Publications

Publications

Benchmarking Cross-Domain Face Recognition with Avatars, Caricatures and Sketches
A. Foroughi, C. Rathgeb, M. Ibsen; Busch, C.
Intl. Conf. on Acoustics, Speech, and Signal Processing (ICASSP), p.1-5
[Conference Proceedings]


SynFacePAD 2023: Competition on Face Presentation Attack Detection Based on Privacy-aware Synthetic Training Data
Fang, M.; Huber, M.; Fierrez, J.; Raghavendra, R.; Damer, N.; Alkhaddour, A.; Kasantcev, M.; Pryadchenko, V.; Yang, Z.; Huangfu, H.; Chen, Y.; Zhang, Y.; Pan, Y.; Jiang, J.; Liu, X.; Sun, X.; Wang, C.; Liu, X.; Chang, Z.; Guangzhe, Z.; Tapia, J.; Gonzalez-Soler, J.; Aravena, C.; Schulz, D.
Intl. Joint Conf. on Biometrics (IJCB)
[Conference Proceedings]


A Principal Component Analysis-Based Approach for Single Morphing Attack Detection
Dargaud, L.; Ibsen, M.; Tapia, J.; Busch, C.
IEEE/CVF Winter Conf. on Applications of Computer Vision Workshops (WACVw)
[Conference Proceedings]


Standards for Biometric Presentation Attack Detection
Busch, C.
Handbook of Biometric Anti-Spoofing - Presentation Attack Detection and Vulnerability Assessment, p.571-581


Toward an Efficient Iris Recognition System on Embedded Devices
Benalcazar, D. P.; Tapia, J.; Vasquez, M.; Causa, L.; Droguett, E. L.; Busch, C.
IEEE Access
[Conference Proceedings]


Synthetic ID Card Image Generation for Improving Presentation Attack Detection
Benalcazar, D.; Tapia, J.; Gonzalez, S.; Busch, C.
IEEE Trans. on Information Forensics and Security (TIFS)
[Journal Article]


MT-PRO: Multibiometric Template Protection Based On Homomorphic Transciphering
Bauspieß, P.; Zok, C.-M.; Costache, A.; Rathgeb, C.; Kolberg, J.; Busch, C.
Proc. IEEE Workshop on Information Forensics and Security (WIFS), p.1-6
[Conference Proceedings]


Face Image Quality Estimation on Presentation Attack Detection
Aravena, C.; Pasmino, D.; Tapia, J.; Busch, C.
Iberoamerican Congress on Pattern Recognition (CIARP), p.358-373
[Conference Proceedings]


Mayo
Beullens, Ward; Campos, Fabio; Celi, Sof\ \ia; Hess, Basil; Kannwischer, Matthias J
Specification document of NIST PQC Standardization of Additional Digital Signature Scheme
[Journal Article]


Separating Oil and Vinegar with a Single Trace: Side-Channel Assisted Kipnis-Shamir Attack on UOV
Aulbach, Thomas; Campos, Fabio; Krämer, Juliane; Samardjiska, Simona; Stöttinger, Marc
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol.2023, p.221-245
[Journal Article]


$crypto_lib$: Comparing and Selecting Cryptography Libraries
Wohlwender, J.; Huesmann, R.; Heinemann, A.; Wiesmaier, A.
European Interdisciplinary Cyber­security Conference (EICC 22), p.6-11
[Conference Proceedings]


Efficient Practical Byzantine Consensus Using Random Linear Network Coding
Braun, M.; Wiesmaier, A.; Alnahawi, N.
Springer Annals of Telecommunications (Journal), Vol.78, p.33-51
[Journal Article]


Sussex-Huawei Locomotion and Transportation Dataset
Gjoreski, Hristijan; Ciliberto, Mathias; Wang, Lin; Morales, Francisco Javier Ord\ o\~nez; Mekki, Sami; Valentin, Stefan; Roggen, Daniel


