Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
97 tokens/sec
GPT-4o
53 tokens/sec
Gemini 2.5 Pro Pro
44 tokens/sec
o3 Pro
5 tokens/sec
GPT-4.1 Pro
47 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Privacy-preserving Scanpath Comparison for Pervasive Eye Tracking (2404.06216v1)

Published 9 Apr 2024 in cs.CR and cs.HC

Abstract: As eye tracking becomes pervasive with screen-based devices and head-mounted displays, privacy concerns regarding eye-tracking data have escalated. While state-of-the-art approaches for privacy-preserving eye tracking mostly involve differential privacy and empirical data manipulations, previous research has not focused on methods for scanpaths. We introduce a novel privacy-preserving scanpath comparison protocol designed for the widely used Needleman-Wunsch algorithm, a generalized version of the edit distance algorithm. Particularly, by incorporating the Paillier homomorphic encryption scheme, our protocol ensures that no private information is revealed. Furthermore, we introduce a random processing strategy and a multi-layered masking method to obfuscate the values while preserving the original order of encrypted editing operation costs. This minimizes communication overhead, requiring a single communication round for each iteration of the Needleman-Wunsch process. We demonstrate the efficiency and applicability of our protocol on three publicly available datasets with comprehensive computational performance analyses and make our source code publicly accessible.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (70)
  1. A ground-truth data set and a classification algorithm for eye movements in 360-degree videos. arXiv preprint arXiv:1903.06474 (2019).
  2. A comparison of scanpath comparison methods. Behavior research methods 47 (2015), 1377–1392.
  3. Privacy-preserving search of similar patients in genomic data. Cryptology ePrint Archive (2017).
  4. Secure and private sequence comparisons. In Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society. 39–44.
  5. Ofer Avital. 2015. Method and system of using eye tracking to evaluate subjects. US Patent App. 14/681,083.
  6. Protecting and evaluating genomic privacy in medical tests and personalized medicine. In Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society. 95–106.
  7. Secure approximation of edit distance on genomic data. BMC medical genomics 10 (2017), 55–67.
  8. Nature and Nurture in Own-Race Face Processing. Psychological Science 17, 2 (2006), 159–163. https://doi.org/10.1111/j.1467-9280.2006.01679.x
  9. Recommendation for pair-wise key-establishment using integer factorization cryptography. Technical Report. National Institute of Standards and Technology.
  10. Ali Borji and Laurent Itti. 2012. State-of-the-art in visual attention modeling. IEEE transactions on pattern analysis and machine intelligence 35, 1 (2012), 185–207.
  11. Differential privacy for eye tracking with temporal correlations. PLOS ONE 16, 8 (2021), 1–22. https://doi.org/10.1371/journal.pone.0255979
  12. Privacy Preserving Gaze Estimation Using Synthetic Images via a Randomized Encoding Based Framework. In ACM Symposium on Eye Tracking Research and Applications. ACM. https://doi.org/10.1145/3379156.3391364
  13. Eye-tracked Virtual Reality: A Comprehensive Survey on Methods and Privacy Challenges. https://doi.org/10.48550/arXiv.2305.14080 arXiv:2305.14080 [cs.HC]
  14. Stephan A Brandt and Lawrence W Stark. 1997. Spontaneous eye movements during visual imagery reflect the content of the visual scene. Journal of cognitive neuroscience 9, 1 (1997), 27–38.
  15. Eye movements in code reading: Relaxing the linear order. In 2015 IEEE 23rd International Conference on Program Comprehension. IEEE, 255–265.
  16. Scanpath Comparison in Medical Image Reading Skills of Dental Students: Distinguishing Stages of Expertise Development. In Proceedings of the 2018 ACM Symposium on Eye Tracking Research & Applications. ACM. https://doi.org/10.1145/3204493.3204550
  17. Scanpath comparison in medical image reading skills of dental students: distinguishing stages of expertise development. In Proceedings of the 2018 ACM Symposium on Eye Tracking Research & Applications. 1–9.
  18. Homomorphic computation of edit distance. In Financial Cryptography and Data Security: FC 2015 International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015, Revised Selected Papers. Springer, 194–212.
  19. ScanMatch: A novel method for comparing fixation sequences. Behavior research methods 42 (2010), 692–700.
  20. Ivan Damgrd and Mads Jurik. 2001. A generalisation, a simplification and some applications of Paillier’s probabilistic public-key system. In Public Key Cryptography: 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2001 Cheju Island, Korea, February 13–15, 2001 Proceedings 4. Springer, 119–136.
  21. A generalization of Paillier’s public-key system with applications to electronic voting. International Journal of Information Security 9 (2010), 371–385.
  22. For Your Eyes Only: Privacy-Preserving Eye-Tracking Datasets. In 2022 Symposium on Eye Tracking Research and Applications. ACM. https://doi.org/10.1145/3517031.3529618
  23. Privacy-preserving datasets of eye-tracking samples with applications in XR. IEEE Transactions on Visualization and Computer Graphics 29, 5 (2023), 2774–2784. https://doi.org/10.1109/TVCG.2023.3247048
  24. A privacy-preserving approach to streaming eye-tracking data. IEEE Transactions on Visualization and Computer Graphics 27, 5 (2021), 2555–2565. https://doi.org/10.1109/TVCG.2021.3067787
  25. Rong-Fuh Day. 2010. Examining the validity of the Needleman–Wunsch algorithm in identifying decision strategy with eye-movement data. Decision Support Systems 49, 4 (2010), 396–403.
  26. Federated Learning for Appearance-based Gaze Estimation in the Wild. In Proceedings of The 1st Gaze Meets ML workshop (Proceedings of Machine Learning Research, Vol. 210). PMLR, 20–36. https://proceedings.mlr.press/v210/elfares23a.html
  27. Autism Detection Based on Eye Movement Sequences on the Web: A Scanpath Trend Analysis Approach. In Proceedings of the 17th International Web for All Conference. ACM. https://doi.org/10.1145/3371300.3383340
  28. Ramin Fahimi and Neil DB Bruce. 2021. On metrics for measuring scanpath similarity. Behavior Research Methods 53 (2021), 609–628.
  29. Ronald Aylmer Fisher and Frank Yates. 1953. Statistical tables for biological, agricultural, and medical research. Hafner Publishing Company.
  30. Mathieu Fourment and Michael R Gillings. 2008. A comparison of common programming languages used in bioinformatics. BMC bioinformatics 9 (2008), 1–9.
  31. Reinforcement Learning for the Privacy Preservation and Manipulation of Eye Tracking Data. In Artificial Neural Networks and Machine Learning – ICANN 2021. Springer International Publishing, 595–607.
  32. A MinHash approach for fast scanpath classification. In ACM Symposium on Eye Tracking Research and Applications. 1–9.
  33. GMP. 2023. GNU MP: The GNU Multiple Precision Arithmetic Library (6.2.1 ed.). http://gmplib.org/.
  34. Body mass index moderates gaze orienting biases and pupil diameter to high and low calorie food images. Appetite 56, 3 (2011), 577–586. https://doi.org/10.1016/j.appet.2011.01.029
  35. Privacy-Aware Eye Tracking: Challenges and Future Directions. IEEE Pervasive Computing 22, 1 (2023), 95–102. https://doi.org/10.1109/MPRV.2022.3228660
  36. Katarzyna Harezlak and Pawel Kasprowski. 2018. Application of eye tracking in medicine: A survey, research issues and challenges. Computerized Medical Imaging and Graphics 65 (2018), 176–190.
  37. Ehtask: Recognizing user tasks from eye and head movements in immersive virtual reality. IEEE Transactions on Visualization and Computer Graphics (2021).
  38. International Organization for Standardization. 2019. IT Security techniques - Encryption algorithms - Part 6: Homomorphic encryption. https://www.iso.org/standard/67740.html. ISO/IEC 18033-6:2019, Accessed on 2023-10-05.
  39. Towards practical privacy for genomic computation. In 2008 IEEE Symposium on Security and Privacy (sp 2008). IEEE, 216–230.
  40. Sheree Josephson and Michael E Holmes. 2002. Attention to repeated images on the World-Wide Web: Another look at scanpath theory. Behavior Research Methods, Instruments, & Computers 34, 4 (2002), 539–548.
  41. A cryptographic approach to securely share and query genomic sequences. IEEE Transactions on information technology in biomedicine 12, 5 (2008), 606–617.
  42. The Role of Eye Gaze in Security and Privacy Applications: Survey and Future HCI Research Directions. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. Association for Computing Machinery, 21 pages. https://doi.org/10.1145/3313831.3376840
  43. What Does Your Gaze Reveal About You? On the Privacy Implications of Eye Tracking. Springer International Publishing, 226–241. https://doi.org/10.1007/978-3-030-42504-3_15
  44. Bruno Laeng and Liv Falkenberg. 2007. Women’s pupillary responses to sexually significant others during the hormonal cycle. Hormones and Behavior 52, 4 (2007), 520–530. https://doi.org/10.1016/j.yhbeh.2007.07.013
  45. Vladimir I Levenshtein et al. 1966. Binary codes capable of correcting deletions, insertions, and reversals. In Soviet physics doklady, Vol. 10. Soviet Union, 707–710.
