SlideShare une entreprise Scribd logo
1  sur  6
Cyber-Privacy: Securing
Biometric Data
Arun Ross
Associate Professor
Michigan State University
rossarun@cse.msu.edu
http://www.cse.msu.edu/~rossarun/
rossarun@cse.msu.edu
 A large number of social, financial, business
transactions are being conducted over the Internet
 But Cyberspace is not just about data – it is also
about individuals connected to the data
CyberSpace
Page: 2
Page: 3
 Faces of Facebook: Privacy in the Age of Augmented Reality
(Alessandro Acquisti et al)
 Convergence of three technologies:
 face recognition, cloud computing, online social networks
 They investigated whether combination of publicly available
Web 2.0 data and off-the-shelf face recognition software may
allow large-scale, automated, end-user individual re-
identification
 Started from an anonymous face in the street, and ended up
with very sensitive information about that person, in a process
of data "accretion”
 Combined face recognition with the algorithms they developed
in 2009 to predict SSNs from public data
Identifying People on the Web
Page: 4
Visual Cryptography:
De-identifying Data
Actual Face
DATABASE 1
DATABASE 2
Ross and Othman, “Visual Cryptography for Biometrics Privacy”, TIFS 2011
Page: 5
 Preserving the privacy of a user’s stored biometric
data
 Prevent cross-linking across applications
 Prevent gleaning additional information from
biometric data (e.g., medical ailment)
Privacy Enhancing Technology
Page: 6
Need to
• Define Privacy Metrics
• Guarantee Privacy
• Develop Differential Privacy Schemes
CYBERSECURITY CV for MSU: http://goo.gl/forms/QcRqagFM9F

Contenu connexe

En vedette

The Web of Linked Data and its information
The Web of Linked Data and its informationThe Web of Linked Data and its information
The Web of Linked Data and its informationAlberto Nogales
 
Personal learning network
Personal learning networkPersonal learning network
Personal learning networkbecpyke
 
Diseño de la propuesta metodológica
Diseño de la propuesta metodológicaDiseño de la propuesta metodológica
Diseño de la propuesta metodológicabiondim
 
P R N Media Event Dallas Sep 2009
P R N  Media  Event  Dallas  Sep 2009P R N  Media  Event  Dallas  Sep 2009
P R N Media Event Dallas Sep 2009Victoria Harres
 
IIT-B Techfest 07- Mitesh
IIT-B Techfest 07- MiteshIIT-B Techfest 07- Mitesh
IIT-B Techfest 07- MiteshRohit Nair
 
Go ogle 2014
Go ogle 2014Go ogle 2014
Go ogle 2014Arul Mani
 
From The Horse's Mouth
From The Horse's MouthFrom The Horse's Mouth
From The Horse's MouthNavin Rajaram
 
MSML_Capstone_SMcCrindle_ConsultationProject
MSML_Capstone_SMcCrindle_ConsultationProjectMSML_Capstone_SMcCrindle_ConsultationProject
MSML_Capstone_SMcCrindle_ConsultationProjectScott McCrindle
 

En vedette (16)

practica numero 1
practica numero 1practica numero 1
practica numero 1
 
SteadyBudget Sales Deck
SteadyBudget Sales DeckSteadyBudget Sales Deck
SteadyBudget Sales Deck
 
The Web of Linked Data and its information
The Web of Linked Data and its informationThe Web of Linked Data and its information
The Web of Linked Data and its information
 
letter_recommendation
letter_recommendationletter_recommendation
letter_recommendation
 
Personal learning network
Personal learning networkPersonal learning network
Personal learning network
 
Go ogle iv
Go ogle ivGo ogle iv
Go ogle iv
 
Diseño de la propuesta metodológica
Diseño de la propuesta metodológicaDiseño de la propuesta metodológica
Diseño de la propuesta metodológica
 
Gusanito
GusanitoGusanito
Gusanito
 
Presentación1 (2)
Presentación1 (2)Presentación1 (2)
Presentación1 (2)
 
Phtography
PhtographyPhtography
Phtography
 
P R N Media Event Dallas Sep 2009
P R N  Media  Event  Dallas  Sep 2009P R N  Media  Event  Dallas  Sep 2009
P R N Media Event Dallas Sep 2009
 
Agrario LA PROPIEDAD
Agrario LA PROPIEDADAgrario LA PROPIEDAD
Agrario LA PROPIEDAD
 
IIT-B Techfest 07- Mitesh
IIT-B Techfest 07- MiteshIIT-B Techfest 07- Mitesh
IIT-B Techfest 07- Mitesh
 
Go ogle 2014
Go ogle 2014Go ogle 2014
Go ogle 2014
 
From The Horse's Mouth
From The Horse's MouthFrom The Horse's Mouth
From The Horse's Mouth
 
MSML_Capstone_SMcCrindle_ConsultationProject
MSML_Capstone_SMcCrindle_ConsultationProjectMSML_Capstone_SMcCrindle_ConsultationProject
MSML_Capstone_SMcCrindle_ConsultationProject
 

Similaire à Securing Biometric Data with Visual Cryptography

Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docxRunning Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docxtodd521
 
An IAC Approach for Detecting Profile Cloning in Online Social Networks
An IAC Approach for Detecting Profile Cloning in Online Social NetworksAn IAC Approach for Detecting Profile Cloning in Online Social Networks
An IAC Approach for Detecting Profile Cloning in Online Social NetworksIJNSA Journal
 
An iac approach for detecting profile cloning
An iac approach for detecting profile cloningAn iac approach for detecting profile cloning
An iac approach for detecting profile cloningIJNSA Journal
 
Battle lines
Battle linesBattle lines
Battle linesswarooo
 
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...IOSR Journals
 
Autobiography, Mobile Social Life-Logging and the Transition from Ephemeral t...
Autobiography, Mobile Social Life-Logging and the Transition from Ephemeral t...Autobiography, Mobile Social Life-Logging and the Transition from Ephemeral t...
Autobiography, Mobile Social Life-Logging and the Transition from Ephemeral t...Marc Smith
 
E223539
E223539E223539
E223539irjes
 
Exploratory Data Analysis and Feature Selection for Social Media Hackers Pred...
Exploratory Data Analysis and Feature Selection for Social Media Hackers Pred...Exploratory Data Analysis and Feature Selection for Social Media Hackers Pred...
Exploratory Data Analysis and Feature Selection for Social Media Hackers Pred...CSEIJJournal
 
EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...
EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...
EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...CSEIJJournal
 
Ethics Research Paper-Employee Surveillance
Ethics Research Paper-Employee SurveillanceEthics Research Paper-Employee Surveillance
Ethics Research Paper-Employee Surveillanceitsika
 
New Data `New Computation
New Data `New ComputationNew Data `New Computation
New Data `New ComputationDavid De Roure
 
PersoApp - Secure and User-Friendly Internet Applications
PersoApp - Secure and User-Friendly Internet ApplicationsPersoApp - Secure and User-Friendly Internet Applications
PersoApp - Secure and User-Friendly Internet ApplicationsSven Wohlgemuth
 
356 Part II • Predictive AnalyticsMachine LearningFace re.docx
356 Part II • Predictive AnalyticsMachine LearningFace re.docx356 Part II • Predictive AnalyticsMachine LearningFace re.docx
356 Part II • Predictive AnalyticsMachine LearningFace re.docxdomenicacullison
 
Big data privacy issues in public social media
Big data privacy issues in public social mediaBig data privacy issues in public social media
Big data privacy issues in public social mediaSupriya Radhakrishna
 

Similaire à Securing Biometric Data with Visual Cryptography (20)

Social Network Crime on Rise
Social Network Crime on RiseSocial Network Crime on Rise
Social Network Crime on Rise
 
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docxRunning Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
 
An IAC Approach for Detecting Profile Cloning in Online Social Networks
An IAC Approach for Detecting Profile Cloning in Online Social NetworksAn IAC Approach for Detecting Profile Cloning in Online Social Networks
An IAC Approach for Detecting Profile Cloning in Online Social Networks
 
An iac approach for detecting profile cloning
An iac approach for detecting profile cloningAn iac approach for detecting profile cloning
An iac approach for detecting profile cloning
 
Battle lines
Battle linesBattle lines
Battle lines
 
CSS-Intro-Lecture.pdf
CSS-Intro-Lecture.pdfCSS-Intro-Lecture.pdf
CSS-Intro-Lecture.pdf
 
L017146571
L017146571L017146571
L017146571
 
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
 
Towards a More Open World
Towards a More Open WorldTowards a More Open World
Towards a More Open World
 
Autobiography, Mobile Social Life-Logging and the Transition from Ephemeral t...
Autobiography, Mobile Social Life-Logging and the Transition from Ephemeral t...Autobiography, Mobile Social Life-Logging and the Transition from Ephemeral t...
Autobiography, Mobile Social Life-Logging and the Transition from Ephemeral t...
 
