ABSTRACT

CONTENTS 5.1 Widespread Social Media Adoption 148

5.1.1 Widespread Use of Social Media and Networking 149 5.1.2 Social Media Landscape and Demand 150

5.2 Social Media and Biometric Identity 154 5.2.1 Fundamental Biometric Concepts 155 5.2.2 Social Media and Biometric Data 156 5.2.3 Biometric Processes Performance Metrics 157

5.3 Biometric Technologies Applicable to Social Media 160 5.3.1 Conceptual Architecture of Social Media Platform 160 5.3.2 Fingerprint Recognition 161 5.3.3 Traditional Face Recognition 163

5.3.3.1 Classic Face Recognition Techniques 164 5.3.3.2 Current Face Recognition Challenges 168

5.3.4 Face Recognition in the Wild 170 5.3.5 Iris Recognition for Social Media Authentication 174

5.3.5.1 Iris Recognition Basics 175 5.3.5.2 Outlook with Iris Scanning in Smartphones 177

5.3.6 Speaker Recognition 178 5.3.7 Behavioral Biometrics in Social Media 180

5.3.7.1 Keystroke Dynamics for Authentication 180 5.3.7.2 Mouse Dynamics for Authentication 181 5.3.7.3 Signature Recognition 183

5.1 WIDESPREAD SOCIAL MEDIA ADOPTION e use of the Internet and social media has become pervasive in all aspects of our global society. Social media is a new frontier applicable to virtually all walks of life. Its use and operation is relevant globally to individuals, technology providers, governments, criminals, terrorists, and professionals such as social scientists, scientic researchers, salespersons, publishers, and entertainers. We are embracing an exciting new era of the unknown. Personal identication and identity verication have become that much more important because we human beings have lost a fundamental element of social activity through physical interaction. Much of what we do is now virtual via remote electronic interaction. As users of the Internet and social media, we want secure and reliable identity techniques that ensure privacy, secure nancial transactions, and authenticate social media users. Biometric identication technologies have their roots in law enforcement applications. However, with the increasing need to ght global terrorism and the availability of more powerful and lower cost computing platforms and new sensor technologies, biometrics have become more reliable and commoditized. Biometric identication technologies oer the ability to reliably verify or determine the identity of individuals both in person and online. is chapter will focus on the application of biometrics for the purposes of identity authentication and data mining. Specically, this chapter will discuss that biometric technologies can facilitate data mining in various web and social media applications (e.g., business/marketing and law enforcement/intelligence); how biometric technologies incorporated into social media applications can enhance the utility of the applications (e.g., face recognition that can be used to help search for a desired photo in a photo library); and how biometric technologies can be applied to assure user identity (security).