How to Preserve Privacy in Biometric Systems

Presented by

Arun Ross, Professor, MSU | Asem Othman, Lead Biometric Scientist, Veridium

About this talk

The use of biometrics for identification and authentication is driving significant advances in security, but as more organizations deploy biometric systems, privacy concerns are also rising. This is particularly true with regard to facial recognition, which has a high opportunity for abuse. In fact, improving the accuracy of biometric systems increases the opportunities for misuse. New algorithms can let hackers extract non-identifying data, such as personal health details, from biometrics. This data could also be used to identify an individual outside of the scope of the original system, such as matching their enrolled facial image to their social media profiles. These types of abuse are particularly problematic if these systems aren't also protected from cross-linking – where the data from two different systems is compared to identify an individual enrolled on both without their consent. An example of this would be cross-matching a banking customer with their health insurance account using biometrics they’ve enrolled on both. If your organization is contemplating using biometrics, watch this webinar to learn best practices for protecting people’s privacy and their biometrics. One of the world’s leading biometric scientists, Professor Arun Ross, will explore the importance of protecting biometric data, examples of how it can be abused, and systems for improving privacy. In this webinar we’ll discuss: How biometric data could be abused to learn information about individuals How to modify biometric data to preserve individual privacy How to assess the degree of privacy needed in any biometric system How Veridium encrypts and stores biometric data to optimize privacy as well as security

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (14)
Subscribers (1704)
Veridium is a leader in single-step multi-factor biometric authentication, designed to safeguard enterprises’ most critical assets: Their employees and data. The most common attack method that hackers exploit remains weak credentials. Passwords and tokens are flawed. That’s why Veridium has assembled an all-star team of developers and computer scientists with a singular mission: Eliminate passwords and tokens completely. Instead – your face, your fingerprints, and your voice are your credentials. Isn't it time you made the switch?