Journal of Document Analysis and Recognition (IJDAR)"},{"key":"15_CR17","first-page":"110","volume-title":"IEEE Symposium on Security and Privacy","author":"J.M. McCune","year":"2005","unstructured":"McCune, J.M., Perrig, A., Reiter, M.K.: Seeing-is-believing: Using camera phones for human-verifiable authentication. In: IEEE Symposium on Security and Privacy, pp. 110\u2013124. IEEE Computer Society, Los Alamitos (2005)"},{"key":"15_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BFb0053419","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"M. Naor","year":"1995","unstructured":"Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 1\u201312. Springer, Heidelberg (1995)"},{"issue":"1","key":"15_CR19","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1007\/s11263-006-6274-9","volume":"70","author":"K. Nishino","year":"2006","unstructured":"Nishino, K., Nayar, S.K.: Corneal imaging system: Environment from eyes. International Journal of Computer Vision\u00a070(1), 23\u201340 (2006)","journal-title":"International Journal of Computer Vision"},{"key":"15_CR20","doi-asserted-by":"crossref","unstructured":"Parikh, D., Jancke, G.: Localization and segmentation of a 2D high capacity color barcode. In: IEEE Workshop on Applications of Computer Vision, pp. 1\u20136. IEEE (2008)","DOI":"10.1109\/WACV.2008.4544033"},{"key":"15_CR21","first-page":"137","volume-title":"Proceedings of the Sixteenth Annual International Conference on Mobile Computing and Networking, MobiCom 2010","author":"S.D. Perli","year":"2010","unstructured":"Perli, S.D., Ahmed, N., Katabi, D.: PixNet: Interference-free wireless links using LCD-camera pairs. In: Proceedings of the Sixteenth Annual International Conference on Mobile Computing and Networking, MobiCom 2010, pp. 137\u2013148. ACM, New York (2010), http:\/\/doi.acm.org\/10.1145\/1859995.1860012"},{"key":"15_CR22","unstructured":"Reilly, D., Chen, H., Smolyn, G.: Toward fluid, mobile and ubiquitous interaction with paper using recursive 2D barcodes. In: 3rd International Workshop on Pervasive Mobile Interaction Devices, PERMID 2007 (May 2007)"},{"key":"15_CR23","doi-asserted-by":"crossref","first-page":"236","DOI":"10.1145\/1030083.1030116","volume-title":"Proceedings of the 11th ACM Conference on Computer and Communications Security","author":"V. Roth","year":"2004","unstructured":"Roth, V., Richter, K., Freidinger, R.: A PIN-entry method resilient against shoulder surfing. In: Proceedings of the 11th ACM Conference on Computer and Communications Security, pp. 236\u2013245. ACM, New York (2004), http:\/\/doi.acm.org\/10.1145\/1030083.1030116"},{"key":"15_CR24","doi-asserted-by":"crossref","unstructured":"Sattar, J., Bourque, E., Giguere, P., Dudek, G.: Fourier tags: Smoothly degradable fiducial markers for use in human-robot interaction. In: Fourth Canadian Conference on Computer and Robot Vision, CRV 2007, pp. 165\u2013174 (2007)","DOI":"10.1109\/CRV.2007.34"},{"key":"15_CR25","doi-asserted-by":"crossref","unstructured":"Saxena, N., Ekberg, J.E., Kostiainen, K., Asokan, N.: Secure device pairing based on a visual channel. In: IEEE Symposium on Security and Privacy, pp. 306\u2013313. IEEE Computer Society (2006)","DOI":"10.1109\/SP.2006.35"},{"key":"15_CR26","doi-asserted-by":"crossref","unstructured":"Starnberger, G., Froihofer, L., Goeschka, K.: QR-TAN: Secure mobile transaction authentication. In: International Conference on Availability, Reliability and Security, ARES 2009, pp. 578\u2013583 (2009)","DOI":"10.1109\/ARES.2009.96"},{"key":"15_CR27","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1016\/0734-189X(85)90016-7","volume":"30","author":"S. Suzuki","year":"1985","unstructured":"Suzuki, S., Abe, K.: Topological structural analysis of digitized binary images by border following. Computer Vision, Graphics, and Image Processing\u00a030, 32\u201346 (1985)","journal-title":"Computer Vision, Graphics, and Image Processing"},{"key":"15_CR28","doi-asserted-by":"crossref","unstructured":"Tateno, K., Kitahara, I., Ohta, Y.: A nested marker for augmented reality. In: IEEE Virtual Reality Conference, VR 2007, pp. 259\u2013262 (2007)","DOI":"10.1109\/VR.2007.352495"},{"key":"15_CR29","unstructured":"Tow, R.F.: Methods and means for embedding machine readable digital data in halftone images (May 24, 1994), US Patent 5,315,098"},{"issue":"3","key":"15_CR30","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1561\/0600000017","volume":"3","author":"T. Tuytelaars","year":"2007","unstructured":"Tuytelaars, T., Mikolajczyk, K.: Local invariant feature detectors: A survey. Foundations and Trends in Computer Graphics and Vision\u00a03(3), 177\u2013280 (2007)","journal-title":"Foundations and Trends in Computer Graphics and Vision"},{"key":"15_CR31","unstructured":"Wikipedia: Moir\u00e9 pattern (2013), http:\/\/en.wikipedia.org\/wiki\/Moir%C3%A9_pattern"}],"container-title":["Lecture Notes in Computer Science","Security and Cryptography for Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-10879-7_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,15]],"date-time":"2022-04-15T04:32:04Z","timestamp":1649997124000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-10879-7_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319108780","9783319108797"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-10879-7_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}