977 research outputs found

    BioSecure: white paper for research in biometrics beyond BioSecure

    Get PDF
    This report is the output of a consultation process of various major stakeholders in the biometric community to identify the future biometrical research issues, an activity which employed not only researchers but representatives from the entire biometrical community, consisting of governments, industry, citizens and academia. It is one of the main efforts of the BioSecure Network of Excellence to define the agenda for future biometrical research, including systems and applications scenarios

    Password

    Get PDF
    This book is available as open access through the Bloomsbury Open Access programme and is available on www.bloomsburycollections.com. The open-access edition of this text was made possible by a Philip Leverhulme Prize from The Leverhulme Trust. Object Lessons is a series of short, beautifully designed books about the hidden lives of ordinary things. Where does a password end and an identity begin? A person might be more than his chosen ten-character combination, but does a bank know that? Or an email provider? What’s an ‘identity theft’ in the digital age if not the unauthorized use of a password? In untangling the histories, cultural contexts and philosophies of the password, Martin Paul Eve explores how ‘what we know’ became ‘who we are’, revealing how the modern notion of identity has been shaped by the password. Ranging from ancient Rome and the ‘watchwords’ of military encampments, through the three-factor authentication systems of Harry Potter and up to the biometric scanner in the iPhone, Password makes a timely and important contribution to our understanding of the words, phrases and special characters that determine our belonging and, often, our being. Object Lessons is published in partnership with an essay series in The Atlantic

    Privacy in Biometric Systems

    Get PDF
    Biometrics are physiological and/or behavioral characteristics of a person that have been used to provide an automatic proof of identity in a growing list of applications including crime/terrorism fighting, forensics, access and border control, securing e-/m-commerce transactions and service entitlements. In recent years, a great deal of research into a variety of new and traditional biometrics has widened the scope of investigations beyond improving accuracy into mechanisms that deal with serious concerns raised about the potential misuse of collected biometric data. Despite the long list of biometrics’ benefits, privacy concerns have become widely shared due to the fact that every time the biometric of a person is checked, a trace is left that could reveal personal and confidential information. In fact, biometric-based recognition has an inherent privacy problem as it relies on capturing, analyzing, and storing personal data about us as individuals. For example, biometric systems deal with data related to the way we look (face, iris), the way we walk (gait), the way we talk (speaker recognition), the way we write (handwriting), the way we type on a keyboard (keystroke), the way we read (eye movement), and many more. Privacy has become a serious concern for the public as biometric systems are increasingly deployed in many applications ranging from accessing our account on a Smartphone or computer to border control and national biometric cards on a very large scale. For example, the Unique Identification Authority of India (UIDAI) has issued 56 million biometric cards as of January 2014 [1], where each biometric card holds templates of the 10 fingers, the two irises and the face. An essential factor behind the growing popularity of biometrics in recent years is the fact that biometric sensors have become a lot cheaper as well as easier to install and handle. CCTV cameras are installed nearly everywhere and almost all Smartphones are equipped with a camera, microphone, fingerprint scanner, and probably very soon, an iris scanner

    Reconceptualizing Privacy: An Examination Of The Developing Regulatory Regime For Facial Recognition Technology

    Get PDF
    ABSTRACT The National Telecommunications and Information Administration have convened a series of meetings to create a voluntary code of conduct for the commercial use of facial recognition technology. This research asks and answers three questions related to the creation of the voluntary code of conduct: 1) How is the regulatory regime of FRT emerging in the U.S.? 2) What are the roles of the various stakeholders in shaping the commercial regulation of FRT? 3) How does FRT challenge our current conceptions of privacy? Data has been gathered to answer these questions using participant observation and semi-structured interviews. The data was analyzed via mediated discourse analysis. Findings of the research include: the highly sensitive nature of the biometric data that facial recognition technology collects, the data’s ability to be linked across multiple databases, the surreptitious way the data can be collected, the potential chilling effect the technology can have on the First Amendment, and the various threats the technology poses to privacy. Keywords: Privacy, Facial Recognition Technology, Multistakeholder, and Biometric Dat
    • …
    corecore