Publications

2017

Peer-reviewed publications

  1. Javier Galbally, Marta Gomez-Barrero, Arun Ross, „Accuracy evaluation of handwritten signature verification: Rethinking the random-skilled forgeries dichotomy“, in Proc. International Joint Conference on Biometrics (IJCB), Denver, US, October 2017.
  2. Marta Gomez-Barrero, Christian Rathgeb, Kiran Raja, R. Raghavendra, Christoph Busch, „Biometric Symmetry: Implications on Template Protection“,  in Proc. European Signal Processing Conference (EUSIPCO), Kos Island, Greece, August 2017.
  3. Kong Aik Lee, Ville Hautamäki, Tomi Kinnunen, Anthony Larcher, Chunlei Zhang, Andreas Nautsch, Themos Stafylakis et al., „The I4U Mega Fusion and Collaboration for NIST Speaker Recognition Evaluation 2016“, In Proceedings of INTERSPEECH, August 2017.
  4. Benjamin Kuhnert, Jessica Steinberger, Anna Sperotto, Harald Baier and Aiko Pras: „Booters and certificates: An overview of TLS in the DDoS-as-a-Service landscape“ in Proceedings of the 2nd International Conference on Advances in Computation, Communications and Services (ACCSE 2017), Venice (Italy), June 2017, to appear.
  5. Marta Gomez-Barrero, Christian Rathgeb, Christoph Busch, „Standardisierung von Biometric Template Protection: Aktueller Status und Bewertung der Verknüpfbarkeit“, Datenschutz und Datensicherheit (DuD), Vol. 41, no. 7,  pp. 422-426, July 2017
  6. Marta Gomez-Barrero, Javier Galbally, Aythami Morales, Julian Fierrez, „Privacy-Preserving Comparison of Variable-Length Data with Application to Biometric Template Protection“, IEEE Access,Vol. 5 (1), pp. 8606-8619, December 2017.
  7. Esbern Anderson-Hoppe, Christian Rathgeb, Christoph Busch, „Combining Multiple Iris Texture Features for Unconstrained Recognition in Visible Wavelengths“, in Proc. International Workshop on Biometrics and Forensics (IWBF), 2017.
  8. Marta Gomez-Barrero, Christian Rathgeb, Ulrich Scherhag, Christoph Busch, „Is Your Biometric System Robust to Morphing Attacks?“,  in Proc. International Workshop on Biometrics and Forensics (IWBF), Coventry, UK, April 2017.
  9. Ulrich Scherhag, R. Ramachandra. Kiran Raja, Marta Gomez-Barrero, Christian Rathgeb, Christoph Busch, „On the Vulnerability and Detection of Digital Morphed and Scanned Face Images“, in Proc. International Workshop on Biometrics and Forensics (IWBF), Coventry, UK, April 2017.
  10. Yen-Lung Lai, Zhe Jin, Andrew Beng Jin Teoh, Bok-Min Goi, Wun-She Yap, Tong-Yuen Chai, Christian Rathgeb, „Cancellable iris template generation based on Indexing-First-One hashing“, In Pattern Recognition (64), 2017.
  11. Edlira Martiri, Marta Gomez-Barrero, Bian Yang, Christoph Busch, „Biometric Template Protection Based on Bloom Filters and Honey Templates“, IET Biometrics, Vol. 6 (1), pp. 19-26, January 2017.
  12. Marta Gomez-Barrero, Emanuele Maiorana, Javier Galbally, Patrizio Campisi, Julian Fierrez, „Multi-Biometric Template Protection Based on Homomorphic Encryption“, in Pattern Recognition, Vol. 67, pp. 149-163, July 2017.
  13. N. Buchmann, C. Rathgeb, H. Baier, C. Busch and M. Margraf, Enhancing Breeder Document Long-Term Security using Blockchain Technology, SIMICE 2017: The 3rd IEEE International COMPSAC Workshop on Secure Identity Management in the Cloud Environment, 2017

Other publications

  1. Andreas Nautsch, Ulrich Scherhag, Christian Rathgeb, Christoph Busch, „da/sec ASVspoof2017 Submission“, In Proceedings of ASVspoof 2017 evaluation, 2017.

2016

Peer-reviewed publications

  1. T. Schlett, C. Rathgeb and C. Busch, „A Binarization Scheme for Face Recognition based on Multi-scale Block Local Binary Patterns“, International Conference of the Biometrics Special Interest Group (BIOSIG), 2016.
  2. C. Rathgeb, F. Struck and C. Busch, „Efficient BSIF-based Near-Infrared Iris Recognition“, International Conference on Image Processing Theory, Tools and Applications (IPTA), 2016.
  3. Julien Bringer, Constance Morel, Christian Rathgeb, „Security analysis and improvement of some biometric protected templates based on Bloom filters“, In Image and Vision Computing, 2016.
  4. Aythami Morales, Julian Fierrez, Ruben Tolosana, Javier Ortega-Garcia, Javier Galbally, Marta Gomez-Barrero, Andre Anjos, Sebastien Marcel, „Keystroke Biometrics Ongoing Competition“, In IEEE Access, Vol. 4, pp. 7736-7746, November 2016.
  5. Christian Rathgeb, Heinz Hofbauer, Andreas Uhl, Christoph Busch, „TripleA: Accelerated Accuracy-preserving Alignment for Iris-Codes“, In Proceedings of the 9th IAPR International Conference on Biometrics (ICB’16), 2016.
  6. Christian Rathgeb, Benjamin Tams, Johannes Wagner, Christoph Busch, „Unlinkable Improved Multi-Biometric Iris Fuzzy Vault“, In EURASIP Journal on Information Security, 2016.
  7. Christian Rathgeb, Anika Pflug, Johannes Wagner, Christoph Busch, „Effects of image compression on ear biometrics“, In IET Journal on Biometrics, 5(3), 2016.
  8. Christian Rathgeb, Andreas Uhl, Peter Wild, Heinz Hofbauer, „Design Decisions in an Iris Recognition SDK“, In Handbook of Iris Recognition (2nd Edition), Springer, 2016.
  9. Martin Stokkenes, Morten Sigaard, Kiran Raja, R. Ramachandra, Marta Gomez-Barrero, Christoph Busch, „Multi-Biometric Template Protection – A Security Analysis of Binarized Statistical Features for Bloom Filters on Smartphones“, In Proc. 6th International Conference on Image Processing Theory, Tools and Applications (IPTA), Oulu (Finland), December 2016.
  10. Marta Gomez-Barrero, Christian Rathgeb, Javier Galbally, Christoph Busch and Julian Fierrez: „Unlinkable and Irreversible Biometric Template Protection Based on Bloom Filters“ in Information Sciences, Vol. 370-371, pp. 18-32, November 2016.
  11. Martin Stokkenes, R. Ramachandra, Kiran Raja, Morten Sigaard, Marta Gomez-Barrero, Christoph Busch, „Multi-Biometric Template Protection on Smartphones: An Approach based on Binarized Statistical Features and Bloom Filters“, In Proc. XXI IberoAmerican Congress in Pattern Recognition (CIARP), Lima (Peru), November 2016.
  12. Jessica Steinberger, Benjamin Kuhnert, Anna Sperotto, Harald Baier and Aiko Pras: „In whom do we trust – sharing security events“ in Proceedings of 10th International Conference on Autonomous Infrastructure, Management and Security (AIMS 2016), Munich (Germany), June 2016, to appear.
  13. Aiko Pras, José Jair Santanna, Jessica Steinberger and Anna Sperotto: „DDoS 3.0 – How terrorists bring down the Internet“ in Proceedings of 18th International GI/ITG Conference on Measurement, Modelling and Evaluation of Computing Systems and Dependability and Fault-Tolerance (MMB & DFT), Münster (Germany), April 2016, to appear.
  14. Jessica Steinberger, José Jair Santanna, Evangelos Spatharas, Hendrik Amler, Niklas Breuer, Kristian Graul, Benjamin Kuhnert, Ulrike Piontek, Anna Sperotto, Harald Baier and Aiko Pras: „“Ludo“ – kids playing Distributed Denial of Service“ in Proceedings of TERENA Networking Conference (TNC16), Prague (Czech Republic), June 2016, to appear.
  15. Jessica Steinberger, Benjamin Kuhnert, Anna Sperotto, Harald Baier and Aiko Pras: „Collaborative DDoS Defense using Flow-based Security Event Information“ in Proceedings of IEEE/IFIP Network Operations and Management Symposium (NOMS’16), Istanbul (Turkey), April 2016, to appear.
  16. N. Buchmann, C. Rathgeb, J. Wagner, C. Busch and H. Baier, A Preliminary Study on the Feasibility of Storing Fingerprint and Iris Image Data in 2D-Barcodes, Biometrics Special Interest Group (BIOSIG), 2016 International Conference of the, 2016
  17. Li, B. Yang, C. Busch: „A Fingerprint Indexing Algorithm on Encrypted Domain“, in Proceedings of the 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2016), Tianjin, China, August 23-26, (2016)
  18. Raghavendra, C. Busch: „A Low Cost Wrist Vein Sensor for Biometric Authentication“, in Proceedings of the IEEE International Conference on Imaging Systems and Techniques (IST 2016), Chania, Greece, October 4-6, (2016)
  19. Haraksim, A. Anthonioz, C. Champod, M. Olsen, J. Ellingsgaard, C. Busch: „Altered fingerprint detection – Algorithm performance evaluation“, in Proceedings of the 4th International Workshop on Biometrics and Forensics 2016 (IWBF 2016), 3-4th March 2016, Limassol, Cyprus, (2016)PDF-Version
  20. Stokkenes, R. Raghavendra, C. Busch: „Authentication protocols for biometric identity on smartphones – An overview“, in Proceedings of the 9th International Conference on Security of Information and Networks (SIN 2016), July 20-22, New Jersey, USA, (2016)
  21. Raja, R. Raghavendra, C. Busch: „Biometric Recognition of Surgically Altered Periocular Region : A Comprehensive Study“, in Proceedings of the 9th IAPR International Conference on Biometrics (ICB 2016), June 13-16, Halmstad, Sweden, (2016)
  22. Brömme, C. Busch, C. Rathgeb, A. Uhl: „BIOSIG 2016: Proceedings – International Conference of the Biometrics Special Interest Group“, 21.-23. September 2016, Darmstadt, Germany, ISBN 978-3-88579-654-1, (2016)
  23. Raja, R. Raghavendra, C. Busch: „Collaborative Representation of Deep Sparse Filtered Features for Robust Verification of Smartphone Periocular Images“, in Proceedings of the International Conference on Image Processing (ICIP 2016), September 25-28, Phoenix, USA, (2016)
  24. Merkle, M. Butt, U. Korte, C. Busch: „Correlation-resistant Fuzzy Vault for Fingerprints“, in Proceedings of the Sicherheit-2016 Conference (Sicherheit), April 5-7, Bonn, Germany, (2016)
    Sequeira, L. Chen, P. Wild, J. Ferryman, F. Alonso-Fernandez, K. Raja, R. Raghavendra, C. Busch, J. Bigun: „Cross-Eyed – Cross-Spectral Iris/Periocular Recognition Database and Competition“, in Proceedings of the IEEE 15th International Conference of the Biometrics Special Interest Group (BIOSIG), Darmstadt, September 21-23, (2016) PDF-Version
  25. Raja, R. Raghavendra, C. Busch: „Cross-Spectrum Periocular Authentication for NIR and Visible Images Using Bank of Filters“, in Proceedings of the IEEE International Conference on Imaging Systems and Techniques (IST 2016), Chania, Greece, October 4-6, (2016)
