Publications 2009

[1] Bian Yang and Christoph Busch, Parameterized Geometric Alignment for Minutiae-Based Fingerprint Template Protection, IEEE Third International Conference on Biometrics: Theory, Applications and Systems (BTAS 09), Sept.28-30, U.S., 2009.
[2] Jeroen Breebaart, Bian Yang, Ileana Buhan-Dulman, Christoph Busch, Biometric template protection: The need for open standards, Datenschutz und Datensicherheit - DuD, Vol. 33, No. 5. (1 May 2009), pp. 299-304.
[3] Bian Yang, Christoph Busch, Mohammad Derawi, Patrick Bours, Davrondzhon Gafurov, Geometric-aligned cancelable fingerprint templates, Proc. of 15th International Conference on Image Analysis and Processing, Salerno, Italy, September, 2009. (LNCS)
[4] Bian Yang, Christoph Busch, and Xiamu Niu, Perceptual Image Encryption Via Reversible Histogram Spreading, 6th IEEE International Symposium on Image and Signal Processing and Analysis (ISPA 2009), Sept.16-18, Salzburg, Austria, 2009.
[5] Bian Yang, Chongqing Zhou, Christoph Busch, and Xiamu Niu, Transparent and Perceptually Enhanced JPEG Image Encryption, IEEE 16th International Conference on Digital Signal Processing, July 5-7, Santorini, Greece, 2009.
[6] Bian Yang, Christoph Busch, Patrick Bours, and Davrondzhon Gafurov, Non-invertible Geometrical Transformation for Fingerprint Minutiae Template Protection, 1st International Workshop on Security and Communication Networks, Trondheim, May 20-22, Norway, 2009. (IEEE Press)
[7] Kirsi Helkala and Einar Snekkenes. Formalizing the ranking of authentication products. Information Management & Computer Security – Special Issue, Vol. 17, Issue 1, pp. 30-43, Emerald, 2009.
[8] Kirsi Helkala and Einar Snekkenes. Password generation and search space reduction, Journal of Computers, Vol. 4, Issue 7, pp. 663-669, Academy Publisher, Finland, 2009
[9] Knut Wold, Slobodan Petrovic, Optimizing speed of a true random number generator in FPGA by spectral analysis, Proceedings of the fourth international conference on computer sciences and convergence information technology (ICCIT), Seoul, Korea, November 2009, pp. 1105-1110.
[10] Hai Nguyen, Katrin Franke, and Slobodan Petrovic, Optimizing a class of feature selection measures, Proceedings of the NIPS 2009 Workshop on Discrete Optimization in Machine Learning: Submodularity, Sparsity & Polyhedra (DISCML), Vancouver, Canada, December 2009.
[11] Davrondzhon Gafurov and Einar Snekkenes, Gait Recognition Using Wearable Motion Recording Sensors, EURASIP Journal on Advances in Signal Processing, Special Issue on Recent Advances in Biometric Systems: A Signal Processing Perspective, 2009.
[12] C. Busch, D. Lodrova, E. Tabassi, W. Krodel: Semantic Conformance Testing for Finger Minutiae Data, in Proceedings of the IEEE International Workshop on Security and Communication Networks (IWSCN), Trondheim, ISBN 978-82-997105-1-0, pages 17-23, (2009)
[13] Zhou, X., Busch, C., Wolthusen, S., and Kuijper, A. A Security Analysis of Biometric Template Protection Schemes. In Proceedings of The International Conference on Image Analysis and Recognition (ICIAR 2009) (Halifax, NS, Canada, Jul. 2009), M. Kamel and A. Campilho, Eds., Vol. 5627 of Lecture Notes in Computer Science, Springer-Verlag, pp. 429-438.
