Skip to main content

Biometric Profiling: Opportunities and Risks

  • Chapter
Book cover Profiling the European Citizen

During the past decades profiling has gained ground as both a technique and a technology providing automated knowledge construction of individuals or groups of people. This interest has been intensified by the use of biometrics serving as a source of profiling information, with the core capabilities of human verification and identification, as well as a variety of further characterisation possibilities. Biometric characteristics are often persistent and/or non-concealable traits, which therefore have the capability to function as unique linking information between other profiles for each given individual. Biometric profiling serves a wealth of applications, from medicine, statistics and crime prevention to e-commerce and service provision. This chapter seeks to review not only the promising opportunities but also the crucial risks and key concerns deriving from biometric profiling. Hence, we discuss risks that arise from the ability of an adversary to attack a biometric profiling system, as well as risks related to the dangerous functionality of such a system, which can be due to implementation problems or even a misguided conception that was correctly implemented.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 59.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 79.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • ‘Anthropology. The study of ethnicity, minority groups, and identity’, Encyclopaedia Britannica, 2007.

    Google Scholar 

  • Arndt, C., ‘The loss of privacy and identity’, Biometric Technology Today, Vol. 13, No. 8, Elsevier Science, 2005, pp. 6–7.

    Article  Google Scholar 

  • Article 29 Data Protection Working Party, Working document on biometrics, 1 August 2003. Available at: http://ec.europa.eu/justice_home/fsj/privacy/docs/wpdocs/2003/wp80_en.pdf.

  • Ashbourn, J., ‘Where we really are with biometrics’, Biometric Technology Today, Vol. 12, No. 4, Elsevier Science, 2004, pp. 7–9.

    Article  Google Scholar 

  • Cavoukian, A., ‘Consumer Biometric Applications: A Discussion Paper’, 1999. Available at: http://www.ipc.on.ca.

  • Cheng, Y., O’Toole, A., Abdi, H., ‘Classifying adults’ and children’s faces by sex: Computational investigations of subcategorical feature encoding’, Cognitive Science, Vol. 25, pp. 819–838, 2001.

    Article  Google Scholar 

  • Common Criteria Biometric Evaluation Methodology Working Group (CCBEMWG), Common Criteria – Common Methodology for Information Technology Security Evaluation – Biometric Evaluation Methodology Supplement, Version 1.0, August 2002.

    Google Scholar 

  • Farkas, L., Anthropometry of the Head and Face, Raven Press, 2nd ed., 1994.

    Google Scholar 

  • Foresti, G., ‘Active Video-Based Surveillance System’, IEEE Signal Processing Magazine, Vol. 22, No. 2, IEEE Signal Processing Society, Piscataway, NJ, 2005, pp. 25–37.

    Google Scholar 

  • Gibbons, M., Yoon, S., Cha, S.-H., Tappert C., ‘Evaluation of Biometric Identification in Open Systems’, Lecture Notes in Computer Science, 3546, Poster I, Springer-Verlag Berlin Heidelberg, 2005, pp. 823–831.

    Google Scholar 

  • Hildebrandt, M., Backhouse J. (eds.), Descriptive analysis and inventory of profiling practices, FIDIS Deliverable 7.2, European Union IST FIDIS Project, Brussels, 2005, pp. 1–116. Available at: www.fidis.net.

  • Hampapur, A. et al., ‘Smart Video Surveillance: exploring the concept of multiscale spatiotemporal tracking’, IEEE Signal Processing Magazine, Vol. 22, No. 2, 2005, pp. 38–50.

    Article  Google Scholar 

  • Hosein, G., ‘Threatening the Open Society: Comparing Anti-terror Policies and Strategies in the U.S. and Europe’, Privacy International, December 13, 2005.

    Google Scholar 

  • Jain, A. K., Dass S. C., Nandakumar, K., ‘Can soft biometric traits assist user recognition?’, Proceedings of SPIE Biometric Technology for Human Identification, Vol. 5404, Orlando, FL April 2004a, pp. 561–72.

    Google Scholar 

  • Jain, A. K., Ross A., Prabhakar, S., ‘An introduction to Biometric Identification’, IEEE Transactions on Circuits and Systems for Video Technology, Special Issue on Image- and Video-Based Biometrics, Vol. 14, No. 1, IEEE Circuits and Systems Society, January 2004b.

    Google Scholar 

  • Jain, A.K., Lu, X., ‘Ethnicity Identification from Face Images’, Proceedings of SPIE International Symposium on Defense and Security: Biometric Technology for Human Identification, 2004.

    Google Scholar 

  • Johnson, M., ‘Biometrics and the threat to civil liberties’, Computer, Vol. 37, No. 4, IEEE Computer Society Press, 2004, pp. 90–91.

    Article  Google Scholar 

  • Joint Technical Committee ISO/IEC JTC 1, ‘Text of Standing Document 2, version 5–Harmonized Biometric Vocabulary, of Subcommittee SC 37, biometrics, Information Technology, dated 31 January 2006, a working document. Available at: http://isotc.iso.org/livelink/livelink/fetch/2000/2122/327993/2262372/2263033/2299739/JTC001-SC37-N-1480.pdf?nodeid=4954581&vernum=0.

  • Khan M. K., Zhang, J., ‘Improving the security of a flexible biometrics remote user authentication scheme’, Computer Standards & Interfaces, Volume 29, Issue 1, January Elsevier, 2007, pp. 82–85.

    Article  Google Scholar 

  • Kryszczuk K., Drygajlo, A., ‘Addressing the Vulnerabilities of Likelihood-Ratio-Based Face Verification’, Lecture Notes in Computer Science, 3546, Springer-Verlag Berlin Heidelberg, 2005, pp. 426–435.

    Google Scholar 

  • Nykodym, N., Taylor R., and Vilela, J., ‘Criminal profiling and insider cyber crime’, Digital Investigation, Vol. 2, No. 4, Elsevier, December 2005, pp. 261–267.

    Article  Google Scholar 

  • Prabhakar, S., Pankanti, S., Jain, A. K., ‘Biometric Recognition: Security and Privacy Concerns’, IEEE Security and Privacy, Vol. 1, No. 2, IEEE Computer Society, 2003, pp. 33–42.

    Article  Google Scholar 

  • Rogers, M., ‘The role of criminal profiling in the computer forensics process’, Computers & Security, Vol. 22, No. 4, Elsevier, May 2003, pp. 292–298.

    Article  Google Scholar 

  • Smith, An., The Ethnic Origins of Nations, Oxford: Basil Blackwell, 1987.

    Google Scholar 

  • Snelick, R., Uludag, U., Mink, A., Indovina, M., Jain, A., ‘Large-Scale Evaluation of Multimodal Biometric Authentication Using State-of-the-Art Systems’, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 27, No 3, IEEE Computer Society, 2005, pp. 450–455.

    Article  Google Scholar 

  • Uludag, U., Jain A. K., ‘Attacks on biometric systems: a case study in fingerprints’, Proceedings of SPIE-EI 2004, San Jose, CA, 2004, pp. 622–633.

    Google Scholar 

  • Woodworth, M., Porter, St., ‘Historical Foundations and Current Applications of Criminal Profiling in Violent Crime Investigations’, Expert Evidence, Vol. 7, Springer Netherlands, 2000, pp. 241–264.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer Science + Business Media B.V

About this chapter

Cite this chapter

Andronikou, V., Yannopoulos, A., Varvarigou, T. (2008). Biometric Profiling: Opportunities and Risks. In: Hildebrandt, M., Gutwirth, S. (eds) Profiling the European Citizen. Springer, Dordrecht. https://doi.org/10.1007/978-1-4020-6914-7_7

Download citation

  • DOI: https://doi.org/10.1007/978-1-4020-6914-7_7

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-1-4020-6913-0

  • Online ISBN: 978-1-4020-6914-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics