Office hrs: QC: Tue, 1:40pm - 2:40pm; GC: Thur: 11:15am-11:45am.or by appointment.

Similar documents
Biometric Recognition: How Do I Know Who You Are?

IRIS Biometric for Person Identification. By Lakshmi Supriya.D M.Tech 04IT6002 Dept. of Information Technology

The Role of Biometrics in Virtual Communities. and Digital Governments

Authenticated Document Management System

Secure communication based on noisy input data Fuzzy Commitment schemes. Stephan Sigg

FACE VERIFICATION SYSTEM IN MOBILE DEVICES BY USING COGNITIVE SERVICES

ISSN Vol.02,Issue.17, November-2013, Pages:

Situational security, controlled privacy

UNIVERSITY OF CENTRAL FLORIDA FRONTIERS IN INFORMATION TECHNOLOGY COP 4910 CLASS FINAL REPORT

Human Identifier Tag

Shannon Information theory, coding and biometrics. Han Vinck June 2013

Investigation of Recognition Methods in Biometrics

Legal Aspects of Identity Management and Trust Services

Principal Component Analysis(PCA) with Back Propogation Neural Network(BPNN) for Face Recognition System

Biometrics Acceptance - Perceptions of Use of Biometrics

Title Goes Here Algorithms for Biometric Authentication

BIOMETRICS BY- VARTIKA PAUL 4IT55

Card IEEE Symposium Series on Computational Intelligence

Biometric Authentication for secure e-transactions: Research Opportunities and Trends

Fingerprint Recognition using Minutiae Extraction

The Center for Identification Technology Research (CITeR)

Effective and Efficient Fingerprint Image Postprocessing

Improving the Security of Internet Banking Applications by Using Multimodal Biometrics

Biometrics - A Tool in Fraud Prevention

Fingerprint Combination for Privacy Protection

ABSTRACT INTRODUCTION. Technical University, LATVIA 2 Head of the Division of Software Engineering, Riga Technical University, LATVIA

ACADEMIC YEAR

Real time verification of Offline handwritten signatures using K-means clustering

Contents. 3 Improving Face Recognition Using Directional Faces Introduction xiii

Efficient Privacy-Preserving Biometric Identification

ELG 5121/CSI 7631 Fall Projects Overview. Projects List

Fake Finger Detection by Finger Color Change Analysis

3D Face Recognition System in Time Critical Security Applications

DOI: /IJCSC Page 210

Lecture # 01. Introduction

MATLAB DIGITAL IMAGE/SIGNAL PROCESSING TITLES

International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN IJSER

Towards Solving the Identity Challenge Faced by Digital Forensics

Cardiac Cycle Biometrics using Photoplethysmography

Note on CASIA-IrisV3

About user acceptance in hand, face and signature biometric systems

University of East London Institutional Repository:

An Efficient Interception Mechanism Against Cheating In Visual Cryptography With Non Pixel Expansion Of Images

International Journal of Scientific & Engineering Research, Volume 5, Issue 1, January ISSN

Challenges and Potential Research Areas In Biometrics

Modern Biometric Technologies: Technical Issues and Research Opportunities

MULTIMODAL BIOMETRIC SYSTEMS STUDY TO IMPROVE ACCURACY AND PERFORMANCE

Human Authentication from Brain EEG Signals using Machine Learning

San José State University Aerospace Engineering AE20 Computer-Aided Design for Aerospace Engineers, Fa

DIGITAL SIGNAL PROCESSING. Introduction

ISSUANCE AND CIVIL REGISTRATION

Biometrics 2/23/17. the last category for authentication methods is. this is the realm of biometrics

EFFICIENT ATTENDANCE MANAGEMENT SYSTEM USING FACE DETECTION AND RECOGNITION

Performance Analysis of Multimodal Biometric System Authentication

Biometric Systems Technology, Design and Performance Evaluation

Review of Major Testing Initiatives and Recent Technical Advances

Analysis of the Wireless Covert Channel Attack: Carrier Frequency Selection

Face Recognition Based Attendance System with Student Monitoring Using RFID Technology

ELE 882: Introduction to Digital Image Processing (DIP)

Fingerprint Segmentation using the Phase of Multiscale Gabor Wavelets

How to Make an Online Math Lab Tutoring Appointment Using WCOnline

3. Department of Communication Philosophy

Evaluation of Biometric Systems. Christophe Rosenberger

High volume security printing using sheet-fed offset press

An Overview of Biometrics. Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University

CJUS 361 CJUS 361. Note:

School of Computer Science. Course Title: Introduction to Human-Computer Interaction Date: 8/16/11

Control of Manufacturing Processes. Spring 2004 Lecture #1 Introduction

GUJARAT TECHNOLOGICAL UNIVERSITY, AHMEDABAD, GUJARAT COURSE CURRICULUM COURSE TITLE: COMPUTER INTEGRATED MANUFACTURING ( COURSE CODE: )

ISO/IEC TR TECHNICAL REPORT. Information technology Biometrics tutorial. Technologies de l'information Tutoriel biométrique

Biometrics in a Glimpse

FEASIBILITY STUDY OF PHOTOPLETHYSMOGRAPHIC SIGNALS FOR BIOMETRIC IDENTIFICATION. Petros Spachos, Jiexin Gao and Dimitrios Hatzinakos

IRIS Recognition Using Cumulative Sum Based Change Analysis

Information hiding in fingerprint image

IRIS RECOGNITION USING GABOR

Algorithm for Detection and Elimination of False Minutiae in Fingerprint Images

UNIT 2 TOPICS IN COMPUTER SCIENCE. Emerging Technologies and Society

Introduction to Biometrics 1

OBJECTIVE OF THE BOOK ORGANIZATION OF THE BOOK

AN EXTENDED VISUAL CRYPTOGRAPHY SCHEME WITHOUT PIXEL EXPANSION FOR HALFTONE IMAGES. N. Askari, H.M. Heys, and C.R. Moloney

AN EFFICIENT METHOD FOR RECOGNIZING IDENTICAL TWINS USING FACIAL ASPECTS

INTERNATIONAL RESEARCH JOURNAL IN ADVANCED ENGINEERING AND TECHNOLOGY (IRJAET)

Design and Technology

CHARTER PACIFIC SIGNS SHARE PURCHASE AGREEMENT TO ACQUIRE 100% OF THE MICROLATCH GROUP

COMBINING FINGERPRINTS FOR SECURITY PURPOSE: ENROLLMENT PROCESS MISS.RATHOD LEENA ANIL

Touchless Fingerprint Recognization System

On The Correlation of Image Size to System Accuracy in Automatic Fingerprint Identification Systems

Argumentative Interactions in Online Asynchronous Communication

Automated Signature Detection from Hand Movement ¹

Software LEIC/LETI. Lecture 21

CDP Theme Machine Learning

Student Attendance Monitoring System Via Face Detection and Recognition System

From here, you can create or edit your profile and schedule, reschedule or cancel your exam. This is also where you will go to start your exam.

Nikhil Gupta *1, Dr Rakesh Dhiman 2 ABSTRACT I. INTRODUCTION

Standard Fingerprint Databases Manual Minutiae Labeling and Matcher Performance Analyses

AAU SUMMER SCHOOL PROGRAMMING SOCIAL ROBOTS FOR HUMAN INTERACTION LECTURE 10 MULTIMODAL HUMAN-ROBOT INTERACTION

International Journal of Engineering and Emerging Technology, Vol. 2, No. 1, January June 2017

Facial Recognition application in computer system

DIGITAL INTEGRATED CIRCUITS FALL 2003 ANALYSIS AND DESIGN OF DIGITAL INTEGRATED CIRCUITS (18-322) COURSE SYLLABUS

A New Fake Iris Detection Method

Transcription:

