Auflistung nach Autor:in "Buchmann, Nicolas"
1 - 5 von 5
Treffer pro Seite
Sortieroptionen
- Konferenzbeitrag"I Never Thought About Securing My Machine Learning Systems": A Study of Security and Privacy Awareness of Machine Learning Practitioners(Mensch und Computer 2021 - Tagungsband, 2021) Boenisch, Franziska; Battis, Verena; Buchmann, Nicolas; Poikela, MaijaMachine learning (ML) models have become increasingly important components of many software systems. Therefore, ensuring their privacy and security is a crucial task. Current research mainly focuses on the development of security and privacy methods. However, ML practitioners, as the individuals in charge of translating the theory into practical applications, have not yet received much attention. In this paper, the security and privacy awareness and practices of ML practitioners are studied through an online survey with the aim of (1) gaining insight into the current state of awareness, (2) identifying influencing factors, and (3) exploring the actual use of existing methods and tools. The results indicate a relatively low general privacy and security awareness among the ML practitioners surveyed. In addition, they are less familiar with ML privacy protection methods than with general security methods or ML-related ones. Moreover, awareness correlates with the years of working with ML but not with the level of academic education or the field of occupation. Finally, the practitioners in this study seem to experience uncertainties in implementing legal frameworks, such as the European General Data Protection Regulation, into their ML workflows.
- KonferenzbeitragOn the Application of Homomorphic Encryption to Face Identification(BIOSIG 2019 - Proceedings of the 18th International Conference of the Biometrics Special Interest Group, 2019) Drozdowski, Pawel; Buchmann, Nicolas; Rathgeb, Christian; Margraf, Marian; Busch, ChristophThe data security and privacy of enrolled subjects is a critical requirement expected from biometric systems. This paper addresses said topic in facial biometric identification. In order to fulfil the properties of unlinkability, irreversibility, and renewability of the templates required for biometric template protection schemes, homomorphic encryption is utilised. In addition to achieving the aforementioned objectives, the use of homomorphic encryption ensures that the biometric performance remains completely unaffected by the template protection scheme. The main contributions of this paper are: It proposes an architecture of a system capable of performing biometric identification in the encrypted domain, as well as provides and evaluates an implementation using two existing homomorphic encryption schemes. Furthermore, it discusses the pertinent technical considerations and challenges in this context.
- KonferenzbeitragA preliminary study on the feasibility of storing fingerprint and iris image data in 2D-barcodes(Biosig 2016, 2016) Buchmann, Nicolas; Rathgeb, Christian; Wagner, Johannes; Busch, Christoph; Baier, Harald
- KonferenzbeitragSecurity considerations on extending PACE to a biometric-based connection establishment(BIOSIG 2013, 2013) Buchmann, Nicolas; Peeters, Roel; Baier, Harald; Pashalidis, AndreasThe regulations of the European Union (EU) Council in 2004 are the basis of the deployment of electronic passports within the EU. Since then EU member states adopt the format and the access protocols to further electronic machine readable travel documents (eMRTD) like national electronic ID cards and electronic residence permits, respectively. The security protocols to communicate with an eMRTD are based on the paradigm of strong cohesion and loose coupling, i.e., each step is designed to ensure only a particular security goal like authorisation to access a certain data group, authenticity and integrity of the data, originality of the chip, or the linkage between the eMRTD and its holder. However, recently a discussion evolved to integrate the linkage security goal within the connection establishment, which currently only aims at limiting basic access of authorised terminals to the eMRTD. For instance, the BioPACE protocol proposes to replace the knowledge-based shared 'secret' of PACE by a biometric-based one. The goal of the paper at hand is twofold: First, we evaluate the BioPACE protocol and propose improvements to enhance its features. Second, we analyse the expediency of integrating our BioPACE version 2 into the eMRTD domain. Our initial evaluation shows that our BioPACE version 2 is expedient if the EAC protocols and the corresponding PKI are abandoned.
- KonferenzbeitragTouchless Fingerprint Sample Quality: Prerequisites for the Applicability of NFIQ2.0(BIOSIG 2020 - Proceedings of the 19th International Conference of the Biometrics Special Interest Group, 2020) Priesnitz, Jannis; Rathgeb, Christian; Buchmann, Nicolas; Busch, ChristophThe impact of fingerprint sample quality on biometric performance is undisputed. For touch-based fingerprint data, the effectiveness of the NFIQ2.0 quality estimation method is well documented in scientific literature. Due to the increasing use of touchless fingerprint recognition systems a thorough investigation of the usefulness of the NFIQ2.0 for touchless fingerprint data is of interest. In this work, we investigate whether NFIQ2.0 quality scores are predictive of error rates associated with the biometric performance of touchless fingerprint recognition. For this purpose, we propose a touchless fingerprint preprocessing that favours NFIQ2.0 quality estimation which has been designed for touch-based fingerprint data. Comparisons are made between NFIQ2.0 score distributions obtained from touch-based and touchless fingerprint data of the publicly available FVC06, MCYT, PolyU, and ISPFDv1 databases. Further, the predictive power regarding biometric performance is evaluated in terms of Error-versus-Reject Curves (ERCs) using an open source fingerprint recognition system. Under constrained capture conditions NFIQ2.0 is found to be an effective tool for touchless fingerprint quality estimation if an adequate preprocessing is applied.