Publications

(2021). Selfie Periocular Verification using an Efficient Super-Resolution Approach. arXiv Preprint.

PDF

(2021). On the Generalisation capabilities of Fisher Vector based Face Presentation Attack Detection. arXiv Preprint.

(2021). Local Feature Encoding for Unknown Presentation Attack Detection: An Analysis of Different Local Feature Descriptors. IET Biometrics.

(2021). Fingervein. Encyclopedia of Cryptography, Security and Privacy.

(2021). Fingerprint presentation attack detection based on local features encoding for unknown attacks. IEEE Access.

PDF

(2021). Biometrics in the Era of COVID-19: Challenges and Opportunities. arXiv Preprint.

PDF

(2021). Anomaly Detection with Convolutional Autoencoders for Fingerprint Presentation Attack Detection. IEEE Trans. on Biometrics, Behavior, and Identity Science.

PDF

(2020). Reversing the Irreversible: A Survey on Inverse Biometrics. Elsevier Computers & Security.

(2020). Towards Measuring the Amount of Discriminatory Information in Fingervein using a Relative Entropy Estimator. Handbook of Vascular Biometrics.

(2020). Texture-based Presentation Attack Detection for Automatic Speaker Verification. Proc. Int. Workshop on Information Forensics and Security (WIFS).

PDF

(2020). Presentation Attack Detection with Vein Recognition. Handbook of Vascular Biometrics.

(2020). Multi-Spectral Short Wave Infrared Sensors and Convolutional Neural Networks for Biometric Presentation Attack Detection. Artificial Intelligence and Deep Learning in Biometric Security: Trends, Potential and Challenge.

(2020). Morphing Attack Detection - Database, Evaluation platform and Benchmarking. IEEE Trans. on Information Forensics and Security.

(2020). Fisher Vector Encoding of Dense-BSIF Features for Unknown Face Presentation Attack Detection. Proc. Int. Conf. of the Biometrics Special Interest Group (BIOSIG).

(2020). Fingerabdruck Pr�sentation Angriffe Erkennung: Aktueller Stand und offene Herausforderungen. Datenschutz und Datensicherheit.

(2020). Evaluating the Sensitivity of Face Presentation Attack Detection Techniques to Images of Varying Resolutions. Proc. Norwegian Information Security Conf. (NISK).

(2020). Efficiency Analysis of Post-quantum-secure Face Template Protection Schemes based on Homomorphic Encryption. Proc. Int. Conf. of the Biometrics Special Interest Group (BIOSIG).

(2020). Analysing the Performance of LSTMs and CNNs for Fingerprint Presentation Attack Detection. Proc. Int. Joint Conf. on Biometrics (IJCB).

(2020). An Efficient Super-Resolution Single Image Network using Sharpness Loss Metrics for Iris. Proc. Int. Workshop on Information Forensics and Security (WIFS).

(2019). Biometric Presentation Attack Detection: Beyond the Visible Spectrum. IEEE Trans. on Information Forensics and Security.

PDF

(2019). Template Protection based on Homomorphic Encryption: Computational Efficient Application to Iris-Biometric Verification and Identification. Proc. Int. Workshop on Information Forensics and Security (WIFS).

(2019). Preserving Privacy in Speaker and Speech Characterisation. Computer Speech & Language.

(2019). On the Impact of Different Fabrication Materials on Fingerprint Presentation Attack Detection. Proc. Int. Conf. on Biometrics (ICB).

(2019). On Multi-Algorithm Fingerprint Presentation Attack Detection with Laser Speckle Contrast Imaging. Proc. Int. Conf. of the Biometrics Special Interest Group (BIOSIG).

(2019). Multi-Spectral Convolutional Neural Networks for Biometric Presentation Attack Detection. Proc. Norwegian Information Security Conf. (NISK).

(2019). Multi-Modal Fingerprint Presentation Attack Detection: Looking at the Surface and the Inside. Proc. Int. Conf. on Biometrics (ICB).

(2019). Face Morphing Attacks: What needs to be done. Proc. Int. Conf. on Biometrics for Borders (ICBB), Frontex.

