CBT Discusses Protecting Biometric Data from Deepfakes

Encryption of communication channels makes it possible to understand that there is a living person in front of the camera

Facial image is one of the most popular biometric recognition models. Natalya Bessonova, Director of the Department of Biometric Technologies at CBT JSC, spoke about ways to protect data at the "Cloud Cities. BRICS Cities of the Future Forum" event.

According to her, biometric data may be publicly available, for example, on social networks.

The rules for storing biometric data have changed; previously, there were no standards for storing and using this data. Now, mandatory consent is required for the collection of biometrics.
Natalya Bessonova, CBT JSC

Bessonova reminded that biometric data can only be stored in the Unified Biometric System (UBS). Non-commercial government structures can only use data processed by neural networks, and not the original biometric data itself.

A single point of managing your biometric data is emerging. There, you can find all the services to which you have granted access and revoke your consent to data processing. A huge amount of biometric data is publicly available. They affect what threats exist for biometric systems.
Natalya Bessonova, CBT JSC

Bessonova reminded that there are several methods of protection. An attacker can target the system at any point, so different methods are used depending on this.

Strong encryption, encryption of communication channels, algorithmic methods that allow you to understand that there is a living person in front of the camera. Lifeless algorithms. They allow you to verify that a living person is in front of the camera at the time of service.
Natalya Bessonova, CBT JSC

At the same time, active algorithms are less convenient for the user. They require the user to complete a task, such as smiling. They are more difficult for fraudsters.

Pervy Technicheskiy is an information partner of the "Cloud Cities. BRICS Cities of the Future Forum" event.

Read more on the topic:

Record interest in remote voting shown in Russia

How hackers steal user passwords: methods named

The number of recorded hacker attacks has increased in Russia

Now on home