Conference PaperPDF Available

Cheap and easy PIN entering using eye gaze

Authors:

Abstract and Figures

PINs are one of the most popular methods to perform simple and fast user authentication. PIN stands for Personal Identification Number, which may have any number of digits or even letters. Nevertheless, 4-digit PIN is the most common and is used for instance in ATMs or cellular phones. The main ad-vantage of the PIN is that it is easy to remember and fast to enter. There are however some drawbacks. One of them – addressed in this paper – is a possibility to stole the PIN by a technique called 'shoulder surfing'. To avoid such problems a novel method of the PIN entering was proposed. Instead of using a numerical keyboard, the PIN may be entered by eye gazes, which is a hands-free, easy and robust technique.
Content may be subject to copyright.
This is a pre-print of the paper published in
Journal Annales UMCS
adfa, p. 1, 2011.
© Springer-Verlag Berlin Heidelberg 2011
Cheap and easy PIN entering using eye gaze
Pawel Kasprowski, Katarzyna Harężlak
Institute of Informatics
Silesian University of Technology
Gliwice, Poland
{pawel.kasprowski,katarzyna.harezlak}@polsl.pl
Abstract. PINs are one of the most popular methods to perform simple and fast
user authentication. PIN stands for Personal Identification Number, which may
have any number of digits or even letters. Nevertheless, 4-digit PIN is the most
common and is used for instance in ATMs or cellular phones. The main ad-
vantage of the PIN is that it is easy to remember and fast to enter. There are
however some drawbacks. One of them – addressed in this paper – is a possibil-
ity to stole the PIN by a technique called ‘shoulder surfing’. To avoid such
problems a novel method of the PIN entering was proposed. Instead of using
a numerical keyboard, the PIN may be entered by eye gazes, which is a hands-
free, easy and robust technique.
Keywords: PIN security, shoulder surfing, eye movements
1 Introduction
Proper identification of a person getting access to some resources is an important and
still challenging problem of nowadays systems. There are plethora of techniques used
starting with simple passwords, through graphical passwords, tokens and ending with
various biometric authentication methods. One of the simplest methods utilized in
many access points is using a password that consists of 4-digits. It is commonly
named PIN (for Personal Identification Number) and is used for instance for credit
cards identification at ATMs. One of the main security problems while authenticating
at ATM is possibility that somebody may see the PIN that was entered by the authen-
ticating person. It is commonly known as shoulder surfing, and it may be for example
done by using properly placed video camera or even e.g. by analyzing keyboard tem-
perature directly after the PIN was entered.
To avoid shoulder surfing many techniques has been proposed like adding some
obfuscators (not important information entered together with a password) [8] or using
graphical passwords [2].
The solution presented in this paper gives opportunity to enter the PIN number
without any keyboard. It uses gaze point information (e.g. information where the per-
son is looking at) and transforms gaze points into a sequence of digits.
There were similar solutions proposed in earlier studies but they used very expen-
sive eye trackers and complicated experiment setups what made such solutions rather
This is a pre-print of the paper published in
Journal Annales UMCS
academic ones, not usable in a practice. The solution presented here shows how to
build a complete and robust setup that costs less than $100 and analyzes if it is possi-
ble to enter the PIN using eyes in time comparable to normal key-typed PIN entering.
2 Related research
Eye contingent interfaces have been the subject of studies for many years [5]. How-
ever, the main problems of developing such interfaces is that human eyes are used by
people as an input device and a human brain is not accustomed to use them to control
something. In poorly designed eye contingent interface a person automatically clicks
everything she looks and such interface becomes very annoying and not usable. This
phenomenon is commonly named a ‘Midas touch problem’ [6]. It is possible to use
eyes as ‘brain output’ but it must be done attentively and precisely. In most applica-
tions users issue commands by looking at a particular point (e.g. button on screen) for
some time. It is called a ‘dwell’. The crucial parameter for such system is how to
choose a correct dwell time that triggers action [7]. Of course longer dwell times are
expected to give more accurate results. On the other hand shorter dwell times result in
faster human-computer communication.
The main idea of the work presented in this paper is to use eye gazes as input for
an authentication application (like ATM). There are some research that utilize the idea
of using information about eye movements to enter a password. For instance Weaver
et al [9] created software that enables entering an alphanumeric password using eye
gazes. It was tested for a specific complicated password and for different dwell times.
The best results were obtained for static dwell times (80%) but the algorithm pro-
posed for determining appropriate time adaptively didn’t work sufficiently well
(45%). Similarly Kumar et al [7] proposed EyePassword software, which may be used
for a password entering. They’ve utilized two scenarios: a gaze-based, when user just
gazes at some particular point for some time and a trigger-based, when user looks at
some points and clicks the button. Surprisingly the latter gave much worse results
(15% of errors comparing to 3% for the gaze-based).
