Publications

Publications

Fundamentals in iris recognition
Rathgeb, C.; Busch, C.
Iris and Periocular Biometric Recognition, p.1-28


On the Feasibility of Creating Morphed Iris-Codes
Rathgeb, C.; Busch, C.
Proc. Intl. Joint Conf. on Biometrics (IJCB 2017)
[Conference Proceedings]


Methods for accuracy-preserving acceleration of large-scale comparisons in CPU-based iris recognition systems
Rathgeb, C.; Buchmann, N.; Hofbauer, H.; Baier, H.; Uhl, A.; Busch, C.
IET Biometrics
[Journal Article]


Scale-level score fusion of steered pyramid features for cross-spectral periocular verification
Raja, K. B.; Raghavendra, R.; Busch, C.
20th Intl. Conf. on Information Fusion, FUSION 2017, p.1-7
[Conference Proceedings]


Robust Verification With Subsurface Fingerprint Recognition Using Full Field Optical Coherence Tomography
Raja, K. B.; Auksorius, E.; Raghavendra, R.; Boccara, A. C.; Busch, C.
2017 IEEE Conf. on Computer Vision and Pattern Recognition Workshops CVPR, p.646-654
[Conference Proceedings]


Deep Quality-Informed Score Normalization for Privacy-Friendly Speaker Recognition in Unconstrained Environments
Nautsch, A.; Steen, S. T.; Busch, C.
Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1-4
[Conference Proceedings]


Making Likelihood Ratios Digestible for Cross-Application Performance Assessment
Nautsch, A.; Meuwly, D.; Ramos, D.; Lindh, J.; Busch, C.
IEEE Signal Processing Letters, Vol.24, p.1552-1556
[Journal Article]


da/sec ASVspoof2017 Submission
Nautsch, A.; Scherhag, U.; Isadskiy, S.; Rathgeb, C.; Busch, C.
Prof. of the ASVspoof evaluation
[Conference Proceedings]


Biometric template protection based on Bloom filters and honey templates
Martiri, E.; Gomez-Barrero, M.; Yang, B.; Busch, C.
IET Biometrics, Vol.6, p.19-26
[Journal Article]


The I4U Mega Fusion and Collaboration for NIST Speaker Recognition Evaluation 2016
Lee, K. A.; Hautamäki, V.; Kinnunen, T.; Larcher, A.; Zhang, C.; others
Proc. of the Annual Conf. of the Intl. Speech Communication Association (INTERSPEECH)
[Conference Proceedings]


Privacy-Preserving Comparison of Variable-Length Data with Application to Biometric Template Protection
Gomez-Barrero, M.; Galbally, J.; Morales, A.; Fierrez, J.
IEEE Access, Vol.5, p.8606-8619
[Journal Article]


Biometrie symmetry: Implications on template protection
Gomez-Barrero, M.; Rathgeb, C.; Raja, K. B.; Raghavendra, R.; Busch, C.
25th European Signal Processing Conf. EUSIPCO 2017, p.941-945
[Conference Proceedings]


Biometric Symmetry: Implications on Template Protection
Gomez-Barrero, M.; Rathgeb, C.; Raja, K. B.; Raghavendra, R.; Busch, C.
Proc. European Signal Processing Conf. (EUSIPCO)
[Conference Proceedings]


Standardisierung von Biometric Template Protection: Aktueller Status und Bewertung der Verknüpfbarkeit
Gomez-Barrero, M.; Rathgeb, C.; Busch, C.
Datenschutz und Datensicherheit, Vol.41, p.422-426
[Journal Article]


Multi-Biometric Template Protection Based on Homomorphic Encryption
Gomez-Barrero, M.; Maiorana, E.; Galbally, J.; Campisi, P.; Fierrez, J.
Pattern Recognition, Vol.67, p.149-163
[Journal Article]


Standardisierung von Biometric Template Protection
Gomez-Barrero, M.; Rathgeb, C.; Busch, C.
Datenschutz und Datensicherheit, Vol.41, p.422-426
[Journal Article]


Is Your Biometric System Robust to Morphing Attacks?
Gomez-Barrero, M.; Rathgeb, C.; Scherhag, U.; Busch, C.
Proc. 5th Intl. Workshop on Biometrics and Forensics (IWBF), p.1-6
[Conference Proceedings]


Accuracy Evaluation of Handwritten Signature Verification: Rethinking the Random-Skilled Forgeries Dichotomy
Galbally, J.; Gomez-Barrero, M.; Ross, A.
Proc. Int. Joint Conf. on Biometrics (IJCB)
[Conference Proceedings]


Altered Fingerprint Detection
Ellingsgaard, J.; Busch, C.
Handbook of Biometrics for Forensic Science, p.85-123


SIC-Gen: A Synthetic Iris-Code Generator
Drozdowski, P.; Rathgeb, C.; Busch, C.
Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1-6
[Conference Proceedings]


Multi-Iris Indexing and Retrieval: Fusion Strategies for Bloom Filter-based Search Structures
Drozdowski, P.; Rathgeb, C.; Busch, C.
Proc. Intl. Joint Conf. on Biometrics (IJCB 2017), p.1-8
[Conference Proceedings]


Towards Pre-alignment of Near-infrared Iris Images
Drozdowski, P.; Rathgeb, C.; Hofbauer, H.; Wagner, J.; Uhl, A.; Busch, C.
Intl. Joint Conf. on Biometrics (IJCB), p.1-8
[Conference Proceedings]


Bloom Filter-based Search Structures for Indexing and Retrieving Iris-Codes
Drozdowski, P.; Rathgeb, C.; Busch, C.
IET Biometrics, Vol.7, p.260-268
[Journal Article]


Enhancing Breeder Document Long-Term Security Using Blockchain Technology
Buchmann, N.; Rathgeb, C.; Baier, H.; Busch, C.; Margraf, M.
41st IEEE Annual Computer Software and Applications Conf. COMPSAC 2017, p.744-748
[Conference Proceedings]


Combining multiple iris texture features for unconstrained recognition in visible wavelengths
Andersen-Hoppe, E.; Rathgeb, C.; Busch, C.
5th Intl. Workshop on Biometrics and Forensics IWBF, p.1-6
[Conference Proceedings]


ID2T - The Intrusion Detection Dataset Generation Toolkit
Garcia Cordero, Carlos; Vasilomanolakis, Emmanouil; Mühlhäuser, Max
Black Hat Europe 2017
[Conference Proceedings]


Measuring privacy in high dimensional microdata collections
Boukoros, Spyros; Katzenbeisser, Stefan
Proceedings of the 12th International Conference on Availability, Reliability and Security
[Conference Proceedings]


Secure Two-Party Computation Using an Efficient Garbled Circuit by Reducing Data Transfer
Yalame, Mohammad Hossein; Farzam, Mohammad Hossein; Sarmadi, Siavash Bayat
8. International Conference on Applications and Techniques in Information Security (ATIS'17)
[Conference Proceedings]


Enriched Nudges Lead to Stronger Password Replacements … but Implement Mindfully
Renaud, Karen; Zimmermann, Verena
Proceedings of the 2017 Information Security for South Africa (ISSA) Conference, p.1-9
[Conference Proceedings]


“If It Wasn’t Secure, They Would Not Use It in the Movies” – Security Perceptions and User Acceptance of Authentication Technologies
Zimmermann, Verena; Gerber, Nina
Human Aspects of Information Security, Privacy and Trust, p.265-283
[Conference Proceedings]