A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
What Else Does Your Biometric Data Reveal? A Survey on Soft Biometrics
2016
IEEE Transactions on Information Forensics and Security
In this paper, we provide an overview of soft biometrics and discuss some of the techniques that have been proposed to extract them from image and video data. ...
This survey is intended for researchers and practitioners in the field of biometrics. ...
Robustness to low data quality: Some soft biometric attributes can be deduced from low-quality biometric data (see Figure 2 . ...
doi:10.1109/tifs.2015.2480381
fatcat:rmgdjjvbznchhdeib24bfzonki
Emotional AI, soft biometrics and the surveillance of emotional life: An unusual consensus on privacy
2020
Big Data & Society
and NGOs interested in privacy; a workshop with stakeholders to design ethical codes for using data about emotions; a UK survey of 2068 citizens on feelings about emotion capture technologies. ...
It finds a weak consensus among social stakeholders on the need for privacy, this driven by different interests and motivations. ...
What is clear is that an account of emotional AI based solely on data tracking and identification is a limited one. ...
doi:10.1177/2053951720904386
fatcat:xxwmj7byubg2jlv72ygyfmztt4
Hybrid Biometric Based Person Identification Using Machine Learning
2022
Journal of Pharmaceutical Negative Results
While soft biometrics can be used to boost the efficiency of biometric systems that focus on other characteristics, they are not without their own set of drawbacks, such as a lack of permanence and distinctive ...
In addition to the hard biometric features already mentioned (skin colour, age, height, hair colour, eye colour, gender, etc.), the use of a person's soft biometric traits is becoming increasingly common ...
Biological Characteristics; Characteristics
LITERATURE SURVEY For the biometric cryptosystem based on polynomials, [8] a safeguard method has been developed. ...
doi:10.47750/pnr.2022.13.s08.195
fatcat:vzr7epl675frhomshxck2x4yda
Seven Types of Privacy
[chapter]
2012
European Data Protection: Coming of Age
Soft biometrics and the use of biometrics at a distance both pose a threat to personal data and image. ...
Some soft biometrics such as the way one walks (gait) or types a letter could be regarded as unconscious behaviour. ...
This calls for a much stronger focus on an ethical assessment element to complement established (and enhanced) data protection principles. ...
doi:10.1007/978-94-007-5170-5_1
fatcat:een5kcxq3za6bg5ubatdtqgcse
Cybersecurity: Past, Present and Future
[article]
2023
arXiv
pre-print
Based on this objective, the book covers the past, present, and future of these main specializations of cybersecurity. ...
The main specializations of cybersecurity covered in this book are software security, hardware security, the evolution of malware, biometrics, cyber intelligence, and cyber forensics. ...
For a detailed study and survey on soft biometrics readers are referred to [Dantcheva et al., 2015 , Nixon et al., 2015] . ...
arXiv:2207.01227v2
fatcat:54sdflwghrcd3dqodwn4fygtei
Signature Verification SaaS Implementation on Microsoft Azure Cloud
2016
Procedia Computer Science
Signature recognition is one of the important behavioral biometric trait. ...
The performance of proposed feature vector is further improved by soft biometric traits of the signature. ...
Literature Survey One of the main aims of this research is to empower biometrics as an authentication method for security purposes like accessing a particular service or bank applications etc. ...
doi:10.1016/j.procs.2016.03.053
fatcat:kg47tuu6sjebnmbcvd72yhndk4
A Methodology for Reducing Respondent Duplication and Impersonation in Samples of Hidden Populations
2001
Journal of Drug Issues
Most research projects therefore rely on staff to recognize former respondents, but staff turnover and a large number of respondents compromise accuracy. ...
We describe and assess quantitatively the accuracy of a method for subject identification based on a statistical principle, the interchangeability of indicators, in which multiple weak indicators combine ...
