http://iet.metastore.ingenta.com
1887

De-identification for privacy protection in biometrics

De-identification for privacy protection in biometrics

For access to this article, please select a purchase option:

Buy chapter PDF
£10.00
(plus tax if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
User-Centric Privacy and Security in Biometrics — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

De-identification, which is defined as the process of removing or concealing personal identifiers or replacing them with surrogate personal identifiers to prevent direct or indirect identification of a person, is recognized as an efficient tool for protection of a person's privacy that is one of the most important social and political issues of today's information society. The chapter “De-identification for privacy protection in biometrics” aims to review the progress of recent research on the de-identification of biometric personal identifiers. The chapter covers de-identification of physiological biometric identifiers (face, fingerprint, iris, ear), behavioural biometric identifiers (voice, gait, gesture), as well as soft biometrics identifiers (body silhouette, gender, tattoo) and discuss different threats to person's privacy in biometrics.

Chapter Contents:

  • 13.1 Introduction
  • 13.2 De-identification and irreversible de-identification
  • 13.2.1 De-identification and anonymization
  • 13.2.2 Multimodal de-identification
  • 13.2.3 Taxonomy of the personal identifiers
  • 13.3 De-identification of physiological biometric identifiers
  • 13.3.1 Face de-identification in still images
  • 13.3.2 Face de-identification in videos
  • 13.3.3 Fingerprint de-identification
  • 13.3.4 Iris de-identification
  • 13.3.5 Ear de-identification
  • 13.4 De-identification of behavioural biometric identifiers
  • 13.4.1 Voice de-identification
  • 13.4.2 Gait and gesture de-identification
  • 13.5 De-identification of soft biometric identifiers
  • 13.5.1 Body silhouette de-identification
  • 13.5.2 Gender, age, race and ethnicity de-identification
  • 13.5.3 Scars, marks and tattoos de-identification
  • 13.6 Conclusion
  • Acknowledgements
  • References

Inspec keywords: data protection; biometrics (access control)

Other keywords: deidentification; behavioural biometric identifiers; physiological biometric identifiers; soft biometrics identifiers; privacy protection

Subjects: Image recognition; Computer vision and image processing techniques; Data security

Preview this chapter:
Zoom in
Zoomout

De-identification for privacy protection in biometrics, Page 1 of 2

| /docserver/preview/fulltext/books/sc/pbse004e/PBSE004E_ch13-1.gif /docserver/preview/fulltext/books/sc/pbse004e/PBSE004E_ch13-2.gif

Related content

content/books/10.1049/pbse004e_ch13
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address