Skip to main content

Biometrics – How to Put to Use and How Not at All?

  • Conference paper
Trust, Privacy and Security in Digital Business (TrustBus 2008)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5185))

Abstract

After a short introduction to biometrics w.r.t. IT security, we derive conclusions on how biometrics should be put to use and how not at all. In particular, we show how to handle security problems of biometrics and how to handle security and privacy problems caused by biometrics in an appropriate way. The main conclusion is that biometrics should be used between human being and his/her personal devices only.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 74.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Jain, A., Hong, L., Pankanti, S.: Biometric Identification. Communications of the ACM 43/2, 91–98 (2000)

    Google Scholar 

  2. Schneier, B.: The Uses and Abuses of Biometrics. Communications of the ACM 42/8, 136 (1999)

    Article  Google Scholar 

  3. Chaos Computer Club e.V.: How to fake fingerprints? (June 12, 2008), http://www.ccc.de/biometrie/fingerabdruck_kopieren.xml?language=en

  4. Kent, J.: Malaysia car thieves steal finger (June 16, 2008), news.bbc.co.uk/2/hi/asia-pacific/4396831.stm

  5. Hall, J.A.Y., Kimura, D.: Dermatoglyphic Asymmetry and Sexual Orientation in Men. Behavioral Neuroscience 108, 1203–1206 (1994) (June 12, 2008), www.sfu.ca/~dkimura/articles/derm.htm

    Article  Google Scholar 

  6. Forastieri, V.: Evidence against a Relationship between Dermatoglyphic Asymmetry and Male Sexual Orientation. Human Biology 74/6, 861–870 (2002)

    Article  Google Scholar 

  7. Ross, A.A., Nandakumar, K., Jain, A.K.: Handbook of Multibiometrics. Springer, New York (2006)

    Google Scholar 

  8. Pfitzmann, A.: Wird Biometrie die IT-Sicherheitsdebatte vor neue Herausforderungen stellen? DuD, Datenschutz und Datensicherheit, Vieweg-Verlag 29/5, 286–289 (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Steven Furnell Sokratis K. Katsikas Antonio Lioy

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Pfitzmann, A. (2008). Biometrics – How to Put to Use and How Not at All?. In: Furnell, S., Katsikas, S.K., Lioy, A. (eds) Trust, Privacy and Security in Digital Business. TrustBus 2008. Lecture Notes in Computer Science, vol 5185. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-85735-8_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-85735-8_1

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-85734-1

  • Online ISBN: 978-3-540-85735-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics