IEEE Technology and Society Magazine - September 2016 - 63

source of light will provide an indication as an active
glint in the pupil of the eye to show it if is a live eye, or
a false video eye.
Secondary biometrics can further improve the robustness of biometric systems to defend against potential
spoofing attacks. Daugman has published results of studies involving the order of hundreds of billions of crosscomparisons of iris codes [5] showing that while one iris
code might be duplicated across a large segment of the
population, there is almost no statistical likelihood for a
pair of people to have both iris patterns duplicated. This
does not occur even in the case of identical twins. A similar logic follows if we use a combination of two different
biometrics, e.g., iris and palmprint, or iris and fingerprint.
And using two complimentary methods of liveness detection can also reduce the potential for spoofing. Thus an
analysis of the lips region of the face and a comparison
with extracted word structures from an audio recording
could be used as a liveness measure for speech detection. The combination of the speech itself with the voice
characteristics could be used as a biometric.
So while identity theft via stolen biometrics is feasible,
it is far from easy to implement. The challenges posed
are only likely to grow more sophisticated in the future.

asked to verify themselves on the telephone they are
invariably asked a sequence of questions about their
past life - where they lived, their first car, their first pet,
their best friend at school, mother's maiden name and
of course, their date of birth; this exact same information has been provided to tens, even hundreds of other
companies, services, and websites. Just one of these
entities could have a dishonest employee willing to steal
and sell on such data - how is this less a risk than committing one's biometric data to a modern electronic
device that sits in a jacket pocket most of the day? At
least the user knows the device's location 24/7 until they
manage to lose it, and even then they can get to a network and hit the kill switch.
What if we return to the use of a personal signature as
the legally binding baseline of authentication? How difficult is it to perform a high-resolution scan of your signature from a page and extract the corresponding bitmap
image? And the latest version of Adobe PDF viewer allows
you to import just such a bitmap to facilitate electronic
signing of PDF documents! So which is more secure - an
advanced biometric obtained using liveness detection to
ensure that you were actually holding and operating the
device, or your handwritten signature? I know where I'd
prefer to put my money, literally as well as figuratively.

Supervised Versus
Unsupervised Authentication

Privacy Concerns

This is perhaps the biggest leap with smartphone biometrics - almost all other existing biometric systems
employ a supervised authentication process. There is
always a human overseer who can step in where the process fails. This is a luxury that is not available to the purveyors of consumer products and if the device does not
perform as expected without the need for user supervision, it invariably ends back with the manufacturer.
A continual challenge with consumer systems is that
everything is expected to work and to work consistently,
even in difficult non-standard conditions. Looking back
historically to the mid-2000s when the first pocket-PC
devices appeared with a sweep fingerprint scanner we
can hypothesize that their short timeframe in the market
was probably due to poor reliability of the fingerprint
authentication system. While this was never admitted
publicly, it makes sense. The achievement of Touch IDTM
where others have failed must be acknowledged [6].
The other challenge of unsupervised authentication is,
naturally, that you are not around to detect when the "bad
guys" try to crack your authentication system. This challenge is less tested and there will definitely be a great deal
of discussion and publicity directed here as biometrics
become further embedded into mainstream devices.
But the use of biometrics is not less secure than
many of the "manual" systems used today to secure our
credit cards and bank accounts. When a customer is

This brings us to the topic of biometrics and privacy. If
personal biometrics are to be used as a means of
authentication it becomes critical to consider the use
cases employed. Legacy biometric techniques gather
data in centralized databases, and these "enrolled biometrics" become a permanent record of your identity.
Thus the owner of the data becomes the effective arbiter of your identity.
Clarke [7] has written in detail on this topic. He separates privacy into a number of sub-categories and
emphasizes the need for safeguards, depending on the
particular use of biometric data. These safeguards are
essential if biometric technology is not to fall into illrepute, even in relatively free societies. In more authoritarian societies, he considers that the worst fears
expressed in popular culture may well become reality.
While Jain and Nandakumar [8] focus more on the
maturity of biometric technology, they recognize the
importance of considering privacy in any particular
application of biometrics. More specifically they raise
several key concerns:
■ Who owns the biometric data, the individual or the
service provider?
■ Will the use of biometrics be proportional to the need
for security in a given application? Should a user be
required to provide a fingerprint in order to purchase
a hamburger or access a commercial website?

september 2016

∕

IEEE Technology and Society Magazine

63



Table of Contents for the Digital Edition of IEEE Technology and Society Magazine - September 2016

