Academic literature on the topic 'Biometric information protection'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Biometric information protection.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Biometric information protection":
Lee, Boo-Ha, and Shin-Uk Park. "Legislative Policy Consideration for Reinforcement of Biometrics Protection." LAW RESEARCH INSTITUTE CHUNGBUK NATIONAL UNIVERSITY 13, no. 1 (June 30, 2022): 171–98. http://dx.doi.org/10.34267/cbstl.2022.13.1.171.
Teng, Jackson Horlick, Thian Song Ong, Kalaiarasi S. M. A., and Connie Tee. "Finger Vein Template Protection with Directional Bloom Filter." HighTech and Innovation Journal 4, no. 2 (June 1, 2023): 412–33. http://dx.doi.org/10.28991/hij-2023-04-02-013.
Taha, Mohammed A., and Hanaa M. Ahmed. "A fuzzy vault development based on iris images." EUREKA: Physics and Engineering, no. 5 (September 13, 2021): 3–12. http://dx.doi.org/10.21303/2461-4262.2021.001997.
Kim, Younjin, and Ilhwan Kim. "Study on the Protection of the Right to Self-Determination of Personal Information with the Development of Facial Recognition Technology." Korean Constitutional Law Association 28, no. 4 (December 30, 2022): 535–82. http://dx.doi.org/10.35901/kjcl.2022.28.4.535.
Shin, Yong-Nyuo, Yong-Jun Lee, and Myung-Geun Chun. "Biometric Template Security for Personal Information Protection." Journal of Korean Institute of Intelligent Systems 18, no. 4 (August 25, 2008): 437–44. http://dx.doi.org/10.5391/jkiis.2008.18.4.437.
Lee, Yong-Joon, and Won-Shik Na. "E-Passport Advanced Security Technique Using Biometric Information Watermarking." Journal of Computational and Theoretical Nanoscience 18, no. 5 (May 1, 2021): 1540–49. http://dx.doi.org/10.1166/jctn.2021.9614.
Lee, Yong-Joon, and Won-Shik Na. "E-Passport Advanced Security Technique Using Biometric Information Watermarking." Journal of Computational and Theoretical Nanoscience 18, no. 5 (May 1, 2021): 1540–49. http://dx.doi.org/10.1166/jctn.2021.9614.
Sulavko, Alexey. "Highly reliable authentication based on handwritten passwords using hybrid neural networks with protection of biometric templates from being compromised." Information and Control Systems, no. 4 (August 24, 2020): 61–77. http://dx.doi.org/10.31799/1684-8853-2020-4-61-77.
Punithavathi, P., and S. Geetha. "Random Projection-based Cancelable Template Generation for Sparsely Distributed Biometric Patterns." Indonesian Journal of Electrical Engineering and Computer Science 7, no. 3 (September 1, 2017): 877. http://dx.doi.org/10.11591/ijeecs.v7.i3.pp877-886.
Ma, Ruoxue. "Legislative Conception for the Special Protection of Biometric Information: A Study Based on Extraterritorial Experience." Lecture Notes in Education Psychology and Public Media 10, no. 1 (September 14, 2023): 220–28. http://dx.doi.org/10.54254/2753-7048/10/20230195.
Dissertations / Theses on the topic "Biometric information protection":
Banerjea-Brodeur, Nicolas Paul. "Advance passenger information passenger name record : privacy rights and security awareness." Thesis, McGill University, 2003. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=80909.
Passenger Name Record access permits authorities to have additional data that could identify individuals requiring more questioning prior to border control clearance. This data does not cause in itself privacy issues other than perhaps the potential retention and manipulation of information that Border Control Authorities may acquire. In essence, bilateral agreements between governments should be sought in order to protect national legislation.
The common goal of the airline industry is to ensure safe and efficient air transport. API and PNR should be viewed as formalities that can facilitate border control clearance and prevent the entrance of potentially high-risk individuals.
Mtibaa, Aymen. "Towards robust and privacy-preserving speaker verification systems." Electronic Thesis or Diss., Institut polytechnique de Paris, 2022. http://www.theses.fr/2022IPPAS002.
Speaker verification systems are a key technology in many devices and services like smartphones, intelligent digital assistants, healthcare, and banking applications. Additionally, with the COVID pandemic, access control systems based on fingerprint scanners or keypads increase the risk of virus propagation. Therefore, companies are now rethinking their employee access control systems and considering touchless authorization technologies, such as speaker verification systems.However, speaker verification system requires users to transmit their recordings, features, or models derived from their voice samples without any obfuscation over untrusted public networks which stored and processed them on a cloud-based infrastructure. If the system is compromised, an adversary can use this biometric information to impersonate the genuine user and extract personal information. The voice samples may contain information about the user's gender, accent, ethnicity, and health status which raises several privacy issues.In this context, the present PhD Thesis address the privacy and security issues for speaker verification systems based on Gaussian mixture models (GMM), i-vector, and x-vector as speaker modeling. The objective is the development of speaker verification systems that perform biometric verification while preserving the privacy and the security of the user. To that end, we proposed biometric protection schemes for speaker verification systems to achieve the privacy requirements (revocability, unlinkability, irreversibility) described in the standard ISO/IEC IS~24745 on biometric information protection and to improve the robustness of the systems against different attack scenarios
LABATI, R. DONIDA. "CONTACTLESS FINGERPRINT BIOMETRICS: ACQUISITION, PROCESSING, AND PRIVACY PROTECTION." Doctoral thesis, Università degli Studi di Milano, 2013. http://hdl.handle.net/2434/217562.
Zhou, Xuebing Verfasser], Dieter W. [Akademischer Betreuer] [Fellner, and Raymond N. J. [Akademischer Betreuer] Veldhuis. "Privacy and Security Assessment of Biometric Template Protection / Xuebing Zhou. Betreuer: Dieter W. Fellner ; Raymond N. J. Veldhuis." Darmstadt : Universitäts- und Landesbibliothek Darmstadt, 2012. http://d-nb.info/1111908354/34.
Zhou, Xuebing [Verfasser], Dieter W. [Akademischer Betreuer] Fellner, and Raymond N. J. [Akademischer Betreuer] Veldhuis. "Privacy and Security Assessment of Biometric Template Protection / Xuebing Zhou. Betreuer: Dieter W. Fellner ; Raymond N. J. Veldhuis." Darmstadt : Universitäts- und Landesbibliothek Darmstadt, 2012. http://nbn-resolving.de/urn:nbn:de:tuda-tuprints-28858.
Bardou, Sophie. "Les traitements de données biométriques en entreprise." Thesis, Montpellier 1, 2010. http://www.theses.fr/2010MON10031/document.
Biometry brings together computing techniques that enable the identification of individuals on the basis of their biological, physical appearance and/or behavioral characteristics. Although firstly reserved for the legal system/judiciary domain, biometry tends to be generalized in all spheres of people life. Recently, biometry has also been used in companies who are always receptive to new technologies. Thus, the introduction of identifying devices such as these into a company life has to be the subject of corporate discussions between the managing teams and staff representatives. Indeed, such technologies are often compared to video surveillance, RFID chips, GPS data … and they can lead to the spying of employees if their uses are not well supervised. In the absence of specific laws, the legislator has given the CNIL the abilities to establish the requirements of eligibility of this technology usage within the companies. The "liberty and computing" legislation is then combined with the labor laws in order to apply common principles such as the finality, the proportionality, the loyalty, the transparency of information and employee consents
Diaz, Rodriguez V. "Transborder biometric information flow : legal challenges to personal privacy and the need for public debate." Thesis, 2014. https://eprints.utas.edu.au/22487/1/Whole-Diaz%20Rodriguez-thesis.pdf.
Adom'megaa, Prudencio Selly. "La protection de la vie privée dans le cadre de la lutte contre le terrorisme au Canada." Thesis, 2019. http://hdl.handle.net/1866/24442.
The fight against terrorism implies, amongst others, the execution of preventative and punitive legislation to manage the threats from which Canada is exposed. In this context, the state and its agents have access to many tools, such as “security technology” (facial recognition, video surveillance, fingerprinting, etc.), to achieve their different mandates. The operation of these mechanisms raises questions and concerns in regards to privacy protection. The sharing of personal information between different ministries, the consent pertaining to the collection of personal information, and legislators’ right of access to state secrets, etc., are issues that arise when the executive power undertakes security measures. It’s found that the legislative changes to fight against terrorism create an imbalance with respect to privacy protection. Indeed, unlike the fight against terrorism, the right to privacy is constitutionally protected under the Canadian Charter of rights and freedoms. One of the challenges that must be recognized by the executive, legislative and judiciary authorities is to conduct their actions according to the rule of law in the context of national security.
Books on the topic "Biometric information protection":
Kanade, Sanjay G. Enhancing information security and privacy by combining biometrics with cryptography. San Rafael, Calif. (1537 Fourth Street, San Rafael, CA 94901 USA): Morgan & Claypool, 2012.
Maksurov, Aleksey. Ensuring information security on the Internet. ru: INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/1942595.
Shi, Yun Q. Transactions on Data Hiding and Multimedia Security VIII: Special Issue on Pattern Recognition for IT Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.
Office, United States Government Accountability. Border security: State Department rollout of biometric visas on schedule, but guidance is lagging : report to the chairman, Committee on Government Reform, House of Representatives. Washington, D.C: United States Government Accountability Office, 2004.
Clarke, Nathan. Transparent user authentication: Biometrics, RFID and behavioural profiling. London: Springer, 2011.
comparé, Institut suisse de droit. L'individu face aux nouvelles technologies: Surveillance, identification et suivi : actes du colloque international des 10 et 11 novembre 2004 à Lausanne. Züriche: Schulthess, 2005.
United States. Government Accountability Office. Border security: Strengthened visa process would benefit from improvements in staffing and information sharing : report to congressional committees. Washington, D.C: United States Government Accountability Office, 2005.
United States. Government Accountability Office. Homeland security: Further actions needed to coordinate federal agencies' facility protection efforts and promote key practices : report to the chairman, Committee on Government Reform, House of Representatives. Washington, D.C: United States Government Accountability Office, 2004.
United States. Government Accountability Office. Homeland Security: Guidance and standards are needed for measuring the effectiveness of agencies' facility protection efforts : report to the Chairman, Committee on Government Reform, House of Representatives. Washington, D.C: U.S. Government Accountability Office, 2006.
Decker, Bart. Communications and Multimedia Security: 13th IFIP TC 6/TC 11 International Conference, CMS 2012, Canterbury, UK, September 3-5, 2012. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.
Book chapters on the topic "Biometric information protection":
Kevenaar, Tom. "Protection of Biometric Information." In Security with Noisy Data, 169–93. London: Springer London, 2007. http://dx.doi.org/10.1007/978-1-84628-984-2_11.
Samandari, Juliet, and Amelia Samandari. "Biometric Protection and Security." In Information Technology Security and Risk Management, 278–83. New York: CRC Press, 2024. http://dx.doi.org/10.1201/9781003264415-41.
Rathgeb, Christian, Andreas Uhl, and Peter Wild. "Experiments on Iris Biometric Template Protection." In Advances in Information Security, 245–65. New York, NY: Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-5571-4_14.
Sasikaladevi, N., A. Revathi, N. Mahalakshmi, and N. Archana. "HEAP- Genus 2 HyperElliptic Curve Based Biometric Audio Template Protection." In Communications in Computer and Information Science, 312–20. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-1810-8_31.
Panigrahy, Saroj Kumar, Debasish Jena, Sathya Babu Korra, and Sanjay Kumar Jena. "On the Privacy Protection of Biometric Traits: Palmprint, Face, and Signature." In Communications in Computer and Information Science, 182–93. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03547-0_18.
Sprokkereef, Annemarie. "Data Protection and the use of Biometric Data in the EU." In The Future of Identity in the Information Society, 277–84. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-79026-8_19.
Rot, Peter, Peter Peer, and Vitomir Štruc. "Detecting Soft-Biometric Privacy Enhancement." In Handbook of Digital Face Manipulation and Detection, 391–411. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-87664-7_18.
Bleumer, Gerrit. "Biometric yet Privacy Protecting Person Authentication." In Information Hiding, 99–110. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/3-540-49380-8_8.
