Advanced

Visual Cryptography and Obfuscation: A Use-Case for Decrypting and Deobfuscating Information using Augmented Reality

Lantz, Patrik LU ; Johansson, Björn; Hell, Martin LU and Smeets, Ben LU (2015) 1st Workshop on Wearable Security and Privacy, Financial Crypto In Lecture Notes in Computer Science 8976. p.261-273
Abstract
As new technologies emerge such as wearables, it opens up for new challenges, especially related to security and privacy. One such recent technology is smart glasses. The use of glasses introduces security and privacy concerns for the general public but also for the user itself. In this paper we present ongoing theoretical work which focus on privacy of the user during authentication. We propose and analyze two methods, visual cryptography and obfuscation for protecting the user against HUD and camera logging adversaries as well as shoulder-surfing.
Please use this url to cite or link to this publication:
author
organization
publishing date
type
Chapter in Book/Report/Conference proceeding
publication status
published
subject
keywords
Visual Cryptography, Visual Obfuscation, Augmented Reality, Wearables
in
Lecture Notes in Computer Science
editor
Brenner, Michael; Christin, Nicolas; Johnson, Benjamin; Rohloff, Kurt; ; ; and
volume
8976
pages
13 pages
publisher
Springer
conference name
1st Workshop on Wearable Security and Privacy, Financial Crypto
external identifiers
  • wos:000365880900019
  • scopus:84950255019
ISSN
0302-9743
1611-3349
ISBN
978-3-662-48051-9
DOI
10.1007/978-3-662-48051-9_19
language
English
LU publication?
yes
id
b22fb318-0339-459f-8ceb-ebed54a1247f (old id 4862913)
date added to LUP
2014-12-15 12:24:56
date last changed
2018-05-29 10:56:48
@inproceedings{b22fb318-0339-459f-8ceb-ebed54a1247f,
  abstract     = {As new technologies emerge such as wearables, it opens up for new challenges, especially related to security and privacy. One such recent technology is smart glasses. The use of glasses introduces security and privacy concerns for the general public but also for the user itself. In this paper we present ongoing theoretical work which focus on privacy of the user during authentication. We propose and analyze two methods, visual cryptography and obfuscation for protecting the user against HUD and camera logging adversaries as well as shoulder-surfing.},
  author       = {Lantz, Patrik and Johansson, Björn and Hell, Martin and Smeets, Ben},
  booktitle    = {Lecture Notes in Computer Science},
  editor       = {Brenner, Michael and Christin, Nicolas and Johnson, Benjamin and Rohloff, Kurt},
  isbn         = {978-3-662-48051-9},
  issn         = {0302-9743},
  keyword      = {Visual Cryptography,Visual Obfuscation,Augmented Reality,Wearables},
  language     = {eng},
  pages        = {261--273},
  publisher    = {Springer},
  title        = {Visual Cryptography and Obfuscation: A Use-Case for Decrypting and Deobfuscating Information using Augmented Reality},
  url          = {http://dx.doi.org/10.1007/978-3-662-48051-9_19},
  volume       = {8976},
  year         = {2015},
}