Difference between revisions of "Iris Recognition"
(→Privacy) |
(→Privacy) |
||
Line 30: | Line 30: | ||
=== Privacy === | === Privacy === | ||
[[File:Military-iris-scanner.jpg|thumbnail|right|iris recognition used by the U.S. military in Afghanistan<ref name="a"/>]] | [[File:Military-iris-scanner.jpg|thumbnail|right|iris recognition used by the U.S. military in Afghanistan<ref name="a"/>]] | ||
− | Until recently, iris recognition has been used mainly by <br>(1) the U.S. military to identify captives taken from foreign battlefields, (2) police departments to surveil law-breakers, (3) the Department of Homeland Security to spot suspects on watch lists, | + | Until recently, iris recognition has been used mainly by <br>(1) the U.S. military to identify captives taken from foreign battlefields, <br> (2) police departments to surveil law-breakers, <br>(3) the Department of Homeland Security to spot suspects on watch lists, <br>(4) law enforcement at borders to identify smugglers and terrorists.<ref name="a"/> As more iris data are collected, and commercial iris scanners become cheaper and more accessible to the general public, iris scanning could be utilized for stalking of people without their noticing. Imagine walking down a street, surrounded by cameras that know everything about each passerby (who they are, whom they have met, who their friends are, where they have been, and what their daily routines are).<ref>Meyer, Robinson. “Long-Range Iris Scanning Is Here (and It's Creepy).” The Atlantic, Atlantic Media Company, 13 May 2015, www.theatlantic.com/technology/archive/2015/05/long-range-iris-scanning-is-here/393065/.</ref> Such a use of this technology would be dangerous in the hands of organizations, governments and malicious actors. Furthermore, with the improvement of resolution techniques, people may be able to take stalking to the next level by using iris recognition to match and combine someone's online and offline identities like how they identify strangers by using face recognition and photos on Facebook in the paper "Face Recognition and Privacy in the Age of Augmented Reality". These technologies are erasing the borderline of people's onlife and offlife, and they call our attention to solving the rising privacy matters.<ref>Acquisti, A., R. Gross, and F. Stutzman. “Face Recognition and Privacy in the Age of Augmented Reality”. Journal of Privacy and Confidentiality, Vol. 6, no. 2, Dec. 2014, doi:10.29012/jpc.v6i2.638.</ref> |
=== Consent === | === Consent === |
Revision as of 14:47, 15 April 2019
Iris recognition is a biometric verification method that utilizes the unique pattern of an individual's iris, the colored circular structure in the eye, to confirm one’s identity. The authentication process begins by scanning an iris at a reasonable distance with a near-infrared light and then comparing the acquired template to the individual's already existing templates in a database system.[1]
Similar to face recognition and fingerprinting, iris recognition uses human biological characteristics to distinguish one person from another for security purposes and efficiency. Some prefer it over both face recognition and fingerprinting technologies because the structural attributes of the iris. As iris recognition is becoming more widely used, ethical concerns of identity, privacy, and consent have come into view.
Contents
History
John Daugman is the first person credited with creating iris recognition algorithms that have the ability to be used in new technologies. In his paper, "How iris recognition works", his statisical analysis of iris patterns was able to correctly distinguish and identify individuals and with high accuracy[3]. These findings paved the way for iris recognition techologies to be used by companies across different industries. Currently, the companies Iris ID Systems, CMITECH, Princeton Identity, Sensor Access Technology, Argus Global Limited, and EFG GZ all specialize in recognition tech utilizing some version of these iris identification algorithms[4].
Since the adoption of iris recognition technology and the value in being able to produce it has risen, iris recognition has found many different profitable usage methods. Banks and various financial institutions have implemented iris scanning over other more traditional forms of authentication due to its convenience of use and security[5]. Phone companies like Samsung have even employed iris scanning as a means of accessing one's phone. Technologies have also been found to be increasingly helpful in law and border enforcement agencies where properly and quickly identifying a person is the main concern[5].
Examples
TSB Bank in the United Kingdom was one of the first banks, in September 2016, to incorporate Iris Recognition into their day to day banking operations. In order to log into the TSB application, you are now able to just glance at your mobile device. Iris Recognition is the next step in log in technology after mobile fingerprints. Compared to the fourty traits the fingerprint scans for, Iris recognition is able to recognize two hundred and sixty six. [6]
Apple's' IPhone XR includes a facial recognition software which incorporates iris recognition. Like the banks's technology, you know longer have to touch your phone to utilize the device.