IEEE Technology and Society Magazine - September 2016 - Cover1
IEEE Technology and Society Magazine - September 2016 - Cover2
IEEE Technology and Society Magazine - September 2016 - 1
IEEE Technology and Society Magazine - September 2016 - 2
IEEE Technology and Society Magazine - September 2016 - 3
IEEE Technology and Society Magazine - September 2016 - 4
IEEE Technology and Society Magazine - September 2016 - 5
IEEE Technology and Society Magazine - September 2016 - 6
IEEE Technology and Society Magazine - September 2016 - 7
IEEE Technology and Society Magazine - September 2016 - 8
IEEE Technology and Society Magazine - September 2016 - 9
IEEE Technology and Society Magazine - September 2016 - 10
IEEE Technology and Society Magazine - September 2016 - 11
IEEE Technology and Society Magazine - September 2016 - 12
IEEE Technology and Society Magazine - September 2016 - 13
IEEE Technology and Society Magazine - September 2016 - 14
IEEE Technology and Society Magazine - September 2016 - 15
IEEE Technology and Society Magazine - September 2016 - 16
IEEE Technology and Society Magazine - September 2016 - 17
IEEE Technology and Society Magazine - September 2016 - 18
IEEE Technology and Society Magazine - September 2016 - 19
IEEE Technology and Society Magazine - September 2016 - 20
IEEE Technology and Society Magazine - September 2016 - 21
IEEE Technology and Society Magazine - September 2016 - 22
IEEE Technology and Society Magazine - September 2016 - 23
IEEE Technology and Society Magazine - September 2016 - 24
IEEE Technology and Society Magazine - September 2016 - 25
IEEE Technology and Society Magazine - September 2016 - 26
IEEE Technology and Society Magazine - September 2016 - 27
IEEE Technology and Society Magazine - September 2016 - 28
IEEE Technology and Society Magazine - September 2016 - 29
IEEE Technology and Society Magazine - September 2016 - 30
IEEE Technology and Society Magazine - September 2016 - 31
IEEE Technology and Society Magazine - September 2016 - 32
IEEE Technology and Society Magazine - September 2016 - 33
IEEE Technology and Society Magazine - September 2016 - 34
IEEE Technology and Society Magazine - September 2016 - 35
IEEE Technology and Society Magazine - September 2016 - 36
IEEE Technology and Society Magazine - September 2016 - 37
IEEE Technology and Society Magazine - September 2016 - 38
IEEE Technology and Society Magazine - September 2016 - 39
IEEE Technology and Society Magazine - September 2016 - 40
IEEE Technology and Society Magazine - September 2016 - 41
IEEE Technology and Society Magazine - September 2016 - 42
IEEE Technology and Society Magazine - September 2016 - 43
IEEE Technology and Society Magazine - September 2016 - 44
IEEE Technology and Society Magazine - September 2016 - 45
IEEE Technology and Society Magazine - September 2016 - 46
IEEE Technology and Society Magazine - September 2016 - 47
IEEE Technology and Society Magazine - September 2016 - 48
IEEE Technology and Society Magazine - September 2016 - 49
IEEE Technology and Society Magazine - September 2016 - 50
IEEE Technology and Society Magazine - September 2016 - 51
IEEE Technology and Society Magazine - September 2016 - 52
IEEE Technology and Society Magazine - September 2016 - 53
IEEE Technology and Society Magazine - September 2016 - 54
IEEE Technology and Society Magazine - September 2016 - 55
IEEE Technology and Society Magazine - September 2016 - 56
IEEE Technology and Society Magazine - September 2016 - 57
IEEE Technology and Society Magazine - September 2016 - 58
IEEE Technology and Society Magazine - September 2016 - 59
IEEE Technology and Society Magazine - September 2016 - 60
IEEE Technology and Society Magazine - September 2016 - 61
IEEE Technology and Society Magazine - September 2016 - 62
IEEE Technology and Society Magazine - September 2016 - 63
IEEE Technology and Society Magazine - September 2016 - 64
IEEE Technology and Society Magazine - September 2016 - 65
IEEE Technology and Society Magazine - September 2016 - 66
IEEE Technology and Society Magazine - September 2016 - 67
IEEE Technology and Society Magazine - September 2016 - 68
IEEE Technology and Society Magazine - September 2016 - 69
IEEE Technology and Society Magazine - September 2016 - 70
IEEE Technology and Society Magazine - September 2016 - 71
IEEE Technology and Society Magazine - September 2016 - 72
IEEE Technology and Society Magazine - September 2016 - 73
IEEE Technology and Society Magazine - September 2016 - 74
IEEE Technology and Society Magazine - September 2016 - 75
IEEE Technology and Society Magazine - September 2016 - 76
IEEE Technology and Society Magazine - September 2016 - 77
IEEE Technology and Society Magazine - September 2016 - 78
IEEE Technology and Society Magazine - September 2016 - 79
IEEE Technology and Society Magazine - September 2016 - 80
IEEE Technology and Society Magazine - September 2016 - 81
IEEE Technology and Society Magazine - September 2016 - 82
IEEE Technology and Society Magazine - September 2016 - 83
IEEE Technology and Society Magazine - September 2016 - 84
IEEE Technology and Society Magazine - September 2016 - 85
IEEE Technology and Society Magazine - September 2016 - 86
IEEE Technology and Society Magazine - September 2016 - 87
IEEE Technology and Society Magazine - September 2016 - 88
IEEE Technology and Society Magazine - September 2016 - Cover3
IEEE Technology and Society Magazine - September 2016 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2023
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2023
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2023
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2013
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2013
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2013
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2013
https://www.nxtbookmedia.com