Cyber-Privacy: Securing Biometric Data

6
Cyber-Privacy: Securing Biometric Data Arun Ross Associate Professor Michigan State University [email protected] http://www.cse.msu.edu/~rossarun / [email protected]

Transcript of Cyber-Privacy: Securing Biometric Data

Page 1: Cyber-Privacy: Securing Biometric Data

Cyber-Privacy: Securing Biometric Data

Arun RossAssociate Professor

Michigan State [email protected]

http://www.cse.msu.edu/~rossarun/[email protected]

Page 2: Cyber-Privacy: Securing Biometric Data

A large number of social, financial, business transactions are being conducted over the Internet

But Cyberspace is not just about data – it is also about individuals connected to the data

CyberSpace

Page: 2

Page 3: Cyber-Privacy: Securing Biometric Data

Page: 3

Page 4: Cyber-Privacy: Securing Biometric Data

Faces of Facebook: Privacy in the Age of Augmented Reality (Alessandro Acquisti et al)

Convergence of three technologies: face recognition, cloud computing, online social networks

They investigated whether combination of publicly available Web 2.0 data and off-the-shelf face recognition software may allow large-scale, automated, end-user individual re-identification

Started from an anonymous face in the street, and ended up with very sensitive information about that person, in a process of data "accretion”

Combined face recognition with the algorithms they developed in 2009 to predict SSNs from public data

Identifying People on the Web

Page: 4

Page 5: Cyber-Privacy: Securing Biometric Data

Visual Cryptography: De-identifying Data

Actual Face

DATABASE 1

DATABASE 2

Ross and Othman, “Visual Cryptography for Biometrics Privacy”, TIFS 2011Page: 5

Page 6: Cyber-Privacy: Securing Biometric Data

Preserving the privacy of a user’s stored biometric data Prevent cross-linking across applications Prevent gleaning additional information from

biometric data (e.g., medical ailment)

Privacy Enhancing Technology

Page: 6

Need to • Define Privacy Metrics• Guarantee Privacy• Develop Differential Privacy Schemes

CYBERSECURITY CV for MSU: http://goo.gl/forms/QcRqagFM9F