<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Private Digital Identity on Blockchain</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Tom Hamer</string-name>
          <email>tomhamer@live.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Kerry Taylor</string-name>
          <email>kerry.taylor@anu.edu.au</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Kee Siong Ng</string-name>
          <email>keesiong.ng@anu.edu.au</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Alwen Tiu</string-name>
          <email>alwen.tiu@anu.edu.au</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>College of Engineering and Computer Science, The Australian National University</institution>
          ,
          <addr-line>Canberra ACT 0200</addr-line>
          ,
          <country country="AU">Australia</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>For many identi cation systems, including those in government, nance and healthcare, it is critical that at most one identity exists for each human individual within a given system. Many existing approaches identify individuals through an exchange of veri able documents attesting to basic identi cation information. However, the same basic information is collected for identi cation in almost every system, meaning that persons are linkable across di erent identity systems and are not in control of how their identity is used. We propose Unique SelfSovereign Identity, (USI), combining Cancelable Biometrics [6] and W3C Veri able Claims [8] to achieve privacy preserving and non-linkable identi cation, with guarantees against double enrolment with any system. Because our protocol is based on biometrics, it permits individuals to enrol without o cial identi cation documents. Our protocol can be used in a wide range of situations, o ering data security for large organisations, access to basic services for over one billion people who lack o cial identifying documents, and personal identity control for all individuals.</p>
      </abstract>
      <kwd-group>
        <kwd>Veri able Claims</kwd>
        <kwd>Homomorphic Signature</kwd>
        <kwd>Blockchain</kwd>
        <kwd>Cancelable Biometrics</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>1.1</p>
    </sec>
    <sec id="sec-2">
      <title>Introduction</title>
      <sec id="sec-2-1">
        <title>Motivation</title>
        <p>
          One fundamental aspect of many human identi cation systems is that for each
individual, no more than one identity exists [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ]. This is often due to an unfair
advantage that can be gained by a malicious individual having two identities,
for example, they may be able to fraudulently access additional credit at a bank
[
          <xref ref-type="bibr" rid="ref2">2</xref>
          ]. However, preventing malicious double enrolment is di cult. Many
existing approaches uniquely identify individuals through an exchange of veri able
documents and basic identi cation information [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ]. However, these traditional
identi cation methods have a number of fundamental drawbacks:
1. Through organisations storing basic identity attributes such as name,
birthdate and address, individuals can be linked across multiple independent
uses of their identity, without consent.
        </p>
        <p>2. When organisations requiring identity veri cation store a large amount
of information about each individual for identi cation purposes, it makes the
Copyright c 2019 for this paper by its authors. Use permitted under Creative</p>
        <p>Commons License Attribution 4.0 International (CC BY 4.0).
system vulnerable to attacks, as it is easy for a hacker who obtains access to the
internal records to learn many details about each individual. Worse still, basic
attributes such as address cannot easily be cancelled or changed and so a fresh
identity is very hard to establish.</p>
        <p>
          3. Over 1 billion individuals worldwide lack a form of o cially recognised
identity such as a passport [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ], which makes it very di cult to enrol with service
providers{such as banks, which need to uniquely identify individuals.
        </p>
        <p>We propose a decentralised, privacy-preserving identity system which can
identify individuals through a bijective mapping from individuals to identi ers
used in a speci c organisational context. It is designed to give individuals
control over their own identity and shared information but to give organisations a
guarantee of uniqueness. To our knowledge, such a privacy preserving biometric
identi cation system does not exist in the literature.
1.2</p>
      </sec>
      <sec id="sec-2-2">
        <title>Related Work</title>
        <p>
          Biometrics are a useful tool in identi cation of individuals because biometric
signatures, such as ngerprints, are unique to each human [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ]. Further, they do
not depend on an individual needing to hold o cial identity documents.
Cancelable biometrics have been created as a method to protect biometric signatures;
rather than storing the full biometric in identi cation databases, biometrics are
non-invertibly transformed to obfuscate the original biometric signature [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ], and
only the obfuscated version is stored. However, one problem with current
cancelable biometric protocols is that the individual must trust the organisation
receiving their biometric signature to correctly transform and securely manage
the biometric signatures.
        </p>
        <p>
          Homomorphic signatures allow a veri er to prove that a calculation has been
done correctly without having to access the underlying data [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ]. We propose
utilising homomorphic signatures as a proof mechanism to allow the
individual to obfuscate their own biometric signature on their personal device through
applying a speci c non-invertable transformation that is requested by the
organisation wanting to identify the individual. The authors are unaware of previous
research proposing the use of homomorphic signatures to prove the validity of
cancelable biometrics. For the rst time, we propose that the combination of
these techniques enables self-sovereign identity.