Title: Biometric Security and Privacy Handout for classes: Class schedule: Contact information and office hours: Prof. Bon Sy, Queens College (NSB A104) Phone: 718-997-3477, or 718-997-3566 to leave a message. E-mail: bon@bunny.cs.qc.edu Office hrs: QC: Tue, 1:40pm - 2:40pm; GC: Thur: 11:15am-11:45am.or by appointment. Course description 1 / 7

Biometrics has emerged from relatively specialized use in the criminal forensics domain to more mainstream use for computer authentication, identification document security, and surveillance for public safety. This emergence has been accompanied by an expansion in biometric modality from mainly fingerprints to face, iris, hand, voice, and other novel biometrics. This course concentrates on the unique advantages that biometrics brings to computer security, but also addresses challenging issues such as security strength, recognition rates, and privacy, as well as alternatives of passwords and smart cards. Students will gain knowledge in the building blocks of this field: signal processing, pattern recognition, security and privacy, and secure computation techniques for privacy preserving biometric data retrieval. By the end of the course students will be able to evaluate and design security systems that include biometrics and their usability and privacy implications. Course Objectives In this course, students will learn to answer the following: What are the methods of biometrics? What are the devices of biometrics? How are these used for computer security? How do we design and build a biometric security system that also guarantees privacy? 2 / 7

Course Outline Module 1 Learning objective: Introduce students to biometric technologies and their applications Topic 1.1: Concept of patterns and pattern classifier Lecture: Concept of patterns for feature representation and recognition Topic 1.2: Biometric application for verification, identification, and surveillance Lecture: Introduction to Biometrics Topic 1.3: Biometric modalities and data set; user intra-variability issues Lecture: Biometric Modalities Lecture: Image and Signal Processing Topic 1.4: Biometric signal processing and performance measurement Lecture: Recognition Measurement, Errors, and Statistics 3 / 7

Lab: Verification and Identification System Errors and Performance Testing Module 2 Learning objective: Foster students to think critically about privacy & social implications Topic 2.1: Concept of privacy and definitions Topic 2.2: Review on the state-of-the-art biometric application Lecture: Concept of usable privacy and security Lecture: Design for privacy and security Lecture/discussion: Biometric Resources and Standards Lecture/discussion: Large Scale Biometrics& Systems Case Studies Topic 2.3: Arguments by the advocates of biometric application 4 / 7

Topic 2.4: Arguments by the opposition of biometric application Discussion resource: ACLU, EFF Case study and discussion Module 3 Learning objective: Introduce students to privacy preserving computation for biometric technologies Topic 3.1: Concept of Secure Multi-party Computation Lecture: Cancellable biometrics with privacy preserving computation Topic 3.2: Modeling privacy and security for biometric data retrieval Lecture: Specification and requirement for privacy and security; attacker capabilities Topic 3.3: Secure computation and communication Lecture: Concept of information-theoretic security, computational security 5 / 7

Lecture: RSA based 1-n oblivious transfer Topic 3.4: Secure Information Processing with Privacy Assurance (SIPPA) Lecture: Concept of privacy homomorphism Lab: SIPPA for multi-face matching Some references (optional) 1. http://bonnet19.cs.qc.edu:7778/pls/forum/ (Security control E-community) 2. http://w2.eff.org/privacy/surveillance/biometrics/ 3. http://www.aclu.org/ 4. http://www.boprivacy.org/ 5. Biometric Systems, Wayman, Jain, Maltoni and Maio (ed.s) 2004 6. Biometric Technologies and Verification Systems Vacca, John R. 2007, Approx. 656 p., Paperback ISBN-13: 978-0750679671. 6 / 7

7. Pattern Classification, Duda, Hart, Stork, 2000 Suggested Workload and Grading: 10% Biometric technology evaluation 20% (Take-home) quiz for modules 1,2 and 3. 30% One paper presentation 40% Project: Team based prototype implementation using SDK. 7 / 7