default search action
Ulrich Scherhag
Person information
- affiliation: Darmstadt University of Applied Sciences, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [p1]Ulrich Scherhag, Christian Rathgeb, Christoph Busch:
Face Morphing Attack Detection Methods. Handbook of Digital Face Manipulation and Detection 2022: 331-349 - 2021
- [b1]Ulrich Scherhag:
Face Morphing and Morphing Attack Detection. Technical University of Darmstadt, Germany, 2021 - [j7]Kiran B. Raja, Matteo Ferrara, Annalisa Franco, Luuk J. Spreeuwers, Ilias Batskos, Florens de Wit, Marta Gomez-Barrero, Ulrich Scherhag, Daniel Fischer, Sushma Venkatesh, Jag Mohan Singh, Guoqiang Li, Loïc Bergeron, Sergey Isadskiy, Raghavendra Ramachandra, Christian Rathgeb, Dinusha Frings, Uwe Seidel, Fons Knopjes, Raymond N. J. Veldhuis, Davide Maltoni, Christoph Busch:
Morphing Attack Detection-Database, Evaluation Platform, and Benchmarking. IEEE Trans. Inf. Forensics Secur. 16: 4336-4351 (2021) - [c14]Siri Lorenz, Ulrich Scherhag, Christian Rathgeb, Christoph Busch:
Morphing Attack Detection: A Fusion Approach. FUSION 2021: 1-7 - 2020
- [j6]Johannes Merkle, Christian Rathgeb, Ulrich Scherhag, Christoph Busch:
Morphing-Angriffe. Datenschutz und Datensicherheit 44(1): 38-42 (2020) - [j5]Ulrich Scherhag, Jonas Kunze, Christian Rathgeb, Christoph Busch:
Face morph detection for unknown morphing algorithms and image sources: a multi-scale block local binary pattern fusion approach. IET Biom. 9(6): 278-289 (2020) - [j4]Ulrich Scherhag, Christian Rathgeb, Johannes Merkle, Christoph Busch:
Deep Face Representations for Differential Morphing Attack Detection. IEEE Trans. Inf. Forensics Secur. 15: 3625-3639 (2020) - [c13]Alexander Röttcher, Ulrich Scherhag, Christoph Busch:
Finding the Suitable Doppelgänger for a Face Morphing Attack. IJCB 2020: 1-7 - [i2]Ulrich Scherhag, Christian Rathgeb, Johannes Merkle, Christoph Busch:
Deep Face Representations for Differential Morphing Attack Detection. CoRR abs/2001.01202 (2020) - [i1]Kiran B. Raja, Matteo Ferrara, Annalisa Franco, Luuk J. Spreeuwers, Ilias Batskos, Florens de Wit, Marta Gomez-Barrero, Ulrich Scherhag, Daniel Fischer, Sushma Venkatesh, Jag Mohan Singh, Guoqiang Li, Loïc Bergeron, Sergey Isadskiy, Raghavendra Ramachandra, Christian Rathgeb, Dinusha Frings, Uwe Seidel, Fons Knopjes, Raymond N. J. Veldhuis, Davide Maltoni, Christoph Busch:
Morphing Attack Detection - Database, Evaluation Platform and Benchmarking. CoRR abs/2006.06458 (2020)
2010 – 2019
- 2019
- [j3]Ulrich Scherhag, Christian Rathgeb, Johannes Merkle, Ralph Breithaupt, Christoph Busch:
Face Recognition Systems Under Morphing Attacks: A Survey. IEEE Access 7: 23012-23026 (2019) - [j2]Ulrich Scherhag, Luca Debiasi, Christian Rathgeb, Christoph Busch, Andreas Uhl:
Detection of Face Morphing Attacks Based on PRNU Analysis. IEEE Trans. Biom. Behav. Identity Sci. 1(4): 302-317 (2019) - [c12]Luca Debiasi, Naser Damer, Alexandra Mosegui Saladie, Christian Rathgeb, Ulrich Scherhag, Christoph Busch, Florian Kirchbuchner, Andreas Uhl:
On the Detection of GAN-Based Face Morphs Using Established Morph Detectors. ICIAP (2) 2019: 345-356 - 2018
- [j1]Marta Gomez-Barrero, Christian Rathgeb, Ulrich Scherhag, Christoph Busch:
Predicting the vulnerability of biometric systems to attacks based on morphed biometric information. IET Biom. 7(4): 333-341 (2018) - [c11]Luca Debiasi, Christian Rathgeb, Ulrich Scherhag, Andreas Uhl, Christoph Busch:
PRNU Variance Analysis for Morphed Face Image Detection. BTAS 2018: 1-9 - [c10]Ulrich Scherhag, Christian Rathgeb, Christoph Busch:
Towards Detection of Morphed Face Images in Electronic Travel Documents. DAS 2018: 187-192 - [c9]Ulrich Scherhag, Christian Rathgeb, Christoph Busch:
Morph Deterction from Single Face Image: a Multi-Algorithm Fusion Approach. ICBEA 2018: 6-12 - [c8]Ulrich Scherhag, Dhanesh Budhrani, Marta Gomez-Barrero, Christoph Busch:
Detecting Morphed Face Images Using Facial Landmarks. ICISP 2018: 444-452 - [c7]Luca Debiasi, Ulrich Scherhag, Christian Rathgeb, Andreas Uhl, Christoph Busch:
PRNU-based detection of morphed face images. IWBF 2018: 1-7 - [c6]Ulrich Scherhag, Christian Rathgeb, Christoph Busch:
Performance variation of morphed face image detection algorithms across different datasets. IWBF 2018: 1-6 - 2017
- [c5]Ulrich Scherhag, Andreas Nautsch, Christian Rathgeb, Marta Gomez-Barrero, Raymond N. J. Veldhuis, Luuk J. Spreeuwers, Maikel Schils, Davide Maltoni, Patrick Grother, Sébastien Marcel, Ralph Breithaupt, Ramachandra Raghavendra, Christoph Busch:
Biometric Systems under Morphing Attacks: Assessment of Morphing Techniques and Vulnerability Reporting. BIOSIG 2017: 149-159 - [c4]Marta Gomez-Barrero, Christian Rathgeb, Ulrich Scherhag, Christoph Busch:
Is your biometric system robust to morphing attacks? IWBF 2017: 1-6 - [c3]Ulrich Scherhag, Ramachandra Raghavendra, Kiran B. Raja, Marta Gomez-Barrero, Christian Rathgeb, Christoph Busch:
On the vulnerability of face recognition systems towards morphed face attacks. IWBF 2017: 1-6 - 2016
- [c2]Ulrich Scherhag, Andreas Nautsch, Christian Rathgeb, Christoph Busch:
Unit-Selection Attack Detection Based on Unfiltered Frequency-Domain Features. INTERSPEECH 2016: 2209-2213 - 2015
- [c1]Anika Pflug, Christian Rathgeb, Ulrich Scherhag, Christoph Busch:
Binarization of spectral histogram models: An application to efficient biometric identification. CYBCONF 2015: 501-506
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint