Author of the publication

Measuring Linkability of Protected Biometric Templates Using Maximal Leakage.

, , and . IEEE Trans. Inf. Forensics Secur., (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Attacking Face Recognition With T-Shirts: Database, Vulnerability Assessment, and Detection., , , , , , , and . IEEE Access, (2023)Alternative search techniques for face detection using location estimation and binary features., and . Comput. Vis. Image Underst., 117 (5): 551-570 (2013)ChatGPT and biometrics: an assessment of face recognition, gender detection, and age estimation capabilities., , , , and . CoRR, (2024)Approximating Optimal Morphing Attacks using Template Inversion., , and . CoRR, (2024)Deep Variational Privacy Funnel: General Modeling with Applications in Face Recognition., , and . CoRR, (2024)EdgeFace: Efficient Face Recognition Model for Edge Devices., , , , and . CoRR, (2023)Towards Protecting Face Embeddings in Mobile Face Verification Scenarios., and . CoRR, (2021)Heterogeneous Face Recognition Using Domain Specific Units., , and . IEEE Trans. Inf. Forensics Secur., 14 (7): 1803-1816 (2019)Biometrics Evaluation Under Spoofing Attacks., , and . IEEE Trans. Inf. Forensics Secur., 9 (12): 2264-2276 (2014)Spoofing Face Recognition With 3D Masks., and . IEEE Trans. Inf. Forensics Secur., 9 (7): 1084-1097 (2014)