[14] T. Wang, Q. Han, X. Niu, C. Busch: Feature-Level Fusion of Iris and Face for Personal Identification, in Proceedings of the 2009 International Symposium on Neural Networks (ISNN), pages 356-364, ISBN 978-3-642-01512-0, Springer, (2009)
[15] D. Hartung, C. Busch: Why Vein Recognition Needs Privacy Protection, in Proceedings of the IEEE Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), pages 1090-1095, (2009)
[16] S. Wolthusen, C. Busch: Non-Forensic Odontological Biometrics, in Proceedings of the IEEE Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), to pages 1105-1109, (2009)
[17] Z. Wan, Q. Han, X. Niu, C. Busch: Template Protection for Multimodal BIometric Systems, in Proceedings of the IEEE Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 1101-1104, (2009)
[18] C. Busch: Gesichtserkennung beim biometrischen Reisepass, in
eGovernment – Entwicklungsstufen einer demokratischen Wissensgesellschaft (Eds. A. Meier), pages 103-110, ISBN 978-3-642-00129-1, Springer, (2009)
[19] C. Busch, H. Reimer: "Biometrie in neuem Licht?", in DuD – Datenschutz und Datensicherheit, vol 5/2009, pages 269 , ISSN print 1614-0702, (2009)
[20] C. Busch: "Biometrie und Identitätsdiebstahl", in DuD – Datenschutz und Datensicherheit, vol 5/2009, pages 317 , ISSN print 1614-0702, (2009)
[21] D. Lodrova, C. Busch, E. Tabassi, W. Krodel, M. Drahansky: „Semantic Conformance Testing Methodology for Finger Minutiae Data“, in Proceedings BIOSIG 2009, pages 31-42, (2009)
[22] C. Busch, G. Canon: "Biometric Data Interchange Format Standards", in Encyclopedia of Biometric Recognition, Springer, vol 1, pages 81-86, (2009)
[23] Al-Kuwari, S., and Wolthusen, S. Passive Ad Hoc Localization and Tracking in Short-Range Communication. In Proceedings of the First International Conference on Next Generation Wireless Systems (NGWS 2009) (Melbourne, Australia, Oct. 2009), IEEE Press (to appear).
[24] MCEVOY, T. R. and Wolthusen, S. Using Observations of Invariant Behavior to Detect Malicious Agency in Distributed Control Systems. In Proceedings of the 4th International Workshop on Critical Information Infrastructures Security (Bonn, Germany, Sep. 2009) , E. Rome and R. Bloomfield, Eds., vol. of Lecture Notes in Computer Science, Springer-Verlag, (in press).
[25] Al-Kuwari, S., and Wolthusen, S. A Survey of Forensic Localization and Tracking Mechanisms in Short-Range and Cellular Networks. In Proceedings of the 1st International Conference on Digital Forensics & Cyber Crime (ICD2FC 2009) (Albany, NY, USA, Sep. 2009), Springer-Verlag.
[26] Ebinger, P. and Wolthusen, S. Efficient State Estimation and Byzantine Behavior Identification using Distributed Multisensor Data Fusion in Tactical Networks. In Proceedings of the IEEE Military Communications Conference 2009 (MILCOM 2009) (Boston, MA, USA, Oct.
2009), IEEE Press.
[27] Reidt, S. and Wolthusen, S. Energy-Efficient Key Distribution and Revocation in Tactical Networks with Asymmetric Links. In Proceedings of the IEEE Military Communications Conference 2009 (MILCOM 2009) (Boston, MA, USA, Oct. 2009), IEEE Press.
[28] Reidt, S. and Wolthusen, S. Revocation Mechanisms for Hybrid Group Communication with Asymmetric Links. In Proceedings of the Third Annual Conference of ITA (College Park, MD, USA, Sep. 2009).
[29] AL-Salloum, Z. and Wolthusen, S. Semi-Autonomous Link Layer Vulnerability Discovery and Mitigation Dissemination. In Proceedings of the 5th International Conference on IT Incident Management & IT Forensics (IMF 2009) (Stuttgart, Germany, Sep. 2009), O. Göbel, R. Ehlert, S. Frings, D. Günther, H. Morgenstern, D. Schadt, Eds., IEEE Press, pp. 41–53.
[30] Zhou, X., Busch, C., and Wolthusen, S. Feature Correlation Attacks on Biometric Privacy Protection Schemes. In Proceedings of the Special Session on Biometrics, Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (Kyoto, Japan, Sep. 2009), IEEE Press.
[31] Hjelmås, E., Svendsen, N.K., and Wolthusen, S. Integrating Information Assurance into System Administration. In Proceedings of the 2009 Information Security South Africa Conference (ISSA 2009) (Johannesburg, South Africa, Jul. 2009), pp. 363–376.
[32] Franke, K., Hjelmås, E., and Wolthusen, S. Advancing Digital Forensics. In Proceedings of the 6th IFIP TC11.8 World Conference on Information Security Education (WISE 6) (Bento Goncalves, RS, Brazil, Jul. 2009), Springer-Verlag.
[33] Borgen, H., Bours, P., and Wolthusen, S. Simulating the Influences of Aging and Ocular Disease on Biometric Recognition Performance. In Proceedings of the 3rd IAPR/IEEE International Conference on Biometrics (ICB 2009) (Alghero, Italy, Jun. 2009), M. Tistarelli and M. S. Nixon, Eds., Vol. 5558 of Lecture Notes in Computer Science, Springer-Verlag, pp. 864-874.