  26. Nautsch, R. Bamberger, C. Busch: „Decision Robustness of Voice Activity Segmentation in Unconstrained Mobile Speaker Recognition Environments“, in Proceedings of the IEEE 15th International Conference of the Biometrics Special Interest Group (BIOSIG), Darmstadt, September 21-23, (2016) PDF-Version
  27. Schuch, S. Schulz, C. Busch: „De-Convolutional Auto-Encoder for Enhancement of Fingerprint Samples“, in Proceedings of the Sixth International Conference on Image Processing Theory, Tools and Applications (IPTA 2016), Oulu, Finland, December 12-15, (2016)
  28. Nautsch, H. Hao, T. Stafylakis, C. Rathgeb, C. Busch: „Designing Stacked/Deep PLDA-RBM Systems“, in Proceedings of the 41st IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2016), March 20-25, Shanghai, China, (2016)
  29. Raghavendra, K. Raja, C. Busch: „Detecting Morphed Facial Images“, in Proceedings of 8th IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS-2016), September 6-9, Niagra Falls, USA, (2016)
  30. Raja, R. Raghavendra, C. Busch: „Dynamic Scale Selected Laplacian Decomposed Frequency Response for Cross-Smartphone Periocular Verification in Visible Spectrum“, in Proceedings of the 19th International Conference on Information Fusion (Fusion 2016), July 5-8, Heidelberg, Germany, (2016)
  31. Raghavendra, K. Raja, C. Busch: „Ear Recognition after Ear Lobe Surgery: A Preliminary Study“, in Proceedings of the IEEE International Conference on Identity, Secuirty and Behavior Analysis (ISBA 2016), February 29 – March 2, Sendai, Japan, (2016)
  32. Raghavendra, K. Raja, C. Busch: „Exploring the Usefulness of Light Field Cameras for Biometrics: An Empirical Study on Face and Iris Recognition“, in IEEE Transactions on Information Forensics and Security (TIFS), Vol. 11(5), (2016) PDF-Version
  33. Wasnik, K. Raja, R. Raghavendra, C. Busch: „Eye Region Based Multibiometric Fusion Framework to Mitigate the Effects of Body Weight Variations in Face Recognition“, in Proceedings of the 19th International Conference on Information Fusion (Fusion 2016), July 5-8, Heidelberg, Germany, (2016)
  34. Raghavendra, K. Raja, S. Marcel, C. Busch: „Face Presentation Attack Detection Across Spectrum using Time-Frequency Descriptors of Maximal Response in Laplacian Scale-Space“, in Proceedings of the Sixth International Conference on Image Processing Theory, Tools and Applications (IPTA 2016), Oulu, Finland, December 12-15, (2016)
  35. Olsen, V. Smida, C. Busch: „Finger Image Quality Assessment Features – Definitions and Evaluation“, in Journal on Biometrics, IET, (2016) PDF-Version
  36. Rathgeb, F. Struck, C. Busch: „How to apply Binarized Statistical Image Features to Near-Infrared Iris Recognition effectively“, in Proceedings of the Sixth International Conference on Image Processing Theory, Tools and Applications (IPTA 2016), Oulu, Finland, December 12-15, (2016)
  37. Raghavendra, K. Raja, C. Busch: „Impact of Drug Abuse on Face Recognition Systems : A Preliminary Study“, in Proceedings of the 9th International Conference on Security of Information and Networks (SIN 2016), July 20-22, New Jersey, USA, (2016)
  38. Raghavendra, K. Raja, V. Vemuri, S. Kumari, P. Gacon, E. Krichen, C. Busch: „Influence of Cataract Surgery on Iris Recognition: A Preliminary Study“, in Proceedings of the 9th IAPR International Conference on Biometrics (ICB 2016), June 13-16, Halmstad, Sweden, (2016)
  39. Raghavendra, C. Busch: „Learning Deeply Coupled Autoencodes for Smartphone based Robust Periocular Verification“, in Proceedings of the International Conference on Image Processing (ICIP 2016), September 25-28, Phoenix, USA, (2016)
  40. Damer, F. Maul, C. Busch: „Multi-biometric Continuous Authentication: a Trust Model for an Asynchronous System“, in Proceedings of the 19th International Conference on Information Fusion (Fusion 2016), July 5-8, Heidelberg, Germany, (2016)
  41. Paulini, C. Rathgeb, A. Nautsch, H. Reichau, H. Reininger, C. Busch: „Multi-Bit Allocation: Preparing Voice Biometrics for Template Protection“, in Proceedings of the Speaker and Language Recognition Workshop (Odyssey 2016), June 21-24, Bilbao, Spain, (2016)
  42. Raghavendra, S. Venkatesh, K. Raja, F. Cheikh and C. Busch: „Mutual Information Based Multispectral Image Fusion for Improved Face Recognition“, in Proceedings of the 12th International Conference on Signal Image Technology & Internet Systems (SITIS 2016), Naples, Italy, November 28 – December 1, (2016)
  43. Raghavendra, K. Raja, C. Busch: „On comparison score fusion of deep autoencoders and relaxed collaborative representation for smartphone based accurate periocular verification“, in Proceedings of the 19th International Conference on Information Fusion (Fusion 2016), July 5-8, Heidelberg, Germany, (2016)
  44. Raghavendra, K. Raja, C. Busch and P. Wasnik: „Presentation Attack Detection in Face Biometric Systems Using Raw Sensor Data from Smartphones“, in Proceedings of the 12th International Conference on Signal Image Technology & Internet Systems (SITIS 2016), Naples, Italy, November 28 – December 1, (2016)
  45. Nautsch, R. Saeidi, C. Rathgeb, C. Busch: „Robustness of Quality-based Score Calibration of Speaker Recognition Systems with respect to low-SNR and short-duration conditions“, in Proceedings of the Speaker and Language Recognition Workshop (Odyssey 2016), June 21-24, Bilbao, Spain, (2016)
  46. Liu, M. Pedersen, C. Charrier, P. Bours, C. Busch: „The Influence of Fingerprint Image Degradations on the Performance of Biometric System and Quality Assessment“, in Proceedings of the IEEE 15th International Conference of the Biometrics Special Interest Group (BIOSIG), Darmstadt, September 21-23, (2016) PDF-Version
  47. Scherhag, A. Nautsch, C. Busch: „Unit-selection attack detection based on unfiltered frequency-domain features“, in Proceedings of the Interspeech Conference, San Francisco, USA, September 8-12, (2016)
  48. Pedersen, J. Hardeberg, C. Busch: „Vision Security – the role of imageing for observer and observed“, in Proceedings of the IS&T International Symposium on Electronic Imaging (EI 2016), February 14-18, San Francisco, USA, (2016) PDF-Version
  49. Raja, R. Raghavendra, C. Busch: „Weighted Comparison Score Fusion for Accurate Verification of Surgically Altered Periocular Region“, in Proceedings of the 19th International Conference on Information Fusion (Fusion 2016), July 5-8, Heidelberg, Germany, (2016)

