You are on page 1of 1

Background, description, and/or history of the issue

For thousands of years, humans have used body characteristics such as face, voice, gait,
and so on to recognize each other. In the mid 19th century, Alphonse Bertillon, chief of the
criminal identification division of the police department in Paris, developed and then practiced
the idea of using various body measurements (for example, height, length of arms, feet, and
fingers) to identify criminals. In the late 19th century, just as his idea was gaining popularity,
it was eclipsed by a far more significant and practical discovery: the distinctiveness of human
fingerprints. Soon after this discovery, many major law-enforcement departments embraced
the idea of “booking” criminals’ fingerprints and storing them in databases (initially, card files).
Later, police gained the ability to “lift” leftover, typically fragmentary, fingerprints from crime
scenes (commonly called latents) and match them with fingerprints in the database to determine
criminals’ identities. Biometrics first came into extensive use for law-enforcement and legal
purposes—identification of criminals and illegal aliens, security clearances for employees in
sensitive jobs, paternity determinations, forensics, positive identifications of convicts and
prisoners, and so on. Today, however, many civilian and private-sector applications are
increasingly using biometrics to establish personal recognition. However, privacy in biometric
are important to be keep in save place. There is issue when it comes the privacy of person using
biometric. "Even if a fraudster can get their hands on [a user's] credentials, they still can't mimic
that behaviour," explained BehavioSec founder Olov Renberg to CNBC [1]. He agrees to use
biometric as identification because current methods of authentication are insufficient.
Therefore, Moskovich and Osadchy [2] has propose a way to perform secure face identification
with index facial components extract from a public face database by representing a private face
image. Furthermore, Arun Ross and Asem Othman [3] do the research to protect the privacy of a
face database by decomposing an input private face image into two independent sheet images
such that the private face image can be reconstructed only when both sheets are simultaneously
available.

Reference

[1] Ross, A., & Othman, A. (2011). Visual cryptography for biometric privacy. IEEE
Transactions on Information Forensics and Security, 6(1), 70–81.

[2] Luke Graham “Biometrics: The future of digital security” April 2016

[3] B. Moskovich and M. Osadchy, “Illumination invariant representation


for privacy preserving face identification,” in Proc. IEEE Computer
Society and IEEE Biometrics Council Workshop on Biometrics, San
Francisco, CA, Jun. 2010, pp. 154–161

[4] Ross, A., & Othman, A. (2011). Visual cryptography for biometric privacy. IEEE
Transactions on Information Forensics and Security, 6(1), 70–81.

You might also like