Biometrics: privacy and social acceptance
This tutorial will cover the privacy and security of biometrics. The first part, will address the concept of identity and its ethical implications. The concept of personal identity is important from several perspectives. From a cultural perspective, the more the world converges, the more individual...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch Video |
Sprache: | English |
Veröffentlicht: |
United States
IEEE
2010
|
Schlagworte: | |
Online-Zugang: | FHN01 TUM01 |
Zusammenfassung: | This tutorial will cover the privacy and security of biometrics. The first part, will address the concept of identity and its ethical implications. The concept of personal identity is important from several perspectives. From a cultural perspective, the more the world converges, the more individual cultures wish to maintain their separate identities. From an individual perspective, the greater the population and the tendency to reduce people to stereotypes, the greater the desire to establish an individual identity. There is, however, another level where identity and the verification of identity, is becoming increasingly important in relation to all manner of transactions, from those related to mobility, to those related to legal, and political, rights and obligations, and finally to financial and economical transactions. The intrusion of technology into these areas is not new, but their heightened visibility and ubiquity can create anxiety. This holds particularly true for biometrics. This tutorial will present the security and privacy issues with traditional biometrics; introduce the Biometrics Dilemma and the various threats it poses; and describe a model for biometric DB risk, highlighting the problem with standard large-scale biometrics. The tutorial will explain why standard encryption does not solve the key problems, but also explores best practices in using standard encryption, which can improve security. Moving to security, the tutorial will examine security system architectures, the role of authentication in such systems and the standard architectures for authentication using biometrics. An examination of the advantages that biometrics bring, how biometrics can improve security and even privacy in such systems, and a discussion of their weakness in both security and privacy will be presented. The tutorial will briefly discusses the Nobel Prize winning Economic theory of asymmetric information, Akerlof's market for lemons and Kerckhoffs' principles for s curity, and their implications for biometrics systems, especially large scale deployments. The last component of the tutorial is an in-depth review of the state of the art in what is sometimes called biometric template protection, including biometric encryption, fuzzy vaults, fuzzy extractors, biometric hashing, and cancelable biometrics. The tutorial will walk through a security analysis of these technologies including the published attacks |
Beschreibung: | Description based on online resource; title from title screen (IEEE Xplore Digital Library, viewed November 13, 2020) |
Beschreibung: | 1 Online-Resource (1 Videodatei, 60 Minuten) color illustrations |
ISBN: | 9781424462155 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV047477132 | ||
003 | DE-604 | ||
005 | 20220204 | ||
007 | cr|uuu---uuuuu | ||
008 | 210921s2010 |||| o||u| ||||||eng d | ||
020 | |a 9781424462155 |9 978-1-4244-6215-5 | ||
035 | |a (ZDB-37-ICG)EDP198 | ||
035 | |a (OCoLC)1269389689 | ||
035 | |a (DE-599)BVBBV047477132 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-92 | ||
082 | 0 | |a 155.92 |2 23 | |
100 | 1 | |a Scheirer, Walter J. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Biometrics |b privacy and social acceptance |c Walter J. Scheirer, Terrance Boult |
264 | 1 | |a United States |b IEEE |c 2010 | |
300 | |a 1 Online-Resource (1 Videodatei, 60 Minuten) |b color illustrations | ||
336 | |b tdi |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Description based on online resource; title from title screen (IEEE Xplore Digital Library, viewed November 13, 2020) | ||
520 | |a This tutorial will cover the privacy and security of biometrics. The first part, will address the concept of identity and its ethical implications. The concept of personal identity is important from several perspectives. From a cultural perspective, the more the world converges, the more individual cultures wish to maintain their separate identities. From an individual perspective, the greater the population and the tendency to reduce people to stereotypes, the greater the desire to establish an individual identity. There is, however, another level where identity and the verification of identity, is becoming increasingly important in relation to all manner of transactions, from those related to mobility, to those related to legal, and political, rights and obligations, and finally to financial and economical transactions. The intrusion of technology into these areas is not new, but their heightened visibility and ubiquity can create anxiety. | ||
520 | |a This holds particularly true for biometrics. This tutorial will present the security and privacy issues with traditional biometrics; introduce the Biometrics Dilemma and the various threats it poses; and describe a model for biometric DB risk, highlighting the problem with standard large-scale biometrics. The tutorial will explain why standard encryption does not solve the key problems, but also explores best practices in using standard encryption, which can improve security. Moving to security, the tutorial will examine security system architectures, the role of authentication in such systems and the standard architectures for authentication using biometrics. An examination of the advantages that biometrics bring, how biometrics can improve security and even privacy in such systems, and a discussion of their weakness in both security and privacy will be presented. | ||
520 | |a The tutorial will briefly discusses the Nobel Prize winning Economic theory of asymmetric information, Akerlof's market for lemons and Kerckhoffs' principles for s curity, and their implications for biometrics systems, especially large scale deployments. The last component of the tutorial is an in-depth review of the state of the art in what is sometimes called biometric template protection, including biometric encryption, fuzzy vaults, fuzzy extractors, biometric hashing, and cancelable biometrics. The tutorial will walk through a security analysis of these technologies including the published attacks | ||
650 | 4 | |a Privacy | |
650 | 4 | |a Security | |
650 | 4 | |a Authentication | |
650 | 4 | |a Surveillance | |
650 | 4 | |a Risk management | |
655 | 7 | |0 (DE-588)4017102-4 |a Film |2 gnd-content | |
700 | 1 | |a Boult, Terrance |e Sonstige |4 oth | |
912 | |a ZDB-37-ICG | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-032878693 | ||
966 | e | |u https://ieeexplore.ieee.org/courses/details/EDP198 |l FHN01 |p ZDB-37-ICG |x Verlag |3 Volltext | |
966 | e | |u https://ieeexplore.ieee.org/courses/details/EDP198 |l TUM01 |p ZDB-37-ICG |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804182793113042944 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Scheirer, Walter J. |
author_facet | Scheirer, Walter J. |
author_role | aut |
author_sort | Scheirer, Walter J. |
author_variant | w j s wj wjs |
building | Verbundindex |
bvnumber | BV047477132 |
collection | ZDB-37-ICG |
ctrlnum | (ZDB-37-ICG)EDP198 (OCoLC)1269389689 (DE-599)BVBBV047477132 |
dewey-full | 155.92 |
dewey-hundreds | 100 - Philosophy & psychology |
dewey-ones | 155 - Differential & developmental psychology |
dewey-raw | 155.92 |
dewey-search | 155.92 |
dewey-sort | 3155.92 |
dewey-tens | 150 - Psychology |
discipline | Psychologie |
discipline_str_mv | Psychologie |
format | Electronic Video |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03962nmm a2200445zc 4500</leader><controlfield tag="001">BV047477132</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20220204 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">210921s2010 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781424462155</subfield><subfield code="9">978-1-4244-6215-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-37-ICG)EDP198</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1269389689</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047477132</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-92</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">155.92</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Scheirer, Walter J.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Biometrics</subfield><subfield code="b">privacy and social acceptance</subfield><subfield code="c">Walter J. Scheirer, Terrance Boult</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">United States</subfield><subfield code="b">IEEE</subfield><subfield code="c">2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Resource (1 Videodatei, 60 Minuten)</subfield><subfield code="b">color illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">tdi</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on online resource; title from title screen (IEEE Xplore Digital Library, viewed November 13, 2020)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This tutorial will cover the privacy and security of biometrics. The first part, will address the concept of identity and its ethical implications. The concept of personal identity is important from several perspectives. From a cultural perspective, the more the world converges, the more individual cultures wish to maintain their separate identities. From an individual perspective, the greater the population and the tendency to reduce people to stereotypes, the greater the desire to establish an individual identity. There is, however, another level where identity and the verification of identity, is becoming increasingly important in relation to all manner of transactions, from those related to mobility, to those related to legal, and political, rights and obligations, and finally to financial and economical transactions. The intrusion of technology into these areas is not new, but their heightened visibility and ubiquity can create anxiety. </subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This holds particularly true for biometrics. This tutorial will present the security and privacy issues with traditional biometrics; introduce the Biometrics Dilemma and the various threats it poses; and describe a model for biometric DB risk, highlighting the problem with standard large-scale biometrics. The tutorial will explain why standard encryption does not solve the key problems, but also explores best practices in using standard encryption, which can improve security. Moving to security, the tutorial will examine security system architectures, the role of authentication in such systems and the standard architectures for authentication using biometrics. An examination of the advantages that biometrics bring, how biometrics can improve security and even privacy in such systems, and a discussion of their weakness in both security and privacy will be presented. </subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The tutorial will briefly discusses the Nobel Prize winning Economic theory of asymmetric information, Akerlof's market for lemons and Kerckhoffs' principles for s curity, and their implications for biometrics systems, especially large scale deployments. The last component of the tutorial is an in-depth review of the state of the art in what is sometimes called biometric template protection, including biometric encryption, fuzzy vaults, fuzzy extractors, biometric hashing, and cancelable biometrics. The tutorial will walk through a security analysis of these technologies including the published attacks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Privacy</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Authentication</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Surveillance</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Risk management</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4017102-4</subfield><subfield code="a">Film</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Boult, Terrance</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-37-ICG</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032878693</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ieeexplore.ieee.org/courses/details/EDP198</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-37-ICG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ieeexplore.ieee.org/courses/details/EDP198</subfield><subfield code="l">TUM01</subfield><subfield code="p">ZDB-37-ICG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)4017102-4 Film gnd-content |
genre_facet | Film |
id | DE-604.BV047477132 |
illustrated | Illustrated |
index_date | 2024-07-03T18:11:31Z |
indexdate | 2024-07-10T09:13:11Z |
institution | BVB |
isbn | 9781424462155 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032878693 |
oclc_num | 1269389689 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-92 |
owner_facet | DE-91 DE-BY-TUM DE-92 |
physical | 1 Online-Resource (1 Videodatei, 60 Minuten) color illustrations |
psigel | ZDB-37-ICG |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | IEEE |
record_format | marc |
spelling | Scheirer, Walter J. Verfasser aut Biometrics privacy and social acceptance Walter J. Scheirer, Terrance Boult United States IEEE 2010 1 Online-Resource (1 Videodatei, 60 Minuten) color illustrations tdi rdacontent c rdamedia cr rdacarrier Description based on online resource; title from title screen (IEEE Xplore Digital Library, viewed November 13, 2020) This tutorial will cover the privacy and security of biometrics. The first part, will address the concept of identity and its ethical implications. The concept of personal identity is important from several perspectives. From a cultural perspective, the more the world converges, the more individual cultures wish to maintain their separate identities. From an individual perspective, the greater the population and the tendency to reduce people to stereotypes, the greater the desire to establish an individual identity. There is, however, another level where identity and the verification of identity, is becoming increasingly important in relation to all manner of transactions, from those related to mobility, to those related to legal, and political, rights and obligations, and finally to financial and economical transactions. The intrusion of technology into these areas is not new, but their heightened visibility and ubiquity can create anxiety. This holds particularly true for biometrics. This tutorial will present the security and privacy issues with traditional biometrics; introduce the Biometrics Dilemma and the various threats it poses; and describe a model for biometric DB risk, highlighting the problem with standard large-scale biometrics. The tutorial will explain why standard encryption does not solve the key problems, but also explores best practices in using standard encryption, which can improve security. Moving to security, the tutorial will examine security system architectures, the role of authentication in such systems and the standard architectures for authentication using biometrics. An examination of the advantages that biometrics bring, how biometrics can improve security and even privacy in such systems, and a discussion of their weakness in both security and privacy will be presented. The tutorial will briefly discusses the Nobel Prize winning Economic theory of asymmetric information, Akerlof's market for lemons and Kerckhoffs' principles for s curity, and their implications for biometrics systems, especially large scale deployments. The last component of the tutorial is an in-depth review of the state of the art in what is sometimes called biometric template protection, including biometric encryption, fuzzy vaults, fuzzy extractors, biometric hashing, and cancelable biometrics. The tutorial will walk through a security analysis of these technologies including the published attacks Privacy Security Authentication Surveillance Risk management (DE-588)4017102-4 Film gnd-content Boult, Terrance Sonstige oth |
spellingShingle | Scheirer, Walter J. Biometrics privacy and social acceptance Privacy Security Authentication Surveillance Risk management |
subject_GND | (DE-588)4017102-4 |
title | Biometrics privacy and social acceptance |
title_auth | Biometrics privacy and social acceptance |
title_exact_search | Biometrics privacy and social acceptance |
title_exact_search_txtP | Biometrics privacy and social acceptance |
title_full | Biometrics privacy and social acceptance Walter J. Scheirer, Terrance Boult |
title_fullStr | Biometrics privacy and social acceptance Walter J. Scheirer, Terrance Boult |
title_full_unstemmed | Biometrics privacy and social acceptance Walter J. Scheirer, Terrance Boult |
title_short | Biometrics |
title_sort | biometrics privacy and social acceptance |
title_sub | privacy and social acceptance |
topic | Privacy Security Authentication Surveillance Risk management |
topic_facet | Privacy Security Authentication Surveillance Risk management Film |
work_keys_str_mv | AT scheirerwalterj biometricsprivacyandsocialacceptance AT boultterrance biometricsprivacyandsocialacceptance |