2019
DOI: 10.1007/978-3-030-29959-0_8
|View full text |Cite
|
Sign up to set email alerts
|

A First Look into Privacy Leakage in 3D Mixed Reality Data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 20 publications
0
4
0
Order By: Relevance
“…Users must be able to set a rich set of preferences in a simple fashion on what they wish to share, and data processing should automatically ensure that. A variety of new signal processing techniques are emerging [39] to address security in the mixed-reality world of tomorrow that will become an integral part of the 6G network. Physical layer security mechanisms [40], [41] typically depend on the uniqueness of the wireless channel to establish authentication, confidentiality and key exchange, and may become more mature in the timeframe of 6G, addressing new issues such as jamming.…”
Section: F New Security Privacy and Trust Paradigmsmentioning
confidence: 99%
“…Users must be able to set a rich set of preferences in a simple fashion on what they wish to share, and data processing should automatically ensure that. A variety of new signal processing techniques are emerging [39] to address security in the mixed-reality world of tomorrow that will become an integral part of the 6G network. Physical layer security mechanisms [40], [41] typically depend on the uniqueness of the wireless channel to establish authentication, confidentiality and key exchange, and may become more mature in the timeframe of 6G, addressing new issues such as jamming.…”
Section: F New Security Privacy and Trust Paradigmsmentioning
confidence: 99%
“…The collected studies discussing or proposing threat models consider application developers [27,29,30,32,45,59,60,70,72,74,92,126,130,139,161], servers [7,30,92,123], content creators [40,92], device manufacturers [92,131], other users [69,105,125,150], and hackers 1 [40,62,139] as the attackers in VR, or rely on general privacy threat models like Lindunn [31,34,64,70]. Based on these studies and their system decomposition, we adopt a more comprehensive and pervasive privacy-centered attacker classification for VR that encompasses the privacy repercussions of the above threat models.…”
Section: Vr Threatsmentioning
confidence: 99%
“…Ref. [84] proposed a model for preserving the security of 3D MR data (such as point clouds). This model formulated the security of 3D data and the necessary metrics using the adversarial inference model.…”
Section: Security and Privacymentioning
confidence: 99%
“…To develop security strategies, one must consider concepts such as unlinkability to specify the proper management of the user, entity, party, and links with data, flow, and process, in addition to considering the concept of plausible deniability to manage the denial of individuals (i.e., toward each other or the entity during the process) [6]. The geometry-based inference model for 3D MR could be improved by incorporating photogrammetric information such as an RGB color profile [84]. Table 3.…”
Section: Security and Privacymentioning
confidence: 99%