Project Publications

[Stragapede23] G. Stragapede, R.Vera-Rodriguez, R. Tolosana, A. Morales, BehavePassDB: Public Database for Mobile Behavioral Biometrics and Benchmark Evaluation, In Pattern Recognition, ISSN 1873-5142, Elsevier, Amsterdam, Netherlands, 2023.

[Tang23] F. Tang, B. M. Østvold and M. Bruntink, Identifying Personal Data Processing for Code Review, In Proceedings of the 9th International Conference on Information Systems Security and Privacy (ICISSP 2023), SCITEPRESS, 2023.


[Baig22] S. Eskeland, A. F. Baig, Cryptanalysis of a Privacy-preserving Behavior-oriented Authentication Scheme, In Proceedings of the 19th International Conference on Security and Cryptography - SECRYPT, ISBN 978-989-758-590-6, ISSN 2184-7711, p. 299-304, SciTePress, Lisbon, Portugal, 2022.

[Baig22] A. F. Baig, S. Eskeland, A Generic Privacy-preserving Protocol for Keystroke Dynamics-based Continuous Authentication, In Proceedings of the 19th International Conference on Security and Cryptography - SECRYPT, p. 491-498, ISBN 978-989-758-590-6, ISSN 2184-7711, SciTePress, Lisbon, Portugal, 2022.

[Bassit22] Amina Bassit, Florian Hahn, Raymond Veldhuis, Andreas Peter,Hybrid Biometric Template Protection: Resolving the Agony of Choice between Bloom Filters and Homomorphic Encryption, IET Biometrics Journal.

[Delgado22] Paula Delgado-Santos, Giuseppe Stragapede, Ruben Tolosana, Richard Guest, Farzin Deravi, Ruben Vera-Rodriguez, A Survey of Privacy Vulnerabilities of Mobile Device Sensors, ACM Computing Surveys.

[Hassanpour22] Ahmad Hassanpour, Amir Etefaghi Daryani, Mahdieh Mirmahdi, Kiran Raja, Bian Yang, Christoph Busch, Julian Fierrez, E2F-GAN: Eyes-to-Face Inpainting via Edge-Aware Coarse-to-Fine GANs, IEEE Access, vol. 10, pp. 32406-32417, 2022.

[Hassanpour22] Ahmad Hassanpour, Majid Moradikia, Bian Yang, Ahmed Abdelhadi, Christoph Busch, Julian Fierrez, Differential Privacy Preservation in Robust Continual Learning, IEEE Access, vol. 10, pp. 24273-24287, 2022.

[Hassanpour22]  A. Hassanpour, B. Yang, PriMe: A Novel Privacy Measuring Framework for Online Social Networks, IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2022.

[Rezgui22] Z.Rezgui, A. Bassit, and R. Veldhuis, Transferability analysis of adversarial attacks on gender classification to face recognition: Fixed and variable attack perturbation, IET biometrics 11.5 (2022): 407-419.

[Stragapede22] Giuseppe Stragapede, Ruben Vera-Rodriguez, Ruben Tolosana, Aythami Morales, Alejandro Acien, Gaël Le Lan, Mobile Behavioral Biometrics for Passive Authentication, Pattern Recognition Letters, Volume 157, Pages 35-41, 2022.

[Stragapede22] G. Stragapede, R. Vera-Rodriguez, R. Tolosana, A. Morales, A. Acien, G. Le Lan, Mobile Passive Authentication through Touchscreen and Background Sensor Data, In 2022 International Workshop on Biometrics and Forensics (IWBF), ISBN 978-1-6654-6962-3, IEEE, Piscataway, New Jersey, Stati Uniti, 2022.

[Stragapede22] G. Stragapede, R. Vera-Rodriguez, R. Tolosana, A. Morales, A. Acien, G. Le Lan, Mobile behavioral biometrics for passive authentication, In Pattern Recognition Letters, ISSN 0167-8655, Elsevier, Amsterdam, Netherlands, 2022.

[Sun22] Luyi Sun, Bian Yang, Your Privacy Preference Matters: A Qualitative Study Envisioned for Homecare, 2021 IEEE Symposium on Computers and Communications (ISCC), 2021, pp. 1-7.

[Sun22] L. Sun, B. Yang, E. Utheim, H. Luo, Privacy Predictive Models for Homecare Patient Sensing, In PY.S. Hsueh, T. Wetter, X. Zhu, (eds) Personal Health Informatics, Cognitive Informatics in Biomedicine and Healthcare, Springer, Cham,, 2022.

[Sun22] L. Sun, & B. Yang, Response Center Services: An Exploratory Study, Studies in health technology and informatics, 299, 53–62,, 2022.

[Tang22] F. Tang, B. M. Østvold, Assessing software privacy using the privacy flow-graph, In Proceedings of the 1st International Workshop on Mining Software Repositories Applications for Privacy and Security (MSR4P&S 2022), Association for Computing Machinery, New York, NY, USA, 7–15,, 2022.

[Tang22] F. Tang, PABAU: Privacy Analysis of Biometric API Usage, In Proceedings of the 8th IEEE International Conference on Privacy Computing (PriComp 2022), IEEE, 2022.


[Baig21] Ahmed Fraz Baig, Sigurd Eskeland, Security, Privacy, and Usability in Continuous Authentication: A Survey, Sensors, vol. 21, no. 17, p. 5967, Sep. 2021.

[Bassit21] Amina Bassit, Florian Hahn, Chris Zeinstra, Raymond Veldhuis, Andreas Peter, Bloom Filter vs Homomorphic Encryption: Which approach protects the biometric data and satisfies ISO/IEC 24745?,  2021 International Conference of the Biometrics Special Interest Group (BIOSIG).

[Bassit21] Amina Bassit, Florian Hahn, Joep Peeters, Tom Kevenaar, Raymond Veldhuis, Andreas Peter, Fast and Accurate Likelihood Ratio Based Biometric Verification Secure Against Malicious Adversaries, IEEE Transactions on Information Forensics and Security, vol. 16, pp. 5045-5060, 2021.

[Bilgesu21] Sumer Bilgesu, Personal data processing by device-centric AI: A safe harbor for data controllers?.

[Bilgesu21] Sumer Bilgesu, Schroers Jessica, The new digital identity Regulation proposal and the EU data protection Regime.

[Czarnocki21] J. Czarnocki, Privacy Paradox, Privacy Business and Privacy Enhancing Technologies -  Not Even a Penny Given for More Privacy. 

[Czarnocki21] J. Czarnocki, Good intentions, unintended consequences? How the Proposal for the AI Act might kick innovation out of the EU.

[Czarnocki21] J. Czarnocki, Will new definitions of emotion recognition and biometric data hamper the objectives of the proposed AI Act?, 2021 International Conference of the Biometrics Special Interest Group (BIOSIG), 2021, pp. 1-4.

[Ghafourian21] Mahdi Ghafourian, Julian Fierrez, Ruben Vera-Rodriguez, Ignacio Serna, Aythami Morales, OTB-morph: One-Time Biometrics via Morphing applied to Face Templates, IEEE/CVF Winter Conf. on Applications of Computer Vision Workshops (WACVw), pp. 321-329.

[Jasserand21] C. Jasserand, C. Fontanillo López, L. Belkadi, J. Czarnocki, M. Özal, B. Sumer, E. Kindt, New Extensive Guidelines on the Use of Facial Recognition by the Council of Europe.

[Kindt21] Els Kindt, César Augusto Fontanillo López, Jenny Bergholm, Jan Czarnocki,  International academic report on appropriate safeguards under Article 89(1) GDPR for the processing of personal data for scientific research.

[Rezgui21] Zohra Rezgui, Amina Bassit, Transferability Analysis of an Adversarial Attack on Gender Classification to Face Recognition, 2021 International Conference of the Biometrics Special Interest Group (BIOSIG).

[Rezgui21] Z. Rezgui, J. Goseling, and R. Veldhuis, Analyzing InfoGAN’s potential for exploring demographic information in facial images, SITB 2021 Proceedings.

[Terhörst21] Philipp Terhörst, Jan Niklas Kolf, Marco Huber, Florian Kirchbuchner, Naser Damer, Aythami Morales, Julian Fierrez, Arjan Kuijper, A Comprehensive Study on Face Recognition Biases Beyond Demographics, IEEE Transactions on Technology and Society, 4.


[Bilgesu20] Sumer Bilgesu, The rising tension in crypto wars: security through or despite encryption?.

