Friday, March 29, 2019

BIOMETRICS AND SECURITY

Questions related to Biometric Security
James F Peters
answered a question related to Biometric Security
What's a smooth function in cryptography?
Question
1 Answer
Ramón Santana Fernández
I'm working with cancelable templates in biometric cryptography and I need to know what a locally smooth function and globally non smooth function are.
… Read more
James F Peters
“A good overview of smooth functions and cryptography is given in I.E. Shparlinski, Anatomy of integers and cryptography (starting on page 5): http://www.di.ens.fr/pub/Main/CryptoSeminaire/AnatInt_Shparlinski.pdf Another good paper to consider is Y. Lamzouri, Smooth values of the iterates of the Euler's Phi-function: http://www.math.yorku.ca/~lamzouri/smooth.pdf  ”
View
Antonio Fratini
answered a question related to Biometric Security
What are the other unobtrusive biometrics apart from gait?
Question
10 Answers
Ebenezer R.H.P. Isaac
Gait is a successful unobtrusive biometric meaning that it can be used to identify an individual without his/her cooperation. What are the other unobtrusive biometrics are there available in literature?
… Read more
Antonio Fratini
“Dear Isaac, There are a number of Biometrics features you can use as non obstructive, fingerprint is probably the most used but other features are getting interests (voice, ECGs etc.). However, the chances to get the features without user cooperation poses serious ethical questions. Can you pick selected features without the subject (because is no longer a user in this case) agreement? I am sure that security concerns might overcome these ethical constraints, thus I suggest to look at authors as Agrafioti (http://www.tedmed.com/speakers/show?id=292950) And a recent review on ECG as biometrics we developed: https://biomedical-engineering-online.biomedcentral.com/articles/10.1186/s12938-015-0072-y All the best, Antonio”
View
Prit Kaur
answered a question related to Biometric Security
What are the new trends in research on cybercrime?
Question
9 Answers
Dariusz Prokopowicz
In my opinion, interesting questions and research thesis may concern the following issues: Are fishing, malware (spyware, trojans, ransomware, keyloggers, ...) sending cybercriminals false e-mails with links to fake websites or viruses reading passwords for online banking accounts or other techniques used by cybercriminals as the most dangerous? Some users use antivirus software, farewall, precautionary methods in using e-mail, etc., but this has not prevented, for example, attacks from cybercriminals using ransomware that encrypt and block
… Read more

DISCUSSION_D.Prokopowicz_.What are the new trends in research on cybercrime_2.jpg
Prit Kaur
“Last week employees of many institutions received spam Sextortion threats. So I think, sextortion, revenge porn, cell phone stalking just to mention few areas!”
View
Mark Sitkowski
answered a question related to Biometric Security
Security of data transfer and analysis in Big Data database systems?
Question
4 Answers
Dariusz Prokopowicz
What currently dominate and are the standards and instruments for ensuring the security of data transfer and analysis in Big Data database systems developed? Please reply Best wishes
… Read more

DISCUSSION_D.Prokopowicz_Security of data transfer and analysis in Big Data database systems_3.jpg
Mark Sitkowski
“Firstly, you need to build the security into the applications which access your data. The protection of data at rest has always been a vexed issue, since someone, somewhere knows the location and/or value of the encryption keys. Our data isn't particularly 'Big', but we've put a lot of effort into making sure that no human knows, or can access the keys. This may not be relevant to your question, but it might help provoke some thought on the subject. Securely Encrypting Data At Rest”
View
Gayatri S Pandi
answered a question related to Biometric Security
Will the use of Blockchain technology improve the security of information transfer on the Internet?
Question
16 Answers
Dariusz Prokopowicz
Will the use of Blockchain technology improve the security of information transfer on the Internet? Will the development of Blockchain technologies reduce the scale of cybercrime on the Internet? Please, answer, comments. I invite you to the discussion. Best wishes
… Read more

