Affiliation:
1. Jagan Institute of Management Studies, Rohini, Delhi, India
Abstract
Facial recognition technology has gained significant prominence in identity verification systems, providing convenience and security in various domains. However, the widespread adoption of this technology also raises significant concerns regarding privacy threats. This paper presents a comprehensive privacy threat model specifically designed for identity verification based on facial recognition. The model encompasses potential adversary objectives, such as unauthorized access, identity theft, and profiling, and identifies specific privacy threats, including unauthorized data access, biometric data misuse, tracking and surveillance, re-identification attacks, discrimination and bias, and data retention and sharing. To mitigate these threats, the paper proposes several mitigation measures, such as informed consent, transparent data handling, secure data storage and transmission, minimization of data collection, regular audits and assessments, and ethical considerations. By providing a holistic view of privacy threats in facial recognition-based identity verification, this model aims to guide researchers, practitioners, and policymakers in developing and implementing effective privacy protection mechanisms in this rapidly evolving technological landscape
Reference17 articles.
1. [1] Li, Y., Jain, A. K., & Li, S. Z. (2011). Handbook of Face Recognition. Springer Science & Business Media.
2. [2] Jain, A. K., Ross, A., & Prabhakar, S. (2004). An introduction to biometric recognition. IEEE Transactions on Circuits and Systems for Video Technology, 14(1), 4-20.
3. [3] Brömme, A., Busch, C., & Rathgeb, C. (Eds.). (2018). Handbook of Biometric Anti-Spoofing: Presentation Attack Detection. Springer International Publishing.
4. [4] Bolle, R. M., Jain, A. K., &Pankanti, S. (Eds.). (2005). Biometrics: Personal Identification in Networked Society. Springer Science & Business Media.
5. [5] Kharb L, Rai B, Tomar P, “New Vision of Computer Forensic Science: Need of CyberCrime Law”, The Internet Journal of Law, Healthcare and Ethics, 2007. Volume 4, Number 2. ISSN: 1528-8250.