{"title":"Biometric technology and smartphones: A consideration of the practicalities of a broad adoption of biometrics and the likely impacts","authors":"P. Corcoran, Claudia Costache","doi":"10.1109/ISTAS.2015.7439439","DOIUrl":null,"url":null,"abstract":"The potential synergies between consumer handheld devices, particularly smartphones and biometric technologies is outlines. The practicalities and challenges for three such technologies - fingerprint, iris and palmprint - are presented. The use of biometrics for personal authentication is discussed, including the use of zero knowledge proof techniques to ensure that the biometric data does not leave the phone. The scope for data theft and breach through spoofing of the original biometric are discussed. Finally the potential impact of this technology synergy on personal privacy is considered.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 IEEE International Symposium on Technology and Society (ISTAS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISTAS.2015.7439439","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 13
Abstract
The potential synergies between consumer handheld devices, particularly smartphones and biometric technologies is outlines. The practicalities and challenges for three such technologies - fingerprint, iris and palmprint - are presented. The use of biometrics for personal authentication is discussed, including the use of zero knowledge proof techniques to ensure that the biometric data does not leave the phone. The scope for data theft and breach through spoofing of the original biometric are discussed. Finally the potential impact of this technology synergy on personal privacy is considered.