Privacy–Security Trade-Offs in Biometric Security Systems—Part II: Multiple Use Case

2011 ◽  
Vol 6 (1) ◽  
pp. 140-151 ◽  
Author(s):  
Lifeng Lai ◽  
Siu-Wai Ho ◽  
H. Vincent Poor
Author(s):  
Mariya Nazarkevych ◽  
Serhii Dmytruk ◽  
Volodymyr Hrytsyk ◽  
Olha Vozna ◽  
Anzhela Kuza ◽  
...  

Background: Systems of the Internet of Things are actively implementing biometric systems. For fast and high-quality recognition in sensory biometric control and management systems, skeletonization methods are used at the stage of fingerprint recognition. The analysis of the known skeletonization methods of Zhang-Suen, Hilditch, Ateb-Gabor with the wave skeletonization method has been carried out and it shows a good time and qualitative recognition results. Methods: The methods of Zhang-Suen, Hildich and thinning algorithm based on Ateb-Gabor filtration, which form the skeletons of biometric fingerprint images, are considered. The proposed thinning algorithm based on Ateb-Gabor filtration showed better efficiency because it is based on the best type of filtering, which is both a combination of the classic Gabor function and the harmonic Ateb function. The combination of this type of filtration makes it possible to more accurately form the surroundings where the skeleton is formed. Results: Along with the known ones, a new Ateb-Gabor filtering algorithm with the wave skeletonization method has been developed, the recognition results of which have better quality, which allows to increase the recognition quality from 3 to 10%. Conclusion: The Zhang-Suen algorithm is a 2-way algorithm, so for each iteration, it performs two sets of checks during which pixels are removed from the image. Zhang-Suen's algorithm works on a plot of black pixels with eight neighbors. This means that the pixels found along the edges of the image are not analyzed. Hilditch thinning algorithm occurs in several passages, where the algorithm checks all pixels and decides whether to replace a pixel from black to white if certain conditions are satisfied. This Ateb-Gabor filtering will provide better performance, as it allows to obtain more hollow shapes, organize a larger range of curves. Numerous experimental studies confirm the effectiveness of the proposed method.


Author(s):  
Muzhir Shaban Al-Ani

The terms biometrics and biometry have been used to refer to the field of development of statistical and mathematical methods applicable to data analysis problems in the biological sciences. Recently biometrics refers to technologies and applications applied for personal identification using physical and behavioral parameters. Biometric security systems ensuring that only the authorized persons are permitted to access a certain data, because it is difficult to copy the biometric features pattern for a specific person. Biometrics is playing an important role in applications that are centric on identification, verification and classification. This chapter focuses on biometric security in their types, specifications, technologies and algorithms. Some algorithms of biometric security are also included in this chapter. Finally latest and future aspects of biometric system and merging technologies are also mentioned, including more details of system structures and specifications and what constitution will shape biometric security of in the future.


Author(s):  
John R. Regola ◽  
John K. Mitchell III ◽  
Brandon R. Baez ◽  
Syed S. Rizvi

In the present scenario, the vulnerabilities associated with cloud computing and biometric technology rank among the most vital issues in information security. In this chapter, the primary goal is to investigate the physical and informational security susceptibilities of biometrics, analyze the structure and design possibilities of the cloud, and examine the new developments of biometrics with cloud computing. Foremost, the authors analyze the developments of biometrics and compare the performance based on defining characteristics. In addition, they examine threats and attacks that can compromise the assets of an organization or an individual's sensitive information. Furthermore, this chapter provides a comprehensive discussion on the physical vulnerabilities of biometrics. Moreover, one section of this chapter focuses on the informational and database vulnerabilities. In this chapter, the authors also discuss the design considerations and cloud computing paradigm in relation to biometric security systems.


Author(s):  
Shalin Hai-Jew

The work of an instructional designer is highly dependent on an instructional technology substrate, at every phase of the instructional design work: research, planning, communication and coordination, prototyping, design, content searches, content development, branding, alpha and beta testing, revisions, the delivery of course contents, and the archival in learning object repositories. Technologies in this substrate are built to a variety of standards. There are standards for interoperability, for machines to communicate with each other, for information to be held securely (information assurance), for from-life information to be captured and recorded (whether light, detail, sound, or motion), for communications to be exchanged among people, and for digital artifacts to be labeled and protected and delivered to users. The instructional designer “use case” then refers to the on-ground realities of instructional design work and the critical reliance on instructional technologies, and what this in vivo perspective shows about the need for (in part) user-based insights for instructional technology research, design, and development. Every technology has multiple use cases, or theoretical situations in which users use that technology. An instructional designer use case shows the many uses of technologies by an instructional designer, to shed light on how the software technologies may be better tailored to the needs of instructional designers and other digital content developer stakeholders.


E-Justice ◽  
2010 ◽  
pp. 65-86 ◽  
Author(s):  
Michael Adler ◽  
Paul Henman

This chapter considers the implications of computerisation for procedural justice in social security. It outlines an approach to the analysis of administrative justice—defined as the justice inherent in routine administrative decision making—that is derived from Jerry Mashaw’s pioneering study Bureaucratic Justice. This approach explains the prevailing system of procedural justice in terms of the ‘trade-offs’ between six normative models of adminstrative decision making. The six models are associated with bureaucratic, professional, legal, managerial, consumerist, and market forms of decision making, and the ‘trade-offs’ reflect the outcomes of power struggle between different groups of social actors who champion the various models. This chapter attempts to determine whether, and if so how, computerisation affects the balance of power between the competing models of procedural justice and the groups of social actors who seek to promote them. It is based on an expert-informant study carried out by the authors. Two indicators for each of these six models were formulated and expert informants in 13 OECD countries were asked first to rate their importance on a 1–5 scale and second to assess, using another 1–5 scale, whether computerisation had made them more or less important. The main findings reported in the chapter suggest first that bureaucracy, followed by managerialism and legality are the most important determinants of administrative justice in social security, while the market followed by professionalism and consumerism are the least important, and second that the effect of computerisation has been to further entrench the bureaucratic and managerial models and undermine the professional model. The chapter relates these findings to data on to the aims of computerisation, the extent to which social security systems had embraced computerisation, and the emphasis that social security systems placed on data protection. In addition to generalising about the experiences of the 13 countries in the study, the chapter also describes the experiences of individual countries. It concludes that computerisation has altered the characteristics of service delivery by promoting some forms of administrative justice over others in particular by strengthening ‘top-down’ and managerialist forms of accountability at the expense of ‘bottom-up’ and rights-based approaches, and ends with a plea for a greater research focus on the administration of welfare and its justice implications.


2017 ◽  
Vol 03 (02) ◽  
pp. 1650032 ◽  
Author(s):  
Duncan Knowler ◽  
Ashley Page ◽  
Andrew Cooper ◽  
H. Andres Araujo

In many biodiversity rich watersheds, there is a lack of understanding concerning the trade-offs between timber harvesting and maintaining the watershed’s other ecosystem services, where losses of these services can occur as an externality from timber harvesting. As a result, the potential benefit from an appropriate mix of activities in multiple-use watersheds frequently remains unrealized. Our study provides insight into such trade-offs by estimating the value of a loss in a forest’s water purification/filtration service due to sedimentation caused by logging (the externality). More specifically, we develop a model to quantify the economic impact of increased sedimentation from forest roads on the quality of raw water withdrawn by a municipal water utility. Our approach is novel in several ways. First, we recognize the complex response of the water treatment plant to elevated sedimentation (turbidity) by considering a stochastic environmental influence on water system performance; to accommodate this complexity, we estimate the number of times turbidity exceeds an acceptable threshold by using a count data estimation procedure. Second, we generate alternative time series for turbidity that vary according to assumptions about forest management (logging versus no logging), traffic volume (road use intensity) and aggregate road length. We find that reductions in the economic value of the water purification/filtration service is more sensitive to traffic volume than other considerations but only when the road use is High, as the welfare effect in other cases is modest. Our analysis will be helpful to forest planners who must consider the trade-offs in forest management when timber harvesting can have harmful impacts on important ecosystem services, such as water purification/filtration.


Sign in / Sign up

Export Citation Format

Share Document