Search Results for author: Christoph Busch

Found 85 papers, 8 papers with code

Impact of Synthetic Images on Morphing Attack Detection Using a Siamese Network

no code implementations14 Mar 2024 Juan Tapia, Christoph Busch

Our results show that MAD trained on EfficientNetB0 from FERET, FRGCv2, and FRLL can reach a lower error rate in comparison with SOTA.

Double Trouble? Impact and Detection of Duplicates in Face Image Datasets

1 code implementation25 Jan 2024 Torsten Schlett, Christian Rathgeb, Juan Tapia, Christoph Busch

Additional steps based on face recognition and face image quality assessment models reduce false positives, and facilitate the deduplication of the face images both for intra- and inter-subject duplicate sets.

Face Image Quality Face Image Quality Assessment +1

TetraLoss: Improving the Robustness of Face Recognition against Morphing Attacks

no code implementations21 Jan 2024 Mathias Ibsen, Lázaro J. González-Soler, Christian Rathgeb, Christoph Busch

Face recognition systems are widely deployed in high-security applications such as for biometric verification at border controls.

Face Recognition

EGAIN: Extended GAn INversion

no code implementations22 Dec 2023 Wassim Kabbani, Marcel Grimmer, Christoph Busch

In this work, EGAIN, an architecture for constructing GAN inversion models, is presented.

Face Recognition

General Framework to Evaluate Unlinkability in Biometric Template Protection Systems

no code implementations8 Nov 2023 Marta Gomez-Barrero, Javier Galbally, Christian Rathgeb, Christoph Busch

The wide deployment of biometric recognition systems in the last two decades has raised privacy concerns regarding the storage and use of biometric data.

Log-Likelihood Score Level Fusion for Improved Cross-Sensor Smartphone Periocular Recognition

no code implementations2 Nov 2023 Fernando Alonso-Fernandez, Kiran B. Raja, Christoph Busch, Josef Bigun

The proliferation of cameras and personal devices results in a wide variability of imaging conditions, producing large intra-class variations and a significant performance drop when images from heterogeneous environments are compared.

Decision Making

Iris Liveness Detection Competition (LivDet-Iris) -- The 2023 Edition

no code implementations6 Oct 2023 Patrick Tinsley, Sandip Purnapatra, Mahsa Mitcheff, Aidan Boyd, Colton Crum, Kevin Bowyer, Patrick Flynn, Stephanie Schuckers, Adam Czajka, Meiling Fang, Naser Damer, Xingyu Liu, Caiyong Wang, Xianyun Sun, Zhaohua Chang, Xinyue Li, Guangzhe Zhao, Juan Tapia, Christoph Busch, Carlos Aravena, Daniel Schulz

New elements in this fifth competition include (1) GAN-generated iris images as a category of presentation attack instruments (PAI), and (2) an evaluation of human accuracy at detecting PAI as a reference benchmark.

Reversing Deep Face Embeddings with Probable Privacy Protection

no code implementations4 Oct 2023 Daile Osorio-Roig, Paul A. Gerlitz, Christian Rathgeb, Christoph Busch

Generally, privacy-enhancing face recognition systems are designed to offer permanent protection of face embeddings.

Face Recognition Image Reconstruction

NeutrEx: A 3D Quality Component Measure on Facial Expression Neutrality

no code implementations19 Aug 2023 Marcel Grimmer, Christian Rathgeb, Raymond Veldhuis, Christoph Busch

Accurate face recognition systems are increasingly important in sensitive applications like border control or migration management.

3D Face Reconstruction Face Recognition +1

Benchmarking fixed-length Fingerprint Representations across different Embedding Sizes and Sensor Types

no code implementations17 Jul 2023 Tim Rohwedder, Daile Osorio-Roig, Christian Rathgeb, Christoph Busch

We also study the impact in terms of recognition performance of the fingerprint textural information for two sensor types, i. e. optical and capacitive.

Benchmarking

Towards minimizing efforts for Morphing Attacks -- Deep embeddings for morphing pair selection and improved Morphing Attack Detection

no code implementations29 May 2023 Roman Kessler, Kiran Raja, Juan Tapia, Christoph Busch

The results endorse the advantages of face embeddings in more effective image pre-selection for face morphing and accurate detection of morphed face images.

