Applying Technical Standards to Biometric Systems

2016 ◽  
Vol 8 (2) ◽  
pp. 50-59
Author(s):  
Milorad Milinković ◽  
Miroslav Minović ◽  
Miloš Milovanović

Nowadays, the development and the application of biometric systems on one hand, and the large number of hardware and software manufacturers on the other, caused two the most common problems of biometric systems: a problem of interoperability between system's components as well as between different biometric systems and a problem of biometric data security and privacy protection, both in storage and exchange. Specifications and standards, such as BioAPI and CBEFF, registered and published as multiple standards by ISO (International Organization for Standardization), propose the establishment of single platform (BioAPI) to facilitate the functioning of the biometric systems regardless of hardware or software manufacturers, and unique format for data exchange (CBEFF) to secure biometric data. In this paper, these standards are analyzed in detail and considered as possible solutions to aforementioned problems.

2019 ◽  
Vol 47 (1) ◽  
pp. 70-87 ◽  
Author(s):  
Patricia A. Deverka ◽  
Dierdre Gilmore ◽  
Jennifer Richmond ◽  
Zachary Smith ◽  
Rikki Mangrum ◽  
...  

A medical information commons (MIC) is a networked data environment utilized for research and clinical applications. At three deliberations across the U.S., we engaged 75 adults in two-day facilitated discussions on the ethical and social issues inherent to sharing data with an MIC. Deliberants made recommendations regarding opt-in consent, transparent data policies, public representation on MIC governing boards, and strict data security and privacy protection. Community engagement is critical to earning the public's trust.


2020 ◽  
Vol 2020 ◽  
pp. 1-10
Author(s):  
Zhiyan Xu ◽  
Min Luo ◽  
Neeraj Kumar ◽  
Pandi Vijayakumar ◽  
Li Li

With the popularization of wireless communication and smart devices in the medical field, mobile medicine has attracted more and more attention because it can break through the limitations of time, space, and objects and provide more efficient and quality medical services. However, the characteristics of a mobile smart medical network make it more susceptible to security threats such as data integrity damage and privacy leakage than those of traditional wired networks. In recent years, many digital signature schemes have been proposed to alleviate some of these challenges. Unfortunately, traditional digital signatures cannot meet the diversity and privacy requirements of medical data applications. In response to this problem, this paper uses the unique security attributes of sanitizable signatures to carry out research on the security and privacy protection of medical data and proposes a data security and privacy protection scheme suitable for smart mobile medical scenarios. Security analysis and performance evaluation show that our new scheme effectively guarantees data security and user privacy while greatly reducing computation and communication costs, making it especially suitable for mobile smart medical application scenarios.


2014 ◽  
Vol 16 (1) ◽  
pp. 39-44 ◽  
Author(s):  
Dr.P.K. Rai ◽  
◽  
R.K. Bunkar ◽  
Vivekananda Mishra

IEEE Access ◽  
2020 ◽  
Vol 8 ◽  
pp. 131723-131740 ◽  
Author(s):  
Pan Yang ◽  
Naixue Xiong ◽  
Jingli Ren

2020 ◽  
Vol 174 ◽  
pp. 333-339 ◽  
Author(s):  
Minghui Yang ◽  
Junqi Guo ◽  
Ziyun Zhao ◽  
Tianyou Xu ◽  
Ludi Bai

2020 ◽  
Author(s):  
M Khan

The large-scale utilization of biometric authentication systems creates a demand for effective and reliable security and privacy of its data. Biometric data is not secret and if compromised, it can have catastrophic effects on the integrity of the whole verification system. To address these issues, this paper presents a novel encryption and watermarking method by using public key infrastructure for the secure transmission of biometric data over network. Encryption is applied on the biometric template before embedding as a watermark to make it more secure and robust and then, it is hid into the cover image. Experimental results show that the security, performance, and accuracy of the presented method is encouraging comparable with the other methods found in the current literature.


Suggestion of applicability of ISO to improve the security of company information. Elaborated through a bibliographic research to understand the concepts applied in the present work, adopting a quantitative research through a questionnaire. Research directed to professionals and university students of information technology, and to a random audience. A documentary research was also carried out to collect data in informal *institutions*. The following technical standards were adopted: NBR-ISO-27001, NBR-ISO-27002, NBR-ISO-27008, NBR-ISO-27036, with distinct characteristics and with the intention of being useful in suggesting the applicability of ISO in company procedures. It was possible to evaluate the reliability of the companies in relation to the security of their employee data. With the suggestion of applying the ISO to companies, it is possible to obtain a greater security, as well as a greater availability, with more efficient data exchange. The information security policy is established through rules, standards, and procedures, which must be used internally and externally, providing more reliability. Company employees will begin to carry out processes more efficiently within the organizations. Therefore, the suggestion of using the ISO for information security in companies becomes significantly important because it is one more contribution so that they can have rules to protect both their data and those of their employees.


Sign in / Sign up

Export Citation Format

Share Document