Ethical Issues in Anti-spoofing

  • Andrew P. ReberaEmail author
Part of the Advances in Computer Vision and Pattern Recognition book series (ACVPR)


The increasingly widespread and high-profile use of biometrics has attracted a good deal of attention from ethicists. While the ethics of biometrics in general has been widely discussed, technical features of biometric systems have understandably attracted less attention. Yet the societal acceptability of certain biometric modalities, the status of anonymised templates vis-à-vis data protection legislation, and the impact of template-ageing-induced performance degradation in rapidly ageing societies, all show that, in addition to broad ethical questions, biometrics poses more specific ethical challenges. Among these are difficulties presented by countermeasures developed to combat spoofing attacks. This chapter identifies and discusses the main ethical issues arising from the development and deployment of anti-spoofing technologies.


Biometric System Biometric Identification Legitimate Claim Biometric Technology Core Information 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.



This work has been partly funded through the European Commission Framework Programme 7 (FP7) project TABULA RASA: Trusted Biometrics under Spoofing Attacks (Grant Agreement no. 257289).


  1. 1.
    van der Ploeg I (2003) Biometrics and the body as information: Normative issues in the socio-technical coding of the body. In: Lyon D (ed) Surveillance as social sorting: privacy, risk, and automated discrimination. Routledge, London, pp 57–73Google Scholar
  2. 2.
    Agamben G (2008) No to biopolitical tattooing. Commun Crit/Cult Stud 5(2):201–202Google Scholar
  3. 3.
    Rebera AP, Mordini E (2013) Biometrics and ageing: social and ethical considerations. In: Fairhurst M (ed) Age factors in biometric processing. The Institute of Engineering and Technology, London, pp 37–62Google Scholar
  4. 4.
    Lummis RC, Rosenberg AE (1972) Test of an automatic speaker verification method with intensively trained mimics (a). J Acoust Soc America 51(1A):131–132CrossRefGoogle Scholar
  5. 5.
    Solove DJ (2008) Understanding privacy. Harvard University Press, CambridgeGoogle Scholar
  6. 6.
    Andrew P, Rebera Matteo E, Bonfanti SV (2013) Societal and ethical implications of anti-spoofing technologies in biometrics. Sci Eng Ethics . doi: 10.1007/s11948-013-9440-9(In press)Google Scholar
  7. 7.
    Nissenbaum H (2010) Privacy in context: technology, policy, and the integrity of social life. Stanford Law Books, StanfordGoogle Scholar
  8. 8.
    Anil K Jain, Ruud Bolle SP (1999) Introduction to biometrics. In: Jain K , Ruud Bolle SP (ed.) Biometrics: Personal Identification in Networked Society, Springer, New York, pp 1–42Google Scholar
  9. 9.
    Rebera AP, Guihen B (2012) Biometrics for an ageing society. In: Brömme CBA (ed) BIOSIG 2012 proceedings. Gesellschaft fr Informatik, Bonn, pp 409–416Google Scholar

Copyright information

© Springer-Verlag London 2014

Authors and Affiliations

  1. 1.Independent ScholarKeynshamUK

Personalised recommendations