Search results
1 – 10 of 147Personal identification numbers, passwords, smart cards and digital certificates are some of the means employed for user authentication in various electronic commerce…
Abstract
Personal identification numbers, passwords, smart cards and digital certificates are some of the means employed for user authentication in various electronic commerce applications. However, these means do not really identify a person, but only knowledge of some data or belonging of some determined object. This paper introduces the notion of biometric signature – a new approach to integrate biometrics with public key infrastructure, using biometric based digital signature generation which is secure, efficacious, fast, convenient, non‐invasive and correctly identifies the maker of a transaction. It also suggests two schemes for biometric signature using two existing and widely used digital signature algorithms, RSA and DSA, and discusses the problems associated with them individually. Speed of both schemes (based on iris recognition) is measured and compared with the help of JAVA implementation for both approaches.
Details
Keywords
Abstract
Details
Keywords
To overview the iris cameras, iris recognition systems, and their applications.
Abstract
Purpose
To overview the iris cameras, iris recognition systems, and their applications.
Design/methodology/approach
Introduced and examined commercially available or lab prototype iris cameras and systems to compare their functionalities and applications.
Findings
Each kind of camera has its advantage and disadvantage. From the application view, each iris recognition system has its unique values.
Originality/value
This paper offers latest updates and essential information on iris recognition cameras and systems. It can benefit busy engineers, researchers, and managers who are interested in biometrics, security, and new technologies.
Details
Keywords
Juline E. Mills, Matthew Meyers and Sookeun Byun
The purpose of this paper is to review viable biometric technologies and examine their applicability in the hospitality and tourism businesses.
Abstract
Purpose
The purpose of this paper is to review viable biometric technologies and examine their applicability in the hospitality and tourism businesses.
Design/methodology/approach
First, the different types of biometrics in the market with their advantages and disadvantages are reviewed, followed by a discussion of current applications within the hospitality and tourism sector.
Findings
Potential business impacts of biometrics are identified such as increased consumer convenience, operational efficiency, and security. Meanwhile, despite its great benefits, consumers' privacy concerns that are raised during biometric data collection and management processes may keep the technology from realizing its full potential.
Research limitations/implications
The paper only presents a glimpse of what may be done with the technology, as the potential extent of its usage is bound only by management's imagination while the possibilities that the technology brings to industry may be numerous.
Practical implications
Hospitality and tourism companies must have clear goals and logical approaches for usage and implementation of biometric technologies. They also need to be acutely aware of any privacy, guest perceptions, attitude towards, and trust factors that may surround the usage of biometric technologies. Moreover, corporate responsibility and ethical usage of the information obtained from biometrics may influence guest willingness to use the technology.
Originality/value
The paper has value in that there has been a lack of research on the impact of biometrics on the service industry, as well as user concerns towards the technology, rather than system development.
Details
Keywords
To study the mathematical image coding approaches used in two types of biometric systems, and the physical nature of those biometrics.
Abstract
Purpose
To study the mathematical image coding approaches used in two types of biometric systems, and the physical nature of those biometrics.
Design/methodology/approach
Gives details of algorithms used to encode data from images in established and new automatic iris recognition systems. Then examines face recognition techniques based on geometry, texture and three‐dimensional data.
Findings
Most commercial iris recognition systems are based on the algorithms developed by one man, John Daugman. Whilst iris systems can be used to check a person's identity against a large database of enrolled people, face recognition systems are currently only capable of use in one‐to‐one recognition mode, or in identification mode against a very small database. The iris is very distinctive and stable over time, but the face is much more variable and therefore difficult to identify with accuracy.
Originality/value
Provides the general scientific reader with some insight into the specialised field of biometric recognition.
Details
Keywords
V. Zorkadis and P. Donos
Biometric techniques, such as fingerprint verification, iris or face recognition, retina analysis and hand‐written signature verification, are increasingly becoming basic elements…
Abstract
Biometric techniques, such as fingerprint verification, iris or face recognition, retina analysis and hand‐written signature verification, are increasingly becoming basic elements of authentication and identification systems. However, any human physiological or behavioural traits serving as biometric characteristics are personal data protected by privacy protection legislation. To address related issues, this paper examines these classes of biometrics according to data protection principles, purpose, proportionality and security, provided in international legislation. This analysis leads to the desired properties of biometric systems in the form of functional and non‐functional requirements, in order to support developers minimising the risk of being non‐compliant to privacy protection legislation, and to increase user acceptance.
