{"id":"https://openalex.org/W7147334403","doi":"https://doi.org/10.1007/s10207-026-01231-3","title":"Through the looking glass: eye tracking biometrics and the loss of anonymity in extended reality","display_name":"Through the looking glass: eye tracking biometrics and the loss of anonymity in extended reality","publication_year":2026,"publication_date":"2026-04-01","ids":{"openalex":"https://openalex.org/W7147334403","doi":"https://doi.org/10.1007/s10207-026-01231-3"},"language":"en","primary_location":{"id":"doi:10.1007/s10207-026-01231-3","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-026-01231-3","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-026-01231-3.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s10207-026-01231-3.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5006119164","display_name":"Antonios Patergianakis","orcid":"https://orcid.org/0000-0003-2284-0935"},"institutions":[{"id":"https://openalex.org/I154757721","display_name":"University of Piraeus","ror":"https://ror.org/02qs84g94","country_code":"GR","type":"education","lineage":["https://openalex.org/I154757721"]}],"countries":["GR"],"is_corresponding":true,"raw_author_name":"Antonios Patergianakis","raw_affiliation_strings":["Department of Digital Systems, University of Piraeus, Piraeus, Greece"],"affiliations":[{"raw_affiliation_string":"Department of Digital Systems, University of Piraeus, Piraeus, Greece","institution_ids":["https://openalex.org/I154757721"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5109852165","display_name":"Costas Lambrinoudakis","orcid":null},"institutions":[{"id":"https://openalex.org/I154757721","display_name":"University of Piraeus","ror":"https://ror.org/02qs84g94","country_code":"GR","type":"education","lineage":["https://openalex.org/I154757721"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Costas Lambrinoudakis","raw_affiliation_strings":["Department of Digital Systems, University of Piraeus, Piraeus, Greece"],"affiliations":[{"raw_affiliation_string":"Department of Digital Systems, University of Piraeus, Piraeus, Greece","institution_ids":["https://openalex.org/I154757721"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5006119164"],"corresponding_institution_ids":["https://openalex.org/I154757721"],"apc_list":{"value":2590,"currency":"EUR","value_usd":3190},"apc_paid":{"value":2590,"currency":"EUR","value_usd":3190},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.91691146,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":null,"biblio":{"volume":"25","issue":"2","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11707","display_name":"Gaze Tracking and Assistive Technology","score":0.9508000016212463,"subfield":{"id":"https://openalex.org/subfields/1709","display_name":"Human-Computer Interaction"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11707","display_name":"Gaze Tracking and Assistive Technology","score":0.9508000016212463,"subfield":{"id":"https://openalex.org/subfields/1709","display_name":"Human-Computer Interaction"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.005799999926239252,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11094","display_name":"Face Recognition and Perception","score":0.004000000189989805,"subfield":{"id":"https://openalex.org/subfields/2805","display_name":"Cognitive Neuroscience"},"field":{"id":"https://openalex.org/fields/28","display_name":"Neuroscience"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.7462999820709229},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.6359999775886536},{"id":"https://openalex.org/keywords/gaze","display_name":"Gaze","score":0.4742000102996826},{"id":"https://openalex.org/keywords/virtual-reality","display_name":"Virtual reality","score":0.4041000008583069},{"id":"https://openalex.org/keywords/safeguarding","display_name":"Safeguarding","score":0.38830000162124634},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.3756999969482422},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.35569998621940613},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.35429999232292175},{"id":"https://openalex.org/keywords/eye-tracking","display_name":"Eye tracking","score":0.3467999994754791}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7804999947547913},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.7462999820709229},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.6359999775886536},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5317000150680542},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.5162000060081482},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.4823000133037567},{"id":"https://openalex.org/C2779916870","wikidata":"https://www.wikidata.org/wiki/Q14467155","display_name":"Gaze","level":2,"score":0.4742000102996826},{"id":"https://openalex.org/C194969405","wikidata":"https://www.wikidata.org/wiki/Q170519","display_name":"Virtual reality","level":2,"score":0.4041000008583069},{"id":"https://openalex.org/C2776743756","wikidata":"https://www.wikidata.org/wiki/Q5097921","display_name":"Safeguarding","level":2,"score":0.38830000162124634},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.3756999969482422},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.36419999599456787},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.35569998621940613},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.35429999232292175},{"id":"https://openalex.org/C56461940","wikidata":"https://www.wikidata.org/wiki/Q970687","display_name":"Eye