[Tolosana20] Ruben Tolosana, Paula Delgado-Santos, Andres Perez-Uribe, Ruben Vera-Rodriguez,  Julian Fierrez, Aythami Morales, DeepWriteSYN: On-Line Handwriting Synthesis via Deep Short-Term Representations, AAAI Conf. on Artificial Intelligence (AAAI-21), 3.

[Tolosana20] R. Tolosana, R. Vera-Rodriguez, J. Fierrez, A. Morales, J. Ortega-Garcia, Deepfakes and beyond: A Survey of face manipulation and fake detection, Information Fusion, Information Fusion, 64, 131-148

Previous Relevant Publications

[Fierrez18] J. Fierrez, A. Pozo, M. Martinez-Diaz, J. Galbally and A. Morales, Benchmarking Touchscreen Biometrics for Mobile Authentication, IEEE Trans. on Information Forensics and Security, Vol. 13, n. 11, pp. 2720-2733, November 2018.

[Gonzalez-Sosa18] E. Gonzalez-Sosa, J. Fierrez, R. Vera-Rodriguez and F. Alonso-Fernandez, Facial Soft Biometrics for Recognition in the Wild: Recent Works, Annotation and COTS Evaluation, IEEE Trans. on Information Forensics and Security, Vol. 13, n. 7, 2018. 

[Tolosana18] R. Tolosana, R. Vera-Rodriguez, J. Fierrez and J. Ortega-Garcia, Exploring Recurrent Neural Networks for On-Line Handwritten Signature Biometrics, IEEE Access, pp. 1 - 11, 2018.

[Waltemate18] T. Waltemate, D. Gall, D. Roth, M. Botsch and M.E. Latoschik (2018). The Impact of Avatar Personalization and Immersion on Virtual Body Ownership, Presence, and Emotional Response. IEEE Transactions on Visualization and Computer Graphics (TVCG). 2018. 


[Fischbach17] M. Fischbach, D. Wiebusch and M.E. Latoschik (2017). Semantic Entity-Component State Management for Multimodal VR-Architectures. IEEE Transactions on Visualization and Computer Graphics (TVCG), Vol. 23 (4), pp. 1342-1351.

[Gomez17] M. Gomez-Barrero, E. Maiorana, J. Galbally, P. Campisi and J. Fierrez, Multi-Biometric Template Pro- tection Based on Homomorphic Encryption, Pattern Recognition, Vol. 67, pp. 149-163, July 2017.

[Kindt 17] E. Kindt (2017). Having Yes, Using No? About the new legal regime for biometric data. Computer Law & Security Review, 25

[Latoschik17] M.E. Latoschik, D. Roth, D. Gall, J. Achenbach, T. Waltemate, M. Botsch (2017). The Effect of Avatar Realism in Immersive Social Virtual Realities. 23rd ACM Symposium on Virtual Reality Software and Technology (VRST), pp. 39:1-39:10. 


[Dobricki16] M. Dobricki, P. Pauli (2016). Sensorimotor body-environment interaction serves to regulate emotional experience and exploratory behavior. Heliyon, 2, e00173.

[Emanuilov 16] I. Emanuilov (2016), EKSISTENZ D7.3 Recent developments in law on the use of biometric data for identification in EU Member States. EKSISTENZ Project

[Gomez16] Gomez-Barrero M, Rathgeb C, Galbally J, Busch C and Fierrez J (2016) Unlinkable and irreversible biometric template protection based on Bloom filters, Information Sciences, 2016. 

[Latoschik16] M.E. Latoschik, J.L. Lugrin, D. Roth (2016). FakeMi: A Fake Mirror System for Avatar Embodiment Studies in Proceeding of the 22nd ACM Symposium on Virtual Reality Software and Technology (VRST), pp. 73- 76. 

[Martiri16] E. Martiri, M. Gomez-Barrero, B. Yang, C. Busch, Biometric template protection based on Bloom filters and honey templates IET Biometrics, 2016. 

[Miguel16] O. Miguel-Hurtado et al (2016) "Users-Centric Design: introducing remote usability evaluation in mobile implementations”, International Biometric Performance Testing Conference (IBPC), Washington, 2016.

[Miguel16a] O. Miguel-Hurtado, S.V. Stevenage, C. Bevan and R. Guest, Predicting sex as a soft-biometric from device interaction swipe gestures, Pattern Recognition Letters, May 2016, ISSN 0167-8655

[Miguel16b] O. Miguel-Hurtado, R. Guest, S.V. Stevenage, G.J. Neil, S. Black (2016) Comparing Machine Learning Classifiers and Linear/Logistic Regression to Explore the Relationship between Hand Dimensions and Demographic Characteristics. PLoS ONE 11(11): e0165521. 

[Stoker16] J. Stoker, H. Garretsen and L. Spreeuwers, The Facial Appearance of CEOs: Faces Signal Selection but Not Performance. PLos ONE, 11 (7). e0159950:1-11, 2016, ISSN 1932-6203 

[Yang16a] B. Yang, C. Busch, Privacy-Enhanced Biometrics-Secret Binding Scheme, US Patent (pending) US 20160269178 A1 and German Patent (pending) DE 102016002792 A1, 2016.


[Brockly15] M. Brockly, S. Elliott, R.M. Guest, R. Blanco Gonzalo, Human-Biometric Sensor Interaction, In Encyclopaedia of Biometrics (2nd Edition), Springer, 2015

[Cadariu15] M. Cadariu, E. Bouwers, J. Visser and A. Van Deursen (2015), Tracking known security vulnerabilities in proprietary software systems, 2015 IEEE 22nd International Conference on Software Analysis, Evolution, and Reengineering (SANER), Montreal, QC, 2015, pp. 516-519.

[Peng15] Y. Peng, L. Spreeuwers and R. Veldhuis (2015) Likelihood Ratio Based Mixed Resolution Facial Comparison. In: Proceedings of the 3rd International Workshop on Biometrics and Forensics, IWBF 2015, 3-4 March 2015, Gjøvik, Norway. pp. 1-5. IEEE Computer Society. ISBN 978-1-4799-8105-2

[Tams15] B. Tams, J. Merkle, C. Rathgeb, J. Wagner, U. Korte, C. Busch (2015) Improved Fuzzy Vault Scheme for Alignment-Free Fingerprint Features. Proceedings of BIOSIG 2015, LNI 245, Gesellschaft für Informatik, 2015.

[Veldhuis15] R. Veldhuis (2015). The relation between the secrecy rate of biometric template protection and biometric recognition performance in International Conference on Biometrics, ICB 2015, 19-22 May 2015, Phuket, Thailand. pp. 311-318. IEEE. ISBN 978-1-4799-7824-3


[Domíngue14] G. Domínguez-Conde et al. A New Look at ML Step-Size Estimation for Scalar Costa Scheme Data Hiding”, in IEEE International Conference on Image Processing (ICIP), Paris, France, 2014.

[Karvelas14] N. Karvelas, A. Peter, S. Katzenbeisser, E. Tews and K. Hamacher (2014) Privacy preserving whole genome sequence processing through proxy-aided ORAM. In: 13th Annual ACM Workshop on Privacy in the Electronic Society (WPES 2014), 3-7 Nov 2014, Scottsdale, AZ, USA. pp. 1-10. ACM. ISBN 978-1-4503-3148-7 

[Kindt 14] E. Kindt (2014) Chapter 12: Legal Aspects: Biometric data, evidence rules and trusted identities. In Handbook of Biometric Anti-Spoofing. S. Marcel, S. Li, M. Nixon (eds.) Springer (Dordrecht Heidelberg New York London), pp. 195-208

[Lochter14] M. Lochter, J. Merkle, J.-M. Schmidt, T. Schütze (2014) Requirements for Standard Elliptic Curves. IACR Cryptology ePrint Archive 2014/832, 2014.

[Peng14] J. Peng, Q. Li, A.A. Abd El-Latif and X. Niu, Finger Multi-biometric Cryptosystem: Fusion Strategy and Template Security, Journal of Electronic Imaging, 23 (2), pp.023001, 2014.


[Chingovska13] I. Chingovska, et al (2013) The 2nd competition on counter measures to 2D face spoofing attacks. 2013 International Conference on Biometrics (ICB). IEEE, 2013.

[Kindt 13a] E. Kindt (2013) Privacy and Data Protection Issues of Biometric Applications. Law, Governance and Technology Series. vol. Springer (Dordrecht Heidelberg New York London) 

[Kindt 13b] E. Kindt (2013) Best Practices for privacy and data protection for the processing of biometric data. In Security and Privacy in Biometrics. P. Campisi (ed.) Springer (Dordrecht Heidelberg New York London), pp. 339- 367

[Pérez13] L. Pérez Freire et al (2013) Method and system for embedding information and authenticating a H.264 video using a digital watermark. Patent: PCT/EP2013/068067. Priority Date: 2-September-2013.

[Xu13] H. Xu, J. Heijmans and J. Visser (2013) A Practical Model For Rating Software Security. In proceedings of the 7th International Conference on Software Security and Reliability (SERE 2013), Washington DC, US, 2013.


[Albert12] E. Albert, B.H.M. Østvold, J.M. Rojas (2012) Automated Extraction of Abstract Behavioural Models from JMS Applications. In FMICS 2012: 16-31.

[Erkin12] Z. Erkin. et. al (2012) Generating Private Recommendations Efficiently Using Homomorphic Encryption and Data Packing, in IEEE Transactions on Information Forensics and Security, vol. 7, no. 3, pp. 1053-1066, 2012.

[Karlsen12] E.K. Karlsen, E.W. Høst, B.M. Østvold (2012) Finding and fixing Java naming bugs with the Lancelot Eclipse plugin. In PEPM 2012: 35-38.

[Kelkboom12] E. Kelkboom, J. Breebaart, I. Buhan and R. Veldhuis (2012) Maximum Key Size and Classification Performance of Fuzzy Commitment for Gaussian Modeled Biometric Sources. IEEE Transactions on information forensics and security, 7 (4). pp. 1225-1241. ISSN 1556-6013

[Merkle12] J. Merkle, T. Kevenaar, U. Korte (2012) Multi-Modal and Multi-Instance Fusion for Biometric Cryptosystems. Proceedings of BIOSIG 2012, LNI 196, Gesellschaft für Informatik, 2012.

[Shao12] X. Shao, H. Xu, R. Veldhuis,  C. Slump (2012) A concatenated coding scheme for biometric template protection. Acoustics, Speech and Signal Processing (ICASSP), 2012 IEEE International Conference on, 1865-1868, 2012.

[Sheng12] W. Sheng, G. Howells, M. Fairhurst, F. Deravi and S. Chen Reliable and secure encryption key generation from fingerprints. Information Management & Computer Security 20, no. 3 (2012): 207-221. 

[Simoens12] K. Simoens, B. Yang, X. Zhou, F. Beato, C. Busch, E.M. Newton, B. Preneel, Criteria towards metrics for benchmarking template protection algorithms, 2012 5th IAPR International Conference on Biometrics (ICB), 2012.


[Chindaro10] S. Chindaro, F. Deravi, F.Z. Zhou, M.W.R. Ng, M.C. Neves, X. Zhou and E. Kelkboom (2010) A multibiometric face recognition fusion framework with template protection. In SPIE Defense, Security, and Sensing (pp. 76670U-76670U). International Society for Optics and Photonics.

[Kevenaar10] T. Kevenaar, U. Korte, J. Merkle, M. Niesing, H. Ihmor, C. Busch, X. Zhou (2010) A Reference Framework for the Privacy Assessment of Keyless Biometric Template Protection Systems, in Proceedings of BIOSIG2010, Proceedings of the Special Interest Group on Biometrics and Electronic Signatures, Lecture Notes in Informatics, 2010, pp45-55. 

[Yang10] B. Yang, D. Hartung, K. Simoens, C. Busch, Dynamic random projection for biometric template protection, 2010 Fourth IEEE International Conference on Biometrics: Theory Applications and Systems (BTAS), 2010.


[Henniger09] O. Henniger, et al (2009) Security requirements for automotive on-board networks. Proceedings of the 9th International Conference on Intelligent Transport System Telecommunications (ITST 2009), Lille, France. 2009.

[Xu09] H. Xu, R. Veldhuis, T. Kevenaar and A. Akkermans (2009), A Fast Minutiae-based Fingerprint Recognition System, IEEE Systems Journal Special Issue on Biometric Systems, Vol. 3. No. 4, pp418-427


[Müller07] S. Müller and O. Henniger (2007) Evaluating the biometric sample quality of handwritten signatures. International Conference on Biometrics. Springer Berlin Heidelberg, 2007.

[Tuyls07] P. Tuyls, B. Škorić, T. Kevenaar (Eds.) (2007) Security with Noisy Data--On Private Biometrics, Secure Key Storage and Anti-Counterfeiting, Springer 2007