Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Page Properties
idmeeting-status-metadata

Quorum

Status
colourGreen
titlequorate

Notes-Status

Status
colourBlue
titleReady for review

Approved-Link

Info

The meeting status metadata table is used for summary reports - copy the status macros from the table in these instructions:

Quorum:

Status
colourGreen
titlequorate
Status
colourYellow
titlenot quorate

Notes-Status:

Status
titledrafting
Status
colourBlue
titleReady for review
Status
colourGreen
titleapproved

Approved-Link: Insert a link to the Meeting Notes page holding the approval decision for this notes page

...

IDENTOS

Participant

Organization

Presence

Adam Bradley

Mastercard

Adrian Slade

n/a

Alastair Treharne

Beruku Identity Limited

Alec Laws

Anand Kumar

SecureKloud Technologies, Inc.

Present

Becky Burgess

N/A

Brad Head

ZED werks Inc.

Brandon Gutierrez

Equifax

Chris Tyghe

Interac

Christopher Olsen

N/A

Dan Bachenheimer

Accenture

Present

Dawid Jacobs

DAL Identity

Present

Gene Dimira

n/a

Hannah Sutor

n/a

Heather Vescent

n/a

Isha Chhatwal

n/a

James Monaghan

n/a

JS Bruneau

N/A

Julian White

Beruku

Kevin Faragher 

Interac

Kim Duffy

n/a

Leonardo Maldonado

GSE

Present

Lorrayne Auld

n/a

Martin George

N/A

Michael Choudoin

N/A

Present

Michael Engle

1Kosmos

Present

Noreen Whysel

N/A

Paul Paray

Artswap, LLC

Pieter Van Iperen

N/A

Sarath Laufer

Au10tix

Scott Jones

CLEAR

Srdjan Manojlovic

Interac

Stephane Asselin

N/A

Stephanie Schuckers

Clarkson University

Stephen Vitka

N/A

Thanos Vrachnos

SpearIT

Tom Maduri

Bell Canada

Uttam Reddi

Aware Corp

Present

Vincent Brousseau

Desjardins Group

Zarrak Khan

N/A

Guests

Participant

Organization

Presence

Kay Chopard

Kantara Initiative

Present

Joey Pritikin

Paravision

Present

Ronald Chapman

iProov

Present

Daniel Molina

iProov

Present

Quorum determination

...

Meeting is quorate when 50% + 1 of voting participants attend

There are <<nn>> 15 voters as of <<YYYY2024-MM02-DD>>14

Approval of Prior Minutes

...

\uD83D\uDDE3 Discussion topics

Time

Item

Presenter

Notes

Re-categorization of the content

Jay

  • Consider categorization Policy, Provenance (e.g. C2PA https://c2pa.org/ or CAI), Protection (includes Detection)

  • Consider separation of Recognition v Analysis

  • Joey to think about drafting material about ‘policy’ also how ‘deepfakes’ intersect with discussions about content authenticity and public discourse

  • Consider policy as a means of attack mitigation e.g. on sensor control

  • Provenance and deepfakes - e.g. camera sensors could sign data streams as they are originated e.g. https://www.theverge.com/2024/2/6/24063954/ai-watermarks-dalle3-openai-content-credentials

  • Agreement to restructure

iProov Taxonomy of Threats 2024 report

Ronald Chapman, Daniel Molina

@ iProov

  • Attacks today are novel - the attacks are evolving

  • Face Swap tools are widely available and cheap/free

    • This seems to be the preferred method for attackers

  • Starting to see real stories of deepfake based attacks

  • Starting to see new threat actor groups - doing proof of concept and selling tools online

    • Targeted attacks

  • More use of emulators

  • Web browsers in mobile apps are a big attack surface

  • Contact Sean Lanzer for deeper discussions

    • iProov is willing to demo actual tools and attacks

  • Very high definition screens are being used to present face swaps

    • a hybrid attack is more effective right now

  • How can a vendor know that a fake is being presented?

    • Device SDK to help protect the OS and sensor - to detect/prevent injections

    • Challenge-response techniques

Comment:

MORE RESEARCH... Not sure if the group has seen this paper from our partners on www.ProjectDefAI.com - Vulnerability of Face Recognition to Deep Morphing" by Pavel Korshunov and Sebastien Marcel ´ Idiap Research Institute, Martigny, Switzerland

"We show that the state of the art face
recognition systems based on VGG and Facenet neural networks are vulnerable to the deep morph videos, with 85.62% and 95.00% false acceptance rates, respectively"

https://defaiproject.com/

Call for contributors

Chairs

Please volunteer for content areas by email

IDPV Core topic area

Andrew Hughes

Andrew walked through the “IDPV Placemat” and solicited comments and feedback.

Please discuss!

✅ Open Action items

  •  
Info

Action items may be created inline on any page. This block shows all open action items from all meeting notes.

...