- ホーム
- > 洋書
- > 英文書
- > Science / Mathematics
Full Description
The interplay of privacy, security and user-determination is an important consideration in the roll-out of biometric technologies. It brings into play requirements such as privacy of biometric data in systems, communication and databases, soft biometric profiling, biometric recognition of persons across distributed systems and in nomadic scenarios, and the convergence between user convenience, usability and authentication reliability.
User-Centric Privacy and Security in Biometrics explores how developments in biometrics will address security and privacy aspects. The book surveys and evaluates how biometric techniques can enhance and increase the reliability of security strategies in a variety of applications. This includes privacy-preserving state-of-the-art works and future directions in the view of biometrics as part of broader security concepts. The fundamental emphasis is on privacy within and for biometrics, particularly for the protection of biometric data, informed consent of data usage, transparency on biometric data, and big data fraud prevention.
Contents
PART I: Introduction and interdisciplinary approaches
Chapter 1: The interplay of privacy, security and user-determination in biometrics
Chapter 2: Privacy of online handwriting biometrics related to biomedical analysis
Chapter 3: Privacy concepts in biometrics: lessons learned from forensics
PART II: Privacy and security of biometrics within general security systems
Chapter 4: Physical layer security: biometrics vs. physical objects
Chapter 5: Biometric systems in unsupervised environments and smart cards: conceptual advances on privacy and security
Chapter 6: Inverse biometrics and privacy
Chapter 7: Double-layer secret-sharing system involving privacy preserving biometric authentication
PART III: Security and privacy issues inherent to biometrics
Chapter 8: Biometric template protection: state-of-the-art, issues and challenges
Chapter 9: Handwriting biometrics - feature-based optimisation
Chapter 10: Presentation attack detection in voice biometrics
Chapter 11: Benford's law for classification of biometric images
PART IV: User-centricity and the future
Chapter 12: Random projections for increased privacy
Chapter 13: De-identification for privacy protection in biometrics
Chapter 14: Secure cognitive recognition: brain-based biometric cryptosystems using EEG
Chapter 15: A multidisciplinary analysis of the implementation of biometric systems and their implications in society
Chapter 16: Biometrics, identity, recognition and the private sphere where we are, where we go