  46. Kalϵitalic-ϵ\epsilonitalic_ϵido: Real-Time Privacy Control for Eye-Tracking Systems. In USENIX Security Symposium. USENIX Association.
  47. Daniel J. Liebling and Sören Preibusch. 2014. Privacy Considerations for a Pervasive Eye Tracking World. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication. ACM, 1169–1177. https://doi.org/10.1145/2638728.2641688
  48. Differential Privacy for Eye-Tracking Data. In Proceedings of the 11th ACM Symposium on Eye Tracking Research & Applications. ACM. https://doi.org/10.1145/3314111.3319823
  49. Privacy-preserving edit distance computation using secret-sharing two-party computation. Cryptology ePrint Archive (2023).
  50. Saul B Needleman and Christian D Wunsch. 1970. A general method applicable to the search for similarities in the amino acid sequence of two proteins. Journal of molecular biology 48, 3 (1970), 443–453.
  51. David Noton and Lawrence Stark. 1971. Scanpaths in eye movements during pattern perception. Science 171, 3968 (1971), 308–311.
  52. Pascal Paillier. 1999. Public-key cryptosystems based on composite degree residuosity classes. In International conference on the theory and applications of cryptographic techniques. Springer, 223–238.
  53. Energy efficiency across programming languages: how do energy, time, and memory relate?. In Proceedings of the 10th ACM SIGPLAN international conference on software language engineering. 256–267.
  54. A dataset of head and eye movements for 360 degree images. In Proceedings of the 8th ACM on Multimedia Systems Conference. 205–210.
  55. Which saliency weighting for omni directional image quality assessment?. In 2017 Ninth International Conference on Quality of Multimedia Experience (QoMEX). IEEE, 1–6.
  56. Shantanu Rane and Wei Sun. 2010. Privacy preserving string comparisons based on Levenshtein distance. In 2010 IEEE international workshop on information forensics and security. IEEE, 1–6.
  57. Thomas Schneider and Oleksandr Tkachenko. 2019. EPISODE: Efficient privacy-preserving similar sequence queries on outsourced genomic databases. In Proceedings of the 2019 ACM Asia conference on computer and communications security. 315–327.
  58. Eye Tracking Support for Visual Analytics Systems: Foundations, Current Applications, and Research Challenges. In Proceedings of the 11th ACM Symposium on Eye Tracking Research & Applications. ACM. https://doi.org/10.1145/3314111.3319919
  59. Identification of common molecular subsequences. Journal of molecular biology 147, 1 (1981), 195–197.
  60. Privacy-Aware Eye Tracking Using Differential Privacy. In Proceedings of the 11th ACM Symposium on Eye Tracking Research & Applications. ACM. https://doi.org/10.1145/3314111.3319915
  61. Robert A Wagner and Michael J Fischer. 1974. The string-to-string correction problem. Journal of the ACM (JACM) 21, 1 (1974), 168–173.
  62. Efficient genome-wide, privacy-preserving similar patient query based on private edit distance. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. 492–503.
  63. Video-Based Eye Tracking in Sex Research: A Systematic Literature Review. The Journal of Sex Research 53, 8 (2016), 1008–1019. https://doi.org/10.1080/00224499.2015.1107524
  64. eyePatterns: software for identifying patterns and similarities across fixation sequences. In Proceedings of the 2006 symposium on Eye tracking research & applications. 149–154.
  65. Eye-Movement Behavior Reveals Relational Memory Impairment in Schizophrenia. Biological Psychiatry 68, 7 (2010), 617–624. https://doi.org/10.1016/j.biopsych.2010.05.035
  66. Andrew Chi-Chih Yao. 1986. How to generate and exchange secrets. In 27th annual symposium on foundations of computer science (Sfcs 1986). IEEE, 162–167.
  67. Faster Privacy-Preserving Computation of Edit Distance with Moves. In International Workshop on Algorithms and Computation. Springer, 308–320.
  68. Efficient and privacy-preserving edit distance query over encrypted genomic data. In 2019 11th International Conference on Wireless Communications and Signal Processing (WCSP). IEEE, 1–6.
  69. A Scanpath Analysis of the Risky Decision-Making Process. Journal of Behavioral Decision Making 29, 2-3 (2016), 169–182. https://doi.org/10.1002/bdm.1943
  70. Ruiyu Zhu and Yan Huang. 2020. Efficient and precise secure generalized edit distance and beyond. IEEE transactions on dependable and secure computing 19, 1 (2020), 579–590.
User Edit Pencil Streamline Icon: https://streamlinehq.com
Authors (3)
  1. Efe Bozkir (26 papers)
  2. Enkelejda Kasneci (97 papers)
  3. Suleyman Ozdel (6 papers)
Citations (2)

Summary

We haven't generated a summary for this paper yet.