Privacy-preserving Scanpath Comparison for Pervasive Eye Tracking (2404.06216v1)
Abstract: As eye tracking becomes pervasive with screen-based devices and head-mounted displays, privacy concerns regarding eye-tracking data have escalated. While state-of-the-art approaches for privacy-preserving eye tracking mostly involve differential privacy and empirical data manipulations, previous research has not focused on methods for scanpaths. We introduce a novel privacy-preserving scanpath comparison protocol designed for the widely used Needleman-Wunsch algorithm, a generalized version of the edit distance algorithm. Particularly, by incorporating the Paillier homomorphic encryption scheme, our protocol ensures that no private information is revealed. Furthermore, we introduce a random processing strategy and a multi-layered masking method to obfuscate the values while preserving the original order of encrypted editing operation costs. This minimizes communication overhead, requiring a single communication round for each iteration of the Needleman-Wunsch process. We demonstrate the efficiency and applicability of our protocol on three publicly available datasets with comprehensive computational performance analyses and make our source code publicly accessible.
- A ground-truth data set and a classification algorithm for eye movements in 360-degree videos. arXiv preprint arXiv:1903.06474 (2019).
- A comparison of scanpath comparison methods. Behavior research methods 47 (2015), 1377–1392.
- Privacy-preserving search of similar patients in genomic data. Cryptology ePrint Archive (2017).
- Secure and private sequence comparisons. In Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society. 39–44.
- Ofer Avital. 2015. Method and system of using eye tracking to evaluate subjects. US Patent App. 14/681,083.
- Protecting and evaluating genomic privacy in medical tests and personalized medicine. In Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society. 95–106.
- Secure approximation of edit distance on genomic data. BMC medical genomics 10 (2017), 55–67.
- Nature and Nurture in Own-Race Face Processing. Psychological Science 17, 2 (2006), 159–163. https://doi.org/10.1111/j.1467-9280.2006.01679.x
- Recommendation for pair-wise key-establishment using integer factorization cryptography. Technical Report. National Institute of Standards and Technology.
- Ali Borji and Laurent Itti. 2012. State-of-the-art in visual attention modeling. IEEE transactions on pattern analysis and machine intelligence 35, 1 (2012), 185–207.
- Differential privacy for eye tracking with temporal correlations. PLOS ONE 16, 8 (2021), 1–22. https://doi.org/10.1371/journal.pone.0255979
- Privacy Preserving Gaze Estimation Using Synthetic Images via a Randomized Encoding Based Framework. In ACM Symposium on Eye Tracking Research and Applications. ACM. https://doi.org/10.1145/3379156.3391364
- Eye-tracked Virtual Reality: A Comprehensive Survey on Methods and Privacy Challenges. https://doi.org/10.48550/arXiv.2305.14080 arXiv:2305.14080 [cs.HC]
- Stephan A Brandt and Lawrence W Stark. 1997. Spontaneous eye movements during visual imagery reflect the content of the visual scene. Journal of cognitive neuroscience 9, 1 (1997), 27–38.
- Eye movements in code reading: Relaxing the linear order. In 2015 IEEE 23rd International Conference on Program Comprehension. IEEE, 255–265.
- Scanpath Comparison in Medical Image Reading Skills of Dental Students: Distinguishing Stages of Expertise Development. In Proceedings of the 2018 ACM Symposium on Eye Tracking Research & Applications. ACM. https://doi.org/10.1145/3204493.3204550
- Scanpath comparison in medical image reading skills of dental students: distinguishing stages of expertise development. In Proceedings of the 2018 ACM Symposium on Eye Tracking Research & Applications. 1–9.
- Homomorphic computation of edit distance. In Financial Cryptography and Data Security: FC 2015 International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015, Revised Selected Papers. Springer, 194–212.
- ScanMatch: A novel method for comparing fixation sequences. Behavior research methods 42 (2010), 692–700.
- Ivan Damgrd and Mads Jurik. 2001. A generalisation, a simplification and some applications of Paillier’s probabilistic public-key system. In Public Key Cryptography: 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2001 Cheju Island, Korea, February 13–15, 2001 Proceedings 4. Springer, 119–136.
- A generalization of Paillier’s public-key system with applications to electronic voting. International Journal of Information Security 9 (2010), 371–385.
