Difference between revisions of "Iris Recognition"

From SI410
Jump to: navigation, search
(Consent)
Line 1: Line 1:
'''Iris recognition''' is a [http://si410wiki.sites.uofmhosting.net/index.php/Surveillance_Technologies#Biometrics biometric] verification method that utilizes the unique pattern of each person’s iris, the colored circular structure in the eye, to confirm one’s identity. The authentication process is realized by scanning an iris at a reasonable distance with a near-infrared light and then comparing the acquired template to the already existing templates in a database system.<ref>Wildes, Richard. Iris Recognition: an Emerging Biometric Technology - IEEE Journals & Magazine, Sept. 1997, ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=628669.</ref>
+
'''Iris recognition''' is a [http://si410wiki.sites.uofmhosting.net/index.php/Surveillance_Technologies#Biometrics biometric] verification method that utilizes the unique pattern of an individual's [https://en.wikipedia.org/wiki/Iris_(anatomy) iris], the colored circular structure in the eye, to confirm one’s identity. The authentication process is realized by scanning an iris at a reasonable distance with a near-infrared light and then comparing the acquired template to the already existing templates in a database system.<ref>Wildes, Richard. Iris Recognition: an Emerging Biometric Technology - IEEE Journals & Magazine, Sept. 1997, ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=628669.</ref>
  
Similar to [http://si410wiki.sites.uofmhosting.net/index.php/Face_recognition face recognition] and fingerprinting, iris recognition uses human biological characteristics to distinguish one person from another. Some find it preferable to the prior two technologies because of the structural attributes of the iris. This calls attention to identity, privacy, and consent concerns that have come into view gradually as iris recognition is becoming more widely used over time.
+
Similar to [http://si410wiki.sites.uofmhosting.net/index.php/Face_recognition face recognition] and fingerprinting, iris recognition uses human biological characteristics to distinguish one person from another for security purposes. Some find it preferable to both face recognition and fingerprinting technologies because the structural attributes of the iris. As iris recognition is becoming more widely used, ethical concerns of identity, privacy, and consent have come into view.  
 
[[File:iris.jpg|thumbnail|right|iris recognition <ref>Thakkar, Danny. “Retinal vs. Iris Recognition: Your Eyes Can Get You Identified?” Bayometric, Bayometric, 8 Aug. 2018, www.bayometric.com/retinal-vs-iris-recognition/.</ref>]]
 
[[File:iris.jpg|thumbnail|right|iris recognition <ref>Thakkar, Danny. “Retinal vs. Iris Recognition: Your Eyes Can Get You Identified?” Bayometric, Bayometric, 8 Aug. 2018, www.bayometric.com/retinal-vs-iris-recognition/.</ref>]]
 
