Two PEC teachers collaborating in project with City University (London) researchers, will devise method of finding true identity of person disguising himself as someone else
Tired of getting friend requests from Brad Pitt or Salman Khan? Well, worry not! For soon, the mystery of stolen identities on the social networking sites including Facebook, Twitter etc will be solved within minutes.
For, there will be a mechanism which will enable us to find the true identity of a person disguising as someone else. A collaborative project is being initiated between two teachers from Punjab Engineering College (PEC), Chandigarh, and researchers at the City University, London where a similar mechanism already exists.
Dr Sanjeev Sofat, head of the Department of Computer Science, and Dr Divya Bansal, additional director, Department of Information Technology, UT Administration, and assistant professor of the same department at PEC, are collaborating with the UK researchers on devising a model wherein any person’s virtual identity could be mapped with his real, physical identity.
Says Dr Divya Bansal, “These days there are increasing incidences of people disguising as somebody else. They use other’s pictures and other details in their accounts on the social networking sites. But, in India, we do not have a mechanism with which we can get to know the real identity of the person. But with the help of latest technology and by clubbing information which is lying scattered all over the virtual world, we can create a model to identify the real persons behind the disguised faces.”
The project has recently been approved under the UK India Education and Research Initiative and would be concluded within a period of two years. For the project, a whopping grant of Rs 80 lakh has been allocated which would be used by the researchers of the two countries equally.
Further, owing to the increasing threat of cyber-attacks on the official websites of the different departments in the UT Administration containing vital information, the UT Administration’s Department of information technology is also going to come up with its own Information Technology Security State policy to safeguard all the information available online.
For the purpose, the PEC