Project Publications

[Baig21] A. F. Baig and S. Eskeland, “Security, Privacy, and Usability in Continuous Authentication: A Survey,” Sensors, vol. 21, no. 17, p. 5967, Sep. 2021.

[Bassit21] A. Bassit, F. Hahn, C. Zeinstra, R. Veldhuis and A. Peter, Bloom Filter vs Homomorphic Encryption: Which approach protects the biometric data and satisfies ISO/IEC 24745?, 2021 International Conference of the Biometrics Special Interest Group (BIOSIG), 2021, pp. 1-6, doi: 10.1109/BIOSIG52210.2021.9548304.

[Rezgui21] Z. Rezgui and A. Bassit, "Transferability Analysis of an Adversarial Attack on Gender Classification to Face Recognition," 2021 International Conference of the Biometrics Special Interest Group (BIOSIG), 2021, pp. 1-7, doi: 10.1109/BIOSIG52210.2021.9548308.

Previous Relevant Publications

[Fierrez18] J. Fierrez, A. Pozo, M. Martinez-Diaz, J. Galbally and A. Morales, Benchmarking Touchscreen Biometrics for Mobile Authentication, IEEE Trans. on Information Forensics and Security, Vol. 13, n. 11, pp. 2720-2733, November 2018.

[Gonzalez-Sosa18] E. Gonzalez-Sosa, J. Fierrez, R. Vera-Rodriguez and F. Alonso-Fernandez, Facial Soft Biometrics for Recognition in the Wild: Recent Works, Annotation and COTS Evaluation, IEEE Trans. on Information Forensics and Security, Vol. 13, n. 7, 2018. 

[Tolosana18] R. Tolosana, R. Vera-Rodriguez, J. Fierrez and J. Ortega-Garcia, Exploring Recurrent Neural Networks for On-Line Handwritten Signature Biometrics, IEEE Access, pp. 1 - 11, 2018.

[Waltemate18] T. Waltemate, D. Gall, D. Roth, M. Botsch and M.E. Latoschik (2018). The Impact of Avatar Personalization and Immersion on Virtual Body Ownership, Presence, and Emotional Response. IEEE Transactions on Visualization and Computer Graphics (TVCG). 2018. 


[Fischbach17] M. Fischbach, D. Wiebusch and M.E. Latoschik (2017). Semantic Entity-Component State Management for Multimodal VR-Architectures. IEEE Transactions on Visualization and Computer Graphics (TVCG), Vol. 23 (4), pp. 1342-1351.

[Gomez17] M. Gomez-Barrero, E. Maiorana, J. Galbally, P. Campisi and J. Fierrez, Multi-Biometric Template Pro- tection Based on Homomorphic Encryption, Pattern Recognition, Vol. 67, pp. 149-163, July 2017.

[Kindt 17] E. Kindt (2017). Having Yes, Using No? About the new legal regime for biometric data. Computer Law & Security Review, 25

[Latoschik17] M.E. Latoschik, D. Roth, D. Gall, J. Achenbach, T. Waltemate, M. Botsch (2017). The Effect of Avatar Realism in Immersive Social Virtual Realities. 23rd ACM Symposium on Virtual Reality Software and Technology (VRST), pp. 39:1-39:10. 


[Dobricki16] M. Dobricki, P. Pauli (2016). Sensorimotor body-environment interaction serves to regulate emotional experience and exploratory behavior. Heliyon, 2, e00173.

[Emanuilov 16] I. Emanuilov (2016), EKSISTENZ D7.3 Recent developments in law on the use of biometric data for identification in EU Member States. EKSISTENZ Project

[Gomez16] Gomez-Barrero M, Rathgeb C, Galbally J, Busch C and Fierrez J (2016) Unlinkable and irreversible biometric template protection based on Bloom filters, Information Sciences, 2016. 

[Latoschik16] M.E. Latoschik, J.L. Lugrin, D. Roth (2016). FakeMi: A Fake Mirror System for Avatar Embodiment Studies in Proceeding of the 22nd ACM Symposium on Virtual Reality Software and Technology (VRST), pp. 73- 76. 

[Martiri16] E. Martiri, M. Gomez-Barrero, B. Yang, C. Busch, Biometric template protection based on Bloom filters and honey templates IET Biometrics, 2016. 

[Miguel16] O. Miguel-Hurtado et al (2016) "Users-Centric Design: introducing remote usability evaluation in mobile implementations”, International Biometric Performance Testing Conference (IBPC), Washington, 2016.

[Miguel16a] O. Miguel-Hurtado, S.V. Stevenage, C. Bevan and R. Guest, Predicting sex as a soft-biometric from device interaction swipe gestures, Pattern Recognition Letters, May 2016, ISSN 0167-8655

[Miguel16b] O. Miguel-Hurtado, R. Guest, S.V. Stevenage, G.J. Neil, S. Black (2016) Comparing Machine Learning Classifiers and Linear/Logistic Regression to Explore the Relationship between Hand Dimensions and Demographic Characteristics. PLoS ONE 11(11): e0165521. 

[Stoker16] J. Stoker, H. Garretsen and L. Spreeuwers, The Facial Appearance of CEOs: Faces Signal Selection but Not Performance. PLos ONE, 11 (7). e0159950:1-11, 2016, ISSN 1932-6203 

[Yang16a] B. Yang, C. Busch, Privacy-Enhanced Biometrics-Secret Binding Scheme, US Patent (pending) US 20160269178 A1 and German Patent (pending) DE 102016002792 A1, 2016.


[Brockly15] M. Brockly, S. Elliott, R.M. Guest, R. Blanco Gonzalo, Human-Biometric Sensor Interaction, In Encyclopaedia of Biometrics (2nd Edition), Springer, 2015

[Cadariu15] M. Cadariu, E. Bouwers, J. Visser and A. Van Deursen (2015), Tracking known security vulnerabilities in proprietary software systems, 2015 IEEE 22nd International Conference on Software Analysis, Evolution, and Reengineering (SANER), Montreal, QC, 2015, pp. 516-519.

[Peng15] Y. Peng, L. Spreeuwers and R. Veldhuis (2015) Likelihood Ratio Based Mixed Resolution Facial Comparison. In: Proceedings of the 3rd International Workshop on Biometrics and Forensics, IWBF 2015, 3-4 March 2015, Gjøvik, Norway. pp. 1-5. IEEE Computer Society. ISBN 978-1-4799-8105-2

[Tams15] B. Tams, J. Merkle, C. Rathgeb, J. Wagner, U. Korte, C. Busch (2015) Improved Fuzzy Vault Scheme for Alignment-Free Fingerprint Features. Proceedings of BIOSIG 2015, LNI 245, Gesellschaft für Informatik, 2015.

[Veldhuis15] R. Veldhuis (2015). The relation between the secrecy rate of biometric template protection and biometric recognition performance in International Conference on Biometrics, ICB 2015, 19-22 May 2015, Phuket, Thailand. pp. 311-318. IEEE. ISBN 978-1-4799-7824-3


[Domíngue14] G. Domínguez-Conde et al. A New Look at ML Step-Size Estimation for Scalar Costa Scheme Data Hiding”, in IEEE International Conference on Image Processing (ICIP), Paris, France, 2014.

[Karvelas14] N. Karvelas, A. Peter, S. Katzenbeisser, E. Tews and K. Hamacher (2014) Privacy preserving whole genome sequence processing through proxy-aided ORAM. In: 13th Annual ACM Workshop on Privacy in the Electronic Society (WPES 2014), 3-7 Nov 2014, Scottsdale, AZ, USA. pp. 1-10. ACM. ISBN 978-1-4503-3148-7 

[Kindt 14] E. Kindt (2014) Chapter 12: Legal Aspects: Biometric data, evidence rules and trusted identities. In Handbook of Biometric Anti-Spoofing. S. Marcel, S. Li, M. Nixon (eds.) Springer (Dordrecht Heidelberg New York London), pp. 195-208

[Lochter14] M. Lochter, J. Merkle, J.-M. Schmidt, T. Schütze (2014) Requirements for Standard Elliptic Curves. IACR Cryptology ePrint Archive 2014/832, 2014.

[Peng14] J. Peng, Q. Li, A.A. Abd El-Latif and X. Niu, Finger Multi-biometric Cryptosystem: Fusion Strategy and Template Security, Journal of Electronic Imaging, 23 (2), pp.023001, 2014.


[Chingovska13] I. Chingovska, et al (2013) The 2nd competition on counter measures to 2D face spoofing attacks. 2013 International Conference on Biometrics (ICB). IEEE, 2013.

[Kindt 13a] E. Kindt (2013) Privacy and Data Protection Issues of Biometric Applications. Law, Governance and Technology Series. vol. Springer (Dordrecht Heidelberg New York London) 

[Kindt 13b] E. Kindt (2013) Best Practices for privacy and data protection for the processing of biometric data. In Security and Privacy in Biometrics. P. Campisi (ed.) Springer (Dordrecht Heidelberg New York London), pp. 339- 367

[Pérez13] L. Pérez Freire et al (2013) Method and system for embedding information and authenticating a H.264 video using a digital watermark. Patent: PCT/EP2013/068067. Priority Date: 2-September-2013.

[Xu13] H. Xu, J. Heijmans and J. Visser (2013) A Practical Model For Rating Software Security. In proceedings of the 7th International Conference on Software Security and Reliability (SERE 2013), Washington DC, US, 2013.


[Albert12] E. Albert, B.H.M. Østvold, J.M. Rojas (2012) Automated Extraction of Abstract Behavioural Models from JMS Applications. In FMICS 2012: 16-31.

[Erkin12] Z. Erkin. et. al (2012) Generating Private Recommendations Efficiently Using Homomorphic Encryption and Data Packing, in IEEE Transactions on Information Forensics and Security, vol. 7, no. 3, pp. 1053-1066, 2012.

[Karlsen12] E.K. Karlsen, E.W. Høst, B.M. Østvold (2012) Finding and fixing Java naming bugs with the Lancelot Eclipse plugin. In PEPM 2012: 35-38.

[Kelkboom12] E. Kelkboom, J. Breebaart, I. Buhan and R. Veldhuis (2012) Maximum Key Size and Classification Performance of Fuzzy Commitment for Gaussian Modeled Biometric Sources. IEEE Transactions on information forensics and security, 7 (4). pp. 1225-1241. ISSN 1556-6013

[Merkle12] J. Merkle, T. Kevenaar, U. Korte (2012) Multi-Modal and Multi-Instance Fusion for Biometric Cryptosystems. Proceedings of BIOSIG 2012, LNI 196, Gesellschaft für Informatik, 2012.

[Shao12] X. Shao, H. Xu, R. Veldhuis,  C. Slump (2012) A concatenated coding scheme for biometric template protection. Acoustics, Speech and Signal Processing (ICASSP), 2012 IEEE International Conference on, 1865-1868, 2012.

[Sheng12] W. Sheng, G. Howells, M. Fairhurst, F. Deravi and S. Chen Reliable and secure encryption key generation from fingerprints. Information Management & Computer Security 20, no. 3 (2012): 207-221. 

[Simoens12] K. Simoens, B. Yang, X. Zhou, F. Beato, C. Busch, E.M. Newton, B. Preneel, Criteria towards metrics for benchmarking template protection algorithms, 2012 5th IAPR International Conference on Biometrics (ICB), 2012.


[Chindaro10] S. Chindaro, F. Deravi, F.Z. Zhou, M.W.R. Ng, M.C. Neves, X. Zhou and E. Kelkboom (2010) A multibiometric face recognition fusion framework with template protection. In SPIE Defense, Security, and Sensing (pp. 76670U-76670U). International Society for Optics and Photonics.

[Kevenaar10] T. Kevenaar, U. Korte, J. Merkle, M. Niesing, H. Ihmor, C. Busch, X. Zhou (2010) A Reference Framework for the Privacy Assessment of Keyless Biometric Template Protection Systems, in Proceedings of BIOSIG2010, Proceedings of the Special Interest Group on Biometrics and Electronic Signatures, Lecture Notes in Informatics, 2010, pp45-55. 

[Yang10] B. Yang, D. Hartung, K. Simoens, C. Busch, Dynamic random projection for biometric template protection, 2010 Fourth IEEE International Conference on Biometrics: Theory Applications and Systems (BTAS), 2010.


[Henniger09] O. Henniger, et al (2009) Security requirements for automotive on-board networks. Proceedings of the 9th International Conference on Intelligent Transport System Telecommunications (ITST 2009), Lille, France. 2009.

[Xu09] H. Xu, R. Veldhuis, T. Kevenaar and A. Akkermans (2009), A Fast Minutiae-based Fingerprint Recognition System, IEEE Systems Journal Special Issue on Biometric Systems, Vol. 3. No. 4, pp418-427


[Müller07] S. Müller and O. Henniger (2007) Evaluating the biometric sample quality of handwritten signatures. International Conference on Biometrics. Springer Berlin Heidelberg, 2007.

[Tuyls07] P. Tuyls, B. Škorić, T. Kevenaar (Eds.) (2007) Security with Noisy Data--On Private Biometrics, Secure Key Storage and Anti-Counterfeiting, Springer 2007