A survey on computer vision based human analysis in the COVID-19 era

FI Eyiokur, A Kantarcı, ME Erakın, N Damer… - Image and Vision …, 2023 - Elsevier
The emergence of COVID-19 has had a global and profound impact, not only on society as a
whole, but also on the lives of individuals. Various prevention measures were introduced …

A comprehensive study on face recognition biases beyond demographics

P Terhörst, JN Kolf, M Huber… - … on Technology and …, 2021 - ieeexplore.ieee.org
Face recognition (FR) systems have a growing effect on critical decision-making processes.
Recent works have shown that FR solutions show strong performance differences based on …

The effect of wearing a mask on face recognition performance: an exploratory study

N Damer, JH Grebe, C Chen, F Boutros… - … Conference of the …, 2020 - ieeexplore.ieee.org
Face recognition has become essential in our daily lives as a convenient and contactless
method of accurate identity verification. Process such as identity verification at automatic …

Privacy-friendly synthetic data for the development of face morphing attack detectors

N Damer, CAF López, M Fang… - Proceedings of the …, 2022 - openaccess.thecvf.com
The main question this work aims at answering is:" can morphing attack detection (MAD)
solutions be successfully developed based on synthetic data?". Towards that, this work …

Morgan: Recognition vulnerability and attack detectability of face morphing attacks created by generative adversarial network

N Damer, AM Saladie, A Braun… - 2018 IEEE 9th …, 2018 - ieeexplore.ieee.org
Face morphing attacks aim at creating face images that are verifiable to be the face of
multiple identities, which can lead to building faulty identity links in operations like border …

Pw-mad: Pixel-wise supervision for generalized face morphing attack detection

N Damer, N Spiller, M Fang, F Boutros… - Advances in Visual …, 2021 - Springer
A face morphing attack image can be verified to multiple identities, making this attack a
major vulnerability to processes based on identity verification, such as border checks …

Extended evaluation of the effect of real and simulated masks on face recognition performance

N Damer, F Boutros, M Süßmilch, F Kirchbuchner… - Iet …, 2021 - Wiley Online Library
Face recognition is an essential technology in our daily lives as a contactless and
convenient method of accurate identity verification. Processes such as secure login to …

Beyond identity: What information is stored in biometric face templates?

P Terhörst, D Fährmann, N Damer… - … joint conference on …, 2020 - ieeexplore.ieee.org
Deeply-learned face representations enable the success of current face recognition
systems. Despite the ability of these representations to encode the identity of an individual …

Detecting face morphing attacks by analyzing the directed distances of facial landmarks shifts

N Damer, V Boller, Y Wainakh, F Boutros… - … , GCPR 2018, Stuttgart …, 2019 - Springer
Face morphing attacks create face images that are verifiable to multiple identities.
Associating such images to identity documents lead to building faulty identity links, causing …

Face quality estimation and its correlation to demographic and non-demographic bias in face recognition

P Terhörst, JN Kolf, N Damer… - … Joint Conference on …, 2020 - ieeexplore.ieee.org
Face quality assessment aims at estimating the utility of a face image for the purpose of
recognition. It is a key factor to achieve high face recognition performances. Currently, the …