Electrical and Electronic Engineering Department
Yonsei University Korea
Andrew Beng Jin Teoh obtained his BEng (Electronic) in 1999 and Ph.D degree in 2003 from National University of Malaysia. He is currently an associate professor in Electrical and Electronic Engineering Department, College of Engineering, Yonsei University, South Korea. His research, for which he has received funding, focuses on biometric applications and biometric security. His current research interests are Machine Learning and Information Security. He has published more than 250 international refereed journal papers, conference articles, edited several book chapters and edited book volumes. He served and is serving as a guest editor of IEEE Signal Processing Magazine, technical programme committee member of Information Forensic and Security in IEEE Signal Processing Society, associate editor of IEEE Biometrics Compendium and editor-in-chief of IEEE Biometrics Council Newsletter. He was a program co-chair of ICONIP 2014, area chair of ICPR 2016 and ICIP 2017, track chair and technical programme committee for several conferences related to computer vision, pattern recognition and biometrics.
Keynote Title: Biometric Cryptosystems: Progress and Challenge
The inability of humans to remember and generate strong secrets makes it problematic for people to manage cryptographic keys. To address this problem, biometric cryptosystem has been put forward to enable a user to repeatedly generate a cryptographic key from his/her biometrics while protecting identity theft. Some prominent instances of biometric cryptosystems are Fuzzy Commitment, Fuzzy Vault and Fuzzy Extractor. Despite biometric cryptosystems have made vital contributions by specifying formal security definitions with which the schemes can be analyzed and provable secure, there remains a huge gap between theoretical soundness and practical systems. In this talk, an overview of progress of biometric cryptosystems will be presented. Specifically, design requirements, pitfalls and subtleties that are commonly overlooked in the practical design and assessment of biometric cryptosystems will be highlighted. Finally, a number of possible remedies addressing the challenges in designing practical biometric cryptosystems are discussed.