{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T07:16:27Z","timestamp":1725520587102},"reference-count":13,"publisher":"Emerald","issue":"1","license":[{"start":{"date-parts":[[2004,2,1]],"date-time":"2004-02-01T00:00:00Z","timestamp":1075593600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004,2,1]]},"abstract":"Biometric techniques, such as fingerprint verification, iris or face recognition, retina analysis and hand\u2010written signature verification, are increasingly becoming basic elements of authentication and identification systems. However, any human physiological or behavioural traits serving as biometric characteristics are personal data protected by privacy protection legislation. To address related issues, this paper examines these classes of biometrics according to data protection principles, purpose, proportionality and security, provided in international legislation. This analysis leads to the desired properties of biometric systems in the form of functional and non\u2010functional requirements, in order to support developers minimising the risk of being non\u2010compliant to privacy protection legislation, and to increase user acceptance.<\/jats:p>","DOI":"10.1108\/09685220410518883","type":"journal-article","created":{"date-parts":[[2004,3,2]],"date-time":"2004-03-02T23:12:30Z","timestamp":1078269150000},"page":"125-137","source":"Crossref","is-referenced-by-count":30,"title":["On biometrics\u2010based authentication and identification from a privacy\u2010protection perspective"],"prefix":"10.1108","volume":"12","author":[{"given":"V.","family":"Zorkadis","sequence":"first","affiliation":[]},{"given":"P.","family":"Donos","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022021919560281900_b1","unstructured":"Biometric Working Group (2002), Best Practices in Testing and Reporting Biometric Device Performance, technical report, available at: www.cesg.gov.uk\/technology\/biometrics."},{"key":"key2022021919560281900_b2","unstructured":"Clabrese, C. (1999), \u201cThe trouble with biometrics\u201d, J. Login, Vol. 24 No. 4, pp. 56\u201061."},{"key":"key2022021919560281900_b13","unstructured":"CNIL (2001), 22nd Annual Report for 2001, Commission Nationale de l'Informatique et des Libert\u00e9s, available at: www.cnil.fr\/."},{"key":"key2022021919560281900_b3","unstructured":"European Parliament and Council (1995), Directive 95\/46\/EC on the Protection of Individuals With Regard to the Processing of Personal Data and on the Movement of Such Data, available at: www.eu.int\/comm\/\u2026\/media\/dataprot\/."},{"key":"key2022021919560281900_b4","unstructured":"European Parliament and Council (1997), Directive 97\/66\/EC on the Protection of Personal Data in the Telecommunications Sector, available at: www.eu.int\/comm\/\u2026\/media\/dataprot\/."},{"key":"key2022021919560281900_b5","unstructured":"European Parliament and Council (2002), Directive 2002\/58\/EC on the Protection of Personal Data in Electronic Communications, available at: www.eu.int\/comm\/\u2026\/media\/dataprot\/."},{"key":"key2022021919560281900_b6","unstructured":"Frankel, Y. (2000), \u201cBiometric identification and authentication with privacy preservation\u201d, Proceedings of the RSA Conference."},{"key":"key2022021919560281900_b7","unstructured":"Jain, A., Bolle, R. and Pankanti, S. (1999), Biometrics: Personal Identification in Networked Society, Kluwer Academic Publishers, Dordrecht."},{"key":"key2022021919560281900_b9","doi-asserted-by":"crossref","unstructured":"Prabhakar, S., Pankanti, S. and Jain, A.K. (2003), \u201cBiometric recognition: security and privacy concerns\u201d, IEEE Security & Privacy, pp. 33\u201042.","DOI":"10.1109\/MSECP.2003.1193209"},{"key":"key2022021919560281900_b10","doi-asserted-by":"crossref","unstructured":"Matsumoto, T. et al. (2002), \u201cImpact of artificial \u2018gummy\u2019 fingers on fingerprint systems\u201d, Proceedings of the Optical Security and Counterfeit Deterrence Techniques, available at: http:\/\/cryptome.org\/gummy.htm.","DOI":"10.1117\/12.462719"},{"key":"key2022021919560281900_b11","unstructured":"Vaclav, M. and Zdenek, R. (2000), Biometric Authentication Systems, technical report, ecom\u2010monitor.com, available at: www.ecom\u2010monitor.com\/papers\/biometricsTR2000.pdf."},{"key":"key2022021919560281900_frd1","unstructured":"Jules, A. and Sudan, M. (2002), \u201cA fuzzy vault scheme\u201d, Proceedings of the International Symposium on Information Theory, IEEE Press, Los Alamitos, CA, p. 408."},{"key":"key2022021919560281900_frd2","doi-asserted-by":"crossref","unstructured":"Vaclav, M. and Zdenek, R. (2003), \u201cToward reliable user authentication through biometrics\u201d, IEEE Security & Privacy, May\/June, pp. 45\u20109.","DOI":"10.1109\/MSECP.2003.1203221"}],"container-title":["Information Management & Computer Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/09685220410518883","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685220410518883\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685220410518883\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,19]],"date-time":"2022-02-19T20:08:14Z","timestamp":1645301294000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685220410518883\/full\/html"}},"subtitle":["Deriving privacy\u2010enhancing requirements"],"short-title":[],"issued":{"date-parts":[[2004,2,1]]},"references-count":13,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2004,2,1]]}},"alternative-id":["10.1108\/09685220410518883"],"URL":"https:\/\/doi.org\/10.1108\/09685220410518883","relation":{},"ISSN":["0968-5227"],"issn-type":[{"value":"0968-5227","type":"print"}],"subject":[],"published":{"date-parts":[[2004,2,1]]}}}