(2019). A study of handcrafted and naturally learned features for fingerprint presentation attack detection. Handbook of Biometric Anti-Spoofing.

(2018). Towards Multi-Modal Finger Presentation Attack Detection. Proc. Int. Workshop on Ubiquitous implicit Biometrics and health signals monitoring for person-centric applications (UBIO).

(2018). Towards Fingerprint Presentation Attack Detection Based on Short Wave Infrared Imaging and Spectral Signatures. Proc. Norwegian Information Security Conf. (NISK).

(2018). Towards Fingerprint Presentation Attack Detection Based on Convolutional Neural Networks and Short Wave Infrared Imaging. Proc. Int. Conf. of the Biometrics Special Interest Group (BIOSIG).

(2018). Fingerprint Presentation Attack Detection using Laser Speckle Contrast Imaging. Proc. Int. Conf. of the Biometrics Special Interest Group (BIOSIG).

(2018). An Introduction to Iris Presentation Attack Detection. Handbook of Biometric Anti-Spoofing: Presentation Attack Detection.

(2018). Predicting the Vulnerability of Biometric Systems to Attacks based on Morphed Biometric Information. IET Biometrics.

(2018). Multi-Biometric Template Protection Based on Bloom Filters. Information Fusion.

(2018). Detecting morphed face images using facial landmarks. Proc. Int. Conf. on Image and Signal Processing (ICISP).

(2018). Homomorphic Encryption for Speaker Recognition: Protection of Biometric Templates and Vendor Model Parameters. Proc. Odyssey - The Speaker and Language Recognition Workshop.

(2018). General Framework to Evaluate Unlinkability in Biometric Template Protection Systems. IEEE Trans. on Information Forensics and Security.

(2018). Visible Wavelength Iris Segmentation: A Multi-Class Approach using Fully Convolutional Neuronal Networks. Proc. Int. Conf. of the Biometrics Special Interest Group (BIOSIG).

(2018). Privacy-Preserving Indexing of Iris-Codes with Unlinkable and Irreversible Bloom Filter-based Search Structures. Proc. European Conf. on Signal Processing (EUSIPCO).

(2017). Privacy-Preserving Comparison of Variable-Length Data with Application to Biometric Template Protection. IEEE Access.

(2017). Inverse Biometrics and Privacy. User-Centric Privacy and Security in Biometrics.

(2017). Accuracy Evaluation of Handwritten Signature Verification: Rethinking the Random-Skilled Forgeries Dichotomy. Proc. Int. Joint Conf. on Biometrics (IJCB).

(2017). Software Attacks on Iris Recognition Systems. Iris and Periocular Biometrics.

(2017). Presentation Attack Detection in Iris Recognition. Iris and Periocular Biometrics.

(2017). Biometric Symmetry: Implications on Template Protection. Proc. European Signal Processing Conf. (EUSIPCO).

(2017). Standardisierung von Biometric Template Protection: Aktueller Status und Bewertung der Verkn\"upfbarkeit. Datenschutz und Datensicherheit.

(2017). Multi-Biometric Template Protection Based on Homomorphic Encryption. Pattern Recognition.

(2017). Biometrie und Datenschutz. Datenschutz und Datensicherheit, Gateway.

(2017). Biometrie - die Herausforderungen bleiben!. Datenschutz und Datensicherheit, Editorial.

(2017). On The Vulnerability and Detection Of Digital Morphed and Scanned Face Images. Proc. Int. Workshop on Biomeetrics and Forensics (IWBF).

(2017). Is Your Biometric System Robust to Morphing Attacks?. Proc. Int. Workshop on Biometrics and Forensics (IWBF).

(2017). Fingerprint Presentation Attack Detection Method based on a Bag-of-Words Approach. Proc. Iberoamerican Conf. on Pattern Recognition (CIARP).

(2017). Biometric Template Protection Based on Bloom Filters and Honey Templates. Proc. IEEE Symposium on Security and Privacy.

(2017). Biometric Systems under Morphing Attacks: Assessment of Morphing Techniques and Vulnerability Reporting. Proc. Int. Conf. of the Biometrics Special Interest Group (BIOSIG).

(2016). Multi-Biometric Template Protection - A Security Analysis of Binarized Statistical Features for Bloom Filters on Smartphones. Proc. Int. Conf. on Image Processing Theory, Tools and Applications (IPTA).

(2016). Multi-Biometric Template Protection on Smartphones: An Approach based on Binarized Statistical Features and Bloom Filters. Proc. Iberoamerican Conf. in Pattern Recognition (CIARP).

(2016). Keystroke Biometrics Ongoing Competition. IEEE Access.

(2016). KBOC: Keystroke Biometrics OnGoing Competition. Proc. Int. Conf. on Biometrics: Theory, Applications, and Systems (BTAS).

(2016). Variable-length Template Protection Based on Homomorphic Encryption with Application to Signature Biometrics. Proc. Int. Workshop on Biometrics and Forensics (IWBF).

(2016). Implementation of Fixed-length Template Protection Based on Homomorphic Encryption with Application to Signature Biometrics. Proc. IEEE Conf. on Computer Vision and Pattern Recognition Workshops (CVPRW).

(2016). A review of iris anti-spoofing. Int. Workshop on Biometrics and Forensics (IWBF).

(2016). D6.5: Towards the Common Criteria evaluations of biometric systems. BEAT: Biometrics Evaluation and Testing.

(2015). On-Line Signature Recognition Through the Combination of Real Dynamic Data and Synthetically Generated Static Data. Pattern Recognition.

(2015). Towards Cancelable Multi-Biometrics based on Adaptive Bloom Filters: A Case Study on Feature Level Fusion of Face and Iris. Proc. Int. Workshop on Biometrics and Forensics (IWBF).

(2014). Generation of Enhanced Synthetic Off-line Signatures Based on Real On-line Data. Proc. Int. Conf. on Frontiers in Handwriting Recognition (ICFHR).

(2014). Protected Facial Biometric Templates Based on Local Gabor Patterns and Adaptive Bloom Filters. Proc. Int. Conf. on Pattern Recognition (ICPR).

(2014). A Novel Hand Reconstruction Approach and its Application to Vulnerability Assessment. Information Sciences.

(2014). Efficient software attack to multimodal biometric systems and its application to face and iris fusion. Pattern Recognition Letters.

(2013). Multimodal Biometric Fusion: a Study on Vulnerabilities to Indirect Attacks. Proc. Iberoamerican Conf. on Pattern Recognition (CIARP).

(2013). Realistic Synthetic Off-Line Signature Generation Based on Synthetic On-Line Data. Proc. Int. Carnahan Conf. on Security Technology (ICCST).

(2013). Iris image reconstruction from binary templates: An efficient probabilistic approach based on genetic algorithms. Computer Vision and Image Understanding.

(2013). Security Evaluation of i-Vector Based Speaker Verification Systems Against Hill-Climbing Attacks. Proc. Interspeech.

(2013). Variations of Handwritten Signatures with Time: a Sigma-Lognormal Analysis. Proc. Int. Conf. on Biometrics (ICB).

(2013). Securing iris recognition systems against masquerade attacks. Proc. SPIE Biometric and Surveillance Technology for Human and Activity Identification X, BSTHAI.

(2012). Inverse Biometrics: A Case Study in Hand Geometry Authentication. Proc. Int. Conf. on Pattern Recognition (ICPR).

(2012). On the Vulnerability of Iris-based Systems to Software Attacks based on Genetic Algorithms. Proc. Iberoamerican Congress on Pattern Recognition (CIARP).

(2012). Face Verification Put to Test: A Hill-Climbing Attack Based on the Uphill-Simplex Algorithm. Proc. Int. Conf. on Biometrics (ICB).

(2011). Hill-Climbing Attack Based on the Uphill Simplex Algorithm and its Application to Signature Verification. Proc. European Workshop on Biometrics and Identity Management (BioID).