Publikationen

Publikationen

Hornung/Schallbruch (Hrsg.): IT-Sicherheitsrecht. Praxishandbuch.
Marian Margraf and Andreas Heinemann
[Book Article]


On the State of Post-Quantum Cryptography Migration
Nouri Alnahawi and Alexander WiesmaierAND Tobias Grasmeyer and Julian Geißler and Alexander Zeier and Pia Bauspieß and Andreas Heinemann
INFORMATIK 2021 — PQKP-Workshop, p.907-941
[Conference Proceedings]


Software Development Processes for ADs, SMCs and OSCs supporting Usability, Security, and Privacy Goals - an Overview
Tim Bender and Rolf Huesmann and Andreas Heinemann
ARES 2021, SSC Workshop: The 16th International Conference on Availability, Reliability and Security, Virtual Event, August 17-20, 2021
[Conference Proceedings]


It is not as simple as that: Playing out password security trainings in order to nudge password changes
Fabian Sterk and Andreas Heinemann
EICC '21: European Interdisciplinary Cyber­security Conference, Virtual Event, Romania, November 10-11, 2021, p.20–25
[Conference Proceedings]


On the Applicability of Synthetic Data for Face Recognition
H. Zhang and M. Grimmer and R. Raghavendra and K. Raja and C. Busch
Intl. Workshop on Biometrics and Forensics (IWBF)
[Conference Proceedings]


Single Morphing Attack Detection Using Feature Selection and Visualization Based on Mutual Information
J. Tapia and C. Busch
IEEE Access, Vol.9, p.167628–167641
[Journal Article]


Semantic Segmentation of Periocular Near-Infra-Red Eye Images Under Alcohol Effects
J. Tapia and E.Lopez-Droguett and A. Valenzuela and D. Benalcazar and L. Causa and C. Busch
IEEE Access
[Journal Article]


NIR Iris Challenge Evaluation in Non-cooperative Environments: Segmentation and Localization
C. Wang and J. Tapia
Proc. of the 2021 Intl. Joint Conf. on Biometrics (IJCB)
[Conference Proceedings]


Iris Liveness Detection Using a Cascade of Dedicated Deep Learning Networks
J. Tapia, S. Gonzalez and C. Busch
IEEE Trans. on Information Forensics and Security, Vol.17, p.42–52
[Journal Article]


Image Quality Assessment on Identity Documents
C. Yanez and J. Tapia
Proc. Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1–5
[Conference Proceedings]


Face Image Quality Assessment: A Literature Survey
T. Schlett and C. Rathgeb and O. Henniger and J. Galbally and J. Fierrez and C. Busch
ACM Computing Surveys (CSUR)
[Journal Article]


Deep learning-based single image face depth data enhancement
T. Schlett and C. Rathgeb and C. Busch
Computer Vision and Image Understanding (CVIU), Vol.210
[Journal Article]


Impact of Doppelgängers on Face Recognition: Database and Evaluation
C. Rathgeb and P. Drozdowski and M. Obel and A. Dörsch and F. Stockhardt and N. E. Haryanto and K. Bernardo and C. Busch
Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1–4
[Conference Proceedings]


An Overview of touchless 2D Fingerprint Recognition
J. Priesnitz and C. Rathgeb and N. Buchmann and C. Busch
EURASIP Journal on Image and Video Processing (JIVP)
[Journal Article]


Stable Hash Generation for Efficient Privacy-Preserving Face Identification
D. Osorio-Roig and C. Rathgeb and P Drozdowski and C. Busch
Trans. on Biometrics, Behavior, and Identity Science (TBIOM), Vol.4, p.333–348
[Journal Article]


NFIQ 2 NIST Fingerprint Image Quality
E. Tabassi and M. Olsen and O. Bausinger and C. Busch and A. Figlarz and G. Fiumara and O. Henniger and J. Merkle and T. Ruhland and C. Schiel and M. Schwaiger
[Report]


Voice biometrics: how the technology is standardized
A. Nautsch and C. Busch
Voice Biometrics: Technology, trust and security, p.139–162


Morphing Attack Detection: A Fusion Approach
S. Lorenz and U. Scherhag and C. Rathgeb and C. Busch
2021 IEEE 24th Intl. Conf. on Information Fusion (FUSION), p.703–709
[Conference Proceedings]


Security Enhancement and Privacy Protection for Biometric Systems
J. Kolberg


On the Effectiveness of Impedance-Based Fingerprint Presentation Attack Detection
J. Kolberg and D. Gläsner and R. Breithaupt and M. Gomez-Barrero and J. Reinhold and A. von Twickel and C. Busch
Sensors, Vol.21
[Journal Article]


Differential Anomaly Detection for Facial Images
M. Ibsen and L. J. Gonzalez-Soler and C. Rathgeb and P. Drozdowski and M. Gomez-Barrero and C. Busch
IEEE Intl. Workshop on Information Forensics and Security (WIFS), p.1–6
[Conference Proceedings]


Generation of Non-Deterministic Synthetic Face Datasets Guided by Identity Priors
M. Grimmer and H. Zhang and R. Raghavendra and K. Raja and C. Busch
https://www.ntnu.edu/nikt2021
[Journal Article]


Deep Face Age Progression: A Survey
M. Grimmer and R. Raghavendra and C. Busch
IEEE Access, Vol.9, p.83376–83393
[Journal Article]


Analysing the feasibility of using Objectosphere for Face Presentation Attack Detection
J. Gonzalez-Soler and M. Gomez-Barrero and M. Günther and C. Busch
Norwegian Information Security Conf. (NISK)
[Conference Proceedings]


Multi-Spectral Short Wave Infrared Sensors and Convolutional Neural Networks for Biometric Presentation Attack Detection
M. Gomez-Barrero and R. Tolosana and J. Kolberg and C. Busch
AI and Deep Learning in Biometric Security: Trends, Potential and Challenges, p.105–132


The Watchlist Imbalance Effect in Biometric Face Identification: Comparing Theoretical Estimates and Empiric Measurements
P. Drozdowski and C. Rathgeb and C. Busch
Intl. Conf. on Computer Vision Workshops (ICCVW), p.1–9
[Conference Proceedings]


Feature Fusion Methods for Indexing and Retrieval of Biometric Data: Application to Face Recognition with Privacy Protection
P. Drozdowski and F. Stockhardt and C. Rathgeb and D. Osorio-Roig and C. Busch
IEEE Access, Vol.9, p.139361–139378
[Journal Article]


A response to the European Data Protection Supervisor 'Misunderstandings in Biometrics' by the European Association for Biometrics
C. Busch and A. Czajka and F. Deravi and P. Drozdowski and M. Gomez-Barrero and G. Hasse and O. Henniger and E. Kindt and J. Kolberg and A. Nouak and K. Raja and R. Raghavendra and C. Rathgeb and J. Salomon and R. Veldhuis
IET Biometrics, Vol.11, p.79–86
[Journal Article]


On the Generalisation capabilities of Fisher Vector based Face Presentation Attack Detection
L. J. Gonzalez-Soler and M. Gomez-Barrero and C. Busch
IET Biometrics, Vol.10, p.480–496
[Journal Article]


On the Generalisation Capabilities of Fingerprint Presentation Attack Detection Methods in the Short Wave Infrared Domain
J. Kolberg and M. Gomez-Barrero and C. Busch
IET Biometrics, Vol.10, p.359–373
[Journal Article]