Protecting mobile users from visual privacy attacks

Mohammed Eunus Ali, Anika Anwar, Ishrat Ahmed, Tanzima Hashem, Lars Kulik, Egemen Tanin

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

17 Citations (Scopus)

Abstract

An increasing number of people are using mobile devices in public places such as buses, trains, airports, coffee shops, and restaurants. Though the exibility to work remotely using mobile devices make people more productive, this new working practice incurs un-authorized visual access of the mobile display by the bystanders, which we call visual privacy attack. Failing to prevent un-authorized people viewing sensitive information such as passwords, emails, and business information could lead to financial loss, public exposure, and embarrassment. In this paper, we propose a solution that captures the surrounding environment through user's mobile phone camera and determines whether any un-authorized person is obtaining visual access to the user's mobile screen. We develop an Android application, iAlert, that runs as a background process on a user's mobile device and alerts the user based on whether or not the displayed text on the screen is readable by bystanders.

Original languageEnglish
Title of host publicationUbiComp 2014 - Adjunct Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing
PublisherAssociation for Computing Machinery (ACM)
Pages1-4
Number of pages4
ISBN (Electronic)9781450330473
DOIs
Publication statusPublished - 2014
Externally publishedYes
EventACM International Joint Conference on Pervasive and Ubiquitous Computing 2014 - Motif Seattle Hotel, Seattle, United States of America
Duration: 13 Sept 201417 Sept 2014
http://www.ubicomp.org/ubicomp2014/
http://ubicomp.org/ubicomp2014/

Conference

ConferenceACM International Joint Conference on Pervasive and Ubiquitous Computing 2014
Abbreviated titleUbiComp 2014
Country/TerritoryUnited States of America
CitySeattle
Period13/09/1417/09/14
Internet address

Keywords

  • Shoulder surfing
  • Visual privacy

Cite this