ThreatSurf: A method for automated Threat Surface assessment in automotive cybersecurity engineering
Zelle, Daniel; Plappert, Christian; Rieke, Roland; Scheuermann, Dirk; Krauß, Christoph
Microprocessors and Microsystems, Vol.90, p.104461
[Journal Article]


Decision Tree-Based Rule Derivation for Intrusion Detection in Safety-Critical Automotive Systems
Buschlinger, Lucas; Rieke, Roland; Sarda, Sanat; Krauß, Christoph
2022 30th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP), p.246-254
[Conference Proceedings]


Integrating Privacy into the Electric Vehicle Charging Architecture
Kern, Dustin; Lauser, Timm; Krauß, Christoph
Proceedings on Privacy Enhancing Technologies, Vol.2022, p.140-158
[Journal Article]


On the State of Crypto-Agility
Alnahawi, N.; Schmitt, N.; Wiesmaier, A.; Heinemann, A.; Graßmeyer, T.
18. Deutscher IT-Sicherheitskongress, p.103-126
[Conference Proceedings]


Towards a maturity model for crypto-agility assessment
Hohm, Julian; Heinemann, Andreas; Wiesmaier, Alexander
CoRR, Vol.abs/2202.07645
[Journal Article]


Future Trends in Digital Face Manipulation and Detection
Tolosana, R.; Rathgeb, C.; Vera-Rodriguez, R.; Busch, C.; Verdoliva, Luisa; Lyu, S.; others
Handbook of Digital Face Manipulation and Detection: From DeepFakes to Morphing Attacks, p.463-482


Selfie Periocular Verification using an Efficient Super-Resolution Approach
Tapia, J.; Valenzuela, A.; Lara, R.; Gomez-Barrero, M.; Busch, C.
Proc. IEEE Workshop on Information Forensics and Security (WIFS)
[Journal Article]


Alcohol Consumption Detection from Periocular NIR Images Using Capsule Network
Tapia, J.; Lopez-Droguett, E.; Busch, C.
26th Intl. Conf. on Pattern Recognition (ICPR), p.959-966
[Conference Proceedings]


Identity Documents Image Quality Assessment
Schulz, D.; Maureira, J.; Tapia, J.; Busch, C.
30th European Signal Processing Conf. (EUSIPCO), p.1017-1021
[Conference Proceedings]


Analysis of the synthetic periocular iris images for robust Presentation Attacks Detection algorithms
Maureira, J.; Tapia, J.; C. Arellano, C. Busch
IET Biometrics, Vol.n/a, p.1-12
[Journal Article]


A novel Capsule Neural Network based model for drowsiness detection using electroencephalography signals
Guarda, L.; Tapia, J.; Lopez-Droguett, E.; Ramos, M.
Expert Systems with Applications, Vol.201, p.116977
[Journal Article]


Evaluating Face Image Quality Score Fusion for Modern Deep Learning Models
Schlett, T.; Rathgeb, C.; Tapia, J.; Busch, C.
Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1-8
[Conference Proceedings]


Face Morphing Attack Detection Methods
Scherhag, U.; Rathgeb, C.; Busch, C.
Handbook of Digital Face Manipulation and Detection: From DeepFakes to Morphing Attacks, p.331-349


Reliable detection of doppelgängers based on deep face representations
Rathgeb, C.; Fischer, D.; Drozdowski, P.; Busch, C.
IET Biometrics, Vol.11, p.215-224
[Journal Article]


Handbook of Digital Face Manipulation and Detection: From DeepFakes to Morphing Attacks
Rathgeb, C.; Tolosana, R.; Vera, R.; Busch, C.
[Book]


Demographic fairness in biometric systems: What do the experts say?
Rathgeb, C.; Drozdowski, P.; Frings, D. C.; Damer, N.; Busch, C.
IEEE Technology and Society Magazine, Vol.41, p.71-82
[Journal Article]


Deep face fuzzy vault: Implementation and performance
Rathgeb, C.; Merkle, J.; Scholz, J.; Tams, B.; Nesterowicz, V.
Computers \& Security
[Journal Article]