Publications
Publications
Detecting Morphed Face Images Using Facial Landmarks
Scherhag, U.; Budhrani, D.; Gomez-Barrero, M.; Busch, C.
Intl. Conf. on Image and Signal Processing (ICISP)
[Conference Proceedings]
SIFT-based iris recognition revisited: prerequisites, advantages and improvements
Rathgeb, C.; Wagner, J.; Busch, C.
Pattern Analysis and Applications
[Journal Article]
Multi-sample Compression of Iris Images using High Efficiency Video Coding
Rathgeb, C.; Schlett, T.; Buchmann, N.; Baier, H.; Busch, C.
Intl. Conf. on Biometrics (ICB 18), p.1-6
[Conference Proceedings]
Visible Wavelength Iris Segmentation: A Multi-Class Approach using Fully Convolutional Neuronal Networks
Osorio-Roig, D.; Rathgeb, C.; Gomez-Barrero, M.; Morales-Gonzalez, A.; Garea-Llano, E.; Busch, C.
Intl. Conf. of the Biometrics Special Interest Group (BIOSIG)
[Conference Proceedings]
Iris Recognition in Visible Wavelength: Impact and automated Detection of Glasses
Osorio-Roig, D.; Drozdowski, P.; Rathgeb, C.; Morales-González, A.; Garea-Llano, E.; Busch, C.
Intl. Workshop on Ubiquitous implicit BIOmetrics and health signals monitoring for person-centric applications (UBIO), p.1-6
[Conference Proceedings]
Homomorphic Encryption for Speaker Recognition: Protection of Biometric Templates and Vendor Model Parameters
Nautsch, A.; Isadskiy, S.; Kolberg, J.; Gomez-Barrero, M.; Busch, C.
Procs. Speaker Odyssey, p.16-23
[Journal Article]
Fingerprint Presentation Attack Detection using Laser Speckle Contrast Imaging
Keilbach, P.; Kolberg, J.; Gomez-Barrero, M.; Busch, C.; Langweg, H.
Proc. Int. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1-6
[Journal Article]
Predicting the vulnerability of biometric systems to attacks based on morphed biometric information
Gomez-Barrero, M.; Rathgeb, C.; Scherhag, Ulrich; Busch, C.
IET Biometrics, Vol.7, p.333-341
[Journal Article]
Multi-biometric template protection based on bloom filters
Gomez-Barrero, M.; Rathgeb, C.; Li, G.; Raghavendra, R.; Galbally, J.; Busch, C.
Information Fusion, Vol.42, p.37-50
[Journal Article]
Towards Multi-Modal Finger Presentation Attack Detection
Gomez-Barrero, M.; Kolberg, J.; Busch, C.
Proc. UBIO, p.547-552
[Conference Proceedings]
General Framework to Evaluate Unlinkability in Biometric Template Protection Systems
Gomez-Barrero, M.; Galbally, J.; Rathgeb, C.; Busch, C.
IEEE Trans. on Information Forensics and Security, Vol.13, p.1406-1420
[Journal Article]
Privacy-Preserving Indexing of Iris-Codes with Cancelable Bloom Filter-based Search Structures
Drozdowski, P.; Garg, S.; Rathgeb, C.; Gomez-Barrero, M.; Chang, D.; Busch, C.
European Signal Processing Conf. (EUSIPCO), p.1-5
[Conference Proceedings]
Database Binning and Retrieval in Multi-Fingerprint Identification Systems
Drozdowski, P.; Fischer, D.; Rathgeb, C.; Schiel, C.; Busch, C.
Intl. Workshop on Information Forensics and Security (WIFS), p.1-7
[Conference Proceedings]
Detection of Glasses in Near-infrared Ocular Images
Drozdowski, P.; Struck, F.; Rathgeb, C.; Busch, C.
Intl. Conf. on Biometrics (ICB), p.1-7
[Conference Proceedings]
Score Fusion Strategies in Single-Iris Dual-Probe Recognition Systems
Drozdowski, P.; Wiegand, N.; Rathgeb, C.; Busch, C.
Intl. Conf. on Biometric Engineering and Applications (ICBEA), p.13-17
[Conference Proceedings]
Benchmarking Binarisation Schemes for Deep Face Templates
Drozdowski, P.; Struck, F.; Rathgeb, C.; Busch, C.
Intl. Conf. on Image Processing (ICIP), p.1-5
[Conference Proceedings]
PRNU Variance Analysis for Morphed Face Image Detection
Debiasi, L.; Scherhag, U.; Rathgeb, C.; Uhl, A.; Busch, C.
in Proc. of 9th Intl. Conf. on Biometrics: Theory, Applications and Systems (BTAS 2018)
[Conference Proceedings]
PRNU-based Detection of Morphed Face Images
Debiasi, L.; Scherhag, U.; Rathgeb, C.; Uhl, A.; Busch, C.
6th Intl. Workshop on Biometrics and Forensics, p.1-6
[Conference Proceedings]
Removing the Bottleneck for Practical 2PC
Shrishak, Kris; Shulman, Haya; Waidner, Michael
ACM SIGSAG Conference on Computer and Communications Security (ACM CCS)
[Conference Proceedings]
Perfect is the Enemy of Good: Setting Realistic Goals for BGP Security
Gilad, Yossi; Hlavacek, Tomas; Herzberg, Amir; Schapira, Michael; Shulman, Haya
HotNets'18: 17th ACM Workshop on Hot Topics in Networks
[Conference Proceedings]
Off-path Attacks Against PKI
Dai, Tianxiang; Shulman, Haya; Waidner, Michael
ACM SIGSAG Conference on Computer and Communications Security (CCS 2018)
[Conference Proceedings]
Internet As a Source of Randomness
Brandt, Markus; Shulman, Haya; Waidner, Michael
HotNets '18: 17th ACM Workshop on Hot Topics in Networks
[Conference Proceedings]
IANUS am FiF und darüber hinaus: Die Bedeutung natur- und ingenieurwissenschaftlicher Friedensforschung für die TU Darmstadt
Nordmann, Alfred; Reuter, Christian; Lederer, Markus
10 Jahre Forum interdisziplinäre Forschung an der TU Darmstadt, p.70-89
Towards a Cloud-based System for Software Protection and Licensing
Schaad, Andreas; Grohmann, Bjoern; Winzenried, Oliver; Brasser, Ferdinand; Sadeghi, Ahmad-Reza
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, ICETE 2018 - Volume 2, p.698-702
[Conference Proceedings]
CodeMatch: Obfuscation Won't Conceal Your Repackaged App
Glanz, Leonid; Amann, Sven; Eichberg, Michael; Reif, Michael; Mezini, Mira
Software Engineering und Software Management 2018, p.117-118
‘Home, Smart Home’ – Exploring End Users’ Mental Models of Smart Homes
Zimmermann, Verena; Bennighof, Merve; Edel, Miriam; Hofmann, Oliver; Jung, Judith; Wick, Melina von
Mensch und Computer 2018 - Workshopband
[Conference Proceedings]
Nudging folks towards stronger password choices: Providing certainty is the key.
Renaud, Karen; Zimmermann, Verena
Behavioural Public Policy (BPP), p.1-31
[Journal Article]
Ethical guidelines for nudging in information security & privacy
Renaud, Karen; Zimmermann, Verena
International Journal of Human-Computer Studies (IJHCS), p.22-35
[Journal Article]
Nutzerwahrnehmung der Ende-zu-Ende-Verschlüsselung in WhatsApp
Gerber, Nina; Zimmermann, Verena; Henhapl, Birgit; Emeröz, Sinem; Volkamer, Melanie; Hilt, Tobias
Datenschutz und Datensicherheit (DuD), p.680-685
[Journal Article]
Guidelines For Ethical Nudging in Password Authentication
Renaud, Karen; Zimmermann, Verena
South African Institute Of Electrical Engineers (SAIEE), p.102-118
[Journal Article]