- For Your Eyes Only: Privacy-Preserving Eye-Tracking Datasets. In 2022 Symposium on Eye Tracking Research and Applications. ACM. https://doi.org/10.1145/3517031.3529618
- Privacy-preserving datasets of eye-tracking samples with applications in XR. IEEE Transactions on Visualization and Computer Graphics 29, 5 (2023), 2774–2784. https://doi.org/10.1109/TVCG.2023.3247048
- A privacy-preserving approach to streaming eye-tracking data. IEEE Transactions on Visualization and Computer Graphics 27, 5 (2021), 2555–2565. https://doi.org/10.1109/TVCG.2021.3067787
- Rong-Fuh Day. 2010. Examining the validity of the Needleman–Wunsch algorithm in identifying decision strategy with eye-movement data. Decision Support Systems 49, 4 (2010), 396–403.
- Federated Learning for Appearance-based Gaze Estimation in the Wild. In Proceedings of The 1st Gaze Meets ML workshop (Proceedings of Machine Learning Research, Vol. 210). PMLR, 20–36. https://proceedings.mlr.press/v210/elfares23a.html
- Autism Detection Based on Eye Movement Sequences on the Web: A Scanpath Trend Analysis Approach. In Proceedings of the 17th International Web for All Conference. ACM. https://doi.org/10.1145/3371300.3383340
- Ramin Fahimi and Neil DB Bruce. 2021. On metrics for measuring scanpath similarity. Behavior Research Methods 53 (2021), 609–628.
- Ronald Aylmer Fisher and Frank Yates. 1953. Statistical tables for biological, agricultural, and medical research. Hafner Publishing Company.
- Mathieu Fourment and Michael R Gillings. 2008. A comparison of common programming languages used in bioinformatics. BMC bioinformatics 9 (2008), 1–9.
- Reinforcement Learning for the Privacy Preservation and Manipulation of Eye Tracking Data. In Artificial Neural Networks and Machine Learning – ICANN 2021. Springer International Publishing, 595–607.
- A MinHash approach for fast scanpath classification. In ACM Symposium on Eye Tracking Research and Applications. 1–9.
- GMP. 2023. GNU MP: The GNU Multiple Precision Arithmetic Library (6.2.1 ed.). http://gmplib.org/.
- Body mass index moderates gaze orienting biases and pupil diameter to high and low calorie food images. Appetite 56, 3 (2011), 577–586. https://doi.org/10.1016/j.appet.2011.01.029
- Privacy-Aware Eye Tracking: Challenges and Future Directions. IEEE Pervasive Computing 22, 1 (2023), 95–102. https://doi.org/10.1109/MPRV.2022.3228660
- Katarzyna Harezlak and Pawel Kasprowski. 2018. Application of eye tracking in medicine: A survey, research issues and challenges. Computerized Medical Imaging and Graphics 65 (2018), 176–190.
- Ehtask: Recognizing user tasks from eye and head movements in immersive virtual reality. IEEE Transactions on Visualization and Computer Graphics (2021).
- International Organization for Standardization. 2019. IT Security techniques - Encryption algorithms - Part 6: Homomorphic encryption. https://www.iso.org/standard/67740.html. ISO/IEC 18033-6:2019, Accessed on 2023-10-05.
- Towards practical privacy for genomic computation. In 2008 IEEE Symposium on Security and Privacy (sp 2008). IEEE, 216–230.
- Sheree Josephson and Michael E Holmes. 2002. Attention to repeated images on the World-Wide Web: Another look at scanpath theory. Behavior Research Methods, Instruments, & Computers 34, 4 (2002), 539–548.
- A cryptographic approach to securely share and query genomic sequences. IEEE Transactions on information technology in biomedicine 12, 5 (2008), 606–617.
- The Role of Eye Gaze in Security and Privacy Applications: Survey and Future HCI Research Directions. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. Association for Computing Machinery, 21 pages. https://doi.org/10.1145/3313831.3376840
- What Does Your Gaze Reveal About You? On the Privacy Implications of Eye Tracking. Springer International Publishing, 226–241. https://doi.org/10.1007/978-3-030-42504-3_15
- Bruno Laeng and Liv Falkenberg. 2007. Women’s pupillary responses to sexually significant others during the hormonal cycle. Hormones and Behavior 52, 4 (2007), 520–530. https://doi.org/10.1016/j.yhbeh.2007.07.013
- Vladimir I Levenshtein et al. 1966. Binary codes capable of correcting deletions, insertions, and reversals. In Soviet physics doklady, Vol. 10. Soviet Union, 707–710.
