{"id":304,"date":"2011-12-17T00:31:09","date_gmt":"2011-12-16T16:31:09","guid":{"rendered":"http:\/\/ykyi.net\/?p=304"},"modified":"2011-12-17T00:31:09","modified_gmt":"2011-12-16T16:31:09","slug":"is-your-biometric-data-safe","status":"publish","type":"post","link":"https:\/\/ykyi.net\/?p=304","title":{"rendered":"Is your biometric data safe"},"content":{"rendered":"<div>\n<p>Kot<span style=\"font-family: \u5b8b\u4f53;\">\u6559\u6388\u7684\u8fd9\u4e2a\u8bb2\u5ea7\u5728\u7f51\u9875\u4e0a\u5199\u7684\u6807\u9898\u662f\uff1a<\/span>IEEE&nbsp;Distinguished&nbsp;Lecture&nbsp;Talk\u3002\u591a\u4e48\u6c14\u8d28\u4e0d\u51e1\u7684<span style=\"font-family: Times New Roman;\">Distinguished<\/span><span style=\"font-family: \u5b8b\u4f53;\">\u554a\uff01\uff01\uff01\u4f5c\u4e3a\u4e00\u4e2a\u5c0f\u5de5\u7a0b\u7855\uff0c\u5b9e\u5728\u6709\u53d7\u5ba0\u82e5\u60ca\u4e4b\u611f\u3002<\/span><\/p>\n<p>\u8bb2\u5ea7\u7684\u5927\u6982\u8bb2\u7684<span style=\"font-family: Times New Roman;\">Kot<\/span><span style=\"font-family: \u5b8b\u4f53;\">\u6559\u6388\u63d0\u51fa\u4e86\u5982\u4f55\u6784\u5efa\u4e00\u4e2a\u65b0\u9896\u7684<\/span><span style=\"font-family: Times New Roman;\">(novel)<\/span><span style=\"font-family: \u5b8b\u4f53;\">\u7cfb\u7edf\u6765\u4fdd\u8bc1<\/span><span style=\"font-family: Times New Roman;\">Biometric<\/span><span style=\"font-family: \u5b8b\u4f53;\">\u4fe1\u606f\u5728\u670d\u52a1\u7aef\u7684\u5b89\u5168\u3002\u5373\u4f7f\u8fd9\u90e8\u5206\u4fe1\u606f\u6cc4\u9732\u51fa\u53bb\uff0c\u653b\u51fb\u8005\u4e5f\u4e0d\u80fd\u591f\u5229\u7528\u5b83\u3002\u9996\u5148\u4ec0\u4e48\u662f<\/span><span style=\"font-family: Times New Roman;\">BIOMETRIC<\/span><span style=\"font-family: \u5b8b\u4f53;\">\u5462\uff1f\u4f60\u7684\u6307\u7eb9\uff0c\u4f60\u7684\u9762\u90e8\uff0c\u4f60\u7684\u5934\u53d1<\/span><span style=\"font-family: Times New Roman;\">&#8230;<\/span><span style=\"font-family: \u5b8b\u4f53;\">\u90fd\u5c5e\u4e8e<\/span><span style=\"font-family: Times New Roman;\">Biometric<\/span><span style=\"font-family: \u5b8b\u4f53;\">\u3002\u5176\u5b9e<\/span><span style=\"font-family: Times New Roman;\">Biometric<\/span><span style=\"font-family: \u5b8b\u4f53;\">\u5bf9\u4e8e\u5927\u5bb6\u90fd\u4e0d\u4f1a\u964c\u751f\uff0c\u6307\u7eb9\u8003\u52e4\u7cfb\u7edf\u5b9e\u5728\u662f\u76f8\u5f53\u4e4b\u666e\u904d\u554a\u3002\u800c\u4e14\u79d1\u5e7b\u6216\u8005\u72af\u7f6a\u7535\u5f71\u91cc\u8fd8\u6709\u8679\u819c\u6821\u9a8c\u3002<\/span><\/p>\n<p>Kot<span style=\"font-family: \u5b8b\u4f53;\">\u6559\u6388\u63d0\u51fa<\/span><span style=\"font-family: Times New Roman;\">Biometric<\/span><span style=\"font-family: \u5b8b\u4f53;\">\u7684\u9a8c\u8bc1\u7cfb\u7edf\u7684\u4e0d\u5b89\u5168\u7684\u65b9\u9762\uff0c\u5982\u679c\u88ab\u6cc4\u9732\u51fa\u53bb\uff0c<\/span><span style=\"font-family: Times New Roman;\">Biometric<\/span><span style=\"font-family: \u5b8b\u4f53;\">\u4fe1\u606f\u4e0d\u50cf\u666e\u901a\u5bc6\u7801\u4e00\u6837\u5bb9\u6613\u88ab\u66f4\u6362\uff0c\u4e00\u4f46\u88ab\u4f2a\u9020\u8fd9\u6837\u5c31\u4f1a\u6bd4\u4f20\u7edf\u7684\u9a8c\u8bc1\u65b9\u6cd5\u66f4\u52a0\u9ebb\u70e6\u3002<\/span><span style=\"font-family: Times New Roman;\">Prof.