."), on his chest. Her check of the visible part of José's chest reveals a tattoo of a rose inside a heart. ...
doi:10.1177/002204260103100209
fatcat:mmzldgtterduzeihw3fc5of5dm
A Face Tells More than a Thousand Posts: Developing Face Recognition Privacy in Social Networks
2012
Social Science Research Network
Robert Andrews, Facebook has 220 Billion of Your Photos to Put on Ice, GIGAOM, Oct. 17, 2012, http://gigaom.com/cloud/facebook-has-220-billion-of-your-photos-to-put-onice; Hearing on What Facial Recognition ...
colleagues from clustering outside your office door to eavesdrop on a private phone conversation with your spouse. ...
turn would protect against extraction of biometric data. ...
doi:10.2139/ssrn.2109108
fatcat:qnpsgpsvprfy7eacjlztw52ipi
Access Control beyond Authentication
2021
Security and Communication Networks
process the data. ...
Continuous authentication does not require the active participation of the user. ...
(iv) Soft biometrics (intrasession): soft biometrics are biometric data that will only be valid for a few weeks or days during a session, for example, the colour of a t-shirt. ...
doi:10.1155/2021/8146553
fatcat:zgsuaklurraspbv3fw3lubwh2a
Humanode Whitepaper: You are [not] a bot
[article]
2021
arXiv
pre-print
Humanode is a network safeguarded by cryptographically secure bio-authorized nodes. Users will be able to deploy nodes by staking their encrypted biometric data. ...
The main goal of Humanode is to create a stable and just financial network that relies on the existence of human life. ...
Malicious actors may try to steal your biometric data, using a futuristic printer to bypass the biometric processing protocol. ...
arXiv:2111.13189v1
fatcat:6pc4nj46sjdkvketwydvwh2ulu
Eavesdropping Whilst You're Shopping: Balancing Personalisation and Privacy in Connected Retail Spaces
[article]
2018
arXiv
pre-print
a per-customer basis. ...
Retailers, simultaneously, must ensure that their tracking is not just legal, but worthy of the trust of concerned data subjects. ...
In both these studies, generational differences are not notable: what some have characterised as a lesser emphasis on privacy and data held by younger generations online does not seem to translate into ...
arXiv:1807.05381v1
fatcat:ggjzj3qccne7plti6me5n3yhse
CONSUMER PROTECTION FOR ONLINE BANKING SCAMS VIA E-MAIL IN MALAYSIA
2012
UUM Journal of Legal Studies
The new advancement in technology both hard and soft is creating new opportunities for cyber criminals. It is an effective tool for going against the law. ...
fi le=/2011/2/16/nation/8073924&sec=nation (accessed June 5, 2011). 26 What Is a Phishing Scam? ...
The trap was to trick Internet banking account holders into revealing their online banking username and password. ...
doi:10.32890/uumjls.3.2012.4547
fatcat:7bdd7baccjbvbfwrcs77w75ygy
Pico: No More Passwords!
[chapter]
2011
Lecture Notes in Computer Science
We present an alternative design based on a hardware token called Pico that relieves the user from having to remember passwords and PINs. ...
The demands placed on users (passwords that are unguessable, all different and never written down) are no longer reasonable now that each person has to manage dozens of passwords. ...
Acknowledgements I am indebted and grateful to Virgil Gligor and Adrian Perrig for their generous and intellectually stimulating hospitality, as the first draft of this paper originated while I was on ...
doi:10.1007/978-3-642-25867-1_6
fatcat:v34ev25enrdtvkjxxsxkdbhzoa
Retail Analytics: Smart-Stores Saving Bricks and Mortar Retail or a Privacy Problem?
2022
Law, Technology and Humans
This article argues there is a disproportionate impact on privacy when compared to the benefits for retailers. ...
on an increasingly individualised basis. ...
The data revealed which websites they had visited on their iPhones as well as where the phone had been and noted details of what section of the centre the device was in, for how long and on what floor. ...
doi:10.5204/lthj.2088
doaj:7955f682343e4efe80f06c8f982ea0f5
fatcat:vj4exfum3zdzbiqszt5tcf6pie
The role of non-intrusive approaches in the development of people-aware systems
2016
Progress in Artificial Intelligence
If you wish to self-archive your article, please use the accepted manuscript version for posting on your own website. ...
link is inserted to the published article on Springer's website. ...
Moreover, one can consider not only what the user does but how the user does it. In fact, our behaviors are commonly associated with our inner states. ...
doi:10.1007/s13748-016-0085-1
fatcat:tw5cf3e7dzevbo57l7zfh63iuq
« Previous
Showing results 1 — 15 out of 780 results