Photo safeguards confidential information

In order to recognize someone from their physical characteristics, you need to make a biometric record of them, consisting of a fingerprint, photograph or iris scan. This is a much more reliable check than the simple four-digit password on most mobile phones. As the majority of mobile phones and PDAs are already fitted with a camera, face recognition using a photo is an obvious choice. Buhan's research has made various contributions to this new biometric application.

Buhan developed a mathematical method for storing biometric data securely. Using this data, a mobile device is able to recognize people under different circumstances, so even if the user has altered his hair drastically, the system can still recognize him.

Two photos give password
Buhan wondered if you could also use such photographs or other biometric data for accomplishing secure information exchange between two mobile devices. If Bluetooth is used to do this – again with a simple four-digit password – security and privacy cannot be guaranteed. Instead, Buhan suggested constructing a password from two photos so that it would be almost impossible to decode it. To do this, two users need to save their own photos on their PDAs. They then take photos of each other. The PDA compares the two photos and generates a security code for making a safe connection. The users can then use this connection to exchange confidential information. The photos are stored as a template that contains the essential features for recognition. This safe template transfer is not just suitable for PDAs, but for every other biometric recognition system.
A firearm recognizes its owner
This idea of using biometrics for safe storage and transfer arose from the SecureGrip project. This is a project in which the grip of a policeman’s firearm is biometrically protected, in this case with a ‘personal grip' covered with a network of pressure sensors. These recognize the way in which the user holds the firearm. If someone else holds the weapon, it does not work. So what happens if a policeman needs to borrow a firearm from his colleague? The same as for the photos: the policemen have to hold each other's firearms for a short time, in order to create a suitable code.

Media Contact

Wiebe van der Veen alfa

More Information:

http://www.utwente.nl/en

All latest news from the category: Information Technology

Here you can find a summary of innovations in the fields of information and data processing and up-to-date developments on IT equipment and hardware.

This area covers topics such as IT services, IT architectures, IT management and telecommunications.

Back to home

Comments (0)

Write a comment

Newest articles

Superradiant atoms could push the boundaries of how precisely time can be measured

Superradiant atoms can help us measure time more precisely than ever. In a new study, researchers from the University of Copenhagen present a new method for measuring the time interval,…

Ion thermoelectric conversion devices for near room temperature

The electrode sheet of the thermoelectric device consists of ionic hydrogel, which is sandwiched between the electrodes to form, and the Prussian blue on the electrode undergoes a redox reaction…

Zap Energy achieves 37-million-degree temperatures in a compact device

New publication reports record electron temperatures for a small-scale, sheared-flow-stabilized Z-pinch fusion device. In the nine decades since humans first produced fusion reactions, only a few fusion technologies have demonstrated…

Partners & Sponsors