- Kalϵitalic-ϵ\epsilonitalic_ϵido: Real-Time Privacy Control for Eye-Tracking Systems. In USENIX Security Symposium. USENIX Association.
- Daniel J. Liebling and Sören Preibusch. 2014. Privacy Considerations for a Pervasive Eye Tracking World. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication. ACM, 1169–1177. https://doi.org/10.1145/2638728.2641688
- Differential Privacy for Eye-Tracking Data. In Proceedings of the 11th ACM Symposium on Eye Tracking Research & Applications. ACM. https://doi.org/10.1145/3314111.3319823
- Privacy-preserving edit distance computation using secret-sharing two-party computation. Cryptology ePrint Archive (2023).
- Saul B Needleman and Christian D Wunsch. 1970. A general method applicable to the search for similarities in the amino acid sequence of two proteins. Journal of molecular biology 48, 3 (1970), 443–453.
- David Noton and Lawrence Stark. 1971. Scanpaths in eye movements during pattern perception. Science 171, 3968 (1971), 308–311.
- Pascal Paillier. 1999. Public-key cryptosystems based on composite degree residuosity classes. In International conference on the theory and applications of cryptographic techniques. Springer, 223–238.
- Energy efficiency across programming languages: how do energy, time, and memory relate?. In Proceedings of the 10th ACM SIGPLAN international conference on software language engineering. 256–267.
- A dataset of head and eye movements for 360 degree images. In Proceedings of the 8th ACM on Multimedia Systems Conference. 205–210.
- Which saliency weighting for omni directional image quality assessment?. In 2017 Ninth International Conference on Quality of Multimedia Experience (QoMEX). IEEE, 1–6.
- Shantanu Rane and Wei Sun. 2010. Privacy preserving string comparisons based on Levenshtein distance. In 2010 IEEE international workshop on information forensics and security. IEEE, 1–6.
- Thomas Schneider and Oleksandr Tkachenko. 2019. EPISODE: Efficient privacy-preserving similar sequence queries on outsourced genomic databases. In Proceedings of the 2019 ACM Asia conference on computer and communications security. 315–327.
- Eye Tracking Support for Visual Analytics Systems: Foundations, Current Applications, and Research Challenges. In Proceedings of the 11th ACM Symposium on Eye Tracking Research & Applications. ACM. https://doi.org/10.1145/3314111.3319919
- Identification of common molecular subsequences. Journal of molecular biology 147, 1 (1981), 195–197.
- Privacy-Aware Eye Tracking Using Differential Privacy. In Proceedings of the 11th ACM Symposium on Eye Tracking Research & Applications. ACM. https://doi.org/10.1145/3314111.3319915
- Robert A Wagner and Michael J Fischer. 1974. The string-to-string correction problem. Journal of the ACM (JACM) 21, 1 (1974), 168–173.
- Efficient genome-wide, privacy-preserving similar patient query based on private edit distance. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. 492–503.
- Video-Based Eye Tracking in Sex Research: A Systematic Literature Review. The Journal of Sex Research 53, 8 (2016), 1008–1019. https://doi.org/10.1080/00224499.2015.1107524
- eyePatterns: software for identifying patterns and similarities across fixation sequences. In Proceedings of the 2006 symposium on Eye tracking research & applications. 149–154.
- Eye-Movement Behavior Reveals Relational Memory Impairment in Schizophrenia. Biological Psychiatry 68, 7 (2010), 617–624. https://doi.org/10.1016/j.biopsych.2010.05.035
- Andrew Chi-Chih Yao. 1986. How to generate and exchange secrets. In 27th annual symposium on foundations of computer science (Sfcs 1986). IEEE, 162–167.
- Faster Privacy-Preserving Computation of Edit Distance with Moves. In International Workshop on Algorithms and Computation. Springer, 308–320.
- Efficient and privacy-preserving edit distance query over encrypted genomic data. In 2019 11th International Conference on Wireless Communications and Signal Processing (WCSP). IEEE, 1–6.
- A Scanpath Analysis of the Risky Decision-Making Process. Journal of Behavioral Decision Making 29, 2-3 (2016), 169–182. https://doi.org/10.1002/bdm.1943
- Ruiyu Zhu and Yan Huang. 2020. Efficient and precise secure generalized edit distance and beyond. IEEE transactions on dependable and secure computing 19, 1 (2020), 579–590.