&nbsp;Kot<\/span><span style=\"font-family: \u5b8b\u4f53;\">\u7b80\u5355\u5730<\/span><span style=\"font-family: Times New Roman;\">walk&nbsp;through<\/span><span style=\"font-family: \u5b8b\u4f53;\">\u4e86\u51e0\u4e2a\u4fdd\u62a4<\/span><span style=\"font-family: Times New Roman;\">Biometric<\/span><span style=\"font-family: \u5b8b\u4f53;\">\u7684\u89e3\u51b3\u65b9\u6848\uff0c\u5e76\u8bf4\u660e<\/span><span style=\"font-family: Times New Roman;\">Biometric<\/span><span style=\"font-family: \u5b8b\u4f53;\">\u4fe1\u606f\u662f\u53ef\u4ee5\u88ab\u5229\u7528\u88ab\u4f2a\u9020\u7684\u3002<\/span><\/p>\n<p>PPT<span style=\"font-family: \u5b8b\u4f53;\">\u4e2d\u591a\u6b21\u63d0\u5230<\/span><span style=\"font-family: Times New Roman;\">M<\/span>inutiae<span style=\"font-family: \u5b8b\u4f53;\">\u7684\u6982\u5ff5\uff0c\u4e00\u76f4\u6ca1\u542c\u660e\u767d\u554a\uff01\u8c8c\u4f3c\u662f\u4ece\u539f\u59cb\u7684<\/span><span style=\"font-family: Times New Roman;\">Biometric<\/span><span style=\"font-family: \u5b8b\u4f53;\">\u4fe1\u606f\u4e2d\u63d0\u53d6\u51fa\u90e8\u5206\u4fe1\u606f\u800c\u4f5c\u4e3a\u7528\u6765\u9a8c\u8bc1\u7684\u6570\u636e\u3002<\/span><span style=\"font-family: Times New Roman;\">Professor&nbsp;Kot<\/span><span style=\"font-family: \u5b8b\u4f53;\">\u8bba\u8bc1\u5e38\u89c1\u7684\u57fa\u4e8e\u6307\u7eb9\u7684\u9a8c\u8bc1\u7cfb\u7edf\u7684\u5f0a\u7aef\u3002\u8bba\u8bc1\u4e2d\u975e\u5e38\u591a\u7684&ldquo;<\/span><span style=\"font-family: Times New Roman;\">valley<\/span><span style=\"font-family: \u5b8b\u4f53;\">&rdquo;\uff0c<\/span><span style=\"font-family: Times New Roman;\">&quot;ridge&quot;<\/span><span style=\"font-family: \u5b8b\u4f53;\">\uff0c\u6bd4\u8f83\u53d8\u6362\u524d\u540e\u7684\u5dee\u5f02\u3002\u4e0d\u660e\u767d\u554a\uff0c\u4e0d\u660e\u767d\uff01\u5927\u6982\u7684\u7ed3\u8bba\u662f\u76ee\u524d\u7684\u6280\u672f\u53ef\u4ee5\u505a\u5230\u4ece<\/span><span style=\"font-family: Times New Roman;\">Minutiae<\/span><span style=\"font-family: \u5b8b\u4f53;\">\u4e2d<\/span><span style=\"font-family: Times New Roman;\">reconstruct<\/span><span style=\"font-family: \u5b8b\u4f53;\">\u5230\u539f\u59cb\u7684<\/span><span style=\"font-family: Times New Roman;\">original&nbsp;fingerprint<\/span><span style=\"font-family: \u5b8b\u4f53;\">\u3002\u540e\u6765\u60f3\u8fd9\u65f6\u5019\u8bba\u8bc1\u7684\u662f\u4e3a\u4e86\u652f\u6491\u5176\u540e<\/span><span style=\"font-family: Times New Roman;\">Prof.&nbsp;Kot<\/span><span style=\"font-family: \u5b8b\u4f53;\">\u63d0\u51fa\u7684\u65b0\u7684<\/span><span style=\"font-family: Times New Roman;\">novel&nbsp;solution.<\/span><\/p>\n<p>Kot<span style=\"font-family: \u5b8b\u4f53;\">\u63d0\u51fa\u7684\u89e3\u51b3\u65b9\u6848\u662f\u5728\u91c7\u96c6\u6307\u7eb9\u4fe1\u606f\u65f6\u9700\u8981\u91c7\u96c6\u7528\u6237\u7684\u4e24\u4e2a\u4e0d\u540c\u7684\u624b\u6307\uff0c\u7136\u540e\u7efc\u5408\u8fd9\u4e24\u4e2a\u624b\u6307\u7684\u4fe1\u606f\u8ba1\u7b97\u51fa\u4e00\u4e2a<\/span><span style=\"font-family: Times New Roman;\">Minutiae<\/span><span style=\"font-family: \u5b8b\u4f53;\">\u3002\u8fd9\u4e2a<\/span><span style=\"font-family: Times New Roman;\">Minutiae<\/span><span style=\"font-family: \u5b8b\u4f53;\">\u4e0e\u4ece\u91c7\u96c6\u5355\u4e2a\u624b\u6307\u5f97\u5230\u7684<\/span><span style=\"font-family: Times New Roman;\">Minutiae<\/span><span style=\"font-family: \u5b8b\u4f53;\">\u51e0\u4e4e\u6ca1\u6709\u5dee\u522b\u3002\u56e0\u4e3a\u8fd9\u4e2a<\/span><span style=\"font-family: Times New Roman;\">Minutiae<\/span><span style=\"font-family: \u5b8b\u4f53;\">\u8bb0\u8f7d\u7684\u662f\u4e24\u4e2a\u4e0d\u540c\u624b\u6307\u7684\u4fe1\u606f\uff0c\u800c\u4e14\u6bcf\u4e2a\u624b\u6307\u4ec5\u4ec5\u53ea\u8bb0\u90e8\u5206\u4fe1\u606f\u3002\u8fd9\u6837\u7684\u8bdd\uff0c\u5373\u4f7f\u653b\u51fb\u8005\u76d7\u53d6\u4e86\u8fd9\u4e2a<\/span><span style=\"font-family: Times New Roman;\">Minutiae<\/span><span style=\"font-family: \u5b8b\u4f53;\">\uff0c\u5b83\u5c31\u65e0\u6cd5\u539f\u59cb\u5230\u539f\u59cb\u7684<\/span><span style=\"font-family: Times New Roman;\">fingerprint<\/span><span style=\"font-family: \u5b8b\u4f53;\">\u3002\u6309\u6211\u81ea\u5df1\u7684\u7406\u89e3\uff0c\u653b\u51fb\u8005\u5e94\u8be5\u4e5f\u4e0d\u6e05\u695a\u5b83\u8fd8\u539f\u5f97\u5230\u7684\u6307\u7eb9\u5176\u5b9e\u5e76\u4e0d\u5b58\u5728\uff0c\u56e0\u4e3a<\/span><span style=\"font-family: Times New Roman;\">Minutiae<\/span><span style=\"font-family: \u5b8b\u4f53;\">\u662f\u4e24\u4e2a\u6307\u7eb9\u7684\u4fe1\u606f\u5408\u6210\u7684\u800c\u4e14\u4e0e\u7531\u5355\u4e2a\u6307\u7eb9\u5f97\u5230\u7684\u51e0\u4e4e\u4e00\u6837\uff0c\u653b\u51fb\u8005\u65e0\u6cd5\u5206\u8fa8\u3002\u653b\u51fb\u8005\u5e94\u8be5\u4f1a\u6cbe\u6cbe\u81ea\u559c<\/span><span style=\"font-family: Times New Roman;\">reconstruct<\/span><span style=\"font-family: \u5b8b\u4f53;\">\u5230\u4e86\u88ab\u8bef\u5bfc\u7684<\/span><span style=\"font-family: Times New Roman;\">original&nbsp;finger&nbsp;print<\/span><span style=\"font-family: \u5b8b\u4f53;\">\u3002<\/span><\/p>\n<p>Kot<span style=\"font-family: \u5b8b\u4f53;\">\u8fd8\u6307\u51fa\u5728\u4ed6\u63d0\u51fa\u7684\u8fd9\u4e2a\u89e3\u51b3\u65b9\u6848\u4e2d\u53ef\u4ee5\u5d4c\u5165\u4fe1\u606f\u8bb0\u5230<\/span><span style=\"font-family: Times New Roman;\">Minutiae<\/span><span style=\"font-family: \u5b8b\u4f53;\">\u91cc\u9762\u3002\u5728\u540e\u9762\u7684\u63d0\u95ee\u9636\u6bb5\u3002\u6709\u540c\u5b66\u95ee\u5230\u8fd9\u4e2a\u89e3\u51b3\u65b9\u6848\u53ef\u4ee5\u5b58\u5165\u591a\u5c11\u4fe1\u606f\u3002<\/span><span style=\"font-family: Times New Roman;\">Kot<\/span><span style=\"font-family: \u5b8b\u4f53;\">\u8865\u5145\u76ee\u524d\u53ef\u4ee5\u5b58\u4e00\u5343\u591a\u4e2a<\/span><span style=\"font-family: Times New Roman;\">Bit<\/span><span style=\"font-family: \u5b8b\u4f53;\">\u4f4d\u4fe1\u606f\uff0c\u8db3\u591f\u5b58\u4e0b\u91cd\u8981\u7684\u8eab\u4efd\u8ba4\u8bc1\u6570\u636e\u4e86\u3002\u6309\u6211\u81ea\u5df2\u7684\u7406\u89e3\uff0c\u80fd\u5b58\u591a\u5c11\u4fe1\u606f\u5e94\u8be5\u662f\u53ef\u4ee5\u6839\u636e\u9700\u8981\u8c03\u5927\u548c\u7f29\u5c0f\u7684\u5440\u3002\u6bd4\u5982\u628a\u56fe\u5f62\u8f6c\u6210\u77e2\u91cf\u56fe\u5f62\u540e\uff0c\u5c31\u53ef\u4ee5\u4e0d\u5931\u771f\u7684\u653e\u5927\uff0c\u4e8e\u662f\u5c31\u4f1a\u6709\u66f4\u591a\u5b58\u50a8\u7a7a\u95f4\u4e86\u3002\u4e0d\u786e\u5b9a\u662f\u4e0d\u662f\u8fd9\u6837\u3002<\/span><\/p>\n<p>\u63d0\u95ee\u9636\u6bb5<span style=\"font-family: Times New Roman;\">Kot<\/span><span style=\"font-family: \u5b8b\u4f53;\">\u6307\u51fa\u8fd9\u4e2a\u8bbe\u8ba1\u6ca1\u6709\u4f7f\u7528<\/span>token\u6216\u8005key<span style=\"font-family: \u5b8b\u4f53;\">\u56e0\u6b64\u4f1a\u8fd0\u884c\u7684\u975e\u5e38\u8fc5\u901f\u3002\u800c\u5982\u679c\u91c7\u7528\u590d\u6742\u7684\u52a0\u89e3\u5bc6\u7b97\u6cd5\uff0c\u5219\u4f1a\u6709\u975e\u5e38\u5927\u7684\u8ba1\u7b97\u5f00\u9500\u3002\u8fd0\u884c\u901f\u5ea6\u5bf9\u4e8e\u4e00\u4e9b\u5d4c\u5165\u5f0f\u7684\u7535\u5b50\u7cfb\u7edf\u662f\u81f3\u5173\u91cd\u8981\u7684\u3002<\/span><\/p>\n<p>\u6709\u540c\u5b66\u63d0\u95ee\u63d0\u5230\u505a<span style=\"font-family: Times New Roman;\">Face&nbsp;Recognition<\/span><span style=\"font-family: \u5b8b\u4f53;\">\uff0c\u95ee<\/span><span style=\"font-family: Times New Roman;\">Kot<\/span><span style=\"font-family: \u5b8b\u4f53;\">\u6559\u6388\u6709\u4ec0\u4e48\u770b\u6cd5\u3002<\/span><span style=\"font-family: Times New Roman;\">Kot<\/span><span style=\"font-family: \u5b8b\u4f53;\">\u8ba4\u4e3a<\/span><span style=\"font-family: Times New Roman;\">Face&nbsp;Recognition&nbsp;is&nbsp;very&nbsp;difficult,&nbsp;very&nbsp;very&nbsp;difficult,&nbsp;few&nbsp;advancement&nbsp;has&nbsp;been&nbsp;achieved&nbsp;nowadays.&nbsp;It&#39;s&nbsp;a&nbsp;very&nbsp;tough&nbsp;problem.<\/span><\/p>\n<p>At&nbsp;last,&nbsp;as&nbsp;a&nbsp;conclusion&nbsp;for&nbsp;this&nbsp;report,&nbsp;I&nbsp;must&nbsp;show&nbsp;my&nbsp;great&nbsp;respect&nbsp;to&nbsp;Alex&nbsp;Kot.&nbsp;He&nbsp;is&nbsp;a&nbsp;great&nbsp;scientist.<\/p>\n<p>\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/<\/p>\n<p align=\"center\"><strong>IEEE Distinguished Lecture Talk<\/strong><\/p>\n<p><strong>Title<\/strong><strong>\uff1a<\/strong><strong>Is your biometric data safe?<\/strong><\/p>\n<p><strong>Speaker<\/strong><strong><span style=\"font-family: \u5b8b\u4f53;\">\uff1a<\/span><\/strong><strong>Prof. Alex C Kot, <\/strong><strong><span style=\"font-family: \u5b8b\u4f53;\">\u65b0\u52a0\u5761\u5357\u6d0b\u7406\u5de5\u5927\u5b66\u6559\u6388\u3001<\/span><\/strong><strong>IEEE Fellow<\/strong><\/p>\n<p><strong>\u65f6<\/strong><strong>&nbsp; <\/strong><strong>\u95f4\uff1a<\/strong><strong> &nbsp;12\u6708<strong>16<\/strong><strong>\u65e5<\/strong>\uff08\u672c\u5468\u4e94\uff09\u4e0b\u5348<\/strong><strong>3<\/strong><strong>\uff1a<\/strong><strong>00<\/strong><\/p>\n<p><strong>\u5730<\/strong><strong>&nbsp; <\/strong><strong>\u70b9\uff1a<\/strong><strong>&nbsp; <\/strong><strong>\u4fe1\u606f\u79d1\u6280\u5b66\u9662\u5927\u697c\u4e8c\u697c207<\/strong><strong>\u8bb2\u5b66\u5385<\/strong><\/p>\n<p><strong>\u4e3b\u6301\u4eba\uff1a<\/strong><strong> &nbsp;<\/strong><strong>\u9ec4\u7ee7\u6b66 <\/strong>\u6559\u6388<\/p>\n<p><strong>\u4e3b\u529e\u5355\u4f4d\uff1a\u4fe1\u606f\u79d1\u5b66\u4e0e\u6280\u672f\u5b66\u9662\u3001<\/strong><strong>IEEE Signal Processing Society Guangzhou Chapter, IEEE Circuits and Systems Society Guangzhou Chapter<\/strong><\/p>\n<p><span style=\"font-family: \u5b8b\u4f53;\">&nbsp;<\/span><\/p>\n<p><strong>Abstract<\/strong><\/p>\n<p><span style=\"font-size: small;\">Nowadays, biometrics is widely used in authentication systems. In general, biometrics needs to be stored in a database for subsequent authentication. However, templates stored in the database are at the risk of being stolen or modified. Once the template is stolen, it is difficult to be replaced like passwords and the private user information associated with the stolen template would also be exposed. Thus, biometrics templates should be stored in the database such that both the security of the template and the privacy of the user are not compromised under various attacks.