Loading Events

« All Events

  • This event has passed.

Ph.D. Proposal: Sohaib Ahmad

April 6 @ 2:00 pm - 3:00 pm EDT

Doctoral Proposal Oral Defense

Title: Privacy Leakages in Biometric Systems

Ph.D. Candidate: Sohaib Ahmad

Major Advisor: Dr. Benjamin Fuller

Associate Advisors: Dr. Alexander Russell, Dr. Caiwen Ding

Data/Time: Tuesday, April 6th, 2021, 2 PM


Meeting link : https://uconn-cmr.webex.com/uconn-cmr/j.php?MTID=mf7e7b47b6d2fa2aff935525a918a92f2

Password: MAyEibak735

Join by phone: +1-415-655-0002

Access code: 120 554 1696



A biometric is a biological trait used to identify and recognize humans. Biometrics are commonly used to authenticate users for sensitive applications. These applications can range from a user gaining access to a mobile phone or an employee entering a security sensitive facility. The process of recognizing humans from their biometrics involves many steps.

Segmentation is step one where biometric data is separated from non-biometric data. Feature extraction is step two where information is extracted from the biometric data to generate a template. This entire process is noisy due to a noisy biometric capturing process, imperfect segmentation and noisy feature extraction. The human iris is a biometric known to exhibit less noise than other popular biometrics such as the face and fingerprint. My research is two prong:

We first study the entire iris recognition process which involves iris segmentation from an image and then feature extraction performed on the segmented iris. Most of our studies are performed using deep learning networks where we identify key components in the iris recognition process and adapt to use deep learning effectively. We show competitive accuracy figures for both segmentation and recognition.

Secondly, privacy issues arise when using deep learning networks on sensitive data such as biometric images. Specifically, we study two attacks on deep neural networks: membership inference attacks and model inversion attacks. These attacks leak private information about individuals in certain settings and open a secure system to more powerful spoofing attacks where adversaries can gain unauthenticated access to a secure system. We discuss both attacks and defenses in multiple settings and the effect privacy preserving legislations (such as the GDPR) have on these attacks.




April 6
2:00 pm - 3:00 pm EDT

Connect With Us