{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T16:04:40Z","timestamp":1774627480266,"version":"3.50.1"},"reference-count":86,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100008982","name":"National Science Foundation","doi-asserted-by":"publisher","award":["IIS-1566481"],"award-info":[{"award-number":["IIS-1566481"]}],"id":[{"id":"10.13039\/501100008982","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100008982","name":"National Science Foundation","doi-asserted-by":"publisher","award":["IIS-1514154"],"award-info":[{"award-number":["IIS-1514154"]}],"id":[{"id":"10.13039\/501100008982","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100008982","name":"National Science Foundation","doi-asserted-by":"publisher","award":["IIS-1423189"],"award-info":[{"award-number":["IIS-1423189"]}],"id":[{"id":"10.13039\/501100008982","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100008982","name":"National Science Foundation","doi-asserted-by":"publisher","award":["DGE-1315138"],"award-info":[{"award-number":["DGE-1315138"]}],"id":[{"id":"10.13039\/501100008982","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100008982","name":"National Science Foundation","doi-asserted-by":"publisher","award":["DGE-1842473"],"award-info":[{"award-number":["DGE-1842473"]}],"id":[{"id":"10.13039\/501100008982","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Visual. Comput. Graphics"],"published-print":{"date-parts":[[2020,5]]},"DOI":"10.1109\/tvcg.2020.2973052","type":"journal-article","created":{"date-parts":[[2020,2,13]],"date-time":"2020-02-13T22:54:28Z","timestamp":1581634468000},"page":"1880-1890","source":"Crossref","is-referenced-by-count":37,"title":["The Security-Utility Trade-off for Iris Authentication and Eye Animation for Social Virtual Avatars"],"prefix":"10.1109","volume":"26","author":[{"given":"Brendan","family":"John","sequence":"first","affiliation":[]},{"given":"Sophie","family":"Jorg","sequence":"additional","affiliation":[]},{"given":"Sanjeev","family":"Koppal","sequence":"additional","affiliation":[]},{"given":"Eakta","family":"Jain","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2018.2793599"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1111\/cgf.12603"},{"key":"ref71","first-page":"69","article-title":"Look me in the eyes: A survey of eye and gaze animation for virtual agents and artificial systems","author":"ruhland","year":"2014","journal-title":"Eurographics State-of-the-Art Report"},{"key":"ref70","first-page":"143","article-title":"You don't want to be the next meme&#x201D;: College students' workarounds to manage privacy in the era of pervasive photography","author":"rashidi","year":"0","journal-title":"Fourteenth Symposium on Usable Privacy and Security ( SOUPS 2018)"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2009.62"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753481"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1145\/3314111.3319915"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.818349"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1145\/3314111.3319913"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2019.2899187"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1145\/3130800.3130807"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1145\/3197517.3201294"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2009.30"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2011.07.017"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/VR.2018.8446215"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/365024.365121"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2632048.2632079"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.3389\/fnhum.2018.00105"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2168556.2168563"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173621"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/1143518.1143519"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2017.2657018"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-006-6274-9"},{"key":"ref63","first-page":"23","article-title":"Gaze-sphere: Navigating 360-degree-video environments in VR using head rotation and eye gaze","author":"pai","year":"0","journal-title":"ACM SIGGRAPH 2017 Posters"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1037\/0096-1523.33.3.705"},{"key":"ref64","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1145\/2980179.2980246","article-title":"Towards foveated rendering for gaze-tracked virtual reality","volume":"35","author":"patney","year":"2016","journal-title":"ACM Transactions on Graphics (TOG)"},{"key":"ref27","first-page":"2278","article-title":"A review on advance methods of feature extraction in iris recognition system","author":"gale","year":"2014","journal-title":"IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE) e-ISSN"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298628"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2009.66"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2016.7550096"},{"key":"ref67","first-page":"0","article-title":"Segmentation-less and non-holistic deep-learning frameworks for iris recognition","author":"proenca","year":"0","journal-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/3204493.3204541"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15561-1_3"},{"key":"ref2","year":"0","journal-title":"Keeping an eye on security"},{"key":"ref1","year":"0","journal-title":"Biometrics for education"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557352"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3304109.3325818"},{"key":"ref21","first-page":"1","article-title":"Eyebrow shape-based features for biometric recognition and gender classification: A feasibility study","author":"dong","year":"0","journal-title":"2011 International Joint Conference on Biometrics (IJCB)"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3328914"},{"key":"ref23","first-page":"47","article-title":"Eye movement synthesis with l\/f pink noise","author":"duchowski","year":"0","journal-title":"Proc 8th ACM SIGGRAPH Conf Motion Games"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2009.24"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3129561"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/3314111.3319823"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/3197517.3201401"},{"key":"ref59","first-page":"399","article-title":"Privacy expectations and preferences in an IoT world","author":"naeini","year":"0","journal-title":"Thirteenth Symposium on Usable Privacy and Security SOUPS"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/1514095.1514109"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/3272127.3275087"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.1002"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/VR.2018.8446242"},{"key":"ref54","author":"masek","year":"2003","journal-title":"MATLAB Source Code for a Biometric Identification System Based on Iris Patterns"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/VR.2019.8797852"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2018.2794119"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2168556.2168569"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2931002.2931005"},{"key":"ref40","first-page":"415","article-title":"Enabling fine-grained permissions for augmented reality applications with recognizers","author":"jana","year":"2013","journal-title":"Presented as part of the 22nd USENIX Security Symposium (USENIX Security 13) USENIX"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2019.2899228"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2015.2391851"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.16910\/jemr.12.6.4"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3389\/fnhum.2011.00126"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/VR.2018.8446364"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2007.903540"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1145\/3314111.3319843"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-374457-9.00025-1"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1145\/3204493.3208341"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/34.244676"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1145\/2971763.2971771"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3204949.3208139"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2013.6712694"},{"key":"ref4","year":"0","journal-title":"Microsoft unveils hololens 2 Twice the field of view eye tracking"},{"key":"ref3","year":"0","journal-title":"Louisiana hospital adopts iris-based patient id system"},{"key":"ref6","year":"0","journal-title":"Tobii privacy policy"},{"key":"ref5","year":"0","journal-title":"Somaliland election saw iris id technology deployed"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/VR.2019.8798143"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1117\/12.2513881"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1145\/3314111.3322869"},{"key":"ref7","first-page":"341","article-title":"Addressing physical safety, security, and privacy for people with visual impairments","author":"ahmed","year":"0","journal-title":"SOUPS 2016 Twelfth Symposium on Usable Privacy and Security"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/2638728.2641688"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1002\/j.2637-496X.2017.tb01040.x"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3197517.3201335"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/2638728.2641695"},{"key":"ref48","first-page":"25","article-title":"Ultra-low power gaze tracking for virtual reality","author":"li","year":"0","journal-title":"Proceedings of the ACM Conference on Embedded Networked Sensor Systems"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1093\/med\/9780199969289.001.0001"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3314111.3319816"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.31"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ICCES.2010.5674879"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3238302"}],"container-title":["IEEE Transactions on Visualization and Computer Graphics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/2945\/9052073\/08998133.pdf?arnumber=8998133","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T15:36:45Z","timestamp":1651073805000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8998133\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5]]},"references-count":86,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tvcg.2020.2973052","relation":{},"ISSN":["1077-2626","1941-0506","2160-9306"],"issn-type":[{"value":"1077-2626","type":"print"},{"value":"1941-0506","type":"electronic"},{"value":"2160-9306","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,5]]}}}