Other publications

  1. Andreas Nautsch, Sergey Isadskiy, Christian Rathgeb, Christoph Busch: „HDA NIST SRE’16 Systems (CRISP & I4U)“, in Proceedings of NIST SRE’16 workshop, San Diego, USA, (2016)
  2. Kong Aik Lee et al.: „The I4U submission to the 2016 NIST Speaker Recognition Evaluation“, in Proceedings of NIST SRE’16 workshop, San Diego, USA, (2016)

2015

Peer-reviewed publications

  1. Jessica Steinberger, Anna Sperotto, Aiko Pras, Harald Baier: „Real-time DDoS Defense: A collaborative Approach at Internet Scale“ at Gesellschaft für Informatik e.V. SIDAR SPRING (Spring 10), Neubiberg (Germany), July 2015
  2. Harald Baier: „Towards automated preprocessing of bulk data in digital forensic investigations using hash functions“, In it – Information Technology, Special Issue on IT Forensics, 57(6): 347–356, DE GRUYTER OLDENBOURG, 2015
  3. Benjamin Tams, Johannes Merkle, Christian Rathgeb, Johannes Wagner, Ulrike Korte, Christoph Busch, „Improved Fuzzy Vault Scheme for Alignment-Free Fingerprint Features“, In Proceedings of the International Conference of the Biometrics Special Interest Group (BIOSIG’15), 2015.
  4. Heinz Hofbauer, Christian Rathgeb, Johannes Wagner, Andreas Uhl, Christoph Busch, „Investigation of Better Portable Graphics Compression for Iris Biometric Recognition“, In Proceedings of the International Conference of the Biometrics Special Interest Group (BIOSIG’15), 2015.
  5. Andreas Nautsch, Rahim Saeidi, Christian Rathgeb, Christoph Busch, „Analysis of mutual duration and noise effects in speaker recognition: benefits of condition-matched cohort selection in score normalization“, in Proceedings of INTERSPEECH (IS’15), September 2015. (to appear)
  6. Jessica Steinberger, Anna Sperotto, Aiko Pras, Harald Baier: „Exchanging Security Events of flow-based Intrusion Detection Systems at Internet Scale“ at the Internet Architecture Board (IAB) and the Internet Society (ISOC) Coordinating Attack Response (CARIS) workshop (CARIS’15), Berlin (Germany), June 2015
  7. Anika Pflug, Christian Rathgeb, Ulrich Scherhag, Christoph Busch, “Binarization of Histogram Models: An Application to Efficient Biometric Identification”, CYBCONF 2015, Gdynia, Poland, to appear
  8. Christian Rathgeb, Frank Breitinger, Harald Baier, Christoph Busch, „Towards Bloom Filter-based Indexing of Iris Biometric Data“, In Proceedings of the 8th IAPR International Conference on Biometrics (ICB’15), pp. 1-8, 2015.
  9. Julien Bringer, Constance Morel, Christian Rathgeb, „Security analysis of Bloom Filter-based Iris Biometric Template Protection“, In Proceedings of the 8th IAPR International Conference on Biometrics (ICB’15), pp. 1-8, 2015.
  10. Sven Ossenbühl, Jessica Steinberger, Harald Baier: „Towards automated incident handling: How to select an appropriate response against a network-based attack?“ in Proceedings of 9th International Conference on IT Security Incident Management & IT Forensics (IMF’15), Magdeburg (Germany), May 2015.
  11. Jessica Steinberger, Anna Sperotto, Aiko Pras, Harald Baier: „Collaborative Attack Mitigation and Response: A survey“ in Proceedings of the 14th IFIP/IEEE Symposium on Integrated Network and Service Management (IM’15), Ottawa (Canada), May 2015.
  12. Jessica Steinberger, Anna Sperotto, Mario Golling, Harald Baier: „How to Exchange Security Events? Overview and Evaluation of Formats and Protocols“ in Proceedings of the 14th IFIP/IEEE Symposium on Integrated Network and Service Management (IM’15), Ottawa (Canada), May 2015.
  13. Andreas Nautsch, Christian Rathgeb, Rahim Saeidi, Christoph Busch, „Entropy analysis of i-vector feature spaces in duration-sensitive speaker recognition“, in Proceedings of 40th International Conference on Acoustics, Speech and Signal Processing (ICASSP’15), 2015.
  14. Guoqiang Li, Bian Yang, Christian Rathgeb, Christoph Busch, „Towards Generating Protected Fingerprint Templates based on Bloom FIlters“, In Proceedings of 3rd International Workshop on Biometrics and Forensics (IWBF’15), 2015.
  15. Christian Rathgeb, Marta Gomez-Barrero, Christoph Busch, Javier Galbally, Julian Fierrez, „Towards Cancelable Multi-Biometrics based on Adaptive Bloom Filters: A Case Study on Feature Level Fusion of Face and Iris“, In Proceedings of 3rd International Workshop on Biometrics and Forensics (IWBF’15), 2015.
  16. Christian Rathgeb, Johannes Wagner, Benjamin Tams, Christoph Busch, „Preventing the Cross-Matching Attack in Bloom Filter-based Cancelable Biometrics“, In Proceedings of 3rd International Workshop on Biometrics and Forensics (IWBF’15), 2015.
  17. N. Buchmann und H. Baier, Elektronische Identifizierung und vertrauenswürdige Dienste, D.A.C.H. Security 2015
  18. G. Li, B. Yang, C. Busch: „A Novel Fingerprint Indexing Approach Focusing on Minutia Location and Direction“, in Proceedings of the 1st IEEE International Conference on Identity, Security and Behaviour Analysis (ISBA 2015), 23-25 March 2015, Hong Kong, (2015)
  19. R. Raghavendra, J. Surbiryala, C. Busch: „An efficient finger vein indexing scheme based on unsupervised clustering“, in Proceedings of the 1st IEEE International Conference on Identity, Security and Behaviour Analysis (ISBA 2015), 23-25 March 2015, Hong Kong, (2015)
  20. R. Raghavendra, K.B. Raja, and C. Busch: „Presentation Attack Detection for Face Recognition using Light Field Camera“, in IEEE Transactions on Image Processing, vol. 24, no. 3, pp. 1060–1075, (2015)
  21. K. Raja, R. Raghavendra, C. Busch: „Multi-modal Authentication System for Smartphones“, in Proceedings of the 8th IAPR International Conference on Biometrics (ICB), 19-22 May 2015, Phuket, Thailand, (2015)
  22. P. Tome, R. Raghavendra, C. Busch, S. Tirunagari, N. Poh, B. Shekar, D. Gragnaniello, C. Sansone, L. Verdoliva, S. Marcel: „The 1st Competition on Counter Measures to Finger Vein Spoofing Attacks“, in Proceedings of the 8th IAPR International Conference on Biometrics (ICB), 19-22 May 2015, Phuket, Thailand, (2015)
  23. K. Raja, R. Raghavendra, C. Busch: „Video Presentation Attack Detection in Visible Spectrum Iris Recognition Using Magnified Phase Information“, in IEEE Transactions on Information Forensics and Security (TIFS), June, (2015)
  24. R. Raghavendra, C. Busch: „Face Image Resolution Enhancement based on Weighted Fusion of Wavelet Decomposition“, in Proceedings of Fusion 2015, 6-9 July 2015, Washington D.C., US, (2015)
  25. R. Raghavendra, J. Surbiryala, C. Busch: „Finger vein indexing based on binary features“, in Proceeding of the IEEE Colour and Visual Computing Symposium (CVCS-2015), 25-26 August 2015, Gjøvik, Norway, (2015)
  26. K. Raja, R. Raghavendra, F. A. Cheikh, C. Busch: „Evaluation of Fusion Approaches for Face Recognition using Light Field Cameras“, in Proceeding of the IEEE Colour and Visual Computing Symposium (CVCS-2015), 25-26 August 2015, Gjøvik, Norway, (2015)
  27. R. Raghavendra, C. Busch: „Improved Face Recognition by Combining Information from Multiple Cameras in Automatic Boarder Control System“, in Proceeding of the 12th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS), 26-28 August, Karlsuhe, Germany, (2015)
  28. R. Raghavendra, C. Busch: „Robust Scheme for Iris Presentation Attack Detection Using Multiscale Binarized Statistical Image Features“, in IEEE Transactions on Information Forensics and Security (TIFS), June, (2015)
  29. C. Gottschlich, A. Mikaelyan, M. Olsen, J. Bigun, C. Busch: „Improving Fingerprint Alteration Detection“, in Proceedings 9th International Symposium on Image and Signal Processing and Analysis (ISPA 2015), 7-9 September, Zagreb, Croatia, (2015)
  30. R. Raghavendra, M. Avinash, S. Marcel, C. Busch: „Finger Vein Liveness Detection Using Motion Magnification“, in Proceedings 7th IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS-2015), 8-11 September, Arlington, USA (2015)
  31. K. Raja, R. Raghavendra, C. Busch: „Iris Imaging in Visible Spectrum using White LED“, in Proceedings 7th IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS-2015), 8-11 September, Arlington, USA (2015)
  32. K. Raja, R. Raghavendra, C. Busch: „Presentation Attack Detection using Laplacian Decomposed Frequency Response for Visible Spectrum and Near-Infra-Red Iris Systems“, in Proceedings 7th IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS-2015), 8-11 September, Arlington, USA (2015)
  33. A. Brömme, C. Busch, C. Rathgeb, A. Uhl: „BIOSIG 2015: Proceedings – International Conference of the Biometrics Special Interest Group“, 9.-11. September 2015, Darmstadt, Germany, ISBN 978-3-88579-639-8, (2015)
  34. G. Li, B. Yang, C. Busch: „A Fingerprint Indexing Scheme with Robustness against Sample Translation and Rotation“, in Proceedings of the IEEE 14th International Conference of the Biometrics Special Interest Group (BIOSIG), Darmstadt, September 9-11, (2015)
  35. E. Martiri, B. Yang, C. Busch: „Protected Honey Face Templates“, in Proceedings of the IEEE 14th International Conference of the Biometrics Special Interest Group (BIOSIG), Darmstadt, September 9-11, (2015)
  36. M. Olsen, M. Böckeler, C. Busch: „Predicting Dactyloscopic Examiner Fingerprint Image Quality Assessments“, in Proceedings of the IEEE 14th International Conference of the Biometrics Special Interest Group (BIOSIG), Darmstadt, September 9-11, (2015)
  37. R. Raghavendra, C. Busch: „Hand Dorsal Vein Recognition: Sensor, Algorithms and Evaluation „, in Proceedings IEEE (IST-2015), 16-18 September, Macau, China, (2015)
  38. R. Raghavendra, C. Busch: „Texture based features for robust palmprint recognition: a comparative study“, in EURASIP Journal on Information Security, vol 5 , (2015) „, in EURASIP Journal on Information Security, vol 5 , (2015)
  39. M. Olsen, V. Smida, C. Busch: „Finger Image Quality Assessment Features – Definitions and Evaluation „, in Journal on Biometrics, IET, (2015)
  40. R. Raghavendra, C. Busch: „Presentation Attack Detection Algorithms for Finger Vein Biometrics: A Comprehensive Study „, in Proceedings 11th International Conference on Signal Image Technology & Internet Based Systems (SITIS-2015), 23-27 November, Bangkok, Thailand, (2015)
  41. K. Raja, R. Raghavendra, C. Busch: „Improving Cross-Smartphone Periocular Recognition in Visible Spectrum Using Time-Frequency Features of Laplacian Decomposition „, in Proceedings 11th International Conference on Signal Image Technology & Internet Based Systems (SITIS-2015), 23-27 November, Bangkok, Thailand, (2015)
  42. M. Olsen, M. Dusio, C. Busch: „Fingerprint skin moisture impact on biometric performance“, in 3rd International Workshop on Biometrics and Forensics (IWBF), IEEE, (2015)

2014

Peer-reviewed publications

  1. Sebastian Abt, Harald Baier: A Plea for Utilising Synthetic Data when Performing Machine Learning Based Cyber-Security Experiments. In Proceedings of the 2014 Workshop on Artificial Intelligence and Security (AISec 2014), Scottsdale/AZ, November 2014.
  2. Sebastian Abt, Harald Baier: Are We Missing Labels? A Study of the Availability of Ground-Truth in Network Security Research. In Proceedings of the 3rd International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS 2014), Wroclaw, September 2014.
  3. Sebastian Abt, Sebastian Gärtner, Harald Baier: A Small Data Approach to Identification of Individuals on the Transport Layer using Statistical Behaviour Templates. In Proceedings of the 7th International Conference on Security of Information and Networks (SIN 2014), Glasgow, September 2014.
  4. Björn Roos, Harald Baier, Peter Lyko: Zum sicheren Löschen auf Smartphones. In Proceedings of D-A-CH Security 2014, Graz, September 2014
  5. Stefan Billeb, Christian Rathgeb, Herbert Reininger, Klaus Kasper, Christoph Busch, „Biometric Template Protection for Speaker Recognition based on Universal Background Models“, In IET Journal on Biometrics, 2014, to appear.
  6. Lisa Schehlmann, Sebastian Abt, Harald Baier, „Blessing or Curse? Revisiting Security Aspects of Software-Defined Networking“, In Proceedings of 1st International Workshop on Management of SDN and NFV Systems (ManSDN/NFV 2014), November 2014.
  7. Frank Breitinger, Christian Rathgeb, Harald Baier, „An efficient similarity digests database lookup – a logarithmic divide and conquer approach“ In Journal of Digital Forensics, Security and Law (Special Issue: Proceedings of 6th International Conference on Digital Forensics & Cyber Crime, ICDF2C’14) 9(2), pp. 155-166, 2014.
  8. Anika Pflug, Christoph Busch, „Segmentation and Normalization of Human Ears using Cascaded Pose Regression“, In Proceedings of  Nordic Conference on Secure IT Systems (NordSec’14), 2014, to appear
  9. Anika Pflug, Pascal N. Paul and Christoph Busch, „A comparative Study on Texture and Surface Descriptors for Ear Biometrics“, In Proceedings of International Carnahan Conference in Security Technology (ICCST’14), 2014, to appear.
  10. Andreas Nautsch, Christian Rathgeb, Christoph Busch, „Bridging Gaps: An Application of Feature Warping to Online Signature Verification“, In Proceedings of International Carnahan Conference in Security Technology (ICCST’14), 2014, to appear.
  11. Stefan Billeb, Christian Rathgeb, Michael Buschbeck, Herbert Reininger, Klaus Kasper, „Efficient Two-stage Speaker Identification based on Universal Background Models“, In Proceedings of the International Conference of the Biometrics Special Interest Group (BIOSIG’14), pp. 145-156, 2014.
  12. Anika Pflug, Arun Ross, Christoph Busch, „2D Ear Classification Based on Unsupervised Clustering“, to appear at IJCB 2014, In Proceedings of International Joint Conference on Biometrics (IJCB’14), 2014, to appear.
  13. Benjamin Tams, Christian Rathgeb, „Towards Efficient Privacy-Preserving Two-Stage Identification for Fingerprint-based Biometric Cryptosystems“, In Proceedings of International Joint Conference on Biometrics (IJCB’14), pp. 1-8, 2014.
  14. Christian Rathgeb, Andreas Uhl, Peter Wild, „Effects of Severe Image Compression on Iris Segmentation Performance“, In Proceedings of International Joint Conference on Biometrics (IJCB’14), pp. 1-6, 2014 (Best Poster Paper Award).
  15. Moazzam Butt, Naser Damer, Christian Rathgeb, „Privacy preserved duplicate check using multi-biometric fusion“, In Proceedings of International Conference on Information Fusion (FUSION’14), pp. 1-7, 2014.
  16. Andreas Nautsch, Christian Rathgeb, Christoph Busch, Herbert Reininger, Klaus Kasper, „Towards Duration Invariance of i-Vector-based Adaptive Score Normalization“, In Proceedings of Odyssey: The Speaker and Language Recognition Workshop (ODYSSEY’14), pp. 60-67, 2014.
  17. Anika Pflug, Johannes Wagner, Christian Rathgeb, Christoph Busch, „Impact of Severe Signal Degradation on Ear Recognition Performance“, In Proceedings of Biometrics & Forensics & De-identification and Privacy Protection (BiForD’14), pp. 1342-1347, 2014.
  18. Marta Gomez-Barrero, Christian Rathgeb, Javier Galbally, Julian Fierrez, Christoph Busch, „Protected Facial Biometric Templates Based on Local Gabor Patterns and Adaptive Bloom Filters“, In Proceedings of the 22nd International Conference on Pattern Recognition (ICPR’14), 2014, to appear.
  19. Nicolas Buchmann, Christian Rathgeb, Roel Peeters, Harald Baier, Christoph Busch, „BioPACE: Biometric-Protected Authentication Connection Establishment“, In Advances in Security and Privacy of Biometrics Systems, Cambridge Scholars Publishing, 2014, to appear
  20. Nicolas Buchmann, Christian Rathgeb, Harald Baier, Christoph Busch, „Towards electronic identification and trusted services for biometric authenticated transactions in the Single Euro Payments Area“, In Proceedings of the 2nd Annual Privacy Forum (APF’14), pp. 172-190, 2014.
  21. Harald Baier, Julian Knauer: AFAUC – anti-forensics of storage devices by alternative use of communication channels. 8th International Conference on IT Security Incident Management & IT Forensics (IMF), IEEE Computer Society, p. 14-26, Münster (Germany). May 2014.
  22. Jessica Steinberger, Anna Sperotto, Aiko Pras, Harald Baier: Real-time DDoS Defense: A collaborative Approach at Internet Scale. Student Poster of TNC 2014, Dublin, May 2014 (*Best Student Poster*)
  23. Frank Breitinger, Harald Baier and Douglas White: On the database lookup problem of approximate matching. In Proceedings of the 1st Digital Forensics Research Conference EU (DFRWS EU’14), Amsterdam (Netherlands). May 2014.
  24. Frank Breitinger and Vassil Roussev: Automated evaluation of approximate matching algorithms on real data. In Proceedings of the 1st Digital Forensics Research Conference EU (DFRWS EU’14), Amsterdam (Netherlands). May 2014.
  25. Ivan Danov, Martin A. Olsen, Christoph Busch. Interpretation of fingerprint image quality features extracted by self-organizing maps. SPIE DSS, Biometric and Surveillance Technology for Human and Activity Identification XI. Baltimore, Maryland, USA. May 2014
  26. Jinghua Wang, Martin A. Olsen, Christoph Busch. Finger image quality based on singular point localization. SPIE DSS, Biometric and Surveillance Technology for Human and Activity Identification XI. Baltimore, Maryland, USA. May 2014
  27. Marek Dusio, Martin A. Olsen, Christoph Busch. Fingerprint Sample Quality Assessment via Ridge Line Count Using Laplacian of Gaussian Edge Finding. The 2nd International Workshop on Biometrics and Forensics (IWBF), Valletta, Malta. March 2014
  28. Johannes Wagner, Anika Pflug, Christian Rathgeb, Christoph Busch, Effects of Severe Signal Degradation on Ear Detection, The 2nd International Workshop on Biometrics and Forensics (IWBF), Valletta, Malta. March 2014
  29. Christian Rathgeb, Christoph Busch, Cancelable Multi-Biometrics: Mixing Iris-Codes based on Adaptive Bloom Filters. in Elsevier Computers and Security, 2014
  30. Frank Breitinger, Georg Ziroff, Steffen Lange, Harald Baier:  Similarity Hashing Based on Levenshtein Distance. Tenth Annual IFIP WG 11.9 International Conference on Digital Forensics (IFIP WG11.9), Vienna (Austria). January 2014.
  31. Frank Breitinger, Christian Winter, York Yannikos, Tobias Fink, Michael Seefried:  Reducing Data for Forensic Investigations Using Approximate Matching. Tenth Annual IFIP WG 11.9 International Conference on Digital Forensics (IFIP WG11.9), Vienna (Austria). January 2014.
  32. Nicolas Buchmann and Harald Baier, Towards a more secure and scalable verifying PKI of eMRTD, Journal of Computer Security, Volume 22, Number 6 / 2014 PUB

2013

Peer-reviewed publications

  1. Christian Rathgeb, Frank Breitinger, Christoph Busch, Harald Baier, On the Application of Bloom Filters to Iris Biometrics, In IET Biometrics, 2013.
  2. Nicolas Buchmann and Harald Baier. Towards a more secure and scalable verifying PKI of eMRTD, EuroPKI 2013, to appear
  3. Raghu Raghavendra, Kiran Raja, Bian Yang, Christoph Busch: „Improved Face Recognition At A Distance Using Light Field Camera & Super Resolution Schemes“, in Proceedings of the 6th International Conference on Security of Information and Networks (SIN 2013), November 26-28, Aksaray, Turkey, (2013)
  4. Raghu Raghavendra, Kiran Raja, Bian Yang, Christoph Busch: „Combining Iris and Periocular for Robust Person Verification using Light Field Camera“, in Proceedings of the 2nd IAPR Asian Conference on Pattern Recognition (ACPR 2013), November 5-8, Okinawa, Japan, (2013)
  5. R. Raghavendra, Kiran B. Raja, Anika Pflug, Bian Yang, Christoph Busch, 3D Face Reconstruction and Multimodal Person Identification from Video Captured Using a Smartphone Camera,  IEEE HST 2013
  6. Anika Pflug, Adrian Winterstein, Christoph Busch, Robust Localization of Ears by Feature Level Fusion in Image Domain and Context Information, ICB 2013
  7. Frank Breitinger, Georgios Stivaktakis, Vassil Roussev: Evaluating Detection Error Trade-offs for Bytewise Approximate Matching Algorithms. 5th International ICST Conference on Digital Forensics & Cyber Crime (ICDF2C), Moskau. September 2013. (*Best paper award*)
  8. Frank Breitinger, Huajian Liu, Christian Winter, Harald Baier, Alexey Rybalchenko, and Martin Steinebach: Towards a process model for hash functions in digital forensics. 5th International ICST Conference on Digital Forensics & Cyber Crime (ICDF2C), Moskau. September 2013.
  9. Christian Rathgeb, Andreas Uhl, Peter Wild, Iris-Biometric Fuzzy Commitment Schemes under Image Compression, In Proceedings of the 18th Iberoamerican Congress on Pattern Recognition (CIARP’13), LNCS 8259, pp. 374–381, 2013.
  10. Christian Rathgeb, Christoph Busch, Comparing Binary Iris Biometric Templates based on Counting Bloom Filters, In Proceedings of the 18th Iberoamerican Congress on Pattern Recognition (CIARP’13), LNCS 8259, pp. 262–269, 2013.
  11. Alina Krupp, Christian Rathgeb, Christoph Busch, Social Acceptance of Biometric Technologies in Germany: A Survey, In Proceedings of the International Conference of the Biometrics Special Interest Group (BIOSIG’13), 2013.
  12. Nicolas Buchmann, Roel Peeters, Harald Baier, Andreas Pashalidis, „Security considerations on extending PACE to a biometric-based connection establishment,“ Biometrics Special Interest Group (BIOSIG), 2013 International Conference of the , vol., no., pp.1,13, 5-6 Sept. 2013. PUB
  13. Martin Böckeler, Xuebing Zhou, An Efficient 3D Facial Landmark Detection Algorithm with Haar-Like Feature and Anthropometric Contraints, In Proceedings of the International Conference of the Biometrics Special Interest Group (BIOSIG’13), 2013.
  14. Chris Stein, Vincent Bouatou, Christoph Busch: „Video-based Fingerphoto Recognition with Anti-spoofing Techniques with Smartphone Cameras“, in Proceedings of the IEEE 12th International Conference of the Biometrics Special Interest Group (BIOSIG), Darmstadt, September 5-6, (2013)
  15. Christian Rathgeb, Christoph Busch: Comparison Score Fusion Towards an Optimal Alignment for Enhancing Cancelable Iris Biometrics, In Proceedings of the 4th International Conference on Emerging Security Technologies (EST’13), pp. 51-55, 2013.
  16. Heiko Witte, Christian Rathgeb, Christoph Busch: Context-Aware Mobile Biometric Authentication based on Support Vector Machines, In Proceedings of the 4th International Conference on Emerging Security Technologies (EST’13), pp. 29-32, 2013.
  17. Christian Rathgeb, Christoph Busch: Irreversibility Analysis of Feature Transform-based Cancelable Biometrics, In Proceedings of the 15th International Conference on Computer Analysis of Images and Patterns (CAIP’13), LNCS 8048, pp. 177-184, 2013.
  18. Lisa Schehlmann, Harald Baier: COFFEE: a Concept based on OpenFlow to Filter and Erase Events of botnet activity at high-speed nodes. In Proceedings of GI INFORMATIK 2013, Workshop on Network-based Anomaly Detection (NAD), Koblenz, September 2013.
  19. Sebastian Abt, Sascha Wener, Harald Baier: Performance Evaluation of Classification and Feature Selection Algorithms for NetFlow-based Protocol Recognition. In Proceedings of GI INFORMATIK 2013 Workshop on Network-based Anomaly Detection (NAD), Koblenz, September 2013.
  20. Jessica Steinberger, Sebastian Abt, Harald Baier: CADEMI – Cooperative Anomaly Detection and Mitigation. In Proceedings of D-A-CH Security 2013, Nürnberg, September 2013
  21. Martin Aastrup Olsen, Elham Tabassi, Anton Makarov, Christoph Busch: Self-Organizing Maps for Fingerprint Image Quality Assessment. Computer Vision and Pattern Recognition Workshops (CVPRW),  pp.138-145, 23-28 June 2013, Portland (Oregon, USA). DOI:10.1109/CVPRW.2013.28
  22. Guoqiang Li, Bian Yang, Martin Aastrup Olsen, Christoph Busch: Quality Assessment for Fingerprints Collected by Smartphone Cameras. Computer Vision and Pattern Recognition Workshops (CVPRW),  pp.146-153, 23-28 June 2013, Portland (Oregon, USA). DOI: 10.1109/CVPRW.2013.29
  23. Christoph Busch, Anika Pflug, Xuebing Zhou, Michael Dose, Michael Brauckmann, Jörg Helbig, Alexander Opel, Peter Neugebauer, Katja Leowski, Harald Sieber, Oliver Lotz, Multi-Biometrische Gesichtserkennung,  13. Deutscher IT-Sicherheitskongress, 14-16 May 2013, Bonn, Germany, Pages 361-373
  24. Jessica Steinberger, Lisa Schehlmann, Sebastian Abt, Harald Baier: Anomaly detection and mitigation at Internet scale: A survey. In Proceedings of  7th International Conference on Autonomous Infrastructure, Management and Security (AIMS),  Barcelona, June 2013
  25. Sebastian Abt, Christian Dietz, Harald Baier, Slobodan Petrovic: Passive Remote Source NAT Detection using Behaviour Statistics Derived from NetFlow. In Proceedings of  7th International Conference on Autonomous Infrastructure, Management and Security (AIMS),  Barcelona, June 2013
  26. Frank Breitinger, Georgios Stivaktakis, Harald Baier: FRASH: A framework to test algorithms of similarity hashing, In Proceedings of the 13th Digital Forensics Research Conference (DFRWS’13), Monterey (Californien, US). August 2013.
  27. Christian Rathgeb, Frank Breitinger, Christoph Busch: Alignment-Free Cancelable Iris Biometric Templates based on Adaptive Bloom Filters, In Proceedings of the 6th IAPR International Conference on Biometrics (ICB’13), 2013.
  28. Christian Rathgeb: Towards Enhancing the Security and Accuracy of Iris Recognition Systems, In Datenschutz und Datensicherheit, 2013:6, 2013.
  29. Sebastian Abt, Harald Baier: A darknet-driven approach to compilation of hostile network traffic samples. In Proceedings of Sicherheit in vernetzten Systemen: 20. DFN-Workshop, DFN-Cert Services GmbH, Hamburg, February 2013.
  30. Denise Muth, Sebastian Abt, Andreas Bunten: Generischer Ablauf von Serversystemeinbrüchen. In Proceedings of Sicherheit in vernetzten Systemen: 20. DFN-Workshop, DFN-Cert Services GmbH, Hamburg, February 2013.
  31. Frank Breitinger, Knut Petter Åstebøl, Harald Baier, Christoph Busch: mvHash-B – A new Approach for Similarity Preserving Hash Function7th International Conference on IT Security Incident Management & IT Forensics (IMF), Nürnberg (Germany). March 2013.
  32. Frank Breitinger, Kaloyan Petrov:  Reducing Time Cost in Hashing Operations. Ninth Annual IFIP WG 11.9 International Conference on Digital Forensics (IFIP WG11.9), Orlando (Florida, US). January 2013.

Other publications

  1. Elakkiya Ellavarason, Christian Rathgeb: Template Ageing in Iris Biometrics: A Cross-Algorithm Investigation of the ND-Iris-Template-Ageing-2008-2010 Database, Hochschule Darmstadt, Technical Report Nr. HDA-da/sec-2013-001, March 2013
  2. Bjoern Roos, Harald Baier: Zur Aktualisierung von Studienbriefen am Beispiel der Mobilfunkforensik, Hochschule Darmstadt, Technical Report Nr. HDA-da/sec-2013-002, Mai 2013
  3. Harald Baier: Have a break — have a security centre: from DZI to CASED, Festschrift on the occasion of the 60th birthday of Johannes Buchmann, LNCS 8260, pp. 04-18, November 2013

2012

Peer-reviewed publications

  1. C. Busch, M. Brauckman, R. N.J. Veldhuis, F. Deravi, T.A.M. Kevenaar, A. Nouak, H. Seibert, F. Weber, J-M. Suchier, J.-M. Towards a more secure border control with 3D face recognition. In:Proceedings of the 5th Norsk Informasjons Sikkerhets Konferanse (NISK), 19-22 Nov 2012, Bodø, Norway. pp. 49-60. Tapir Akademisk Forlag. ISBN 978-82-321-0012-5
  2. Mark M. Seeger, Stephen Wolthusen, Towards Concurrent Data Sampling Using GPU Coprocessing. I: Proceedings of the Seventh International Conference on Availability, Reliability and Security, ARES 2012; 20-24 August 2012; Prague, Czech Republic. IEEE Computer Society 2012 ISBN 978-0-7695-4775-6 . p. 557-563, 2012
  3. Chris Stein, Claudia Nickel, Christoph Busch: Fingerphoto Recognition with Smartphone Cameras, In Proceedings of the International Conference of Biometrics Special Interest Group (BIOSIG 2012), September 6-7, 2012, Darmstadt, Germany
  4. Christian Rathgeb, Andreas Uhl, Peter Wild: Iris Recognition: From Segmentation to Template Security, In Advances in Information Security 59. Springer, New York, 2012. ISBN: 978-1461455707
  5. Xuebing Zhou, Christoph Busch: Measuring Privacy and Security of Iris Fuzzy Commitment, ICCST 2012, October 15-18 Boston, USA
  6. Anika Pflug, Philip Michael Back, Christoph Busch, Towards making HCS Ear detection robust against rotation, ICCST 2012, October 15-18 Boston, USA
  7. Frank Breitinger, Harald Baier: Similarity Preserving Hashing: Eligible Properties and a new Algorithm MRSH-v24th International ICST Conference on Digital Forensics & Cyber Crime (ICDF2C), Lafayette (Indiana US). October 2012.
  8. Christian Rathgeb, Christoph Busch, Multibiometric Template Protection: Issues and Challenges, In New Trends and Developments in Biometrics, pp. 173-190, InTech, 2012. ISBN: 978-953-51-0859-7
  9. Christian Rathgeb, Andreas Uhl, Christoph Busch, Ageing Effects and Implications for Biometric Template Protection, In Age Factors in Biometric Processing, IET, 2012.
  10. Heinz Hofbauer, Christian Rathgeb, Andreas Uhl, Peter Wild, Image Metric-based Biometric Comparators: A Supplement to Feature Vector-based Hamming Distance?, In Proceedings of the International Conference of the Biometrics Special Interest Group (BIOSIG’12), pp. 1-5, 2012
  11. Andreas Aabrandt, Martin Aastrup Olsen, Christoph Busch: A Topology based Approach to Categorization of Fingerprint Images, In Proceedings of the 11th International Conference of the Biometrics Special Interest Group (BIOSIG), September 2012
  12. Anika Pflug, Christoph Busch, Ear Biometrics – A Survey of Detection, Feature Extraction and Recognition Methods,  IET Biometrics, Volume 1, Number 2,  Pages 114-129, June 2012
  13. Harald Baier, Christian Dichtelmüller: Datenreduktion mittels kryptographischer Hashfunktionen in der IT-Forensik: Nur ein Mythos?  Proceedings of D-A-CH Security 2012, p. 278-287, ISBN 978-3-00-039221-4 , Konstanz, September 2012
  14. Björn Roos, Harald Baier: IT-Forensik im Wandel – Die Aufweichung des Paradigmas der Unveränderbarkeit am Beispiel von Mobilen Endgeräten. Proceedings of D-A-CH Security 2012, p. 301-313, ISBN 978-3-00-039221-4 , Konstanz, September 2012
  15. Julian Knauer, Harald Baier: Zur Sicherheit von ATA-Festplattenpasswörtern. Proceedings of D-A-CH Security 2012, p. 26-37, ISBN 978-3-00-039221-4 , Konstanz, September 2012
  16. Frank Breitinger, Harald Baier: Properties of a Similarity Preserving Hash Function and their Realization in sdhash2012 Information Security South Africa (ISSA 2012). Johannesburg (South Africa). August 2012.
  17. Frank Breitinger, Harald Baier, Jesse Beckingham: Security and Implementation Analysis of the Similarity Digest sdhash1st International Baltic Conference on Network Security & Forensics (NeSeFo), Tartu (Estland). August 2012.
  18. Bian Yang, Lisa Rajbhandari, Christoph Busch, Xuebing Zhou: Privacy Implications of Identity References in Biometrics Databases,  International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP,) July 18-20, 2012, in Piraeus-Athens, Greece
  19. Anika Pflug, Adrian Winterstein, Christoph Busch, Ear Detection in 3D Profile Images Based on Surface Curvature,  International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP,) July 18-20, 2012, in Piraeus-Athens, Greece
  20. Claudia Nickel, Tobias Wirtl, Christoph Busch: Authentication of Smartphone Users Based on the Way they Walk Using k-NN Algorithm. 8th IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Piraeus (Greece), July 2012.
  21. Claudia Nickel, Christoph Busch: Does a Cycle-based Segmentation Improve Accelerometer-based Biometric Gait Recognition?, 11th IEEE International Conference on Information Science, Signal Processing and their Applications, Montreal (Canada), July 2012
  22. Muhammad Muaaz, Claudia Nickel: Influence of Different Surfaces and Walking Speeds on Accelerometer-based Gait Recognition, 35th IEEE International Conference on Telecommunications and Signal Processing, Prague, July 2012
  23. Sebastian Abt, Harald Baier: Towards Efficient and Privacy-Preserving Network-Based Botnet Detection Using Network Flow Data. 9th International Network Conference (INC2012), Port Elizabeth (South Africa), July 2012.
  24. Harald Baier, Achim Brand: On the Investigation of Application Specific Data within Digital Forensics. Proceedings of the 7th Workshop on Digital Forensics and Information Assurance (WDFIA 2012), ISBN: 978-1-84102-316-8 , p. 38-54, Crete (Greece), June 2012
  25. Frank Breitinger, Harald Baier: A Fuzzy Hashing Approach based on Random Sequences and Hamming Distance7th annual Conference on Digital Forensics, Security and Law (ADFSL), Richmond (Virginia, US). May 2012.
  26. Martin Hestbek, Claudia Nickel, Christoph Busch: Biometric Gait Recognition for Mobile Devices Using Wavelet Transform and Support Vector Machines, 19th IEEE International Conference on Systems, Signals and Image Processing, Vienna (Austria), April 2012
  27. Daniel Hartung, Anika Pflug, Christoph Busch, Vein Pattern Recognition Using Chain Codes, Spacial Information and Skeleton Fusing, GI SICHERHEIT 2012, Darmstadt (Germany), March 2012.
  28. Daniel Hartung, Martin Aastrup Olsen Haiyun Xu, Hai Thanh Nguyen, Christoph Busch, Comprehensive analysis of spectral minutiae for vein pattern recognition, IET Biometrics, March 2012.
  29. Xuebing Zhou, Arjan Kuijper, Christoph Busch: Retrieving Secrets from Iris Fuzzy Commitment. 5th IAPR International Conference on Biometrics (ICB 2012), New Delhi (India), March/April 2012.
  30. Martin Aastrup Olsen, Haiyun Xu, Christoph Busch: Gabor Filters as Candidate Quality Measure for NFIQ 2.0. 5th IAPR International Conference on Biometrics (ICB 2012), New Delhi (India), March/April 2012.
  31. Anika Pflug, Daniel Hartung, Christoph Busch: Feature Extraction from Vein Images using Spatial Information and Chain Codes. In Information Security Technical Report, http://dx.doi.org/10.1016/j.istr.2012.02.003 .
  32. Mark M. Seeger, Pierre Schnarz: Bürgerbefragung zur IT-Sicherheit im Endanwenderbereich. In Datenschutz und Datensicherheit (DuD), Ausgabe 4/2012, S. 253.

2011

Peer-reviewed publications

  1. Mark M. Seeger: Using Control-Flow Techniques in a Security Context – A Survey on Common Prototypes and their Common Weakness. International Conference on Network Computing and Information Security (NCIS 2011).
  2. Claudia Nickel, Christoph Busch, Sathyanarayanan Rangarajan, Manuel Möbius: Using Hidden Markov Models for Accelerometer-Based Biometric Gait Recognition. 7th International Colloqium on Signal Processing and its Applications (CSPA 2011).
  3. Martin Aastrup Olsen, Daniel Hartung, Christoph Busch, Rasmus Larsen: Convolution Approach for Feature Detection in Topological Skeletons Obtained from VascularPatterns. IEEE Symposium Series in Computational Intelligence (SSCI 2011).
  4. Christoph Busch, Ulrike Korte, Sebastian Abt, Christian Böhm, Ines Färber, Sergej Fries, Johannes Merkle, Claudia Nickel, Alexander Nouak, Alexander Opel, Annahita Oswald, Thomas Seidl, Bianca Wackersreuther, Peter Wackersreuther, Xuebing Zhou: Biometric Template Protection. Datenschutz und Datensicherheit (DUD).
  5. Harald Baier, Achim Brand, Christian Dichtelmüller, Björn Roos: Zur Komplexität der Mobilfunkforensik am Beispiel des iPhone. Proceedings of the DACH conference 2011, ISBN 978-3-00-034960-7 , p. 399-410, September 2011.
  6. Sebastian Abt, Christoph Busch, Harald Baier: A quality score honoring approach to semantic conformance assessment of minutiae-based feature extractors. Proceedings of the BIOSIG 2011 conference, LNI, p.21-33, 2011.
  7. Christian Maaser, Harald Baier: A Concept for Monitoring Self-transforming Code Using Memory Page Access Control Management. Proceedings of the 45th IEEE International Carnahan Conference on Security Technology (ICCST 2011), Barcelona, Spain, IEEE Computer Society, p. 277-285, October 2011.
  8. Claudia Nickel, Mohammad Derawi, Patrick Bours, Christoph Busch: Scenario Test of Accelerometer-Based Biometric Gait Recognition. 3rd International Workshop on Security and Communication Networks (IWSCN 2011).
  9. Claudia Nickel, Christoph Busch: Classifying Accelerometer Data via Hidden Markov Models to Authenticate People by the Way they Walk. 45th IEEE International Carnahan Conference on Security Technology (ICCST 2011).
  10. Chris Stein, Claudia Nickel: Eignung von Smartphone-Kameras zur Fingerabdruckerkennung und Methoden zur Verbesserung der Qualität der Fingerbilder. Biometrie und elektronische Signaturen (BIOSIG 2011).
  11. Tobias Wirtl, Claudia Nickel: Aktivitätserkennung auf Smartphones. Biometrie und elektronische Signaturen (BIOSIG 2011).
  12. Claudia Nickel, Holger Brandt, Christoph Busch: Classification of Acceleration Data for Biometric Gait Recognition on Mobile Devices. Biometrie und elektronische Signaturen (BIOSIG 2011).
  13. Mark M. Seeger: Internetkonnektivität als Indikator für wirtschaftliche Stärke – Das Internet in Vergangenheit und Gegenwart. Wirtschaftsinformatik und Management, Ausgabe 02/2011.
  14. Mark M. Seeger, Patrick Bours: How to Comprehensively Describe a Biometric Update Mechanisms for Keystroke Dynamics. Second International Workshop on Security and Communication Networks (IWSCN 2011).
  15. Frank Breitinger, Harald Baier: Performance Issues about Context Triggered Piecewise Hashing3rd International ICST Conference on Digital Forensics & Cyber Crime (ICDF2C), Dublin (Ireland) October 2011.
  16. Harald Baier, Frank Breitinger: Security Aspects of Piecewise Hashing in Computer Forensics6th International Conference on IT Security Incident Management & IT Forensics, Stuttgart (Germany) May 2011.
  17. Claudia Nickel, Holger Brandt, Christoph Busch: Benchmarking the Performance of SVMs and HMMs for Accelerometer-Based Biometric Gait Recognition. 11th IEEE International Symposium on Signal Processing and Information Technology.
  18. Assem Nazar, Mark M. Seeger, Harald Baier: Rooting Android – Extending the ADB by an Auto-Connecting WiFi-Accessible Service. 16th Nordic Conference in Secure IT Systems (NordSec 2011).
  19. Xuebing Zhou, Arjan Kuijper, Raymond Veldhuis, Christoph Busch: Quantifying Privacy and Security of Biometric Fuzzy Commitment. IEEE International Joint Conference on Biometrics (IJCB 11).