DISCUSSION_D.Prokopowicz_Will the use of Blockchain technology improve the security of information...Internet.jpg
Gayatri S Pandi
“Blockchains are distributed networks and all data in the blockchain is secured through cryptography or some complex Integrity Chains. Bigger blockchain networks with more users have a very lower risk of getting attacked by hackers because of the complexity required to penetrate such a big complex distributed network. Its not easy to break such Integrity chains. So it will definitely improve the security of Information transfers.”
View
Amit Kumar Dwivedi
answered a question related to Biometric Security
Do you think, for security reasons, everything that happens on the Internet should be analyzed by the public security services?
Question
7 Answers
Dariusz Prokopowicz
In connection with the development of cybercrime on the Internet, the security systems for transfer and processing of data, financial transactions, electronic banking, etc. carried out on the Internet are improved. In addition to electronic banking, the key information security in the internal IT systems of central state institutions is protected. Cybercriminal attacks on cyber-banking systems and hacker attacks aimed at companies to extort ransom for decrypting data encrypted by computer viruses on disks (cybercriminal ransomware a​t​t​
… Read more

DISCUSSION_D.Prokopowicz_Do you think, for security reasons, everything that happens on the Internet...security services.jpg
Amit Kumar Dwivedi
“no”
View
Nirmala S.V.S.G
answered a question related to Biometric Security
Security of information systems of state institutions?
Question
3 Answers
Dariusz Prokopowicz
The issue of information security in information systems of key state institutions? Has the level of information security in information systems of key state institutions been falling in recent years? Is the level of information security transferred via the Internet going down? In recent years, the number of spectacular hacking burdens for internal IT systems of key, central state institutions and large enterprises in various countries has been increasing. An interesting point is that some of these hacker intrusions are made not by c​y​b​e​r​c​r​i​m​i​
… Read more

