Social Acceptance of Biometric Technologies in Germany: ASurvey

Similar documents
Travel destination Iceland Denmark, United Kingdom, Germany and France

Economic potentials of the refugee immigration in the long run

Biometrics: primed for business use

Why Biometrics? Why Biometrics? Biometric Technologies: Security and Privacy 2/25/2014. Dr. Rigoberto Chinchilla School of Technology

Research Article. ISSN (Print)

Aadhaar Based Voting System Using Android Application

Acceptance of Biometrics: Things That Matter That We Are Ignoring

Local security in Germany

SUMMARY INTRODUCTION. xiii

1/10/12. Introduction. Who are you?? Person Identification. Identification Problems. How are people identified?

CPSC 467b: Cryptography and Computer Security

BIOMETRICS - WHY NOW?

4/2/14. Who are you?? Introduction. Person Identification. How are people identified? People are identified by three basic means:

German Federal Ministry of the Interior 20 August / 6

Obtaining evidence from Germany for use in a US civil or commercial trial

Consumer Attitudes About Biometric Authentication

E- Voting System [2016]

Epicenter Cities and International Education 17th AIEC Melbourne, Victoria Australia

Identity and Diversity: Unity in diversity as an European vision

HOW CAN BORDER MANAGEMENT SOLUTIONS BETTER MEET CITIZENS EXPECTATIONS?

Biometrics Technology for Human Recognition

Introduction-cont Pattern classification

Hong Kong General Chamber of Commerce Roundtable Luncheon 13 April 2016 Collection and Use of Biometric Data

M-Polling with QR-Code Scanning and Verification

The Perception of Biometric Technology: A Survey

CASE STUDY 2 Portuguese Immigration & Border Service

Secure Electronic Voting: Capabilities and Limitations. Dimitris Gritzalis

INTRODUCTION BACKGROUND. Chapter One

M-Vote (Online Voting System)

Game on Germany! Accessing New Markets in Europe

1/12/12. Introduction-cont Pattern classification. Behavioral vs Physical Traits. Announcements

ABC systems in Europe and beyond - status and recommendations for the way forward

The Impact of EU Privacy Legislation on Biometric System Deployment: Protecting citizens but constraining applications

CHAPTER 2 LITERATURE REVIEW

THE ICAO MRTD PROGRAMME MAURICIO SICILIANO ICAO

Smart Voting System using UIDAI

IDEMIA Identity & Security. Providing identity assurance to. secure & simplify lives N.A.

SMART VOTING. Bhuvanapriya.R#1, Rozil banu.s#2, Sivapriya.P#3 Kalaiselvi.V.K.G# /17/$31.00 c 2017 IEEE ABSTRACT:

International Biometrics & Identification Association

IDENTITY AND PASSPORT SERVICE IDENTITY SERVICE PROPOSITION A JOINT VENTURE WITH THE CRIMINAL RECORDS BUREAU REPORT

Police. Report abrigded version

Young Adult Perception and Acceptance of Biometric Technology

FastPass and EasyPASS ABC from science to solution

DESIGN AND ANALYSIS OF SECURED ELECTRONIC VOTING PROTOCOL

Electronic Voting For Ghana, the Way Forward. (A Case Study in Ghana)

LATEST IN BIOMETRIC TECHNOLOGY IN THE SERVICE OF TRAVEL SECURITY. Presented By: Cristian Morosan - University of Houston

CODY SIMPSON CAPTION THAT PHOTO CONTEST OFFICIAL RULES

Biometrics in Border Management Grand Challenges for Security, Identity and Privacy

Biometrics from a legal perspective dr. Ronald Leenes

TERMS & CONDITIONS 1. DEFINITIONS 2. AGREEMENT 3. PLACING AN ORDER 4. PRICING AND PAYMENT

STATES OF AMERICA TENT PUBLIC TRACKER PERCEPTIONS OF THE REFUGEE CRISIS GERMANY YEAR /2017

Novel E-Voting System with Biometric Authentication and Distributed Server System

The United Nations study on fraud and the criminal misuse and falsification of identity

Re-Selecting Members of the European Parliament

This tutorial also provides a glimpse of various security issues related to biometric systems, and the comparison of various biometric systems.

Intro Prefs & Voting Electoral comp. Voter Turnout Agency GIP SIP Rent seeking Partisans. 4. Voter Turnout

Machine Readable Travel Documents: Biometrics Deployment. Barry J. Kefauver

Towards One Person, One Vote via Real-Time Voter s Registration and Identification

ONLINE VOTING PORTAL BASED ON AADHAAR CARD VERIFICATION

Conditions for Processing Banking Transactions via the Corporate Banking Portal and HBCI/FinTS Service

Bali Process Ad Hoc Group Workshop on Biometrics for Identity Integrity in Immigration India April 2012

IMPLEMENTATION OF SECURE PLATFORM FOR E- VOTING SYSTEM

Biometrics & Accessibility

SECURE REMOTE VOTER REGISTRATION

City of Toronto Election Services Internet Voting for Persons with Disabilities Demonstration Script December 2013

Biometrics how to put to use and how not at all?

Structures and concepts for the resettlement of ( high risk -) prisoners in Germany

ABC and Integrated Border management

FAQ Frequently Asked Questions

Biometrics How to Put to Use and How Not at All?

Acceptance of Biometric in the Kingdom of Saudi Arabia by Bushra Mohamed Elamin Elnaim

ICAO: THE TECHNICAL ADVISORY GROUP FOR MACHINE READABLE TRAVEL DOCUMENTS

Estonian National Electoral Committee. E-Voting System. General Overview

Measuring Common Ground

Opportunities and Challenges for Biometric Systems in Travel: a Review

AADHAR BASED ELECTRONIC VOTING SYSTEM USING BIOMETRIC AUTHENTICATION AND IOT

Additional Case study UK electoral system

Blind Signatures in Electronic Voting Systems

ID Checker Guidance Notes. DBS Online Disclosure Guide (ebulkplus)

Biometrics Overview. Introduction. Biometrics is a general term used alternatively to describe a characteristic or a process. As a characteristic:

The Open Biometrics Initiative and World Card

Biometric Technology for DLID

The electronic ID comes to Germany

TECHNICAL ADVISORY GROUP ON MACHINE READABLE TRAVEL DOCUMENTS (TAG-MRTD)

General Framework of Electronic Voting and Implementation thereof at National Elections in Estonia

Biometrics how to put to use and how not at all?

Identity Verification in Passport Issuance

Note: Exports of goods across borders. The top 10 exporting countries in 2014 (excluding re-exports). Source: WTO

THE FEASIBILITY OF HARMONIZATION OF NATIONAL IDENTITY DATA AND VOTER REGISTER: The Technical Challenges, Legal Obstacles and the Opportunities

Assumption of TOBT Responsibility and Usage Agreement HAM CSA

Identity management in Belgium

NASS Resolution Reaffirming Support for the National Electronic Notarization Standards

EVIDENCE OF IDENTIFICATION

Social Cohesion Radar

Carbon Management and Institutional Issues in European Cities. Kristine Kern University of Minnesota

Right-Wing extremism in unified Germany

GI-Edition. Proceedings. Lecture Notes in Informatics. Robert Krimmer, Rüdiger Grimm (Eds.) 3 rd international Conference on Electronic Voting 2008

edriver s Licenses The Convergence of Identity in Society and the future role of the Driver s License.

Secure and Reliable Electronic Voting. Dimitris Gritzalis

STRATEGIES AND USEFULNESS OF ID-e (DNI-e) Benito Fernández Fernández, Head secretary at CNP Identification Department.

Transcription:

Social Acceptance of Biometric Technologies in Germany: ASurvey A. Krupp, C. Rathgeb and C.Busch da/sec Biometrics and Internet Security Research Group, University of Applied Sciences Darmstadt, Germany {christian.rathgeb,christoph.busch}@h-da.de Abstract: Since the past decade biometric technologies are field-proven, facilitating reliable and secure access control. Numerous successful deployments on large-scale systems, e.g. airports, confirm the feasibility of biometric recognition. However, applications of biometric systems involve privacy concerns, i.e. debates on social and ethical acceptance of biometrics reached levels never previously witnessed. In this work a comprehensive questionnaire regarding social acceptance of biometric technologies in Germany is presented. Results are obtained from a total number of 14 respondents, allowing a representative analysis of citizens attitudes towards biometric technologies. Relevant questions are put into view and perceptions of German citizens regarding the rise of biometric technologies are discussed in detail and interesting conclusions are drawn. 1 Introduction Biometric recognition [JRP4] refers to automatic authentication of humans by their physiological or behavioral characteristics or traits. Several biometric characteristics, e.g. fingerprints, iris, or face, have been discovered for robust and reliable recognition and reveal impressive performance in terms of recognition accuracyholding tremendous promise for applying biometric technologies in diverse application scenarios [JFR8]. So far, the vast majority of existing research conducted in biometrics in mainly focused on technical aspects. Without a doubt, biometric technologies are on the rise enforcing an integration of biometrics into daily life, e.g. passports or door-locks, which often leaves citizens with no choice but to accept biometrics. While majorities are convinced of the need for improved authentication controls and biometrics are claimed to provide secure long-time solutions for fundamental problems, public issues arise which citizens need to be heard on, e.g. convenience or transparency. Contemporary attitudes of citizens towards biometric recognition must be considered important, since a wide-spread use of biometrics may cause even more issues. For instance, attacks on biometric systems [RCB1], e.g. spoofing, hacking, reconstructing biometric information from templates, insider attacks, or even theft of body parts may all seem far-fetched now, but theycould become common if the use of biometrics and the value of the information protected by biometrics increases [Pat8]. While research already tackles some issues, e.g. privacy-protecting technologies [RU11, JNN8], others may not be considered a technical or scientific question. In con- 193

trast, issues such as social acceptance can only be taken into account by understanding the people -side of biometrics [CSR4]. The contribution of this work is the investigation of social acceptance of biometric technologies within Germany. Based on a comprehensive questionnaire, which focuses on current issues regarding deployments of biometric technologies, attitudes of 14 citizens of all over Germany are aggregated. Obtained results are interpreted and discussed in detail, whereat interesting conclusions emerge. The remainder of this paper is organized as follows: in Section 2 related studies are briefly summarized. The proposed questionnaire, obtained results and a discussion of these are presented in Section 3. In Section 4conclusions are given. 2 Related Studies As previously mentioned, only a few scientific works regarding biometric recognition focus on social acceptance of users. Furnell et al. [FDMR] proposed a questionnaire on the user-acceptance of biometric technologies which was completed by 175 respondents living in the UK. Interestingly, the survey has shown that, although demonstrably weak, typed passwords remained the most popular form of authentication in the minds of users. In [PW6] a survey is proposed in order to measure perception based on various uses of biometric technology as well as implantable RFID-chips in the human body as an enhanced biometric method. It was found that the 141 respondents in this survey were most willing to employ biometric identifiers into the United States Passport system (almost half of respondents). Conversely, respondents were least willing to employ biometric identifiers into a system to obtain a credit card with results showing nearly two-thirds of respondents unwilling. With respect to the implantable RFID-chips only less than half of respondents are unwilling to implant these. Heckle et al. [HPO7] presented a study, in which 24 participants were asked to role-play the use of afingerprint biometric identification system when making purchases at an online bookstore. The results showed that 21 out of 24 participants found it beneficial to use the fingerprint system. Participants were also asked why they might prefer to use a biometric system when making an online purchase. The most frequent response was that the system would be easier to use than a traditional username and password (6% of responses). Only 35% of the participants said they would prefer to use a biometric system because of an increase in security. The authors found that the participants relayed a sense of confusion when it came to assessing the security strength of biometrics. Interestingly, subjects stated that they would accept biometrics if it was the social norm. Jones et al. [JAE7] investigated the users perceptions of biometrics with respect to various application scenarios, e.g. building access, computer access, or financial transactions. Overall, the use of biometrics did not receive more acceptability compared to conventional authentication mechanisms, e.g. password-based authentication. In contrast, regarding biometrics the majority of the 115 respondents raised concerns about misuse with respect to fraud and tracking. Similar results were obtained in [FE7], in particular, 38% of 9 respondents were far from confident that biometric information will only be used for authentication purposes. In [EAGHR1] 7 volunteers were enrolled 194

Table 1: Distribution of the total number of respondents across different states of Germany. State Respondents State Respondents Baden-Württemberg 18 Niedersachsen 13 Bayern 19 Nordrhein-Westfalen 3 Berlin 4 Rheinland-Pfalz 7 Brandenburg 2 Saarland 1 Bremen Sachsen 6 Hamburg 2 Sachsen-Anhalt 4 Hessen 12 Schleswig-Holstein 13 Mecklenburg-Vorpommern 3 Thüringen 6 in biometric systems based on keystroke dynamics and face recognition. Interestingly, the majority of respondents found that the system based on keystroke dynamics outperformed the face recognition system, i.e. they were more satisfied with the system based on keystroke dynamics, although it actually revealed higher error rates compared to the face recognition system. Furthermore, the authors identified significant correlations between education level and respondents opinions about secret-based solutions against fraud and their concerns about privacy issues. In [BS] the procedure of selecting Passfaces from a grid of faces displayed on the screen is compared to conventional passwords. In this study,which was carried out with 34 student participants in a 3-month field trial, password caused substantial login failure rates compared to the Passface approach, i.e. the latter achieved improved usability. Recently, Mok and Kumar [MK12] investigated privacy related concerns in the deployment of biometrics and data protection technologies in China. In a survey in which 35 subjects participated it was found that the most acceptable biometric characteristics are fingerprint, iris, and face. In addition, it was found that Airports and Banks are the most preferred venues of deploying biometrics technologies. 3 Social Acceptance of Biometric Technologies in Germany In order to give an insight to the social acceptance of biometric technologies in Germany, a comprehensive questionnaire was proposed. In the following subsections the questionnaire, according evaluations are described in detail, obtained results are presented and the most interesting findings are discussed. 3.1 Proposed Questionnaire The survey which consists of 56 question was completed by a total number of 14 respondents, the distribution of respondents across different states of Germany issummarized in Table 1. As can be seen nearly all states are represented which forms an adequate basis for an representative investigation. This national distribution was achieved by publishing 195

6 6 6 Amount of respondents(%) 5 4 3 1 Amount of respondents(%) 5 4 3 1 Amount of respondents(%) 5 4 3 1 <16 16-19 -29 3-39 4-49 5-59 >6 No Sometimes PIN Password No (a) Distribution of respondents across different age groups. (b) Do you find it hard to remember PINs/ passwords? your PIN/ (c) Have you ever forgotten passwword? Figure 1: Age distribution of respondents to the proposed questionnaire and experience of respondents with respect to remembering or forgetting PINs and passwords. 6 8 8 5 4 3 1 PINs/ Passwords Physical Keys Cards 7 6 5 4 3 1 7 6 5 4 3 1 1-3 4-5 6-7 >7 No No (a) Howmany PINs/ passwords, physical keys, or cards do you possess? (b) Do you frequently re-use (c) Do you frequently PINs/ passwords? change PINs/ passwwords? Figure 2: Amount of PINs, passwords, physical keys, or cards respondents possess and the common behavior of re-using or changing PINs and passwords. the survey via diverse Internet platforms, e.g. Facebook 1 and Twitter 2. The distribution of participants across different age-groups is depicted in Fig. 1(a), i.e. the vast majority of respondents is between and 29 years old. The entire group consisted of 9 males and 5 females and the majority of respondents were either students or employees. In this work only the most important and most interesting results will be presented. 3.2 Obtained Results Within initial questions emphasis was put on the convenience of knowledge-based authentication mechanism, in particular PINs and passwords. As shown in Fig. 1(b) the majority of respondents finds it hard to remember PINs or passwords. As aconsequence, see Fig. 1 (c), people tend to forget PINs and passwords, interestingly, passwords are forgotten more often than PINs. Fig. 2(a) illustrates the amount of PINs or passwords, physical keys, 1 http://www.facebook.com/ 2 http://www.twitter.com/ 196

