Skip to main content

and
  1. Article

    Open Access

    Ubiquitous multi-occupant detection in smart environments

    Recent advancements in ubiquitous computing have emphasized the need for privacy-preserving occupancy detection in smart environments to enhance security. This work presents a novel occupancy detection solutio...

    Daniel Fährmann, Fadi Boutros, Philipp Kubon in Neural Computing and Applications (2024)

  2. No Access

    Chapter

    Intra and Cross-spectrum Iris Presentation Attack Detection in the NIR and Visible Domains

    Iris Presentation Attack Detection (PAD) is essential to secure iris recognition systems. Recent iris PAD solutions achieved good performance by leveraging deep learning techniques. However, most results were ...

    Meiling Fang, Fadi Boutros, Naser Damer in Handbook of Biometric Anti-Spoofing (2023)

  3. Article

    Open Access

    The overlap** effect and fusion protocols of data augmentation techniques in iris PAD

    Iris Presentation Attack Detection (PAD) algorithms address the vulnerability of iris recognition systems to presentation attacks. With the great success of deep learning methods in various computer vision fie...

    Meiling Fang, Naser Damer, Fadi Boutros in Machine Vision and Applications (2021)

  4. No Access

    Chapter and Conference Paper

    ReGenMorph: Visibly Realistic GAN Generated Face Morphing Attacks by Attack Re-generation

    Face morphing attacks aim at creating face images that are verifiable to be the face of multiple identities, which can lead to building faulty identity links in operations like border checks. While creating a ...

    Naser Damer, Kiran Raja, Marius Süßmilch, Sushma Venkatesh in Advances in Visual Computing (2021)

  5. No Access

    Chapter and Conference Paper

    PW-MAD: Pixel-Wise Supervision for Generalized Face Morphing Attack Detection

    A face morphing attack image can be verified to multiple identities, making this attack a major vulnerability to processes based on identity verification, such as border checks. Various methods have been propo...

    Naser Damer, Noémie Spiller, Meiling Fang, Fadi Boutros in Advances in Visual Computing (2021)

  6. No Access

    Chapter and Conference Paper

    Detecting Face Morphing Attacks by Analyzing the Directed Distances of Facial Landmarks Shifts

    Face morphing attacks create face images that are verifiable to multiple identities. Associating such images to identity documents lead to building faulty identity links, causing attacks on operations like bor...

    Naser Damer, Viola Boller, Yaza Wainakh, Fadi Boutros in Pattern Recognition (2019)