2021
DOI: 10.1007/978-3-030-83620-7_17
|View full text |Cite
|
Sign up to set email alerts
|

Biometric System De-identification: Concepts, Applications, and Open Problems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
1
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 70 publications
0
2
0
Order By: Relevance
“…De-identification is becoming an increasingly important technique in the protection of personal data, alongside other techniques such as encryption and cancelability [14]. It refers to removing identifying information from data sets while preserving their utility for analysis [18]. The de-identification of biometric data is necessary to protect privacy and ensure that the data can be used for research and other applications without violating ethical and legal regulations.…”
Section: Introductionmentioning
confidence: 99%
“…De-identification is becoming an increasingly important technique in the protection of personal data, alongside other techniques such as encryption and cancelability [14]. It refers to removing identifying information from data sets while preserving their utility for analysis [18]. The de-identification of biometric data is necessary to protect privacy and ensure that the data can be used for research and other applications without violating ethical and legal regulations.…”
Section: Introductionmentioning
confidence: 99%
“…This new phase of industrial revolution poses huge responsibility to business, their IT systems and IT security practitioners to ensure their data, especially PID, are processed in a secure manner. Shopon et al (2022) noted that IIDTRC is one of the most common privacy invasions that can be done through leakage of multi-modal biometric information within business organisations.…”
Section: Introductionmentioning
confidence: 99%