Publications

Publications

Handbook of Vascular Biometrics

Uhl, A.; Busch, C.; Marcel, S.; Veldhuis, R.
[Book]

Biometric Presentation Attack Detection: Beyond the Visible Spectrum

Tolosana, R.; Gomez-Barrero, M.; Busch, C.; Ortega-Garcia, J.
IEEE Trans. on Information Forensics and Security, Vol.15, p.1261-1275
[Journal Article]

An Efficient Super-Resolution Single Image Network using Sharpness Loss Metrics for Iris

Tapia, J.; Gomez-Barrero, M.; Busch, C.
Proc. IEEE Workshop on Information Forensics and Security (WIFS)
[Journal Article]

Face morph detection for unknown morphing algorithms and image sources: a multi-scale block local binary pattern fusion approach

Scherhag, U.; Kunze, J.; Rathgeb, C.; Busch, C.
IET Biometrics, Vol.9, p.278-289
[Journal Article]

Morphing Attack Detection using Laplace operator based features

Scherhag, U.; Fischer, D.; Isadskiy, S.; Otte, J.; Busch, C.
in Proc. Norwegian Information Security Conf. (NISK)
[Journal Article]

Deep Face Representations for Differential Morphing Attack Detection

Scherhag, U.; Rathgeb, C.; Merkle, J.; Busch, Christoph
IEEE Trans. on Information Forensics and Security
[Journal Article]

Detection of Makeup Presentation Attacks based on Deep Face Representations

Rathgeb, C.; Drozdowski, P.; Busch, C.
Proc. Int. Conf. on Pattern Recognition (ICPR), p.1-6
[Conference Proceedings]

Makeup Presentation Attacks: Review and Detection Performance Benchmark

Rathgeb, C.; Drozdowski, P.; Busch, C.
IEEE Access, Vol.8, p.224958-224973
[Journal Article]

Morphing Attack Detection - Database, Evaluation Platform and Benchmarking

Raja, K.; Ferrara, M.; Franco, A.; Spreeuwers, L.; Batskos, I.; others
IEEE Trans. on Information Forensics and Security
[Journal Article]

Morphing-Angriffe - Ein Sicherheitsrisiko für Gesichtserkennungssysteme

Merkle, J.; Rathgeb, C.; Scherhag, U.; Busch, C.
Datenschutz und Datensicherheit - DuD, Vol.44, p.38-42
[Journal Article]

Towards Measuring the Amount of Discriminatory Information in Finger Vein Biometric Characteristics Using a Relative Entropy Estimator

ca, V. Krivoku\; Gomez-Barrero, M.; Marcel, S.; Rathgeb, C.; Busch, C.
[Book Article]

Presentation Attack Detection for Finger Recognition

Kolberg, J.; Gomez-Barrero, M.; Venkatesh, S.; Raghavendra, R.; Busch, C.
Handbook of Vascular Biometrics, p.435-463

Analysing the Performance of LSTMs and CNNs on 1310 nm Laser Data for Fingerprint Presentation Attack Detection

Kolberg, J.; Vasile, A. C.; Gomez-Barrero, M.; Busch, C.
Proc. Intl. Joint Conf. on Biometrics (IJCB), p.1-7
[Conference Proceedings]

Texture-based Presentation Attack Detection for Automatic Speaker Verification

Gonzalez-Soler, L. J.; Patino, J.; Gomez-Barrero, M.; Todisco, M.; Busch, C.; Evans, N.
Proc. Intl. Workshop on Information Forensics and Security (WIFS), p.1-6
[Conference Proceedings]

Evaluating the Sensitivity of Face Presentation Attack Detection Techniques to Images of Varying Resolutions

Gonzalez-Soler, L. J.; Gomez-Barrero, M.; Busch, C.
Norwegian Information Security Conf. (NISK)
[Conference Proceedings]

Reversing the irreversible: A survey on inverse biometrics

Gomez-Barrero, M.; Galbally, J.
Computers & Security, Vol.90
[Journal Article]

Erkennung von Präsentationsangriffen auf Fingerabdruck Systemen

Gomez-Barrero, M.; Kolberg, J.; Busch, C.
Datenschutz und Datensicherheit - DuD, Vol.44, p.26-31
[Journal Article]

A Novel Approach for Generating Synthetic Datasets for Digital Forensics

Göbel, T.; Schäfer, T.; Hachenberger, J; Türr, J.; Baier, H.
Advances in Digital Forensics XVI, p.73-93

Demographic Bias: A Challenge for Fingervein Recognition Systems?

