Blog Posts Tagged with "Biometrics"

7ddc1f3000a13e4dfec28074e9e7b658

FBI’s Facial Recognition is Coming to a State Near You

August 07, 2012 Added by:Electronic Frontier Foundation

The FBI wants to be able to search and identify people in photos of crowds and in pictures posted on social media sites—even if the people in those photos haven’t been arrested for or even suspected of a crime. The FBI may also want to incorporate those crowd or social media photos into its face recognition database...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Red Flag On Biometrics: Iris Scanners Can Be Tricked

August 02, 2012 Added by:Electronic Frontier Foundation

Among all the various biometric traits that can be measured for machine identification, the iris is generally regarded as being the most reliable. Yet Galbally’s team of researchers has shown that even the method traditionally presumed to be foolproof is actually quite susceptible to being hacked...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

NIST Releases Federal ID Security Standard Draft for Comment

July 12, 2012 Added by:Headlines

The document is the next step toward updating Federal Information Processing Standard (FIPS) 201. Among its requirements are that all PIV cards contain an integrated circuit chip, a personal identification number and protected biometric data—a printed photograph and two electronically stored fingerprints...

Comments  (1)

7ddc1f3000a13e4dfec28074e9e7b658

Growing Mistrust of India’s Biometric ID Scheme

May 14, 2012 Added by:Electronic Frontier Foundation

In India, a massive effort is underway to collect biometric identity information for each of the country’s 1.2 billion people. The incredible plan has stirred controversy in India and beyond, raising serious concerns about the security of individuals’ personal data...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

NIST: Secure Biometric Acquisition with Web Services

May 04, 2012 Added by:Headlines

Researchers at the NIST have developed a new protocol for communicating with biometric sensors over wired and wireless networks, called WS-Biometric Devices (WS-BD), allows desktops, laptops, tablets and smartphones to access sensors that capture biometric data using web services...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

ISO and IEC Publish Biometric Authentication Standard

August 15, 2011 Added by:Headlines

Unlike other authentication systems, the breach of biometric data is difficult to remedy. Users can not simply alter the authenticating data used to access secure networks, as one would with usernames and passwords - the data is permanently and uniquely identifiable to the individual user...

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

Authentication: The Holy Grail of Information Security

May 02, 2011 Added by:Brent Huston

Adding something you are to something you have and something you know makes it much more difficult to spoof identity, but still doesn’t render it impossible. And imagine the inconvenience. Seems like way too much just to protect some financial data or health information, huh?

Comments  (5)

3e35900ae6facc6c146a85c435c71d82

Vein Pattern Recognition: A Privacy-Enhancing Biometric

March 03, 2011 Added by:Ben Rothke

Vascular pattern recognition is one of many available biometric authentication technologies. VPR, like many biometric technologies, has the potential to increase security and protect privacy. But that can only be done if the biometric solution is properly deployed...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Britain Scrapping National Identification Card

February 02, 2011 Added by:Robert Siciliano

In the US, the government has attempted to standardize the identification process once and for all with the REAL ID Act, which will likely be squashed under Homeland Security Secretary Janet Napolitano, who has proposed a repeal of the act...

Comments  (0)

5c9886924588e138cc18290742c2095e

What Happened to My Biometric?

November 18, 2010 Added by:Guy Huntington

There has been a significant increase in the use of biometrics for authentication. It is becoming more commonly used to purchase groceries, to gain access to premises, passing through passport control and for logging on to computers. There are some dangers with this trend...

Comments  (1)

634ff692af43fd4dc5dab3b8590c77d6

Under illumination variations, exploiting 3D image for ‘Face Authentication’ in Biometrics…

May 02, 2010 Added by:K S Abhiraj

This article shows some of the basic techniques through which, Biometic authentication worked before.. and a basic mean how it could be crooked up, for gaining authentication. Automatic recognition of human faces is extremely useful in a wide area of applications, such as face identification for security and access control, surveillance of public places, mug shot matching and other commerc...

Comments  (0)

D97bed96d5646177251e99b9567b1392

Biometrics: Where do we stand?

April 16, 2010 Added by:Aaron Simmons

New Hampshire recently voted down the bill (HB 1409) and sided with the Security Industry to allow Biometrics.  So now that security is becoming a priority, where does it stand in the role of Authentication Verification? There are several methods for verification, (Biometric, PIN, Token and even Telephone Call Back/SMS).  Each one of these has its pro’s ...

Comments  (2)