Another important contribution was a paper by DeLuca [4]. They performed both
gaze-based and click-based scenarios and compared it to gaze gestures, which is yet
another way to enter information using a gaze. Their work was continued in [3].
The main problem for gaze-based interfaces is its usability. Even if it is more se-
cure it won’t be used if it is not convenient to users. An interesting study of usability
of gaze-based interfaces may be found in [1].
Most studies mentioned above started with a priori defined dwell time threshold.
The participants looking at the specified point were informed by a sound or visually
that their choice has been registered. The most common such registration duration
was longer than 10 seconds [4][1].
In the research described in the paper slightly different approach, in which a partic-
ipant decides himself how long to focus at the point, has been applied.
3 Experiment
The main objective of the presented studies was to check how fast may the PIN be
entered using eyes and whether this time may be comparable to a keypad entering
time. Therefore, no a priori dwell time was defined and no feedback was given to the
users as it could influence the results of the experiments. Additionally, it is worth
emphasizing that the registration of eye movements was done using the EyeTribe eye
tracker (www.theeyetribe.com), which may be purchased for less than $100 what
makes the solution accessible for ordinary users.
Before each experiment the device was tuned with 7 points calibration that lasted
approximately 7 seconds. This process was followed by two different types of trials
(‘click-based’ and ‘gaze-based’) using a screen with 10 buttons marked by successive
digits 0-9 as it is presented in Fig. 1.
There were overall 370 trials performed with 23 participants including 185 trials
for ‘click-based’ and 185 trials for ‘gaze-based’ trials (see explanation of types be-
low). To achieve reliable results, the experiments were not conducted in a laboratory
environment but in a crowded place with people trying to do ‘shoulder surfing’.
Fig 1. Main application screen
The user’s task in the first type of trial (‘click-based’ type) was to click a key (trig-
ger) while simultaneously looking at subsequent digit of the PIN. The last click, after
pointing with eyes all four digits, finished the trial. The participants activities - eye
movements and click moments - were recorded for further analysis.
The second type of trial (‘gaze-based’ type) included only two clicks. First one was
done to start a trial, and second one to finish it. Between clicks users’ task was to look
for some time at four subsequent digits of their PIN. As it was mentioned earlier, the
users were instructed to look at the specified digit for ‘some time’ without any feed-
back from the system that a time was sufficient to recognize user’s intention. Similar-
ly, like in the previous experiment, all eye movements were recorded together with
moments of initial and final clicks.
This is a pre-print of the paper published in
Journal Annales UMCS
Every single run consisted of three or four ‘click-based’ trials and three or four
‘gaze-based’ trials. Users were encouraged to try to enter the PIN number consisting
of four digits as correct as possible but in the same time as fast as possible. Be-
cause every trial was recorded, the users had opportunity to examine results directly
after every run, what should supposedly improve an accuracy of their activities in
subsequent trials. The results were presented as a list of scanpaths (see Fig. 2) in con-
junction with a final score being a sum of Levenstein distances between the expected
PIN and the PIN entered by a user, independently for every trial. Trials total time was
calculated and provided as well.
Fig 2. Example of a recorded scanpath (the task was to enter PIN ‘1286’)
The analysis of collected samples was performed using two algorithms developed
for each of the experiments’ types.
The algorithm processing clicks and searching for related gaze points worked as fol-
lows:
Find three gaze points recorded directly before the click and three gaze points rec-
orded directly after the click.
For every found gaze point calculate distances to all digits displayed on screen and
choose the closest one as point’s ‘value’.
Choose the most frequently repeated value for points analyzed as the value of the
click.
The result is a sequence of four digits one for every click. The algorithm was ap-
plied to all ‘click-based’ trials. If the sequence consisted of four digits, exactly the
same as the ones that were supposed to be entered, the trial was marked as ‘correct’.
Different and more complicated algorithm was developed to retrieve the PIN num-
ber from processed gaze points without any information about the clicks. It tries to
build a sequence of digits based on found fixations moments when eye is almost
stable. It takes three parameters:
window – size of a window defining number of points to be considered when eval-
uating the point as a part of fixation. Initially it is set to 3 points.
threshold - the longest distance between points to be recognized as one fixation –
initially it is defined as 3 degrees.
sequence – sequence of currently recognized digits. Initially empty (length=0)
The main loop of the algorithm tries to find sequence of length 4. If the run is not
successful (sequence is shorter than 4) it decreases window by one, increases thresh-
old by 0.4 and repeats the run until sequence length is equal to 4 or window reaches 1
and threshold reaches 10 degrees. The run consists of the following steps:
For every recorded gaze point classify it as part of fixation (F) if window previous
points are closer than threshold degrees of each other.
Join neighboring F points into fixations.
Calculate the fixation position as the average position of points belonging to the
fixation
For every fixation calculate distances to all digits displayed on screen and choose
the closest one as fixation’s ‘value’.
Merge neighboring fixations that have the same value (the same digit assignment)
into one fixation.
While number of fixations is higher than 4 – remove the shortest fixation.
Build a sequence of digits from a sequence of fixations.
The end result is a sequence of 0 to 4 digits. Similarly to the previous algorithm, if the
sequence consists of four digits, exactly the same as the ones that were supposed to be
entered, the trial is marked as ‘correct’.
The algorithm described above was applied to both types of trials: ‘click-based’
and ‘gaze-based’.
4 Results discussion
All conducted tests aimed at checking if not guided eye movement can be useful in
the PIN delivering. The first parameter that provides such knowledge is the percent of
correct trials (accuracy) - i.e. trials when user entered the correct sequence of numbers
- to the overall number of trials. Surprisingly, when considering data from ‘click-
based’ type of trials, the algorithm that processed each trial taking user’s click mo-
ments into account (CBc) gave worse results than algorithm considering the same
signal but using only information about gaze points (CBg). Such outcome can result
from two reasons: (1) imprecise users’ coordination of clicking and looking or (2) eye
tracker delay. The best results were achieved for ‘gaze-based’ trials when user didn’t
have to worry about clicking during the trial. However, the differences in accuracy
were not significant (p>0.05).
Another interesting factor was the total time of each trial. As it can be seen in Ta-
ble 1 the average time of runs was significantly shorter for ‘gaze-based’ (GB) trials.
This is a pre-print of the paper published in
Journal Annales UMCS
Table 1. The accuracy and the time for different types and algorithms
Type Average time Accuracy Rejection
percent Accuracy
after rejection
CBc 6.5s (+/- 2.45s) 61.1 % - -
CBg 66.5 % 9% 73,2%
GB 4.36s (+/- 1.27s) 68.6 % 15% 80.4%
For both CBg and GB types the algorithms returned from 0-4 digits. The number of
digits was lower than four when, in spite of changing the thresholds (window and
threshold), it was not possible to find four dominating fixations. Such situation oc-
curred for 9% of ‘click-based’ and 15% of ‘gaze-based’ trials (see: Rejection percent
in Table 1). Such error is easy to detect, contrary to an error when the algorithm re-
turns wrong combination of four digits. If the number of digits is lower than 4 the
trial may be automatically rejected and user may be asked to do another attempt.
Therefore, the results were analyzed once again after rejecting all too short combina-
tions (see: Accuracy after rejection in Table 1). It obviously could not be done for
algorithm analyzing clicks because it always returns four digits sequence (as there are
always four clicks).
Comparing the results for different users, it can be noticed that they vary signifi-
cantly as shown in Fig. 3. There were two participants that were able to achieve 100%
score – all their attempts were successful (with 16 and 8 trials respectively). But there
were also four participants with a lack of correct attempts. Three of them took part in
8 trials and one in 16 trials.
Fig. 1. Accuracies for different participants
When analyzing the possible causes of errors it seemed obvious that incorrect trails
could result from too fast trial realization – i.e. too short dwells duration on subse-
quent digits. It must be remembered that users were not instructed to dwell at the digit
for some specified time and there was no direct feedback that their dwell has been
accepted (as in similar works mentioned in section 2). They were told just to ‘point’
the digit with their eyes. Surprisingly, it occurred that the average time for the correct
trials is lower for both types of experiments and both algorithms used for determining
sequences (Tab 2) and is significantly lower (p<0.05) for both algorithms with ‘click-
based’ (CB) type .
Table 2. The time and the accuracy for the correct trials
Type Correct Incorrect
CBm 6.21s (+/- 2.44s) 6.95s (+/- 2.43s)
CBg 6.07s (+/- 1.56s) 7.35s (+/- 3.5s)
GB 4.33s (+/- 1.23s) 4.42s (+/- 1.36s)
The findings of the studies presented so far show that the algorithms developed in the
research are able to find a correct sequence using a very low number of recordings. In
fact it occurred that the shortest correctly entered trial was 1.97 sec. and 16% of cor-
rect trials were entered in less than 3 sec. Taking into account, that sequence of digits
was not known to the participants before experiments started, it can be expected that
in case of well-known numbers arrangement, percentage of the correct results featur-
ing by short time of its entering will be higher.
Further analyses revealed that the distribution of accuracy characterizes by higher
density near boundary values.
Fig. 2. The distribution of users accuracies
There were five participants with the result less than 10% (0% for 4 of them) but ma-
jority of participants were able to achieve accuracy higher than 75%. As it could be
expected users get used to the application and their later attempts were more success-
ful than the first ones. Correlation between a number of attempts and a percentage of
This is a pre-print of the paper published in
Journal Annales UMCS
correct trials per user is 0.213, which indicates that users with more attempts tend to
have better results.
5 Summary and future work
Using eye movement to control chosen areas of a humans’ life is an interesting and
challenging task. The experiment presented in the paper aimed at developing methods
and tools making entering the PIN number using eyes possible. This basic goal of the
research was extended with the analyses of time, which has to be spent to correctly
point out appropriate sequence of digits. It was checked if it is possible to enter the
PIN number using only eyes in time comparable with usage of classic keyboard and
without any direct feedback from the application.
There were two types of experiments proposed. First of them assumed providing
the PIN digits using eye movement signal confirmed by clicks. In the second solution
users were expected, for the same purpose, to utilize only their eyes. Analysis of the
obtained results allowed for drawing some interesting conclusions.
1. It was confirmed that utilizing eye movements as an output signal is possible even
if not very expensive eye-tracker is used.
2. Such signal turned out to be valuable even for participants that used eye tracking
for the first time (as most of the participants during the experiment). It may be ex-
pected that more experienced participants, that have tried eye pointing multiple
times, would achieve better results. It was partially confirmed during this research
but more comprehensive conclusions require more extensive experiments.
3. Time measured during experiments proved to be comparable with that, which is
needed using keyboard.
4. Allowing users to decide how long to gaze at a given digit occurred to be a good
idea, shortening time of performed task. User didn’t have to wait for a signal to
continue a task. The findings show that shorter duration of experiment not neces-
sary must result in worse result. On the contrary: correct trials were related to
shorter task realization.
5. Comparison of results calculated based on clicking and without it indicated that
necessity of correlating eyes and hand can lead to worse outcomes.
The studies presented in the paper will be continued and will concern deeper anal-
yses of user’s dwell durations to find if there are significant differences among people
as it was suggested in [9]. Furthermore the possibility of defining one universal dwell
threshold will be checked. Moreover, spatial errors of fixations should be analyzed to
determine the minimal size of components, which may be pointed by gaze.
Another important problem is calibration of the device. Currently the calibration
lasts 7 seconds – it will be verified if the same results could be achieved using a tem-
plate calibration as it was suggested in [7].
Entering PIN using eye movements seems to be an interesting alternative to classic
keyboard based methods. Firstly, it may be easier for people who for some reason
have difficulties with keyboards (like disabled people). Secondly, it reduces a ‘shoul-
der surfing’ problem. However, it must be emphasized, that it is still possible to steal
PIN number entered using eye gazes. An impostor should place two cameras, one in
front of the person (e.g. under a screen) and one pointing at the screen. Proper syn-
chronization of images from both cameras, together with ensuring a high quality im-
age from the camera located in front of the person, should give sufficient amount of
information to resolve the PIN. It is also theoretically possible to use only one camera
in front of the person to obtain some valuable information about PIN. However, this
methods are more complicated than a classic shoulder surfing so, in general, eye gaze
based PIN entering may be treated as more secure than keyboard based one.
References
1.
BROOKS, Michael; ARAGON, Cecilia R.; KOMOGORTSEV, Oleg V. Perceptions of
interfaces for eye movement biometrics. In: Biometrics (ICB), 2013 International Con-
ference on. IEEE, 2013. p. 1-8.FORGET, Alain; CHIASSON, Sonia; BIDDLE, Robert.
Input precision for gaze-based graphical passwords. In: CHI'10 Extended Abstracts on
Human Factors in Computing Systems. ACM, 2010. p. 4279-4284.
2.
BULLING, Andreas; ALT, Florian; SCHMIDT, Albrecht. Increasing the security of
gaze-based cued-recall graphical passwords using saliency masks. In:Proceedings of the
2012 ACM annual conference on Human Factors in Computing Systems. ACM, 2012. p.
3011-3020.
3.
DE LUCA, Alexander; DENZEL, Martin; HUSSMANN, Heinrich. Look into my eyes!:
Can you guess my password?. In: Proceedings of the 5th Symposium on Usable Privacy
and Security. ACM, 2009. p. 7.
4.
DE LUCA, Alexander; WEISS, Roman; DREWES, Heiko. Evaluation of eye-gaze inter-
action methods for security enhanced PIN-entry. In: Proceedings of the 19th australasian
conference on computer-human interaction: Entertaining user interfaces. ACM, 2007. p.
199-202.
5.
GOLDBERG, Joseph H.; KOTVAL, Xerxes P. Computer interface evaluation using eye
movements: methods and constructs. International Journal of Industrial Ergonomics,
1999, 24.6: 631-645.
6.
JACOB, Robert JK. The use of eye movements in human-computer interaction tech-
niques: what you look at is what you get. ACM Transactions on Information Systems
(TOIS), 1991, 9.2: 152-169.
7.
KUMAR, Manu, et al. Reducing shoulder-surfing by using gaze-based password entry.
In: Proceedings of the 3rd symposium on Usable privacy and security. ACM, 2007. p. 13-
19.
8.
TAN, Desney S.; KEYANI, Pedram; CZERWINSKI, Mary. Spy-resistant keyboard:
more secure password entry on public touch screen displays. In:Proceedings of the 17th
Australia conference on Computer-Human Interaction: Citizens Online: Considerations
for Today and the Future. Computer-Human Interaction Special Interest Group (CHISIG)
of Australia, 2005. p. 1-10.
This is a pre-print of the paper published in
Journal Annales UMCS
9.
WEAVER, Justin; MOCK, Kenrick; HOANCA, Bogdan. Gaze-based password authenti-
cation through automatic clustering of gaze points. In: Systems, Man, and Cybernetics
(SMC), 2011 IEEE International Conference on. IEEE, 2011. p. 2749-2754.
... The same scheme was used on ATMs by Seetharama et al. [142]. Similar work was also done by Kasprowski et al. [63] who used gaze for pointing at PINs and confirmed selection by pressing a key. EyePassShapes uses eye movements to enter alphanumeric passwords [32]. ...
... The advantage of the former type is that, opposed to unimodal gaze input, the system can clearly distinguish input from perception as the user would use the second modality to confirm the intention to select the target being gazed at. Examples include Eye-Password [93], GazeTouchPIN [79] and others [63], where users select each password symbol in two steps. Each step involves one of the modalities. ...
Conference Paper
Full-text available
For the past 20 years, researchers have investigated the use of eye tracking in security applications. We present a holistic view on gaze-based security applications. In particular, we canvassed the literature and classify the utility of gaze in security applications into a) authentication, b) privacy protection, and c) gaze monitoring during security critical tasks. This allows us to chart several research directions, most importantly 1) conducting field studies of implicit and explicit gaze-based authentication due to recent advances in eye tracking, 2) research on gaze-based privacy protection and gaze monitoring in security critical tasks which are under-investigated yet very promising areas, and 3) understanding the privacy implications of pervasive eye tracking. We discuss the most promising opportunities and most pressing challenges of eye tracking for security that will shape research in gaze-based security applications for the next decade.
... There is, however, evidence that video-based eye-trackers produce errors in the measurement of small eye movements [46]. The eye tracking setups are available as head-mounted [47], [48], desktop [49], [50] and mobile devices [51], [52]. A typical mobile eye tracker is presented in Fig. 1. ...
Article
Full-text available
Eye behaviour provides valuable information revealing one's higher cognitive functions and state of affect. Although eye tracking is gaining ground in the research community, it is not yet a popular approach for the detection of emotional and cognitive states. In this paper, we present a review of eye and pupil tracking related metrics (such as gaze, fixations, saccades, blinks, pupil size variation, etc.) utilized towards the detection of emotional and cognitive processes, focusing on visual attention, emotional arousal and cognitive workload. Besides, we investigate their involvement as well as the computational recognition methods employed for the reliable emotional and cognitive assessment. The publicly available datasets employed in relevant research efforts were collected and their specifications and other pertinent details are described. The multimodal approaches which combine eye-tracking features with other modalities (e.g. biosignals), along with artificial intelligence and machine learning techniques were also surveyed in terms of their recognition/classification accuracy. The limitations, current open research problems and prospective future research directions were discussed for the usage of eye-tracking as the primary sensor modality. This study aims to comprehensively present the most robust and significant eye/pupil metrics based on available literature towards the development of a robust emotional or cognitive computational model.
... Kasprowsky [95] and Kumar [96] reported the use of gaze to enter a password using gaze tracking. A series of user fixations on specified digits formed the password sequence. ...
Article
Full-text available
In this paper a review is presented of the research on eye gaze estimation techniques and applications, that has progressed in diverse ways over the past two decades. Several generic eye gaze use-cases are identified: desktop, TV, headmounted, automotive and handheld devices. Analysis of the literature leads to the identification of several platform specific factors that influence gaze tracking accuracy. A key outcome from this review is the realization of a need to develop standardized methodologies for performance evaluation of gaze tracking systems and achieve consistency in their specification and comparative evaluation. To address this need, the concept of a methodological framework for practical evaluation of different gaze tracking systems is proposed.
... The confirmation of a choice (triggering) may be done by keeping focus for a system defined period or by an eye blink [9]. The similar solution was utilized in research concerning PIN code or password entering [10], [11] and a puzzle game solving [12]. The area of computer games is also frequently studied in this field. ...
Conference Paper
It is well known that eye movement tracking may reveal information about human intentions. Therefore, it seems that it would be easy to use gaze pointing as a replacement for other traditional human computer interaction modalities like e.g. mouse or trackball, especially when there are more and more affordable eye trackers available. However, it occurs that gaze contingent interfaces are often experienced as difficult and tedious by users. There are multiple reasons of these difficulties. First of all eye tracking requires prior calibration, which is unnatural for users. Secondly, gaze continent interfaces suffer from a so called Midas Touch problem, because it is difficult to detect a moment when a user wants to click a button or any other object on a screen. Eye pointing is also not as precise and accurate as e.g. mouse pointing. The paper presents problems concerned with gaze contingent interfaces and compares the usage of gaze, mouse and touchpad during a very simple shooting game.
Article
Password, fingerprint and face recognition are the most popular authentication schemes on smartphones. However, these user authentication schemes are threatened by shoulder surfing attacks and spoof attacks. In response to these challenges, eye movements have been utilized to secure user authentication since their concealment and dynamics can reduce the risk of suffering those attacks. However, existing approaches based on eye movements often rely on additional hardware (such as high-resolution eye trackers) or involve a time-consuming authentication process, limiting their practicality for smartphones. This paper presents DEyeAuth, a novel dual-authentication system that overcomes these limitations by integrating eyelid patterns with eye gestures for secure and convenient user authentication on smartphones. DEyeAuth first leverages the unique characteristics of eyelid patterns extracted from the upper eyelid margins or creases to distinguish different users and then utilizes four eye gestures (i.e., looking up, down, left, and right) whose dynamism and randomness can counter threats from image and video spoofing to enhance system security. To the best of our knowledge, we are among the first to discover and prove that the upper eyelid margins and creases can be used as potential biometrics for user authentication. We have implemented the prototype of DEyeAuth on Android platforms and comprehensively evaluated its performance by recruiting 50 volunteers. The experimental results indicate that DEyeAuth achieves a high authentication accuracy of 99.38% with a relatively short authentication time of 6.2 seconds, and is effective in resisting image presentation, video replaying, and mimic attacks.
Article
The fundamental problem for designing a gaze-based human-computer interaction is related to development of an effective method for activating graphical user interface elements by means of gaze only. Such a method should be easy for the user to apply, however at the same time, it requires eye movements that are clearly different from the natural behavior of the eye. We examined three methods of button activation by gaze, looking for the most effective way of gaze "clicking". These were: 1) the most standard method based on the use of dwell-time, 2) its modification based on detection of fixation located inside the buttons area and 3) and the most novel method based on gaze gestures consisting of movement into the button area and outward movement in the approximately opposite direction. We compared these gaze control methods under homogeneous conditions, which allows for a more reliable assessment of their relative usefulness. Two layouts of buttons were used: arranged on a grid, like on a telephone pad, and on a circle with an empty center. The experimental task was to enter a set of four-digit PINs using a set of gaze buttons corresponding to ten digits. A group of novices were instructed to use all the three methods and both button layouts (six experimental conditions). The activation methods were compared in terms of system usability, objectively measured by the PIN entry speed and the number of errors, as well as using a subjective SUS questionnaire. The system based on gaze gestures was worse in both measures; however, it had its followers. The method based on fixation detection instead of dwell-time did not significantly increase the entry speed due to the greater number of errors caused by non-intentional buttons activation. The circle layout turned out to be generally more convenient than the telephone pad layout.
Article
Full-text available
Human gaze estimation plays a major role in many applications in human–computer interaction and computer vision by identifying the users’ point-of-interest. Revolutionary developments of deep learning have captured significant attention in gaze estimation literature. Gaze estimation techniques have progressed from single-user constrained environments to multi-user unconstrained environments with the applicability of deep learning techniques in complex unconstrained environments with extensive variations. This paper presents a comprehensive survey of the single-user and multi-user gaze estimation approaches with deep learning. State-of-the-art approaches are analysed based on deep learning model architectures, coordinate systems, environmental constraints, datasets and performance evaluation metrics. A key outcome from this survey realizes the limitations, challenges and future directions of multi-user gaze estimation techniques. Furthermore, this paper serves as a reference point and a guideline for future multi-user gaze estimation research.
Article
Full-text available
The human eye is a vital sensory organ that provides us with visual information about the world around us. It can also convey such information as our emotional state to people with whom we interact. In technology, eye tracking has become a hot research topic recently, and a growing number of eye-tracking devices have been widely applied in fields such as psychology, medicine, education, and virtual reality. However, most commercially available eye trackers are prohibitively expensive and require that the user's head remain completely stationary in order to accurately estimate the direction of their gaze. To address these drawbacks, this paper proposes an inner corner-pupil center vector (ICPCV) eye-tracking system based on a deep neural network, which does not require that the user's head remain stationary or expensive hardware to operate. The performance of the proposed system is compared with those of other currently available eye-tracking estimation algorithms, and the results show that it outperforms these systems.
Chapter
Full-text available
The research currently conducted in various fields of interest base their experiments on the eye movement signal analysis. Among these areas cognitive studies on people’s willingness, intentions or skills and advanced interface design can be enumerated. There are also some studies attempting to apply the eye tracking in security tasks and biometric identification. During these experiments a lot of data is registered, which has to be stored for further analyses. This research purpose is to find efficient structures for managing data gathered in such a way. Four different storages were chosen: Oracle, Excel, MongoDB and Cassandra systems that were examined during various task realizations.
Conference Paper
Full-text available
Eye movement may be regarded as a new promising modality for human computer interfaces. With the growing popularity of cheap and easy to use eye trackers, gaze data may become a popular way to enter information and to control computer interfaces. However, properly working gaze contingent interface requires intelligent methods for processing data obtained from an eye tracker. They should reflect users' intentions regardless of a quality of the signal obtained from an eye tracker. The paper presents the results of an experiment during which algorithms processing eye movement data while 4-digits PIN was entered with eyes were checked for both calibrated and non-calibrated users.
Article
Full-text available
With computers being used ever more ubiquitously in situations where privacy is important, secure user authentication is a central requirement. Gaze-based graphical passwords are a particularly promising means for shoulder-surfing-resistant authentication, but selecting secure passwords remains challenging. In this paper, we present a novel gaze-based authentication scheme that makes use of cued-recall graphical passwords on a single image. In order to increase password security, our approach uses a computational model of visual attention to mask those areas of the image that are most likely to attract visual attention. We create a realistic threat model for attacks that may occur in public settings, such as filming the user's interaction while drawing money from an ATM. Based on a 12-participant user study, we show that our approach is significantly more secure than a standard image-based authentication and gaze-based 4-digit PIN entry.
Article
Full-text available
Current software interfaces for entering text on touch screen devices mimic existing mechanisms such as keyboard typ-ing or handwriting. Unfortunately, these techniques are poor for entering private text such as passwords since they allow observers to figure out what has been typed just by watching. In this paper, we present the Spy-Resistant Key-board, a novel interface that allows users to enter private text without revealing it to an observer. We describe a user study we ran to explore the usability of the interface as well as additional security provided by it. Results indicate that although users took longer to enter their passwords, using the Spy-Resistant Keyboard rather than a standard onscreen soft keyboard resulted in a drastic increase in their ability to protect their passwords from a watchful observer. We dis-cuss future extensions to these ideas.
Article
Full-text available
Eye movement-based analysis can enhance traditional performance, protocol, and walk-through evaluations of computer interfaces. Despite a substantial history of eye movement data collection in tasks, there is still a great need for an organized definition and evaluation of appropriate measures. Several measures based upon eye movement locations and scanpaths were evaluated here, to assess their validity for assessment of interface quality. Good and poor interfaces for a drawing tool selection program were developed by manipulating the grouping of tool icons. These were subsequently evaluated by a collection of 50 interface designers and typical users. Twelve subjects used the interfaces while their eye movements were collected. Compared with a randomly organized set of component buttons, well-organized functional grouping resulted in shorter scanpaths, covering smaller areas. The poorer interface resulted in more, but similar duration, fixations than the better interface. Whereas the poor interface produced less efficient search behavior, the layout of component representations did not influence their interpretability. Overall, data obtained from eye movements can significantly enhance the observation of users' strategies while using computer interfaces, which can subsequently improve the precision of computer interface evaluations.Relevance to industryThe software development industry requires improved methods for the objective analysis and design of software interfaces. This study provides a foundation for using eye movement analysis as part of an objective evaluation tool for many phases of interface analysis. The present approach is instructional in its definition of eye movement-based measures, and is evaluative with respect to the utility of these measures.
Conference Paper
Full-text available
Current software interfaces for entering text on touch screen devices mimic existing mechanisms such as keyboard typing or handwriting. These techniques are poor for entering private text such as passwords since they allow observers to decipher what has been typed simply by looking over the typist's shoulder, an activity known as shoulder surfing. In this paper, we outline a general approach for designing security-sensitive onscreen virtual keyboards that allow users to enter private text without revealing it to observers. We present one instantiation, the Spy-Resistant Keyboard, and discuss design decisions leading to the development of this keyboard. We also describe the results of a user study exploring the usability and security of our interface. Results indicate that although users took longer to enter their passwords, using the Spy-Resistant Keyboard rather than a standard soft keyboard resulted in a significant increase in their ability to protect their passwords from a watchful observer.
Conference Paper
Full-text available
Personal identification numbers (PINs) are one of the most common ways of electronic authentication these days and used in a wide variety of applications, especially in ATMs (cash machines). A non-marginal amount of tricks are used by criminals to spy on these numbers to gain access to the owners' valuables. Simply looking over the victims' shoulders to get in possession of their PINs is a common one. This effortless but effective trick is known as shoulder surfing. Thus, a less observable PIN entry method is desirable. In this work, we evaluate three different eye gaze interaction methods for PIN- entry, all resistant against these common attacks and thus providing enhanced security. Besides the classical eye input methods we also investigate a new approach of gaze gestures and compare it to the well known classical gaze-interactions. The evaluation considers both security and usability aspects. Finally we discuss possible enhancements for gaze gestures towards pattern based identification instead of number sequences.
Conference Paper
Authentication systems for public terminals { and thus pub- lic spaces { have to be fast, easy and secure. Security is of utmost importance since the public setting allows mani- fold attacks from simple shoulder surng to advanced ma- nipulations of the terminals. In this work, we present Eye- PassShapes, an eye tracking authentication method that has been designed to meet these requirements. Instead of using standard eye tracking input methods that require precise and expensive eye trackers, EyePassShapes uses eye ges- tures. This input method works well with data about the rel- ative eye movement, which is much easier to detect than the precise position of the user's gaze and works with cheaper hardware. Dierent evaluations on technical aspects, usabil- ity, security and memorability show that EyePassShapes can signicantly increase security while being easy to use and fast at the same time.
Conference Paper
Shoulder-surfing - using direct observation techniques, such as looking over someone's shoulder, to get passwords, PINs and other sensitive personal information - is a problem that has been difficult to overcome. When a user enters information using a keyboard, mouse, touch screen or any traditional input device, a malicious observer may be able to acquire the user's password credentials. We present EyePassword, a system that mitigates the issues of shoulder surfing via a novel approach to user input. With EyePassword, a user enters sensitive input (password, PIN, etc.) by selecting from an on-screen keyboard using only the orientation of their pupils (i.e. the position of their gaze on screen), making eavesdropping by a malicious observer largely impractical. We present a number of design choices and discuss their effect on usability and security. We conducted user studies to evaluate the speed, accuracy and user acceptance of our approach. Our results demonstrate that gaze-based password entry requires marginal additional time over using a keyboard, error rates are similar to those of using a keyboard and subjects preferred the gaze-based password entry approach over traditional methods.
Conference Paper
Researchers have proposed systems in which users utilize an eye tracker to enter passwords by merely looking at the proper symbols on the computer monitor in the appropriate order. This authentication method is immune to the practice of shoulder surfing: secretly observing the keystrokes of a legitimate user as he or she types a password on a keyboard. In this paper we describe the EyeDent system-in which users authenticate by looking at the symbols on an on-screen keyboard to enter their password. Existing eye-tracking based authentication systems require the user to dwell or press a trigger when looking at each symbol. Instead, in EyeDent, gaze points are automatically clustered to determine the user's selected symbols; this approach has the benefit of allowing users to authenticate at their natural speed, rather than with a fixed dwell time. Additionally, the absence of a visible trigger does not divulge the number of symbols in the password. Results from preliminary investigations indicate that quick (3 seconds for a 4 digit PIN) authentication is possible using this scheme, but more work is needed to account for calibration error, and to dynamically adapt system parameters to the characteristics of individual users.
Article
In seeking hitherto-unused methods by which users and computers can comrnumcate, we investigate the usefulness of eye movements as a fast and convenient auxiliary user-to-computer communication mode. The barrier to exploiting this medium has not been eye-tracking technology but the study of interaction techniques that incorporate eye movements mto the usercomputer dialogue in a natural and unobtrusive way This paper discusses some of the human factors and technical considerations that arise in trying to use eye movements as an input medium, describes our approach and the first eye movement-based interaction techniques that we have devised and implemented in our laboratory, and reports our experiences and observa tions on them.