Biometric techniques, such as fingerprint verification, iris or face recognition, retina analysis and hand‐written signature verification, are increasingly becoming basic elements of authentication and identification systems. However, any human physiological or behavioural traits serving as biometric characteristics are personal data protected by privacy protection legislation. To address related issues, this paper examines these classes of biometrics according to data protection principles, purpose, proportionality and security, provided in international legislation. This analysis leads to the desired properties of biometric systems in the form of functional and non‐functional requirements, in order to support developers minimising the risk of being non‐compliant to privacy protection legislation, and to increase user acceptance.
Article navigation
1 February 2004
This article was originally published in
Information Management & Computer Security
Literature Review|
February 01 2004
On biometrics‐based authentication and identification from a privacy‐protection perspective: Deriving privacy‐enhancing requirements Available to Purchase
V. Zorkadis;
V. Zorkadis
Hellenic Data Protection Authority, Athens, Greece
Search for other works by this author on:
P. Donos
P. Donos
Hellenic Data Protection Authority, Athens, Greece
Search for other works by this author on:
Publisher: Emerald Publishing
Online ISSN: 1758-5805
Print ISSN: 0968-5227
© Emerald Group Publishing Limited
2004
Information Management & Computer Security (2004) 12 (1): 125–137.
Citation
Zorkadis V, Donos P (2004), "On biometrics‐based authentication and identification from a privacy‐protection perspective: Deriving privacy‐enhancing requirements". Information Management & Computer Security, Vol. 12 No. 1 pp. 125–137, doi: https://doi.org/10.1108/09685220410518883
Download citation file:
1,029
Views
Suggested Reading
Radio frequency identification: ubiquity for humanity
Info (January,2007)
Role management in a privacy‐enhanced collaborative environment
Interactive Technology and Smart Education (June,2010)
Personalized cognitive passwords: an exploratory assessment
Information Management & Computer Security (March,2011)
Shining light on the dark side of ambient intelligence
Foresight (April,2007)
Naked in Cyberspace: How to Find Personal Information Online (2nd ed.)
Online Information Review (August,2003)
Related Chapters
Cybersecurity and Ensuring Privacy in Digital Finance
Digital Finance and Metaverse in Banking: Decoding a Virtual Reality towards Financial Inclusion and Sustainable Development
Why Does Psychic Distance Inhibit International Buyer–Supplier Relationships?
Distance in International Business: Concept, Cost and Value
Recommended for you
These recommendations are informed by your reading behaviors and indicated interests.