        </p>
        <p>
          The W3C, an international standards organization, has introduced Distributed
Identi ers (DIDs) and Veri able Claims. DIDs are linked to DID documents,
which store mechanisms used to authenticate the DID, service endpoints, and
other claims [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ]. Using DIDs, the W3C aims to create a standard for individuals
and organizations to control their own identity. W3C Veri able Claims are a
mechanism to express credentials on the Web in way that is cryptographically
secure, privacy respecting, and machine-veri able [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ]. The Sovrin foundation has
used DID and Veri able claims to create a Blockchain based Identity System [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ],
which enables distributed management of public keys and revocation of veri
able claims. Similarly, we propose to facilitate transfer of obfuscated biometrics
using Blockchain-based veri able claims.
        </p>
        <p>
          Self-sovereign identity can be de ned as \the concept of individuals or
organizations having sole ownership of their digital and analogue identities, and
control over how their personal data is shared and used" [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ]. A number of
organisations including The Sovrin Foundation [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ], Civic Ledger [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ] and uPort
[
          <xref ref-type="bibr" rid="ref14">14</xref>
          ] have recently launched of self-sovereign identity protocols. The Sovrin
Foundation has been involved in the development of ID2020 which aims to create an
open and human-centric approach to identity [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ]. They suggest bene ts
including no physical papers and the convenience of biometric authentication. Other
attempts, such as Civic ledger's solution, depend on the individual holding
ofcial identity documents such as passports to enrol with their system, which is
problematic for displaced persons and others.
        </p>
        <p>No self-sovereign identity schemes are currently available which o er
nonlinkability of individually-controlled identities. Where existing protocols o er
the capacity to use biometric signatures, they do not allow individuals to
noninvertably transform their biometric signature before it is sent, and therefore do
not protect the privacy of personal biometrics.</p>
        <p>We propose the concept of Unique Self-Sovereign Identity, or USI. USI means
that an individual can have at most one identity in a particular context, but
identities cannot be linked between contexts without permission from the individual.
Therefore, individuals can be uniquely identi ed but still have control over their
personal identifying data.
2
2.1</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Solution Sketch</title>
      <sec id="sec-3-1">
        <title>Our USI protocol</title>
        <p>We de ne three key roles:
Individual: a human who wants to be identi ed by a Service Provider.
Service Provider: an organisation requiring its individual users to complete
identity veri cation for access to services. The service provider commits to
requiring a speci c variety of biometric for all of its users.</p>
        <p>Trusted Organisation: an organisation within the trust network of both a
service provider and an individual. Service providers trust these organisations
to ensure that the biometric signatures are accurate and individuals trust these
organisations to destroy their biometric signature immediately after use. Trusted
organisations maintain public keys for each variety of biometric signature they
sign, meaning that service providers are able to verify that the biometric
signature is of the variety they require.</p>
        <p>
          In our protocol, each individual is identi ed for each service provider by a
cancelable (non-invertibly transformed) version of their biometric signature. To
achieve this non-invertibility, we use a Partial Discrete Fourier Transform for
non-linkable biometrics [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ]. We extend existing cancelable biometric schemes
so that the service provider never has access to the complete biometric
signature of each individual. To enable this, we use fully homomorphic signatures [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ]
to prove the validity and correctness of a biometric signature which is already
non-invertibly transformed by the individual before it is sent. Finally, the
solution uses a Blockchain W3C standard Veri able claims system [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ], where our
homomorphic signature acts as the proof mechanism, meaning that individual
biometric signatures can be revoked when needed, and requiring that the
public key of the Trusted Organisation is publicly available. Our protocol does not
address authentication, that can employ conventional means such as username
and password. Our protocol is as follows (see gure 1).
        </p>
        <p>1. The individual enrols for an identity with a trusted organisation C of
their choice (see Algorithm 1). C collects nger print and vein scans, ensuring
that the biometrics are collected accurately and are truly the biometrics of the
individual. The assurance process will be determined by C's own policy, but
will probably include human supervision. The individual stores the biometrics
together with a corresponding signature which is provided by C. C must not
store the biometrics{and is trusted not to by the individual. C has its
public key available on the Blockchain Veri able Claims system. C adds required
randomly generated public parameters for homomorphic signature veri cation
to the ledger, and adds the signature for the biometric to a public revocation
register, attesting to the validity of the biometric.</p>
        <p>
          2. The individual wants to enrol with a service provider Bi and Bi requires
proof that they have not enrolled previously with Bi. To check, Bi requests an
P-DFT transform [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ] with the trusted organisation's speci c parameters, from
the individual. These parameters are derived using the public key of Bi and
are therefore not used by any other organisation requiring identity veri cation.
The individual computes the result of the transformation and sends it to Bi,
with a fully homomorphic signature under that P-DFT, along with the name of
trusted organisation C for lookup in the Blockchain Veri able Claims Public Key
register. Verifying that the calculation was done correctly does not require the
individual to send the initial signature from C or the individual's raw biometric.
