- This event has passed.
Ph.D. Proposal: Sohaib Ahmad
April 6 @ 2:00 pm - 3:00 pm EDT
Doctoral Proposal Oral Defense
Title: Privacy Leakages in Biometric Systems
Ph.D. Candidate: Sohaib Ahmad
Major Advisor: Dr. Benjamin Fuller
Associate Advisors: Dr. Alexander Russell, Dr. Caiwen Ding
Data/Time: Tuesday, April 6th, 2021, 2 PM
Join by phone: +1-415-655-0002
Access code: 120 554 1696
A biometric is a biological trait used to identify and recognize humans. Biometrics are commonly used to authenticate users for sensitive applications. These applications can range from a user gaining access to a mobile phone or an employee entering a security sensitive facility. The process of recognizing humans from their biometrics involves many steps.
Segmentation is step one where biometric data is separated from non-biometric data. Feature extraction is step two where information is extracted from the biometric data to generate a template. This entire process is noisy due to a noisy biometric capturing process, imperfect segmentation and noisy feature extraction. The human iris is a biometric known to exhibit less noise than other popular biometrics such as the face and fingerprint. My research is two prong:
We first study the entire iris recognition process which involves iris segmentation from an image and then feature extraction performed on the segmented iris. Most of our studies are performed using deep learning networks where we identify key components in the iris recognition process and adapt to use deep learning effectively. We show competitive accuracy figures for both segmentation and recognition.
Secondly, privacy issues arise when using deep learning networks on sensitive data such as biometric images. Specifically, we study two attacks on deep neural networks: membership inference attacks and model inversion attacks. These attacks leak private information about individuals in certain settings and open a secure system to more powerful spoofing attacks where adversaries can gain unauthenticated access to a secure system. We discuss both attacks and defenses in multiple settings and the effect privacy preserving legislations (such as the GDPR) have on these attacks.