Privacy Enhancing Technologies: Third International Workshop, PET 2003, Revised Papers

  • Alexander J
  • Smith J
  • Smith J
N/ACitations
Citations of this article
1Readers
Mendeley users who have this article in their library.

Abstract

The objective of DARPA's Human ID at a Distance (HID) program "is to develop automated biometric identification technologies to detect, recognize and identify humans at great distances." While nominally intended for security applications, if deployed widely, such technologies could become an enormous privacy threat, making practical the automatic surveillance of individuals on a grand scale. Face recognition, as the HID technology most rapidly approaching maturity, deserves immediate research attention in order to understand its strengths and limitations, with an objective of reliably foiling it when it is used inappropriately. This paper is a status report for a research program designed to achieve this objective within a larger goal of similarly defeating all HID technologies. Abstract. The objective of DARPA's Human ID at a Distance (HID) program "is to develop automated biometric identification technologies to detect, recognize and identify humans at great distances." While nominally intended for security applications, if deployed widely, such technologies could become an enormous privacy threat, making practical the automatic surveillance of individuals on a grand scale. Face recognition, as the HID technology most rapidly approaching maturity, deserves immediate research attention in order to understand its strengths and limitations , with an objective of reliably foiling it when it is used inappropriately. This paper is a status report for a research program designed to achieve this objective within a larger goal of similarly defeating all HID technologies.

Cite

CITATION STYLE

APA

Alexander, J., Smith, J. M., & Smith, J. (2003). Privacy Enhancing Technologies: Third International Workshop, PET 2003, Revised Papers. Lecture Notes in Computer Science, 2760, 88–106. Retrieved from http://repository.upenn.edu/cis_papersPublisherURL:http://dx.doi.org/10.1007/b94512PublisherURL:http://dx.doi.org/10.1007/b94512ThisconferencepaperisavailableatScholarlyCommons:http://repository.upenn.edu/cis_papers/170

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free