Christophe Rosenberger

Orcid: 0000-0002-2042-9029

According to our database1, Christophe Rosenberger authored at least 169 papers between 1998 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Digital fingerprint indexing using synthetic binary indexes.
Pattern Anal. Appl., June, 2024

Robust biometric scheme against replay attacks using one-time biometric templates.
Comput. Secur., February, 2024

2023
File type identification tools for digital investigations.
Forensic Sci. Int. Digit. Investig., September, 2023

Deep features fusion for user authentication based on human activity.
IET Biom., July, 2023

Capture Biases in Fingerprint Systems.
Proceedings of the International Conference on Cyberworlds, 2023

A Comparative Study of Tools for Explicit Content Detection in Images.
Proceedings of the International Conference on Cyberworlds, 2023

Towards an Open-source Digital Investigation Platform.
Proceedings of the International Conference on Cyberworlds, 2023

2022
Digitally Synthetized Fingerprint Spoofs: A Threat For Anti-Spoofing Systems?
Proceedings of the International Conference on Cyberworlds, 2022

Keystroke Dynamics based User Authentication using Deep Learning Neural Networks.
Proceedings of the International Conference on Cyberworlds, 2022

2021
Classifying Biometric Systems Users among the Doddington Zoo: Application to Keystroke Dynamics.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

Privacy Aura for Transparent Authentication on Multiple Smart Devices.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

Impact Of Environmental Conditions On Fingerprint Systems Performance.
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021

How Artificial Intelligence can be used for Behavioral Identification?
Proceedings of the International Conference on Cyberworlds, 2021

Keystroke Dynamics Classification Based On LSTM and BLSTM Models.
Proceedings of the International Conference on Cyberworlds, 2021

Face Transparent User Authentication Respecting Privacy.
Proceedings of the International Conference on Cyberworlds, 2021

2020
Logical Attacks and Countermeasures for Fingerprint On-Card-Comparison Systems.
Sensors, 2020

Fusion of Digital Fingerprint Quality Assessment Metrics.
Proceedings of the Twelfth International Conference on Quality of Multimedia Experience, 2020

Identity Verification and Fraud Detection During Online Exams with a Privacy Compliant Biometric System.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

Splitting Wolves Category in Doddington Zoo: Impacts on Keystroke Dynamics.
Proceedings of the International Conference on Cyberworlds, 2020

When my Behavior Enhances my Smartphone Security.
Proceedings of the International Conference on Cyberworlds, 2020

2019
Statistical modeling of keystroke dynamics samples for the generation of synthetic datasets.
Future Gener. Comput. Syst., 2019

Analysis of Doddington zoo classification for user dependent template update: Application to keystroke dynamics recognition.
Future Gener. Comput. Syst., 2019

GREYC-Hashing: Combining biometrics and secret for enhancing the security of protected templates.
Future Gener. Comput. Syst., 2019

Adaptive Biometric Systems: Review and Perspectives.
ACM Comput. Surv., 2019

Double serial adaptation mechanism for keystroke dynamics authentication based on a single password.
Comput. Secur., 2019

Keystroke Dynamics Anonymization System.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019

My Behavior is my Privacy & Secure Password !
Proceedings of the 2019 International Conference on Cyberworlds, 2019

Vulnerability of Adaptive Strategies of Keystroke Dynamics Based Authentication Against Different Attack Types.
Proceedings of the 2019 International Conference on Cyberworlds, 2019

Comparative Study of Fingerprint Database Indexing Methods.
Proceedings of the 2019 International Conference on Cyberworlds, 2019

2018
A comparative study of card-not-present e-commerce architectures with card schemes: What about privacy?
J. Inf. Secur. Appl., 2018

Adaptive Biometric Strategy using Doddington Zoo Classification of User's Keystroke Dynamics.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018

Towards an Optimal Template Reduction for Securing Embedded Fingerprint Devices.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

Evaluation of Biometric Template Protection Schemes based on a Transformation.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

Privacy Compliant Multi-biometric Authentication on Smartphones.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

Towards a Personal Identity Code Respecting Privacy.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

Comparative Study of Digital Fingerprint Quality Assessment Metrics.
Proceedings of the 2018 International Conference on Biometrics, 2018

Analysis of Keystroke Dynamics for the Generation of Synthetic Datasets.
Proceedings of the 2018 International Conference on Cyberworlds, 2018

User Dependent Template Update for Keystroke Dynamics Recognition.
Proceedings of the 2018 International Conference on Cyberworlds, 2018

Enhancing the Security of Transformation Based Biometric Template Protection Schemes.
Proceedings of the 2018 International Conference on Cyberworlds, 2018

Rhu Keystroke Touchscreen Benchmark.
Proceedings of the 2018 International Conference on Cyberworlds, 2018

2017
Retrieving dates in smart card dumps is as hard as finding a needle in a haystack.
Proceedings of the 2017 IEEE Workshop on Information Forensics and Security, 2017

Fingerprint Class Recognition for Securing EMV Transaction.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

Privacy Preserving Transparent Mobile Authentication.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

Contrasting False Identities in Social Networks by Trust Chains and Biometric Reinforcement.
Proceedings of the 2017 International Conference on Cyberworlds, 2017

Memory carving can finally unveil your embedded personal data.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Comparative study on texture features for fingerprint recognition: application to the BioHashing template protection scheme.
J. Electronic Imaging, 2016

Literature review of fingerprint quality assessment and its evaluation.
IET Biom., 2016

An Observe-and-Detect Methodology for the Security and Functional Testing of Smart Card Applications.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

A Continuous LoA Compliant Trust Evaluation Method.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

In What Way Is It Possible to Impersonate You Bypassing Fingerprint Sensors?
Proceedings of the 2016 International Conference of the Biometrics Special Interest Group, 2016

Keystroke template update with adapted thresholds.
Proceedings of the 2nd International Conference on Advanced Technologies for Signal and Image Processing, 2016

Memory Carving in Embedded Devices: Separate the Wheat from the Chaff.
Proceedings of the Applied Cryptography and Network Security, 2016

Synchronous One Time Biometrics with Pattern Based Authentication.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
Evaluation metric of an image understanding result.
J. Electronic Imaging, 2015

Quality assessment of image-based biometric information.
EURASIP J. Image Video Process., 2015

Image Watermaking With Biometric Data For Copyright Protection.
CoRR, 2015

A review on the public benchmark databases for static keystroke dynamics.
Comput. Secur., 2015

Comparative study of minutiae selection algorithms for ISO fingerprint templates.
Proceedings of the Media Watermarking, 2015

Vulnerabilities of fuzzy vault schemes using biometric data with traces.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015

Blind minutiae selection for standard minutiae templates.
Proceedings of the IEEE International Conference on Identity, 2015

Keystroke dynamics performance enhancement with soft biometrics.
Proceedings of the IEEE International Conference on Identity, 2015

Fingerprint Quality Assessment Combining Blind Image Quality, Texture and Minutiae Features.
Proceedings of the ICISSP 2015, 2015

Quality Assessment of Fingerprints with Minutiae Delaunay Triangulation.
Proceedings of the ICISSP 2015, 2015

EvaBio a New Modular Platform to Evaluate Biometric System.
Proceedings of the Information Systems Security and Privacy, 2015

EvaBio Platform for the Evaluation Biometric System - Application to the Optimization of the Enrollment Process for Fingerprints Devices.
Proceedings of the ICISSP 2015, 2015

Fingerprint Quality Assessment with Multiple Segmentation.
Proceedings of the International Conference on Cyberworlds, 2015

Generation of Local and Expected Behaviors of a Smart Card Application to Detect Software Anomaly.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

Image Watermarking with Biometric Data for Copyright Protection.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
Soft biometrics for keystroke dynamics: Profiling individuals while typing passwords.
Comput. Secur., 2014

Analysis of embedded applications by evolutionary fuzzing.
Proceedings of the International Conference on High Performance Computing & Simulation, 2014

One-Time Biometrics for Online Banking and Electronic Payment Authentication.
Proceedings of the Availability, Reliability, and Security in Information Systems, 2014

2013
Parametrization of an image understanding quality metric with a subjective evaluation.
Pattern Recognit. Lett., 2013

Operational bio-hash to preserve privacy of fingerprint minutiae templates.
IET Biom., 2013

Fast computation of the performance evaluation of biometric systems: Application to multibiometrics.
Future Gener. Comput. Syst., 2013

An integrated framework combining Bio-Hashed minutiae template and PKCS15 compliant card for a better secure management of fingerprint cancelable templates.
Comput. Secur., 2013

An e-payment Architecture Ensuring a High Level of Privacy Protection.
Proceedings of the Security and Privacy in Communication Networks, 2013

Preimage Attack on BioHashing.
Proceedings of the SECRYPT 2013, 2013

A contactless e-health information system with privacy.
Proceedings of the 2013 9th International Wireless Communications and Mobile Computing Conference, 2013

Soft Biometrics for Keystroke Dynamics.
Proceedings of the Image Analysis and Recognition - 10th International Conference, 2013

A Privacy Preserving E-Payment Architecture.
Proceedings of the Financial Cryptography and Data Security, 2013

Fingerprint quality assessment using a no-reference image quality metric.
Proceedings of the 21st European Signal Processing Conference, 2013

A New Protocol to Evaluate the Resistance of Template Update Systems against Zero-Effort Attacks.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2013

Soft Biometrics Database: a Benchmark for Keystroke Dynamics Biometric Systems.
Proceedings of the 2013 BIOSIG, 2013

2012
Évaluation d'un résultat d'interprétation d'images.
Proceedings of the Mesurer et évaluer la Qualité des Données et des Connaissances, 2012

Évaluation de la qualité de données biométriques.
Proceedings of the Mesurer et évaluer la Qualité des Données et des Connaissances, 2012

A new soft biometric approach for keystroke dynamics based on gender recognition.
Int. J. Inf. Technol. Manag., 2012

Enhancing the privacy of electronic passports.
Int. J. Inf. Technol. Manag., 2012

Evaluation of biometric systems: a study of users' acceptance and satisfaction.
Int. J. Biom., 2012

Genetic programming for multibiometrics.
Expert Syst. Appl., 2012

Performance Evaluation of Biometric Template Update
CoRR, 2012

Fast computation of the performance evaluation of biometric systems: application to multibiometric
CoRR, 2012

Service provider authentication assurance.
Proceedings of the Tenth Annual International Conference on Privacy, Security and Trust, 2012

Can Chronological Information be Used as a Soft Biometric in Keystroke Dynamics?
Proceedings of the Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2012

Web-Based Benchmark for Keystroke Dynamics Biometric Systems: A Statistical Analysis.
Proceedings of the Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2012

Security EvaBio: An analysis tool for the security evaluation of biometric authentication systems.
Proceedings of the 5th IAPR International Conference on Biometrics, 2012

Texture based fingerprint BioHashing: Attacks and robustness.
Proceedings of the 5th IAPR International Conference on Biometrics, 2012

Hybrid template update system for unimodal biometric systems.
Proceedings of the IEEE Fifth International Conference on Biometrics: Theory, 2012

Analysis of the acquisition process for keystroke dynamics.
Proceedings of the 2012 BIOSIG, 2012

Challenge-based speaker recognition for mobile authentication.
Proceedings of the 2012 BIOSIG, 2012

2011
Unconstrained keystroke dynamics authentication with shared secret.
Comput. Secur., 2011

Toward a distributed benchmarking tool for biometrics.
Proceedings of the 2011 International Conference on High Performance Computing & Simulation, 2011

Analysis of template update strategies for keystroke dynamics.
Proceedings of the 2011 IEEE Workshop on Computational Intelligence in Biometrics and Identity Management, 2011

A SVM-based model for the evaluation of biometric sample quality.
Proceedings of the 2011 IEEE Workshop on Computational Intelligence in Biometrics and Identity Management, 2011

2010
A Low-Cost and Secure Solution for e-Commerce.
Proceedings of the Emergent Web Intelligence: Advanced Information Retrieval, 2010

Comparative study of localization metrics for the evaluation of image interpretation systems.
J. Electronic Imaging, 2010

Comparative study of background subtraction algorithms.
J. Electronic Imaging, 2010

Vision-Based System for Human Detection and Tracking in Indoor Environment.
Int. J. Soc. Robotics, 2010

Fast learning for multibiometrics systems using genetic algorithms.
Proceedings of the 2010 International Conference on High Performance Computing & Simulation, 2010

Study on Color Spaces for Single Image Enrolment Face Authentication.
Proceedings of the 20th International Conference on Pattern Recognition, 2010

Low Cost and Usable Multimodal Biometric System Based on Keystroke Dynamics and 2D Face Recognition.
Proceedings of the 20th International Conference on Pattern Recognition, 2010

Biohashing for Securing Minutiae Template.
Proceedings of the 20th International Conference on Pattern Recognition, 2010

Human Detection with a Multi-sensors Stereovision System.
Proceedings of the Image and Signal Processing, 4th International Conference, 2010

Subjective evaluation of image understanding results.
Proceedings of the 18th European Signal Processing Conference, 2010

Evaluation of Human Detection Algorithms in Image Sequences.
Proceedings of the Advanced Concepts for Intelligent Vision Systems, 2010

2009
Emerging trends in biometric authentication.
Proceedings of the 2009 International Conference on High Performance Computing & Simulation, 2009

Evaluation metric for image understanding.
Proceedings of the International Conference on Image Processing, 2009

Comparative Study of Local Descriptors for Measuring Object Taxonomy.
Proceedings of the Fifth International Conference on Image and Graphics, 2009

A General Framework for a Robust Human Detection in Images Sequences.
Proceedings of the Fifth International Conference on Image and Graphics, 2009

Palm Vein Verification System Based on SIFT Matching.
Proceedings of the Advances in Biometrics, Third International Conference, 2009

A minutiae level fusion for AFIS systems.
Proceedings of the 17th European Signal Processing Conference, 2009

Abnormal events detection based on spatio-temporal co-occurences.
Proceedings of the 2009 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2009), 2009

Keystroke dynamics authentication for collaborative systems.
Proceedings of the 2009 International Symposium on Collaborative Technologies and Systems, 2009

A Study on the Convergence of FingerHashing and a Secured Biometric System.
Proceedings of the 2nd Conférence Internationale sur l'Informatique et ses Applications (CIIA'09), 2009

2008
Automation of the Volumetric Models Construction.
Proceedings of the Heterogeneous Objects Modelling and Applications, 2008

Comparative study of global invariant descriptors for object recognition.
J. Electronic Imaging, 2008

Optimization-Based Image Segmentation by Genetic Algorithms.
EURASIP J. Image Video Process., 2008

Comparative Study of Contour Detection Evaluation Criteria Based on Dissimilarity Measures.
EURASIP J. Image Video Process., 2008

Similarity-based matching for face authentication.
Proceedings of the 19th International Conference on Pattern Recognition (ICPR 2008), 2008

Review and evaluation of commonly-implemented background subtraction algorithms.
Proceedings of the 19th International Conference on Pattern Recognition (ICPR 2008), 2008

Evaluation Protocol for Localization Metrics.
Proceedings of the Image and Signal Processing - 3rd International Conference, 2008

A Real Time Human Detection System Based on Far Infrared Vision.
Proceedings of the Image and Signal Processing - 3rd International Conference, 2008

Secure payment with NFC mobile phone in the SmartTouch project.
Proceedings of the 2008 International Symposium on Collaborative Technologies and Systems, 2008

An e-banking platform for collaborative work between education, industry and research.
Proceedings of the 2008 International Symposium on Collaborative Technologies and Systems, 2008

Face Authentication for Banking.
Proceedings of the First International Conference on Advances in Computer-Human Interaction, 2008

2007
Segmentation Framework Based on Label Field Fusion.
IEEE Trans. Image Process., 2007

Comparative study of texture feature for rotation invariant RECOGNITION.
Proceedings of the 15th European Signal Processing Conference, 2007

A New Supervised Evaluation Criterion for Region Based Segmentation Methods.
Proceedings of the Advanced Concepts for Intelligent Vision Systems, 2007

2006
Towards a New Tool for the Evaluation of the Quality of Ultrasound Compressed Images.
IEEE Trans. Medical Imaging, 2006

Unsupervised Performance Evaluation of Image Segmentation.
EURASIP J. Adv. Signal Process., 2006

A support vector machine as an estimator of mountain papaya ripeness using resonant frequency or frequency centroid.
Proceedings of the Artificial Intelligence in Theory and Practice, 2006

Adaptative evaluation of image segmentation results.
Proceedings of the 18th International Conference on Pattern Recognition (ICPR 2006), 2006

Supervised evaluation of synthetic and real contour segmentation results.
Proceedings of the 14th European Signal Processing Conference, 2006

Multi-Agent Based Prototyping of Agriculture Robots.
Proceedings of the 2006 International Symposium on Collaborative Technologies and Systems, 2006

Detecting Half-Occlusion with a Fast Region-Based Fusion Procedure.
Proceedings of the British Machine Vision Conference 2006, 2006

Contribution à l'évaluation d'algorithmes de traitement d'images. (Contribution to the evaluation of image processing algorithms).
, 2006

2005
A tele-operated mobile ultrasound scanner using a light-weight robot.
IEEE Trans. Inf. Technol. Biomed., 2005

2D color shape recognition using Zernike moments.
Proceedings of the 2005 International Conference on Image Processing, 2005

Evaluation of the Quality of Ultrasound Image Compression by Fusion of Criteria with a Genetic Algorithm.
Proceedings of the Pattern Recognition and Image Analysis, 2005

Segmentation Evaluation Using a Support Vector Machine.
Proceedings of the Pattern Recognition and Data Mining, 2005

Texture Detection for Image Analysis.
Proceedings of the Pattern Recognition and Image Analysis, 2005

Evaluation of the quality of ultrasound image compression by fusion of criteria with a support vector machine.
Proceedings of the 13th European Signal Processing Conference, 2005

Segmentation evaluation by fusion with a genetic algorithm.
Proceedings of the 13th European Signal Processing Conference, 2005

Evolutionary Computation Approaches for Shape Modelling and Fitting.
Proceedings of the Progress in Artificial Intelligence, 2005

Distributed and Scalable Vision System for Quality Control of Cherries.
Proceedings of the ISCA 18th International Conference on Computer Applications in Industry and Engineering, 2005

Object Recognition Using Local Characterisation and Zernike Moments.
Proceedings of the Advanced Concepts for Intelligent Vision Systems, 2005

2004
Calibration and quality control of cherries by artificial vision.
J. Electronic Imaging, 2004

3D Shape Reconstruction of Template Models Using Genetic Algorithms.
Proceedings of the 17th International Conference on Pattern Recognition, 2004

Unsupervised Evaluation of Image Segmentation Application to Multi-spectral Images.
Proceedings of the 17th International Conference on Pattern Recognition, 2004

Generic target recognition.
Proceedings of the 2004 12th European Signal Processing Conference, 2004

Evaluating the segmentation result of a gray-level image.
Proceedings of the 2004 12th European Signal Processing Conference, 2004

A comparative study of supervised evaluation criteria for image segmentation.
Proceedings of the 2004 12th European Signal Processing Conference, 2004

2003
Toward a complete adaptive analysis of an image.
J. Electronic Imaging, 2003

2002
Application of telerobotic computer vision system in manufacturing control process.
Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, Yasmine Hammamet, Tunisia, October 6-9, 2002, 2002

2000
Unsupervised Clustering Method with Optimal Estimation of the Number of Clusters: Application to Image Segmentation.
Proceedings of the 15th International Conference on Pattern Recognition, 2000

Genetic fusion: application to multi-components image segmentation.
Proceedings of the IEEE International Conference on Acoustics, 2000

Rotation invariant texture analysis: A comparative study.
Proceedings of the 10th European Signal Processing Conference, 2000

1999
Mise en oeuvre d'un système adaptatif de segmentation d'images. (Development of an adaptive image segmentation system).
PhD thesis, 1999

Texture analysis of an image by using a rotation-invariant model.
Proceedings of the 1999 IEEE International Conference on Acoustics, 1999

1998
Recognition of rotated and scaled textures using 2-D AR modeling and the Fourier-Mellin transform.
Proceedings of the 9th European Signal Processing Conference, 1998


  Loading...