[34] Reidt, S., Balfe, S., and Wolthusen, S. Robust and Efficient Communication Overlays for Trust Authority Computations. In Proceedings of the 2009 IEEE Sarnoff Symposium (Princeton, NJ, USA, Mar. 2009), IEEE Press.
[35] Svendsen, N. K. and Wolthusen, S. Using Physical Models for Anomaly Detection in Control Systems. In Proceedings of the Third Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection (Hanover, NH, USA, Mar. 2009), Springer Verlag, pp. 139–149.
[36] Daniel Hartung. Venenbilderkennung. Datenschutz und Datensicherheit - DuD, 33(5):275–279, May 2009.
[37] Kalman G Graffi, Patrick Mukherjee, Burkhard Menges, Daniel Hartung, Aleksandra Kovacevic, and Ralf Steinmetz. Practical security in P2Pbased social networks. In the 34th Annual IEEE Conference on Local Computer Networks (LCN), Zurich, Switzerland, 10 2009.
[38] Franke, K. (2009). Capturing Reliable Data for Computer-based Forensic Handwriting Analysis II: Pen-position Activations. In Proc. 10th International Conference on Document Analysis and Recognition, Barcelona, Spain.
[39] Franke, K. (2009). Analysis of Authentic Signatures and Forgeries. Computational Forensics, Third International Workshop, IWCF 2009, The Hague, The Netherlands, August 13-14, 2009. Proceedings, (pp. 150-162).
[40] Blankers, V.L, van den Heuvel, C.E., Franke, K., Vuurpijl, L. (2009). ICDAR 2009 Signature Verification Competition. In Proc. 10th International Conference on Document Analysis and Recognition (ICDAR), Barcelona, Spain, pp. 1403-1407.
[41] Chanda, S., Pal, S., Franke, K., Pal, U. (2009). Two-stage Approach for Word-wise Script Identification. In Proc. 10th International Conference on Document Analysis and Recognition (ICDAR), Barcelona, Spain, pp. 926-930.
[42] Petrovic, S., Franke, K. (2009). A New Two-Stage Search Procedure for Misuse Detection, International Journal of Security and Its Applications.
[43] 8) Geradts, Z.J.M.H., Franke, K., Veenman, C.J. (Eds.), (2009.) Computational Forensics: Third International Workshop, IWCF 2009, The Hague, The Netherlands, August 13-14, 2009, Proceedings, Lecture Notes in Computer Science (LNCS), Vol. 5718, ISBN: 978-3-642-03520-3, 181 pages.
[44] Franke, K. (2009). Computational Forensics: Application and Challenges in the Computer-based Analysis of Signatures. Key note speech at 14th Biennial Conference of the International Graphonomics Society, Université de Bourgogne, Dijon, France.
[45] G.O. Dyrkolbotn and E.Snekkenes. Electromagnetic Side Channel: A Comparison of Multi-Class Feature Selection Methods. In Signal Processing, Pattern Recognition and Application (SPPRA) 2009, track 643-804, ACTA Press.
[46] G.O. Dyrkolbotn and E. Snekkenes. Modified Template Attack: Detecting Address Bus Signals of Equal Hamming Weight. In Norsk Informasjonssikkerhetskonferanse 2009
[47] Carsten Maartmann-Moe, André Årnes, Steffen E. Thorkildsen. The Persistence of Memory: Forensic Identification and Extraction of Cryptographic Keys. In Proceedings of the Ninth Annual DFRWS Conference, Montreal, Canada, 2009, edited by Eoghan Casey, pp 132-140, 2009
[ http ]
[48] Patrick Bours and Hafez Barghouthi. Continuous Authentication using Biometric Keystroke Dynamics. In Norsk Informasjonsssikkerhetskonferanse (NISK), pp 1-12, 2009
[49] Bendik Mjaaland, Patrick Bours and Danilo Gligoroski. Gait mimicking – attack resistance testing of gait authentication systems. In Norsk Informasjonsssikkerhetskonferanse (NISK), pp. 13-26, 2009
[50] Patrick Bours and Christoffer Fullu. A login system using mouse dynamics. In 5th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), pp. 1072-1077, 2009
[51] Jacobsen. A, Stene, S. and Yildirim, S. (2009) Possibilities for Learning in Game Artificial Intelligence, Proceedings of NAIS2009, November, Trondheim, Norway.9