tracking","level":2,"score":0.3467999994754791},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.33239999413490295},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.32499998807907104},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.3237999975681305},{"id":"https://openalex.org/C46355384","wikidata":"https://www.wikidata.org/wiki/Q726686","display_name":"Compromise","level":2,"score":0.31859999895095825},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.3181000053882599},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3158999979496002},{"id":"https://openalex.org/C112356035","wikidata":"https://www.wikidata.org/wiki/Q1672722","display_name":"Iris recognition","level":3,"score":0.3149999976158142},{"id":"https://openalex.org/C69360830","wikidata":"https://www.wikidata.org/wiki/Q1172237","display_name":"Data Protection Act 1998","level":2,"score":0.3003000020980835},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.28870001435279846},{"id":"https://openalex.org/C133462117","wikidata":"https://www.wikidata.org/wiki/Q4929239","display_name":"Data collection","level":2,"score":0.2872999906539917},{"id":"https://openalex.org/C2989513435","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometric data","level":3,"score":0.2786000072956085},{"id":"https://openalex.org/C153715457","wikidata":"https://www.wikidata.org/wiki/Q254183","display_name":"Augmented reality","level":2,"score":0.2741999924182892},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.25690001249313354},{"id":"https://openalex.org/C89505385","wikidata":"https://www.wikidata.org/wiki/Q47146","display_name":"User interface","level":2,"score":0.25}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s10207-026-01231-3","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-026-01231-3","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-026-01231-3.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1007/s10207-026-01231-3","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-026-01231-3","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-026-01231-3.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.6248198747634888}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7147334403.pdf","grobid_xml":"https://content.openalex.org/works/W7147334403.grobid-xml"},"referenced_works_count":20,"referenced_works":["https://openalex.org/W1166357044","https://openalex.org/W2010395794","https://openalex.org/W2150823344","https://openalex.org/W2187920722","https://openalex.org/W2903918834","https://openalex.org/W3032172280","https://openalex.org/W3090789868","https://openalex.org/W3114965367","https://openalex.org/W3127185310","https://openalex.org/W3197888264","https://openalex.org/W4210653152","https://openalex.org/W4281621667","https://openalex.org/W4297663089","https://openalex.org/W4360990559","https://openalex.org/W4361278075","https://openalex.org/W4393044414","https://openalex.org/W4394859208","https://openalex.org/W4396733238","https://openalex.org/W4406346523","https://openalex.org/W4416381470"],"related_works":[],"abstract_inverted_index":{"Abstract":[0],"The":[1],"rapid":[2],"growth":[3],"of":[4,66,73,92,124,151,164,199,222],"extended":[5],"reality":[6,13,17],"(XR),":[7],"encompassing":[8],"technologies":[9,37,145],"such":[10],"as":[11],"virtual":[12],"(VR)":[14],"and":[15,42,78,85,149,170,182,191],"augmented":[16],"(AR),":[18],"introduces":[19],"unprecedented":[20],"challenges":[21],"in":[22,53,133,146,187],"safeguarding":[23],"personal":[24],"user":[25,40,168],"privacy.":[26],"This":[27,203],"study":[28],"explores":[29],"the":[30,47,89,138,161,196,220],"extent":[31],"to":[32,107,174,185,194,206,211],"which":[33,59],"XR":[34,144,165,200],"eye-tracking":[35,166],"biometric":[36,152,201],"can":[38],"compromise":[39],"anonymity":[41],"reveal":[43],"private":[44],"identities.":[45],"Leveraging":[46],"GazeBaseVR":[48],"dataset":[49],"(Lohr":[50],"et":[51],"al.":[52],"Sci":[54],"Data":[55],"10(1):":[56],"177,":[57],"2023),":[58],"comprises":[60],"extensive":[61],"gaze":[62,74],"data":[63],"from":[64],"hundreds":[65],"users,":[67],"we":[68,99],"extracted":[69],"a":[70,101,120,131,134],"comprehensive":[71,189],"set":[72],"features\u2013including":[75],"fixation,":[76],"saccade,":[77],"Savitzky\u2013Golay\u2013based":[79],"velocity":[80],"statistics,":[81],"along":[82],"with":[83],"position-":[84],"task-related":[86],"measures\u2013that":[87],"capture":[88],"distinctive":[90],"dynamics":[91],"individual":[93],"eye":[94,114],"movements.":[95],"Using":[96],"these":[97,156,176],"features,":[98],"trained":[100],"simple":[102],"Multi-Layer":[103],"Perceptron":[104],"(MLP)":[105],"classifier":[106],"identify":[108],"individuals":[109],"based":[110],"on":[111,126,167],"their":[112,147],"unique":[113],"movement":[115],"patterns.":[116],"Our":[117],"model":[118],"achieved":[119],"high":[121],"identification":[122],"accuracy":[123],"96.61%":[125],"identifying":[127],"users":[128],"while":[129],"watching":[130],"video":[132],"VR":[135],"environment,":[136],"underscoring":[137],"severe":[139],"privacy":[140,169,183,224],"risks":[141],"posed":[142],"by":[143],"collection":[148],"processing":[150],"data.":[153,202],"Beyond":[154],"presenting":[155],"findings,":[157],"this":[158],"research":[159,210],"highlights":[160],"broader":[162],"implications":[163],"advocates":[171,184],"robust":[172],"solutions":[173],"address":[175],"concerns.":[177],"We":[178],"urge":[179],"technologists,":[180],"policymakers,":[181],"collaborate":[186],"establishing":[188],"regulations":[190],"privacy-preserving":[192],"mechanisms":[193],"mitigate":[195],"potential":[197],"misuse":[198],"work":[204],"aims":[205],"inspire":[207],"further":[208],"interdisciplinary":[209],"ensure":[212],"that":[213],"technological":[214],"innovation":[215],"does":[216],"not":[217],"come":[218],"at":[219],"expense":[221],"fundamental":[223],"rights.":[225]},"counts_by_year":[],"updated_date":"2026-04-03T16:38:21.277918","created_date":"2026-04-02T00:00:00"}
