Abstract
Biometrics can be a very effective tool to keep us safe and secure, prevent individuals from applying for multiple passports or driving licenses, and keep the bad guys out or under control. However, the fact that we are surrounded by so many biometric sensors does limit our privacy in one way or another. The price we might have to pay for using many biometrics-reliant applications such as access control to a building, authorizing payments in supermarkets, and public transports is the loss of privacy as a result of being tracked in almost all of our daily life activities. This chapter explains the main privacy concerns surrounding the use of biometric systems and highlights few possible solutions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
The Unique Identification Authority of India. http://uidai.gov.in/. Accessed 08 Sept 2014
Ross A, Nandakumar K, Jain A (2011) Introduction to biometrics. Springer, New York
Georghiades AS, Belhumeur PN, Kriegman DJ (2001) From few to many: Generative models for recognition under variable pose and illumination. IEEE Trans Pattern Anal Mach Intell 23(6):643–660
Li SZ, Jain AK (2009) Encyclopedia of biometrics. Springer, New York
Nandakumar K (2008) Multibiometric systems: fusion strategies and template security
NIST_Report NIST Report to the United States Congress. Summary of NIST Standards for biometric accuracy, tamper resistance, and interoperability, Nov 2002
Bhanu B, Tan X (2003) Fingerprint Indexing based on novel features of minutiae triplets. IEEE Trans Pattern Anal Mach Intell 25(5):616–622
Jain AK, Nandakumar K, Nagar A (2008) Biometric template security. EURASIP J Adv Signal Process 1–17
Adler A (2005) Vulnerabilities in biometric encryption systems. In: Proceedings of the 5th international conference on audio and video-based biometric person authentication, vol 3546, pp 1611–3349
Cappelli R, Lumini A, Maio D, Maltoni D (2007) Fingerprint image reconstruction from standard templates. IEEE Trans Pattern Anal Mach Intell 29(7):1489–1503
Hao F, Anderson R, Daugman J (2006) Combining cryptography with biometrics effectively. IEEE Trans Comput 1081–1088
The Secure Phone Project. http://www.secure-phone.info/. Accessed 08 Sept 2014
Philips Electronics Nederland B.V. (2013, July) Vital signs camera—Philips on the App Store on iTunes. https://itunes.apple.com/gb/app/vital-signs-camera-philips/id474433446?mt=8. Accessed 08 Sept 2014
Hoeksma J (2009, Oct) E-health insider: private medical records offered for sale, http://www.ehi.co.uk/news/ehi/5311. Accessed 08 Sept 2014
Hasson P (2009) The five country conference: joint enrollment and FCC information sharing project. US Department of Homeland Security
Védrine H (2000, Dec) council regulation (EC) No 2725/2000. Off J Eur Communities
European Data Protection Supervisor (EDPS) (2012, Sept) Peter Hustinx, EURODAC: erosion of fundamental rights creeps along
Woodward JD (2008) The law and the use of biometrics. In: Jain AK, Flynn P, Ross AA (eds) Handbook of biometrics. Springer, Chap. 18, pp 357–380
Amoore L (2006) Biometric borders: governing mobilities in the war on terror. Polit Geogr 25(3):336–351
Bennett CJ (2011) In defense of privacy: the concept and the regime. Surv Soc 8(4):485–496
Nanavati R (2011, Dec) Biometric data safeguarding technologies analysis and best practices. Defence R&D Canada—Centre for Security Science, Technical report
Hal J, Kimura D (1994) Dermatoglyphic asymmetry and sexual orientation in men. Behav Neurosci 108(6):1203
Woodward J (1999) Biometrics: identifying law and policy concerns. In: Jain AK, Bolle R, Pankanti S (eds) Biometrics: personal identification in networked society. Springer, chap 19, pp 385–406
LeVay S (1996) Queer science: the use and abuse of research into homosexuality. The MIT Press, Cambridge
Forbes KE, Shanks MF, Venneri A (2004) The evolution of dysgraphia in Alzheimer’s disease. Brain Res Bull 63(1):19–24
Rosenblum S, Samuel M, Zlotnik S, Erikh I, Schlesinger I (2013) Handwriting as an objective tool for Parkinson’s disease diagnosis. J Neurol 260(9):2357–2361
Tsanas A, Little MA, McSharry P, Spielman J, Ramig L (2012) Novel speech signal processing algorithms for high-accuracy classification of Parkinson’s disease. IEEE Trans Biomed Eng 59(5):1264–1271
Darell R (2014) Siri update: how, when & what we use her for. In: Bit Rebels. Accessed 08 Sept 2014
Faundez-Zanuy M (2013) Biometric applications related to human beings: there is life beyond security. Cognit Comput 5(1):136–151
Shin J, Okuyama T (2014) Detection of alcohol intoxication via online handwritten signature verification. Pattern Recognit Lett 35:101–104
Foley RG, Miller AL (1979) The effects of marijuana and alcohol usage on handwriting. Forensic Sci Int 14(3):159–164
Moody J (2004) public perceptions of biometric devices: the effect of misinformation on acceptance and use. Issues Inform Sci Inf Technol 1
Farzin H, Abrishami-Moghaddam H, Moin MS (2008) A novel retinal identification system. EURASIP J Adv Signal Process 2008(280635):1–10
Patton N (2006) Retinal image analysis: concepts, applications and potential. Progr Retinal Eye Res 25(1):99–127
Berson EL (2008) Retinal degenerations: planning for the future. In: Recent advances in retinal degeneration. Springer, Berlin, pp 21–35
Hartung D, Busch C (2009) Why vein recognition needs privacy protection. In: 5th international conference on Intelligent information hiding and multimedia signal processing 2009. IIH-MSP’09, pp 1090–1095
Ratha NK, Connell JH, Bolle RM (2004) Enhancing security and privacy in biometrics-based authentication systems. IBM Syst J 40(1):614–634
Goal N, Bebis G, Nefian A (2005) Face recognition experiments with random projection. Proc SPIE 5779:426–437
Teoh ABJ, Ngo DCL, Goh A (2004) BioHashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recogn 37(11):2245–2255
Feng YC, Yuen PC, Jain AK (2008) A hybrid approach for face template protection, vol 6944, p 694408
Yongjin W, Plataniotis KN (2007) Face based biometric authentication with changeable and privacy preservable templates, pp 1–6
Al-Assam H, Jassim SA (2012) Security evaluation of biometric keys. J Comput Secur 31(2):151–163
Andrew B, Teoha D, Ngoa CL, Alwyn G (2004) Personalised cryptographic key generation based on FaceHashing. J Comput Secur 23(7):606–614
Goh A, Ngo DC (2003) Computation of cryptographic keys from face biometrics, pp 1–13
Al-Assam H, Sellahewa H, Jassim SA (2009) Lightweight approach for biometric template protection. Proc SPIE
Kanade S, Camara D, Dorizzi B (2008) Three factor scheme for biometric-based cryptographic key regeneration using iris. In: Biometrics symposium, pp 59–64
Nandakumar K, Jain AK, Pankanti S (2007) Fingerprint-based fuzzy vault: implementation and performance. IEEE Trans Inf Forensics Secur 2(4):744–757
Juels A, Wattenberg M (1999) A fuzzy commitment scheme. In: Proceedings of ACM conference on computer and communications security (CCS), Singapore, 1999, pp 28–36
Marinelli T, Stoianov A, Martin K, Plataniotis KN, Chibba M, DeSouza L, Cavoukian SA (2013) Biometric encryption: creating a privacy-preserving watch-list facial recognition system. Secur Priv Biometrics 215–238
Surveillance, privacy and security (SurPRISE), http://www.surprise-project.eu/. Accessed 08 Sept 2014
Increasing resilience in surveillance societies (IRISS) project, http://www.irissproject.eu/. Accessed 08 Sept 2014
Turbine project, http://www.turbine-project.eu/. Accessed 08 Sept 2014
3Dface Project, http://www.3dface.org/. Accessed 08 Sept 2014
Kuseler T, Al-Assam H, Jassim SA, Lami IA (2011, April) Privacy preserving, real-time and location secured biometrics for mCommerce authentication. In: Mobile multimedia/image processing, security, and applications 2011, vol 8063, SPIE, Bellingham, WA
Al-Assam H, Jassim SA (2012) Robust biometric based key agreement and remote mutual authentication. In: The 11th international conference on trust, security and privacy in computing and communications (TrustCom), Liverpool, UK, 2012, pp 59–65
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Al-Assam, H., Kuseler, T., Jassim, S., Zeadally, S. (2015). Privacy in Biometric Systems. In: Zeadally, S., Badra, M. (eds) Privacy in a Digital, Networked World. Computer Communications and Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-08470-1_11
Download citation
DOI: https://doi.org/10.1007/978-3-319-08470-1_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-08469-5
Online ISBN: 978-3-319-08470-1
eBook Packages: Computer ScienceComputer Science (R0)