{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,15]],"date-time":"2025-08-15T02:19:39Z","timestamp":1755224379901,"version":"3.43.0"},"reference-count":56,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2018,7,5]],"date-time":"2018-07-05T00:00:00Z","timestamp":1530748800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Interact. Mob. Wearable Ubiquitous Technol."],"published-print":{"date-parts":[[2018,7,5]]},"abstract":"<jats:p>Current in-situ privacy solution approaches are inadequate in protecting sensitive information. They either require extra configuration effort or lack the ability to configure user desired privacy settings. Based on in-depth discussions during a design workshop, we propose PrivacyShield, a mobile system for providing subtle just-in-time privacy provisioning. PrivacyShield leverages the screen I\/O device (screen digitizer) of smartphones to recognize gesture commands, even when the phone's screen is turned off. Based on gesture command inputs, various privacy-protection policies can be configured on-the-fly. We develop a novel stroke-based approach to address the challenges in segmenting and recognizing gesture command inputs, which helps the system in achieving good usability and performance. PrivacyShield also provides developers with APIs to enable just-in-time privacy provisioning in their applications. We have implemented an energy efficient PrivacyShield prototype on the Android platform, including smartphones with and without a low-power co-processor. Evaluation results show that our gesture segmentation algorithm is fast enough for real-time performance (introducing less than 200ms processing latency) and accurate (achieving an accuracy of 95% for single-character gestures and 89% for even three-character gestures). We also build a non-touch-screen-based just-in-time privacy provisioning prototype called the wrist gesture method. We compare the performance of the two prototypes by doing a 6-week field study with 12 participants and show why a simplistic solution falls short in providing privacy configurations. We also report the participants' perceptions and reactions after the field study.<\/jats:p>","DOI":"10.1145\/3214279","type":"journal-article","created":{"date-parts":[[2018,7,5]],"date-time":"2018-07-05T15:19:10Z","timestamp":1530803950000},"page":"1-38","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["PrivacyShield"],"prefix":"10.1145","volume":"2","author":[{"given":"Saumay","family":"Pushp","sequence":"first","affiliation":[{"name":"School of Computing, KAIST, Yuseong-gu, Daejeon, South Korea"}]},{"given":"Yunxin","family":"Liu","sequence":"additional","affiliation":[{"name":"Microsoft Research, Beijing, China"}]},{"given":"Mengwei","family":"Xu","sequence":"additional","affiliation":[{"name":"School of Electronics Engineering and Computer Science, Peking University, Beijing, China"}]},{"given":"Changyoung","family":"Koh","sequence":"additional","affiliation":[{"name":"School of Computing, KAIST, Yuseong-gu, Daejeon, South Korea"}]},{"given":"Junehwa","family":"Song","sequence":"additional","affiliation":[{"name":"School of Computing, KAIST, Yuseong-gu, Daejeon, South Korea"}]}],"member":"320","published-online":{"date-parts":[[2018,7,5]]},"reference":[{"key":"e_1_2_2_1_1","unstructured":"1999. IRONOFF DATABASE UMR CNRS 6597. http:\/\/www.irccyn.ec-nantes.fr\/~viardgau\/IRONOFF\/IRONOFF.html. {Online; accessed 18-April-2018}."},{"volume-title":"Protractor's Java implementation in the Android core framework. https:\/\/android.googlesource.com\/platform\/frameworks\/base\/+\/master\/core\/java\/android\/gesture\/GestureUtils.java. {Online","year":"2018","key":"e_1_2_2_2_1","unstructured":"2009. Protractor's Java implementation in the Android core framework. https:\/\/android.googlesource.com\/platform\/frameworks\/base\/+\/master\/core\/java\/android\/gesture\/GestureUtils.java. {Online; accessed 18-April-2018}."},{"key":"e_1_2_2_3_1","volume-title":"http:\/\/www.kakao.com\/services\/8. {Online","author":"Talk Kakao","year":"2018","unstructured":"2010. Kakao Talk. http:\/\/www.kakao.com\/services\/8. {Online; accessed 18-April-2018}."},{"volume-title":"http:\/\/www.wechat.com\/en\/. {Online","year":"2018","key":"e_1_2_2_4_1","unstructured":"2011. WeChat. http:\/\/www.wechat.com\/en\/. {Online; accessed 18-April-2018}."},{"key":"e_1_2_2_5_1","volume-title":"http:\/\/www.lg.com\/us\/cell-phones\/lg-D820-Sprint-Black-nexus-5. {Online","author":"LG","year":"2018","unstructured":"2013. LG Nexus 5. http:\/\/www.lg.com\/us\/cell-phones\/lg-D820-Sprint-Black-nexus-5. {Online; accessed 18-April-2018}."},{"key":"e_1_2_2_6_1","volume-title":"https:\/\/www.android.com\/versions\/lollipop-5-0\/. {Online","author":"Lollipop Android","year":"2018","unstructured":"2014. Android Lollipop. https:\/\/www.android.com\/versions\/lollipop-5-0\/. {Online; accessed 18-April-2018}."},{"volume-title":"Android Lollipop Features. https:\/\/www.android.com\/versions\/lollipop-5-0\/#features. {Online","year":"2018","key":"e_1_2_2_7_1","unstructured":"2014. Android Lollipop Features. https:\/\/www.android.com\/versions\/lollipop-5-0\/#features. {Online; accessed 18-April-2018}."},{"key":"e_1_2_2_8_1","unstructured":"2014. HTC one (M8). http:\/\/www.htc.com\/us\/smartphones\/htc-one-m8\/. {Online; accessed 18-April-2018}."},{"key":"e_1_2_2_9_1","volume-title":"https:\/\/www.android.com\/versions\/marshmallow-6-0\/. {Online","author":"Marshmallow Android","year":"2018","unstructured":"2015. Android Marshmallow. https:\/\/www.android.com\/versions\/marshmallow-6-0\/. {Online; accessed 18-April-2018}."},{"volume-title":"Smart Gallery - Photography. https:\/\/play.google.com\/store\/apps\/details?id=com.ta.voicetag.main. {Online","year":"2018","key":"e_1_2_2_10_1","unstructured":"2015. Smart Gallery - Photography. https:\/\/play.google.com\/store\/apps\/details?id=com.ta.voicetag.main. {Online; accessed 18-April-2018}."},{"volume-title":"https:\/\/www.android.com\/versions\/nougat-7-0\/. {Online","year":"2018","key":"e_1_2_2_11_1","unstructured":"2016. Nougat. https:\/\/www.android.com\/versions\/nougat-7-0\/. {Online; accessed 18-April-2018}."},{"key":"e_1_2_2_12_1","volume-title":"https:\/\/www.projectoxford.ai\/doc\/speech\/Get-Started\/android\/. {Online","author":"Oxford Project","year":"2018","unstructured":"2016. Project Oxford. https:\/\/www.projectoxford.ai\/doc\/speech\/Get-Started\/android\/. {Online; accessed 18-April-2018}."},{"volume-title":"Apple - Change alert styles and settings for notifications. https:\/\/support.apple.com\/en-au\/HT201925. {Online","year":"2018","key":"e_1_2_2_13_1","unstructured":"2017. Apple - Change alert styles and settings for notifications. https:\/\/support.apple.com\/en-au\/HT201925. {Online; accessed 18-April-2018}."},{"volume-title":"iPhone X. https:\/\/www.apple.com\/lae\/iphone-x\/specs\/. {Online","year":"2018","key":"e_1_2_2_14_1","unstructured":"2017. iPhone X. https:\/\/www.apple.com\/lae\/iphone-x\/specs\/. {Online; accessed 18-April-2018}."},{"volume-title":"http:\/\/opencamera.sourceforge.net\/. {Online","year":"2018","key":"e_1_2_2_15_1","unstructured":"2017. OpenCamera. http:\/\/opencamera.sourceforge.net\/. {Online; accessed 18-April-2018}."},{"volume-title":"Power Monitor","year":"2018","key":"e_1_2_2_16_1","unstructured":"2017. Power Monitor. Monsoon Solution Inc. https:\/\/www.msoon.com\/LabEquipment\/PowerMonitor\/. {Online; accessed 18-April-2018}."},{"key":"e_1_2_2_17_1","volume-title":"https:\/\/play.google.com\/store\/apps\/details?id=com.thinkyeah.galleryvault&hl=en. {Online","author":"Vault Gallery","year":"2018","unstructured":"2018. Gallery Vault. https:\/\/play.google.com\/store\/apps\/details?id=com.thinkyeah.galleryvault&hl=en. {Online; accessed 18-April-2018}."},{"volume-title":"Hide Pictures Videos - Vaulty. https:\/\/play.google.com\/store\/apps\/details?id=com.theronrogers.vaultyfree&hl=en. {Online","year":"2018","key":"e_1_2_2_18_1","unstructured":"2018. Hide Pictures Videos - Vaulty. https:\/\/play.google.com\/store\/apps\/details?id=com.theronrogers.vaultyfree&hl=en. {Online; accessed 18-April-2018}."},{"volume-title":"Indexing and retrieving contact IDs. https:\/\/developer.android.com\/training\/contacts-provider\/retrieve-names.html. {Online","year":"2018","key":"e_1_2_2_19_1","unstructured":"2018. Indexing and retrieving contact IDs. https:\/\/developer.android.com\/training\/contacts-provider\/retrieve-names.html. {Online; accessed 18-April-2018}."},{"volume-title":"Smart Lock - Security simplified. https:\/\/get.google.com\/smartlock\/. {Online","year":"2018","key":"e_1_2_2_20_1","unstructured":"2018. Smart Lock - Security simplified. https:\/\/get.google.com\/smartlock\/. {Online; accessed 18-April-2018}."},{"key":"e_1_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702336"},{"key":"e_1_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043574"},{"key":"e_1_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979238"},{"key":"e_1_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2481330"},{"key":"e_1_2_2_25_1","volume-title":"Google Handwriting Input in 82 languages on your Android mobile device. https:\/\/research.googleblog.com\/2015\/04\/google-handwriting-input-in-82.html. {Online","author":"Deselaers Thomas","year":"2018","unstructured":"Thomas Deselaers, Daniel Keysers, Henry Rowley, Li-Lun Wang, Victor C\u0103rbune, Ashok Popat, and Dhyanesh Narayanan. 2017. Google Handwriting Input in 82 languages on your Android mobile device. https:\/\/research.googleblog.com\/2015\/04\/google-handwriting-input-in-82.html. {Online; accessed 18-April-2018}."},{"key":"e_1_2_2_26_1","doi-asserted-by":"publisher","unstructured":"Dmitriy Genzel Ashok C. Popat Nemanja Spasojevic Michael Jahr Andrew Senior Eugene Ie and Frank Yung-Fong Tang. 2011. Translation-Inspired OCR. In ICDAR-2011. 10.1109\/ICDAR.2011.269","DOI":"10.1109\/ICDAR.2011.269"},{"key":"e_1_2_2_27_1","volume-title":"Proceedings of the International Conference on New Interfaces for Musical Expression. 337--342","author":"Gillian Nicholas","year":"2011","unstructured":"Nicholas Gillian, R. Benjamin Knapp, and Sile O'Modhrain. 2011. Recognition Of Multivariate Temporal Musical Gestures Using N-Dimensional Dynamic Time Warping. In Proceedings of the International Conference on New Interfaces for Musical Expression. 337--342."},{"key":"e_1_2_2_28_1","volume-title":"Pitfalls in Designing Zero-Effort Deauthentication: Opportunistic Human Observation Attacks. In 23nd Annual Network and Distributed System Security Symposium, NDSS 2017","author":"Huhta Otto","year":"2017","unstructured":"Otto Huhta, Swapnil Udar, Mika Juuti, Prakash Shrestha, Nitesh Saxena, and N. Asokan. 2017. Pitfalls in Designing Zero-Effort Deauthentication: Opportunistic Human Observation Attacks. In 23nd Annual Network and Distributed System Security Symposium, NDSS 2017, San Diego, California, USA, February 21-24, 2017."},{"key":"e_1_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518953"},{"key":"e_1_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2493190.2493200"},{"key":"e_1_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2380116.2380176"},{"volume-title":"2010 IEEE International Symposium on Technology and Society. 441--449","author":"Kurkovsky S.","key":"e_1_2_2_32_1","unstructured":"S. Kurkovsky and E. Syta. 2010. Digital natives and mobile phones: A survey of practices and attitudes about privacy and security. In 2010 IEEE International Symposium on Technology and Society. 441--449."