E223539
E223539E223539
E223539
 
Exploratory Data Analysis and Feature Selection for Social Media Hackers Pred...
Exploratory Data Analysis and Feature Selection for Social Media Hackers Pred...Exploratory Data Analysis and Feature Selection for Social Media Hackers Pred...
Exploratory Data Analysis and Feature Selection for Social Media Hackers Pred...
 
EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...
EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...
EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...
 
Ethics Research Paper-Employee Surveillance
Ethics Research Paper-Employee SurveillanceEthics Research Paper-Employee Surveillance
Ethics Research Paper-Employee Surveillance
 
New Data `New Computation
New Data `New ComputationNew Data `New Computation
New Data `New Computation
 
Proposal.docx
Proposal.docxProposal.docx
Proposal.docx
 
PersoApp - Secure and User-Friendly Internet Applications
PersoApp - Secure and User-Friendly Internet ApplicationsPersoApp - Secure and User-Friendly Internet Applications
PersoApp - Secure and User-Friendly Internet Applications
 
356 Part II • Predictive AnalyticsMachine LearningFace re.docx
356 Part II • Predictive AnalyticsMachine LearningFace re.docx356 Part II • Predictive AnalyticsMachine LearningFace re.docx
356 Part II • Predictive AnalyticsMachine LearningFace re.docx
 
6356152.pdf
6356152.pdf6356152.pdf
6356152.pdf
 
Big data privacy issues in public social media
Big data privacy issues in public social mediaBig data privacy issues in public social media
Big data privacy issues in public social media
 

Plus de Michigan State University Research

Intelligent and Automatic In vivo Detection and Quantification of Transplante...
Intelligent and Automatic In vivo Detection and Quantification of Transplante...Intelligent and Automatic In vivo Detection and Quantification of Transplante...
Intelligent and Automatic In vivo Detection and Quantification of Transplante...Michigan State University Research
 
Submitting and Editing Proposals and Tracking Proposal Activity and COI Compl...
Submitting and Editing Proposals and Tracking Proposal Activity and COI Compl...Submitting and Editing Proposals and Tracking Proposal Activity and COI Compl...
Submitting and Editing Proposals and Tracking Proposal Activity and COI Compl...Michigan State University Research
 
Taking an ancient path towards artificial intelligence 10-12-16
Taking an ancient path towards artificial intelligence 10-12-16Taking an ancient path towards artificial intelligence 10-12-16
Taking an ancient path towards artificial intelligence 10-12-16Michigan State University Research
 
Michigan State University coffee break: building a budget 10-20-16
Michigan State University coffee break: building a budget 10-20-16Michigan State University coffee break: building a budget 10-20-16
Michigan State University coffee break: building a budget 10-20-16Michigan State University Research
 

Plus de Michigan State University Research (20)

NFRO interdisciplinary international 081617
NFRO interdisciplinary international 081617NFRO interdisciplinary international 081617
NFRO interdisciplinary international 081617
 
Web accessible nfro 2017 as of 08152017
Web accessible nfro 2017 as of 08152017Web accessible nfro 2017 as of 08152017
Web accessible nfro 2017 as of 08152017
 
SmartAg/Food Engineering Overview
SmartAg/Food Engineering OverviewSmartAg/Food Engineering Overview
SmartAg/Food Engineering Overview
 
The Internet of Plants
The Internet of PlantsThe Internet of Plants
The Internet of Plants
 
Digital Agriculture
Digital AgricultureDigital Agriculture
Digital Agriculture
 
A New Magnetic Resononance Imaging Biomarker for Diabetes
A New Magnetic Resononance Imaging Biomarker for DiabetesA New Magnetic Resononance Imaging Biomarker for Diabetes
A New Magnetic Resononance Imaging Biomarker for Diabetes
 
MSU Transgenic and Genome Editing Facility
MSU Transgenic and Genome Editing FacilityMSU Transgenic and Genome Editing Facility
MSU Transgenic and Genome Editing Facility
 
Intelligent and Automatic In vivo Detection and Quantification of Transplante...
Intelligent and Automatic In vivo Detection and Quantification of Transplante...Intelligent and Automatic In vivo Detection and Quantification of Transplante...
Intelligent and Automatic In vivo Detection and Quantification of Transplante...
 
