Skip to main content

Privacy in Biometric Systems

  • Chapter
  • First Online:
Privacy in a Digital, Networked World

Part of the book series: Computer Communications and Networks ((CCN))

  • 2135 Accesses

Abstract

Biometrics can be a very effective tool to keep us safe and secure, prevent individuals from applying for multiple passports or driving licenses, and keep the bad guys out or under control. However, the fact that we are surrounded by so many biometric sensors does limit our privacy in one way or another. The price we might have to pay for using many biometrics-reliant applications such as access control to a building, authorizing payments in supermarkets, and public transports is the loss of privacy as a result of being tracked in almost all of our daily life activities. This chapter explains the main privacy concerns surrounding the use of biometric systems and highlights few possible solutions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 59.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 59.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. The Unique Identification Authority of India. http://uidai.gov.in/. Accessed 08 Sept 2014

  2. Ross A, Nandakumar K, Jain A (2011) Introduction to biometrics. Springer, New York

    Google Scholar 

  3. Georghiades AS, Belhumeur PN, Kriegman DJ (2001) From few to many: Generative models for recognition under variable pose and illumination. IEEE Trans Pattern Anal Mach Intell 23(6):643–660

    Google Scholar 

  4. Li SZ, Jain AK (2009) Encyclopedia of biometrics. Springer, New York

    Google Scholar 

  5. Nandakumar K (2008) Multibiometric systems: fusion strategies and template security

    Google Scholar 

  6. NIST_Report NIST Report to the United States Congress. Summary of NIST Standards for biometric accuracy, tamper resistance, and interoperability, Nov 2002

    Google Scholar 

  7. Bhanu B, Tan X (2003) Fingerprint Indexing based on novel features of minutiae triplets. IEEE Trans Pattern Anal Mach Intell 25(5):616–622

    Google Scholar 

  8. Jain AK, Nandakumar K, Nagar A (2008) Biometric template security. EURASIP J Adv Signal Process 1–17

    Google Scholar 

  9. Adler A (2005) Vulnerabilities in biometric encryption systems. In: Proceedings of the 5th international conference on audio and video-based biometric person authentication, vol 3546, pp 1611–3349

    Google Scholar 

  10. Cappelli R, Lumini A, Maio D, Maltoni D (2007) Fingerprint image reconstruction from standard templates. IEEE Trans Pattern Anal Mach Intell 29(7):1489–1503

    Article  Google Scholar 

  11. Hao F, Anderson R, Daugman J (2006) Combining cryptography with biometrics effectively. IEEE Trans Comput 1081–1088

    Google Scholar 

  12. The Secure Phone Project. http://www.secure-phone.info/. Accessed 08 Sept 2014

  13. Philips Electronics Nederland B.V. (2013, July) Vital signs camera—Philips on the App Store on iTunes. https://itunes.apple.com/gb/app/vital-signs-camera-philips/id474433446?mt=8. Accessed 08 Sept 2014

  14. Hoeksma J (2009, Oct) E-health insider: private medical records offered for sale, http://www.ehi.co.uk/news/ehi/5311. Accessed 08 Sept 2014

  15. Hasson P (2009) The five country conference: joint enrollment and FCC information sharing project. US Department of Homeland Security

    Google Scholar 

  16. Védrine H (2000, Dec) council regulation (EC) No 2725/2000. Off J Eur Communities

    Google Scholar 

  17. European Data Protection Supervisor (EDPS) (2012, Sept) Peter Hustinx, EURODAC: erosion of fundamental rights creeps along

    Google Scholar 

  18. Woodward JD (2008) The law and the use of biometrics. In: Jain AK, Flynn P, Ross AA (eds) Handbook of biometrics. Springer, Chap. 18, pp 357–380

    Google Scholar 

  19. Amoore L (2006) Biometric borders: governing mobilities in the war on terror. Polit Geogr 25(3):336–351

    Article  Google Scholar 

  20. Bennett CJ (2011) In defense of privacy: the concept and the regime. Surv Soc 8(4):485–496

    Google Scholar 

  21. Nanavati R (2011, Dec) Biometric data safeguarding technologies analysis and best practices. Defence R&D Canada—Centre for Security Science, Technical report

    Google Scholar 

  22. Hal J, Kimura D (1994) Dermatoglyphic asymmetry and sexual orientation in men. Behav Neurosci 108(6):1203

    Article  Google Scholar 

  23. Woodward J (1999) Biometrics: identifying law and policy concerns. In: Jain AK, Bolle R, Pankanti S (eds) Biometrics: personal identification in networked society. Springer, chap 19, pp 385–406

    Google Scholar 

  24. LeVay S (1996) Queer science: the use and abuse of research into homosexuality. The MIT Press, Cambridge

    Google Scholar 

  25. Forbes KE, Shanks MF, Venneri A (2004) The evolution of dysgraphia in Alzheimer’s disease. Brain Res Bull 63(1):19–24

    Article  Google Scholar 

  26. Rosenblum S, Samuel M, Zlotnik S, Erikh I, Schlesinger I (2013) Handwriting as an objective tool for Parkinson’s disease diagnosis. J Neurol 260(9):2357–2361

    Google Scholar 

  27. Tsanas A, Little MA, McSharry P, Spielman J, Ramig L (2012) Novel speech signal processing algorithms for high-accuracy classification of Parkinson’s disease. IEEE Trans Biomed Eng 59(5):1264–1271

    Article  Google Scholar 

  28. Darell R (2014) Siri update: how, when & what we use her for. In: Bit Rebels. Accessed 08 Sept 2014

    Google Scholar 

  29. Faundez-Zanuy M (2013) Biometric applications related to human beings: there is life beyond security. Cognit Comput 5(1):136–151

    Article  Google Scholar 

  30. Shin J, Okuyama T (2014) Detection of alcohol intoxication via online handwritten signature verification. Pattern Recognit Lett 35:101–104

    Article  Google Scholar 

  31. Foley RG, Miller AL (1979) The effects of marijuana and alcohol usage on handwriting. Forensic Sci Int 14(3):159–164

    Article  Google Scholar 

  32. Moody J (2004) public perceptions of biometric devices: the effect of misinformation on acceptance and use. Issues Inform Sci Inf Technol 1

    Google Scholar 

  33. Farzin H, Abrishami-Moghaddam H, Moin MS (2008) A novel retinal identification system. EURASIP J Adv Signal Process 2008(280635):1–10

    Google Scholar 

  34. Patton N (2006) Retinal image analysis: concepts, applications and potential. Progr Retinal Eye Res 25(1):99–127

    Article  Google Scholar 

  35. Berson EL (2008) Retinal degenerations: planning for the future. In: Recent advances in retinal degeneration. Springer, Berlin, pp 21–35

    Google Scholar 

  36. Hartung D, Busch C (2009) Why vein recognition needs privacy protection. In: 5th international conference on Intelligent information hiding and multimedia signal processing 2009. IIH-MSP’09, pp 1090–1095

    Google Scholar 

  37. Ratha NK, Connell JH, Bolle RM (2004) Enhancing security and privacy in biometrics-based authentication systems. IBM Syst J 40(1):614–634

    Google Scholar 

  38. Goal N, Bebis G, Nefian A (2005) Face recognition experiments with random projection. Proc SPIE 5779:426–437

    Article  Google Scholar 

  39. Teoh ABJ, Ngo DCL, Goh A (2004) BioHashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recogn 37(11):2245–2255

    Article  Google Scholar 

  40. Feng YC, Yuen PC, Jain AK (2008) A hybrid approach for face template protection, vol 6944, p 694408

    Google Scholar 

  41. Yongjin W, Plataniotis KN (2007) Face based biometric authentication with changeable and privacy preservable templates, pp 1–6

    Google Scholar 

  42. Al-Assam H, Jassim SA (2012) Security evaluation of biometric keys. J Comput Secur 31(2):151–163

    Article  Google Scholar 

  43. Andrew B, Teoha D, Ngoa CL, Alwyn G (2004) Personalised cryptographic key generation based on FaceHashing. J Comput Secur 23(7):606–614

    Article  Google Scholar 

  44. Goh A, Ngo DC (2003) Computation of cryptographic keys from face biometrics, pp 1–13

    Google Scholar 

  45. Al-Assam H, Sellahewa H, Jassim SA (2009) Lightweight approach for biometric template protection. Proc SPIE

    Google Scholar 

  46. Kanade S, Camara D, Dorizzi B (2008) Three factor scheme for biometric-based cryptographic key regeneration using iris. In: Biometrics symposium, pp 59–64

    Google Scholar 

  47. Nandakumar K, Jain AK, Pankanti S (2007) Fingerprint-based fuzzy vault: implementation and performance. IEEE Trans Inf Forensics Secur 2(4):744–757

    Google Scholar 

  48. Juels A, Wattenberg M (1999) A fuzzy commitment scheme. In: Proceedings of ACM conference on computer and communications security (CCS), Singapore, 1999, pp 28–36

    Google Scholar 

  49. Marinelli T, Stoianov A, Martin K, Plataniotis KN, Chibba M, DeSouza L, Cavoukian SA (2013) Biometric encryption: creating a privacy-preserving watch-list facial recognition system. Secur Priv Biometrics 215–238

    Google Scholar 

  50. Surveillance, privacy and security (SurPRISE), http://www.surprise-project.eu/. Accessed 08 Sept 2014

  51. Increasing resilience in surveillance societies (IRISS) project, http://www.irissproject.eu/. Accessed 08 Sept 2014

  52. Turbine project, http://www.turbine-project.eu/. Accessed 08 Sept 2014

  53. 3Dface Project, http://www.3dface.org/. Accessed 08 Sept 2014

  54. Kuseler T, Al-Assam H, Jassim SA, Lami IA (2011, April) Privacy preserving, real-time and location secured biometrics for mCommerce authentication. In: Mobile multimedia/image processing, security, and applications 2011, vol 8063, SPIE, Bellingham, WA

    Google Scholar 

  55. Al-Assam H, Jassim SA (2012) Robust biometric based key agreement and remote mutual authentication. In: The 11th international conference on trust, security and privacy in computing and communications (TrustCom), Liverpool, UK, 2012, pp 59–65

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hisham Al-Assam .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Al-Assam, H., Kuseler, T., Jassim, S., Zeadally, S. (2015). Privacy in Biometric Systems. In: Zeadally, S., Badra, M. (eds) Privacy in a Digital, Networked World. Computer Communications and Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-08470-1_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-08470-1_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-08469-5

  • Online ISBN: 978-3-319-08470-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics