SafetyPIN: Secure PIN Entry Through Eye Tracking

  • Mythreya Seetharama
  • Volker Paelke
  • Carsten RöckerEmail author
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9190)


When a user enters a personal identification number (PIN) into an automated teller machine or a point of sale terminal, there is a risk of some one watching from behind, trying to guess the PIN code. Such shoulder-surfing is a major security threat. In order to overcome this problem different PIN entry methods have been suggested. In this regard, gaze interaction methods are receiving attention in recent years, owing to the lowering cost of eye tracking technology. In this paper, we present SafetyPIN - an eye tracking based PIN entry system - which is aimed at making the PIN entry more secure with the help of an eye tracking device. We discuss the implementation and the initial evaluation of this system.


PIN entry Eye tracking Security Usability Point of sale terminals 


  1. 1.
    Roth, V., Richter, K., Freidinger, R.: A PIN-entry method resilient against shoulder surfing. In: Proceedings of the ACM conference on Computer and communications security (CCS 2004), New York pp. 236–245 (2004)Google Scholar
  2. 2.
    Sasamoto, H., Christin, N., Hayashi, E.: Undercover: authentication usable in front of prying eyes. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI 2008), Florence, pp. 183–192 (2008)Google Scholar
  3. 3.
    Ware, C., Mikaelian, H.: An evaluation of an eye tracker as a device for computer input. In: Proceedings of CHI 1987, Toronto (1987)Google Scholar
  4. 4.
    Kumar, M., Garfinkel, T., Boneh, D., Winograd, T.: Reducing shoulder-surfing by using gaze-based password entry. In: Proceedings of the 3rd Symposium on Usable Privacy and Security, pp. 13–19. ACM (2007)Google Scholar
  5. 5.
    De Luca, A., Weiss, R., Drewes, H.: Evaluation of eye-gaze interaction methods for security enhanced PIN-entry. In: Proceedings of the 19th Australasian Conference on Computer-human Interaction: Entertaining User Interfaces, pp. 199–202. ACM (2007)Google Scholar
  6. 6.
    Drewes, H., Schmidt, A.: Interacting with the computer using gaze gestures. In: Baranauskas, C., Abascal, J., Barbosa, S.D.J. (eds.) INTERACT 2007. LNCS, vol. 4663, pp. 475–488. Springer, Heidelberg (2007) Google Scholar
  7. 7.
    Drewes, H., De Luca, A., Schmidt, A.: Eye-gaze interaction for mobile phones. In: Proceedings of the 4th International Conference on Mobile Technology, Applications, and Systems and the 1st International Symposium on Computer Human Interaction in Mobile Technology, pp. 364–371. ACM (2007)Google Scholar
  8. 8.
    Forget, A., Chiasson, S., Biddle, R.: Shoulder-surfing resistance with eye-gaze entry in cued-recall graphical passwords. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 1107–1110. ACM (2010)Google Scholar
  9. 9.
    Dunphy, P., Fitch, A., Olivier, P.: Gaze-contingent passwords at the ATM. In: 4th Conference on Communication by Gaze Interaction (COGAIN), pp. 59–62 (2008)Google Scholar
  10. 10.
    Tobii EyeX SDK for C/C++, Developer’s Guide. Tobii Technology (2014)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  • Mythreya Seetharama
    • 1
  • Volker Paelke
    • 2
  • Carsten Röcker
    • 3
    Email author
  1. 1.Ostwesfalen-Lippe University of Applied SciencesLemgoGermany
  2. 2.Bremen University of Applied SciencesBremenGermany
  3. 3.Ostwestfalen-Lippe University of Applied Sciences and Fraunhofer IOSB-INALemgoGermany

Personalised recommendations