Photo safeguards confidential information

In order to recognize someone from their physical characteristics, you need to make a biometric record of them, consisting of a fingerprint, photograph or iris scan. This is a much more reliable check than the simple four-digit password on most mobile phones. As the majority of mobile phones and PDAs are already fitted with a camera, face recognition using a photo is an obvious choice. Buhan's research has made various contributions to this new biometric application.

Buhan developed a mathematical method for storing biometric data securely. Using this data, a mobile device is able to recognize people under different circumstances, so even if the user has altered his hair drastically, the system can still recognize him.

Two photos give password
Buhan wondered if you could also use such photographs or other biometric data for accomplishing secure information exchange between two mobile devices. If Bluetooth is used to do this – again with a simple four-digit password – security and privacy cannot be guaranteed. Instead, Buhan suggested constructing a password from two photos so that it would be almost impossible to decode it. To do this, two users need to save their own photos on their PDAs. They then take photos of each other. The PDA compares the two photos and generates a security code for making a safe connection. The users can then use this connection to exchange confidential information. The photos are stored as a template that contains the essential features for recognition. This safe template transfer is not just suitable for PDAs, but for every other biometric recognition system.
A firearm recognizes its owner
This idea of using biometrics for safe storage and transfer arose from the SecureGrip project. This is a project in which the grip of a policeman’s firearm is biometrically protected, in this case with a ‘personal grip' covered with a network of pressure sensors. These recognize the way in which the user holds the firearm. If someone else holds the weapon, it does not work. So what happens if a policeman needs to borrow a firearm from his colleague? The same as for the photos: the policemen have to hold each other's firearms for a short time, in order to create a suitable code.

Media Contact

Wiebe van der Veen alfa

More Information:

http://www.utwente.nl/en

All latest news from the category: Information Technology

Here you can find a summary of innovations in the fields of information and data processing and up-to-date developments on IT equipment and hardware.

This area covers topics such as IT services, IT architectures, IT management and telecommunications.

Back to home

Comments (0)

Write a comment

Newest articles

Lighting up the future

New multidisciplinary research from the University of St Andrews could lead to more efficient televisions, computer screens and lighting. Researchers at the Organic Semiconductor Centre in the School of Physics and…

Researchers crack sugarcane’s complex genetic code

Sweet success: Scientists created a highly accurate reference genome for one of the most important modern crops and found a rare example of how genes confer disease resistance in plants….

Evolution of the most powerful ocean current on Earth

The Antarctic Circumpolar Current plays an important part in global overturning circulation, the exchange of heat and CO2 between the ocean and atmosphere, and the stability of Antarctica’s ice sheets….

Partners & Sponsors