| The Cursor Camouflage method shows multiple independently moving dummy cursors on the screen in addition to the standard real cursor. This makes it difficult for the attacker to identify which is the real cursor, thus making it difficult to identify which key is being typed. The user, in contrast, can identify the real cursor by observing the correlation between the hand motion and the cursor motion.
JST ERATO IGARASHI UI Project
The University of Tokyo