Publications
Publications
Iris Liveness Detection Using a Cascade of Dedicated Deep Learning Networks
J. Tapia, S. Gonzalez and C. Busch
IEEE Trans. on Information Forensics and Security, Vol.17, p.42–52
[Journal Article]
Image Quality Assessment on Identity Documents
C. Yanez and J. Tapia
Proc. Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1–5
[Conference Proceedings]
Face Image Quality Assessment: A Literature Survey
T. Schlett and C. Rathgeb and O. Henniger and J. Galbally and J. Fierrez and C. Busch
ACM Computing Surveys (CSUR)
[Journal Article]
Deep learning-based single image face depth data enhancement
T. Schlett and C. Rathgeb and C. Busch
Computer Vision and Image Understanding (CVIU), Vol.210
[Journal Article]
Impact of Doppelgängers on Face Recognition: Database and Evaluation
C. Rathgeb and P. Drozdowski and M. Obel and A. Dörsch and F. Stockhardt and N. E. Haryanto and K. Bernardo and C. Busch
Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1–4
[Conference Proceedings]
An Overview of touchless 2D Fingerprint Recognition
J. Priesnitz and C. Rathgeb and N. Buchmann and C. Busch
EURASIP Journal on Image and Video Processing (JIVP)
[Journal Article]
Stable Hash Generation for Efficient Privacy-Preserving Face Identification
D. Osorio-Roig and C. Rathgeb and P Drozdowski and C. Busch
Trans. on Biometrics, Behavior, and Identity Science (TBIOM), Vol.4, p.333–348
[Journal Article]
NFIQ 2 NIST Fingerprint Image Quality
E. Tabassi and M. Olsen and O. Bausinger and C. Busch and A. Figlarz and G. Fiumara and O. Henniger and J. Merkle and T. Ruhland and C. Schiel and M. Schwaiger
[Report]
Voice biometrics: how the technology is standardized
A. Nautsch and C. Busch
Voice Biometrics: Technology, trust and security, p.139–162
Morphing Attack Detection: A Fusion Approach
S. Lorenz and U. Scherhag and C. Rathgeb and C. Busch
2021 IEEE 24th Intl. Conf. on Information Fusion (FUSION), p.703–709
[Conference Proceedings]
Security Enhancement and Privacy Protection for Biometric Systems
J. Kolberg
On the Effectiveness of Impedance-Based Fingerprint Presentation Attack Detection
J. Kolberg and D. Gläsner and R. Breithaupt and M. Gomez-Barrero and J. Reinhold and A. von Twickel and C. Busch
Sensors, Vol.21
[Journal Article]
Differential Anomaly Detection for Facial Images
M. Ibsen and L. J. Gonzalez-Soler and C. Rathgeb and P. Drozdowski and M. Gomez-Barrero and C. Busch
IEEE Intl. Workshop on Information Forensics and Security (WIFS), p.1–6
[Conference Proceedings]
Generation of Non-Deterministic Synthetic Face Datasets Guided by Identity Priors
M. Grimmer and H. Zhang and R. Raghavendra and K. Raja and C. Busch
https://www.ntnu.edu/nikt2021
[Journal Article]
Deep Face Age Progression: A Survey
M. Grimmer and R. Raghavendra and C. Busch
IEEE Access, Vol.9, p.83376–83393
[Journal Article]
Analysing the feasibility of using Objectosphere for Face Presentation Attack Detection
J. Gonzalez-Soler and M. Gomez-Barrero and M. Günther and C. Busch
Norwegian Information Security Conf. (NISK)
[Conference Proceedings]
Multi-Spectral Short Wave Infrared Sensors and Convolutional Neural Networks for Biometric Presentation Attack Detection
M. Gomez-Barrero and R. Tolosana and J. Kolberg and C. Busch
AI and Deep Learning in Biometric Security: Trends, Potential and Challenges, p.105–132
The Watchlist Imbalance Effect in Biometric Face Identification: Comparing Theoretical Estimates and Empiric Measurements
P. Drozdowski and C. Rathgeb and C. Busch
Intl. Conf. on Computer Vision Workshops (ICCVW), p.1–9
[Conference Proceedings]
Feature Fusion Methods for Indexing and Retrieval of Biometric Data: Application to Face Recognition with Privacy Protection
P. Drozdowski and F. Stockhardt and C. Rathgeb and D. Osorio-Roig and C. Busch
IEEE Access, Vol.9, p.139361–139378
[Journal Article]
A response to the European Data Protection Supervisor 'Misunderstandings in Biometrics' by the European Association for Biometrics
C. Busch and A. Czajka and F. Deravi and P. Drozdowski and M. Gomez-Barrero and G. Hasse and O. Henniger and E. Kindt and J. Kolberg and A. Nouak and K. Raja and R. Raghavendra and C. Rathgeb and J. Salomon and R. Veldhuis
IET Biometrics, Vol.11, p.79–86
[Journal Article]
On the Generalisation capabilities of Fisher Vector based Face Presentation Attack Detection
L. J. Gonzalez-Soler and M. Gomez-Barrero and C. Busch
IET Biometrics, Vol.10, p.480–496
[Journal Article]
On the Generalisation Capabilities of Fingerprint Presentation Attack Detection Methods in the Short Wave Infrared Domain
J. Kolberg and M. Gomez-Barrero and C. Busch
IET Biometrics, Vol.10, p.359–373
[Journal Article]
Makeup Presentation Attack Potential Revisited: Skills Pay the Bills
P. Drozdowski and S. Grobarek and J. Schurse and C. Rathgeb and F. Stockhardt and C. Busch
Intl. Workshop on Biometrics and Forensics (IWBF), p.1–6
[Conference Proceedings]
Local Feature Encoding for Unknown Presentation Attack Detection: An Analysis of Different Local Feature Descriptors
J. Gonzalez-Soler and M. Gomez-Barrero and J. Kolberg and L. Chang and A. Perez-Suarez and C. Busch
IET Biometrics, Vol.10, p.374–391
[Journal Article]
Impact of facial tattoos and paintings on face recognition systems
M. Ibsen and C. Rathgeb and T. Fink and P. Drozdowski and C. Busch
IET Biometrics, Vol.10, p.706–719
[Journal Article]
Fingerprint Presentation Attack Detection Based on Local Features Encoding for Unknown Attacks
J. Gonzalez-Soler and M. Gomez-Barrero and L. Chang and A. Perez-Suarez and C. Busch
IEEE Access, Vol.9, p.5806–5820
[Journal Article]
Face Morphing Attacks: A Threat to eLearning?
C. Rathgeb and K. Pöppelmann and C. Busch
IEEE Global Engineering Education Conf. (EDUCON 2021), p.1–6
[Conference Proceedings]
Effects of Image Compression on Face Image Manipulation Detection: A Case Study on Facial Retouching
C. Rathgeb and K. Bernardo and N. Haryanto and C. Busch
IET Biometrics, Vol.10
[Journal Article]
Deep Learning-based Semantic Segmentation for Touchless Fingerprint Recognition
J. Priesnitz and C. Rathgeb and N. Buchmann and C. Busch
Proc. Intl. Conf. on Pattern Recognition (ICPR), p.154–168
[Conference Proceedings]
Anomaly Detection with Convolutional Autoencoders for Fingerprint Presentation Attack Detection
J. Kolberg and M. Grimmer and M. Gomez-Barrero and C. Busch
Trans. on Biometrics, Behavior, and Identity Science (TBIOM), Vol.3, p.190–202
[Journal Article]