DISCUSSION_D.Prokopowicz_Security of information systems of state institutions_6.jpg
Nirmala S.V.S.G
“Information Systems are composed in three main portions, hardware, software and communications with the purpose to help identify and apply information security industry standards, as mechanisms of protection and prevention, at three levels or layers: physical, personal and organizational.”
View
Noha MM. ..
answered a question related to Biometric Security
Anyone having experience in multiple tag reading in NFC or RFID?
Question
4 Answers
Razi Iqbal
Anyone having experience in multiple tag reading in NFC or RFID? Is there any way to emulate as single passive tag as multiple tags?
… Read more
Noha MM. ..
“It may help you http://www.rfidjournal.com/blogs/experts/entry?11123 BR”
View
Mark Maguire
answered a question related to Biometric Security
Anyone researching in biometric security will be of great help?
Question
6 Answers
Taban Habibu
How Bio metric Technology can be safe-guided in terms of privacy and security aspect of individual data? How secure in Bio metric technology? what are the private implication of the individual privacy?
… Read more
Mark Maguire
“This is a very tricky question, as there are many types of biometric technologies that use different markers, have different error thresholds, and are deployed in different contexts. And, this is not going into multi-modal biometrics or second-generation systems. I delivered classes on biometrics a few years ago and students tended to rely on this report as a good, practical and clear guide: http://irishpatients.ie/news/wp-content/uploads/2012/04/Irish-Council-Bioethics-Final_Biometrics_Doc_HighRes.pdf Hope it helps ”
View
Arturo Geigel
answered a question related to Biometric Security
What are the best techniques to catch forgery in images?
Question
5 Answers
Waqas Mahmood
 Image processing techniques for catching forgery
… Read more
Arturo Geigel
“Depends on the available information that you have on the original. Look at the survey on passive blind forensics techniques : http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=6648773 Other methods entail having access to the original and hashing, etc.”
View
Moti Yung
answered a question related to Biometric Security
Should 2FA used for bio metric authentication?
Question
5 Answers
Waqas Mahmood
2FA Two Factor Authentication or  MFA Multi factor Authentication be used with bio metric authication
… Read more
Moti Yung
“Biometrics can be used to access devices that are near you and you hold in your hand. With the physical proximity, it is an added factor for devices that are supposed to be used by a specific user (hand held device, or a physical cases like door access where there is some supervision that the person indeed puts their fingers or eyes for reading). Adding bio to other factors (like password and device producing one-time passwords) are good. For remote uses one has to make sure to carefully and secure encrypt the biometrics based information (and maybe combine it with other factors) since otherwise the signals can be read and re-used if available on the clear. To summarize: one can use bio information in scenarios where there is proximity, or supervision, or in conjunction with other factors, and in a mode protected when communicated to a remote checking apparatus. In many other scenarios there are problems with biometrics information (copying fingerprints and embedding them in what is known as "gummy fingers" was one way that was shown to bypass biometrics-- so care is needed, see: https://cryptome.org/gummy.htm).”
View
Ashiq Imran
answered a question related to Biometric Security
Keystroke dynamics or graphical passwords; which one is a better option for alphanumeric password?
Question
9 Answers
Md Asraful Haque
Conventional text passwords are the most popular authentication method but suffer from various drawbacks attacks, i.e. brute force attacks, keylogger, phishing etc. Keystroke dynamics and graphical passwords are promising alternatives for it. But which one is better? Comments are welcome.
… Read more
Ashiq Imran
“Both of them are better than alphanumeric password. It depends on the situation and device you want to use. Bio-metrics locks are more secure than graphical password e.g., pattern based. But, the accuracy of bio metrics locks may not be better than graphical password. Sometimes, the device which has bio-metrics lock may not work well. ”
View
Parul Nilesh Shah
answered a question related to Biometric Security
Do we need to normalize the score inf feature extraction?
Question
2 Answers
Lamis Ghoualmi
When we have features of two modalties extracted with the same method of feature extraction, do we need to normalize the score?
… Read more
Parul Nilesh Shah
“If the range of the feature is different in different modalities and one is going to use some sort comparative analysis, it is always safe to normalise the features. Moreover, often the feature set makes more sense and is easily interpretable in the normalized form.”
View
Ana Silva
answered a question related to Biometric Security
Are the standards for pictures of criminals different in different countries?
Question
4 Answers
Katarzyna Bobkowska
I am looking for sample database of photos of criminals made with the standards of the European Police and Intelligence Services- together with a description standard taking pictures. Do the standards taking pictures vary for different countries?
… Read more
Ana Silva
“Hi Katarzyna Bobkowska, For biometric face recognition systems to identify individuals must meet the parameters established in ISO / IEC 19794-5, to determine if they have identification value standard describes a framework for assessing whether the images of faces and if they can be used in personal identification documents. I recommend you investigate about the ISO / IEC 19794-5 standard. Ana Silva ”
View
Jan Loeschner
answered a question related to Biometric Security
Any interested reearchers for partners to H2020 on bio-metric person identification methods ?
Question
3 Answers
Marek Przyborski
My team and I are looking for partners to cooperate in the topic (follow the link below)  https://ec.europa.eu/research/participants/portal/desktop/en/opportunities/h2020/topics/1100-bes-06-2015.html
… Read more
Jan Loeschner
“My group is interested in the topic and we have years of expertise and involvement. It will very likely not be possible for us to join a proposal for administrative reasons in the remaining 2 month until dead line but there are other possibilities for us to support an interesting initiative of a consortium. So please drop me a message if you consider this as usefull and I will illustrate you some possibilities. ”