<\/span><\/p>\n<p><span style=\"font-family: \u5b8b\u4f53; font-size: small;\">&nbsp;<\/span><\/p>\n<p><span style=\"font-size: small;\">&nbsp;We first propose a fingerprint authentication system for the privacy protection of the fingerprint template stored in a database. The considered fingerprint data is a binary thinned fingerprint image, which will be embedded with some private user information without causing obvious abnormality in the enrollment phase. In the authentication phase, these hidden user data can be extracted from the stored template for verifying the authenticity of the person who provides the query fingerprint. A novel data hiding scheme is proposed for the thinned fingerprint template. Compared with using existing binary image data hiding techniques, the proposed method causes the least abnormality for a thinned fingerprint without compromising the performance of the fingerprint identification.<\/span><\/p>\n<p><span style=\"font-family: \u5b8b\u4f53; font-size: small;\">&nbsp;<\/span><\/p>\n<p><span style=\"font-size: small;\">The minutiae is another type of data stored in a fingerprint template. We investigate to what extreme a reconstructed fingerprint can be similar to the original fingerprint. A new scheme is proposed to reconstruct a full fingerprint image from the minutiae points.&nbsp; Experimental results show that the successful match rate between our reconstructed fingerprint and the original fingerprint is over 99% at FAR=10<sup>-4<\/sup>. When matched against the different impressions of the original fingerprint, our reconstructed fingerprint has over 86% successful match rate at FAR=10<sup>-4<\/sup>. We consider the privacy issues of the fingerprint reconstruction. The analysis shows that our proposed technique is useful for protecting the fingerprint ridge frequency.<\/span><\/p>\n<p><span style=\"font-family: \u5b8b\u4f53; font-size: small;\">&nbsp;<\/span><\/p>\n<p><span style=\"font-size: small;\">&nbsp;As a reconstructed fingerprint can be so similar to the original fingerprint, it is also very important to protect the privacy of the minutiae template stored in a database. We propose a novel system for protecting the privacy of the fingerprint minutiae without using a token or key. In the enrollment, two fingerprints are captured from two different fingers of the same person. A combined minutiae template containing only a partial minutiae feature of each of the two fingerprints will be generated and stored in a database. In the authentication, the user needs to provide two query fingerprints from the same two fingers which are used in the enrollment. By storing the combined minutiae template, the complete minutiae feature of a single fingerprint will not be compromised when the database is stolen. Furthermore, because of the similarity in topology, it is also difficult for the attacker to distinguish our template from the minutiae of an original fingerprint. The experimental results show that our system can achieve a very low error rate.<\/span><\/p>\n<p><strong>Biography<\/strong><\/p>\n<p><span style=\"font-size: small;\">Dr Kot has been with the Nanyang Technological University, Singapore since 1991. He headed the Division of Information Engineering at the School of Electrical and Electronic Engineering for eight years until 2005. The Division<span style=\"font-family: \u5b8b\u4f53;\">&rsquo;<\/span>s research focuses are on signal processing for image, video, speech and audio. He started serving as Vice-Dean (Research) for the School of EEE in 2005 and became Associate Dean for the College of Engineering in 2008. He is currently a Professor at the School of EEE and Associate Dean for the College of Engineering. He has published extensively with over 200 technical papers and 3 patents in the areas of signal processing for communication, biometrics recognition, data-hiding, authentication and media forensics.&nbsp; <\/span><\/p>\n<p><span style=\"font-family: \u5b8b\u4f53; font-size: small;\">&nbsp;<\/span><\/p>\n<p><span style=\"font-size: small;\">Dr. Kot served as Associate Editor for the IEEE Trans. on Signal Processing, IEEE Trans. on Multimedia, IEEE Trans. on Circuits and Systems for Video Technology; and IEEE Trans. on Circuits and Systems Part II as well as Part I. He also served as Guest Editor for the Special Issues for the IEEE Trans\/ on CSVT and JASP. He is currently Associate Editor for the IEEE Trans. on Information, Forensics and Security, IEEE Trans. on Image Processing and IEEE Signal Processing Letter. He is also Editor for the EURASIP Journal of Advanced Signal Processing, the IEEE Signal Processing Magazine and the IEEE Journal of the Special Topics in Signal Processing. He is an Editorial Board member of the Journal of Fundamental and Theory in Signal Processing. He serves in the IEEE CAS Visual Signal Processing and Communication, the IEEE SPS Image and Video Multi-dimensional Signal Processing and IEEE SPS Information Forensic and Security technical committees. He has served the IEEE Society in various capacities such as the General Co-Chair for the 2004 IEEE International Conference on Image Processing (ICIP) and Chair of the worldwide SPS Chapter Chairs and the Distinguished Lecturer program. He serves as IEEE Fellow Evaluation Committee. He received the Best Teacher of the Year Award and is a co-author for several Best Paper Awards including ICPR, WIFS and IWDW. He was the IEEE Distinguished Lecturer in 2005 and 2006 and is a Fellow of IEEE and IES. <\/span><\/p>\n<\/div>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Kot\u6559\u6388\u7684\u8fd9\u4e2a\u8bb2\u5ea7\u5728\u7f51\u9875\u4e0a\u5199\u7684\u6807\u9898\u662f\uff1aIEEE&nbsp;Distinguished&nbsp;Lecture&nbsp;Talk\u3002\u591a\u4e48\u6c14\u8d28\u4e0d\u51e1\u7684Distinguished\u554a\uff01\uff01\uff01\u4f5c\u4e3a\u4e00\u4e2a\u5c0f\u5de5\u7a0b\u7855\uff0c\u5b9e\u5728\u6709\u53d7\u5ba0\u82e5\u60ca\u4e4b\u611f\u3002 \u8bb2\u5ea7\u7684\u5927\u6982\u8bb2\u7684Kot\u6559\u6388\u63d0\u51fa\u4e86\u5982\u4f55\u6784\u5efa\u4e00\u4e2a\u65b0\u9896\u7684(novel)\u7cfb\u7edf\u6765\u4fdd\u8bc1Biometric\u4fe1\u606f\u5728\u670d\u52a1\u7aef\u7684\u5b89\u5168\u3002\u5373\u4f7f\u8fd9\u90e8\u5206\u4fe1\u606f\u6cc4\u9732\u51fa\u53bb\uff0c\u653b\u51fb\u8005\u4e5f\u4e0d\u80fd\u591f\u5229\u7528\u5b83\u3002\u9996\u5148\u4ec0\u4e48\u662fBIOMETRIC\u5462\uff1f\u4f60\u7684\u6307\u7eb9\uff0c\u4f60\u7684\u9762\u90e8\uff0c\u4f60\u7684\u5934\u53d1&#8230;\u90fd\u5c5e\u4e8eBiometric\u3002\u5176\u5b9eBiometric\u5bf9\u4e8e\u5927\u5bb6\u90fd\u4e0d\u4f1a\u964c\u751f\uff0c\u6307\u7eb9\u8003\u52e4\u7cfb\u7edf\u5b9e\u5728\u662f\u76f8\u5f53\u4e4b\u666e\u904d\u554a\u3002\u800c\u4e14\u79d1\u5e7b\u6216\u8005\u72af\u7f6a\u7535\u5f71\u91cc\u8fd8\u6709\u8679\u819c\u6821\u9a8c\u3002 Kot\u6559\u6388\u63d0\u51faBiometric\u7684\u9a8c\u8bc1\u7cfb\u7edf\u7684\u4e0d\u5b89\u5168\u7684\u65b9\u9762\uff0c\u5982\u679c\u88ab\u6cc4\u9732\u51fa\u53bb\uff0cBiometric\u4fe1\u606f\u4e0d\u50cf\u666e\u901a\u5bc6\u7801\u4e00\u6837\u5bb9\u6613\u88ab\u66f4\u6362\uff0c\u4e00\u4f46\u88ab\u4f2a\u9020\u8fd9\u6837\u5c31\u4f1a\u6bd4\u4f20\u7edf\u7684\u9a8c\u8bc1\u65b9\u6cd5\u66f4\u52a0\u9ebb\u70e6\u3002Prof.&nbsp;Kot\u7b80\u5355\u5730walk&nbsp;through\u4e86\u51e0\u4e2a\u4fdd\u62a4Biometric\u7684\u89e3\u51b3\u65b9\u6848\uff0c\u5e76\u8bf4\u660eBiometric\u4fe1\u606f\u662f\u53ef\u4ee5\u88ab\u5229\u7528\u88ab\u4f2a\u9020\u7684\u3002 PPT\u4e2d\u591a\u6b21\u63d0\u5230Minutiae\u7684\u6982\u5ff5\uff0c\u4e00\u76f4\u6ca1\u542c\u660e\u767d\u554a\uff01\u8c8c\u4f3c\u662f\u4ece\u539f\u59cb\u7684Biometric\u4fe1\u606f\u4e2d\u63d0\u53d6\u51fa\u90e8\u5206\u4fe1\u606f\u800c\u4f5c\u4e3a\u7528\u6765\u9a8c\u8bc1\u7684\u6570\u636e\u3002Professor&nbsp;Kot\u8bba\u8bc1\u5e38\u89c1\u7684\u57fa\u4e8e\u6307\u7eb9\u7684\u9a8c\u8bc1\u7cfb\u7edf\u7684\u5f0a\u7aef\u3002\u8bba\u8bc1\u4e2d\u975e\u5e38\u591a\u7684&ldquo;valley&rdquo;\uff0c&quot;ridge&quot;\uff0c\u6bd4\u8f83\u53d8\u6362\u524d\u540e\u7684\u5dee\u5f02\u3002\u4e0d\u660e\u767d\u554a\uff0c\u4e0d\u660e\u767d\uff01\u5927\u6982\u7684\u7ed3\u8bba\u662f\u76ee\u524d\u7684\u6280\u672f\u53ef\u4ee5\u505a\u5230\u4eceMinutiae\u4e2dreconstruct\u5230\u539f\u59cb\u7684original&nbsp;fingerprint\u3002\u540e\u6765\u60f3\u8fd9\u65f6\u5019\u8bba\u8bc1\u7684\u662f\u4e3a\u4e86\u652f\u6491\u5176\u540eProf.&nbsp;Kot\u63d0\u51fa\u7684\u65b0\u7684novel&nbsp;solution. Kot\u63d0\u51fa\u7684\u89e3\u51b3\u65b9\u6848\u662f\u5728\u91c7\u96c6\u6307\u7eb9\u4fe1\u606f\u65f6\u9700\u8981\u91c7\u96c6\u7528\u6237\u7684\u4e24\u4e2a\u4e0d\u540c\u7684\u624b\u6307\uff0c\u7136\u540e\u7efc\u5408\u8fd9\u4e24\u4e2a\u624b\u6307\u7684\u4fe1\u606f\u8ba1\u7b97\u51fa\u4e00\u4e2aMinutiae\u3002\u8fd9\u4e2aMinutiae\u4e0e\u4ece\u91c7\u96c6\u5355\u4e2a\u624b\u6307\u5f97\u5230\u7684Minutiae\u51e0\u4e4e\u6ca1\u6709\u5dee\u522b\u3002\u56e0\u4e3a\u8fd9\u4e2aMinutiae\u8bb0\u8f7d\u7684\u662f\u4e24\u4e2a\u4e0d\u540c\u624b\u6307\u7684\u4fe1\u606f\uff0c\u800c\u4e14\u6bcf\u4e2a\u624b\u6307\u4ec5\u4ec5\u53ea\u8bb0\u90e8\u5206\u4fe1\u606f\u3002\u8fd9\u6837\u7684\u8bdd\uff0c\u5373\u4f7f\u653b\u51fb\u8005\u76d7\u53d6\u4e86\u8fd9\u4e2aMinutiae\uff0c\u5b83\u5c31\u65e0\u6cd5\u539f\u59cb\u5230\u539f\u59cb\u7684fingerprint\u3002\u6309\u6211\u81ea\u5df1\u7684\u7406\u89e3\uff0c\u653b\u51fb\u8005\u5e94\u8be5\u4e5f\u4e0d\u6e05\u695a\u5b83\u8fd8\u539f\u5f97\u5230\u7684\u6307\u7eb9\u5176\u5b9e\u5e76\u4e0d\u5b58\u5728\uff0c\u56e0\u4e3aMinutiae\u662f\u4e24\u4e2a\u6307\u7eb9\u7684\u4fe1\u606f\u5408\u6210\u7684\u800c\u4e14\u4e0e\u7531\u5355\u4e2a\u6307\u7eb9\u5f97\u5230\u7684\u51e0\u4e4e\u4e00\u6837\uff0c\u653b\u51fb\u8005\u65e0\u6cd5\u5206\u8fa8\u3002\u653b\u51fb\u8005\u5e94\u8be5\u4f1a\u6cbe\u6cbe\u81ea\u559creconstruct\u5230\u4e86\u88ab\u8bef\u5bfc\u7684original&nbsp;finger&nbsp;print\u3002 Kot\u8fd8\u6307\u51fa\u5728\u4ed6\u63d0\u51fa\u7684\u8fd9\u4e2a\u89e3\u51b3\u65b9\u6848\u4e2d\u53ef\u4ee5\u5d4c\u5165\u4fe1\u606f\u8bb0\u5230Minutiae\u91cc\u9762\u3002\u5728\u540e\u9762\u7684\u63d0\u95ee\u9636\u6bb5\u3002\u6709\u540c\u5b66\u95ee\u5230\u8fd9\u4e2a\u89e3\u51b3\u65b9\u6848\u53ef\u4ee5\u5b58\u5165\u591a\u5c11\u4fe1\u606f\u3002Kot\u8865\u5145\u76ee\u524d\u53ef\u4ee5\u5b58\u4e00\u5343\u591a\u4e2aBit\u4f4d\u4fe1\u606f\uff0c\u8db3\u591f\u5b58\u4e0b\u91cd\u8981\u7684\u8eab\u4efd\u8ba4\u8bc1\u6570\u636e\u4e86\u3002\u6309\u6211\u81ea\u5df2\u7684\u7406\u89e3\uff0c\u80fd\u5b58\u591a\u5c11\u4fe1\u606f\u5e94\u8be5\u662f\u53ef\u4ee5\u6839\u636e\u9700\u8981\u8c03\u5927\u548c\u7f29\u5c0f\u7684\u5440\u3002\u6bd4\u5982\u628a\u56fe\u5f62\u8f6c\u6210\u77e2\u91cf\u56fe\u5f62\u540e\uff0c\u5c31\u53ef\u4ee5\u4e0d\u5931\u771f\u7684\u653e\u5927\uff0c\u4e8e\u662f\u5c31\u4f1a\u6709\u66f4\u591a\u5b58\u50a8\u7a7a\u95f4\u4e86\u3002\u4e0d\u786e\u5b9a\u662f\u4e0d\u662f\u8fd9\u6837\u3002 \u63d0\u95ee\u9636\u6bb5Kot\u6307\u51fa\u8fd9\u4e2a\u8bbe\u8ba1\u6ca1\u6709\u4f7f\u7528token\u6216\u8005key\u56e0\u6b64\u4f1a\u8fd0\u884c\u7684\u975e\u5e38\u8fc5\u901f\u3002\u800c\u5982\u679c\u91c7\u7528\u590d\u6742\u7684\u52a0\u89e3\u5bc6\u7b97\u6cd5\uff0c\u5219\u4f1a\u6709\u975e\u5e38\u5927\u7684\u8ba1\u7b97\u5f00\u9500\u3002\u8fd0\u884c\u901f\u5ea6\u5bf9\u4e8e\u4e00\u4e9b\u5d4c\u5165\u5f0f\u7684\u7535\u5b50\u7cfb\u7edf\u662f\u81f3\u5173\u91cd\u8981\u7684\u3002 \u6709\u540c\u5b66\u63d0\u95ee\u63d0\u5230\u505aFace&nbsp;Recognition\uff0c\u95eeKot\u6559\u6388\u6709\u4ec0\u4e48\u770b\u6cd5\u3002Kot\u8ba4\u4e3aFace&nbsp;Recognition&nbsp;is&nbsp;very&nbsp;difficult,&nbsp;very&nbsp;very&nbsp;difficult,&nbsp;few&nbsp;advancement&nbsp;has&nbsp;been&nbsp;achieved&nbsp;nowadays.&nbsp;It&#39;s&nbsp;a&nbsp;very&nbsp;tough&nbsp;problem. At&nbsp;last,&nbsp;as&nbsp;a&nbsp;conclusion&nbsp;for&nbsp;this&nbsp;report,&nbsp;I&nbsp;must&nbsp;show&nbsp;my&nbsp;great&nbsp;respect&nbsp;to&nbsp;Alex&nbsp;Kot.&nbsp;He&nbsp;is&nbsp;a&nbsp;great&nbsp;scientist. \/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/ IEEE Distinguished Lecture Talk Title\uff1aIs your biometric data safe? Speaker\uff1aProf. Alex C Kot, \u65b0\u52a0\u5761\u5357\u6d0b\u7406\u5de5\u5927\u5b66\u6559\u6388\u3001IEEE Fellow \u65f6&nbsp; \u95f4\uff1a &nbsp;12\u670816\u65e5\uff08\u672c\u5468\u4e94\uff09\u4e0b\u53483\uff1a00 \u5730&nbsp; \u70b9\uff1a&nbsp; \u4fe1\u606f\u79d1\u6280\u5b66\u9662\u5927\u697c\u4e8c\u697c207\u8bb2\u5b66\u5385 \u4e3b\u6301\u4eba\uff1a &nbsp;\u9ec4\u7ee7\u6b66 \u6559\u6388 \u4e3b\u529e\u5355\u4f4d\uff1a\u4fe1\u606f\u79d1\u5b66\u4e0e\u6280\u672f\u5b66\u9662\u3001IEEE Signal Processing Society Guangzhou Chapter, IEEE Circuits and Systems Society Guangzhou Chapter &nbsp; Abstract Nowadays, biometrics is widely used in &hellip; <a href=\"https:\/\/ykyi.net\/?p=304\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Is your biometric data safe&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[96],"class_list":["post-304","post","type-post","status-publish","format-standard","hentry","category-life_and_others","tag-96"],"_links":{"self":[{"href":"https:\/\/ykyi.net\/index.php?rest_route=\/wp\/v2\/posts\/304","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ykyi.net\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ykyi.net\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ykyi.net\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ykyi.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=304"}],"version-history":[{"count":0,"href":"https:\/\/ykyi.net\/index.php?rest_route=\/wp\/v2\/posts\/304\/revisions"}],"wp:attachment":[{"href":"https:\/\/ykyi.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=304"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ykyi.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=304"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ykyi.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=304"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}