Face Recognition

MCLFIQ: Mobile Contactless Fingerprint Image Quality

no code implementations27 Apr 2023 Jannis Priesnitz, Axel Weißenfeld, Laurenz Ruzicka, Christian Rathgeb, Bernhard Strobl, Ralph Lessmann, Christoph Busch

In experiments, the MCLFIQ method is compared against the original NFIQ 2. 2 method, a sharpness-based quality assessment algorithm developed for contactless fingerprint images \rev{and the general purpose image quality assessment method BRISQUE.

Image Quality Assessment

Face Feature Visualisation of Single Morphing Attack Detection

no code implementations25 Apr 2023 Juan Tapia, Christoph Busch

This paper proposes an explainable visualisation of different face feature extraction algorithms that enable the detection of bona fide and morphing images for single morphing attack detection.

A Latent Fingerprint in the Wild Database

no code implementations3 Apr 2023 Xinwei Liu, Kiran Raja, Renfang Wang, Hong Qiu, Hucheng Wu, Dechao Sun, Qiguang Zheng, Nian Liu, Xiaoxia Wang, Gehang Huang, Raghavendra Ramachandra, Christoph Busch

Further, existing databases for latent fingerprint recognition do not have a large number of unique subjects/fingerprint instances or do not provide ground truth/reference fingerprint images to conduct a cross-comparison against the latent.

Benchmarking

Considerations on the Evaluation of Biometric Quality Assessment Algorithms

1 code implementation23 Mar 2023 Torsten Schlett, Christian Rathgeb, Juan Tapia, Christoph Busch

Additionally, a discard fraction limit or range must be selected to compute pAUC values, which can then be used to quantitatively rank quality assessment algorithms.

Face Image Quality Face Image Quality Assessment +1

Deep Learning in the Field of Biometric Template Protection: An Overview

no code implementations5 Mar 2023 Christian Rathgeb, Jascha Kolberg, Andreas Uhl, Christoph Busch

Biometric systems utilising deep learning have been shown to achieve auspicious recognition accuracy, surpassing human performance.

Fairness Privacy Preserving

Effect of Lossy Compression Algorithms on Face Image Quality and Recognition

no code implementations24 Feb 2023 Torsten Schlett, Sebastian Schachner, Christian Rathgeb, Juan Tapia, Christoph Busch

This work investigates the effect of lossy image compression on a state-of-the-art face recognition model, and on multiple face image quality assessment models.

Face Image Quality Face Image Quality Assessment +2

Synthetic ID Card Image Generation for Improving Presentation Attack Detection

no code implementations31 Oct 2022 Daniel Benalcazar, Juan E. Tapia, Sebastian Gonzalez, Christoph Busch

Currently, it is ever more common to access online services for activities which formerly required physical attendance.

Fraud Detection Image Generation

Impact of Face Image Quality Estimation on Presentation Attack Detection

no code implementations30 Sep 2022 Carlos Aravena, Diego Pasmino, Juan E. Tapia, Christoph Busch

In this paper, we study the effect of quality assessment methods on filtering bona fide and attack samples, their impact on PAD systems, and how the performance of such systems is improved when training on a filtered (by quality) dataset.

Face Image Quality Face Image Quality Assessment +2

Learning to Predict Fitness for Duty using Near Infrared Periocular Iris Images

no code implementations4 Sep 2022 Juan Tapia, Daniel Benalcazar, Andres Valenzuela, Leonardo Causa, Enrique Lopez Droguett, Christoph Busch

This research proposes a new database and method to detect the reduction of alertness conditions due to alcohol, drug consumption and sleepiness deprivation from Near-Infra-Red (NIR) periocular eye images.

Alcohol Consumption Detection from Periocular NIR Images Using Capsule Network

1 code implementation4 Sep 2022 Juan Tapia, Enrique Lopez Droguett, Christoph Busch

This research proposes a method to detect alcohol consumption from Near-Infra-Red (NIR) periocular eye images.

Single Morphing Attack Detection using Siamese Network and Few-shot Learning

no code implementations22 Jun 2022 Juan Tapia, Daniel Schulz, Christoph Busch

This paper proposes a framework following the Few-Shot-Learning approach that shares image information based on the siamese network using triplet-semi-hard-loss to tackle the morphing attack detection and boost the clustering classification process.

Face Morphing Attack Detection Face Verification +1

An Overview of Privacy-enhancing Technologies in Biometric Recognition

no code implementations21 Jun 2022 Pietro Melzi, Christian Rathgeb, Ruben Tolosana, Ruben Vera-Rodriguez, Christoph Busch

Privacy-enhancing technologies are technologies that implement fundamental data protection principles.

Morphing Attack Potential

1 code implementation28 Apr 2022 Matteo Ferrara, Annalisa Franco, Davide Maltoni, Christoph Busch

In security systems the risk assessment in the sense of common criteria testing is a very relevant topic; this requires quantifying the attack potential in terms of the expertise of the attacker, his knowledge about the target and access to equipment.

Face Recognition

Analyzing Human Observer Ability in Morphing Attack Detection -- Where Do We Stand?

no code implementations24 Feb 2022 Sankini Rancha Godage, Frøy Løvåsdal, Sushma Venkatesh, Kiran Raja, Raghavendra Ramachandra, Christoph Busch

One prevalent misconception is that an examiner's or observer's capacity for facial morph detection depends on their subject expertise, experience, and familiarity with the issue and that no works have reported the specific results of observers who regularly verify identity (ID) documents for their jobs.

MORPH

Fun Selfie Filters in Face Recognition: Impact Assessment and Removal

no code implementations12 Feb 2022 Cristian Botezatu, Mathias Ibsen, Christian Rathgeb, Christoph Busch

This work investigates the impact of fun selfie filters, which are frequently used to modify selfies, on face recognition systems.

Face Detection Face Recognition

Face Beneath the Ink: Synthetic Data and Tattoo Removal with Application to Face Recognition

no code implementations10 Feb 2022 Mathias Ibsen, Christian Rathgeb, Pawel Drozdowski, Christoph Busch

Moreover, we demonstrate the feasibility of the generation by using a deep learning-based model for removing tattoos from face images.

Face Recognition

Crowd-powered Face Manipulation Detection: Fusing Human Examiner Decisions

no code implementations31 Jan 2022 Christian Rathgeb, Robert Nichols, Mathias Ibsen, Pawel Drozdowski, Christoph Busch

To this end, various decision fusion methods are proposed incorporating the examiners' decision confidence, experience level, and their time to take a decision.

Face Swapping Image Manipulation +1

Psychophysical Evaluation of Human Performance in Detecting Digital Face Image Manipulations

no code implementations28 Jan 2022 Robert Nichols, Christian Rathgeb, Pawel Drozdowski, Christoph Busch

In recent years, increasing deployment of face recognition technology in security-critical settings, such as border control or law enforcement, has led to considerable interest in the vulnerability of face recognition systems to attacks utilising legitimate documents, which are issued on the basis of digitally manipulated face images.

Face Recognition Face Swapping

Reliable Detection of Doppelgängers based on Deep Face Representations

no code implementations21 Jan 2022 Christian Rathgeb, Daniel Fischer, Pawel Drozdowski, Christoph Busch

Doppelg\"angers (or lookalikes) usually yield an increased probability of false matches in a facial recognition system, as opposed to random face image pairs selected for non-mated comparison trials.

Face Recognition

Generation of Non-Deterministic Synthetic Face Datasets Guided by Identity Priors

no code implementations7 Dec 2021 Marcel Grimmer, Haoyu Zhang, Raghavendra Ramachandra, Kiran Raja, Christoph Busch

Mated samples are generated by manipulating latent vectors, and more precisely, we exploit Principal Component Analysis (PCA) to define semantically meaningful directions in the latent space and control the similarity between the original and the mated samples using a pre-trained face recognition system.

Face Image Quality Face Recognition

An Attack on Facial Soft-biometric Privacy Enhancement

no code implementations24 Nov 2021 Dailé Osorio-Roig, Christian Rathgeb, Pawel Drozdowski, Philipp Terhörst, Vitomir Štruc, Christoph Busch

Future works on privacy-enhancing face recognition are encouraged to include the proposed attack in evaluations on the privacy protection.

Attribute Dimensionality Reduction +1

Towards an Efficient Semantic Segmentation Method of ID Cards for Verification Systems

no code implementations24 Nov 2021 Rodrigo Lara, Andres Valenzuela, Daniel Schulz, Juan Tapia, Christoph Busch

The best results for the fused multi-country dataset of ID Card images from Chile, Argentina and Mexico reached an IoU of 0. 9911.

Semantic Segmentation

Algorithmic Fairness in Face Morphing Attack Detection

no code implementations23 Nov 2021 Raghavendra Ramachandra, Kiran Raja, Christoph Busch

In this paper, we study and present a comprehensive analysis of algorithmic fairness of the existing Single image-based Morph Attack Detection (S-MAD) algorithms.

Face Morphing Attack Detection Face Recognition +2

FRT-PAD: Effective Presentation Attack Detection Driven by Face Related Task

1 code implementation22 Nov 2021 Wentian Zhang, Haozhe Liu, Feng Liu, Raghavendra Ramachandra, Christoph Busch

The proposed method, first introduces task specific features from other face related task, then, we design a Cross-Modal Adapter using a Graph Attention Network (GAT) to re-map such features to adapt to PAD task.

Attribute Face Presentation Attack Detection +2

SynCoLFinGer: Synthetic Contactless Fingerprint Generator

no code implementations18 Oct 2021 Jannis Priesnitz, Christian Rathgeb, Nicolas Buchmann, Christoph Busch

We present the first method for synthetic generation of contactless fingerprint images, referred to as SynCoLFinGer.

Differential Anomaly Detection for Facial Images

no code implementations7 Oct 2021 Mathias Ibsen, Lázaro J. González-Soler, Christian Rathgeb, Pawel Drozdowski, Marta Gomez-Barrero, Christoph Busch

Due to their convenience and high accuracy, face recognition systems are widely employed in governmental and personal security applications to automatically recognise individuals.

Anomaly Detection Face Recognition +1

Synthetic Periocular Iris PAI from a Small Set of Near-Infrared-Images

no code implementations26 Jul 2021 Jose Maureira, Juan Tapia, Claudia Arellano, Christoph Busch

Such results demonstrated the feasibility of synthetic images to fool presentation attacks detection algorithms and the need for such algorithms to be constantly updated and trained with a larger number of images and PAI scenarios.

Demographic Fairness in Face Identification: The Watchlist Imbalance Effect

no code implementations15 Jun 2021 Pawel Drozdowski, Christian Rathgeb, Christoph Busch

Recently, different researchers have found that the gallery composition of a face database can induce performance differentials to facial identification systems in which a probe image is compared against up to all stored reference images to reach a biometric decision.

Face Identification Face Recognition +2

Demographic Fairness in Biometric Systems: What do the Experts say?

no code implementations31 May 2021 Christian Rathgeb, Pawel Drozdowski, Naser Damer, Dinusha C. Frings, Christoph Busch

Algorithmic decision systems have frequently been labelled as "biased", "racist", "sexist", or "unfair" by numerous media outlets, organisations, and researchers.

Fairness Management

Iris Liveness Detection using a Cascade of Dedicated Deep Learning Networks

no code implementations28 May 2021 Juan Tapia, Sebastian Gonzalez, Christoph Busch

The bona fide class consists of live iris images, whereas the attack presentation instrument classes are comprised of cadaver, printed, and contact lenses images, for a total of four scenarios.

On the Applicability of Synthetic Data for Face Recognition

no code implementations6 Apr 2021 Haoyu Zhang, Marcel Grimmer, Raghavendra Ramachandra, Kiran Raja, Christoph Busch

Face verification has come into increasing focus in various applications including the European Entry/Exit System, which integrates face recognition mechanisms.

Face Image Quality Face Image Quality Assessment +2

Impact of Facial Tattoos and Paintings on Face Recognition Systems

no code implementations17 Mar 2021 Mathias Ibsen, Christian Rathgeb, Thomas Fink, Pawel Drozdowski, Christoph Busch

In this work, we investigate the impact that facial tattoos and paintings have on current face recognition systems.

Face Recognition

Effects of Image Compression on Face Image Manipulation Detection: A Case Study on Facial Retouching

no code implementations5 Mar 2021 Christian Rathgeb, Kevin Bernardo, Nathania E. Haryanto, Christoph Busch

Results obtained from challenging cross-database experiments in which the analyzed retouching technique is unknown during training yield interesting findings: (1) most competitive detection performance is achieved for differential scenarios employing deep face representations; (2) image compression severely impacts the performance of face image manipulation detection schemes based on texture descriptors while methods utilizing deep face representations are found to be highly robust; (3) in some cases, the application of image compression might as well improve detection performance.

Image Compression Image Manipulation +1

Signal-level Fusion for Indexing and Retrieval of Facial Biometric Data

no code implementations5 Mar 2021 Pawel Drozdowski, Fabian Stockhardt, Christian Rathgeb, Christoph Busch

The growing scope, scale, and number of biometric deployments around the world emphasise the need for research into technologies facilitating efficient and reliable biometric identification queries.

Retrieval

Mobile Touchless Fingerprint Recognition: Implementation, Performance and Usability Aspects

1 code implementation4 Mar 2021 Jannis Priesnitz, Rolf Huesmann, Christian Rathgeb, Nicolas Buchmann, Christoph Busch

We provide a comprehensive description of the entire recognition pipeline and discuss important requirements for a fully automated capturing system.

On the Generalisation Capabilities of Fisher Vector based Face Presentation Attack Detection

no code implementations2 Mar 2021 Lázaro J. González-Soler, Marta Gomez-Barrero, Christoph Busch

In order to mitigate those security concerns, most face Presentation Attack Detection techniques have reported a good detection performance when they are evaluated on known Presentation Attack Instruments (PAI) and acquisition conditions, in contrast to more challenging scenarios where unknown attacks are included in the test set.

Face Presentation Attack Detection

Selfie Periocular Verification using an Efficient Super-Resolution Approach

no code implementations16 Feb 2021 Juan Tapia, Andres Valenzuela, Rodrigo Lara, Marta Gomez-Barrero, Christoph Busch

Selfie-based biometrics has great potential for a wide range of applications since, e. g. periocular verification is contactless and is safe to use in pandemics such as COVID-19, when a major portion of a face is covered by a facial mask.

Image Super-Resolution

Face Morphing Attack Generation & Detection: A Comprehensive Survey

no code implementations3 Nov 2020 Sushma Venkatesh, Raghavendra Ramachandra, Kiran Raja, Christoph Busch

The vulnerability of Face Recognition System (FRS) to various kind of attacks (both direct and in-direct attacks) and face morphing attacks has received a great interest from the biometric community.

Benchmarking Face Recognition +1

On the Generalisation Capabilities of Fingerprint Presentation Attack Detection Methods in the Short Wave Infrared Domain

no code implementations19 Oct 2020 Jascha Kolberg, Marta Gomez-Barrero, Christoph Busch

Therefore, presentation attack detection (PAD) methods are of utmost importance in order to distinguish between bona fide and attack presentations.

Texture-based Presentation Attack Detection for Automatic Speaker Verification

no code implementations8 Oct 2020 Lazaro J. Gonzalez-Soler, Jose Patino, Marta Gomez-Barrero, Massimiliano Todisco, Christoph Busch, Nicholas Evans

Despite these and other advantages, biometric systems in general and Automatic speaker verification (ASV) systems in particular can be vulnerable to attack presentations.

Speaker Verification

MIPGAN -- Generating Strong and High Quality Morphing Attacks Using Identity Prior Driven GAN

no code implementations3 Sep 2020 Haoyu Zhang, Sushma Venkatesh, Raghavendra Ramachandra, Kiran Raja, Naser Damer, Christoph Busch

Extensive experiments are carried out to assess the FRS's vulnerability against the proposed morphed face generation technique on three types of data such as digital images, re-digitized (printed and scanned) images, and compressed images after re-digitization from newly generated MIPGAN Face Morph Dataset.

Face Generation Face Recognition +2

Face Image Quality Assessment: A Literature Survey

no code implementations2 Sep 2020 Torsten Schlett, Christian Rathgeb, Olaf Henniger, Javier Galbally, Julian Fierrez, Christoph Busch

The performance of face analysis and recognition systems depends on the quality of the acquired face data, which is influenced by numerous factors.

