|
The Cursor Camouflage method shows multiple independently moving dummy cursors on the screen in addition to the standard real cursor. This makes it difficult for the attacker to identify which is the real cursor, thus making it difficult to identify which key is being typed. The user, in contrast, can identify the real cursor by observing the correlation between the hand motion and the cursor motion.
Keita Watanabe JST ERATO IGARASHI UI Project Fumito Higuchi Keio University Masahiko Inami Keio University Takeo Igarashi The University of Tokyo |