        </p>
        <p>3. Service provider Bi looks up trusted organisation C's public key on-chain
and veri es the homomorphic signature against the transformed biometrics sent
by the individual, the public parameters, and the public key of C (see Algorithm
2). If it holds as valid, and the proof of non-revocation holds, then Bi checks all
current biometric vectors in its database for any vectors within a thresholded
similarity of the provided biometric. If it nds no matches, then Bi has veri ed
that the individual has not previously enrolled.</p>
        <p>
          Algorithm 1 Trusted Organisation Creates Veri able Claim for Individual to
Store
1: procedure VCgen(pk,device)
2: bV ec retrieve(device) //retrieve processed biometric vector for individual
from trusted organisation's external device
3: l length of bVec
4: V randomly generate l public parameters
5: x Signsk(bVec)//trusted organisation homomorphically signs the biometric
vector using its secret key
6: writeToChain(V) //write the public parameters V onto the Blockchain
7: claim generate a veri able claim from trusted organisation's metadata [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ]
8: claim:proof generate a proof property from signature x
9: addToNonRevocationRegister(claim) //add the claim to a public
nonrevocation register
10: cleanup() //critically, trusted organisation must delete bVec, the user's raw
biometric vector
11: return claim
2.2
        </p>
      </sec>
      <sec id="sec-3-2">
        <title>Features of our USI System</title>
        <p>
          Self-sovereignty: The identity holder has complete control over storage and
use of their identity. This is provided through the use of veri able claims, and
the homomorphic proof mechanism, which allows individuals to reliably store
their own biometric signature [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ],[
          <xref ref-type="bibr" rid="ref7">7</xref>
          ].
        </p>
        <p>
          Privacy and Non-linkability: The veri er, who receives a non-invertibly
transformed version of the biometric is unable to reverse the transformation and
discover the individual's actual biometric signature. Provided that the
transformations have di erent parameters, cross matching of biometrics is impossible.
These privacy and non-linkability features are provided by de nition through
cancelable biometrics [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ]. Further work is required on the non-linkability of the
proof mechanism as it is in some cases possible for proofs to be linked via the
Algorithm 2 Service Provider Enrols Individual
6:
7:
8:
9:
10:
11:
1: procedure AddNewUser(pi, biometricVariety, similarityThreshold ) //pi is
unique to each service provider
2: claimP res request veri able claim for P-DFT biometric transform from user
with parameters pi
3: sig claimP res:proof:proof V alue // extract the transformed biometric from
the claim presentation [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ]
4: transbV ec claimP res:credentialSubject:transf ormedBiometric // extract
the proof from the veri able claim presentation [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ]
5: V; pk retrieve(biometricVariety) //get public parameters V and trusted
organisation's public key for the biometric typepk from Blockchain
if not validpk(V; sig; transbV ec) or isRevoked(claimPres) then
//if the homomorphic signature does not hold, or the claim has been revoked
return false
for transformedBiometric in database do
if transbV ec:isSimilar, similarityThreshold(transf ormedBiometric) then
return false //if a similar biometric exists already then reject.
addNewUserToDb(transbVec) //save transformed biometric
return true //success
public parameters. This issue may be recti ed either through Gorbunov's
multidata signing scheme [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ] or by having the trusted organisation issue a number of
public parameters to each individual, and each one could be used to establish
an unlinkable identity.
        </p>
        <p>
          Unique Identi cation: An individual can create as many signed biometrics
or identities as they like and enrol with any trusted organisation. The
transformation will always map them back to the same identi er, with an error rate
that is dependant on the quality of the matching algorithm and the number of
individuals in the system. This is irrespective of the trusted organisation and is
a result of biometric classi cation algorithms. The error rate arises from the
imprecise nature of biometric feature extraction. Note that each Service Provider
must require the same variety of biometric from all of their clients, or unique
identi cation is impossible. [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ].
        </p>
        <p>
          Decentralisation: The trusted organisations do not have to communicate or be
in consensus for the Unique Identi cation property to hold. This is enabled
through Blockchain technology, which allows public keys and parameters to be
stored without a central authority [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ].
        </p>
        <p>Biometrically Derived: Biometrics are used, meaning that the system does
not depend on individuals holding previous identity documents in order to enrol.
3</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Conclusion</title>
      <p>
        We describe a USI identity system which is capable of addressing number of
signi cant current challenges in identity management. A key area for further work
is improving the performance of biometric identi cation. The error rate could
prove to be an obstacle due to the compounding of errors in biometric identi
cation systems [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ]. The need to trust the trusted organisation's management of
biometric data is a potential drawback of our protocol that could be addressed
by legal or social mechanisms. Personal enrolment with the trusted organisation
potentially exposes information about identity that could be exploited. However,
we believe that this system could be feasible for distributed and privacy
preserving identi cation at large scale. Future work includes a reference implementation
and security analysis.