View
Ian Kennedy
answered a question related to Biometric Security
What 'Token' do we use in biohashing algorithm to generate pseudo-random number?
Question
1 Answer
Rudresh Dwivedi
IN biohash algorithm, We Use a token to generate m orthonormal pseudo random vectors followed by inner-product operations. What token do we use and how do we generate m*n random matrix?
… Read more
1-s2.0-S0020019006002080-main.pdf
Ian Kennedy
“To answer your last question: You generate mn random numbers and insert them sequentially into the rows and columns of your matrix. You can do it row-wise or column-wise or even snake. It makes no difference.”
View
Anssi Paasi
answered a question related to Biometric Security
Any suggestions for reputable open access journals in which we can publish some novel research work in biometrics security?
Question
3 Answers
Joseph Mwema
What are some of the best open access journals with a good current impact factor?   We want to publish a research paper on biometrics security work we have been working on.
… Read more
Anssi Paasi
“You could try Surveillance & Society”
View
Muhammad Imran Babar
answered a question related to Biometric Security
Can anyone share with me a paper about Dealunay triangulation used to match fingerprint templates?
Question
3 Answers
Ramón Santana Fernández
I'm looking for the specification of the Dealunay triangulation method and it applications in fingerprint matching, if anyone have code and can share it with me I say thanks in advance.
… Read more
Muhammad Imran Babar
“Kindly see this paper.”
Delaunay Triangulation.pdf
View
Ramón Santana Fernández
answered a question related to Biometric Security
Anyone have knowledge of biometric systems which are commonly used in research centers such as schools, universities, etc?
Question
6 Answers
Ana Silva
I´m preparing the art of biometric systems in an investigation about the first steps that must be done to implement a biometric system, specifically face recognition at a university campus, etc?
… Read more
Ramón Santana Fernández
“If you want to describe the first steps to the face recognition you do not need to study the face recognition systems, you must study the face recognition algorithms and find in the campus or the place in which the system are going to be deploy the main requirement to be consider to for example do not have any blind spot, the position of the camera most be in such a way that capture a good quality image to increase the amount of information in the face feature extraction among other things. I suggest you research the state of the art about face recognition algorithm, their strength and limitations.”
View
Ahmad Hassanat
answered a question related to Biometric Security
What is the database protocol that should be followed to create a biometric database?
Question
7 Answers
Ahmad Hassanat
My students and I are creating a new (freely available) database for person identification/ authentication using hand geometry and palm features, we are intending to target 200 persons, male and female, and different age groups (young, middle, and old)  . We decided to record 3 sessions for each person, 5 hand images for each person for each session, with random rotation of the hand (around the center), open the fingers randomly. Could you please advice in this regards? Is it enough contribution to write a paper describing the d​a​t​a​b​a​s​
… Read more
Ahmad Hassanat
“Thank you Carlos I was thinking in two master thesis for my students, those references are wonderful. also we are thinking in recognizing terrorists who show only their hands”
View
Musa Ataş
answered a question related to Biometric Security
Can anybody help me with a survey on biometric authentication researche?
Question
3 Answers
B. A. Buhari
I need to know how far we have gone in the area of biometric authentication.
… Read more
Musa Ataş
“please refer to new study Hand Tremor Based Biometric Recognition Using Leap Motion Device.”
View
Muhammad Ikram Lali
answered a question related to Biometric Security
What are the finger printing algorihms? Which of them is more efficient?
Question
3 Answers
B. A. Buhari
Looking for algorithms to implement a biometric finger print system.
… Read more
Muhammad Ikram Lali
“Several researchers have done a comparative analysis of finger printing algorithms such as: http://pubs.sciepub.com/jcsa/1/4/1/. http://www.cse.nd.edu/~mblanton/papers/esorics11.pdf https://www.utdallas.edu/~bxt043000/Publications/Conference-Papers/DAS/C77_Fingerprint_Matching_Algorithm.pdf”
View
Kudakwashe Maguraushe
answered a question related to Biometric Security
Is the surveillance of citizens by national security services not too big?
Question
3 Answers
Dariusz Prokopowicz
In connection with the development of cybercrime, should the surveillance of citizens by national security services be developed, expanded, increased? To what extent can the developed range of citizens' surveillance be improved as part of the improvement of national cyber security systems? As part of the improvement of cyber security systems, should the services for combating cybercrime be able to surveillance the entire activity of citizens on the Internet? Are legal norms regulating the issues of cyber security, services for c​o​m​b​a​
… Read more

DISCUSSION_D.Prokopowicz_.Is the surveillance of citizens by national security services not too big.jpg
Kudakwashe Maguraushe
“@ Dariusz Prokopowicz, i will give you a quick one. In this digital world, there is need for surveillance of citizens by the government for various reasons. Some of them include: - the rise of cyber crimes, sometimes surveillance can assist in mitigating them as a way of implementing cyber security. - the rise of eCommerce and the digitization of most transactions and activities, there has to be a central way of monitoring such activities as control measures, in a bid to also have a reduction in such cases. As long as there is a policy or a framework on how the surveillance will be implemented, its mandatory in this information age. There is need for some guidance on how it is done and people be told about such surveillance apriori, awareness is key. I also believe to some extend, its too big. every activity is monitored, compromising the confidentiality (privacy) of individuals. if properly communicated, people will gladly consent for surveillance”

No comments:

Post a Comment