Publikationen

Publikationen

Empirical Evaluation of Texture-Based Print and Contact Lens Iris Presentation Attack Detection Methods
H. Mandalapu and R. Raghavendra and C. Busch
Proc. of the 3rd Intl. Conf. on Biometric Engineering and Applications (ICBEA)
[Conference Proceedings]


Multi-algorithm Benchmark for Fingerprint Presentation Attack Detection with Laser Speckle Contrast Imaging
J. Kolberg and M. Gomez-Barrero and C. Busch
Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1–5


Template Protection based on Homomorphic Encryption: Computationally Efficient Application to Iris-Biometric Verification and Identification
J. Kolberg and P. Bauspieß and M. Gomez-Barrero and C. Rathgeb and M. Dürmuth and C. Busch
IEEE Workshop on Information Forensics and Security (WIFS), p.1–6


On the Impact of Different Fabrication Materials on Fingerprint Presentation Attack Detection
L. J. González-Soler and M. Gomez-Barrero and L. Chang and A. Perez-Suarez and C. Busch
Proc. Int. Conf. on Biometrics (ICB)
[Conference Proceedings]


Fingerprint Presentation Attack Detection Based on Local Features Encoding for Unknown Attacks
L. J. González-Soler and M. Gomez-Barrero and L. Chang and A. Pérez-Suárez and C. Busch
arXiv preprint
[Journal Article]


Multi-Modal Fingerprint Presentation Attack Detection: Looking at the Surface and the Inside
M. Gomez-Barrero and J. Kolberg and C. Busch
Proc. Int. Conf. on Biometrics (ICB), p.1–8
[Conference Proceedings]


Multi-Spectral Convolutional Neural Networks for Biometric Presentation Attack Detection
M. Gomez-Barrero and C. Busch
Proc. of the Norwegian Information Security Conf. (NISC)
[Conference Proceedings]


Light Fields for Face Analysis
C. Galdi and V. Chiesa and C. Busch and P. Lobato Correia and J.-L. Dugelay and C. Guillemot
IEEE Sensors Journal, Vol.19, p.2687
[Journal Article]


Computational Workload in Biometric Identification Systems: An Overview
P. Drozdowski and C. Rathgeb and C. Busch
IET Biometrics, Vol.8, p.351–368
[Journal Article]


Turning a Vulnerability into an Asset: Accelerating Facial Identification with Morphing
P. Drozdowski and C. Rathgeb and C. Busch
Intl. Conf. on Acoustics, Speech, and Signal Processing (ICASSP), p.1–5
[Conference Proceedings]


On the Application of Homomorphic Encryption to Face Identification
P. Drozdowski and N. Buchmann and C. Rathgeb and M. Margraf and C. Busch
Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1–8
[Conference Proceedings]


On the Detection of GAN-Based Face Morphs Using Established Morph Detectors
L. Debiasi and N. Damer and A. Moseguí-Saladié and C. Rathgeb and U. Scherhag and C. Busch and F. Kirchbuchner and A. Uhl
Image Analysis and Processing (ICIAP), p.345–356
[Conference Proceedings]


Standards for Biometric Presentation Attack Detection
C. Busch
Handbook of Biometric Anti-Spoofing, p.503–514


eContracting: Case Study - Face Recognition in the Biometric Passport
C. Busch
eDemocracy and eGovernment


On Lions and Elligators: An Efficient Constant-Time Implementation of CSIDH
Meyer, Michael and Campos, Fabio and Reith, Steffen
International Conference on Post-Quantum Cryptography (PQCrypto), p.307–325
[Conference Proceedings]


Post-Quantum Cryptography for ECU Security Use Cases
Campos, Fabio and Meyer, Michael and Sanwald, Steffen and Stöttinger, Marc and Wang, Yi


Language-Integrated Privacy-Aware Distributed Queries
Salvaneschi, Guido; Köhler, Mirko; Sokolowski, Daniel; Haller, Philipp; Erdweg, Sebastian; Mezini, Mira
Proceedings of the ACM on Programming Languages, p.1-30
[Journal Article]


Cross-spectrum thermal to visible face recognition based on cascaded image synthesis
Mallat, Khawla; Damer, Naser; Boutros, Fadi; Kuijper, Arjan; Dugelay, Jean-Luc
International Conference on Biometrics (ICB) 2019
[Conference Paper]


Thermal and Cross-spectral Palm Image Matching in the Visual Domain by Robust Image Transformation
Bartuzi, Ewelina; Damer, Naser
International Conference on Biometrics (ICB) 2019
[Conference Paper]


Reliable Age and Gender Estimation from Face Images: Stating the Confidence of Model Predictions
Terhörst, Philipp; Zelch, Ines; Huber, Marco; Kolf, Jan Niklas; Damer, Naser; Kirchbuchner, Florian; Kuijper, Arjan
International Conference on Biometrics - Theory, Applications and Systems (BTAS) 2019
[Conference Paper]


Realistic Dreams: Cascaded Enhancement of GAN-generated Imageswith an Example in Face Morphing Attacks
Damer, Naser; Boutros, Fadi; Saladie, Alexandra Moseguí; Kirchbuchner, Florian; Kuijper, Arjan
International Conference on Biometrics - Theory, Applications and Systems (BTAS) 2019
[Conference Paper]


Cross-Spectral Periocular Recognition by Cascaded Spectral Image Transformation
Raja, Kiran; Damer, Naser; Ramachandra, Raghavendra; Boutros, Fadi; Busch, Christoph
International Conference on Imaging Systems & Techniques (IST) 2019
[Conference Paper]


Minutiae-Based Gender Estimation for Full and Partial Fingerprints of Arbitrary Size and Shape
Terhörst, Philipp; Damer, Naser; Braun, Andreas; Kuijper, Arjan
Asian Conference on Computer Vision (ACCV) 2018
[Conference Paper]


Unsupervised Privacy-enhancement of Face Representations Using Similarity-sensitive Noise Transformations
Terhörst, Philipp; Damer, Naser; Kirchbuchner, Florian; Kuijper, Arjan
[Journal Article]


D-ID-Net: Two-Stage Domain and Identity Learning for Identity-Preserving Image Generation from Semantic Segmentation
Damer, Naser; Boutros, Fadi; Kirchbuchner, Florian; Kuijper, Arjan
International Conference on Computer Vision (ICCV) 2019
[Conference Paper]


Eye-MMS: Miniature Multi-Scale Segmentation Network of Key Eye-Regions in Embedded Applications
Boutros, Fadi; Damer, Naser; Kirchbuchner, Florian; Kuijper, Arjan
International Conference on Computer Vision (ICCV) 2019
[Conference Paper]


To (Psychologically) Own Data is to Protect Data: How Psychological Ownership Determines Protective Behavior in a Work and Private Context
Heidt, Margareta; Olt, Christian M.; Buxmann, Peter
Internationale Tagung Wirtschaftsinformatik
[Conference Proceedings]


HEALED: HEaling & Attestation for Low-end Embedded Devices
Ibrahim, Ahmad; Sadeghi, Ahmad-Reza; Tsudik, Gene
23rd International Conference Financial Cryptography and Data Security (FC 2019), 2019
[Conference Proceedings]


Asymmetric DCnets for Effective and Efficient Sender Anonymity
Grube, Tim; Daubert, Jörg; Mühlhäuser, Max
IEEE Global Communications Conference (GLOBECOM)
[Conference Proceedings]


DoubleEcho: Mitigating Context-Manipulation Attacks in Copresence Verification
Truong, Hien Thi Thu; Toivonen, Juhani; Nguyen, Thien Duc; Soriente, Claudio; Tarkoma, Sasu; Asokan, N.
IEEE International Conference on Pervasive Computing and Communications (PerCom2019)
[Conference Proceedings]