1. Now this is one interesting thing to read.All those claims by Saif Ali Khan in his ad promoting one company for face recognition feature introduction had made its way out of the IT World.....well....so it seems!!!!read ON.........
2. Experts from Bkis Internet Security in Vietnam have proven how easy it is to defeat this.In front of technology experts, authors and press representatives from different countries participating in an internet security conference, Bkis experts demonstrated the vulnerabilities in Face recognition function on Asus, Lenovo and Toshiba laptops. Even when set at the highest security level, the laptop could not prevent Bkis expert Mr Nguyen Minh Duc from breaking into the system. With some technical tricks, Duc in turn logged onto Asus, Lenovo and Toshiba computer at the amazement and continuous applause from the audience. Everyone was really surprised to see how a famous and trusted security technique could be broken so easily.A Pic is shown below from actual demo loc.In some cases,even the owners of Facebook profile photo could be printed and used.
3. What the researchers found is that the technology just isn't that hard to fool. Even photographs that have previously been digitized and distributed, like those on Web pages or transmitted through videophone conversations, will do the job.The model exploits the flaw in image processing. In other words, it uses a photo of a person instead of his/her real face. It works because the algorithms will process in effect digital information.Provided those conditions, an attacker might take some photos of one user within the system, perform some image editing, regenerate “special pictures” and penetrate into the system.
4. Now the worry point is that Biometric data, including facial recognition, is increasingly being built into passports, drivers licenses and other forms of ID. Australia and Germany both use facial recognition to control access and determine identity at border crossings, and the U.S. and other countries are moving in that direction. So....ab kya hogaaaa?
5. Thanks http://www.examiner.com,http://www.bkis.com and Chip magazine.
Certainly the tested implementations of facial recognition have their issues and it's good to know about them. That's a far cry, however, from saying that ALL implementations have the same weaknesses. There's a very strong version from Sensible Vision/Dell Computers, for example (NOT evaluated by the researchers...interesting), that not only has very strong photo resistance, but also a very straight forward second factor feature that all but resolves the issue entirely.
ReplyDeleteIt also takes a bigger picture look at security by locking the desktop automatically when you walk away...a wide open desktop being a much bigger threat than a brute force photo attack since "hacking" an already open machine doesn't require any skill, effort or time at all...just physical proximity!
Of course no solution is perfect or ever will be. Given enough time and physical access, absolutely any security can by bypassed. It's really a matter of picking the right tools to make this as difficult as possible given the threats likely to be faced while still keeping the computer easy (or at least not too much more difficult) to use in the process.
Full disclosure - I have worked for Sensible Vision for quite some time now. We've successfully used this technology for several years already to protect security critical PCs in hospitals, banks - even a maximum security prison. The new consumer Dell platform is based on the same technology.
Here is a link to our online response to this testing. http://www.sensiblevision.com/company/releases/2-24-09.htm
thanks for the invaluable comments darin
ReplyDelete