== Advantages ==
 
== Advantages ==
 
=== High Accuracy ===
 
=== High Accuracy ===
Iris recognition is not guaranteed to be perfectly correct all the time and many factors, like changes of lighting and the use of different algorithms, affect accuracy. However, it leaves less room for deceit because the iris traits are more permanent and stable, and it is more difficult to change one’s iris than it is to alter other body parts.<ref>Jain, Anil K., and Sharath Pankanti. “BEYOND FINGERPRINTING.” Scientific American, vol. 299, no. 3, 2008, pp. 78–81. JSTOR, www.jstor.org/stable/26000805.</ref> The high error rate of face recognition is introduced by the change of facial features across conditions and the similarities existing among people like twins.<ref>Daugman, John. “Iris Recognition: The Colored Part of the Eye Contains Delicate Patterns That Vary Randomly from Person to Person, Offering a Powerful Means of Identification.” American Scientist, vol. 89, no. 4, 2001, pp. 326–333. JSTOR, www.jstor.org/stable/27857501.</ref> The advancement of cosmetic surgery techniques makes face recognition impractical to use. The first documentation of appearance-altering surgery (to help people recover from injuries) can be dated back to more than four thousand years ago, and within the recent decades, more people have adopted cosmetic surgery to change or improve their facial appearance. In addition to altering one's face, there are also multiple ways of altering one’s fingerprints that offer an opportunity for ill-intentioned people to successfully sneak through criminal checkpoints. According to a report in Forensic magazine, the FBI has caught hundreds of suspects who tried to alter their distinctive marks at their fingertips by deep cuts, burning, biting, and using sandpaper to avoid identification.<ref>Augenstein, Seth. “FBI Warns About Altered Fingerprints.” Forensic Magazine, 14 June 2016, www.forensicmag.com/article/2015/05/fbi-warns-about-altered-fingerprints.</ref>
+
Iris recognition is not guaranteed to be perfectly correct or effective all the time. Factors like changes of lighting and the use of different algorithms affect its accuracy. However, it leaves less room for deceit because it is more difficult to change one’s iris than it is to alter other body parts seeing as iris traits are more permanent and stable.<ref>Jain, Anil K., and Sharath Pankanti. “BEYOND FINGERPRINTING.” Scientific American, vol. 299, no. 3, 2008, pp. 78–81. JSTOR, www.jstor.org/stable/26000805.</ref> The high error rate of face recognition is introduced by the change of facial features across conditions and the similarities existing among people - like twins.<ref>Daugman, John. “Iris Recognition: The Colored Part of the Eye Contains Delicate Patterns That Vary Randomly from Person to Person, Offering a Powerful Means of Identification.” American Scientist, vol. 89, no. 4, 2001, pp. 326–333. JSTOR, www.jstor.org/stable/27857501.</ref> In short, facial features may change over time which poses a problem for facial recognition technology. Moreover, the advancement of cosmetic surgery techniques makes face recognition impractical to use. The first documentation of appearance-altering surgery (to help people recover from injuries) can be dated back to more than four thousand years ago, and within the recent decades, more people have adopted cosmetic surgery to change or improve their facial appearance. In addition to altering one's face, there are also multiple ways of altering one’s fingerprints which creates an opportunity for ill-intentioned actors to successfully sneak through security checkpoints. According to a report in Forensic magazine, the FBI has caught hundreds of suspects who tried to alter their distinctive marks at their fingertips by deep cuts, burning, biting, or using sandpaper to avoid identification.<ref>Augenstein, Seth. “FBI Warns About Altered Fingerprints.” Forensic Magazine, 14 June 2016, www.forensicmag.com/article/2015/05/fbi-warns-about-altered-fingerprints.</ref>
  
Because iris recognition identifies individuals based on an unchangeable aspect of their physical identity, this forces people to have consistent identities. By disallowing people to alter their identity in order to reflect who they are, this violates people's autonomy, thereby violating their privacy.<ref>Information Technology and Moral Philosophy "Plural Selves and Relational Identity" Dean Docking 2008</ref>  
+
Because iris recognition identifies individuals based on an unchangeable aspect of their physical identity, it may prove to be extremely difficult for individuals to circumvent some security checkpoint. One might argue that each person has the right to alter their identity to reflect who they are. By preventing such an action, we are restricting autonomy and may even be violating the individual's privacy.<ref>Information Technology and Moral Philosophy "Plural Selves and Relational Identity" Dean Docking 2008</ref>  
  
 
=== Remote Scan ===
 
=== Remote Scan ===
Iris recognition is also more efficient because of the way the eye is scanned. While an iris scanner only needs to convert iris patterns to data, and can do so at a considerable distance, face recognition demands close-proximity scanning of many facial parts in order to collect essential features, and fingerprint detection requires people to physically press their fingers onto the machines. Iris recognition is only getting more remote. Researchers at Carnegie Mellon University have increased the distance from which iris recognition is able to work to more than ten meters away from a moving subject. This means in the future it is very possible that an iris recognition surveillance camera can identify people easily at a far distance when they walk by in the airport or glance into the rear-view mirror while driving on the street.<ref name="a">Stone, Jeff. “Iris Scanners, Widely Used By US Military, Could Be Coming To A Police Department Near You.” International Business Times, 12 May 2015, www.ibtimes.com/iris-scanners-widely-used-us-military-could-be-coming-police-department-near-you-1917018.</ref>
+
Iris recognition is also more efficient because of the way the eye is scanned. While an iris scanner only needs to convert iris patterns to data, and can do so at a considerable distance, face recognition demands close-proximity scanning of many facial parts in order to collect essential features, and fingerprint detection requires people to physically press their fingers onto the machines. Iris recognition is only getting more remote. Researchers at Carnegie Mellon University have increased the distance from which iris recognition is able to work to more than ten meters away from a moving subject. This means that, in the future, it is very possible that an iris recognition surveillance camera can easily identify people from a far distance: as they walk through an airport or glance into a rear-view mirror while driving.<ref name="a">Stone, Jeff. “Iris Scanners, Widely Used By US Military, Could Be Coming To A Police Department Near You.” International Business Times, 12 May 2015, www.ibtimes.com/iris-scanners-widely-used-us-military-could-be-coming-police-department-near-you-1917018.</ref>  
 
==Ethical Issues ==
 
==Ethical Issues ==
 
=== Identity ===
 
=== Identity ===
Due to the high accuracy of iris recognition, many countries including the UK and the United Arab States are using this technology as a national ID for citizens and as a passport for travelers. Like Wikipedia bots and cyborgs, which can not only fight against vandalism more effectively than humans but also cause chaos when used inappropriately for users' own interest, the high accuracy of iris recognition imposes serious consequences such as the ease of identity theft by using high-resolution photos of someone else's iris.<ref>Halfaker, Aaron, and John Riedl. “Bots and Cyborgs: Wikipedia's Immune System.” Computer, vol. 45, no. 3, 2012, pp. 79–82., doi:10.1109/mc.2012.82.</ref> It is very likely that iris recognition will become a substitute for other legal documents like drivers’ licenses and will be applied to more situations where some sort of ID is required. Irises are not like fake paper documents that can be detected easily. If someone’s iris pattern is stolen, it is potentially more dangerous since it cannot be fixed easily like getting a new Facebook account, and it is impossible for people to get new iris patterns or alter their eyes completely.
+
Due to the high accuracy of iris recognition, many countries including the UK and the United Arab States are currently using this technology as a national ID for citizens and as a passport for travelers. Like Wikipedia bots and cyborgs, which combat vandalism more effectively than humans (though they also can create chaos when used inappropriately by malicious users), the high accuracy of iris recognition brings about serious consequences such as the ease of identity theft by using high-resolution photos of someone else's iris.<ref>Halfaker, Aaron, and John Riedl. “Bots and Cyborgs: Wikipedia's Immune System.” Computer, vol. 45, no. 3, 2012, pp. 79–82., doi:10.1109/mc.2012.82.</ref> It is very likely that iris recognition will become a substitute for other legal documents - like drivers’ licenses - and will be applied to even more scenarios where some sort of ID is required. Irises are not like fake paper documents that can be assessed without much effort or pain. If someone’s iris pattern is stolen, it is potentially more dangerous since the issue cannot be resolved as easily as getting a new Facebook account. In fact, it is impossible for people to get new iris patterns or alter their eyes completely. If iris recognition were to be widely implemented in our day-to-day activities, cases of stolen iris patterns would likely be devastating for victims.  
  
 
=== Privacy ===
 
=== Privacy ===
 
[[File:Military-iris-scanner.jpg|thumbnail|right|iris recognition used by the U.S. military in Afghanistan<ref name="a"/>]]
 
[[File:Military-iris-scanner.jpg|thumbnail|right|iris recognition used by the U.S. military in Afghanistan<ref name="a"/>]]
Up till now, iris recognition has been used mainly by the U.S. military to identify captives taken from foreign battlefields, by police departments to surveil law-breakers, by the Department of Homeland Security to spot suspects on watch lists, and by law enforcement at borders to identify smugglers and terrorists.<ref name="a"/> As more iris data are collected from people and commercial iris scanners become cheaper and more accessible to the general public, iris scanning could be used for stalking of ordinary innocent people even without their noticing it. Imagine walking down the street surrounded by cameras that know about each person who passes by, including who they are, whom they have met, who their friends are, where they have been, and what their daily routines are.<ref>Meyer, Robinson. “Long-Range Iris Scanning Is Here (and It's Creepy).” The Atlantic, Atlantic Media Company, 13 May 2015, www.theatlantic.com/technology/archive/2015/05/long-range-iris-scanning-is-here/393065/.</ref> Furthermore, with the improvement of resolution techniques, people may be able to take stalking to the next level by using iris recognition to match and combine someone's online and offline identities like how they identify strangers by using face recognition and photos on Facebook in the paper "Face Recognition and Privacy in the Age of Augmented Reality". These technologies are erasing the borderline of people's onlife and offlife, and they call our attention to solving the rising privacy matters.<ref>Acquisti, A., R. Gross, and F. Stutzman. “Face Recognition and Privacy in the Age of Augmented Reality”. Journal of Privacy and Confidentiality, Vol. 6, no. 2, Dec. 2014, doi:10.29012/jpc.v6i2.638.</ref>
+
Until recently, iris recognition has been used mainly by (1) the U.S. military to identify captives taken from foreign battlefields, (2) police departments to surveil law-breakers, (3) the Department of Homeland Security to spot suspects on watch lists, and (4) law enforcement at borders to identify smugglers and terrorists.<ref name="a"/> As more iris data are collected, and commercial iris scanners become cheaper and more accessible to the general public, iris scanning could be utilized for stalking of people without their noticing. Imagine walking down a street, surrounded by cameras that know everything about each passerby (who they are, whom they have met, who their friends are, where they have been, and what their daily routines are).<ref>Meyer, Robinson. “Long-Range Iris Scanning Is Here (and It's Creepy).” The Atlantic, Atlantic Media Company, 13 May 2015, www.theatlantic.com/technology/archive/2015/05/long-range-iris-scanning-is-here/393065/.</ref> Such a use of this technology would be dangerous in the hands of organizations, governments and malicious actors. Furthermore, with the improvement of resolution techniques, people may be able to take stalking to the next level by using iris recognition to match and combine someone's online and offline identities like how they identify strangers by using face recognition and photos on Facebook in the paper "Face Recognition and Privacy in the Age of Augmented Reality". These technologies are erasing the borderline of people's onlife and offlife, and they call our attention to solving the rising privacy matters.<ref>Acquisti, A., R. Gross, and F. Stutzman. “Face Recognition and Privacy in the Age of Augmented Reality”. Journal of Privacy and Confidentiality, Vol. 6, no. 2, Dec. 2014, doi:10.29012/jpc.v6i2.638.</ref>
  
