Publications

Publications

Biometrics in the Era of COVID-19: Challenges and Opportunities
Gomez-Barrero, M.; Drozdowski, P.; Rathgeb, C.; others
Trans. on Technology and Society (TTS)
[Journal Article]


Fun Selfie Filters in Face Recognition: Impact Assessment and Removal
Botezatu, C.; Ibsen, M.; Rathgeb, C.; Busch, C.
IEEE Trans. on Biometrics, Behavior, and Identity Science (TBIOM), Vol.5, p.91-104
[Journal Article]


Improved Homomorphically Encrypted Biometric Identification Using Coefficient Packing
Bauspieß, P.; Olafsson, J.; Kolberg, J.; Drozdowski, P.; Rathgeb, C.; Busch, C.
Proc. Intl. Workshop on Biometrics and Forensics (IWBF)
[Conference Proceedings]


An Attack on Facial Soft-biometric Privacy Enhancement
Osorio-Roig, D.; Rathgeb, C.; Drozdowski, P; Terhörst, P.; Štruc, V.; Busch, C.
Trans. on Biometrics, Behavior, and Identity Science (TBIOM)
[Journal Article]


Are Average Faces Master Faces?
Dörsch, André; Rathgeb, Christian; Ibsen, Mathias; Busch, Christoph
Proc. Intl. Workshop on Biometrics and Forensics (IWBF), p.1-6
[Conference Proceedings]


Towards a maturity model for crypto-agility asessment — long preprint
Hohm, J.; Heinemann, A.; Wiesmaier, A.


$crypto_lib$: Comparing and Selecting Cryptography Libraries (long version of EICC 2022 publication)
Wohlwender, Jan; Huesmann, Rolf; Heinemann, Andreas; Wiesmaier, Alexander


$crypto_lib$: Comparing and Selecting Cryptography Libraries
Wohlwender, Jan; Huesmann, Rolf; Heinemann, Andreas; Wiesmaier, Alexander
Accepted at European Interdisciplinary Cybersecurity Conference (EICC 22)
[Conference Proceedings]


ThreatSurf: A method for automated Threat Surface assessment in automotive cybersecurity engineering
Zelle, Daniel; Plappert, Christian; Rieke, Roland; Scheuermann, Dirk; Krauß, Christoph
Microprocessors and Microsystems, Vol.90, p.104461
[Journal Article]


Decision Tree-Based Rule Derivation for Intrusion Detection in Safety-Critical Automotive Systems
Buschlinger, Lucas; Rieke, Roland; Sarda, Sanat; Krauß, Christoph
2022 30th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP), p.246-254
[Conference Proceedings]


Integrating Privacy into the Electric Vehicle Charging Architecture
Kern, Dustin; Lauser, Timm; Krauß, Christoph
Proceedings on Privacy Enhancing Technologies, Vol.2022, p.140-158
[Journal Article]


On the State of Crypto Agility
Alnahawi, N.; Schmitt, N.; Wiesmaier, A.; Heinemann, A.; Graßmeyer, T.
18. Deutscher IT-Sicherheitskongress, p.103-126
[Conference Proceedings]


Towards a maturity model for crypto-agility assessment
Hohm, Julian; Heinemann, Andreas; Wiesmaier, Alexander
CoRR, Vol.abs/2202.07645
[Journal Article]


Face Morphing Attack Detection Methods
Scherhag, U.; Rathgeb, C.; Busch, C.
Handbook of Digital Face Manipulation and Detection: From DeepFakes to Morphing Attacks, p.331-349


Future Trends in Digital Face Manipulation and Detection
Tolosana, Ruben; Rathgeb, Christian; Vera-Rodriguez, Ruben; Busch, Christoph; Verdoliva, Luisa; Lyu, Siwei; others
Handbook of Digital Face Manipulation and Detection: From DeepFakes to Morphing Attacks, p.463-482


Psychophysical Evaluation of Human Performance in Detecting Digital Face Image Manipulations
Nichols, R.; Rathgeb, C.; Drozdowski, P.; Busch, C.
IEEE Access, Vol.10, p.31359-31376
[Journal Article]


Signal-level fusion for indexing and retrieval of facial biometric data
Drozdowski, P.; Stockhardt, F.; Rathgeb, C.; Busch, C.
IET Biometrics, Vol.11, p.1-16
[Journal Article]


Improved Homomorphically Encrypted Biometric Identification Using Coefficient Packing
Bauspieß, P.; Olafsson, J.; Kolberg, J.; Drozdowski, P.; Rathgeb, C.; Busch, C.
Proc. Intl. Workshop on Biometrics and Forensics (IWBF)
[Conference Proceedings]


Digital Face Manipulation in Biometric Systems
Ibsen, M.; Rathgeb, C.; Fischer, D.; Drozdowski, P.; Busch, C.
Handbook of Digital Face Manipulation and Detection: From DeepFakes to Morphing Attacks, p.27-43


Vulnerabilities of Unattended Face Verification Systems to Facial Components-based Presentation Attacks: An Empirical Study
Qin, L.; Peng, F.; Long, M.; Raghavendra, R.; Busch, C.
ACM Trans. on Privacy and Security, Vol.25, p.1-28
[Journal Article]


Dual-Stream Temporal Convolutional Neural Network for Voice Presentation Attack Detection
Gonzalez-Soler, L. J.; Gomez-Barrero, M.; Kamble, M.; Todisco, M.; Busch, C.
Proc. Intl. Workshop on Biometrics and Forensics (IWBF), p.1-6
[Conference Proceedings]


Mobile Contactless Fingerprint Recognition: Implementation, Performance and Usability Aspects
Priesnitz, J.; Huesmann, R.; Rathgeb, C.; Buchmann, N.; Busch, C.
MDPI Intelligent Sensors
[Journal Article]


Exploring Quality Scores for Workload Reduction in Biometric Identification
Osorio-Roig, D.; Schlett, T.; Rathgeb, C.; Tapia, J.; Busch, C.
Proc. Intl. Workshop on Biometrics and Forensics (IWBF)
[Conference Proceedings]


Handbook of Digital Face Manipulation and Detection: From DeepFakes to Morphing Attacks
Rathgeb, C.; Tolosana, R.; Vera, R.; Busch, C.
[Book]


Reliable detection of doppelgängers based on deep face representations
Rathgeb, Christian; Fischer, Daniel; Drozdowski, Pawel; Busch, Christoph
IET Biometrics, Vol.11, p.215-224
[Journal Article]


NIR Iris Challenge Evaluation in Non-cooperative Environments: Segmentation and Localization
Wang, C.; Tapia, J.
Proc. of the 2021 Intl. Joint Conf. on Biometrics (IJCB)
[Conference Proceedings]


Image Quality Assessment on Identity Documents
Yanez, C.; Tapia, J.
Proc. Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1-5
[Conference Proceedings]


Morphing Attack Detection: A Fusion Approach
Lorenz, S.; Scherhag, U.; Rathgeb, C.; Busch, C.
2021 IEEE 24th Intl. Conf. on Information Fusion (FUSION), p.703-709
[Conference Proceedings]


On the Effectiveness of Impedance-Based Fingerprint Presentation Attack Detection
Kolberg, J.; Gläsner, D.; Breithaupt, R.; Gomez-Barrero, M.; Reinhold, J.; von Twickel, A.; Busch, C.
Sensors, Vol.21
[Journal Article]


Differential Anomaly Detection for Facial Images
Ibsen, M.; Gonzalez-Soler, L. J.; Rathgeb, C.; Drozdowski, P.; Gomez-Barrero, M.; Busch, C.
IEEE Intl. Workshop on Information Forensics and Security (WIFS), p.1-6
[Conference Proceedings]