Other publications

  1. Frank Breitinger, Harald Baier: Security Aspects of Piecewise Hashing in Computer Forensics. 6. GI FG SIDAR Graduierten-Workshop über Reaktive Sicherheit, 21-22 März 2011, Bochum
  2. Michael Brauckmann, Christoph Busch: Large Scale Database Search. Handbook of Face Recognition, Springer, 2011.

2010

Peer-reviewed publications

  1. Mark M. Seeger, Stephen D. Wolthusen: Observation Mechanism and Cost Model for Tightly Coupled Asymmetric Concurrency. 5th International Conference on Systems (ICONS 2010).
  2. Reinhard Riedmüller, Mark M. Seeger, Stephen D. Wolthusen, Harald Baier, Christoph Busch: Constraints on Autonomous Use of Standard GPU Components for Asynchronous Observations and Intrusion Detection. 2nd International Workshop on Security and Communication Networks (IWSCN 2010).
  3. Christoph Kemetmüller, Mark M. Seeger, Harald Baier, Christoph Busch: Manipulating Mobile Devices with a private GSM Base Station – a Case Study. 8th International Network Conference (INC 2010).
  4. Mark M. Seeger: Three Years Hacker Paragraph – A review. Datenschutz und Datensicherheit (DuD), Ausgabe 7/2010.
  5. Michael Braun, Ulrike Meyer, Susanne Wetzel: Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures. 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010.
  6. Mark M. Seeger, Stephen D. Wolthusen, Christoph Busch, Harald Baier: The Cost of Observation for Intrusion Detection: Performance Impact of Concurrent Host Observation*. 9th Information Security South Africa (ISSA 2010).
  7. Sebastian Abt, Christoph Busch, Claudia Nickel: Applikation des DBSCAN Clustering-Verfahrens zur Generierung von Ground-Truth Fingerabdruck-Minutien. Biometrie und elektronische Signaturen (BIOSIG 2010).
  8. Claudia Nickel, Xuebing Zhou, Christoph Busch: Template Protection for Biometric Gait Data. Biometrie und elektronische Signaturen (BIOSIG 2010).
  9. Jan Hirzel, Daniel Hartung, Christoph Busch: Fingerprint Recognition with Cellular Partitioning and Co-Sinusoidal Triplets. Biometrie und elektronische Signaturen (BIOSIG 2010).
  10. Tom Kevenaar, Ulrike Korte, Johannes Merkle, Matthias Niesing, Heinrich Ihmor, Christoph Busch, Xuebing Zhou: A Reference Framework for the Privacy Assessment of Keyless Biometric Template Protection Systems. Biometrie und elektronische Signaturen (BIOSIG 2010).
  11. Heiko Witte, Claudia Nickel: Modular Biometric Authentication Service System (MBASSy). Biometrie und elektronische Signaturen (BIOSIG 2010).
  12. Frank Breitinger, Claudia Nickel: User Survey on Phone Security and Usage. Biometrie und elektronische Signaturen (BIOSIG 2010).
  13. Christoph Busch, Daniel Hartung: Biometrische Nachrichten-Authentisierung. GI Sicherheit 2010.
  14. Christoph Busch, Sebastian Abt, Claudia Nickel, Ulrike Korte, Xuebing Zhou: Biometrische Template-Protection-Verfahren und Interoperabilitätsstrategien. GI Sicherheit 2010.
  15. Mohammad Derawi, Claudia Nickel, Patrick Bours, Christoph Busch: Unobtrusive User-Authentication on Mobile Phones using Biometric Gait Recognition*. The Sixth International Conference on
  16. Intelligent Information Hiding and Multimedia Signal Processing.
  17. Klaus Schwarzkopf, Michael Massoth: Konzeption und Implementierung einer standortbezogenen Gruppen-Voicemailbox auf Grundlage der Mobicents Communication Platform. Technologien und Anwendungen – Vorträge der 15. ITG-Fachtagung.
  18. Andreas Plies, Michael Massoth, Ronald Marx: Approach to Identity Card-based Voice-over-IP Authentication. Proceedings of the 2nd International Conferences on Advances in Multimedia (MMEDIA’10).
  19. Jürgen Müller, Michael Massoth: Abwehr von Direct Spam over Internet Telephony mittels Anrufer Pre-Validierung. Technologien und Anwendungen – Vorträge der 15. ITG-Fachtagung.
  20. Jürgen Müller, Michael Massoth: Defense Against Direct Spam Over Internet Telephony by Caller Pre-Validation*. Proceedings of the 6th Advanced International Conference on Telecommunications (AICT’10).
  21. Robin Acker, Michael Massoth: Secure Ubiquitous House and Facility Control Solution. Proceedings of the 2010 5th International Conference on Internet and Web Applications and Services (ICIW’10), 2010.
  22. Robin Acker, Steffen Brandt, Nicolas Buchmann, Thorsten Fugmann, Michael Massoth: Ubiquitous Home Control based on SIP and Presence Service. Proceedings of the 12th International Conference on Information Integration and Web Based Applications & Services (iiWAS’10).
  23. Jürgen Müller, Michael Massoth: Advanced Consideration of a Caller Pre-Validation Against Direct Spam Over Internet Telephony. International Journal on Advances in Telecommunications, Ausgabe 2010, Volume 3, Nr. 3&4.

Other publications

  1. Harald Baier, Christoph Busch: CASED – Ein Darmstädter Forschungszentrum entwickelt IT-Sicherheitsbausteine von morgen. Querschnitt – Ausgabe 24, Februar 2010, Hochschule Darmstadt, S. 111-115.
  2. Michael Massoth, Robin Acker, Ronald Moore: Häuser fernsteuern und Prozesse optimieren durch mobile Lösungen. Querschnitt – Ausgabe 24, Februar 2010, Hochschule Darmstadt, S. 102-106.

2009

Peer-reviewed publications

  1. Christoph Busch, Helmut Reimer: Biometrie in neuem Licht? Datenschutz und Datensicherheit (DuD), Ausgabe 5/2009, S. 271.
  2. Claudia Nickel: Authentisierung an mobilen Geräten mittels Gangerkennung. Datenschutz und Datensicherheit (DuD), Ausgabe 5/2009, S. 280-283.
  3. Jeroen Breebaart, Bian Yang, Ileana Buhan, Christoph Busch: Biometric Template Protection – The need for open standards. Datenschutz und Datensicherheit (DuD), Ausgabe 5/2009, S. 299-304.
  4. Christoph Busch: Biometrie und Identitätsdiebstahl. Datenschutz und Datensicherheit (DuD), Ausgabe 5/2009, S. 317.
  5. Christoph Busch: Forschung für die Grenzkontrollen der Zukunft. Querschnitt – Beiträge aus Forschung und Entwicklung.
  6. Claudia Nickel, Xuebing Zhou, Christoph Busch: Template Protection via Piecewise Hashing. Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP2009).
  7. Hrg.: Arslan Brömme, Christoph Busch, Detlef Hühnlein: BIOSIG 2009: Biometrics and Electronic Signatures – Research and Applications. BIOSIG 2009: Biometrics and Electronic Signatures – Research and Applications.
  8. Christoph Busch: Biometrie – Beschleuniger oder Bremser von Identitätsdiebstahl. BIOSIG 2009: Biometrics and Electronic Signatures – Research and Applications.
  9. Dana Lodrva, Christoph Busch, Elham Tabassi, Wolfgang Krodel, Martin Drahansky: Semantic Conformance Testing Methodology for Finger Minutiae Data. BIOSIG 2009: Biometrics and Electronic Signatures – Research and Applications.
  10. Harald Baier, Tobias Straub: A Note on the Protection Level of Biometric Data in Electronic Passports. BIOSIG2009 (6th workshop on biometrics and electronic signatures).
  11. Harald Baier, Tobias Straub: Vom elektronischen Reisepass zum Personalausweis: RFID und personenbezogene Daten – Lessons Learned!?
  12. Harald Baier, Vangelis Karatsiolis: Validity Models of Electronic Signatures and their Enforcement in Practice. EuroPKI2009 – Sixth European Workshop on Public Key Services, Applications and Infrastructures