Empowering the end-user in biometrics

User empowerment in the context of information and communication technologies (ICT) means enabling the end-users to set up and/or tailor ICT solutions according to their own requirements. In this paper we argue that user empowerment is essential in biometrics for the acceptance and widespread use of biometrical applications, concepts, and technology. A key issue is a user's experience of being in control, and how interfaces, modes and modalities of interaction can support and empower the user, whether by direct interaction and control of devices, or via delegation. More importantly, the practices suggested in the paper are steps towards practical and legal regularization of use and circulation o.f biometric information.

[1]  Bettina Berendt,et al.  E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior , 2001, EC '01.

[2]  Marek Rejman-Greene,et al.  Privacy Issues in the Application of Biometrics: a European Perspective , 2005 .

[3]  David Zhang,et al.  An Analysis on Accuracy of Cancelable Biometrics Based on BioHashing , 2005, KES.

[4]  Barry W. Boehm,et al.  Cost models for future software life cycle processes: COCOMO 2.0 , 1995, Ann. Softw. Eng..

[5]  Josef Kittler,et al.  On Combination of Face Authentication Experts by a Mixture of Quality Dependent Fusion Classifiers , 2007, MCS.

[6]  John D. Woodward,et al.  Army Biometric Applications: Identifying and Addressing Sociocultural Concerns , 2001 .

[7]  John P. Baker,et al.  Fusing multimodal biometrics with quality estimates via a Bayesian belief network , 2008, Pattern Recognit..

[8]  Sarah Spiekermann,et al.  Perceived Control : Scales for Privacy in Ubiquitous Computing , 2005 .

[9]  Hyeonjoon Moon,et al.  Biometric Driver Authentication Based on 3D Face Recognition for Telematics Applications , 2007, HCI.

[10]  Anil K. Jain,et al.  Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..

[11]  Nalini K. Ratha,et al.  Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..

[12]  Oliver Günther,et al.  RFID and the Perception of Control: The Consumer's View , 2005, IEEE Engineering Management Review.

[13]  Ben A. M. Schouten,et al.  BioVision: roadmap for biometrics in Europe to 2010 , 2003 .

[14]  Jean-Paul M. G. Linnartz,et al.  New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates , 2003, AVBPA.

[15]  David Chek Ling Ngo,et al.  Computation of Cryptographic Keys from Face Biometrics , 2003, Communications and Multimedia Security.

[16]  P.G.S. Rutten,et al.  Effective use of smart home technology to increase well-being [ISG08] , 2008 .

[17]  Bart Jacobs,et al.  Biometrics and their use in e-passports , 2009, Image Vis. Comput..

[18]  John P. Baker,et al.  Fusion of Biometric Data with Quality Estimates via a Bayesian Belief Network , 2005 .

[19]  Josef Kittler,et al.  Quality dependent fusion of intramodal and multimodal biometric experts , 2007, SPIE Defense + Commercial Sensing.

[20]  Anil K. Jain,et al.  Soft Biometric Traits for Personal Recognition Systems , 2004, ICBA.

[21]  Madhu Sudan,et al.  A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..

[22]  J. Averill Personal control over aversive stimuli and its relationship to stress. , 1973 .

[23]  A. Bandura Self-efficacy: toward a unifying theory of behavioral change. , 1977, Psychology Review.

[24]  Ann Cavoukian,et al.  Keynote Paper: Biometric Encryption: Technology for Strong Authentication, Security and Privacy , 2008 .

[25]  Martin Wattenberg,et al.  A fuzzy commitment scheme , 1999, CCS '99.