Alert button
Picture for Christoph Busch

Christoph Busch

Alert button

Synthetic Data in Human Analysis: A Survey

Add code
Bookmark button
Alert button
Aug 19, 2022
Indu Joshi, Marcel Grimmer, Christian Rathgeb, Christoph Busch, Francois Bremond, Antitza Dantcheva

Figure 1 for Synthetic Data in Human Analysis: A Survey
Figure 2 for Synthetic Data in Human Analysis: A Survey
Figure 3 for Synthetic Data in Human Analysis: A Survey
Figure 4 for Synthetic Data in Human Analysis: A Survey
Viaarxiv icon

Time flies by: Analyzing the Impact of Face Ageing on the Recognition Performance with Synthetic Data

Add code
Bookmark button
Alert button
Aug 17, 2022
Marcel Grimmer, Haoyu Zhang, Raghavendra Ramachandra, Kiran Raja, Christoph Busch

Figure 1 for Time flies by: Analyzing the Impact of Face Ageing on the Recognition Performance with Synthetic Data
Figure 2 for Time flies by: Analyzing the Impact of Face Ageing on the Recognition Performance with Synthetic Data
Figure 3 for Time flies by: Analyzing the Impact of Face Ageing on the Recognition Performance with Synthetic Data
Figure 4 for Time flies by: Analyzing the Impact of Face Ageing on the Recognition Performance with Synthetic Data
Viaarxiv icon

Single Morphing Attack Detection using Siamese Network and Few-shot Learning

Add code
Bookmark button
Alert button
Jun 22, 2022
Juan Tapia, Daniel Schulz, Christoph Busch

Figure 1 for Single Morphing Attack Detection using Siamese Network and Few-shot Learning
Figure 2 for Single Morphing Attack Detection using Siamese Network and Few-shot Learning
Figure 3 for Single Morphing Attack Detection using Siamese Network and Few-shot Learning
Figure 4 for Single Morphing Attack Detection using Siamese Network and Few-shot Learning
Viaarxiv icon

An Overview of Privacy-enhancing Technologies in Biometric Recognition

Add code
Bookmark button
Alert button
Jun 21, 2022
Pietro Melzi, Christian Rathgeb, Ruben Tolosana, Ruben Vera-Rodriguez, Christoph Busch

Figure 1 for An Overview of Privacy-enhancing Technologies in Biometric Recognition
Figure 2 for An Overview of Privacy-enhancing Technologies in Biometric Recognition
Figure 3 for An Overview of Privacy-enhancing Technologies in Biometric Recognition
Figure 4 for An Overview of Privacy-enhancing Technologies in Biometric Recognition
Viaarxiv icon

Morphing Attack Potential

Add code
Bookmark button
Alert button
Apr 28, 2022
Matteo Ferrara, Annalisa Franco, Davide Maltoni, Christoph Busch

Figure 1 for Morphing Attack Potential
Figure 2 for Morphing Attack Potential
Figure 3 for Morphing Attack Potential
Figure 4 for Morphing Attack Potential
Viaarxiv icon

Analyzing Human Observer Ability in Morphing Attack Detection -- Where Do We Stand?

Add code
Bookmark button
Alert button
Mar 04, 2022
Sankini Rancha Godage, Frøy Løvåsdal, Sushma Venkatesh, Kiran Raja, Raghavendra Ramachandra, Christoph Busch

Figure 1 for Analyzing Human Observer Ability in Morphing Attack Detection -- Where Do We Stand?
Figure 2 for Analyzing Human Observer Ability in Morphing Attack Detection -- Where Do We Stand?
Figure 3 for Analyzing Human Observer Ability in Morphing Attack Detection -- Where Do We Stand?
Figure 4 for Analyzing Human Observer Ability in Morphing Attack Detection -- Where Do We Stand?
Viaarxiv icon

Fun Selfie Filters in Face Recognition: Impact Assessment and Removal

Add code
Bookmark button
Alert button
Feb 12, 2022
Cristian Botezatu, Mathias Ibsen, Christian Rathgeb, Christoph Busch

Figure 1 for Fun Selfie Filters in Face Recognition: Impact Assessment and Removal
Figure 2 for Fun Selfie Filters in Face Recognition: Impact Assessment and Removal
Figure 3 for Fun Selfie Filters in Face Recognition: Impact Assessment and Removal
Figure 4 for Fun Selfie Filters in Face Recognition: Impact Assessment and Removal
Viaarxiv icon

Face Beneath the Ink: Synthetic Data and Tattoo Removal with Application to Face Recognition

Add code
Bookmark button
Alert button
Feb 10, 2022
Mathias Ibsen, Christian Rathgeb, Pawel Drozdowski, Christoph Busch

Figure 1 for Face Beneath the Ink: Synthetic Data and Tattoo Removal with Application to Face Recognition
Figure 2 for Face Beneath the Ink: Synthetic Data and Tattoo Removal with Application to Face Recognition
Figure 3 for Face Beneath the Ink: Synthetic Data and Tattoo Removal with Application to Face Recognition
Figure 4 for Face Beneath the Ink: Synthetic Data and Tattoo Removal with Application to Face Recognition
Viaarxiv icon

Crowd-powered Face Manipulation Detection: Fusing Human Examiner Decisions

Add code
Bookmark button
Alert button
Jan 31, 2022
Christian Rathgeb, Robert Nichols, Mathias Ibsen, Pawel Drozdowski, Christoph Busch

Figure 1 for Crowd-powered Face Manipulation Detection: Fusing Human Examiner Decisions
Figure 2 for Crowd-powered Face Manipulation Detection: Fusing Human Examiner Decisions
Figure 3 for Crowd-powered Face Manipulation Detection: Fusing Human Examiner Decisions
Figure 4 for Crowd-powered Face Manipulation Detection: Fusing Human Examiner Decisions
Viaarxiv icon

Psychophysical Evaluation of Human Performance in Detecting Digital Face Image Manipulations

Add code
Bookmark button
Alert button
Jan 28, 2022
Robert Nichols, Christian Rathgeb, Pawel Drozdowski, Christoph Busch

Figure 1 for Psychophysical Evaluation of Human Performance in Detecting Digital Face Image Manipulations
Figure 2 for Psychophysical Evaluation of Human Performance in Detecting Digital Face Image Manipulations
Figure 3 for Psychophysical Evaluation of Human Performance in Detecting Digital Face Image Manipulations
Figure 4 for Psychophysical Evaluation of Human Performance in Detecting Digital Face Image Manipulations
Viaarxiv icon