Publications

Publications

Biometric Systems under Morphing Attacks: Assessment of Morphing Techniques and Vulnerability Reporting
Scherhag, U.; Nautsch, A.; Rathgeb, C.; Gomez-Barrero, M.; Veldhuis, R. N. J.; Spreeuwers, Luuk; Schils, Maikel; Maltoni, Davide; Grother, Patrick; Marcel, Sebastien; Breithaupt, Ralph; Ramachandra, Raghavendra; Busch, Christoph
Intl. Conf. of the Biometrics Special Interest Group BIOSIG 2017, p.1-7
[Conference Proceedings]


On the Vulnerability of Face Recognition Systems Towards Morphed Face Attacks
Scherhag, U.; Raghavendra, R.; Raja, K. B.; Gomez-Barrero, M.; Rathgeb, C.; Busch, C.
5th Intl. Workshop on Biometrics and Forensics (IWBF), p.1-6
[Conference Proceedings]


Improvement of Iris Recognition Based on Iris-Code Bit-Error Pattern Analysis
Rathgeb, C.; Busch, C.
Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1-6
[Conference Proceedings]


On the Feasibility of Creating Morphed Iris-Codes
Rathgeb, C.; Busch, C.
Proc. Intl. Joint Conf. on Biometrics (IJCB 2017)
[Conference Proceedings]


Scale-level score fusion of steered pyramid features for cross-spectral periocular verification
Raja, K. B.; Raghavendra, R.; Busch, C.
20th Intl. Conf. on Information Fusion, FUSION 2017, p.1-7
[Conference Proceedings]


Robust Verification With Subsurface Fingerprint Recognition Using Full Field Optical Coherence Tomography
Raja, K. B.; Auksorius, E.; Raghavendra, R.; Boccara, A. C.; Busch, C.
2017 IEEE Conf. on Computer Vision and Pattern Recognition Workshops CVPR, p.646-654
[Conference Proceedings]


Deep Quality-Informed Score Normalization for Privacy-Friendly Speaker Recognition in Unconstrained Environments
Nautsch, A.; Steen, S. T.; Busch, C.
Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1-4
[Conference Proceedings]


da/sec ASVspoof2017 Submission
Nautsch, A.; Scherhag, U.; Isadskiy, S.; Rathgeb, C.; Busch, C.
Prof. of the ASVspoof evaluation
[Conference Proceedings]


The I4U Mega Fusion and Collaboration for NIST Speaker Recognition Evaluation 2016
Lee, K. A.; Hautamäki, V.; Kinnunen, T.; Larcher, A.; Zhang, C.; others
Proc. of the Annual Conf. of the Intl. Speech Communication Association (INTERSPEECH)
[Conference Proceedings]


Biometrie symmetry: Implications on template protection
Gomez-Barrero, M.; Rathgeb, C.; Raja, K. B.; Raghavendra, R.; Busch, C.
25th European Signal Processing Conf. EUSIPCO 2017, p.941-945
[Conference Proceedings]


Biometric Symmetry: Implications on Template Protection
Gomez-Barrero, M.; Rathgeb, C.; Raja, K. B.; Raghavendra, R.; Busch, C.
Proc. European Signal Processing Conf. (EUSIPCO)
[Conference Proceedings]


Is Your Biometric System Robust to Morphing Attacks?
Gomez-Barrero, M.; Rathgeb, C.; Scherhag, U.; Busch, C.
Proc. 5th Intl. Workshop on Biometrics and Forensics (IWBF), p.1-6
[Conference Proceedings]


Accuracy Evaluation of Handwritten Signature Verification: Rethinking the Random-Skilled Forgeries Dichotomy
Galbally, J.; Gomez-Barrero, M.; Ross, A.
Proc. Int. Joint Conf. on Biometrics (IJCB)
[Conference Proceedings]


SIC-Gen: A Synthetic Iris-Code Generator
Drozdowski, P.; Rathgeb, C.; Busch, C.
Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1-6
[Conference Proceedings]


Multi-Iris Indexing and Retrieval: Fusion Strategies for Bloom Filter-based Search Structures
Drozdowski, P.; Rathgeb, C.; Busch, C.
Proc. Intl. Joint Conf. on Biometrics (IJCB 2017), p.1-8
[Conference Proceedings]


