The contribution reconstructs the theme of mass surveillance, intertwined with the protection of personal data. It starts to investigate the criticality profiles connected to the treatment of some ...specific categories of data, in particular biometric data, the treatment of which –systematically and on a large scale – is likely to define new surveillance models.
Under these profiles, the article analyzes the jurisprudence of the European Court of Human Rights and Court of Justice.
Background. Currently, the Hurst exponent is quite easily interpreted in relation to biometric, medical and economic data, but it is customary to evaluate it on large samples. The purpose of the work ...is to reduce the sample of real data on which the Hurst exponent can be calculated quite reliably. Materials and methods. The connection between the Hurst exponent and autocorrelation functionals is used. It is proposed to reduce the problem to assessing the autocorrelation properties of the studied sequence of real data. Results and conclusions. Autocorrelation functionals relate to problems of quadratic computational complexity, while the Hurst exponent has a significantly higher computational complexity and is less stable. This makes it possible to reduce the requirements for the size of the real data sample used for calculations.
•Smart Cities have a network of interconnected IoT devices that access, store and transmit personal information.•Biometrics, based on face, fingerprint, iris or speech, is used to impart security to ...user-device interaction.•We enumerate methods that can undermine the integrity of digital image and audio biometric data.•We survey digital forensic schemes that can be used to enhance integrity and privacy of biometric data.
A smart city is engineered to be a self-sustained ecosystem driven by Internet-of-Things (IoT) devices. Smooth functioning of smart cities is conditioned on seamless communication between users and devices. Smart devices equipped with biometric authentication can offer security as well as personalized experience to the end users. Currently, a number of smart devices employ face, fingerprint, and voice modalities for user verification. However, the biometric data acquired by these devices can be digitally manipulated or tampered with, that can compromise the security of the smart environment. Further, the preponderance of biometric data such as face and voice in social media applications, necessitates the validation of their integrity. In this work, we review state-of-the-art digital forensic schemes for audio-visual biometric data that can be leveraged by applications designed for smart cities.
This research analyzes performance art that uses biometric data, based on two concept perspectives – inhuman interconnections and transcorporeality – applied to examples of European performance art ...from Lithuania, Finland, Poland, and Denmark. The term performance art theoretically refers to all art that involves the human body, human biometric data, inhuman interconnections, transcorporeality, and liminal space. This study examines the differences between wide-scope interactive art and design and performance art involving biometric data created through the application of recent developments in consumer technology for live events. This research examined three case projects through the method of autoethnography. The data presented in the article was either collected during the author’s performance art events or at performances the author was attending as a visitor. The cases are analyzed by means of qualitative data analysis, utilizing terms representing human biometric data and interactivity adopted from research within the fields of interactive art and interactive design. The study examines the combination of biometric data and art to explain the phenomenon of humans meeting technology, revealed through data collected from a body and transmitted to an audience during a performance art event. The conclusion revisits the key terms – performance art, biometric data, inhuman interconnections and transcorporeality – as applied to artistic practices, where performance art and biometric data meet.
In a world increasingly dominated by digital interactions, it has become essential to guarantee the authenticity of personal identities. Traditional authentication methods, based on passwords or ...tokens, are proving inadequate in the face of advanced cyber threats. In response, the field of biometric recognition has emerged as a transformative force, offering a new paradigm for identity verification with significant accuracy and convenience. The problems that arise here are the vulnerability and confidentiality of biometric data before, during and after a biometric recognition operation, and the low processing speed during the same operation. The aim of this work is to propose a combination of the concepts of parallel computing and Trusted Execution Environments (TEE) as a solution to the problems raised. Finally, a hardware-assisted technology namely Intel SGX (Software Guard Extensions) is proposed for practical implementations.
In this paper we prompt a re-reading of Assistive Technology (AT) as a media system that organizes disability in the framework of digital health-care and the platform society. Drawing on disability ...media studies and organization studies, we investigate how the arrival of big tech and digital platforms in the field of AT reconfigures ways to account for, classify and potentially discriminate against disability. We argue that this new configuration can be explained as a shift from a biopolitical model – oriented toward disability normalization – to an ethopolitical model, oriented toward optimization and health enhancement. In the conclusions, we put forward the concept of ethopolitical media and discuss the implications of this for wider debates in media and cultural studies which deal with the relationship between media, health, and self-care.
Biometric data can be described as data containing human physical characteristics. They can be in the form of fingerprint data, retina scans, and voice recognition. The application of biometrics for ...immigration purposes reduce the number of terrorism case and illegal migrants in the European Union (EU) territory and the United States. In 2013, biometric data exchange in ASEAN was made possible with the Bali Process Protocol. By a qualitative research methodology, using the CIPP (Context, Input, Process, and Product) analysis, this research attempts to find the legal obstacles as the main barriers in implementing biometric data exchange in the ASEAN region. This study finds that not all ASEAN countries have laws on personal data protection, which affect the Standard Operating Procedures (SOP) related to how the biometric data will be retrieved, processed, and managed, as well as the actions required if there is a violation of the law related to the SOP. This study suggests that ASEAN can accommodate the EU’s framework, by using the General Data Protection Regulation (GDPR) as a single standard in the application of Data Protection regulations for the biometric data exchange system in ASEAN.
The article engages with biometric data gathering technologies as part of migration infrastructures for the monitoring and control of migration. It explores power and agency by paying attention to ...the complexity of readings, interpretations, and storytelling of illegalised migrants in the Moria and Kara Tepe camps, in the Island of Lesvos in Greece, as they received their bureaucratic legal papers and discussed developments in their ‘cases’. Borrowing from feminist and feminist security studies scholarship, the article argues for an understanding of data gathering and sharing infrastructures as material. It suggests that the datafication of migrants’ bodies constitutes a manifestation of power that ‘enacts’ the migrant body as a subject of power but also produces counter self-subjectifications. The article also suggests an understanding of subject agency as the ‘capacity to act’ within contexts of power. Such a position on the agency of illegalised migrants allows us to examine the emergence of solidarities and alliances and to understand and contextualise not only actions that seem to be questioning and rejecting power, but also those that accept it and internalise it as a strategy of survival and of bettering one’s life chances.
•Gilthead sea bream energy content calculated from weight and length.•Structural size is a better predictor of energy content in fish than weight.•Simple but accurate method for calculating energy ...loss and gain from biometric data.•Calculation based on simplified dynamic energy budget (DEB) theory concepts.•Traditional methods underestimate energy gain when fish are fattening up.
Modeling energy content and gain of individuals is of increasing importance in ecosystem modeling, especially in aquaculture and fisheries. Traditional models for estimating the content and gain are either imprecise or expensive, in part because of intensive data requirements. Here we show how routine biometric data (length and wet weight or condition index) can be used to estimate total energy content of fish. Starting with theoretical partitioning between structure and reserves, we create a model to relate energy to the Fulton's condition index. We then use data from cultured sea bream (Sparus aurata L.) to show that the model based on structure should be used to calculate energy content from biometric data. Validation using independent data shows remarkable ability of the model to predict energy content (R2>0.99), while comparison with previously used models demonstrates marked differences in predictions when fish condition is variable. Unlike traditional methods, our model predicts different energy content and gain (or loss) for small fat and large thin fish of equal weight, and can therefore give considerable additional value to biometric data commonly collected in aquaculture, fisheries, and related citizen science programs.