1 8 6 4 Know Fingerpint Face Iris Accept On. Signature Speaker/Voice None 8 7 6 5 4 3 1 No Personal Intimate Frightening (a) Biometric recognition based on which characteristics do you know/ accept? (b) Do you consider biometric recognition as too personal/ intimate or frightening? Figure 3: Knowledge and acceptance of biometric recognition based on different characteristics and the attitude of respondents with respect to personal privacy. and chip cards German citizens have to maintain on average. While most respondents posses only 4-5 physical keys, the majority of participants has to remember more than 7 passwords. Based on the fact that most respondents find it hard to remember PINs and passwords these are re-used at various application scenarios while the majority does not frequently change their PINs or passwords, as shown in Fig. 2(b)-(c). Based on these results, knowledge-based authentication systems requiring PINs or passwords appear inconvenient. Focusing on biometrics, which may represent a suitable solution to these issues, the most well-known biometric characteristics are fingerprints, iris, face and speaker/ voice recognition, see Fig. 3(a). In addition, the acceptability of biometric characteristics is depicted in Fig. 3(a). Obviously, the highest acceptability is gained for fingerprint recognition which is also the most well-known technology, which coincides with the findings in [HPO7], where participants state that a more common use of technology brings about more social acceptance. In contrast, while the majority of respondents is familiar with face and speaker/ voice, recognition based on these characteristics is only accepted by a few. The majority of respondents answered in the negative when they were asked whether they consider biometric recognition as too personal, intimate or even frightening, as illustrated in Fig. 3(b). While biometrics are deployed at a great variety of applications still only 45% of respondents have already registered with at least one biometric system, see Fig. 4(a) (in most cases fingerprint recognition systems). While only a slight majority believes that biometric systems facilitate everyday lives 75% are convinced that biometric access control systems are necessary at distinct venues, as illustrated in Fig. 4(a). The effects of aging on biometric recognition [Lan1] has been investigated in past years and numerous biometric characteristics, e.g. fingerprints [HGL + 11, DAB4] and iris [FB12], were found to be highly influenced by aging. When asking participants what they consider an adequate time lapse after which a re-registration with the biometric system is required, rather short time lapses of 3or6months are acceptable for only afew respondents, as shown in Fig 4(b), again, convenience plays an important role. 197

8 3 7 6 5 4 3 1 No 25 15 1 5 Registered Facilitate Neccessary 3Mos 6Mos 1Yr 2Yrs 3Yrs Never (a) Have you used biometrics? Do biometrics facilitate daily life/ are theynecessary? (b) What do you consider as an adequate time lapse after which re-registration is required? Figure 4: Amount of respondents which have already used biometric systems, the common attitude with respect to daily life, and time-lapses considered adequate for re-registration. 6 6 6 5 4 3 1 5 4 3 1 5 4 3 1 Positive Negative Neutral Knowl. Biom. Neutral Knowl. Biom. Neutral (a) How doyou face the future (b) Do you consider biometrics (c) Which type of authentication development of biometric technologiestion more tamper-proof? or knowledge-based authentica- do you think provides more advantages? Figure 5: Future perspectives of respondents regarding biometric technologies and the comparison between knowledge-based authentication and biometric systems. While 25% of respondents are not concerned about the future of biometric technologies a majority of 45% face a positive future for the development of biometric systems, see Fig. 5(a). Compared to knowledge-based authentication schemes most respondents believe that biometrics are more tamper-proof while improved security may not be considered as amajor advantage as shown in Fig. 5(b)-(c). 3.3 Discussion Users seem to be annoyed by maintaining several PINs and passwords, i.e. biometrics, which can not be lost or forgotten, bring about substantial benefits with respect to usability. However, while citizens are familiar with most biometric characteristics, in general the acceptance of biometrics appears quite disillusioning. For instance, while 25% (!) of respondents did not accept biometric recognition at all, only one third or less of the 198

respondents which are familiar with face and speaker/ voice recognition accept these technologies. These results may be influenced by negative recent press releases, e.g. regarding Facebook sface recognition software. Generally speaking, based on the obtained results deployments of biometric systems need not face refusal due to physical invasion of privacy or even fear. While less than half of the participants have experience with biometric systems these are not considered as more convenient than, for instance, knowledge-based approaches. This implies biometric systems require improvements with respect to usability (which is also related to biometric performance rates). Usability is influenced by aging effects as well, while most participants accept only long time lapses ( 1 year) between re-enrollments. Overall, attitudes towards future developments of biometric technologies are positive while at the time citizens do not discover major advantages of biometrics over knowledge-based authentication mechanisms, despite improved security. Obtained results confirm that general awareness regarding biometric technologies requires major improvement in Germany, which may also improve the social acceptance of biometrics which appears still unsatisfying. 4 Conclusion In this paper results obtained from a survey on the social acceptance of biometric technologies, which wascompleted by 14 German citizens, are presented. Results of the comprehensive questionnaire, which was completed by people of almost all states of Germany, reflect the current general attitudes towards different biometrics-related topics within Germany, providing interesting insights. Nevertheless, the evaluation of the presented survey appears rather disillusioning confirming the fact that general awareness of biometric recognition technologies needs to be improved. Acknowledgment This work has been partially supported by the the Center for Advanced Security Research Darmstadt (CASED), Germany. References [BS] [CSR4] S. Brostoff and M. A. Sasse. Are Passfaces More Usable Than Passwords? A Field Trial Investigation. In Proceedings of HCI People and Computers XIV -Usability or Else!, pages 45 424,. A. Chau, G. Stephens, and Jamieson R. Biometrics Acceptance - Perceptions of Use of Biometrics. In Proc. of the Australasian Conf. on Information Systems (ACIS 4), 199

