Search Results for author: Benjamin Tams

Found 6 papers, 0 papers with code

Multi-Biometric Fuzzy Vault based on Face and Fingerprints

no code implementations17 Jan 2023 Christian Rathgeb, Benjamin Tams, Johannes Merkle, Vanessa Nesterowicz, Ulrike Korte, Matthias Neu

The fuzzy vault scheme has been established as cryptographic primitive suitable for privacy-preserving biometric authentication.

Privacy Preserving

State of the Art of Quality Assessment of Facial Images

no code implementations15 Nov 2022 Johannes Merkle, Christian Rathgeb, Benjamin Tams, Dhay-Parn Lou, André Dörsch, Pawel Drozdowski

The goal of the project "Facial Metrics for EES" is to develop, implement and publish an open source algorithm for the quality assessment of facial images (OFIQ) for face recognition, in particular for border control scenarios. 1 In order to stimulate the harmonization of the requirements and practices applied for QA for facial images, the insights gained and algorithms developed in the project will be contributed to the current (2022) revision of the ISO/IEC 29794-5 standard.

Face Recognition

Deep Face Fuzzy Vault: Implementation and Performance

no code implementations4 Feb 2021 Christian Rathgeb, Johannes Merkle, Johanna Scholz, Benjamin Tams, Vanessa Nesterowicz

As part of said feature transformation, a detailed analysis of different feature quantisation and binarisation techniques is conducted.

Face Recognition Management +2

Perfect Fingerprint Orientation Fields by Locally Adaptive Global Models

no code implementations20 Jun 2016 Carsten Gottschlich, Benjamin Tams, Stephan Huckemann

OFs are used for image enhancement, fingerprint alignment, for fingerprint liveness detection, fingerprint alteration detection and fingerprint matching.

Image Enhancement

Decodability Attack against the Fuzzy Commitment Scheme with Public Feature Transforms

no code implementations4 Jun 2014 Benjamin Tams

The fuzzy commitment scheme is a cryptographic primitive that can be used to store biometric templates being encoded as fixed-length feature vectors protected.

Cryptography and Security

Security of the Improved Fuzzy Vault Scheme in the Presence of Record Multiplicity (Full Version)

no code implementations18 Dec 2013 Johannes Merkle, Benjamin Tams

Recently, Blanton and Aliasgari have shown that the relation of two improved fuzzy vault records of the same individual may be determined by solving a system of non-linear equations.

Cryptography and Security

Cannot find the paper you are looking for? You can Submit a new open access paper.