• BiometricsLend Me Your Ears: Securing Smart-Home Entry with Earprints

    Fingerprints and DNA are well-known forms of biometrics, thanks to crime dramas on television and at the movies. But as technology drives us toward the Internet of Things—the interconnection of computer devices in common objects—other forms of biometrics are sure to enter the cultural consciousness beyond use as forensics tools such as face recognition and retinas, veins, and palm prints. Researchers say that “earprints” could one day be used as person identification to secure smart homes via smartphones.

  • ForensicsForensic Proteomics: Going Beyond DNA Profiling

    A new book details an emerging forensic method that could become as widespread and trustworthy as DNA profiling. The method is called mass-spectrometry-based proteomics, which examines the proteins that make up many parts of living things. These proteins exist in unique combinations in everything from blood cells and clothing fibers to certain types of medicine and the diseases they fight. Because proteomics analyzes these proteins directly, forensic proteomics can fill in when DNA is missing, ambiguous, or was never present to begin with.

  • BiometricsRapid DNA Identifies Boat Fire Victims

    Thirty-four people died in a tragic boat fire on 2 September 2019, off the coast of Santa Cruz Island, California. Thanks to a technology funded by the DHS S&T, the 33 passengers and one crew member who died were quickly identified.

  • DNA identificationRapid DNA technology ID’ed California wildfire victims

    Amid the chaos and devastation of a mass casualty evet, medical examiners often provide closure as they identify victims in the aftermath, but their ability to do this quickly can vary depending on the size, scope, and type of disaster. Such challenges were the case following the Camp Fire wildfire that killed eighty-five people and devastated communities in Paradise, California, in the fall of 2018. S&T’s Rapid DNA technology became the first resort as it provided identifying information in under two hours when dental records and fingerprints weren’t available.

  • DNA identificationAbundance of DNA evidence insufficient to prevent wrongful convictions

    As we enter an era in which DNA evidence is routinely used in criminal investigations, errors that led to wrongful convictions—including mistakes later corrected with DNA tests—may seem to be fading into history. This, however, is not true, says an expert.

  • Identity maskingDisguises are surprisingly effective

    Superficial but deliberate changes in someone’s facial appearance – such as a new hairstyle or complexion - are surprisingly effective in identity deception, new research suggests.

  • AuthenticationNew method for secure, speech-based two-factor authentication

    Reducing the number of tasks users have to perform during traditional two-factor authentication has been an area of focus for emerging technology and security researchers. One method proposed involves using ambient noise to detect the proximity between the two devices being used for authentication, which eliminates the need for a user to type in a numerical code. Researchers have developed a new method for two-factor authentication via wearables using speech signals.

  • ForensicsUsing sweat to distinguish individuals at crime scene

    An average square inch of skin contains 650 sweat glands. That means our bodies leave small amounts of sweat on everything we touch—whether we’re making a phone call, eating supper or committing a crime. Researchers believe investigators can use these tiny, often invisible skin secretions to their advantage.

  • IDsProposed EU ID cards to include fingerprints

    The EU Commission on Tuesday will propose a law aims at increasing security within the bloc’s borders, including fingerprinting in ID cards. The Commission said that compulsory fingerprinting in ID cards are necessary to countering terrorism in Europe. Fingerprints are already required for EU passports, along with biometric pictures.

  • CybersecurityA new two-factor password method provides better protection

    A team of BGU cybersecurity researchers pioneered a new form of two-factor authentication that provides every user with stronger protection and is accessible to people with disabilities. This new method of authentication, in which ultrasonic vibrations are used in lieu of memorizing six-digit codes, works on today’s phones, laptops and tablets. It allows those with disabilities to log in with dignity and privacy.

  • AuthenticationReal-time Captcha technique bolsters biometric authentication

    A new login authentication approach could improve the security of current biometric techniques that rely on video or images of users’ faces. Known as Real-Time Captcha, the technique uses a unique challenge that’s easy for humans — but difficult for attackers who may be using machine learning and image generation software to spoof legitimate users.

  • CybersecurityUsing smartphones — instead of body parts — for identification to deter cybercrime

    Not comfortable with Face ID and other biometrics? This cybersecurity advancement may be for you. Researchers have discovered how to identify smartphones by examining just one photo taken by the device. The advancement opens the possibility of using smartphones — instead of body parts — as a form of identification to deter cybercrime.

  • Identity authenticationSoftware verifies someone’s identity by their DNA in minutes

    In the science-fiction movie “Gattaca,” visitors only clear security if a blood test and readout of their genetic profile matches the sample on file. Now, cheap DNA sequencers and custom software could make real-time DNA-authentication a reality. Researchers have developed a method to quickly and accurately identify people and cell lines from their DNA. The technology could have multiple applications, from identifying victims in a mass disaster to analyzing crime scenes.

  • BiometricsA better way to identify gait differences

    Biometric-based person recognition methods have been extensively explored for various applications, such as access control, surveillance, and forensics. Gait is a practical trait for video-based surveillance and forensics because it can be captured at a distance on video. In fact, gait recognition has been already used in practical cases in criminal investigations. However, gait recognition is susceptible to intra-subject variations, such as view angle, clothing, walking speed, shoes, and carrying status. Such hindering factors have prompted many researchers to explore new approaches with regard to these variations.

  • CybersecurityThe challenge of authenticating real humans in a digital world

    By Jungwoo Ryoo

    There are three main ways of proving an identity. One involves something you know – like a password or your mother’s maiden name. A second method of authentication is with something you have – such as a key to your home’s front door or a smart card to swipe at work. A third way is by digitally authenticating the individual human being – who you are – with some aspect of your biology. This increasing dependence on digital authentication may actually result in less security. While cameras, sensors and other devices can make authentication easier for people to accomplish, they carry their own weaknesses. It may be more convenient, and even more secure, than a magnetic strip on a plastic card in your wallet. But the potential dangers will require much higher security for private information, particularly biometric data. A real identity still comes down to flesh and blood.