As Augmented and Virtual Reality (AR/VR) advances, secure and user-friendly authentication becomes vital. We evaluated 17 authentication schemes across gaze, gesture, PIN, spatial, and recognition-based categories using a systematic framework focused on effectiveness, security, and usability. Our analysis revealed varied performance and significant gaps requiring standardized methods. For example, Beat-PIN demonstrated strong security with 140-bit entropy, while RubikAuth achieved high usability with authentication times of 1.69 seconds. Gaze-based methods, though innovative, faced accuracy issues. We also observed a preference for schemes like In-Air Handwriting and Things, which balanced security and ease of use. By extending Bonneau et al.'s framework [5] to develop an AR/VR-specific evaluation model, we identified schemes like RubikAuth and Things as particularly promising for AR/VR. This study highlights the strengths and limitations of current methods and emphasizes the need for cross-modal and context-aware techniques to advance AR/VR authentication.

Download full-text PDF

Source
http://dx.doi.org/10.1109/TVCG.2025.3549862DOI Listing

Publication Analysis

Top Keywords

authentication schemes
8
augmented virtual
8
virtual reality
8
authentication
5
pins gestures
4
gestures analyzing
4
analyzing knowledge-based
4
knowledge-based authentication
4
schemes
4
schemes augmented
4

Similar Publications

As Augmented and Virtual Reality (AR/VR) advances, secure and user-friendly authentication becomes vital. We evaluated 17 authentication schemes across gaze, gesture, PIN, spatial, and recognition-based categories using a systematic framework focused on effectiveness, security, and usability. Our analysis revealed varied performance and significant gaps requiring standardized methods.

View Article and Find Full Text PDF

With the continuous development of Airborne Wireless Sensor Networks (AWSN) in airplane monitoring systems, security isolation is facing increasingly serious insider threats. Due to the real-time bi-directional data exchange, attackers can exploit compromised nodes as the springboard to infiltrate the aircraft control domain and airline information services domain, thus stealing sensitive data or doing damage. However, existing zero-trust schemes have centralized deployment bottlenecks and static identity authentication problems, so it is difficult to combat insider threats caused by compromised nodes in the AWSN environments.

View Article and Find Full Text PDF

Biometric authentication relies on an individual's physiological or behavioral traits to verify their identity before granting access permission to a system or device without remembering anything. Although electrocardiograms (ECGs) have been considered a biometric trait, an ECG biometric recognition system that operates in verification mode is rarely considered. This study proposes two two-factor cancelable biometric verification schemes that enable identity recognition using ECGs.

View Article and Find Full Text PDF

The healthcare industry, aided by technology, leverages the Internet of Things (IoT) paradigm to offer patient/user-related services that are ubiquitous and personalized. The authorized repository stores ubiquitous data for which access-level securities are granted. These security measures ensure that only authorized entities can access patient/user health information, preventing unauthorized entries and data downloads.

View Article and Find Full Text PDF

Tissue semantic segmentation is one of the key tasks in computational pathology. To avoid the expensive and laborious acquisition of pixel-level annotations, a wide range of studies attempt to adopt the class activation map (CAM), a weakly-supervised learning scheme, to achieve pixel-level tissue segmentation. However, CAM-based methods are prone to suffer from under-activation and over-activation issues, leading to poor segmentation performance.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!