Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update Biometrics.md #67

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

AothmanVeridium
Copy link

I would like to clarify something. There is quite a bit of confusion regarding stolen biometric information.
I agree that It is quite worrisome that hackers may have access to an individual’s biometric data and, like other private data that is stolen, the uses of this data can be quite damaging to an individual.

However, the misconception is that a stolen biometric data is the equivalent of a stolen password.

The difference relates to the input mechanism. A password can be inputted quite simply by entering the characters through any keyboard. A biometric in concept needs to be entered through a biometric capture device or by passing the capture mechanism.

First, the stolen images would need to be converted into a spoof artifact that can be used in order to measurable by the data capture sub-system. This requires an effort by the attacker and the knowledge. Then if the system has a liveness measure this attack most probably will not be successful at least on the large scale.

Second, Outside of presentation attacks, the stolen biometric data can only be used directly bypassing the biometric data capture device and inserting it prior to the feature extraction software. For this attack
to be successful, the security of the connection would need to be broken.

I would like to clarify something. There is quite a bit of confusion regarding stolen biometric information. 
I agree that It is quite worrisome that hackers may have access to an individual’s biometric data and, like other private data that is stolen, the uses of this data can be quite damaging to an individual. 

However, the misconception is that a stolen biometric data is the equivalent of a stolen password. 

The difference relates to the input mechanism. A password can be inputted quite simply by entering the characters through any keyboard. A biometric in concept needs to be entered through a biometric capture device or by passing the capture mechanism. 

First, the stolen images would need to be converted into a spoof artifact that can be used in order to measurable by the data capture sub-system. This requires an effort by the attacker and the knowledge. Then if the system has a liveness measure this attack most probably will not be successful at least on the large scale. 

Second, Outside of presentation attacks, the stolen biometric data can only be used directly bypassing the biometric data capture device and inserting it prior to the feature extraction software. For this attack 
to be successful, the security of the connection would need to be broken.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant