153,965 research outputs found

    Biometric Boom: How the Private Sector Commodifies Human Characteristics

    Get PDF
    Biometric technology has become an increasingly common part of daily life. Although biometrics have been used for decades, recent ad- vances and new uses have made the technology more prevalent, particu- larly in the private sector. This Note examines how widespread use of biometrics by the private sector is commodifying human characteristics. As the use of biometrics has become more extensive, it exacerbates and exposes individuals and industry to a number of risks and problems asso- ciated with biometrics. Despite public belief, biometric systems may be bypassed, hacked, or even fail. The more a characteristic is utilized, the less value it will hold for security purposes. Once compromised, a biome- tric cannot be replaced as would a password or other security device. This Note argues that there are strong justifications for a legal struc- ture that builds hurdles to slow the adoption of biometrics in the private sector. By examining the law and economics and personality theories of commodification, this Note identifies market failure and potential harm to personhood due to biometrics. The competing theories justify a reform to protect human characteristics from commodification. This Note presents a set of principles and tools based on defaults, disclosures, incen- tives, and taxation to discourage use of biometrics, buying time to streng- then the technology, educate the public, and establish legal safeguards for when the technology is compromised or fails

    PERFORMANCE MEASURES OF BIOMETRICS SYSTEMS

    Get PDF
    The objective of this report is to review existing performance measures of biometrics systems .It also contains the definition on biometrics system as a whole

    Predictive biometrics: A review and analysis of predicting personal characteristics from biometric data

    Get PDF
    Interest in the exploitation of soft biometrics information has continued to develop over the last decade or so. In comparison with traditional biometrics, which focuses principally on person identification, the idea of soft biometrics processing is to study the utilisation of more general information regarding a system user, which is not necessarily unique. There are increasing indications that this type of data will have great value in providing complementary information for user authentication. However, the authors have also seen a growing interest in broadening the predictive capabilities of biometric data, encompassing both easily definable characteristics such as subject age and, most recently, `higher level' characteristics such as emotional or mental states. This study will present a selective review of the predictive capabilities, in the widest sense, of biometric data processing, providing an analysis of the key issues still adequately to be addressed if this concept of predictive biometrics is to be fully exploited in the future

    Biometrics and Network Security

    Get PDF
    This paper examines the techniques used in the two categories of biometric techniques (physiological and behavioral) and considers some of the applications for biometric technologies. Common physiological biometrics include finger characteristics (fingertip [fingerprint], thumb, finger length or pattern), palm (print or topography), hand geometry, wrist vein, face, and eye (retina or iris). Behavioral biometrics include voiceprints, keystroke dynamics, and handwritten signatures
    corecore