
Marta Gomez-BarreroHochschule Ansbach
Marta Gomez-Barrero
PhD on Electrical Engineering
About
109
Publications
29,299
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,374
Citations
Citations since 2017
Introduction
I am a Professor for IT-Security and technical data privacy at the Hochschule Ansbach, in Germany.I am a member of the European Association for Biometrics (EAB) and Co-Chair of the EAB Academia Special Interest Group. I am also General Chair of the BIOSIG Conference. My current research focuses on security and privacy evaluations of biometric systems, Presentation Attack Detection (PAD) methodologies, and biometric template protection (BTP) schemes.
Additional affiliations
June 2016 - present
January 2016 - March 2016
May 2015 - July 2015
Education
October 2012 - June 2016
September 2011 - July 2013
September 2006 - June 2011
Publications
Publications (109)
Automated fingerprint recognition systems, while widely used, are still vulnerable to presentation attacks (PAs). The attacks can employ a wide range of presentation attack species (i.e., artifacts), varying from low-cost artifacts to sophisticated materials. A number of presentation attack detection (PAD) approaches have been specifically designed...
Biometric systems have experienced a large development over the last years since they are accurate, secure and in many cases, more user convenient than traditional credential-based access control systems. In spite of their benefits, biometric systems are vulnerable to attack presentations, which can be easily carried out by a non-authorised subject...
Iris recognition technology has attracted an increasing interest in the last decades in which we have witnessed a migration from research laboratories to real-world applications. The deployment of this technology raises questions about the main vulnerabilities and security threats related to these systems. Among these threats, presentation attacks...
Since early 2020, the COVID-19 pandemic has had a considerable impact on many aspects of daily life. A range of different measures have been implemented worldwide to reduce the rate of new infections and to manage the pressure on national health services. A primary strategy has been to reduce gatherings and the potential for transmission through th...
Recently, biometric systems (BSs) have experienced a broad development mainly due to the great success of deep learning approaches. Generally, most BS provide high security and efficiency. However, they are still vulnerable to attack presentations (APs). To overcome such security issues, these schemes include a Presentation Attack Detection (PAD) m...
This article presents SVC-onGoing¹, an on-going competition for on-line signature verification where researchers can easily benchmark their systems against the state of the art in an open common platform using large-scale public databases, such as DeepSignDB² and SVC2021_EvalDB³, and standard experimental protocols. SVC-onGoing is based on the ICDA...
Abstract The intention of this position paper is to comment on the joint European Data Protection Supervisor (EDPS)‐Agencia Española de Protección de Datos (aepd) publication ‘14 Misunderstandings with regard to Biometric Identification and Authentication’ that was published in June 2020 and to provide additional input to help with the better under...
Selfie-based biometrics has great potential for a wide range of applications since, e.g. periocular verification is contactless and is safe to use in pandemics such as COVID-19, when a major portion of a face is covered by a facial mask. Despite its advantages, selfie-based biometrics presents challenges since there is limited control over data acq...
Due to their convenience and high accuracy, face recognition systems are widely employed in governmental and personal security applications to automatically recognise individuals. Despite recent advances, face recognition systems have shown to be particularly vulnerable to identity attacks (i.e., digital manipulations and attack presentations). Ide...
Iris recognition technology has attracted an increasing interest in the last decades in which we have witnessed a migration from research laboratories to real world applications. The deployment of this technology raises questions about the main vulnerabilities and security threats related to these systems. Among these threats presentation attacks s...
Biometrics has nowadays become a preferred solution for systems requiring secure authentication. However, the usage of biometric characteristics raises significant concerns regarding personal data protection and privacy. Several template protection schemes have been therefore proposed to conceal the employed identifiers, while still ensuring the ab...
Due to their convenience and high accuracy, face recognition systems are widely employed in governmental and personal security applications to automatically recognise individuals. Despite recent advances, face recognition systems have shown to be particularly vulnerable to identity attacks (i.e., digital manipulations and attack presentations). Ide...
This paper describes the experimental framework and results of the ICDAR 2021 Competition on On-Line Signature Verification (SVC 2021). The goal of SVC 2021 is to evaluate the limits of on-line signature verification systems on popular scenarios (office/mobile) and writing inputs (stylus/finger) through large-scale public databases. Three different...
This paper describes the experimental framework and results of the ICDAR 2021 Competition on On-Line Signature Verification (SVC 2021). The goal of SVC 2021 is to evaluate the limits of on-line signature verification systems on popular scenarios (office/mobile) and writing inputs (stylus/finger) through large-scale public databases. Three different...
In past decades, the broad development experienced by biometric systems has unveiled several threats that may decrease their trustworthiness. These are attack presentations that can be easily carried out by a non-authorised subject to gain access to the biometric system. To mitigate those security concerns, most face presentation attack detection t...
Within the last few decades, the need for subject authentication has grown steadily, and biometric recognition technology has been established as a reliable alternative to passwords and tokens, offering automatic decisions. However, as unsupervised processes, biometric systems are vulnerable to presentation attacks targeting the capture devices, wh...
This article presents SVC-onGoing, an on-going competition for on-line signature verification where researchers can easily benchmark their systems against the state of the art in an open common platform using large-scale public databases, such as DeepSignDB and SVC2021_EvalDB, and standard experimental protocols. SVC-onGoing is based on the ICDAR 2...
In spite of the advantages of using fingerprints for subject authentication, several works have shown that fingerprint recognition systems can be easily circumvented by means of artificial fingerprints or Presentation Attack Instruments (PAIs). In order to address that threat, the existing Presentation Attack Detection (PAD) methods have reported a...
Abstract Nowadays, fingerprint‐based biometric recognition systems are becoming increasingly popular. However, in spite of their numerous advantages, biometric capture devices are usually exposed to the public and thus vulnerable to presentation attacks (PAs). Therefore, presentation attack detection (PAD) methods are of utmost importance in order...
This paper describes the experimental framework and results of the ICDAR 2021 Competition on On-Line Signature Verification (SVC 2021). The goal of SVC 2021 is to evaluate the limits of on-line signature verification systems on popular scenarios (office/mobile) and writing inputs (stylus/finger) through large-scale public databases. Three different...
In the last decades, the broad development experienced by biometric systems has unveiled several threats which may decrease their trustworthiness. Those are attack presentations which can be easily carried out by a non-authorised subject to gain access to the biometric system. In order to mitigate those security concerns, most face Presentation Att...
Since early 2020 the COVID-19 pandemic has had a considerable impact on many aspects of daily life. A range of different measures have been implemented worldwide to reduce the rate of new infections and to manage the pressure on national health services. A primary strategy has been to reduce gatherings and the potential for transmission through the...
Selfie-based biometrics has great potential for a wide range of applications from marketing to higher security environments like online banking. This is now especially relevant since e.g. periocular verification is contactless, and thereby safe to use in pandemics such as COVID-19. However, selfie-based biometrics faces some challenges since there...
In recent years, the popularity of fingerprint-based biometric authentication systems significantly increased. However, together with many advantages, biometric systems are still vulnerable to presentation attacks (PAs). In particular, this applies for unsupervised applications, where new attacks unknown to the system operator may occur. Therefore,...
Fingerprint-based biometric systems have experienced a large development in the past. In spite of many advantages, they are still vulnerable to attack presentations (APs). Therefore, the task of determining whether a sample stems from a live subject (i.e., bona fide) or from an artificial replica is a mandatory requirement which has recently receiv...
Facial recognition systems have considerably evolved in recent years and have been deployed in a number of real-world applications requiring high security: bank account access, smartphone unlock, and border control, among others. In spite of their advantages, those biometric systems are still vulnerable to attack presentations which can be easily l...
Morphing attacks have posed a severe threat to Face Recognition System (FRS). Despite the number of advancements reported in recent works, we note serious open issues such as independent benchmarking, generalizability challenges and considerations to age, gender, ethnicity that are inadequately addressed. Morphing Attack Detection (MAD) algorithms...
Nowadays, fingerprint-based biometric recognition systems are becoming increasingly popular. However, in spite of their numerous advantages, biometric capture devices are usually exposed to the public and thus vulnerable to presentation attacks (PAs). Therefore, presentation attack detection (PAD) methods are of utmost importance in order to distin...
Biometric systems are nowadays employed across a broad range of applications. They provide high security and efficiency and, in many cases, are user friendly. Despite these and other advantages, biometric systems in general and Automatic speaker verification (ASV) systems in particular can be vulnerable to attack presentations. The most recent ASVS...
In recent years, the popularity of fingerprint-based biometric authentication systems has significantly increased. However, together with many advantages, biometric systems are still vulnerable to presentation attacks (PAs). In particular, this applies for unsupervised applications, where new attacks unknown to the system operator may occur. Theref...
Zusammenfassung
Ein erhöhter Bedarf an Personenauthentifizierung führte in den letzten Jahren zu einem breiten Einsatz biometrischer Erkennungssysteme. Mit vermehrtem Einsatz insbesondere von unbeaufsichtigten biometrischen Systemen kamen jedoch verstärkt Sicherheitsbedenken auf. Darunter stellen Präsentationsangriffe (PAs, d.h. Versuche, sich mit...
With the widespread use of biometric recognition, several issues related to the privacy and security provided by this technology have been recently raised and analysed. As a result, the early common belief among the biometrics community of templates irreversibility has been proven wrong. It is now an accepted fact that it is possible to reconstruct...
Speech recordings are a rich source of personal, sensitive data that can be used to support a plethora of diverse applications,from health profiling to
biometric recognition. It is therefore essential that speech recordings are adequately protected so that they cannot be misused. Such protection, in the
form of privacy-preserving technologies, is...
Fingerprint-based biometric systems have experienced a large development in the last years. Despite their many advantages, they are still vulnerable to presentation attacks (PAs). Therefore, the task of determining whether a sample stems from a live subject (i.e., bona fide) or from an artificial replica is a mandatory issue which has received a lo...
The increased need for unattended authentication in multiple scenarios has motivated a wide deployment of biometric systems in the last few years. This has in turn led to the disclosure of security concerns specifically related to biometric systems. Among them, presentation attacks (PAs, i.e., attempts to log into the system with a fake biometric c...
Presentation Attack Detection (PAD) is the task of determining whether a sample stems from a live subject (bona fide presentation) or from an artificial replica (Presentation Attack Instrument, PAI). Several PAD approaches have shown high effectiveness to successfully identify PAIs when the materials used for the fabrication of these PAIs are known...
Iris recognition technology has attracted an increasing interest since more than two decades in which we have witnessed a migration from laboratories to real world applications. The deployment of this technology in real applications raises questions about the main vulnerabilities and security threats related to these systems. Presentation attacks c...
The increased need for unattended authentication in multiple scenarios has motivated a wide deployment of biometric systems in the last few years. This has in turn led to the disclosure of security concerns specifically related to biometric systems. Among them, Presentation Attacks (PAs, i.e., attempts to log into the system with a fake biometric c...
Fingerprint-based biometric systems have shown reliability in terms of accuracy in both biometric and forensic scenarios. Although fingerprint systems are easy to use, they are susceptible to presentation attacks that can be carried out by employing lifted or latent fingerprints. This work presents a systematic study of the fingerprint presentation...
Iris recognition technology has attracted an increasing interest since more than two decades in which we have witnessed a migration from laboratories to real world applications. The deployment of this technology in real applications raises questions about the main vulnerabilities and security threats related to these systems. Presentation attacks c...
Iris recognition technology has attracted an increasing interest since more than two decades in which we have witnessed a migration from laboratories to real-world applications. The deployment of this technology in real applications raises questions about the main vulnerabilities and security threats related to these systems. Presentation attacks c...
This chapter presents an exhaustive summary of techniques dedicated for presentation attack detection on fingerprint recognition systems leveraging the texture based approaches. Further, we present a
comparison using deep learning based technique against the list of comprehensive techniques. To benchmark the techniques against a common baseline, we...
Iris segmentation under visible wavelengths (VWs) is a vital processing step for iris recognition systems operating at-a-distance or in non-cooperative environments. In these scenarios the presence of various artefacts, e.g. occlusions or specular reflections, as well as out-of-focus blur represents a significant challenge. The vast majority of pro...
With the increased deployment of biometric authentication systems, some security concerns have also arisen. In particular, presentation attacks directed to the capture device pose a severe threat. In order to prevent them, liveness features such as the blood flow can be utilised to develop presentation attack detection (PAD) mechanisms. In this con...
Biometric recognition offers many advantages over traditional authentication methods, but they are also vulnerable to, for instance, presentation attacks. These refer to the presentation of artifacts, such as facial pictures or gummy fingers, to the biometric capture device, with the aim of impersonating another person or to avoid being recognised....
With the widespread deployment of automatic biometric recognition systems, some security issues have been unveiled. In particular, face recognition systems have been recently shown to be vulnerable to attacks carried out with morphed face images. Such synthetic images can be defined as the fusion of the face images of two (or more) different subjec...
Data privacy is crucial when dealing with biometric data. Accounting for the latest European data privacy regulation and payment service directive, biometric template protection is essential for any commercial application. Ensuring unlinkability across biometric service operators, irreversibility of leaked encrypted templates, and renewability of e...
The wide deployment of biometric recognition systems in the last two decades has raised privacy concerns regarding the storage and use of biometric data. As a consequence, the ISO/IEC 24745 international standard on biometric information protection has established two main requirements for protecting biometric templates: irreversibility and unlinka...
In recent years, we have seen huge growth of biometric systems incorporated in devices such as smartphones and security is one of the major concerns. In this work a multi-biometric template protected system is proposed, based on Bloom filers and binarized statistical image features (BSIF). Features are extracted from face and both periocular region...
Fingerprint-based biometric systems are not entirely secure
due to their vulnerability to presentation attacks. In this paper, we pro-
pose a new presentation attack method based on a Bag-of-Words ap-
proach, which by combining local and global information of fingerprint
can correctly identify bona fine presentations from presentation attacks.
The...
Biometric verification systems are currently being deployed in numerous large-scale and everyday applications. It is hence of the utmost importance to protect the privacy of the enrolled subjects. Biometric template protection schemes are designed to protect biometric reference data in an irreversible and unlinkable manner, while maintaining key sy...