[DAB4] pages 1 6, 4. H. Daum, M. Arnold, and C. Busch. Findings from the Projects BioFace and BioFinger. InProc. Int l Conf. ofthe Biometrics Special Interest Group (BIOSIG 4),4. [EAGHR1] M. El-Abed, R. Giot, B. Hemery, and C. Rosenberger. A study of users acceptance and satisfaction of biometric systems. In IEEE Int l Carnahan Conference on Security Technology (ICCST 1), pages 17 178, 1. [FB12] S. P. Fenker and K. W. Bowyer. Analysis of Template Ageing in Iris Biometrics. In Proc. of the IEEE Computer Society and IEEE Biometrics Council Workshop on Biometrics (CVPRW 12), pages 45 51, 12. [FDMR] [FE7] [HGL + 11] [HPO7] [JAE7] [JFR8] [JNN8] [JRP4] [Lan1] S. M. Furnell, P. S. Dowland, Illingworth H. M., and P. L. Reynolds. Authentication and Supervision: ASurvey of User Attitudes. Computers &Security,19(3):529 539,. S. Furnell and K. Evangelatos. Public awareness and perceptions of biometrics. Computer Fraud &Security, 7(1):8 13, 7. T. Hotz, C. Gottschlich, R. Lorenz, S. Bernhardt, M. Hantschel, and A. Munk. Statistical analyses of fingerprint growth. In Proc. of Int l Conf. of the Biometrics Special Interest Group (BIOSIG 11), pages 11 19, 11. R. R. Heckle, A. S. Patrick, and A. Ozok. Perception and acceptance of fingerprint biometric technology. InProc. of the 3rd Symposium on Usable Privacy and Security (SOUPS 7), pages 153 154, 7. L. A. Jones, A. I. Antón, and J. B. Earp. Towards Understanding User Perceptions of Authentication Technologies. In Proc. of the 7 ACM workshop on Privacy in electronic society (WPES 7), pages 91 98, 7. A. K. Jain, P. Flynn, and A. A. Ross. Handbook of Biometrics. Springer,8. Anil K. Jain, Karthik Nandakumar, and Abhishek Nagar. Biometric template security. EURASIP J. Adv. Signal Process, 8:1 17, 8. Anil K. Jain, Arun Ross, and Salil Prabhakar. An introduction to biometric recognition. IEEE Trans. on Circuits and Systems for Video Technology,14:4, 4. A. Lanitis. A survey of the effects of ageing on biometric identity verification. Int. Journal of Biometrics, 2(1):34 52, 1. [MK12] S. Y. Mok and Ajay Kumar. Addressing biometrics security and privacy related challenges in China. In Proc. Int l Conf. of the Biometrics Special Interest Group (BIOSIG 12), pages 1 8, 12. [Pat8] [PW6] A. S. Patrick. Acceptance of Biometrics: Things That Matter That We Are Ignoring. In Presentation to the International Workshop on Usability and Biometrics,8. C. Perakslis and R. Wolk. Social acceptance of RFID as abiometric security method. IEEE Technology and Society Magazine, 25(3):34 42, 6. [RCB1] N.K. Ratha, J.H. Connell, and R.M. Bolle. Enhancing security and privacy in biometrics-based authentication systems. IBM Systems Journal,4(3):614 634, 1. [RU11] C. Rathgeb and A. Uhl. A Survey on Biometric Cryptosystems and Cancelable Biometrics. EURASIP Journal on Information Security,11(3), 11.