-
BIOMETRICSSecurity Veins: Advanced Biometric Authentication Through AI and Infrared
Hyperspectral imaging and AI can identify individuals using blood vessels in palms.
-
-
CYBERSECURITY EDUCATIONUA Little Rock Secures $4.65 Million Grant to Advance Cybersecurity Education
The grant, funded by the National Centers of Academic Excellence in Cybersecurity (NCAE-C) within the National Security Agency, will enable UA Little Rock to enhance its efforts in preparing high school teachers to teach cybersecurity.
-
-
BIOMETRICSAI-driven Gait Analysis Bridges Health Care and Security Fields
The analysis of a person’s individual walking pattern, or gait, can reveal details about their identity and reflect differences between individuals, groups and even populations.
-
-
ELECTION INTEGRITYMaking E-voting Safer from Coercion and Vote Buying
As we come to the end of a year in which half the world’s population went to the polls, EPFL researchers developed and field-tested a groundbreaking new technology to protect remote electronic voting or e-voting from voter coercion and vote buying.
-
-
CRISIS FORECASTINGMultipurpose Model Enhances Forecasting Across Epidemics, Energy, and Economics
A new machine learning (ML) model from Georgia Tech could protect communities from diseases, better manage electricity consumption in cities, and promote business growth, all at the same time.
-
-
SURVEILLANCE'Significant' Risks as Facial Recognition in Russia's Subways Goes Regional
In a move that human rights advocates warn carries potential risks for civil rights, Russia has begun expanding its facial-recognition payment system for subways to six cities outside of Moscow.
-
-
SURVEIILANCEDetroit Takes Important Step in Curbing the Harms of Face Recognition Technology
In a first-of-its-kind agreement, the Detroit Police Department recently agreed to adopt strict limits on its officers’ use of face recognition technology as part of a settlement in a lawsuit brought by a victim of this faulty technology.
-
-
BIOMETRICSThe New Fintech That Knows Whether Your Voice Matches Your Face
Your face is no longer your own. Nor is your voice. Fraudsters can steal them both from the Internet. And, using the power of AI, they can create a deepfake version of you that’s so convincing it’ll beat bank security. Banks and financial institutions increasingly use voice biometrics these days to confirm a caller’s identity.
-
-
ELECTION INTEGRITYMore States Consider Voter ID Laws Amid Conflicting Research on Their Impact
36 states require some form of identification to cast a ballot. Voting rights advocates cite research showing that such rules block many legitimate voters — especially young, Black and Latino voters — from the polls. But backers of voter ID laws point to other studies which suggest that the rules have had a minimal effect on voter turnout, partly because Democrats often respond to them by amping up their voter mobilization efforts.
-
-
DIGITAL IDENTITYCollaborative Research Effort on Digital Identity to Support Secure Delivery of Public Benefits
NIST has launched a collaborative project to adapt NIST’s digital identity guidelines to support public benefits programs, such as those designed to help beneficiaries pay for food, housing, medical and other basic living expenses.
-
-
FACIAL RECOGNITIONSeeing Behind the Mask
There is a need for face recognition to be able to “see behind the mask” for security and safety. Researchers discusses the potential of new software which will allow facial recognition to work despite the mask you use.
-
-
AIAI Faces Look More Real Than Actual Human Faces
White faces generated by artificial intelligence (AI) now appear more real than human faces, according to new research. The same wasn’t true for images of people of color.
-
-
MONSTERSWhy the Search for the Loch Ness Monster (and Other Beasts) Continues 90 Years After That First Blurry Photograph
It’s 90 years since Hugh Gray, in April 1933, took his blurry picture — and the beginning of the obsession with finding the Loch Ness monster. As a paleobiologist, I want to explore whether the type of monster we believe Nessy to be could exist and if we should continue looking.
-
-
VOICE AUTHENTICATIONHow Secure Are Voice Authentication Systems Really?
Voice authentication has increasingly been used in remote banking, call centers and other security-critical scenarios. Attackers can break voice authentication with up to 99 percent success within six tries.
-
-
REMOTE IDENTIFICATIONTrack 2 of the Remote Identity Validation Tech Demo Challenge
DHS S&T announces the launch of Track 2 of the Remote Identity Validation Technology Demonstration (RIVTD). RIVTD is a series of technology challenges to evaluate the ability of systems to authenticate identity documents, assess the “liveness” of selfie photos, and evaluate identity verification using images taken with smartphones and similar devices.
-