Abstract
AR systems pose potential security concerns that should be addressed before the systems become widespread.
- Azuma, R.T. A survey of augmented reality. Presence: Teleoperators and Virtual Environments 6 (1997), 355--385.Google ScholarDigital Library
- Azuma, R., Baillot, Y., Behringer, R., Feiner, S., Julier, S. and Macintyre, B. Recent advances in augmented reality. IEEE Computer Graphics and Applications 21, 6 (2001), 34--47. Google ScholarDigital Library
- Backes, M., Chen, T., Duermuth, M., Lensch, H. and Welk, M. Tempest in a teapot: Compromising reflections revisited. IEEE Symposium on Security and Privacy (2009). Google ScholarDigital Library
- Business Insider. This apple patent will shut down your camera at live concerts; http://www.businessinsider.com/iphone-concert-patent-2011-6.Google Scholar
- CNN. Augmented-reality windshields and the future of driving, 2012; http://virtual.vtt.fi/virtual/proj2/multimedia/alvar.html.Google Scholar
- Costanza, E., Kunz, A. and Fjeld, M. Mixed reality: A survey. Human Machine Interaction. Springer-Verlag, 2009, 47--68. Google ScholarDigital Library
- D'Antoni, L., Dunn, A., Jana, S., et al. Operating system support for augmented reality applications. In Proceedings of USENIX Workshop on Hot Topics in Operating Systems (2013). Google ScholarDigital Library
- Google. Crowdsourcing road congestion data; http://googleblog.blogspot.com/2009/08/bright-side-of-sitting-in-traffic.html.Google Scholar
- Halderman, J.A., Waters, B. and Felten, E.W. Privacy management for portable recording devices. In Proceedings of the 3rd ACM Workshop on Privacy in Electronic Society (2004). Google ScholarDigital Library
- Harvey, A. CVDazzle: Camouflage from Computer Vision; http://cvdazzle.com/.Google Scholar
- Henrysson, A., Billinghurst, M., And Ollila, M. Face to face collaborative AR on mobile phones. In Proceeding of the 4th IEEE/ACM International Symposium on Mixed & Augmented Reality (2005). Google ScholarDigital Library
- Hoque, M.E., McDuff, D. and Picard, R.W. Exploring temporal patterns in classifying frustrated and delighted smiles. IEEE Transactions on Affective Computing 3 (2012), 323--334.Google ScholarDigital Library
- Improv Everywhere. The Mp3 Experiments, 2012; http://improveverywhere.com/missions/the-mp3-experiments/.Google Scholar
- Jakobsson, M., Shi, E., Golle, P., and Chow, R. Implicit authentication for mobile devices. In Proceedings of the 4th USENIX Workshop on Hot Topics in Security (2009), USENIX. Google ScholarDigital Library
- Jana, S., Molnar, D., Moshchuk, A. et al. Enabling fine-grained permissions for augmented reality applications with recognizers. Tech. Rep. MSRTR-2013-11, Microsoft Research, Feb. 2013.Google Scholar
- Kato, H. and Billinghurst, M. Marker tracking and HMD calibration for a video-based augmented reality conferencing system. In IEEE/ACM Workshop on Augmented Reality (1999). Google ScholarDigital Library
- Laycock, S. and Day, A. A survey of haptic rendering techniques. Comp. Graphics Forum. 26, 1 (2007), 50--65.Google ScholarCross Ref
- Madejski, M., Johnson, M. and Bellovin, S.M. The Failure of Online Social Network Privacy Settings. Tech. Rep. CUCS-010-11, Dept. of Comp. Science, Columbia University, 2011.Google Scholar
- Maganis, G., Jung, J., Kohno, T. et al. Sensor Tricorder: What does that sensor know about me? In Proceedings of the 12th Workshop on Mobile Computing Systems and Applications (2011), ACM. Google ScholarDigital Library
- Microsoft. Kinect for Windows, 2012; http://www.microsoft.com/en-us/kinectforwindows/.Google Scholar
- Miller, M.S. Robust Composition: Towards a Unified Approach to Access Control and Concurrency Control. Ph.D. thesis. Johns Hopkins University, Baltimore, MD, 2006. Google ScholarDigital Library
- Papagiannakis, G., Singh, G. and Magnenatthalmann, N. A survey of mobile and wireless technologies for augmented reality systems. Computer Animation and Virtual Worlds 19 (2008), 3--22. Google ScholarDigital Library
- Parviz, B. For your eye only. IEEE Spectrum 46 (2009), 36--41. Google ScholarDigital Library
- Poulsen, K. Hackers assault epilepsy patients via computer. Wired (2008); http://www.wired.com/politics/security/news/2008/03/epilepsy.Google Scholar
- Raguram, R., White, A.M., Goswami, D. et al. iSpy: automatic reconstruction of typed input from compromising reflections. In Proceedings of the 18th ACM Conf. Computer and Communications Security. Google ScholarDigital Library
