- Biometric Identification and Security
- Face recognition and analysis
- User Authentication and Security Systems
- Face and Expression Recognition
- Digital Media Forensic Detection
- Facial Nerve Paralysis Treatment and Research
- Advanced Steganography and Watermarking Techniques
- Face Recognition and Perception
- Advanced Image and Video Retrieval Techniques
- Cryptography and Data Security
- Anomaly Detection Techniques and Applications
- Handwritten Text Recognition Techniques
- graph theory and CDMA systems
- Ocular Disorders and Treatments
- Generative Adversarial Networks and Image Synthesis
- Facial Rejuvenation and Surgery Techniques
- Privacy, Security, and Data Protection
- Authorship Attribution and Profiling
- Retinal Imaging and Analysis
- Forensic Fingerprint Detection Methods
- Privacy-Preserving Technologies in Data
- Forensic Anthropology and Bioarchaeology Studies
- Deception detection and forensic psychology
- European Criminal Justice and Data Protection
- Tattoo and Body Piercing Complications
Darmstadt University of Applied Sciences
2017-2023
Zimmer Biomet (Germany)
2017-2022
Zimmer Biomet (United States)
2022
Versus Arthritis
2022
Norwegian University of Science and Technology
2019-2020
Systems incorporating biometric technologies have become ubiquitous in personal, commercial, and governmental identity management applications. Both cooperative (e.g. access control) non-cooperative surveillance forensics) systems benefited from biometrics. Such rely on the uniqueness of certain biological or behavioural characteristics human beings, which enable for individuals to be reliably recognised using automated algorithms. Recently, however, there has been a wave public academic...
Since early 2020, the COVID-19 pandemic has had a considerable impact on many aspects of daily life. A range different measures have been implemented worldwide to reduce rate new infections and manage pressure national health services. primary strategy gatherings potential for transmission through prioritisation remote working education. Enhanced hand hygiene use facial masks decreased spread pathogens when are unavoidable. These particular present challenges reliable biometric recognition,...
The computational workload is one of the key challenges in biometric identification systems. naïve retrieval method based on an exhaustive search becomes impractical with growth number enrolled data subjects. Consequently, recent years, many methods aim reducing or optimising workload, and thereby speeding-up transactions, systems have been developed. In this article, taxonomy for conceptual categorisation such presented, followed by a comprehensive survey relevant academic publications,...
Biometric technologies <xref ref-type="bibr" rid="ref1" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">[1]</xref> have become an integral component of many personal, commercial, and governmental identity management systems worldwide. Biometrics rely on highly distinctive characteristics human beings, which make it possible for individuals to be reliably recognized using fully automated algorithms. Prominent examples biometric used recognition...
The development of large-scale facial identification systems that provide privacy protection the enrolled subjects represents an open challenge. In context protection, several template schemes have been proposed in past. However, these appear to be unsuitable for indexing (workload reduction) biometric systems. More precisely, they utilized performing exhaustive searches, thereby leading degradations computational efficiency. this work, we propose a privacy-preserving face system which...
Feature vectors extracted from biometric characteristics are often represented using floating point values. It is, however, more appealing to store and compare feature in a binary representation, since it generally requires less storage facilitates efficient comparators which utilise intrinsic bit operations. Furthermore, the representations very necessary for some specific application scenarios, e.g. template protection indexing. In recent years, usage of deep neural networks facial...
The application of facial cosmetics may cause substantial alterations in the appearance, which can degrade performance biometrics systems. Additionally, it was recently demonstrated that makeup be abused to launch so-called presentation attacks. More precisely, an attacker might apply heavy obtain appearance a target subject with aim impersonation or conceal their own identity. We provide comprehensive survey works related topic attack detection, along critical discussion. Subsequently, we...
Facial cosmetics have the ability to substantially alter facial appearance, which can negatively affect decisions of a face recognition. In addition, it was recently shown that application makeup be abused launch so-called presentation attacks. such attacks, attacker might apply heavy in order achieve appearance target subject for purpose impersonation. this work, we assess vulnerability COTS recognition system attacks employing publicly available Makeup Induced Face Spoofing (MIFS)...
Computationally efficient, accurate, and privacy-preserving data storage retrieval are among the key challenges faced by practical deployments of biometric identification systems worldwide. In this work, a method protected indexing is presented. By utilising feature-level fusion intelligently paired templates, multi-stage search structure created. During retrieval, list potential candidate identities successively pre-filtered, thereby reducing number template comparisons necessary for...
Efficient large-scale biometric identification is a challenging open problem in biometrics today. Adding information protection by cryptographic techniques increases the computational workload even further. Therefore, this paper proposes an efficient and improved use of coefficient packing for homomorphically protected templates, allowing evaluation multiple comparisons at cost one. In combination with feature dimensionality reduction, proposed technique facilitates quadratic reduction...
Protecting the privacy of enrolled subjects is an important requirement expected from biometric systems. In recent years, numerous template protection schemes have been proposed, but so far none them shown to be suitable for indexing (workload reduction) in computationally expensive identification mode. This paper presents a, best authors' knowledge, first method scientific literature protected iris templates. It based on applying random permutations Iris-Code rows, and subsequent using...
Large-scale biometric deployments are becoming ubiquitous. The computational workload of the conventional retrieval method, requiring 1:N comparisons in identification mode, is impractical for such systems. In recent years, many approaches efficient were proposed, but their scalability often questionable. Furthermore, lack a unified methodology reduction reporting makes direct benchmark or thorough evaluation proposed schemes cumbersome. We present an iris indexing scheme based on Bloom...
The growing scale and number of biometric deployments around the world necessitates research into technologies which facilitate fast identification queries high discriminative power. In this context, article presents a system relies on successive pre-filtering potential candidate list using multiple modalities, coupled with weighted score-level information fusion. proposed is evaluated in series experiments compound dataset constructed from several publicly available datasets; an open-set...
In the recent past, different researchers have proposed privacy-enhancing face recognition systems designed to conceal soft-biometric attributes at feature level. These works reported impressive results, but generally did not consider specific attacks in their analysis of privacy protection. We introduce an attack on said schemes based two observations: (1) highly similar facial representations usually originate from images with attributes; (2) achieve high accuracy, robustness against...
Recently, different research groups have found that the gallery composition of a face database can induce performance differentials to facial identification systems in which probe image is compared against up all stored reference images reach biometric decision. This negative effect has been referred as "watchlist imbalance effect" by researchers and exhibits high relevance real applications biometrics, most prominently searches criminal databases blacklists.In this work, we conduct detailed...
In recent years, increasing deployment of face recognition technology in security-critical settings, such as border control or law enforcement, has led to considerable interest the vulnerability systems attacks utilising legitimate documents, which are issued on basis digitally manipulated images. As automated manipulation and attack detection remains a challenging task, conventional processes with human inspectors performing identity verification remain indispensable. These circumstances...
The efficiency of biometric systems, in particular efficient and accurate identification, is one the most challenging open problems biometrics today. Adding to that, data are sensitive deserving adequate protection. As a solution, this work proposes an privacy-preserving reduction computational workload identification systems using public-key encryption with keyword search (PEKS). For long-term protection data, fully homomorphic applied for template all cryptographic schemes lattice-based,...
Eyeglasses change the appearance and visual perception of facial images. Moreover, under objective metrics, glasses generally deteriorate sample quality near-infrared ocular images as a consequence can worsen biometric performance iris recognition systems. Automatic detection is therefore one prerequisites for sufficient quality, interactive acquisition process in an automatic system. In this paper, three approaches (i.e. statistical method, deep learning based method algorithmic on edges...
Recently, concerns regarding potential biases in the underlying algorithms of many automated systems (including biometrics) have been raised. In this context, a biased algorithm produces statistically different outcomes for groups individuals based on certain (often protected by antidiscrimination legislation) attributes such as sex and age. While several preliminary studies investigating matter facial recognition do exist, said topic has not yet addressed vascular biometric characteristics....
The accuracy of face recognition systems can be negatively affected by facial cosmetics which have the ability to substantially alter appearance. Recently, it was shown that makeup also abused launch so-called presentation attacks. In such attacks, an attacker might apply heavy achieve appearance a target subject for purpose impersonation.In this work, we assess vulnerability widely used open-source system, i.e. ArcFace, attacks using publicly available Makeup Induced Face Spoofing (MIFS)...
Facial appearance can be substantially altered through the application of facial cosmetics. In addition to widespread, socially acceptable, and in some cases even expected use for purpose beautification, cosmetics abused launch so-called makeup presentation attacks. Thus far, potential such attack instruments has generally been claimed relatively low based on experimental evaluations available datasets. This paper presents a new dataset attacks with impersonation identity concealment. The...
Abstract Due to migration, terror‐threats and the viral pandemic, various EU member states have re‐established internal border control or even closed their borders. European Association for Biometrics (EAB), a non‐profit organisation, solicited views of its members on ways which biometric technologies services may be used help with re‐establishing open borders within Schengen area while at same time mitigating any adverse effects. From responses received, this position paper was composed...