 
=== Consent ===
 
=== Consent ===
The issue of consent relates to the way law enforcement collects iris data. From a security point of view, iris records help police keep track of suspects if they try to escape from charges. The data could be used, however, to track defendants even after the charge is dropped or the case is closed. The United States' New York City police department faced criticism in 2010 when reports were released stating that some police officers would hold detainees longer than necessary because those people refused to have their iris photographs taken.<ref>Moynihan, Colin. “Some Who Decline an Optional Iris Photo Are Kept Longer in Jail, Critics Say.” The New York Times, The New York Times, 13 Feb. 2012, www.nytimes.com/2012/02/13/nyregion/new-objections-to-nypds-iris-photographing-program.html.</ref>  This ethical issue of nonconsensual iris data collection is further complicated by the lack of transparency governments and organizations often employ when handling such data. Companies and legislation that obscure transparency by making information invisible prevent individuals from exhibiting control over their personal data and from consenting to the dispersal of that information.<ref>Turilli, M. & Floridi, L., "The ethics of information transparency", March 2009, p. 105-112</ref> Transparency enables the ethical concern of consent to persist among biometric identifiers, but groups like the Federal Trade Commission (FTC) have made efforts to improve this problem. In 2012, the FTC issued a report with recommended principles for companies and organizations to adapt such as practices related to transparent information collection and use, the inclusion of privacy protections during product development, and providing consumers with more contextualized and timely information regarding the collection of their personal data.<ref>United States Government Accountability Office, [https://www.gao.gov/assets/680/671764.pdf "Facial Recognition Technology"], July 2015, p. 23-24</ref>
+
The issue of consent relates to the way law enforcement collects iris data. From a security point of view, iris records help police keep track of suspects if they were to try escaping from charges. The data could be used, however, to track defendants even after the charge is dropped or the case is closed. The United States' New York City police department faced criticism in 2010 when reports were released stating that some police officers would hold detainees longer than necessary because those people refused to have their iris photographs taken.<ref>Moynihan, Colin. “Some Who Decline an Optional Iris Photo Are Kept Longer in Jail, Critics Say.” The New York Times, The New York Times, 13 Feb. 2012, www.nytimes.com/2012/02/13/nyregion/new-objections-to-nypds-iris-photographing-program.html.</ref>  The ethical issue of nonconsensual iris data collection is further complicated by the lack of transparency governments and organizations often employ when handling such data. Companies and legislation that obscure transparency by making information invisible - or difficult to access - prevent individuals from exerting control over their personal data and from consenting to the dissemination of that information.<ref>Turilli, M. & Floridi, L., "The ethics of information transparency", March 2009, p. 105-112</ref> Transparency enables the ethical concern of consent to persist among biometric identifiers, but groups like the Federal Trade Commission (FTC) have made efforts to improve this problem. In 2012, the FTC issued a report with recommended principles for companies and organizations to adapt such as practices related to transparent information collection and use, the inclusion of privacy protections during product development, and providing consumers with more contextualized and timely information regarding the collection of their personal data.<ref>United States Government Accountability Office, [https://www.gao.gov/assets/680/671764.pdf "Facial Recognition Technology"], July 2015, p. 23-24</ref>
  
 
== Reference ==
 
== Reference ==

Revision as of 15:01, 12 April 2019

Iris recognition is a biometric verification method that utilizes the unique pattern of an individual's iris, the colored circular structure in the eye, to confirm one’s identity. The authentication process is realized by scanning an iris at a reasonable distance with a near-infrared light and then comparing the acquired template to the already existing templates in a database system.[1]

Similar to face recognition and fingerprinting, iris recognition uses human biological characteristics to distinguish one person from another for security purposes. Some find it preferable to both face recognition and fingerprinting technologies because the structural attributes of the iris. As iris recognition is becoming more widely used, ethical concerns of identity, privacy, and consent have come into view.

iris recognition [2]

Advantages

High Accuracy

Iris recognition is not guaranteed to be perfectly correct or effective all the time. Factors like changes of lighting and the use of different algorithms affect its accuracy. However, it leaves less room for deceit because it is more difficult to change one’s iris than it is to alter other body parts seeing as iris traits are more permanent and stable.[3] The high error rate of face recognition is introduced by the change of facial features across conditions and the similarities existing among people - like twins.[4] In short, facial features may change over time which poses a problem for facial recognition technology. Moreover, the advancement of cosmetic surgery techniques makes face recognition impractical to use. The first documentation of appearance-altering surgery (to help people recover from injuries) can be dated back to more than four thousand years ago, and within the recent decades, more people have adopted cosmetic surgery to change or improve their facial appearance. In addition to altering one's face, there are also multiple ways of altering one’s fingerprints which creates an opportunity for ill-intentioned actors to successfully sneak through security checkpoints. According to a report in Forensic magazine, the FBI has caught hundreds of suspects who tried to alter their distinctive marks at their fingertips by deep cuts, burning, biting, or using sandpaper to avoid identification.[5]

Because iris recognition identifies individuals based on an unchangeable aspect of their physical identity, it may prove to be extremely difficult for individuals to circumvent some security checkpoint. One might argue that each person has the right to alter their identity to reflect who they are. By preventing such an action, we are restricting autonomy and may even be violating the individual's privacy.[6]

Remote Scan

Iris recognition is also more efficient because of the way the eye is scanned. While an iris scanner only needs to convert iris patterns to data, and can do so at a considerable distance, face recognition demands close-proximity scanning of many facial parts in order to collect essential features, and fingerprint detection requires people to physically press their fingers onto the machines. Iris recognition is only getting more remote. Researchers at Carnegie Mellon University have increased the distance from which iris recognition is able to work to more than ten meters away from a moving subject. This means that, in the future, it is very possible that an iris recognition surveillance camera can easily identify people from a far distance: as they walk through an airport or glance into a rear-view mirror while driving.[7]

Ethical Issues

Identity

Due to the high accuracy of iris recognition, many countries including the UK and the United Arab States are currently using this technology as a national ID for citizens and as a passport for travelers. Like Wikipedia bots and cyborgs, which combat vandalism more effectively than humans (though they also can create chaos when used inappropriately by malicious users), the high accuracy of iris recognition brings about serious consequences such as the ease of identity theft by using high-resolution photos of someone else's iris.[8] It is very likely that iris recognition will become a substitute for other legal documents - like drivers’ licenses - and will be applied to even more scenarios where some sort of ID is required. Irises are not like fake paper documents that can be assessed without much effort or pain. If someone’s iris pattern is stolen, it is potentially more dangerous since the issue cannot be resolved as easily as getting a new Facebook account. In fact, it is impossible for people to get new iris patterns or alter their eyes completely. If iris recognition were to be widely implemented in our day-to-day activities, cases of stolen iris patterns would likely be devastating for victims.

