Player is loading...

Embed

Copy embed code

Transcriptions

Note: this content has been automatically generated.
00:00:01
um
00:00:10
um how everybody ah we're here to present a project id uh i'm have have no they just didn't have
00:00:17
to be fell and also research assistant that uh if
00:00:20
you had uh and uh sorry the apothecary security give up
00:00:25
the problem that we are i'm considering is the privacy issue in biometric recognition systems
00:00:32
uh did it always are stored in the database of
00:00:34
such systems are very crucial in every important uh information
00:00:39
and uh if the hacker could affected system they can use it
00:00:43
to injure any other system and indeed the price of user is violated
00:00:49
let's go in detail of uh what's the problem is considered the general this came of it
00:00:55
national uh uh by magic recognition system that beginning to some features are extracted from that for example
00:01:01
face then this features are stored in the database and it will be used for the identification papers
00:01:09
now uh considered the data which is stored in the database
00:01:13
this data is very important and uh we will show you that
00:01:17
uh this data is a very important for the privacy and if the hacker
00:01:21
could pack they can get identity from both data so let's do some hacking
00:01:28
ah to do this uh he considered the most famous face recognition system
00:01:33
cold dark face and are expected some features from different people
00:01:38
uh improving and data sets and uh we tried to revert from these features
00:01:44
which are in the database engine or to face it is the the results
00:01:47
uh we compare we could generate anywhere to from this feature to the uh
00:01:52
you made of the person and it being did uh violated the privacy of they've got
00:01:58
well to a tackle this there's so many regulations
00:02:02
uh recently european union has uh hum a annals the g.
00:02:07
d. p. r. uh regulations also there's some standards from my so
00:02:11
and surprisingly during i. c. c. we heard that
00:02:14
china uh bolted for the data protection during this
00:02:19
time and it will it take effect on november first uh so it showed the importance of peace
00:02:25
about the market size i'll let be magic uh recognition systems or use a unique
00:02:32
everywhere in particular face recognition or the most famous one
00:02:37
and er to gross annual rates of a twenty percent which is quite interesting is the the business aspect
00:02:43
no the solution so herpes sores are so easy for her yeah i am i think without and then the thing
00:02:52
i know are are and i know that there are things that are that are exactly and there would be nothing
00:03:01
i spent that protected right and does not have any i. e. related information backpacker hack it
00:03:09
yeah i i thought that our work here yet at a really
00:03:13
yeah that she had it right like that and and the i.
00:03:19
r. and okay yeah yeah you know what you're thinking like that
00:03:25
and in fact there is that okay i'm from today on the plate
00:03:32
yep and i think one or or is that like that and not there yeah
00:03:38
protected hamlet were you know and then you see you know or whatever okay
00:03:45
yeah that and the fact the the word an area that the attacker how information about it
00:03:52
and ah then also rather than the other one yeah yeah yeah yeah yeah yeah
00:04:00
or or from the one by one and i have no information about i didn't yeah yeah i'll present the the
00:04:08
yeah the one on the at and t. e. ah right i think i think
00:04:15
i think yes i know i know in in the ah yeah yeah there are
00:04:22
see how yeah yeah yeah yeah yeah yeah right or or
00:04:27
or or or yeah ah then i'll on an actor or one
00:04:37
oh
00:04:39
ah ha or i and there are four back in her here and there and one of our
00:04:48
uh huh d. and d. r. e. i. for ah ah ah are there
00:04:56
uh yeah i think you're right yeah and or or
00:05:03
ah here yeah well i i i have right here i think they are right now

Share this talk: 


Conference Program

Final pitch, team MyLinguist
KHOSRAVANI, Abbas, Idiap Research Institute
Aug. 26, 2021 · 2:15 p.m.
Final pitch, team ProtectID
OTROSHI SHAHREZA, Hatef, Idiap Research Institute
Aug. 26, 2021 · 2:44 p.m.
Final pitch, team innovAItor
Lonneke, Idiap Research Institute
Aug. 26, 2021 · 3:16 p.m.
281 views
Final pitch, team AICIdemo
Michael Liebling, Idiap Research Institute
Aug. 26, 2021 · 3:51 p.m.

Recommended talks

Privacy by Design Age Verification & Online Child Safety
Dr. Onur Yürüten, Head of Age Assurance Solutions and Senior ML Engineer in Privately
Oct. 11, 2023 · 9:26 a.m.
Privately Pitch
François Helg
March 19, 2015 · 12:21 p.m.
2182 views