Fornazin, Marcelo, Danilo B. S. Netto, Marcos Antonio Cavenaghi, and Aparecido N. Marana. "Protecting Medical Images with Biometric Information." In Advances in Computer and Information Sciences and Engineering, 284–89. Dordrecht: Springer Netherlands, 2008. http://dx.doi.org/10.1007/978-1-4020-8741-7_52.
Li, ChunLei, Bin Ma, Yunhong Wang, and Zhaoxiang Zhang. "Protecting Biometric Templates Using Authentication Watermarking." In Advances in Multimedia Information Processing - PCM 2010, 709–18. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15702-8_65.
Conference papers on the topic "Biometric information protection":
Barannik, Vladimir, Sergii Shulgin, Serhii Holovchenko, Pavlo Hurzhiy, Sergy Sidchenko, and Pris Gennady. "Method of Hierarchical Protection of Biometric Information." In 2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT). IEEE, 2021. http://dx.doi.org/10.1109/aict52120.2021.9628915.
Chung, Yunsu, Kiyoung Moon, and Hyung-Woo Lee. "Biometric Certificate Based Biometric Digital Key Generation with Protection Mechanism." In 2007 Frontiers in the Convergence of Bioscience and Information Technologies. IEEE, 2007. http://dx.doi.org/10.1109/fbit.2007.151.
Ghouzali, Sanaa, and Wadood Abdul. "Private chaotic biometric template protection algorithm." In 2013 IEEE Second International Conference on Image Information Processing (ICIIP). IEEE, 2013. http://dx.doi.org/10.1109/iciip.2013.6707676.
Farafonova, A. E., and E. L. Turnetskaya. "TECHNOLOGIES OF BIOMETRIC PERSON’S IDENTIFICATION." In PROCESSING, TRANSMISSION AND PROTECTION OF INFORMATION IN COMPUTER SYSTEMS. St. Petersburg State University of Aerospace Instrumentation, 2020. http://dx.doi.org/10.31799/978-5-8088-1452-3-2020-1-43-49.
Lozhkova, A. "PROTECTION OF BIOMETRIC PERSONAL DATA IN MEDICAL INFORMATION SYSTEMS." In XIV International Scientific Conference "System Analysis in Medicine". Far Eastern Scientific Center of Physiology and Pathology of Respiration, 2020. http://dx.doi.org/10.12737/conferencearticle_5fe01d9bc43a05.55251061.
Wang, Zhifang, Qi Han, Xiamu Niu, and Christoph Busch. "Template Protection for Multimodal Biometric System." In 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP). IEEE, 2009. http://dx.doi.org/10.1109/iih-msp.2009.269.
Jin, Andrew Teoh Beng, and Jaihie Kim. "FuzzyHash: A Secure Biometric Template Protection Technique." In 2007 Frontiers in the Convergence of Bioscience and Information Technologies. IEEE, 2007. http://dx.doi.org/10.1109/fbit.2007.31.
Islam, Md Rajibul, Md Shohel Sayeed, and Andrews Samraj. "Biometric template protection using watermarking with hidden password encryption." In 2008 International Symposium on Information Technology. IEEE, 2008. http://dx.doi.org/10.1109/itsim.2008.4631572.
Zhou, Xuebing, Stephen D. Wolthusen, Christoph Busch, and Arjan Kuijper. "Feature Correlation Attack on Biometric Privacy Protection Schemes." In 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP). IEEE, 2009. http://dx.doi.org/10.1109/iih-msp.2009.237.
Meints, Martin, Heinz Biermann, Manfred Bromba, Christoph Busch, Gerrit Hornung, and Gisela Quiring-Kock. "Biometric Systems and Data Protection Legislation in Germany." In 2008 Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP). IEEE, 2008. http://dx.doi.org/10.1109/iih-msp.2008.314.
Reports on the topic "Biometric information protection":
Roberts, Tony, Judy Gitahi, Patrick Allam, Lawrence Oboh, Oyewole Oladapo, Gifty Appiah-Adjei, Amira Galal, et al. Mapping the Supply of Surveillance Technologies to Africa: Case Studies from Nigeria, Ghana, Morocco, Malawi, and Zambia. Institute of Development Studies, September 2023. http://dx.doi.org/10.19088/ids.2023.027.