Re-budgeting & Report Tracking in KC
Re-budgeting & Report Tracking in KCRe-budgeting & Report Tracking in KC
Re-budgeting & Report Tracking in KC
 
Budget Development in KC
Budget Development in KCBudget Development in KC
Budget Development in KC
 
Submitting and Editing Proposals and Tracking Proposal Activity and COI Compl...
Submitting and Editing Proposals and Tracking Proposal Activity and COI Compl...Submitting and Editing Proposals and Tracking Proposal Activity and COI Compl...
Submitting and Editing Proposals and Tracking Proposal Activity and COI Compl...
 
Proposal Development in KC
Proposal Development in KCProposal Development in KC
Proposal Development in KC
 
Thomas D. Gregory 9 14-16
Thomas D. Gregory 9 14-16Thomas D. Gregory 9 14-16
Thomas D. Gregory 9 14-16
 
Taking an ancient path towards artificial intelligence 10-12-16
Taking an ancient path towards artificial intelligence 10-12-16Taking an ancient path towards artificial intelligence 10-12-16
Taking an ancient path towards artificial intelligence 10-12-16
 
Michigan State University coffee break: building a budget 10-20-16
Michigan State University coffee break: building a budget 10-20-16Michigan State University coffee break: building a budget 10-20-16
Michigan State University coffee break: building a budget 10-20-16
 
Domicology: Changing the CEM Paradigm
Domicology: Changing the CEM ParadigmDomicology: Changing the CEM Paradigm
Domicology: Changing the CEM Paradigm
 
Removal of Abandoned Properties Deconstruction vs.Demolition
Removal of Abandoned Properties Deconstruction vs.DemolitionRemoval of Abandoned Properties Deconstruction vs.Demolition
Removal of Abandoned Properties Deconstruction vs.Demolition
 
Advancing the Science of Domicology
Advancing the Science of DomicologyAdvancing the Science of Domicology
Advancing the Science of Domicology
 
Advancing Domicology for Sustainable Construction
Advancing Domicology for Sustainable ConstructionAdvancing Domicology for Sustainable Construction
Advancing Domicology for Sustainable Construction
 
Harnessing Microbe-Electrode Interactions for Bioenergy
Harnessing Microbe-Electrode Interactions for BioenergyHarnessing Microbe-Electrode Interactions for Bioenergy
Harnessing Microbe-Electrode Interactions for Bioenergy
 

Dernier

UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 

Dernier (20)

UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 

Securing Biometric Data with Visual Cryptography

  • 1. Cyber-Privacy: Securing Biometric Data Arun Ross Associate Professor Michigan State University rossarun@cse.msu.edu http://www.cse.msu.edu/~rossarun/ rossarun@cse.msu.edu
  • 2.  A large number of social, financial, business transactions are being conducted over the Internet  But Cyberspace is not just about data – it is also about individuals connected to the data CyberSpace Page: 2
  • 4.  Faces of Facebook: Privacy in the Age of Augmented Reality (Alessandro Acquisti et al)  Convergence of three technologies:  face recognition, cloud computing, online social networks  They investigated whether combination of publicly available Web 2.0 data and off-the-shelf face recognition software may allow large-scale, automated, end-user individual re- identification  Started from an anonymous face in the street, and ended up with very sensitive information about that person, in a process of data "accretion”  Combined face recognition with the algorithms they developed in 2009 to predict SSNs from public data Identifying People on the Web Page: 4
  • 5. Visual Cryptography: De-identifying Data Actual Face DATABASE 1 DATABASE 2 Ross and Othman, “Visual Cryptography for Biometrics Privacy”, TIFS 2011 Page: 5
  • 6.  Preserving the privacy of a user’s stored biometric data  Prevent cross-linking across applications  Prevent gleaning additional information from biometric data (e.g., medical ailment) Privacy Enhancing Technology Page: 6 Need to • Define Privacy Metrics • Guarantee Privacy • Develop Differential Privacy Schemes CYBERSECURITY CV for MSU: http://goo.gl/forms/QcRqagFM9F