{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,10,30]],"date-time":"2023-10-30T13:34:06Z","timestamp":1698672846104},"reference-count":55,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2016,7,1]],"date-time":"2016-07-01T00:00:00Z","timestamp":1467331200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Consumer Electron. Mag."],"published-print":{"date-parts":[[2016,7]]},"DOI":"10.1109\/mce.2016.2556901","type":"journal-article","created":{"date-parts":[[2016,8,10]],"date-time":"2016-08-10T20:08:15Z","timestamp":1470859695000},"page":"95-102","source":"Crossref","is-referenced-by-count":4,"title":["The Implications of Iris-Recognition Technologies: Will our eyes be our keys?"],"prefix":"10.1109","volume":"5","author":[{"given":"Anas","family":"Aloudat","sequence":"first","affiliation":[]},{"given":"Katina","family":"Michael","sequence":"additional","affiliation":[]},{"given":"Roba","family":"Abbas","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2007.4379178"},{"key":"ref38","author":"garfinkel","year":"2000","journal-title":"Database Nation The death of privacy in the 21st century"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"287","DOI":"10.24908\/ss.v11i3.4496","article-title":"Subverting ID from above and below: The uncertain shaping of India's new instrument of e-governance","volume":"11","author":"rao","year":"2013","journal-title":"Surveillance and Society"},{"key":"ref32","article-title":"Safe kids, safe schools: Evaluating the use of iris recognition technology in New Egypt, New Jersey","author":"uchida","year":"2004","journal-title":"Final Report Submitted to the National Institute of Justice"},{"key":"ref31","year":"2015","journal-title":"Biometric cash assistance Leveraging biometric technology to ensure cash assistance reaches the refugees who need it the most"},{"key":"ref30","author":"dunmore","year":"2015","journal-title":"Iris scan system provides cash lifeline to Syrian refugees in Jordan"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2012.6199829"},{"key":"ref36","author":"staton","year":"2015","journal-title":"Life is so miserable for Syrian refugees that thousands are returning home to a war zone"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2011.07.019"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TITB.2012.2222655"},{"key":"ref28","author":"stier","year":"2011","journal-title":"IrisGuard makes inroads from Mideast banks to U S prisons Bloomberg"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.5120\/729-1022"},{"key":"ref29","year":"2016","journal-title":"Profile of Cairo Amman Bank"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/6294.899930"},{"key":"ref1","first-page":"53","article-title":"Biometrics: An overview of the technology, challenges and control considerations","volume":"4","author":"down","year":"2004","journal-title":"Inform Syst Control J"},{"key":"ref20","year":"0","journal-title":"EyeSecure solution Just blink!"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/62.575997"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1023\/B:ETIN.0000006918.22060.1f"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/5.628669"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2006.884092"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"819","DOI":"10.1007\/978-0-387-73003-5_24","article-title":"Iris recognition at airports and border-crossings","author":"daugman","year":"2009","journal-title":"Encyclopedia of Biometrics"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"1463","DOI":"10.1109\/JPROC.1997.628716","article-title":"Prolog to evaluation of automated biometrics-based identification and verification systems","volume":"85","author":"shen","year":"0","journal-title":"Proc IEEE"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.12.018"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2009.11.008"},{"key":"ref55","author":"cavoukian","year":"2012","journal-title":"Privacy by Design in the Age of Big Data"},{"key":"ref54","first-page":"239","article-title":"Big data for all: Privacy and user control in the age of analytics","volume":"11","author":"tene","year":"2013","journal-title":"Northwest J of Technol Intellect Prop"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2013.196"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-009-9697-0"},{"key":"ref10","first-page":"3","article-title":"How authentication technologies work","author":"smith","year":"2002","journal-title":"Biometrics"},{"key":"ref11","author":"andress","year":"2014","journal-title":"The Basics of Information Security"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2011.6107909"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/2.820043"},{"key":"ref13","first-page":"25","article-title":"How biometrics work","author":"raina","year":"2002","journal-title":"Biometrics"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1109\/MC.2010.44","article-title":"Iris recognition: The path forward","volume":"43","author":"arun","year":"2010","journal-title":"Computer"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/2.820042"},{"key":"ref16","first-page":"184","article-title":"A survey of biometric recognition methods","author":"delac","year":"0","journal-title":"Proc 46th Int Symp Electronics in Marine Elmar"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"889","DOI":"10.21917\/ijsc.2015.0125","article-title":"Iris recognition based on kernels of support vector machine","volume":"5","author":"saminathan","year":"2015","journal-title":"ICTACT J Soft Computing"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1108\/09685220810908813"},{"key":"ref19","first-page":"7983","article-title":"Technical issues and challenges of biometric applications as access control tools of information security","volume":"8","author":"ahmad","year":"2012","journal-title":"Int J Innovative Comp Inform Control"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4899-7488-4_296"},{"key":"ref3","first-page":"141","article-title":"Encryption and biometrics: Context, methodologies and perspectives of biological data","volume":"3","author":"havenetidis","year":"2013","journal-title":"Journal of Applied Mathematics & Bioinformatics"},{"key":"ref6","article-title":"Human identification using dental biometrics","volume":"1","author":"jeyanthi","year":"2013","journal-title":"International Journal of Advanced Engineering and Global Technology"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/549134"},{"key":"ref8","first-page":"2235","article-title":"A tongue-print image database for recognition","author":"zhi","year":"0","journal-title":"Proc Int Conf Machine Learning and Cybernetics"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-8519.2008.00700.x"},{"key":"ref49","first-page":"21","article-title":"The application of location based services in national emergency warning systems: SMS, cell broadcast services and beyond","author":"aloudat","year":"2010","journal-title":"National Security Science and Innovation"},{"key":"ref9","author":"bolle","year":"2003","journal-title":"Guide to Biometrics"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ISTAS.2011.7160597"},{"key":"ref45","article-title":"The emerging ethics of humancentric GPS tracking and monitoring","author":"michael","year":"0"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2013.03.004"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/MTS.2012.2196340"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.biopsycho.2007.01.007"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1080\/14675986.2012.699372"},{"key":"ref44","author":"haag","year":"2013","journal-title":"Management Information Systems for the Information Age"},{"key":"ref43","first-page":"1","article-title":"Integration of biometrics with cryptographic techniques for secure authentication of networked data access","author":"makori","year":"2009","journal-title":"Strengthening the Role of ICT in Development"}],"container-title":["IEEE Consumer Electronics Magazine"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/5962380\/7539234\/07539239.pdf?arnumber=7539239","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:02:59Z","timestamp":1642003379000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7539239\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,7]]},"references-count":55,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/mce.2016.2556901","relation":{},"ISSN":["2162-2248","2162-2256"],"issn-type":[{"value":"2162-2248","type":"print"},{"value":"2162-2256","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,7]]}}}