Search Results for author: Christoph Busch

Found 69 papers, 6 papers with code

Face Feature Visualisation of Single Morphing Attack Detection

no code implementations25 Apr 2023 Juan Tapia, Christoph Busch

This paper proposes an explainable visualisation of different face feature extraction algorithms that enable the detection of bona fide and morphing images for single morphing attack detection.

A Latent Fingerprint in the Wild Database

no code implementations3 Apr 2023 Xinwei Liu, Kiran Raja, Renfang Wang, Hong Qiu, Hucheng Wu, Dechao Sun, Qiguang Zheng, Nian Liu, Xiaoxia Wang, Gehang Huang, Raghavendra Ramachandra, Christoph Busch

Further, existing databases for latent fingerprint recognition do not have a large number of unique subjects/fingerprint instances or do not provide ground truth/reference fingerprint images to conduct a cross-comparison against the latent.


Considerations on the Evaluation of Biometric Quality Assessment Algorithms

no code implementations23 Mar 2023 Torsten Schlett, Christian Rathgeb, Juan Tapia, Christoph Busch

An EDC curve depends on an error type such as the "False Non Match Rate" (FNMR), a quality assessment algorithm, a biometric recognition system, a set of comparisons each corresponding to a biometric sample pair, and a comparison score threshold corresponding to a starting error.

Face Image Quality Face Image Quality Assessment +1

Deep Learning in the Field of Biometric Template Protection: An Overview

no code implementations5 Mar 2023 Christian Rathgeb, Jascha Kolberg, Andreas Uhl, Christoph Busch

Biometric systems utilising deep learning have been shown to achieve auspicious recognition accuracy, surpassing human performance.

Fairness Privacy Preserving

Pose Impact Estimation on Face Recognition using 3D-Aware Synthetic Data with Application to Quality Assessment

1 code implementation1 Mar 2023 Marcel Grimmer, Christian Rathgeb, Christoph Busch

Evaluating the quality of facial images is essential for operating face recognition systems with sufficient accuracy.

Face Recognition

Effect of Lossy Compression Algorithms on Face Image Quality and Recognition

no code implementations24 Feb 2023 Torsten Schlett, Sebastian Schachner, Christian Rathgeb, Juan Tapia, Christoph Busch

This work investigates the effect of lossy image compression on a state-of-the-art face recognition model, and on multiple face image quality assessment models.

Face Image Quality Face Image Quality Assessment +2

Synthetic ID Card Image Generation for Improving Presentation Attack Detection

no code implementations31 Oct 2022 Daniel Benalcazar, Juan E. Tapia, Sebastian Gonzalez, Christoph Busch

Currently, it is ever more common to access online services for activities which formerly required physical attendance.

Fraud Detection Image Generation

Impact of Face Image Quality Estimation on Presentation Attack Detection

no code implementations30 Sep 2022 Carlos Aravena, Diego Pasmino, Juan E. Tapia, Christoph Busch

In this paper, we study the effect of quality assessment methods on filtering bona fide and attack samples, their impact on PAD systems, and how the performance of such systems is improved when training on a filtered (by quality) dataset.

Face Image Quality Face Image Quality Assessment +2

Alcohol Consumption Detection from Periocular NIR Images Using Capsule Network

1 code implementation4 Sep 2022 Juan Tapia, Enrique Lopez Droguett, Christoph Busch

This research proposes a method to detect alcohol consumption from Near-Infra-Red (NIR) periocular eye images.

Learning to Predict Fitness for Duty using Near Infrared Periocular Iris Images

no code implementations4 Sep 2022 Juan Tapia, Daniel Benalcazar, Andres Valenzuela, Leonardo Causa, Enrique Lopez Droguett, Christoph Busch

This research proposes a new database and method to detect the reduction of alertness conditions due to alcohol, drug consumption and sleepiness deprivation from Near-Infra-Red (NIR) periocular eye images.

Single Morphing Attack Detection using Siamese Network and Few-shot Learning

no code implementations22 Jun 2022 Juan Tapia, Daniel Schulz, Christoph Busch

This paper proposes a framework following the Few-Shot-Learning approach that shares image information based on the siamese network using triplet-semi-hard-loss to tackle the morphing attack detection and boost the clustering classification process.

Face Verification Few-Shot Learning

An Overview of Privacy-enhancing Technologies in Biometric Recognition

no code implementations21 Jun 2022 Pietro Melzi, Christian Rathgeb, Ruben Tolosana, Ruben Vera-Rodriguez, Christoph Busch

Privacy-enhancing technologies are technologies that implement fundamental data protection principles.

Morphing Attack Potential

1 code implementation28 Apr 2022 Matteo Ferrara, Annalisa Franco, Davide Maltoni, Christoph Busch

In security systems the risk assessment in the sense of common criteria testing is a very relevant topic; this requires quantifying the attack potential in terms of the expertise of the attacker, his knowledge about the target and access to equipment.

Face Recognition

Analyzing Human Observer Ability in Morphing Attack Detection -- Where Do We Stand?

no code implementations24 Feb 2022 Sankini Rancha Godage, Frøy Løvåsdal, Sushma Venkatesh, Kiran Raja, Raghavendra Ramachandra, Christoph Busch

One prevalent misconception is that an examiner's or observer's capacity for facial morph detection depends on their subject expertise, experience, and familiarity with the issue and that no works have reported the specific results of observers who regularly verify identity (ID) documents for their jobs.


Fun Selfie Filters in Face Recognition: Impact Assessment and Removal

no code implementations12 Feb 2022 Cristian Botezatu, Mathias Ibsen, Christian Rathgeb, Christoph Busch

This work investigates the impact of fun selfie filters, which are frequently used to modify selfies, on face recognition systems.

Face Detection Face Recognition

Face Beneath the Ink: Synthetic Data and Tattoo Removal with Application to Face Recognition

no code implementations10 Feb 2022 Mathias Ibsen, Christian Rathgeb, Pawel Drozdowski, Christoph Busch

Moreover, we demonstrate the feasibility of the generation by using a deep learning-based model for removing tattoos from face images.

Face Recognition

Crowd-powered Face Manipulation Detection: Fusing Human Examiner Decisions

no code implementations31 Jan 2022 Christian Rathgeb, Robert Nichols, Mathias Ibsen, Pawel Drozdowski, Christoph Busch

To this end, various decision fusion methods are proposed incorporating the examiners' decision confidence, experience level, and their time to take a decision.

Face Swapping Image Manipulation +1

Psychophysical Evaluation of Human Performance in Detecting Digital Face Image Manipulations

no code implementations28 Jan 2022 Robert Nichols, Christian Rathgeb, Pawel Drozdowski, Christoph Busch

In recent years, increasing deployment of face recognition technology in security-critical settings, such as border control or law enforcement, has led to considerable interest in the vulnerability of face recognition systems to attacks utilising legitimate documents, which are issued on the basis of digitally manipulated face images.

Face Recognition Face Swapping

Reliable Detection of Doppelgängers based on Deep Face Representations

no code implementations21 Jan 2022 Christian Rathgeb, Daniel Fischer, Pawel Drozdowski, Christoph Busch

Doppelg\"angers (or lookalikes) usually yield an increased probability of false matches in a facial recognition system, as opposed to random face image pairs selected for non-mated comparison trials.

Face Recognition

Generation of Non-Deterministic Synthetic Face Datasets Guided by Identity Priors

no code implementations7 Dec 2021 Marcel Grimmer, Haoyu Zhang, Raghavendra Ramachandra, Kiran Raja, Christoph Busch

Mated samples are generated by manipulating latent vectors, and more precisely, we exploit Principal Component Analysis (PCA) to define semantically meaningful directions in the latent space and control the similarity between the original and the mated samples using a pre-trained face recognition system.

Face Image Quality Face Recognition

Towards an Efficient Semantic Segmentation Method of ID Cards for Verification Systems

no code implementations24 Nov 2021 Rodrigo Lara, Andres Valenzuela, Daniel Schulz, Juan Tapia, Christoph Busch

The best results for the fused multi-country dataset of ID Card images from Chile, Argentina and Mexico reached an IoU of 0. 9911.

Semantic Segmentation

An Attack on Facial Soft-biometric Privacy Enhancement

no code implementations24 Nov 2021 Dailé Osorio-Roig, Christian Rathgeb, Pawel Drozdowski, Philipp Terhörst, Vitomir Štruc, Christoph Busch

Future works on privacy-enhancing face recognition are encouraged to include the proposed attack in evaluations on the privacy protection.

Dimensionality Reduction Face Recognition

Algorithmic Fairness in Face Morphing Attack Detection

no code implementations23 Nov 2021 Raghavendra Ramachandra, Kiran Raja, Christoph Busch

In this paper, we study and present a comprehensive analysis of algorithmic fairness of the existing Single image-based Morph Attack Detection (S-MAD) algorithms.

Face Recognition Fairness +1

FRT-PAD: Effective Presentation Attack Detection Driven by Face Related Task

no code implementations22 Nov 2021 Wentian Zhang, Haozhe Liu, Feng Liu, Raghavendra Ramachandra, Christoph Busch

The proposed method, first introduces task specific features from other face related task, then, we design a Cross-Modal Adapter using a Graph Attention Network (GAT) to re-map such features to adapt to PAD task.

Face Presentation Attack Detection Face Recognition +1

SynCoLFinGer: Synthetic Contactless Fingerprint Generator

no code implementations18 Oct 2021 Jannis Priesnitz, Christian Rathgeb, Nicolas Buchmann, Christoph Busch

We present the first method for synthetic generation of contactless fingerprint images, referred to as SynCoLFinGer.

Differential Anomaly Detection for Facial Images

no code implementations7 Oct 2021 Mathias Ibsen, Lázaro J. González-Soler, Christian Rathgeb, Pawel Drozdowski, Marta Gomez-Barrero, Christoph Busch

Due to their convenience and high accuracy, face recognition systems are widely employed in governmental and personal security applications to automatically recognise individuals.

Anomaly Detection Face Recognition +1

Synthetic Periocular Iris PAI from a Small Set of Near-Infrared-Images

no code implementations26 Jul 2021 Jose Maureira, Juan Tapia, Claudia Arellano, Christoph Busch

Such results demonstrated the feasibility of synthetic images to fool presentation attacks detection algorithms and the need for such algorithms to be constantly updated and trained with a larger number of images and PAI scenarios.

Demographic Fairness in Face Identification: The Watchlist Imbalance Effect

no code implementations15 Jun 2021 Pawel Drozdowski, Christian Rathgeb, Christoph Busch

Recently, different researchers have found that the gallery composition of a face database can induce performance differentials to facial identification systems in which a probe image is compared against up to all stored reference images to reach a biometric decision.

Face Identification Face Recognition +2

Demographic Fairness in Biometric Systems: What do the Experts say?

no code implementations31 May 2021 Christian Rathgeb, Pawel Drozdowski, Naser Damer, Dinusha C. Frings, Christoph Busch

Algorithmic decision systems have frequently been labelled as "biased", "racist", "sexist", or "unfair" by numerous media outlets, organisations, and researchers.

Fairness Management

Iris Liveness Detection using a Cascade of Dedicated Deep Learning Networks

no code implementations28 May 2021 Juan Tapia, Sebastian Gonzalez, Christoph Busch

The bona fide class consists of live iris images, whereas the attack presentation instrument classes are comprised of cadaver, printed, and contact lenses images, for a total of four scenarios.

On the Applicability of Synthetic Data for Face Recognition

no code implementations6 Apr 2021 Haoyu Zhang, Marcel Grimmer, Raghavendra Ramachandra, Kiran Raja, Christoph Busch

Face verification has come into increasing focus in various applications including the European Entry/Exit System, which integrates face recognition mechanisms.

Face Image Quality Face Image Quality Assessment +2

Impact of Facial Tattoos and Paintings on Face Recognition Systems

no code implementations17 Mar 2021 Mathias Ibsen, Christian Rathgeb, Thomas Fink, Pawel Drozdowski, Christoph Busch

In this work, we investigate the impact that facial tattoos and paintings have on current face recognition systems.

Face Recognition

Effects of Image Compression on Face Image Manipulation Detection: A Case Study on Facial Retouching

no code implementations5 Mar 2021 Christian Rathgeb, Kevin Bernardo, Nathania E. Haryanto, Christoph Busch

Results obtained from challenging cross-database experiments in which the analyzed retouching technique is unknown during training yield interesting findings: (1) most competitive detection performance is achieved for differential scenarios employing deep face representations; (2) image compression severely impacts the performance of face image manipulation detection schemes based on texture descriptors while methods utilizing deep face representations are found to be highly robust; (3) in some cases, the application of image compression might as well improve detection performance.

Image Compression Image Manipulation +1

Signal-level Fusion for Indexing and Retrieval of Facial Biometric Data

no code implementations5 Mar 2021 Pawel Drozdowski, Fabian Stockhardt, Christian Rathgeb, Christoph Busch

The growing scope, scale, and number of biometric deployments around the world emphasise the need for research into technologies facilitating efficient and reliable biometric identification queries.


Mobile Touchless Fingerprint Recognition: Implementation, Performance and Usability Aspects

1 code implementation4 Mar 2021 Jannis Priesnitz, Rolf Huesmann, Christian Rathgeb, Nicolas Buchmann, Christoph Busch

We provide a comprehensive description of the entire recognition pipeline and discuss important requirements for a fully automated capturing system.

On the Generalisation Capabilities of Fisher Vector based Face Presentation Attack Detection

no code implementations2 Mar 2021 Lázaro J. González-Soler, Marta Gomez-Barrero, Christoph Busch

In order to mitigate those security concerns, most face Presentation Attack Detection techniques have reported a good detection performance when they are evaluated on known Presentation Attack Instruments (PAI) and acquisition conditions, in contrast to more challenging scenarios where unknown attacks are included in the test set.

Face Presentation Attack Detection

Selfie Periocular Verification using an Efficient Super-Resolution Approach

no code implementations16 Feb 2021 Juan Tapia, Andres Valenzuela, Rodrigo Lara, Marta Gomez-Barrero, Christoph Busch

Selfie-based biometrics has great potential for a wide range of applications since, e. g. periocular verification is contactless and is safe to use in pandemics such as COVID-19, when a major portion of a face is covered by a facial mask.

Image Super-Resolution

Face Morphing Attack Generation & Detection: A Comprehensive Survey

no code implementations3 Nov 2020 Sushma Venkatesh, Raghavendra Ramachandra, Kiran Raja, Christoph Busch

The vulnerability of Face Recognition System (FRS) to various kind of attacks (both direct and in-direct attacks) and face morphing attacks has received a great interest from the biometric community.

Benchmarking Face Recognition +1

On the Generalisation Capabilities of Fingerprint Presentation Attack Detection Methods in the Short Wave Infrared Domain

no code implementations19 Oct 2020 Jascha Kolberg, Marta Gomez-Barrero, Christoph Busch

Therefore, presentation attack detection (PAD) methods are of utmost importance in order to distinguish between bona fide and attack presentations.

Texture-based Presentation Attack Detection for Automatic Speaker Verification

no code implementations8 Oct 2020 Lazaro J. Gonzalez-Soler, Jose Patino, Marta Gomez-Barrero, Massimiliano Todisco, Christoph Busch, Nicholas Evans

Despite these and other advantages, biometric systems in general and Automatic speaker verification (ASV) systems in particular can be vulnerable to attack presentations.

Speaker Verification

MIPGAN -- Generating Strong and High Quality Morphing Attacks Using Identity Prior Driven GAN

no code implementations3 Sep 2020 Haoyu Zhang, Sushma Venkatesh, Raghavendra Ramachandra, Kiran Raja, Naser Damer, Christoph Busch

Extensive experiments are carried out to assess the FRS's vulnerability against the proposed morphed face generation technique on three types of data such as digital images, re-digitized (printed and scanned) images, and compressed images after re-digitization from newly generated MIPGAN Face Morph Dataset.

Face Generation Face Recognition +1

Face Image Quality Assessment: A Literature Survey

no code implementations2 Sep 2020 Torsten Schlett, Christian Rathgeb, Olaf Henniger, Javier Galbally, Julian Fierrez, Christoph Busch

The performance of face analysis and recognition systems depends on the quality of the acquired face data, which is influenced by numerous factors.

Face Image Quality Face Image Quality Assessment +1

On the Influence of Ageing on Face Morph Attacks: Vulnerability and Detection

no code implementations6 Jul 2020 Sushma Venkatesh, Kiran Raja, Raghavendra Ramachandra, Christoph Busch

To this extent, we have introduced a new morphed face dataset with ageing derived from the publicly available MORPH II face dataset, which we refer to as MorphAge dataset.

Face Recognition MORPH

Deep Learning-based Single Image Face Depth Data Enhancement

no code implementations19 Jun 2020 Torsten Schlett, Christian Rathgeb, Christoph Busch

All tested enhancer types exclusively use depth data as input, which differs from methods that enhance depth based on additional input data such as visible light color images.

Face Recognition

Detection of Makeup Presentation Attacks based on Deep Face Representations

no code implementations9 Jun 2020 Christian Rathgeb, Pawel Drozdowski, Christoph Busch

Facial cosmetics have the ability to substantially alter the facial appearance, which can negatively affect the decisions of a face recognition.

Face Recognition Facial Makeup Transfer

Morton Filters for Superior Template Protection for Iris Recognition

no code implementations15 Jan 2020 Kiran B. Raja, R. Raghavendra, Sushma Venkatesh, Christoph Busch

To this end, we propose and extend our earlier ideas of Morton-filters for obtaining better and reliable templates for iris.

Iris Recognition

Deep Face Representations for Differential Morphing Attack Detection

no code implementations5 Jan 2020 Ulrich Scherhag, Christian Rathgeb, Johannes Merkle, Christoph Busch

In addition, the application of deep face representations for differential morphing attack detection algorithms is investigated.

Cryptography and Security

Smartphone Multi-modal Biometric Authentication: Database and Evaluation

no code implementations5 Dec 2019 Raghavendra Ramachandra, Martin Stokkenes, Amir Mohammadi, Sushma Venkatesh, Kiran Raja, Pankaj Wasnik, Eric Poiret, Sébastien Marcel, Christoph Busch

One of the unique features of this dataset is that it is collected in four different geographic locations representing a diverse population and ethnicity.

Robust Morph-Detection at Automated Border Control Gate using Deep Decomposed 3D Shape and Diffuse Reflectance

no code implementations3 Dec 2019 Jag Mohan Singh, Raghavendra Ramachandra, Kiran B. Raja, Christoph Busch

Face recognition is widely employed in Automated Border Control (ABC) gates, which verify the face image on passport or electronic Machine Readable Travel Document (eMTRD) against the captured image to confirm the identity of the passport holder.

Face Recognition MORPH

Detecting Finger-Vein Presentation Attacks Using 3D Shape & Diffuse Reflectance Decomposition

no code implementations3 Dec 2019 Jag Mohan Singh, Sushma Venkatesh, Kiran B. Raja, Raghavendra Ramachandra, Christoph Busch

We establish the superiority of the proposed approach by benchmarking it with classical textural feature-descriptor applied directly on finger-vein images.

Benchmarking Finger Vein Recognition

Sex-Prediction from Periocular Images across Multiple Sensors and Spectra

no code implementations1 May 2019 Juan Tapia, Christian Rathgeb, Christoph Busch

In this paper, we provide a comprehensive analysis of periocular-based sex-prediction (commonly referred to as gender classification) using state-of-the-art machine learning techniques.

Classification General Classification

Relevant features for Gender Classification in NIR Periocular Images

no code implementations26 Apr 2019 Ignacio Viedma, Juan Tapia, Andres Iturriaga, Christoph Busch

In this work, we analyze and demonstrate the location of the most relevant features that describe gender in periocular NIR images and evaluate its influence its classification.

Classification General Classification

Biometric Presentation Attack Detection: Beyond the Visible Spectrum

no code implementations28 Feb 2019 Ruben Tolosana, Marta Gomez-Barrero, Christoph Busch, Javier Ortega-Garcia

The increased need for unattended authentication in multiple scenarios has motivated a wide deployment of biometric systems in the last few years.

Cannot find the paper you are looking for? You can Submit a new open access paper.