Country border controls also have the ability to utilize this technology. The United Arab Emirates employs this when any passengers enter through air, land or sea. [7]
Advantages
High Accuracy
Iris recognition is not guaranteed to be entirely correct or effective every time. Factors like lighting and different algorithms may affect the accuracy. However, there is less room for deceit because it is more difficult to alter iris than other body parts. Iris traits are more permanent and stable.[8] The high error rate of face recognition is accounted for by the change of facial features across conditions and the similarities existing among people, for example, twins.[9] Facial features may change over time which poses a problem for facial recognition technology. Moreover, the advancement of cosmetic surgery techniques makes face recognition impractical to use. The first documentation of appearance-altering surgery (to help people recover from injuries) can be dated back to more than four thousand years ago, and within the recent decades, more people have adopted cosmetic surgery to change or improve their facial appearance. In addition to altering one's face, there are also multiple ways of altering one’s fingerprints which creates an opportunity for ill-intentioned actors to successfully sneak through security checkpoints. According to a report in Forensic magazine, the FBI has caught hundreds of suspects who tried to alter their distinctive marks at their fingertips by deep cuts, burning, biting, or using sandpaper to avoid identification.[10] Further limitations include Genotypic and Phenotypic Limitation on Biometric Performence, where genetic penetrance describes heritability of factors or "the extent to which the features expressed are genetically determined." For example, blood group and DNA sequence would fall under genotypic features, and fingerprints and iris patters would fall under phenotypic features. The importance of these features is how they influence two error rates, genotypic error rate, and phenotypic error rate, where there is concern for mitigating the risk of Genotypic penetrance causing a high False Match Rate, and mitigating the risk of Phenotypic features from causing a high False Reject Rate. [11]
Because iris recognition identifies individuals based on an unchangeable aspect of their physical identity, it proves to be extremely difficult for individuals to circumvent some security checkpoint. One might argue that each person has the right to alter their identity to reflect who they are. By preventing such an action, we are restricting autonomy and may even be violating the individual's privacy, but we are also providing security enforcement a more reliable enforcement system.[12]
Remote Scan
The way that the iris is scanned makes iris recognition technologies more efficient than other facial recognition softwares. While an iris scanner only needs to convert iris patterns to data, and can do so at a considerable distance, face recognition demands close-proximity in order to scan many facial parts to collect essential features, and fingerprint detection requires people to physically press their fingers onto the machines. Iris recognition is only getting more remote. Researchers at Carnegie Mellon University have increased the distance from which iris recognition is able to work to more than ten meters away from a moving subject. This means that, in the future, it is very possible that an iris recognition surveillance camera can easily identify people from a far distance: as they walk through an airport or glance into a rear-view mirror while driving.[13]
Ethical Issues
Identity
Due to the high accuracy of iris recognition, many countries including the UK and the United Arab States are currently using this technology as a national ID for citizens and as a passport for travelers. Like Wikipedia bots and cyborgs, which combat vandalism more effectively than humans (though they also can create chaos when used inappropriately by malicious users), the high accuracy of iris recognition brings about serious consequences such as the ease of identity theft by using high-resolution photos of someone else's iris.[14] It is very likely that iris recognition will become a substitute for other legal documents - like drivers’ licenses - and will be applied to any situation that requires ID. Irises are not like fake paper documents that can be assessed without much effort or pain. If someone’s iris pattern is stolen, it is potentially more dangerous since the issue cannot be resolved as easily as getting a new driver's license. It is near impossible for people to receive new iris patterns or alter their eyes completely. If iris recognition were to be widely implemented in our day-to-day activities, cases of stolen iris patterns would likely be devastating for victims and basically irreversible.
Privacy
Until recently, iris recognition has been used mainly by
(1) the U.S. military to identify captives taken from foreign battlefields,
(2) police departments to surveil law-breakers,
(3) the Department of Homeland Security to spot suspects on watch lists,
(4) law enforcement at borders to identify smugglers and terrorists.[13] As more iris data are collected, and commercial iris scanners become cheaper and more accessible to the general public, iris scanning could be utilized for stalking of people without their noticing. Imagine walking down a street, surrounded by cameras that know everything about each passerby (who they are, whom they have met, who their friends are, where they have been, and what their daily routines are).[15] Such a use of this technology would be dangerous in the hands of organizations, governments and malicious actors. Furthermore, with the improvement of resolution techniques, people may be able to take stalking to the next level by using iris recognition to match and combine someone's online and offline identities like how they identify strangers by using face recognition and photos on Facebook in the paper "Face Recognition and Privacy in the Age of Augmented Reality". These technologies are erasing the borderline of people's onlife and offlife, and they call our attention to solving the rising privacy matters.[16]
Consent
The issue of consent relates to the way law enforcement collects iris data. From a security point of view, iris records help police keep track of suspects if they were to try escaping from charges. The data could be used, however, to track defendants even after the charge is dropped or the case is closed. The United States' New York City police department faced criticism in 2010 when reports were released stating that some police officers would hold detainees longer than necessary because those people refused to have their iris photographs taken.[17] The ethical issue of nonconsensual iris data collection is further complicated by the lack of transparency governments and organizations often employ when handling such data. Companies and legislation that obscure transparency by making information invisible - or difficult to access - prevent individuals from exerting control over their personal data and from consenting to the dissemination of that information.[18] Transparency enables the ethical concern of consent to persist among biometric identifiers, but groups like the Federal Trade Commission (FTC) have made efforts to improve this problem. In 2012, the FTC issued a report with recommended principles for companies and organizations to adapt such as practices related to transparent information collection and use, the inclusion of privacy protections during product development, and providing consumers with more contextualized and timely information regarding the collection of their personal data.[19]
Reference
- ↑ Wildes, Richard. Iris Recognition: an Emerging Biometric Technology - IEEE Journals & Magazine, Sept. 1997, ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=628669.
- ↑ Thakkar, Danny. “Retinal vs. Iris Recognition: Your Eyes Can Get You Identified?” Bayometric, Bayometric, 8 Aug. 2018, www.bayometric.com/retinal-vs-iris-recognition/.
- ↑ J. Daugman, "How iris recognition works," in IEEE Transactions on Circuits and Systems for Video Technology, vol. 14, no. 1, pp. 21-30, Jan. 2004. doi: 10.1109/TCSVT.2003.818350
- ↑ "Iris Recognition". IFSEC Global Directory. https://directory.ifsecglobal.com/iris-recognition-code004809.html
- ↑ 5.0 5.1 Thakkar, Danny. “Biometric Iris Recognition and Its Application.” Bayometric, Bayometric, 15 Aug. 2018, www.bayometric.com/biometric-iris-recognition-application/.
- ↑ https://www.bbc.com/news/technology-40663365 "TSB to roll out iris scanning tech" Rory Cellan-Jones, July 20 2016.
- ↑ https://trid.trb.org/view/741851 "IRIS RECOGNITION BORDER-CROSSING SYSTEM IN THE UAE"
- ↑ Jain, Anil K., and Sharath Pankanti. “BEYOND FINGERPRINTING.” Scientific American, vol. 299, no. 3, 2008, pp. 78–81. JSTOR, www.jstor.org/stable/26000805.
- ↑ Daugman, John. “Iris Recognition: The Colored Part of the Eye Contains Delicate Patterns That Vary Randomly from Person to Person, Offering a Powerful Means of Identification.” American Scientist, vol. 89, no. 4, 2001, pp. 326–333. JSTOR, www.jstor.org/stable/27857501.
- ↑ Augenstein, Seth. “FBI Warns About Altered Fingerprints.” Forensic Magazine, 14 June 2016, www.forensicmag.com/article/2015/05/fbi-warns-about-altered-fingerprints.
- ↑ Daugman, MSU, Recognizing Persons By Their Iris Patterns http://www.cse.msu.edu/~stockman/Book/projects.html/F09Docs/Readings/daugemanRecognizingPersons.pdf
- ↑ Information Technology and Moral Philosophy "Plural Selves and Relational Identity" Dean Docking 2008
- ↑ 13.0 13.1 13.2 Stone, Jeff. “Iris Scanners, Widely Used By US Military, Could Be Coming To A Police Department Near You.” International Business Times, 12 May 2015, www.ibtimes.com/iris-scanners-widely-used-us-military-could-be-coming-police-department-near-you-1917018.
- ↑ Halfaker, Aaron, and John Riedl. “Bots and Cyborgs: Wikipedia's Immune System.” Computer, vol. 45, no. 3, 2012, pp. 79–82., doi:10.1109/mc.2012.82.
- ↑ Meyer, Robinson. “Long-Range Iris Scanning Is Here (and It's Creepy).” The Atlantic, Atlantic Media Company, 13 May 2015, www.theatlantic.com/technology/archive/2015/05/long-range-iris-scanning-is-here/393065/.
- ↑ Acquisti, A., R. Gross, and F. Stutzman. “Face Recognition and Privacy in the Age of Augmented Reality”. Journal of Privacy and Confidentiality, Vol. 6, no. 2, Dec. 2014, doi:10.29012/jpc.v6i2.638.
- ↑ Moynihan, Colin. “Some Who Decline an Optional Iris Photo Are Kept Longer in Jail, Critics Say.” The New York Times, The New York Times, 13 Feb. 2012, www.nytimes.com/2012/02/13/nyregion/new-objections-to-nypds-iris-photographing-program.html.
- ↑ Turilli, M. & Floridi, L., "The ethics of information transparency", March 2009, p. 105-112
- ↑ United States Government Accountability Office, "Facial Recognition Technology", July 2015, p. 23-24