- Reitmayr, G. and Schmalstieg, D. Mobile collaborative augmented reality. In Proceedings of the 4th International Symp. on Augmented Reality (2001).Google ScholarCross Ref
- Riva, O., Qin, C., Strauss, K., And Lymberopoulos, D. Progressive authentication: Deciding when to authenticate on mobile phones. In Proceedings of the 21st USENIX Security Symposium (2012). Google ScholarDigital Library
- Roesner, F., Kohno, T., Moshchuk, A. et al. User-driven access control: Rethinking permission granting in modern operating systems. IEEE Symposium on Security and Privacy (2012). Google ScholarDigital Library
- Saponas, T.S., Tan, D.S., Morris, D. et al. Enabling always-available input with muscle-computer interfaces. In Proceedings of the 22nd ACM Symposium on User Interface Software and Technology (2009). Google ScholarDigital Library
- Saroiu, S. and Wolman, A. I am a sensor, and I approve this message. In Proceedings of the 11th Workshop on Mobile Computing Systems and Applications (2010), ACM. Google ScholarDigital Library
- Schiff, J., Meingast, M., Mulligan, D.K., Sastry, S. and Goldberg, K.Y. Respectful cameras: Detecting visual markers in real-time to address privacy concerns. In Proceeding of the 2007 Int'l Conference on Intelligent Robots and Systems.Google Scholar
- Starner, T., Leibe, B., Singletary, B. and Pair, J. Mindwarping: Towards creating a compelling collaborative augmented reality game. In ACM Intelligent User Interfaces (2000). Google ScholarDigital Library
- Sutherland, I.E. A head-mounted three-dimensional display. In Proceedings of the Fall Joint Computer Conference, American Federation of Information Processing Societies (1968). Google ScholarDigital Library
- Templeman, R., Rahman, Z., Crandall, D.J., And Kapadia, A. Placeraider: Virtual theft in physical spaces with smartphones. CoRR abs/1209.5982 (2012).Google Scholar
- Truong, K., Patel, S., Summet, J. and Abowd, G. Preventing camera recording by designing a capture-resistant environment. Proceedings of Ubicomp (2005). Google ScholarDigital Library
- Van Krevelen, D. and Poelman, R. A survey of augmented reality technologies, applications, and limitations. The International Journal of Virtual Reality 9 (2010), 1--20.Google ScholarCross Ref
- Viola, P. and Jones, M. Robust real-time object detection. International Journal of Computer Vision 57 (2004), 137--154, Hingham, MA. Google ScholarDigital Library
- Vrij, A., Edward, K., Roberts, K. and Bull, R. Detecting deceit via analysis of verbal and nonverbal behavior. Journal of Nonverbal Behavior 24 (2000), 239--263.Google ScholarCross Ref
- VTT Technical Research Centre Of Finland. Alvar Software Library, 2009. http://cnn.com/2012/01/13/tech/innovation/ces-future-driving/.Google Scholar
- Wagner, D., Pintaric, T., Ledermann, F. and Schmalstieg, D. Towards massively multi-user augmented reality on handheld devices. In Proceedings of the 3rd International Conference on Pervasive Computing (2005). Google ScholarDigital Library
- Zhou, F., Duh, H. B.-L. and Billinghurst, M. Trends in augmented reality tracking, interaction and display: A review of 10 years of ISMAR. In Proceedings of the 7th IEEE/ACM International Symposium on Mixed and Augmented Reality (2008). Google ScholarDigital Library
Index Terms
- Security and privacy for augmented reality systems
Recommendations
Augmented reality technologies, systems and applications
This paper surveys the current state-of-the-art of technology, systems and applications in Augmented Reality. It describes work performed by many different research groups, the purpose behind each new Augmented Reality system, and the difficulties and ...
Multimodal augmented reality: the norm rather than the exception
MVAR '16: Proceedings of the 2016 workshop on Multimodal Virtual and Augmented RealityAugmented reality (AR) is commonly seen as a technology that overlays virtual imagery onto a participant's view of the world. In line with this, most AR research is focused on what we see. In this paper, we challenge this focus on vision and make a case ...
Haptics in Augmented Reality
ICMCS '99: Proceedings of the IEEE International Conference on Multimedia Computing and Systems - Volume 2An augmented reality system merges synthetic sensory information into a user's perception of a three-dimensional environment. An important performance goal for an augmented reality system is that the user perceives a single seamless environment. In most ...
Comments