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1. UNHCR.:
          <article-title>UNHCR Resettlement Handbook</article-title>
          .
          <article-title>UNHCR - the UN Refugee Agency</article-title>
          ,
          <string-name>
            <surname>Geneva</surname>
          </string-name>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Saunders</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zucker</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Counteracting Identity Fraud in the Information Age: The Identity Theft and Assumption Deterrence Act</article-title>
          . In: International Review of Law,
          <source>Computers &amp; Technology</source>
          <year>1999</year>
          ,
          <volume>2</volume>
          , pp
          <volume>183</volume>
          {
          <fpage>192</fpage>
          .
          <string-name>
            <surname>Routledge</surname>
          </string-name>
          (
          <year>1999</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Moyano</surname>
            ,
            <given-names>J. P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ross</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          :
          <article-title>KYC Optimization Using Distributed Ledger Technology</article-title>
          .
          <source>Business &amp; Information Systems Engineering</source>
          ,
          <volume>59</volume>
          (
          <issue>6</issue>
          ), pp
          <fpage>411</fpage>
          -
          <lpage>423</lpage>
          . (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Kour</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          &amp;
          <string-name>
            <surname>Saabne</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          :
          <article-title>Global Identi cation Challenge by the Numbers</article-title>
          . http://id4d.worldbank.org/global-dataset
          <source>/visualization. Accessed 30 July</source>
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Punithavathi</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Subbiah</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <year>2017</year>
          .
          <string-name>
            <given-names>Can</given-names>
            <surname>Cancelable Biometrics Preserve Privacy? Biometric Technology Today</surname>
          </string-name>
          ,
          <year>2017</year>
          (7), pp
          <fpage>8</fpage>
          {
          <fpage>11</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Yang</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          et al.:
          <article-title>A ngerprint and nger-vein based cancelable multi-biometric system</article-title>
          .
          <source>Pattern Recognition</source>
          , Volume
          <volume>78</volume>
          , pp
          <volume>242</volume>
          {
          <fpage>251</fpage>
          . (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Gorbunov</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vaikuntanathan</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wichs</surname>
            ,
            <given-names>D:</given-names>
          </string-name>
          <article-title>Leveled Fully Homomorphic Signatures from Standard Lattices</article-title>
          .
          <source>In: STOC'15 Proceedings of the forty-seventh annual ACM symposium on Theory of Computing</source>
          , pp
          <volume>469</volume>
          {
          <fpage>477</fpage>
          .
          <string-name>
            <surname>ACM</surname>
          </string-name>
          , New York, NY, USA (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Reed</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          et al.:
          <year>2019</year>
          . DID Spec. https://w3c-ccg.github.io/did-spec/.
          <source>Accessed 30 July</source>
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Sporny</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          et al.:
          <article-title>Veri able Credentials Data Model</article-title>
          , https://www.w3.org/TR/vcdata-model/.
          <source>Accessed 30 July</source>
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Sovrin</surname>
          </string-name>
          .:
          <article-title>Sovrin Protocol and Token White Paper</article-title>
          . https://sovrin.org/wpcontent/uploads/Sovrin-Protocol-
          <article-title>and-</article-title>
          <string-name>
            <surname>Token-</surname>
          </string-name>
          White-Paper.
          <source>pdf Accessed 30 July</source>
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Metadium</surname>
          </string-name>
          .:
          <article-title>Introduction to Self-Sovereign Identity and Its 10 Guiding Principles</article-title>
          . https://medium.com/metadium/introduction-to
          <article-title>-self-sovereign-identity-</article-title>
          <string-name>
            <surname>andits-</surname>
          </string-name>
          10
          <string-name>
            <surname>-</surname>
          </string-name>
          guiding-principles
          <source>-97c1ba603872. Accessed 30 July</source>
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Leong</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>ID2020: Digital Identity</article-title>
          . https://www.accenture.com/us-en
          <source>/insightblockchain-id2020. Accessed 30 July</source>
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <given-names>Civic</given-names>
            <surname>Technologies</surname>
          </string-name>
          .: Civic Whitepaper. https://tokensale.civic.com/CivicTokenSaleWhitePaper.pdf.
          <source>Accessed 30 July</source>
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Dunphy</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Petitcolas</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>A First Look at Identity Management Schemes on the Blockchain</article-title>
          . https://arxiv.org/pdf/
          <year>1801</year>
          .03294.pdf.
          <source>Accessed 30 July</source>
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Pato</surname>
            ,
            <given-names>J. N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Millett</surname>
            ,
            <given-names>L. I.</given-names>
          </string-name>
          :
          <article-title>Biometric Recognition: Challenges and Opportunities</article-title>
          . Washington, DC: The National Academies Press. (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>