
Jason Chow
-
Implementing Passkeys
Passkeys are gaining traction across both consumer and enterprise applications as a secure alternative to passwords. This project walks through how to implement Passkey's from scratch, with a focus on the cryptographic operations behind registration and authentication. We'll also explore the WebAuthN protocol to understand what makes Passkeys a phishing resistant technology.
-
Facial Recognition
Facial recognition is ubiquitous—from unlocking phones to verifying identity at airports. This project walks you through building a facial recognition system from scratch, including liveness detection and anti-spoofing techniques. We'll also explore techniques that combine face and voice for even strong biometric based multi-factor authentication.
-
Voice Recognition
Voice recognition is controversial. While AI has made it easier to clone and replay voices, voice is also becoming a preferred way to interact with modern technology—think Jarvis from Iron Man. This project walks through building a voice recognition system from scratch, while highlighting its vulnerabilities and why the technology must evolve to support secure, voice-based authentication.
-
Fingerprint Recognition
Fingerprint recognition remains a widely used biometric method for verifying identity. This project walks through how to build a fingerprint recognition system from scratch. I'll cover fingerprint image acquisition, preprocessing (such as noise reduction and ridge enhancement), feature extraction (like minutiae points), and various fingerprint matching algorithms.
-
Key Stroke Dynamics
Keystroke dynamics analyze the unique way a person types—making it possible to verify identity without explicit input. This project walks through how to build a keystroke-based authentication system, suitable for detecting anomalies or extending authentication sessions securely.