Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Biometrics
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
===Privacy and discrimination=== {{further|privacy|right to privacy|medical privacy}} It is possible that data obtained during biometric enrollment may be used in ways for which the enrolled individual has not consented. For example, most biometric features could disclose physiological and/or pathological medical conditions (e.g., some fingerprint patterns are related to chromosomal diseases, iris patterns could reveal sex, hand vein patterns could reveal vascular diseases, most behavioral biometrics could reveal neurological diseases, etc.).<ref>Mordini E, Ashton H,(2012), "The Transparent Body β Medical Information, Physical Privacy and Respect for Body Integrity", in Mordini E, Tzovaras D (eds), ''Second Generation Biometrics: the Ethical and Social Context''. Springer-Verlag: Berlin</ref> Moreover, second generation biometrics, notably behavioral and electro-physiologic biometrics (e.g., based on [[electrocardiography]], [[electroencephalography]], [[electromyography]]), could be also used for [[emotion detection]].<ref>Mordini E, Tzovaras D,(2012), ''Second Generation Biometrics: the Ethical and Social Context''. Springer-Verlag: Berlin</ref> There are three categories of privacy concerns:<ref>{{cite book | title=Security in Computing | last1=Pfleeger | first1=Charles | last2=Pfleeger | first2=Shari | publisher=Pearson Education | year=2007 | location=Boston | page=220 | edition=4th | isbn=978-0-13-239077-4 }}</ref> # Unintended functional scope: The authentication goes further than authentication, such as finding a tumor. # Unintended application scope: The authentication process correctly identifies the subject when the subject did not wish to be identified. # Covert identification: The subject is identified without seeking identification or authentication, i.e. a subject's face is identified in a crowd.
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)