My fingers are all mine: Five reasons why using biometrics may not be a good idea

Size: px
Start display at page:

Download "My fingers are all mine: Five reasons why using biometrics may not be a good idea"

Transcription

1 My fingers are all mine: Five reasons why using biometrics may not be a good idea Siraj A. Shaikh 1, Christos K. Dimitriadis 2 1 Department of Information Systems, Cranfield University, Defence Academy, Shrivenham, SN6 8LA, UK 2 University of Piraeus, 80 Karaoli & Dimitriou, GR Piraeus, Greece s.shaikh@cranfield.ac.uk, cricodc@gmail.com Abstract Biometric technology has undoubtedly become the bedrock of national and commercial identity management infrastructures, and will become more so in the future. While the technology promises great benefits, its use raises a variety of serious ethical, social and technical concerns. The processing and storage of human biological data for this purpose is not entirely foolproof. Moreover, when it comes to deployment in large-scale infrastructures, the accuracy and reliability issues become more serious. Characteristic human data such as facial images and fingerprints is very personal and permanent to humans, the misuse or abuse of which could be disastrous for the privacy of individuals. The purpose of this paper is to delve deeper into these issues, and highlight some of these concerns. Index Terms biometrics, security, facial recognition, privacy, fingerprint matching. I. INTRODUCTION The term Biometrics is a combination of the Greek words Bio (to mean life) and Metric (to mean measure) to mean the measurement and statistical analysis of biological data. The term has become synonymous with IT technologies for measuring and analysing human body characteristics for authentication purposes and automatically recognising a person using distinguishing traits. One of the first known cases of humans using biometrics to identify one another was by early Chinese merchants. Joao de Barros, Portuguese explorer and historian, wrote that the Chinese merchants used a form of biometrics by stamping children s palm prints and footprints on paper with ink to distinguish them from one another. This is one of the earliest known cases of biometrics in use and is still being used today. The role of biometrics has changed considerably in the modern society we live in today however. Primarily used for human identification and authentication (also known as verification) [1], biometrics is used to authenticate the citizenship of travellers through biometric passports and iris recognition procedures, aspects of citizens identity using biometric identity cards, formal entry of travellers to a foreign country through the issuance of biometric visas, and bank customers accessing their account through biometric-enabled automated teller machines, amongst other authentication and access control applications used in the university sector, gaming industry, healthcare, time and attendance, transportation and voter registration sectors as listed by the International Biometric Industry Association (IBIA) [2]. While biometric technology have undoubtedly become the bedrock of national and commercial identity management infrastructures, and will become more so in the future, its use raises a variety of serious ethical, social and technical issues. For one, the processing and storage of human biological data for this purpose is not entirely foolproof. The accuracy and reliability of the biometric technology also falls short at times, making the deployment infeasible for large-scale infrastructures. Moreover, characteristic data such as facial images and fingerprints is very personal and permanent to humans, the misuse or abuse of which could be disastrous for the privacy of individuals. Finally some recent research has emphasised the need to consider cognitive and psychological dimensions of such systems. The purpose of this paper is to delve deeper into these issues. We categorise the issues mentioned above in five different areas, and organise the rest of this paper as follows. Section II discusses the security implications of the use of biometrics. Section III discusses the performance of biometric-based systems, with regards to accuracy and scalability. Section IV is concerned with the privacy issues of such systems. Section V looks at the psychological factors that influence the design and accuracy of biometric and related systems. Section VI then considers the physical aspects of the interaction between humans and this technology, with particular regards to the physical safety of individuals. II. SECURITY ISSUES One of the advantages of the use of biometrics often trumpeted is the availability and readiness of human biological data, whereas one may forget their password or forget to bring their authentication token (such as a smart card). It is both the readiness and availability of human biological data and, the ease and speed with which it can be used (to perform fingerprint or retinal scans for example) for /08/$ IEEE

2 authentication purposes that is often trumpeted as one of the advantages of biometric technology. It is this very availability, however, that raises security concerns. Human biological data of the kind most common for these systems, such as fingerprints, facial images or retina patterns, is highly visible and accessible, thus increasing the risk of biometric spoofing. Fingerprints represent one of the most accessible human characteristics that could easily be both obtained and spoofed. Matsumoto et al [3] have shown how fake gelatine fingers can be used to deceive biometric fingerprint devices. Shuckers [4] has shown some results to a similar effect. With an increasing reliance on surveillance cameras and latest developments in video technology, facial images will undoubtedly become common biometric features used for identification, authentication and surveillance. Adler s [5,6] work, however presents a challenge to the use of such biometric (and others in general) as it shows how to generate good quality facial images from a face recognition template. This in turn has serious implications if the database storing the templates is compromised. III. PERFORMANCE ISSUES One of the most important issues for the successful deployment of biometric systems is performance. It clearly depends on the application under consideration and the biometric modality that is deployed. So, iris matching or retinal scanning offer quite high assurances that the person who is successfully passing the verification test is the legitimate user. Performance is perhaps the barrier that biometrics industry has to overcome, if biometric devices are to enjoy widespread acceptance. Paramount to surpassing this obstacle is the establishment of independent testing procedures on predefined datasets. The reason is that the industry is touting their products using their own testing procedures, which obviously have as major purpose to produce sales. Since each application of biometric technology has different requirements and needs different guarantees from the technology, it is sensible to devise application-specific testing suites and evaluation procedures that measure performance within certain scenarios. Moreover, the testing has to be done by an independent group who will be unbiased and judge objectively as to the rating of the quality in a particular setting. In some sections of the industry this is realized already and independent testing groups are set up to perform objective evaluation. In the fingerprint recognition arena, several algorithms were compared head-to-head using different state-of-the-art sensor technologies: optical, capacitive, high-end optical, while the fourth section was produced by synthetically combining images of other fingerprints. Having an independent testing group is crucial in order to see head to head comparisons between different biometric systems, measured on the same data. There is a huge difference from performance measurements taken on one s private set of data, on which the algorithm may have been fine-tuned. We see that the performance issue is really a problem and situation has to be improved significantly, if biometrics is to be used in wide-scale projects, protecting sensitive data. And all that when performance rates as measured by the industry are reaching up to 99 % level. After these considerations, the importance of having an independent group to run the tests and compare algorithms on common test suites and use data unseen before by the algorithms cannot be overstressed. It is the only plausible way that one can get meaningful and comparable numbers that can measure the state of the art and decide whether the current performance levels are suitable for a certain application. More specifically, commercial products have to do a better job in thwarting the simplest attempts to trick the system. It seems that the low-end products targeting the PC market are seen more like toys rather than security tools that one can rely on for protection of their personal data. There is a long way to go before biometric systems can be relied upon for protection of really sensitive data. A. Scalability Scalability is a major issue regarding the wide spread of biometrics systems. In order to deploy a security solution including biometric technologies, it is an important prerequisite for the system to have the ability to extend in levels corresponding to larger population without requiring major changes in its infrastructure. Smart cards for example (as deployed in the market today) have inherent scalability, ensuring organizations like banks or telecommunication providers that the system is extendable, possibly requiring changes only in its database capacity and central system management. A Public Key Infrastructure provides scalability due to the use of certificates and key pairs. Its architecture reduces the number of required keys in conjunction with symmetric cryptography and de-centralized authentication using digital signatures. The only central point is the CA (usually a branch like an RA which maintains an LDAP server) for the validation of a certificate and the provision of the CRLs. This architecture s scalability again depends on the database management scheme for a large population. Scalability for biometric systems depends on two technological factors. The first one regards the performance of the biometric component and the second the database management, which is a common issue for PKI and smart cards as well. Database management regards the administration of the biometric templates in a centralized architecture. There are several data base architectures addressing this problem, including distributed schemas for increasing the performance of the system. Regarding security, it would be effec-

3 tive to use relational databases with the template storage area separated from the rest of the data and pointers connecting the user to his/her template. In this schema, compromising the templates database will only gain access to a number of templates that will have no owners. Encryption should be an extra security feature. Special care should be given to the authentication controls of the database, which should be strong (two factor authentication) and supported by audit trail controls as detective measures. The most important issue regarding scalability and biometrics is the performance of the system. Identification using biometrics should not be permitted especially when the system serves great populations. The biometric systems are much likely not to be effective if used as identification mediums. While population grows, the task for identifying an individual becomes harder and harder, since the possibility for the existence of similar templates increases. Verification however is not affected, while the system has to compare the measurement to one template, which is indicated by the user by entering his/her username or inserting his/her smart card. However, when population increases, problems, like people being unable to enrol or be verified due to altered characteristics (e.g. damaged fingers) or religious reasons are magnified. The above situation manifests itself due to the increased possibility of including minorities in the application, when addressing large populations. This can be addressed with more sophisticated algorithms and the provision of alternative methods of authentication to the user. Generally, scalability issues relating to performance can be addressed using multi modal biometrics, supported by sophisticated decision mechanisms. The use of combined biometrics, for example face and hand recognition reduces the possibility of fraud in large populations, since the impostor and the legitimate user must have both templates similar. The system, when supported by an effective policy, can disable one of the two authentication methods if the user refused to use it e.g. for religious reasons and replace it with an extra password. IV. PRIVACY ISSUES Privacy is the interest that individuals have in sustaining a personal space, free from interference by other people and organisations. Information privacy refers to the privacy of an individual s personal data and personal communication. With respect to the protection of personal data, Article 8 of the Charter of the Fundamental Rights of the European Union [7] states that (1) everyone has the right to the protection of personal data concerning him or her, and (2) such data must be processed fairly for specified purposes and on the basis of the consent of the person concerned or some other legitimate basis laid down by law. Biometric data due to its unique characteristic nature is as personal, if not more, to an individual. It is not just personal property as it affects the rights of individuals on how they choose to use their body, make a financial transaction or authenticate themselves to a system. Such personal data if lost or stolen can never be recovered. Once compromised, it is lost for life as the permanency of such data is never in doubt. Our identification documents (such as a passport) or a driving license can be uniquely reissued if need be but we cannot buy or replace our fingers! Alterman [8] builds on this argument further to point out that biometric data, unlike ordinary photographs for example, is both an irreversible and reliable identifier of an individual. Moreover the efficient nature of mechanical biometric comparisons makes it ever so more important to keep this data from being lost or stolen. The speed and efficacy at which such data can be stored, replicated and abused is far greater. Let us consider other privacy issues in biometric data. There are over four million CCTV camera deployed in Britain, and the...eventual aim is to turn the gathering of video evidence into a third forensic specialism alongside DNA analysis and fingerprinting. [9]. This would mean facial images are automatically scanned, compared to an existing database (of wanted and/or criminals) and detected (if a match is found) [10]. According to Camerawatch [11], a non-profit CCTV watchdog in Britain, somewhere in the region of 90% of all cameras and camera systems operating out there are simply not compliant (with the UK Data Protection Act). This form of digital video surveillance and detection ultimately raises a number of privacy concerns, similar to those raised in the protection of personal data. So, for example, are ordinary citizens provided with a choice? Are they explicitly asked about whether they want to be pictured by a camera, and are they always given a choice to avoid one? Is every individual made conscious of the presence of a camera? Is every camera always explicitly and visibly marked? With CCTV camera becoming so pervasive in our modern infrastructures, it is highly unlikely that this is case. Are people legally asked for their consent whether a sample reading of their face be taken? Are ordinary citizens comprehended about what will the facial image captured be used for? Where and how long will it be stored for? Who will it be communicated to? Is the facial image data confined for the purposes of this immediate surveillance? Is every individual allowed to set a limit on the access to his/her facial image data? Finally, is the facial image data only used within the said context, or could it be used for some other purpose? While this does not apply to facial recognition,

4 retinal scans could be used to reveal whether an individual is HIV-positive, or is at risk of a stroke [12]. V. PSYCHOLOGICAL FACTORS Recent research suggests that human expertise (which is often needed when comparing fingerprints due to distorted samples for example) is influenced by intuition, and is also psychologically and cognitively vulnerable, and, may therefore be, biased and/or inaccurate. Fingerprint examiners and experts often work under pressure and are also not immune to such cognitive factors. According to a recent survey by Dror et al [13], where the contextual top-down processing of information when matching fingerprints is examined, it is concluded that...contextual information actively biases the ways gaps (in comparing ambiguous fingerprints) are filled (when it comes to matching fingerprints).... This perhaps also questions the use of biometrics in systems where forensic investigation may be called to prosecute individuals. The issue here is not that fingerprint matching is not efficient or accurate, but the use of fingerprints in situations where fingerprint examiners may be called in for the purposes of investigation. VI. PHYSICAL SAFETY Physical safety issues raised by biometrics are often ignored and have been paid little attention thus far. The use of biometric data to verify an individual for the purposes of access control (for a vehicle) or to authenticate a financial transaction (on a biometric ATM) puts him/her at the risk of physical danger. The actual act of providing a biometric sample provide an incentive to a hostile party to force the individual to commit to the act, such a forced retinal scan, or possibly an impetus to amputate the desired body part, such as a finger, for this purpose. A recent event [14] highlights the reality of such risks involving a high-tech luxury car, a Mercedes S-class, which uses an access control system based on a fingerprint matching system. The system allows only a recognized owner of a car to get in and activate the engine. The owner was held by a gang of car stealers, who upon realising that they need the owner's fingerprint to mobilise the engine, cut off the owner's index finger with a machete. VII. DISCUSSION For a technology as new as biometrics, it has certainly found acceptance in leaps and bounds. In a recent speech [15] on liberty by the British Prime Minister Gordon Brown, emphasised on the technology as new means in a new information age to identity people, identity false passports and protect individuals and society against crime, fraud, illegal immigration and terrorism - and protect for each and every individual our own identity. While this is no doubt reflected in the policies of governments worldwide, given the weaknesses of the technology highlighted in this paper, we must proceed with caution. The privacy and ethical issues are largely ignored, and the collection of biometric data at the current mass scale carries a significant should this data is compromised and falls into the wrong hands. Not to mention the possible abuse of such data even in the rightful hands; history is abound with such examples. There is also some indication of refutation of the technology at a political level. A case in point is the first ever deployment of a biometric system at the border crossing between Pakistan and Afghanistan in Chaman [16], and is to start functioning in November The purpose of the system is to monitor and control the cross-border movement of Pakistani and Afghan nationals. With the intent of antiterrorist surveillance in the area, the system is designed to use a combination of fingerprint, facial and retinal scans. The residents of the border town and districts of Chaman are issued with passes that allow them to easily move across the border. While the system is applauded by the Government of Pakistan, authorities in Afghanistan have expressed serious reservations over it [17]. On a technological front, the increasing possible ways of manipulating and deceiving the technology, as discussed in Section II, is a cause for concern. The critical nature of the technology s use does not allow any leeway for such gaps. Would we ever be satisfied with a password-based authentication system, where the system can potentially reject even the right password even once in a million times? Admittedly, biometrics is often used with a number of other factors to identify or authenticate subjects. And then there are the increased risks to our physical security. Are we willing to compromise a part of our body? Is it perhaps not safer to simple give away your credit card and PIN should such a situation arise? This paper has looked at various issues briefly and highlighted some of the current research that poses serious questions to biometrics. We propose further investigation to have a better understanding of such issues, and how much impact will it have on both the (deployment of) technology and its users. REFERENCES [1] A.K. Jain, A. Ross and A. Pankanti, Biometrics: A Tool for Information Security IEEE Transactions on Information Forensics and Security, vol. 1, no. 2, pp , June [2] International Biometric Industry Association (IBIA) [Online]. Available: 23 November [3] T. Matsumoto, H. Matsumoto, K. Yamada and S. Hoshino, Impact of Artificial Gummy Fingers on Fingerprint Systems, in Proceedings of SPIE Vol. #4677,

5 Optical Security and Counterfeit Deterrence Techniques IV, [4] S. A. C. Shuckers, Spoofing and Anti-Spoofing Measures, Information Security Technical Report, vol. 7, no. 4, pp , December 2002 [5] A. Adler, Can images be regenerated from biometric templates? Biometrics Consortium Conference Washington, D.C., USA, Sept , 2003 [6] A. Adler, Sample images can be independently restored from face recognition templates, Canadian Conference on Electrical Computer Engineering (CCECE). Montréal, Canada, May pp [7] The Charter of Fundamental Rights of the European Union (2000) [Online] Available: 23 November [8] A. Alterman. A piece of yourself : Ethical issues in biometric identification, Ethics and Information Technology, vol. 5, pp , September 2003 [9] C. Vallance New CCTV unit tackles UK crime, BBC News [Online] Available: 9th January [10] IBM Global Services, Digital video surveillance: leading a revolution in physical security. April IBM. [11] CameraWatch [Online] Available: 23 November 2007 [date accessed] [12] Parliamentary Office of Science and Technology (POST). Biometrics & Security. Postnote, Number 165. [Online] Available: 23 November 2001 [date accessed] [13] I. E. Dror, A. E. Peroni, S-L. Hind and D. Charlton. When Emotions Get the Better of Us: The Effect of Contextual Top-down Processing on Matching Fingerprints, Applied Cognitive Psychology, vol. 19, pp , May, Wiley InterScience. [14] J. Kent Malaysia car thieves steal finger, BBC News. [Online] Available: 1.stm, 31st March 2005 [date accessed] [15] British Prime Minister s Speech on Liberty. [Online] Available: 25th October [16] Associated Press Pakistan installs first biometrics system at border crossing with Afghanistan, Herald Tribune. [Online] Available: GEN-Pakistan-Afghanistan-Biometrics.php, 10th January [17] S. Shahid Afghan govt objects biometric system, DAWN. [Online] Available: 30th October

Introduction to Biometrics 1

Introduction to Biometrics 1 Introduction to Biometrics 1 Gerik Alexander v.graevenitz von Graevenitz Biometrics, Bonn, Germany May, 14th 2004 Introduction to Biometrics Biometrics refers to the automatic identification of a living

More information

The Role of Biometrics in Virtual Communities. and Digital Governments

The Role of Biometrics in Virtual Communities. and Digital Governments The Role of Biometrics in Virtual Communities and Digital Governments Chang-Tsun Li Department of Computer Science University of Warwick Coventry CV4 7AL UK Tel: +44 24 7657 3794 Fax: +44 24 7657 3024

More information

Biometric Recognition: How Do I Know Who You Are?

Biometric Recognition: How Do I Know Who You Are? Biometric Recognition: How Do I Know Who You Are? Anil K. Jain Department of Computer Science and Engineering, 3115 Engineering Building, Michigan State University, East Lansing, MI 48824, USA jain@cse.msu.edu

More information

UNIVERSITY OF CENTRAL FLORIDA FRONTIERS IN INFORMATION TECHNOLOGY COP 4910 CLASS FINAL REPORT

UNIVERSITY OF CENTRAL FLORIDA FRONTIERS IN INFORMATION TECHNOLOGY COP 4910 CLASS FINAL REPORT UNIVERSITY OF CENTRAL FLORIDA FRONTIERS IN INFORMATION TECHNOLOGY COP 4910 CLASS FINAL REPORT Abstract This report brings together the final papers presented by the students in the Frontiers in Information

More information

ISSUANCE AND CIVIL REGISTRATION

ISSUANCE AND CIVIL REGISTRATION IDENTITY VERIFICATION IN PASSPORT ISSUANCE AND CIVIL REGISTRATION THE IMPORTANCE OF CONTEXT AND CONTINUITY OF IDENTITY Ross Greenwood Identity Matters Consulting Australia PURPOSE To invite a claim to

More information

Biometrics 2/23/17. the last category for authentication methods is. this is the realm of biometrics

Biometrics 2/23/17. the last category for authentication methods is. this is the realm of biometrics CSC362, Information Security the last category for authentication methods is Something I am or do, which means some physical or behavioral characteristic that uniquely identifies the user and can be used

More information

Biometrics - A Tool in Fraud Prevention

Biometrics - A Tool in Fraud Prevention Biometrics - A Tool in Fraud Prevention Agenda Authentication Biometrics : Need, Available Technologies, Working, Comparison Fingerprint Technology About Enrollment, Matching and Verification Key Concepts

More information

The Use of Static Biometric Signature Data from Public Service Forms

The Use of Static Biometric Signature Data from Public Service Forms The Use of Static Biometric Signature Data from Public Service Forms Emma Johnson and Richard Guest School of Engineering and Digital Arts, University of Kent, Canterbury, UK {ej45,r.m.guest}@kent.ac.uk

More information

User Awareness of Biometrics

User Awareness of Biometrics Advances in Networks, Computing and Communications 4 User Awareness of Biometrics B.J.Edmonds and S.M.Furnell Network Research Group, University of Plymouth, Plymouth, United Kingdom e-mail: info@network-research-group.org

More information

MINUTIAE MANIPULATION FOR BIOMETRIC ATTACKS Simulating the Effects of Scarring and Skin Grafting April 2014 novetta.com Copyright 2015, Novetta, LLC.

MINUTIAE MANIPULATION FOR BIOMETRIC ATTACKS Simulating the Effects of Scarring and Skin Grafting April 2014 novetta.com Copyright 2015, Novetta, LLC. MINUTIAE MANIPULATION FOR BIOMETRIC ATTACKS Simulating the Effects of Scarring and Skin Grafting April 2014 novetta.com Copyright 2015, Novetta, LLC. Minutiae Manipulation for Biometric Attacks 1 INTRODUCTION

More information

BIOMETRICS BY- VARTIKA PAUL 4IT55

BIOMETRICS BY- VARTIKA PAUL 4IT55 BIOMETRICS BY- VARTIKA PAUL 4IT55 BIOMETRICS Definition Biometrics is the identification or verification of human identity through the measurement of repeatable physiological and behavioral characteristics

More information

Innovation in the identity domain: is ICAO s TRIP prepared for innovations?

Innovation in the identity domain: is ICAO s TRIP prepared for innovations? Speech by Rhodia Maas, National Office for Identity Data, at ICAO conference, October 2017 Innovation in the identity domain: is ICAO s TRIP prepared for innovations? Ladies and gentlemen, first of all

More information

Authenticated Document Management System

Authenticated Document Management System Authenticated Document Management System P. Anup Krishna Research Scholar at Bharathiar University, Coimbatore, Tamilnadu Dr. Sudheer Marar Head of Department, Faculty of Computer Applications, Nehru College

More information

Notes from a seminar on "Tackling Public Sector Fraud" presented jointly by the UK NAO and H M Treasury in London, England in February 1998.

Notes from a seminar on Tackling Public Sector Fraud presented jointly by the UK NAO and H M Treasury in London, England in February 1998. Tackling Public Sector Fraud Notes from a seminar on "Tackling Public Sector Fraud" presented jointly by the UK NAO and H M Treasury in London, England in February 1998. Glenis Bevan audit Manager, Audit

More information

Second Symposium & Workshop on ICAO-Standard MRTDs, Biometrics and Security

Second Symposium & Workshop on ICAO-Standard MRTDs, Biometrics and Security Second Symposium & Workshop on ICAO-Standard MRTDs, Biometrics and Security Face Biometric Capture & Applications Terry Hartmann Director and Global Solution Lead Secure Identification & Biometrics UNISYS

More information

AIMICT.ORG AIMICT Newsletter

AIMICT.ORG AIMICT Newsletter SEPTEMBER 2018 AIMICT.ORG 1 IN THIS ISSUE AIMICT Conducts ISO 9001 Lead Auditor Course AIMICT Conducts ILM s Training of Trainers Program in Irbid AIMICT Organizes Professional Quality Manager Program

More information

Biometric Authentication for secure e-transactions: Research Opportunities and Trends

Biometric Authentication for secure e-transactions: Research Opportunities and Trends Biometric Authentication for secure e-transactions: Research Opportunities and Trends Fahad M. Al-Harby College of Computer and Information Security Naif Arab University for Security Sciences (NAUSS) fahad.alharby@nauss.edu.sa

More information

Biometric Recognition Techniques

Biometric Recognition Techniques Biometric Recognition Techniques Anjana Doshi 1, Manisha Nirgude 2 ME Student, Computer Science and Engineering, Walchand Institute of Technology Solapur, India 1 Asst. Professor, Information Technology,

More information

Civil Registry System National Population Register

Civil Registry System National Population Register Civil Registry System National Population Civil Registration System National Population /Civil Registration of births and deaths is developed for the Ministry of State for Immigration and Registration

More information

Challenges and Potential Research Areas In Biometrics

Challenges and Potential Research Areas In Biometrics Challenges and Potential Research Areas In Biometrics Defence Research and Development Canada Qinghan Xiao and Karim Dahel Defence R&D Canada - Ottawa October 18, 2004 Recherche et développement pour la

More information

International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN IJSER

International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN IJSER International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December-2016 192 A Novel Approach For Face Liveness Detection To Avoid Face Spoofing Attacks Meenakshi Research Scholar,

More information

INTERNATIONAL RESEARCH JOURNAL IN ADVANCED ENGINEERING AND TECHNOLOGY (IRJAET)

INTERNATIONAL RESEARCH JOURNAL IN ADVANCED ENGINEERING AND TECHNOLOGY (IRJAET) INTERNATIONAL RESEARCH JOURNAL IN ADVANCED ENGINEERING AND TECHNOLOGY (IRJAET) www.irjaet.com ISSN (PRINT) : 2454-4744 ISSN (ONLINE): 2454-4752 Vol. 1, Issue 4, pp.240-245, November, 2015 IRIS RECOGNITION

More information

Touchless Fingerprint Recognization System

Touchless Fingerprint Recognization System e-issn 2455 1392 Volume 2 Issue 4, April 2016 pp. 501-505 Scientific Journal Impact Factor : 3.468 http://www.ijcter.com Touchless Fingerprint Recognization System Biju V. G 1., Anu S Nair 2, Albin Joseph

More information

Building DIGITAL TRUST People s Plan for Digital: A discussion paper

Building DIGITAL TRUST People s Plan for Digital: A discussion paper Building DIGITAL TRUST People s Plan for Digital: A discussion paper We want Britain to be the world s most advanced digital society. But that won t happen unless the digital world is a world of trust.