Towards Pre-alignment of Near-infrared Iris Images
Drozdowski, P.; Rathgeb, C.; Hofbauer, H.; Wagner, J.; Uhl, A.; Busch, C.
Intl. Joint Conf. on Biometrics (IJCB), p.1-8
[Conference Proceedings]


Enhancing Breeder Document Long-Term Security Using Blockchain Technology
Buchmann, N.; Rathgeb, C.; Baier, H.; Busch, C.; Margraf, M.
41st IEEE Annual Computer Software and Applications Conf. COMPSAC 2017, p.744-748
[Conference Proceedings]


Combining multiple iris texture features for unconstrained recognition in visible wavelengths
Andersen-Hoppe, E.; Rathgeb, C.; Busch, C.
5th Intl. Workshop on Biometrics and Forensics IWBF, p.1-6
[Conference Proceedings]


ID2T - The Intrusion Detection Dataset Generation Toolkit
Garcia Cordero, Carlos; Vasilomanolakis, Emmanouil; Mühlhäuser, Max
Black Hat Europe 2017
[Conference Proceedings]


Measuring privacy in high dimensional microdata collections
Boukoros, Spyros; Katzenbeisser, Stefan
Proceedings of the 12th International Conference on Availability, Reliability and Security
[Conference Proceedings]


Secure Two-Party Computation Using an Efficient Garbled Circuit by Reducing Data Transfer
Yalame, Mohammad Hossein; Farzam, Mohammad Hossein; Sarmadi, Siavash Bayat
8. International Conference on Applications and Techniques in Information Security (ATIS'17)
[Conference Proceedings]


Enriched Nudges Lead to Stronger Password Replacements … but Implement Mindfully
Renaud, Karen; Zimmermann, Verena
Proceedings of the 2017 Information Security for South Africa (ISSA) Conference, p.1-9
[Conference Proceedings]


“If It Wasn’t Secure, They Would Not Use It in the Movies” – Security Perceptions and User Acceptance of Authentication Technologies
Zimmermann, Verena; Gerber, Nina
Human Aspects of Information Security, Privacy and Trust, p.265-283
[Conference Proceedings]


Lessons Learned from Evaluating Eight Password Nudges in the Wild
Renaud, Karen; Maguire, Joseph; Zimmermann, Verena; Draper, Steve
Proceedings of LASER 2017 Learning from Authoritative Security Experiment Results, p.25-38
[Conference Proceedings]


Erwartungen der älteren Bevölkerung an IKT für Krisenkommunikation
Wiegärtner, Daniel; Reuter, Christian; Müller, Claudia
Mensch & Computer 2017 - Workshopband, p.609-614
[Conference Proceedings]


DIVOA – Unterstützung der älteren Bevölkerung bei Schadenslagen
Reuter, Christian; Wiegärtner, Daniel; Müller, Claudia
Mensch & Computer 2017: Tagungsband, p.295-298
[Conference Proceedings]


Terrorbekämpfung mithilfe sozialer Medien – ein explorativer Einblick am Beispiel von Twitter
Reuter, Christian; Pätsch, Katja; Runft, Elena
Proceedings der 13. Internationalen Tagung Wirtschaftsinformatik (WI 2017), p.649-663
[Conference Proceedings]


4. Workshop Mensch-Maschine-Interaktion in sicherheitskritischen Systemen
Reuter, Christian; Mentler, Tilo; Geisler, Stefan; Herczeg, Michael; Ludwig, Thomas; Pipek, Volkmar; Nestler, Simon
Mensch und Computer 2017 - Workshopband, p.5-8
[Conference Proceedings]


Rumors, Fake News and Social Bots in Conflicts and Emergencies: Towards a Model for Believability in Social Media
Reuter, Christian; Kaufhold, Marc-André; Steinfort, René
Proceedings of the 14th International Conference on Information Systems for Crisis Response And Management; ISCRAM 2017, p.583-591
[Conference Proceedings]


Social Media in Emergencies: A Representative Study on Citizens' Perception in Germany
Reuter, Christian; Kaufhold, Marc-André; Spielhofer, Thomas; Hahne, Anna Sophie
Proceedings of the ACM Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing Vol. 1 Issue CSCW, p.1-19
[Journal Article, Conference Proceedings]