Details
Keywords
Wilson Abel Alberto Torres, Nandita Bhattacharjee and Bala Srinivasan
The purpose of this paper is to determine the effectiveness of using fully homomorphic encryption (FHE) to preserve the privacy of biometric data in an authentication system…
Abstract
Purpose
The purpose of this paper is to determine the effectiveness of using fully homomorphic encryption (FHE) to preserve the privacy of biometric data in an authentication system. Biometrics offers higher accuracy for personal recognition than traditional methods because of its properties. Biometric data are permanently linked with an individual and cannot be revoked or cancelled, especially when biometric data are compromised, leading to privacy issues.
Design/methodology/approach
By reviewing current approaches, FHE is considered as a promising solution for the privacy issue because of its ability to perform computations in the encrypted domain. The authors studied the effectiveness of FHE in biometric authentication systems. In doing so, the authors undertake the study by implementing a protocol for biometric authentication system using iris.
Findings
The security analysis of the implementation scheme demonstrates the effectiveness of FHE to protect the privacy of biometric data, as unlimited operations can be performed in the encrypted domain, and the FHE secret key is not shared with any other party during the authentication protocol.
Research limitations/implications
The use of malicious model in the design of the authentication protocol to improve the privacy, packing methods and use of low-level programming language to enhance performance of the system needs to be further investigated.
Originality/value
The main contributions of this paper are the implementation of a privacy-preserving iris biometric authentication protocol adapted to lattice-based FHE and a sound security analysis of authentication and privacy.
Details
Keywords
Naveed Riaz, Ayesha Riaz and Sajid Ali Khan
The security of the stored biometric template is itself a challenge. Feature transformation techniques and biometric cryptosystems are used to address the concerns and improve the…
Abstract
Purpose
The security of the stored biometric template is itself a challenge. Feature transformation techniques and biometric cryptosystems are used to address the concerns and improve the general acceptance of biometrics. The purpose of this paper is to provide an overview of different techniques and processes for securing the biometric templates. Furthermore, the paper explores current research trends in this area.
Design/methodology/approach
In this paper, the authors provide an overview and survey of different features transformation techniques and biometric cryptosystems.
Findings
Feature transformation techniques and biometric cryptosystems provide reliable biometric security at a high level. There are many techniques that provide provable security with practical viable recognition rates. However, there remain several issues and challenges that are being faced during the deployment of these technologies.
Originality/value
This paper provides an overview of currently used techniques for securing biometric templates and also outlines the related issues and challenges.
Details
Keywords
Fabio Bacchini and Ludovica Lorusso
This study aims to explore the ethical and social issues of tattoo recognition technology (TRT) and tattoo similarity detection technology (TSDT), which are expected to be…
Abstract
Purpose
This study aims to explore the ethical and social issues of tattoo recognition technology (TRT) and tattoo similarity detection technology (TSDT), which are expected to be increasingly used by state and local police departments and law enforcement agencies.
Design/methodology/approach
The paper investigates the new ethical concerns raised by tattoo-based biometrics on a comparative basis with face-recognition biometrics.
Findings
TRT raises much more ethically sensitive issues than face recognition, because tattoos are meaningful biometric traits, and tattoo identification is tantamount to the identification of many more personal features that normally would have remained invisible. TSDT’s assumption that classifying people in virtue of their visible features is useful to foretell their attitudes and behaviours is dangerously similar to racist thought.
Practical implications
The findings hope to promote an active debate on the ethical and social aspects of tattoo-based biometrics before it is intensely implemented by law enforcement agencies.
Social implications
Tattooed individuals – inasmuch as they are more controlled and monitored – are negatively discriminated in comparison to un-tattooed individuals. As tattooing is not uniformly distributed among population, many demographic groups like African–Americans will be overrepresented in tattoos databases used by TRT and TSDT, thus being affected by disproportionately higher risk to be found as a match for a given suspect.
Originality/value
TRT and TSDT represent one of the new frontiers of biometrics. The ethical and social issues raised by TRT and TSDT are currently unexplored.
Details
Keywords
Gail E. Torbet, Ian M. Marshall and Steve Jones
Explores the potential use of behavioural and physiologicalbiometric techniques in the battle against credit card fraud in theretail environment. Discusses automatic speaker and…
Abstract
Explores the potential use of behavioural and physiological biometric techniques in the battle against credit card fraud in the retail environment. Discusses automatic speaker and dynamic signature verification, fingerprint and facial recognition, retinal and iris scanning, and hand and finger geometry. The requirement for recognition performance, speed of use, usability and customer acceptance, device and card cost are considered, along with industry standards for biometric devices.
Details