Published inBiometricSecurityA system to monitor where, when and who use my biometric data!With the popularity of face recognition, you may not know who is collecting your face, and even what kind of information is collected, or…Dec 25, 2020Dec 25, 2020
Published inBiometricSecurityFace recognition at risk of abuseFace recognition has entered every aspect of life, the author as a biometric recognition researcher, face recognition and other aspects of…Nov 27, 2020Nov 27, 2020
Published inBiometricSecurityAnother case of abuse of face recognition:buying a house overpaid 300k CNYAs a researcher of biometric recognition, I pay special attention to the news of face recognition and so on, and think further about the…Nov 27, 2020Nov 27, 2020
Published inBiometricSecurityYour “face” can be bought for 50 cents“If you want, you can pack and take away 50 cents a piece, a total of 20,000 sets, no bargaining.” A seller told reporters using WeChat…Nov 12, 2020Nov 12, 2020
Fuzzy ExtractorFuzzy extractors are a cryptography primitive designed to reliably derive keys from noisy sources. This makes them suitable for areas like…Oct 29, 2020Oct 29, 2020
What is Biometric SecurityBiometric security devices measure unique characteristics of a person, such as voice pattern, the iris or retina pattern of the eye, or…Jan 13, 2020Jan 13, 2020
Published inComputerVisionWhen everyone starts to learn Python?Nowadays people are getting crazy about IT. A few days ago one top Richest man in China said he is learning Python. And soon every course…Nov 21, 2019Nov 21, 2019