Face Image Quality Face Image Quality Assessment +1

On the Influence of Ageing on Face Morph Attacks: Vulnerability and Detection

no code implementations6 Jul 2020 Sushma Venkatesh, Kiran Raja, Raghavendra Ramachandra, Christoph Busch

To this extent, we have introduced a new morphed face dataset with ageing derived from the publicly available MORPH II face dataset, which we refer to as MorphAge dataset.

Face Recognition MORPH

Deep Learning-based Single Image Face Depth Data Enhancement

no code implementations19 Jun 2020 Torsten Schlett, Christian Rathgeb, Christoph Busch

All tested enhancer types exclusively use depth data as input, which differs from methods that enhance depth based on additional input data such as visible light color images.

Face Recognition

Detection of Makeup Presentation Attacks based on Deep Face Representations

no code implementations9 Jun 2020 Christian Rathgeb, Pawel Drozdowski, Christoph Busch

Facial cosmetics have the ability to substantially alter the facial appearance, which can negatively affect the decisions of a face recognition.

Face Recognition Facial Makeup Transfer +1

Morton Filters for Superior Template Protection for Iris Recognition

no code implementations15 Jan 2020 Kiran B. Raja, R. Raghavendra, Sushma Venkatesh, Christoph Busch

To this end, we propose and extend our earlier ideas of Morton-filters for obtaining better and reliable templates for iris.

Iris Recognition

Deep Face Representations for Differential Morphing Attack Detection

no code implementations5 Jan 2020 Ulrich Scherhag, Christian Rathgeb, Johannes Merkle, Christoph Busch

In addition, the application of deep face representations for differential morphing attack detection algorithms is investigated.

Cryptography and Security

Smartphone Multi-modal Biometric Authentication: Database and Evaluation

no code implementations5 Dec 2019 Raghavendra Ramachandra, Martin Stokkenes, Amir Mohammadi, Sushma Venkatesh, Kiran Raja, Pankaj Wasnik, Eric Poiret, Sébastien Marcel, Christoph Busch

One of the unique features of this dataset is that it is collected in four different geographic locations representing a diverse population and ethnicity.

Robust Morph-Detection at Automated Border Control Gate using Deep Decomposed 3D Shape and Diffuse Reflectance

no code implementations3 Dec 2019 Jag Mohan Singh, Raghavendra Ramachandra, Kiran B. Raja, Christoph Busch

Face recognition is widely employed in Automated Border Control (ABC) gates, which verify the face image on passport or electronic Machine Readable Travel Document (eMTRD) against the captured image to confirm the identity of the passport holder.

Face Recognition MORPH

Detecting Finger-Vein Presentation Attacks Using 3D Shape & Diffuse Reflectance Decomposition

no code implementations3 Dec 2019 Jag Mohan Singh, Sushma Venkatesh, Kiran B. Raja, Raghavendra Ramachandra, Christoph Busch

We establish the superiority of the proposed approach by benchmarking it with classical textural feature-descriptor applied directly on finger-vein images.

Benchmarking Finger Vein Recognition

Sex-Prediction from Periocular Images across Multiple Sensors and Spectra

no code implementations1 May 2019 Juan Tapia, Christian Rathgeb, Christoph Busch

In this paper, we provide a comprehensive analysis of periocular-based sex-prediction (commonly referred to as gender classification) using state-of-the-art machine learning techniques.

Classification Gender Classification +1

Relevant features for Gender Classification in NIR Periocular Images

no code implementations26 Apr 2019 Ignacio Viedma, Juan Tapia, Andres Iturriaga, Christoph Busch

In this work, we analyze and demonstrate the location of the most relevant features that describe gender in periocular NIR images and evaluate its influence its classification.

Classification Gender Classification +1

Biometric Presentation Attack Detection: Beyond the Visible Spectrum

no code implementations28 Feb 2019 Ruben Tolosana, Marta Gomez-Barrero, Christoph Busch, Javier Ortega-Garcia

The increased need for unattended authentication in multiple scenarios has motivated a wide deployment of biometric systems in the last few years.

Cannot find the paper you are looking for? You can Submit a new open access paper.