668 Hits in 6.4 sec

What Else Does Your Biometric Data Reveal? A Survey on Soft Biometrics

Antitza Dantcheva, Petros Elia, Arun Ross
2016 IEEE Transactions on Information Forensics and Security  
In this paper, we provide an overview of soft biometrics and discuss some of the techniques that have been proposed to extract them from image and video data.  ...  This survey is intended for researchers and practitioners in the field of biometrics.  ...  Robustness to low data quality: Some soft biometric attributes can be deduced from low-quality biometric data (see Figure 2 .  ... 
doi:10.1109/tifs.2015.2480381 fatcat:rmgdjjvbznchhdeib24bfzonki

Emotional AI, soft biometrics and the surveillance of emotional life: An unusual consensus on privacy

Andrew McStay
2020 Big Data & Society  
and NGOs interested in privacy; a workshop with stakeholders to design ethical codes for using data about emotions; a UK survey of 2068 citizens on feelings about emotion capture technologies.  ...  It finds a weak consensus among social stakeholders on the need for privacy, this driven by different interests and motivations.  ...  What is clear is that an account of emotional AI based solely on data tracking and identification is a limited one.  ... 
doi:10.1177/2053951720904386 fatcat:xxwmj7byubg2jlv72ygyfmztt4

Seven Types of Privacy [chapter]

Rachel L. Finn, David Wright, Michael Friedewald
2012 European Data Protection: Coming of Age  
Soft biometrics and the use of biometrics at a distance both pose a threat to personal data and image.  ...  Some soft biometrics such as the way one walks (gait) or types a letter could be regarded as unconscious behaviour.  ...  This calls for a much stronger focus on an ethical assessment element to complement established (and enhanced) data protection principles.  ... 
doi:10.1007/978-94-007-5170-5_1 fatcat:een5kcxq3za6bg5ubatdtqgcse

Cybersecurity: Past, Present and Future [article]

Shahid Alam
2022 arXiv   pre-print
Based on this objective, the book covers the past, present, and future of these main specializations of cybersecurity.  ...  The main specializations of cybersecurity covered in this book are software security, hardware security, the evolution of malware, biometrics, cyber intelligence, and cyber forensics.  ...  For a detailed study and survey on soft biometrics readers are referred to [Dantcheva et al., 2015 , Nixon et al., 2015] .  ... 
arXiv:2207.01227v1 fatcat:vfx54hq3ejc7dlfestj6dkstpa

Signature Verification SaaS Implementation on Microsoft Azure Cloud

Joel Philip, Vinayak A. Bharadi
2016 Procedia Computer Science  
Signature recognition is one of the important behavioral biometric trait.  ...  The performance of proposed feature vector is further improved by soft biometric traits of the signature.  ...  Literature Survey One of the main aims of this research is to empower biometrics as an authentication method for security purposes like accessing a particular service or bank applications etc.  ... 
doi:10.1016/j.procs.2016.03.053 fatcat:kg47tuu6sjebnmbcvd72yhndk4

A Methodology for Reducing Respondent Duplication and Impersonation in Samples of Hidden Populations

Douglas D. Heckathorn, Robert S. Broadhead, Boris Sergeyev
2001 Journal of Drug Issues  
Most research projects therefore rely on staff to recognize former respondents, but staff turnover and a large number of respondents compromise accuracy.  ...  We describe and assess quantitatively the accuracy of a method for subject identification based on a statistical principle, the interchangeability of indicators, in which multiple weak indicators combine  ...  ."), on his chest. Her check of the visible part of José's chest reveals a tattoo of a rose inside a heart.  ... 
doi:10.1177/002204260103100209 fatcat:mmzldgtterduzeihw3fc5of5dm

A Face Tells More than a Thousand Posts: Developing Face Recognition Privacy in Social Networks

Yana Welinder
2012 Social Science Research Network  
Robert Andrews, Facebook has 220 Billion of Your Photos to Put on Ice, GIGAOM, Oct. 17, 2012,; Hearing on What Facial Recognition  ...  colleagues from clustering outside your office door to eavesdrop on a private phone conversation with your spouse.  ...  turn would protect against extraction of biometric data.  ... 
doi:10.2139/ssrn.2109108 fatcat:qnpsgpsvprfy7eacjlztw52ipi

Access Control beyond Authentication

Javier Junquera-Sánchez, Carlos Cilleruelo, Luis De-Marcos, José-Javier Martinez-Herráiz, Luigi Catuogno
2021 Security and Communication Networks  
process the data.  ...  Continuous authentication does not require the active participation of the user.  ...  (iv) Soft biometrics (intrasession): soft biometrics are biometric data that will only be valid for a few weeks or days during a session, for example, the colour of a t-shirt.  ... 
doi:10.1155/2021/8146553 fatcat:zgsuaklurraspbv3fw3lubwh2a

Humanode Whitepaper: You are [not] a bot [article]

Dato Kavazi, Victor Smirnov, Sasha Shilina, MOZGIII, MingDong Li, Rafael Contreras, Hardik Gajera, Dmitry Lavrenov, the Humanode Core
2021 arXiv   pre-print
Humanode is a network safeguarded by cryptographically secure bio-authorized nodes. Users will be able to deploy nodes by staking their encrypted biometric data.  ...  The main goal of Humanode is to create a stable and just financial network that relies on the existence of human life.  ...  Malicious actors may try to steal your biometric data, using a futuristic printer to bypass the biometric processing protocol.  ... 
arXiv:2111.13189v1 fatcat:6pc4nj46sjdkvketwydvwh2ulu

Eavesdropping Whilst You're Shopping: Balancing Personalisation and Privacy in Connected Retail Spaces [article]

Vasilios Mavroudis, Michael Veale
2018 arXiv   pre-print
a per-customer basis.  ...  Retailers, simultaneously, must ensure that their tracking is not just legal, but worthy of the trust of concerned data subjects.  ...  In both these studies, generational differences are not notable: what some have characterised as a lesser emphasis on privacy and data held by younger generations online does not seem to translate into  ... 
arXiv:1807.05381v1 fatcat:ggjzj3qccne7plti6me5n3yhse


Edy Santoso
2012 UUM Journal of Legal Studies  
The new advancement in technology both hard and soft is creating new opportunities for cyber criminals. It is an effective tool for going against the law.  ...  fi le=/2011/2/16/nation/8073924&sec=nation (accessed June 5, 2011). 26 What Is a Phishing Scam?  ...  The trap was to trick Internet banking account holders into revealing their online banking username and password.  ... 
doi:10.32890/uumjls.3.2012.4547 fatcat:7bdd7baccjbvbfwrcs77w75ygy

Pico: No More Passwords! [chapter]

Frank Stajano
2011 Lecture Notes in Computer Science  
We present an alternative design based on a hardware token called Pico that relieves the user from having to remember passwords and PINs.  ...  The demands placed on users (passwords that are unguessable, all different and never written down) are no longer reasonable now that each person has to manage dozens of passwords.  ...  Acknowledgements I am indebted and grateful to Virgil Gligor and Adrian Perrig for their generous and intellectually stimulating hospitality, as the first draft of this paper originated while I was on  ... 
doi:10.1007/978-3-642-25867-1_6 fatcat:v34ev25enrdtvkjxxsxkdbhzoa

Retail Analytics: Smart-Stores Saving Bricks and Mortar Retail or a Privacy Problem?

Helen Gregorczuk
2022 Law, Technology and Humans  
This article argues there is a disproportionate impact on privacy when compared to the benefits for retailers.  ...  on an increasingly individualised basis.  ...  The data revealed which websites they had visited on their iPhones as well as where the phone had been and noted details of what section of the centre the device was in, for how long and on what floor.  ... 
doi:10.5204/lthj.2088 doaj:7955f682343e4efe80f06c8f982ea0f5 fatcat:vj4exfum3zdzbiqszt5tcf6pie

The role of non-intrusive approaches in the development of people-aware systems

Paulo Novais, Davide Carneiro
2016 Progress in Artificial Intelligence  
If you wish to self-archive your article, please use the accepted manuscript version for posting on your own website.  ...  link is inserted to the published article on Springer's website.  ...  Moreover, one can consider not only what the user does but how the user does it. In fact, our behaviors are commonly associated with our inner states.  ... 
doi:10.1007/s13748-016-0085-1 fatcat:tw5cf3e7dzevbo57l7zfh63iuq


2012 Challenges of the Knowledge Society  
Information is one of the most important resources that a company must posses. Some informations are hidden deep in the black box - the mind of the consumer.  ...  Neuromarketing helps us find what is inside of the black box without troubling the consumer with questions that he doesn't want to answer or that he can't answer.  ...  In this area, however, it is one thing to be able to see what parts of the brain become active in response to a stimulus and it is something else to interpret what this means or what to do with the information  ... 
doaj:a67afa2a4334448ebdfa2ed25ccfbc23 fatcat:q6v6akw3sjfdzk4omm7kpyiezi
« Previous Showing results 1 — 15 out of 668 results