},{"key":"e_1_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866029.1866044"},{"key":"e_1_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1555816.1555819"},{"key":"e_1_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557263"},{"key":"e_1_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702610"},{"key":"e_1_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.5555\/3235895.3235909"},{"key":"e_1_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2638728.2641288"},{"key":"e_1_2_2_39_1","volume-title":"Proceedings of the Linux Symposium","volume":"1","author":"Mochel Patrick","year":"2005","unstructured":"Patrick Mochel. 2005. The sysfs Filesystem. In Proceedings of the Linux Symposium, Vol. 1. 313--326."},{"key":"e_1_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466142"},{"key":"e_1_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858580"},{"volume-title":"2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems. 1012--1017","author":"Ni Xudong","key":"e_1_2_2_42_1","unstructured":"Xudong Ni, Zhimin Yang, Xiaole Bai, A. C. Champion, and D. Xuan. 2009. DiffUser: Differentiated user access control on smartphones. In 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems. 1012--1017."},{"key":"e_1_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2070942.2070969"},{"key":"e_1_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.08.026"},{"key":"e_1_2_2_45_1","volume-title":"Bettina Conradi, and Heinrich Hussmann.","author":"Seifert Julian","year":"2010","unstructured":"Julian Seifert, Alexander De Luca, Bettina Conradi, and Heinrich Hussmann. 2010. TreasurePhone: Context-Sensitive User Data Protection on Mobile Phones. Springer Berlin Heidelberg, Berlin, Heidelberg, 130--137."},{"key":"e_1_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3081333.3081364"},{"key":"e_1_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594368.2594375"},{"key":"e_1_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.5555\/938980.939594"},{"key":"e_1_2_2_49_1","volume-title":"Grounded theory methodology. Handbook of qualitative research","author":"Strauss Anselm","year":"1994","unstructured":"Anselm Strauss and Juliet Corbin. 1994. Grounded theory methodology. Handbook of qualitative research (1994), 273--285."},{"key":"e_1_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858120"},{"key":"e_1_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753654"},{"key":"e_1_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2973750.2973764"},{"key":"e_1_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294211.1294238"},{"key":"e_1_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818346.2820734"},{"key":"e_1_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/642611.642630"},{"key":"e_1_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.2011.82"}],"container-title":["Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3214279","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3214279","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,12]],"date-time":"2025-08-12T15:07:42Z","timestamp":1755011262000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3214279"}},"subtitle":["A Mobile System for Supporting Subtle Just-in-time Privacy Provisioning through Off-Screen-based Touch Gestures"],"short-title":[],"issued":{"date-parts":[[2018,7,5]]},"references-count":56,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2018,7,5]]}},"alternative-id":["10.1145\/3214279"],"URL":"https:\/\/doi.org\/10.1145\/3214279","relation":{},"ISSN":["2474-9567"],"issn-type":[{"type":"electronic","value":"2474-9567"}],"subject":[],"published":{"date-parts":[[2018,7,5]]},"assertion":[{"value":"2018-02-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-04-01","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-07-05","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}