Privacy

iris recognition used by the U.S. military in Afghanistan[7]

Until recently, iris recognition has been used mainly by (1) the U.S. military to identify captives taken from foreign battlefields, (2) police departments to surveil law-breakers, (3) the Department of Homeland Security to spot suspects on watch lists, and (4) law enforcement at borders to identify smugglers and terrorists.[7] As more iris data are collected, and commercial iris scanners become cheaper and more accessible to the general public, iris scanning could be utilized for stalking of people without their noticing. Imagine walking down a street, surrounded by cameras that know everything about each passerby (who they are, whom they have met, who their friends are, where they have been, and what their daily routines are).[9] Such a use of this technology would be dangerous in the hands of organizations, governments and malicious actors. Furthermore, with the improvement of resolution techniques, people may be able to take stalking to the next level by using iris recognition to match and combine someone's online and offline identities like how they identify strangers by using face recognition and photos on Facebook in the paper "Face Recognition and Privacy in the Age of Augmented Reality". These technologies are erasing the borderline of people's onlife and offlife, and they call our attention to solving the rising privacy matters.[10]

Consent

The issue of consent relates to the way law enforcement collects iris data. From a security point of view, iris records help police keep track of suspects if they were to try escaping from charges. The data could be used, however, to track defendants even after the charge is dropped or the case is closed. The United States' New York City police department faced criticism in 2010 when reports were released stating that some police officers would hold detainees longer than necessary because those people refused to have their iris photographs taken.[11] The ethical issue of nonconsensual iris data collection is further complicated by the lack of transparency governments and organizations often employ when handling such data. Companies and legislation that obscure transparency by making information invisible - or difficult to access - prevent individuals from exerting control over their personal data and from consenting to the dissemination of that information.[12] Transparency enables the ethical concern of consent to persist among biometric identifiers, but groups like the Federal Trade Commission (FTC) have made efforts to improve this problem. In 2012, the FTC issued a report with recommended principles for companies and organizations to adapt such as practices related to transparent information collection and use, the inclusion of privacy protections during product development, and providing consumers with more contextualized and timely information regarding the collection of their personal data.[13]

Reference

  1. Wildes, Richard. Iris Recognition: an Emerging Biometric Technology - IEEE Journals & Magazine, Sept. 1997, ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=628669.
  2. Thakkar, Danny. “Retinal vs. Iris Recognition: Your Eyes Can Get You Identified?” Bayometric, Bayometric, 8 Aug. 2018, www.bayometric.com/retinal-vs-iris-recognition/.
  3. Jain, Anil K., and Sharath Pankanti. “BEYOND FINGERPRINTING.” Scientific American, vol. 299, no. 3, 2008, pp. 78–81. JSTOR, www.jstor.org/stable/26000805.
  4. Daugman, John. “Iris Recognition: The Colored Part of the Eye Contains Delicate Patterns That Vary Randomly from Person to Person, Offering a Powerful Means of Identification.” American Scientist, vol. 89, no. 4, 2001, pp. 326–333. JSTOR, www.jstor.org/stable/27857501.
  5. Augenstein, Seth. “FBI Warns About Altered Fingerprints.” Forensic Magazine, 14 June 2016, www.forensicmag.com/article/2015/05/fbi-warns-about-altered-fingerprints.
  6. Information Technology and Moral Philosophy "Plural Selves and Relational Identity" Dean Docking 2008
  7. 7.0 7.1 7.2 Stone, Jeff. “Iris Scanners, Widely Used By US Military, Could Be Coming To A Police Department Near You.” International Business Times, 12 May 2015, www.ibtimes.com/iris-scanners-widely-used-us-military-could-be-coming-police-department-near-you-1917018.
  8. Halfaker, Aaron, and John Riedl. “Bots and Cyborgs: Wikipedia's Immune System.” Computer, vol. 45, no. 3, 2012, pp. 79–82., doi:10.1109/mc.2012.82.
  9. Meyer, Robinson. “Long-Range Iris Scanning Is Here (and It's Creepy).” The Atlantic, Atlantic Media Company, 13 May 2015, www.theatlantic.com/technology/archive/2015/05/long-range-iris-scanning-is-here/393065/.
  10. Acquisti, A., R. Gross, and F. Stutzman. “Face Recognition and Privacy in the Age of Augmented Reality”. Journal of Privacy and Confidentiality, Vol. 6, no. 2, Dec. 2014, doi:10.29012/jpc.v6i2.638.
  11. Moynihan, Colin. “Some Who Decline an Optional Iris Photo Are Kept Longer in Jail, Critics Say.” The New York Times, The New York Times, 13 Feb. 2012, www.nytimes.com/2012/02/13/nyregion/new-objections-to-nypds-iris-photographing-program.html.
  12. Turilli, M. & Floridi, L., "The ethics of information transparency", March 2009, p. 105-112
  13. United States Government Accountability Office, "Facial Recognition Technology", July 2015, p. 23-24