Drozdowski, P.; Prommegger, B.; Wimmer, G.; Schraml, R.; Rathgeb, C.; Uhl, A.; Busch, C.
European Signal Processing Conf. (EUSIPCO), p.825-829
[Conference Proceedings]

Zur Benutzbarkeit und Verwendung von API-Dokumentationen

Huesmann, Rolf; Zeier, Alexander; Heinemann, Andreas; Wiesmaier, Alexander
Mensch und Computer 2020 - Workshopband
[Conference Proceedings]

Post-Quantum Secure Boot

Kumar, Vinay B. Y.; Gupta, Naina; Chattopadhyay, Anupam; Kasper, Michael; Krauß, Christoph; Niederhagen, Ruben
Design, Automation & Test in Europe Conference & Exhibition, DATE 2020
[Conference Proceedings]

TrustEV: Trustworthy Electric Vehicle Charging and Billing

Fuchs, Andreas; Kern, Dustin; Krauß, Christoph; Zhdanova, Maria
Proceedings of the 35th ACM/SIGAPP Symposium on Applied Computing SAC 2020
[Conference Proceedings]

SEPAD - Security Evaluation Platform for Autonomous Driving

Zelle, Daniel; Rieke, Roland; Plappert, Christian; Krauß, Christoph; Levshun, Dmitry; Chechulin, Andrey
28th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, PDP
[Conference Proceedings]

Post-Quantum TLS on Embedded Systems - Integrating and Evaluating Kyber and SPHINCS+ with mbed TLS

Bürstinghaus-Steinbach, Kevin; Krauß, Christoph; Niederhagen, Ruben; Schneider, Michael
Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, ASIA CCS, p.841–852
[Conference Proceedings]

Securing Electric Vehicle Charging Systems through Component Binding

Fuchs, Andreas; Kern, Dustin; Krauß, Christoph; Zhdanova, Maria
39th International Conference on Computer Safety, Reliability and Security, SAFECOMP
[Conference Proceedings]

HIP: HSM-based Identities for Plug-and-Charge

Fuchs, Andreas; Kern, Dustin; Krauß, Christoph; Zhdanova, Maria
Proceedings of the 15th International Conference on Availability, Reliability and Security, ARES
[Conference Proceedings]

HIP-20: Integration of Vehicle-HSM-Generated Credentials into Plug-and-Charge Infrastructure

Fuchs, Andreas; Kern, Dustin; Krauß, Christoph; Zhdanova, Maria; Heddergott, Ronald
Proceedings of the 4th Computer Science in Cars Symposium, CSCS
[Conference Proceedings]

Security Analysis of Automotive Protocols

Lauser, Timm; Zelle, Daniel; Krauß, Christoph
Proceedings of the 4th Computer Science in Cars Symposium, CSCS
[Conference Proceedings]

Zur Benutzbarkeit und Verwendung von API-Dokumentationen

Huesmann, Rolf; Zeier, Alexander; Heinemann, Andreas; Wiesmaier, Alexander
Mensch & Computer Workshopband
[Conference Proceedings]

SSBC 2020: Sclera Segmentation Benchmarking Competition in the Mobile Environment

Vitek, M.; Das, A.; Pourcenoux, Y.; Missler, A.; Paumier, C.; Das, S.; De Ghosh, I.; Lucio, D. R.; Zanlorensi Jr., L. A.; Menotti, D.; Boutros, F.; Damer, N.; Grebe, J. H.; Kuijper, A.; Hu, J.; He, Y.; Wang, C.; Liu, H.; Wang, Y.; Sun, Z.; Osorio-Roig, D.; Rathgeb, C.; Busch, C.; Tapia, J.; Valenzuela, A.; Zampoukis, G.; Tsochatzidis, L.; Pratikakis, I.; Nathan, S.; Suganya, R.; Mehta, V.; Dhall, A.; Raja, K.; Gupta, G.; Khiarak, J. N.; Akbari-Shahper, M.; Jaryani, F.; Asgari-Chenaghlu, M.; Vyas, R.; Dakshit, S.; Dakshit, S.; Peer, P.; Pal, U.; Struc, V.
Proc. Intl. Joint Conf. on Biometrics (IJCB), p.1-10
[Conference Proceedings]