Publikationen

Publikationen

Morphing Attack Detection - Database, Evaluation Platform and Benchmarking
Raja, K.; Ferrara, M.; Franco, A.; Spreeuwers, L.; Batskos, I.; others
IEEE Trans. on Information Forensics and Security
[Journal Article]


Morphing-Angriffe - Ein Sicherheitsrisiko für Gesichtserkennungssysteme
Merkle, J.; Rathgeb, C.; Scherhag, U.; Busch, C.
Datenschutz und Datensicherheit - DuD, Vol.44, p.38-42
[Journal Article]


Reversing the irreversible: A survey on inverse biometrics
Gomez-Barrero, M.; Galbally, J.
Computers & Security, Vol.90
[Journal Article]


Erkennung von Präsentationsangriffen auf Fingerabdruck Systemen
Gomez-Barrero, M.; Kolberg, J.; Busch, C.
Datenschutz und Datensicherheit - DuD, Vol.44, p.26-31
[Journal Article]


PRNU-based Detection of Facial Retouching
Rathgeb, C.; Botaljov, A.; Stockhardt, F.; Isadskiy, S.; Debiasi, L.; Uhl, A.; Busch, C.
IET Biometrics, Vol.9, p.154-164
[Journal Article]


Differential Detection of Facial Retouching: A Multi-Biometric Approach
Rathgeb, C.; Satnoianu, C.-I.; Haryanto, N. E.; Bernardo, K.; Busch, C.
IEEE Access, Vol.8, p.106373-106385
[Journal Article]


Multi-biometric Identification with Cascading Database Filtering
Drozdowski, P.; Rathgeb, C.; Mokroß, B.-A.; Busch, C.
Trans. on Biometrics, Behavior, and Identity Science (TBIOM), Vol.2, p.210-222
[Journal Article]


Demographic Bias in Biometrics: A Survey on an Emerging Challenge
Drozdowski, P.; Rathgeb, C.; Dantcheva, A.; Damer, N.; Busch, C.
Trans. on Technology and Society (TTS), Vol.1, p.89-103
[Journal Article]


Security Requirements Engineering in Safety-Critical Railway Signalling Networks
Heinrich, Markus; Vateva-Gurova, Tsvetoslava; Arul, Tolga; Katzenbeisser, Stefan; Suri, Neeraj; Birkholz, Henk; Fuchs, Andreas; Krauß, Christoph; Zhdanova, Maria; Kuzhiyelil, Don; Tverdyshev, Sergey; Schlehuber, Christian
Security and Communication Networks, Vol.vol. 2019, Article ID 8348925, p.14 pages
[Journal Article]


Datenschutz muss benutzbar sein
Heinemann, Andreas; Straub, Tobias
Datenschutz und Datensicherheit, Vol.43, p.7-12
[Journal Article]


Relevant features for Gender Classification in NIR Periocular Images
Viedma, I.; Tapia, J.; Iturriaga, A.; Busch, C.
arXiv e-prints
[Journal Article]


Privacy-preserving PLDA Speaker Verification Using Outsourced Secure Computation
Treiber, A.; Nautsch, A.; Kolberg, J.; Schneider, T.; Busch, C.
Speech Communication, Vol.114, p.60-71
[Journal Article]


Detection of Face Morphing Attacks based on PRNU Analysis
Scherhag, U.; Debiasi, L.; Rathgeb, C.; Busch, C.; Uhl, A.
Trans. on Biometrics, Behavior, and Identity Science (TBIOM)
[Journal Article]


Face Recognition Systems under Morphing Attacks: A Survey
Scherhag, U.; Rathgeb, C.; Merkle, J.; Breithaupt, R.; Busch, C.
IEEEAccess
[Journal Article]


Impact and Detection of Facial Beautification in Face Recognition: An Overview
Rathgeb, C.; Dantcheva, A.; Busch, C.
IEEE Access, Vol.7, p.152667-152678
[Journal Article]


Preserving Privacy in Speaker and Speech Characterisation
Nautsch, A.; Jiménez, A.; Treiber, A.; Kolberg, J.; Jasserand, C.; others
Computer Speech \& Language, Vol.58, p.441-480
[Journal Article]


Fingerprint Presentation Attack Detection Based on Local Features Encoding for Unknown Attacks
González-Soler, L. J.; Gomez-Barrero, M.; Chang, L.; Pérez-Suárez, A.; Busch, C.
arXiv preprint
[Journal Article]


Light Fields for Face Analysis
Galdi, C.; Chiesa, V.; Busch, C.; Correia, P. Lobato; Dugelay, J.-L.; Guillemot, C.
IEEE Sensors Journal, Vol.19, p.2687
[Journal Article]


Computational Workload in Biometric Identification Systems: An Overview
Drozdowski, P.; Rathgeb, C.; Busch, C.
IET Biometrics, Vol.8, p.351-368
[Journal Article]


Souveränität und die IT-Wertschöpfungskette
Weber, Arnd; Reith, Steffen; Kasper, Michael; Kuhlmann, Dirk; Seifert, Jean-Pierre; Krauß, Christoph
Datenschutz und Datensicherheit, Vol.42, p.291-293
[Journal Article]


SIFT-based iris recognition revisited: prerequisites, advantages and improvements
Rathgeb, C.; Wagner, J.; Busch, C.
Pattern Analysis and Applications
[Journal Article]


Homomorphic Encryption for Speaker Recognition: Protection of Biometric Templates and Vendor Model Parameters
Nautsch, A.; Isadskiy, S.; Kolberg, J.; Gomez-Barrero, M.; Busch, C.
Procs. Speaker Odyssey, p.16-23
[Journal Article]


Fingerprint Presentation Attack Detection using Laser Speckle Contrast Imaging
Keilbach, P.; Kolberg, J.; Gomez-Barrero, M.; Busch, C.; Langweg, H.
Proc. Int. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1-6
[Journal Article]


Predicting the vulnerability of biometric systems to attacks based on morphed biometric information
Gomez-Barrero, M.; Rathgeb, C.; Scherhag, Ulrich; Busch, C.
IET Biometrics, Vol.7, p.333-341
[Journal Article]


Multi-biometric template protection based on bloom filters
Gomez-Barrero, M.; Rathgeb, C.; Li, G.; Raghavendra, R.; Galbally, J.; Busch, C.
Information Fusion, Vol.42, p.37-50
[Journal Article]


General Framework to Evaluate Unlinkability in Biometric Template Protection Systems
Gomez-Barrero, M.; Galbally, J.; Rathgeb, C.; Busch, C.
IEEE Trans. on Information Forensics and Security, Vol.13, p.1406-1420
[Journal Article]


Selbstdatenschutz im vernetzten Fahrzeug - Eine Datenschutzloesung unter Berücksichtigung der technischen, rechtlichen und Nutzeranforderungen
Krauß, Christoph; Robrahn, Rasmus; von Pape, Thilo; Zelle, Daniel
Datenschutz und Datensicherheit, Vol.41, p.217-222
[Journal Article]


Design and Implementation Aspects of Mobile Derived Identities
Träder, Daniel; Zeier, Alexander; Heinemann, Andreas
CoRR, Vol.abs/1707.06505
[Journal Article]


Alle reden über Blockchain
Grimm, Rüdiger; Heinemann, Andreas
Datenschutz und Datensicherheit, Vol.41, p.469
[Journal Article]


Methods for accuracy-preserving acceleration of large-scale comparisons in CPU-based iris recognition systems
Rathgeb, C.; Buchmann, N.; Hofbauer, H.; Baier, H.; Uhl, A.; Busch, C.
IET Biometrics
[Journal Article]