Skip to main content
main-content
Top

Hint

Swipe to navigate through the chapters of this book

2015 | OriginalPaper | Chapter

Visual Cryptography and Obfuscation: A Use-Case for Decrypting and Deobfuscating Information Using Augmented Reality

Authors: Patrik Lantz, Bjorn Johansson, Martin Hell, Ben Smeets

Published in: Financial Cryptography and Data Security

Publisher: Springer Berlin Heidelberg

share
SHARE

Abstract

As new technologies emerge such as wearables, it opens up for new challenges, especially related to security and privacy. One such recent technology is smart glasses. The use of glasses introduces security and privacy concerns for the general public but also for the user itself. In this paper we present work which focus on privacy of the user during authentication. We propose and analyze two methods, visual cryptography and obfuscation for protecting the user against HUD and camera logging adversaries as well as shoulder-surfing.
Literature
1.
go back to reference Forte, A.G., Garay, J.A., Jim, T., Vahlis, Y.: EyeDecrypt - private interactions in plain sight. In: Abdalla, M., De Prisco, R. (eds.) SCN 2014. LNCS, vol. 8642, pp. 255–276. Springer, Heidelberg (2014) Forte, A.G., Garay, J.A., Jim, T., Vahlis, Y.: EyeDecrypt - private interactions in plain sight. In: Abdalla, M., De Prisco, R. (eds.) SCN 2014. LNCS, vol. 8642, pp. 255–276. Springer, Heidelberg (2014)
2.
go back to reference Simkin, M., Schröder, D., Bulling, A., Fritz, M.: Ubic: bridging the gap between digital cryptography and the physical world. In: Kutyłowski, M., Vaidya, J. (eds.) ICAIS 2014, Part I. LNCS, vol. 8712, pp. 56–75. Springer, Heidelberg (2014) Simkin, M., Schröder, D., Bulling, A., Fritz, M.: Ubic: bridging the gap between digital cryptography and the physical world. In: Kutyłowski, M., Vaidya, J. (eds.) ICAIS 2014, Part I. LNCS, vol. 8712, pp. 56–75. Springer, Heidelberg (2014)
3.
go back to reference Truong, K.N., Patel, S.N., Summet, J.W., Abowd, G.D.: Preventing camera recording by designing a capture-resistant environment. In: Beigl, M., Intille, S.S., Rekimoto, J., Tokuda, H. (eds.) UbiComp 2005. LNCS, vol. 3660, pp. 73–86. Springer, Heidelberg (2005) CrossRef Truong, K.N., Patel, S.N., Summet, J.W., Abowd, G.D.: Preventing camera recording by designing a capture-resistant environment. In: Beigl, M., Intille, S.S., Rekimoto, J., Tokuda, H. (eds.) UbiComp 2005. LNCS, vol. 3660, pp. 73–86. Springer, Heidelberg (2005) CrossRef
4.
go back to reference Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995) Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)
5.
go back to reference Borchert, B.: Segment-based visual cryptography, Technical report WSI-2007-04. Wilhelm-Schickard-Institut für Informatik, Tübingen (2007) Borchert, B.: Segment-based visual cryptography, Technical report WSI-2007-04. Wilhelm-Schickard-Institut für Informatik, Tübingen (2007)
6.
go back to reference Dodgson, N.A.: Autostereoscopic 3D displays. IEEE Comput. 38(8), 31–36 (2005) CrossRef Dodgson, N.A.: Autostereoscopic 3D displays. IEEE Comput. 38(8), 31–36 (2005) CrossRef
Metadata
Title
Visual Cryptography and Obfuscation: A Use-Case for Decrypting and Deobfuscating Information Using Augmented Reality
Authors
Patrik Lantz
Bjorn Johansson
Martin Hell
Ben Smeets
Copyright Year
2015
Publisher
Springer Berlin Heidelberg
DOI
https://doi.org/10.1007/978-3-662-48051-9_19

Premium Partner