IdentitySecurityPrivacyinComputerVisionnchoosek function in pythonThis will output:1 min read·Apr 18, 2021----
IdentitySecurityPrivacyinBiometricSecurityA system to monitor where, when and who use my biometric data!With the popularity of face recognition, you may not know who is collecting your face, and even what kind of information is collected, or…1 min read·Dec 25, 2020----
IdentitySecurityPrivacyinBiometricSecurityFace recognition at risk of abuseFace recognition has entered every aspect of life, the author as a biometric recognition researcher, face recognition and other aspects of…4 min read·Nov 27, 2020----
IdentitySecurityPrivacyinBiometricSecurityAnother case of abuse of face recognition:buying a house overpaid 300k CNYAs a researcher of biometric recognition, I pay special attention to the news of face recognition and so on, and think further about the…1 min read·Nov 27, 2020----
IdentitySecurityPrivacyinBiometricSecurityBiometric SecurityBiometric Security Overview3 min read·Nov 12, 2020----
IdentitySecurityPrivacyinBiometricSecurityYour “face” can be bought for 50 cents“If you want, you can pack and take away 50 cents a piece, a total of 20,000 sets, no bargaining.” A seller told reporters using WeChat…6 min read·Nov 12, 2020----
IdentitySecurityPrivacyFuzzy ExtractorFuzzy extractors are a cryptography primitive designed to reliably derive keys from noisy sources. This makes them suitable for areas like…1 min read·Oct 29, 2020----
IdentitySecurityPrivacyWhat is Biometric SecurityBiometric security devices measure unique characteristics of a person, such as voice pattern, the iris or retina pattern of the eye, or…4 min read·Jan 13, 2020----
IdentitySecurityPrivacyinComputerVisionWhen everyone starts to learn Python?Nowadays people are getting crazy about IT. A few days ago one top Richest man in China said he is learning Python. And soon every course…1 min read·Nov 21, 2019----