More information

Copyright: Conference website: Date deposited:

Copyright: Conference website: Date deposited: Coleman M, Ferguson A, Hanson G, Blythe PT. Deriving transport benefits from Big Data and the Internet of Things in Smart Cities. In: 12th Intelligent Transport Systems European Congress 2017. 2017, Strasbourg,

More information

RECOGNITION OF A PERSON BASED ON THE CHARACTERISTICS OF THE IRIS AND RETINA

RECOGNITION OF A PERSON BASED ON THE CHARACTERISTICS OF THE IRIS AND RETINA Bulletin of the Transilvania University of Braşov Series VII: Social Sciences Law Vol. 7 (56) No. 1-2014 RECOGNITION OF A PERSON BASED ON THE CHARACTERISTICS OF THE IRIS AND RETINA I. ARON 1 A. CTIN. MANEA

More information

Assessing the Impact of Concern for Privacy and Innovation Characteristics in the Adoption of Biometric Technologies

Assessing the Impact of Concern for Privacy and Innovation Characteristics in the Adoption of Biometric Technologies Assessing the Impact of Concern for Privacy and Innovation Characteristics in the Adoption of Biometric Technologies Aakash Taneja University of Texas at Arlington Department of Information Systems & Operations

More information

Non-Contact Vein Recognition Biometrics

Non-Contact Vein Recognition Biometrics Non-Contact Vein Recognition Biometrics www.nearinfraredimaging.com 508-384-3800 info@nearinfraredimaging.com NII s technology is multiple modality non-contact vein-recognition biometrics, the visualization

More information

Committed to crafting exceptional passports

Committed to crafting exceptional passports Committed to crafting exceptional passports We help our customers deliver unique travel documents that become works of art and symbols of pride in the hands of millions. We re proud to have succeeded in

More information

New Age Vital Statistics Services: What They Do and Don t Do

New Age Vital Statistics Services: What They Do and Don t Do New Age Vital Statistics Services: What They Do and Don t Do Author: Guy Huntington, President, Huntington Ventures Ltd. Date: June 2018 Table of Contents Executive Summary...3 What is a New Age Digital

More information

ISO/IEC TR TECHNICAL REPORT. Information technology Biometrics tutorial. Technologies de l'information Tutoriel biométrique

ISO/IEC TR TECHNICAL REPORT. Information technology Biometrics tutorial. Technologies de l'information Tutoriel biométrique TECHNICAL REPORT ISO/IEC TR 24741 First edition 2007-09-15 Information technology Biometrics tutorial Technologies de l'information Tutoriel biométrique Reference number ISO/IEC 2007 Contents Page Foreword...

More information

IRIS Biometric for Person Identification. By Lakshmi Supriya.D M.Tech 04IT6002 Dept. of Information Technology

IRIS Biometric for Person Identification. By Lakshmi Supriya.D M.Tech 04IT6002 Dept. of Information Technology IRIS Biometric for Person Identification By Lakshmi Supriya.D M.Tech 04IT6002 Dept. of Information Technology What are Biometrics? Why are Biometrics used? How Biometrics is today? Iris Iris is the area

More information

About user acceptance in hand, face and signature biometric systems

About user acceptance in hand, face and signature biometric systems About user acceptance in hand, face and signature biometric systems Aythami Morales, Miguel A. Ferrer, Carlos M. Travieso, Jesús B. Alonso Instituto Universitario para el Desarrollo Tecnológico y la Innovación

More information

A Proposal for Security Oversight at Automated Teller Machine System

A Proposal for Security Oversight at Automated Teller Machine System International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 10, Issue 6 (June 2014), PP.18-25 A Proposal for Security Oversight at Automated

More information

Fahad Al Mannai IT 104 C01 7/8/2016. Biometrics Authentication: An Emerging IT Standard

Fahad Al Mannai IT 104 C01 7/8/2016. Biometrics Authentication: An Emerging IT Standard 1 Fahad Al Mannai IT 104 C01 7/8/2016 Biometrics Authentication: An Emerging IT Standard "By placing this statement on my webpage, I certify that I have read and understand the GMU Honor Code onhttp://oai.gmu.edu/the-mason-honor-code-2/

More information

University of East London Institutional Repository:

University of East London Institutional Repository: University of East London Institutional Repository: http://roar.uel.ac.uk This paper is made available online in accordance with publisher policies. Please scroll down to view the document itself. Please

More information

Biometrics redefining the phrase 'don't shoot until you see the whites of their eyes'

Biometrics redefining the phrase 'don't shoot until you see the whites of their eyes' Army Technology Market & Customer Insight Log In Request Demo About Market & Customer Insight Biometrics redefining the phrase 'don't shoot until you see the whites of their eyes' 11 January 2012 Dr Gareth

More information

Our position. ICDPPC declaration on ethics and data protection in artificial intelligence

Our position. ICDPPC declaration on ethics and data protection in artificial intelligence ICDPPC declaration on ethics and data protection in artificial intelligence AmCham EU speaks for American companies committed to Europe on trade, investment and competitiveness issues. It aims to ensure

More information

SMARTPHONES: THE UBIQUITOUS MEAN TO DEFEAT COUNTERFEITING WHITE PAPER ABOUT A DARK INDUSTRY

SMARTPHONES: THE UBIQUITOUS MEAN TO DEFEAT COUNTERFEITING WHITE PAPER ABOUT A DARK INDUSTRY SMARTPHONES: THE UBIQUITOUS MEAN TO DEFEAT COUNTERFEITING WHITE PAPER ABOUT A DARK INDUSTRY WHITE PAPER SMARTPHONE v1.0 05/2017 2 TRILLION $ COUNTERFEITING : A GLOBAL ISSUE DAMAGE The damage due to counterfeiting

More information

Privacy and Security in Europe Technology development and increasing pressure on the private sphere

Privacy and Security in Europe Technology development and increasing pressure on the private sphere Interview Meeting 2 nd CIPAST Training Workshop 17 21 June 2007 Procida, Italy Support Materials by Åse Kari Haugeto, The Norwegian Board of Technology Privacy and Security in Europe Technology development

More information

Executive Summary Industry s Responsibility in Promoting Responsible Development and Use:

Executive Summary Industry s Responsibility in Promoting Responsible Development and Use: Executive Summary Artificial Intelligence (AI) is a suite of technologies capable of learning, reasoning, adapting, and performing tasks in ways inspired by the human mind. With access to data and the

More information

OUTLINES: ABSTRACT INTRODUCTION PALM VEIN AUTHENTICATION IMPLEMENTATION OF CONTACTLESS PALM VEIN AUTHENTICATIONSAPPLICATIONS

OUTLINES: ABSTRACT INTRODUCTION PALM VEIN AUTHENTICATION IMPLEMENTATION OF CONTACTLESS PALM VEIN AUTHENTICATIONSAPPLICATIONS 1 OUTLINES: ABSTRACT INTRODUCTION PALM VEIN AUTHENTICATION IMPLEMENTATION OF CONTACTLESS PALM VEIN AUTHENTICATIONSAPPLICATIONS RESULTS OF PRACTICAL EXPERIMENTS CONCLUSION 2 ABSTRACT IDENTITY VERIFICATION

More information

Title Goes Here Algorithms for Biometric Authentication

Title Goes Here Algorithms for Biometric Authentication Title Goes Here Algorithms for Biometric Authentication February 2003 Vijayakumar Bhagavatula 1 Outline Motivation Challenges Technology: Correlation filters Example results Summary 2 Motivation Recognizing

More information

Biometrics in Law Enforcement and Corrections. Presenters: Orlando Martinez & Lt. Pat McCosh

Biometrics in Law Enforcement and Corrections. Presenters: Orlando Martinez & Lt. Pat McCosh Biometrics in Law Enforcement and Corrections Presenters: Orlando Martinez & Lt. Pat McCosh Presentation Overview Introduction Orlando Martinez VP Global Sales, L1 Identity Solutions Biometrics Division

More information

Vein and Fingerprint Identification Multi Biometric System: A Novel Approach

Vein and Fingerprint Identification Multi Biometric System: A Novel Approach Vein and Fingerprint Identification Multi Biometric System: A Novel Approach Hatim A. Aboalsamh Abstract In this paper, a compact system that consists of a Biometrics technology CMOS fingerprint sensor

More information

To extend a Tier 4 visa or make a PBS Dependants visa application in the UK you must begin the process online. This guide will show you how.

To extend a Tier 4 visa or make a PBS Dependants visa application in the UK you must begin the process online. This guide will show you how. HomeOfficeCompliance@salford.ac.uk T: +44 (0)161 295 0023 To extend a Tier 4 visa or make a PBS Dependants visa application in the UK you must begin the process online. This guide will show you how. Before

More information

Human RFID Implants: The Good And Bad ECE Engineering Ethics and Professionalism Robert Billette February 12, 2019

Human RFID Implants: The Good And Bad ECE Engineering Ethics and Professionalism Robert Billette February 12, 2019 Human RFID Implants: The Good And Bad ECE 390 - Engineering Ethics and Professionalism Robert Billette February 12, 2019 BACKGROUND We live in a complex technological universe where it seems a new device

More information

Gemalto Color Laser Shield

Gemalto Color Laser Shield Gemalto Color Laser Shield High resolution portraits secured by color lasers Polycarbonate is widely used for secure ID documents, offering optimum resistance against attacks, a wide range of security

More information

Pan-Canadian Trust Framework Overview

Pan-Canadian Trust Framework Overview Pan-Canadian Trust Framework Overview A collaborative approach to developing a Pan- Canadian Trust Framework Authors: DIACC Trust Framework Expert Committee August 2016 Abstract: The purpose of this document

More information

FastPass A Harmonized Modular Reference System for Automated Border Crossing (ABC)

FastPass A Harmonized Modular Reference System for Automated Border Crossing (ABC) FastPass A Harmonized Modular Reference System for Automated Border Crossing (ABC) EAB - Research Project Conference, Darmstadt, September 19 th, 2016 Presented by Markus Clabian Senior Research Engineer,

More information

BIOMETRICS: AN INTRODUCTION TO NEW MODE OF SECURITY

BIOMETRICS: AN INTRODUCTION TO NEW MODE OF SECURITY BIOMETRICS: AN INTRODUCTION TO NEW MODE OF SECURITY Manoj Parmar 1, Ritesh Patankar 2 1 IT Department, G.P.Himatnagar 2 EC Department, G.P.Gandhinagar Abstract The term "biometrics" is derived from the

More information

Biometric Signature for Mobile Devices

Biometric Signature for Mobile Devices Chapter 13 Biometric Signature for Mobile Devices Maria Villa and Abhishek Verma CONTENTS 13.1 Biometric Signature Recognition 309 13.2 Introduction 310 13.2.1 How Biometric Signature Works 310 13.2.2

More information

Report to Congress regarding the Terrorism Information Awareness Program

Report to Congress regarding the Terrorism Information Awareness Program Report to Congress regarding the Terrorism Information Awareness Program In response to Consolidated Appropriations Resolution, 2003, Pub. L. No. 108-7, Division M, 111(b) Executive Summary May 20, 2003

More information

Canada s Digital ID Future - A Federated Approach

Canada s Digital ID Future - A Federated Approach Canada s Digital ID Future - A Federated Approach Spring 2018 Digital ID Digital ID is the challenge of answering Who are you? with a high degree of certainty, without resorting to face-to-face interaction

More information

PROGRAM CONCEPT NOTE Theme: Identity Ecosystems for Service Delivery

PROGRAM CONCEPT NOTE Theme: Identity Ecosystems for Service Delivery PROGRAM CONCEPT NOTE Theme: Identity Ecosystems for Service Delivery Program Structure for the 2019 ANNUAL MEETING DAY 1 PS0 8:30-9:30 Opening Ceremony Opening Ceremony & Plenaries N0 9:30-10:30 OPENING

More information

TRACES OF FORGERY IN DIGITALLY MANIPULATED DOCUMENTS

TRACES OF FORGERY IN DIGITALLY MANIPULATED DOCUMENTS TRACES OF FORGERY IN DIGITALLY MANIPULATED DOCUMENTS Audrys DERINGAS Institute of Forensic Examination, Vilnius, Lithuania ABSTRACT: Criminals use modern technology for producing counterfeit documents.

More information

Science as an Open Enterprise

Science as an Open Enterprise Science as an Open Enterprise Geoffrey Boulton (Royal Society, University of Edinburgh) Open Aire Feb 2013 Report: Report:twww.royalsociety.org Open communication of data: the source of a scientific revolution

More information

Personal Data Protection Competency Framework for School Students. Intended to help Educators

Personal Data Protection Competency Framework for School Students. Intended to help Educators Conférence INTERNATIONAL internationale CONFERENCE des OF PRIVACY commissaires AND DATA à la protection PROTECTION des données COMMISSIONERS et à la vie privée Personal Data Protection Competency Framework

More information

This policy sets out how Legacy Foresight and its Associates will seek to ensure compliance with the legislation.

This policy sets out how Legacy Foresight and its Associates will seek to ensure compliance with the legislation. Privacy Notice August 2018 Introduction The General Data Protection Regulation (GDPR) is European wide data protection legislation that requires organisations working with individuals based in the European

More information

PRIVACY IMPACT ASSESSMENT

PRIVACY IMPACT ASSESSMENT PRIVACY IMPACT ASSESSMENT PRIVACY IMPACT ASSESSMENT The template below is designed to assist you in carrying out a privacy impact assessment (PIA). Privacy Impact Assessment screening questions These questions

More information

DORSAL PALM VEIN PATTERN BASED RECOGNITION SYSTEM

DORSAL PALM VEIN PATTERN BASED RECOGNITION SYSTEM DORSAL PALM VEIN PATTERN BASED RECOGNITION SYSTEM Tanya Shree 1, Ashwini Raykar 2, Pooja Jadhav 3 Dr. D.Y. Patil Institute of Engineering and Technology, Pimpri, Pune-411018 Department of Electronics and

More information

Password-less Behaviometrics Authentication on Touchscreen Devices

Password-less Behaviometrics Authentication on Touchscreen Devices Password-less Behaviometrics Authentication on Overview Researchers at Ohio University have developed a novel, secure, single-factor, behavioral biometric user authentication that is compatible with virtually

More information

Distinguishing Identical Twins by Face Recognition

Distinguishing Identical Twins by Face Recognition Distinguishing Identical Twins by Face Recognition P. Jonathon Phillips, Patrick J. Flynn, Kevin W. Bowyer, Richard W. Vorder Bruegge, Patrick J. Grother, George W. Quinn, and Matthew Pruitt Abstract The

More information

Identity Management and its impact on the Digital Economy

Identity Management and its impact on the Digital Economy Identity Management and its impact on the Digital Economy Alejandro Barros 1, Alejandro Pareja 2 October 2016 Contents Introduction... 2 Identity Management... 3 Enrolment in the National Identity System...

More information

Open Science for the 21 st century. A declaration of ALL European Academies

Open Science for the 21 st century. A declaration of ALL European Academies connecting excellence Open Science for the 21 st century A declaration of ALL European Academies presented at a special session with Mme Neelie Kroes, Vice-President of the European Commission, and Commissioner

More information

On-Line, Low-Cost and Pc-Based Fingerprint Verification System Based on Solid- State Capacitance Sensor

On-Line, Low-Cost and Pc-Based Fingerprint Verification System Based on Solid- State Capacitance Sensor On-Line, Low-Cost and Pc-Based Fingerprint Verification System Based on Solid- State Capacitance Sensor Mohamed. K. Shahin *, Ahmed. M. Badawi **, and Mohamed. S. Kamel ** *B.Sc. Design Engineer at International

More information

1. First printing, TR , March, 2000.

1. First printing, TR , March, 2000. MERL { A MITSUBISHI ELECTRIC RESEARCH LABORATORY http://www.merl.com Book Review: Biometrics William T. Freeman MERL, Mitsubishi Electric Research Labs. 201 Broadway Cambridge, MA 02139 TR-2000-07 March

More information

KEY FOCUS. Mobile Solutions for. Securing the Entire Identity Trust Chain. Border Management. Solving the Challenges of Breeder Documents

KEY FOCUS. Mobile Solutions for. Securing the Entire Identity Trust Chain. Border Management. Solving the Challenges of Breeder Documents I n f o r ma t i o nb r o c h u r e ABOUT THE 5TH BMIC The 5th and Identity Conference on Technical Cooperation & Capacity Building (5th BMIC) is organised by the International Organization for Migration

More information

28 TH INTERNATIONAL CONFERENCE OF DATA PROTECTION

28 TH INTERNATIONAL CONFERENCE OF DATA PROTECTION 28 TH INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS 2 ND & 3 RD NOVEMBER 2006 LONDON, UNITED KINGDOM CLOSING COMMUNIQUÉ The 28 th International Conference of Data Protection and

More information

2 3, MAY 2018 ANKARA, TURKEY

2 3, MAY 2018 ANKARA, TURKEY SEVENTH SESSION OF OIC STATISTICAL COMMISSION 2 3, MAY 2018 ANKARA, TURKEY CRVS for the 2020 Round of Population and Housing Census Mr. Nyakassi M.B. Sanyang, The Gambia Presentation Outline Introduction

More information

An Efficient Approach for Iris Recognition by Improving Iris Segmentation and Iris Image Compression

An Efficient Approach for Iris Recognition by Improving Iris Segmentation and Iris Image Compression An Efficient Approach for Iris Recognition by Improving Iris Segmentation and Iris Image Compression K. N. Jariwala, SVNIT, Surat, India U. D. Dalal, SVNIT, Surat, India Abstract The biometric person authentication

More information

V I S O c o r e I n s p e c t

V I S O c o r e I n s p e c t V I S O c o r e I n s p e c t S o f t wa r e s o l u t i o n f o r s e c u r e d o c u m e n t v e r i f i c at i o n Passports and ID cards prove our identity. In order to improve and facilitate the verification

More information

Topic: Birth registration as an opportunity to integrate civil registration and identity management systems

Topic: Birth registration as an opportunity to integrate civil registration and identity management systems Fourth Conference of African Ministers Responsible for Civil Registration 4-8 December 2017 Nouakchott AUC/CRMC4/2017/14 Topic: Birth registration as an opportunity to integrate civil registration and

More information

SVC2004: First International Signature Verification Competition

SVC2004: First International Signature Verification Competition SVC2004: First International Signature Verification Competition Dit-Yan Yeung 1, Hong Chang 1, Yimin Xiong 1, Susan George 2, Ramanujan Kashi 3, Takashi Matsumoto 4, and Gerhard Rigoll 5 1 Hong Kong University

More information

Comparison of ridge- and intensity-based perspiration liveness detection methods in fingerprint scanners

Comparison of ridge- and intensity-based perspiration liveness detection methods in fingerprint scanners Comparison of ridge- and intensity-based perspiration liveness detection methods in fingerprint scanners Bozhao Tan and Stephanie Schuckers Department of Electrical and Computer Engineering, Clarkson University,

More information

An Overview of Biometrics. Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University

An Overview of Biometrics. Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University An Overview of Biometrics Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University What are Biometrics? Biometrics refers to identification of humans by their characteristics or traits Physical

More information

Towards a Magna Carta for Data

Towards a Magna Carta for Data Towards a Magna Carta for Data Expert Opinion Piece: Engineering and Computer Science Committee February 2017 Expert Opinion Piece: Engineering and Computer Science Committee Context Big Data is a frontier

More information

Secure communication based on noisy input data Fuzzy Commitment schemes. Stephan Sigg

Secure communication based on noisy input data Fuzzy Commitment schemes. Stephan Sigg Secure communication based on noisy input data Fuzzy Commitment schemes Stephan Sigg May 24, 2011 Overview and Structure 05.04.2011 Organisational 15.04.2011 Introduction 19.04.2011 Classification methods

More information

3D Face Recognition System in Time Critical Security Applications

3D Face Recognition System in Time Critical Security Applications Middle-East Journal of Scientific Research 25 (7): 1619-1623, 2017 ISSN 1990-9233 IDOSI Publications, 2017 DOI: 10.5829/idosi.mejsr.2017.1619.1623 3D Face Recognition System in Time Critical Security Applications

More information

Promising technologies to meet tomorrow s security challenges

Promising technologies to meet tomorrow s security challenges Kevin M. Panneton Professor Stephen Saravara Security Management 44.312.201 25 November 2009 Panneton 1 Promising technologies to meet tomorrow s security challenges Within the field of industrial and

More information

Privacy and Security in an On Demand World

Privacy and Security in an On Demand World Privacy and Security in an On Demand World Harriet Pearson, V.P. Workforce & Chief Privacy Officer IBM Corporation Almaden Institute Symposium on Privacy April 9, 2003 2002 IBM Corporation Outline Where

More information

8 Executive summary. Intelligent Software Agent Technologies: Turning a Privacy Threat into a Privacy Protector

8 Executive summary. Intelligent Software Agent Technologies: Turning a Privacy Threat into a Privacy Protector 8 Executive summary Intelligent Software Agent Technologies: Turning a Privacy Threat into a Privacy Protector The hectic demands of modern lifestyles, combined with the growing power of information technology,

More information

Technologies that will make a difference for Canadian Law Enforcement

Technologies that will make a difference for Canadian Law Enforcement The Future Of Public Safety In Smart Cities Technologies that will make a difference for Canadian Law Enforcement The car is several meters away, with only the passenger s side visible to the naked eye,

More information

12 April Fifth World Congress for Freedom of Scientific research. Speech by. Giovanni Buttarelli

12 April Fifth World Congress for Freedom of Scientific research. Speech by. Giovanni Buttarelli 12 April 2018 Fifth World Congress for Freedom of Scientific research Speech by Giovanni Buttarelli Good morning ladies and gentlemen. It is my real pleasure to contribute to such a prestigious event today.

More information

Little Fingers. Big Challenges.

Little Fingers. Big Challenges. Little Fingers. Big Challenges. How Image Quality and Sensor Technology Are Key for Fast, Accurate Mobile Fingerprint Recognition for Children The Challenge of Children s Identity While automated fingerprint

More information

Bluetooth Low Energy Sensing Technology for Proximity Construction Applications

Bluetooth Low Energy Sensing Technology for Proximity Construction Applications Bluetooth Low Energy Sensing Technology for Proximity Construction Applications JeeWoong Park School of Civil and Environmental Engineering, Georgia Institute of Technology, 790 Atlantic Dr. N.W., Atlanta,

More information

Convention on Certain Conventional Weapons (CCW) Meeting of Experts on Lethal Autonomous Weapons Systems (LAWS) April 2016, Geneva

Convention on Certain Conventional Weapons (CCW) Meeting of Experts on Lethal Autonomous Weapons Systems (LAWS) April 2016, Geneva Introduction Convention on Certain Conventional Weapons (CCW) Meeting of Experts on Lethal Autonomous Weapons Systems (LAWS) 11-15 April 2016, Geneva Views of the International Committee of the Red Cross

More information

Technological and Social Issues in the development and deployment of Facial Recognition Biometric Systems

Technological and Social Issues in the development and deployment of Facial Recognition Biometric Systems Master Thesis Computer Science Thesis no: MCS-2008-44 January 09 Technological and Social Issues in the development and deployment of Facial Recognition Biometric Systems By: Shaukat Ali Khan Department

More information

Security of ATM Using Digital Image Processing

Security of ATM Using Digital Image Processing Security of ATM Using Digital Image Processing Avni Mittal 1, Shubhani 2, Sarika Tyagi 3 Department of Computer Science and Engineering Raj Kumar Goel Institute of Technology for Women Ghaziabad, India

More information

Physical Barriers. Physical Security. Mantraps. Mantrap. Week 6 Part 1. A chain is only as strong as its weakest link

Physical Barriers. Physical Security. Mantraps. Mantrap. Week 6 Part 1. A chain is only as strong as its weakest link Physical Security Physical Barriers Week 6 Part 1 A chain is only as strong as its weakest link Physical Barriers Mantraps Naturally, physical barriers must be in place to prevent physical access to a

More information

Digital transformation in the Catalan public administrations

Digital transformation in the Catalan public administrations Digital transformation in the Catalan public administrations Joan Ramon Marsal, Coordinator of the National Agreement for the Digital Society egovernment Working Group. Government of Catalonia Josep Lluís

More information

Evaluation of Biometric Systems. Christophe Rosenberger

Evaluation of Biometric Systems. Christophe Rosenberger Evaluation of Biometric Systems Christophe Rosenberger Outline GREYC research lab Evaluation: a love story Evaluation of biometric systems Quality of biometric templates Conclusions & perspectives 2 GREYC

More information

Human Identifier Tag

Human Identifier Tag Human Identifier Tag Device to identify and rescue humans Teena J 1 Information Science & Engineering City Engineering College Bangalore, India teenprasad110@gmail.com Abstract If every human becomes an

More information

TOKEN SALE AGREEMENT

TOKEN SALE AGREEMENT TOKEN SALE AGREEMENT SwiftDemand Last Updated: March 30, 2018 This Token Sale Agreement is a legally binding contract between you and SwiftDemand Inc. (hereinafter Company ) regarding your rights and responsibilities

More information

UNITED NATIONS COMMISSION ON SCIENCE AND TECHNOLOGY FOR DEVELOPMENT (CSTD)

UNITED NATIONS COMMISSION ON SCIENCE AND TECHNOLOGY FOR DEVELOPMENT (CSTD) UNITED NATIONS COMMISSION ON SCIENCE AND TECHNOLOGY FOR DEVELOPMENT (CSTD) Contribution to the CSTD ten-year review of the implementation of WSIS outcomes Submitted by PAKISTAN DISCLAIMER: The views presented

More information

VIEW POINT CHANGING THE BUSINESS LANDSCAPE WITH COGNITIVE SERVICES

VIEW POINT CHANGING THE BUSINESS LANDSCAPE WITH COGNITIVE SERVICES VIEW POINT CHANGING THE BUSINESS LANDSCAPE WITH COGNITIVE SERVICES Abstract We no longer live in a world where automation is rare and predictive technology is new. In today s digital world, customers and

More information

Biometrical verification based on infrared heat vein patterns

Biometrical verification based on infrared heat vein patterns Proceedings of the 3rd IIAE International Conference on Intelligent Systems and Image Processing 2015 Biometrical verification based on infrared heat vein patterns Elnaz Mazandarani a, Kaori Yoshida b,

More information

The Information Commissioner s response to the Draft AI Ethics Guidelines of the High-Level Expert Group on Artificial Intelligence

The Information Commissioner s response to the Draft AI Ethics Guidelines of the High-Level Expert Group on Artificial Intelligence Wycliffe House, Water Lane, Wilmslow, Cheshire, SK9 5AF T. 0303 123 1113 F. 01625 524510 www.ico.org.uk The Information Commissioner s response to the Draft AI Ethics Guidelines of the High-Level Expert

More information

BIOMETRIC IDENTIFICATION

BIOMETRIC IDENTIFICATION BIOMETRIC IDENTIFICATION When it comes to working biometric identification technologies, it s not only our fingerprints that do the talking. Now, our eyes, hands, signature, speech, and even facial temperature

More information

Biometrics and Fingerprint Authentication Technical White Paper

Biometrics and Fingerprint Authentication Technical White Paper Biometrics and Fingerprint Authentication Technical White Paper Fidelica Microsystems, Inc. 423 Dixon Landing Road Milpitas, CA 95035 1 INTRODUCTION Biometrics, the science of applying unique physical

More information