{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T09:59:55Z","timestamp":1776074395373,"version":"3.50.1"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"University of Piraeus"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>The rapid growth of extended reality (XR), encompassing technologies such as virtual reality (VR) and augmented reality (AR), introduces unprecedented challenges in safeguarding personal user privacy. This study explores the extent to which XR eye-tracking biometric technologies can compromise user anonymity and reveal private identities. Leveraging the GazeBaseVR dataset (Lohr et al. in Sci Data 10(1): 177, 2023), which comprises extensive gaze data from hundreds of users, we extracted a comprehensive set of gaze features\u2013including fixation, saccade, and Savitzky\u2013Golay\u2013based velocity statistics, along with position- and task-related measures\u2013that capture the distinctive dynamics of individual eye movements. Using these features, we trained a simple Multi-Layer Perceptron (MLP) classifier to identify individuals based on their unique eye movement patterns. Our model achieved a high identification accuracy of 96.61% on identifying users while watching a video in a VR environment, underscoring the severe privacy risks posed by XR technologies in their collection and processing of biometric data. Beyond presenting these findings, this research highlights the broader implications of XR eye-tracking on user privacy and advocates robust solutions to address these concerns. We urge technologists, policymakers, and privacy advocates to collaborate in establishing comprehensive regulations and privacy-preserving mechanisms to mitigate the potential misuse of XR biometric data. This work aims to inspire further interdisciplinary research to ensure that technological innovation does not come at the expense of fundamental privacy rights.<\/jats:p>","DOI":"10.1007\/s10207-026-01231-3","type":"journal-article","created":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T19:32:22Z","timestamp":1775071942000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Through the looking glass: eye tracking biometrics and the loss of anonymity in extended reality"],"prefix":"10.1007","volume":"25","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2284-0935","authenticated-orcid":false,"given":"Antonios","family":"Patergianakis","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3101-5347","authenticated-orcid":false,"given":"Costas","family":"Lambrinoudakis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,4,1]]},"reference":[{"issue":"1","key":"1231_CR1","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1038\/s41597-023-02075-5","volume":"10","author":"D Lohr","year":"2023","unstructured":"Lohr, D., Aziz, S., Friedman, L., Komogortsev, O.V.: GazeBaseVR, a large-scale, longitudinal, binocular eye-tracking dataset collected in virtual reality. Sci. Data 10(1), 177 (2023). https:\/\/doi.org\/10.1038\/s41597-023-02075-5","journal-title":"Sci. Data"},{"key":"1231_CR2","doi-asserted-by":"publisher","unstructured":"David-John, B., Butler, K., Jain, E.: For Your Eyes Only: privacy-preserving eye-tracking datasets, in 2022 Symposium on Eye Tracking Research and Applications (ETRA \u201922) (2022). https:\/\/doi.org\/10.1145\/3517031.3529618","DOI":"10.1145\/3517031.3529618"},{"issue":"1","key":"1231_CR3","first-page":"109","volume":"21","author":"R Koch","year":"2023","unstructured":"Koch, R.: What are you looking at? emerging privacy concerns with eye tracking in virtual reality. Colo. Tech. L.J. 21(1), 109 (2023)","journal-title":"Colo. Tech. L.J."},{"issue":"5","key":"1231_CR4","doi-asserted-by":"publisher","first-page":"2555","DOI":"10.1109\/tvcg.2021.3067787","volume":"27","author":"B David-John","year":"2021","unstructured":"David-John, B., Hosfelt, D., Butler, K., Jain, E.: A privacy-preserving approach to streaming eye-tracking data. IEEE Trans. Visual Comput. Graphics 27(5), 2555\u20132565 (2021). https:\/\/doi.org\/10.1109\/tvcg.2021.3067787","journal-title":"IEEE Trans. Visual Comput. Graphics"},{"key":"1231_CR5","unstructured":"Bozkir, E., \u00d6zdel, S., Wang, M., David-John, B., Gao, H., Butler, K., Jain, E., Kasneci, E.: Eye-tracked virtual reality: a comprehensive survey on methods and privacy challenges (2023). arXiv:2305.14080"},{"issue":"4","key":"1231_CR6","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1109\/MSP.2011.941097","volume":"28","author":"RW Schafer","year":"2011","unstructured":"Schafer, R.W.: What is a savitzky-golay filter? IEEE Signal Process. Mag. 28(4), 111 (2011). https:\/\/doi.org\/10.1109\/MSP.2011.941097","journal-title":"IEEE Signal Process. Mag."},{"key":"1231_CR7","unstructured":"Haria, V., El Abed,A., Maneth, S.: User Identification via Free Roaming Eye Tracking Data (2024). arXiv:2403.09415"},{"key":"1231_CR8","doi-asserted-by":"publisher","first-page":"42","DOI":"10.3390\/virtualworlds1010004","volume":"10","author":"SM Asish","year":"2022","unstructured":"Asish, S.M., Kulshreshth, A.K., Borst, C.W.: User identification utilizing minimal eye-gaze features in virtual reality applications. Virtual Worlds 10, 42 (2022). https:\/\/doi.org\/10.3390\/virtualworlds1010004","journal-title":"Virtual Worlds"},{"key":"1231_CR9","doi-asserted-by":"crossref","unstructured":"Schr\u00f6der, C., Al Zaidawi, S.M.K., Prinzler, M.H., Maneth, S., Zachmann, G.: Robustness of eye movement biometrics against varying stimuli and varying trajectory length, in Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems (2020), pp. 1\u20137","DOI":"10.1145\/3313831.3376534"},{"key":"1231_CR10","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1016\/j.patrec.2015.11.020","volume":"82","author":"A George","year":"2016","unstructured":"George, A., Routray, A.: A score level fusion method for eye movement biometrics. Pattern Recogn. Lett. 82, 207 (2016)","journal-title":"Pattern Recogn. Lett."},{"key":"1231_CR11","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/j.inffus.2015.08.003","volume":"32","author":"I Rigas","year":"2016","unstructured":"Rigas, I., Abdulin, E., Komogortsev, O.: Towards a multi-source fusion approach for eye movement-driven recognition. Inf. Fusion 32, 13 (2016)","journal-title":"Inf. Fusion"},{"key":"1231_CR12","doi-asserted-by":"crossref","unstructured":"Monaco, J.V.: Classification and authentication of one-dimensional behavioral biometrics, in IEEE International Joint Conference on Biometrics, pp. 1\u20138 (2014)","DOI":"10.1109\/BTAS.2014.6996253"},{"key":"1231_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.7146\/psj.v2i.134656","volume":"2","author":"E Selinger","year":"2023","unstructured":"Selinger, E., Altman, E., Foster, S.: Eye-tracking in virtual reality: a visceral notice approach for protecting privacy. Privacy Studies Journal 2, 1 (2023)","journal-title":"Privacy Studies Journal"},{"key":"1231_CR14","doi-asserted-by":"publisher","first-page":"114037","DOI":"10.1016\/j.eswa.2020.114037","volume":"166","author":"AF Klaib","year":"2021","unstructured":"Klaib, A.F., Alsrehin, N.O., Melhem, W.Y., Bashtawi, H.O., Magableh, A.A.: Eye tracking algorithms, techniques, tools, and applications with an emphasis on machine learning and Internet of Things technologies. Expert Syst. Appl. 166, 114037 (2021). https:\/\/doi.org\/10.1016\/j.eswa.2020.114037","journal-title":"Expert Syst. Appl."},{"key":"1231_CR15","doi-asserted-by":"publisher","unstructured":"Latif, N., Arshad, M.S., Javed, S.: A comparative study between regression algorithms to visualize and analyze the scalability of large-scale graphs in big data, in 2021 International Conference on Emerging Technologies (ICET), pp. 1\u20136 (2021) https:\/\/doi.org\/10.1109\/ICET54505.2021.9689863","DOI":"10.1109\/ICET54505.2021.9689863"},{"issue":"18","key":"1231_CR16","doi-asserted-by":"publisher","first-page":"6020","DOI":"10.3390\/s21186020","volume":"21","author":"K Harezlak","year":"2021","unstructured":"Harezlak, K., Blasiak, M., Kasprowski, P.: Biometric identification based on eye movement dynamic features. Sensors 21(18), 6020 (2021). https:\/\/doi.org\/10.3390\/s21186020","journal-title":"Sensors"},{"key":"1231_CR17","unstructured":"Li, J., Chowdhury, A.R., Fawaz, K., Kim, Y.: Kaleido: real-time privacy control for eye-tracking systems, in Proceedings of the 30th USENIX Security Symposium, pp. 1793\u20131810 (2021). https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/li-jingjie"},{"key":"1231_CR18","doi-asserted-by":"publisher","first-page":"120720","DOI":"10.1016\/j.ins.2024.120720","volume":"675","author":"X Ren","year":"2024","unstructured":"Ren, X., Fan, J., Xu, N., Wang, S., Dong, C., Wen, Z.: DPGazeSynth: enhancing eye-tracking virtual reality privacy with differentially private data synthesis. Inf. Sci. 675, 120720 (2024). https:\/\/doi.org\/10.1016\/j.ins.2024.120720","journal-title":"Inf. Sci."},{"key":"1231_CR19","unstructured":"Raju, M.H., Komogortsev, O.V.: Real-time lightweight gaze privacy-preservation techniques validated via offline gaze-based interaction simulation (2025). arXiv:2511.09846"},{"issue":"11","key":"1231_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1371\/journal.pone.0334605","volume":"20","author":"H Griffith","year":"2025","unstructured":"Griffith, H., Katrychuk, D., Raju, M.H., Aziz, S., Lohr, D.J., Komogortsev, O.V.: The percentile-matching technique for synthetic eye tracking signal degradation: a biometric case study. PLoS ONE 20(11), 1 (2025). https:\/\/doi.org\/10.1371\/journal.pone.0334605","journal-title":"PLoS ONE"},{"issue":"4","key":"1231_CR21","doi-asserted-by":"publisher","first-page":"2267","DOI":"10.3934\/era.2024103","volume":"32","author":"MANU Ghani","year":"2024","unstructured":"Ghani, M.A.N.U., She, K., Saeed, M.U., Latif, N.: Enhancing facial recognition accuracy through multi-scale feature fusion and spatial attention mechanisms. Electron. Res. Arch. 32(4), 2267 (2024). https:\/\/doi.org\/10.3934\/era.2024103","journal-title":"Electron. Res. Arch."},{"key":"1231_CR22","doi-asserted-by":"publisher","unstructured":"Steil, J., Hagestedt, I., Huang, M.X., Bulling, A.: Privacy-aware eye tracking using differential privacy, in Proceedings of the 2019 Symposium on Eye Tracking Research and Applications (ETRA \u201919), pp. 1\u20139 (2019). https:\/\/doi.org\/10.1145\/3314111.3319915","DOI":"10.1145\/3314111.3319915"},{"issue":"4","key":"1231_CR23","doi-asserted-by":"publisher","first-page":"102036","DOI":"10.1016\/j.jksuci.2024.102036","volume":"36","author":"MANU Ghani","year":"2024","unstructured":"Ghani, M.A.N.U., She, K., Rauf, M.A., Alajmi, M., Ghadi, Y.Y., Algarni, A.: Securing synthetic faces: a GAN-blockchain approach to privacy-enhanced facial recognition. . King Saud Univ. Comput. Inf. Sci. 36(4), 102036 (2024). https:\/\/doi.org\/10.1016\/j.jksuci.2024.102036","journal-title":". King Saud Univ. Comput. Inf. Sci."},{"issue":"4","key":"1231_CR24","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1145\/3432217","volume":"4","author":"H Zhu","year":"2020","unstructured":"Zhu, H., Jin, W., Xiao, M., Murali, S., Li, M.: BlinKey: a two-factor user authentication method for virtual reality devices. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 4(4), 164 (2020)","journal-title":"Proc. ACM Interact. Mob. Wearable Ubiquitous Technol."},{"issue":"3","key":"1231_CR25","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/s10462-024-11082-w","volume":"58","author":"N Latif","year":"2025","unstructured":"Latif, N., Ma, W., Ahmad, H.B.: Advancements in securing federated learning with IDS: a comprehensive review of neural networks and feature engineering techniques for malicious client detection. Artif. Intell. Rev. 58(3), 91 (2025). https:\/\/doi.org\/10.1007\/s10462-024-11082-w","journal-title":"Artif. Intell. Rev."}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-026-01231-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-026-01231-3","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-026-01231-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T09:19:33Z","timestamp":1776071973000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-026-01231-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,4,1]]},"references-count":25,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2026,4]]}},"alternative-id":["1231"],"URL":"https:\/\/doi.org\/10.1007\/s10207-026-01231-3","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-7664593\/v1","asserted-by":"object"}]},"ISSN":["1615-5270"],"issn-type":[{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,4,1]]},"assertion":[{"value":"20 September 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 February 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 April 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no relevant financial or non-financial interests to disclose.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}}],"article-number":"76"}}