Using CrowdPatent to fund an idea (share contribution opportunity until 15th May 2015)

Title image

Biometrics and Secret Key Binding Scheme

Full title: A Privacy-Enhanced Biometrics and Secret Key Binding Scheme to Safeguard Personal Data in Untrusted Computing Environment

What is it?

The invention uses a novel binding scheme to fuse a user’s biometrics information and a secret in a secure way in the sense that leakage of either biometric information or the secret will not cause the leakage of the other part. Do I need it? Yes, if you have the following worries 
  • “too difficult to memorize so many passwords everyday”
  • “I like to use two-factor authentication for my financial services but not to use my biometrics for buying a bus ticket”
  • “we lose privacy if biometrics is used to replace passwords”
  • “crypto-biometrics (fuzzy commitment and fuzzy vault) has not been optimized in security and recognition performance …”
  • “I like to use biometrics to login to cloud services but I do not trust the cloud service provider to manage my biometric templates in cloud…”
  • “I have no privacy worry about my biometric data used for my smartphone access control because I know they use chip to store and compare the biometric template, but there is no such trusted things in cloud … should I use biometrics authentication for cloud services?”
  • “I have already passwords set for so many online services … if using you invention enforces me to re-set all these passwords, I would not like to use this invention.”
  • “I can encrypt my documents before backing them up in Dropbox but how can I retrieve them back by key word searching? Sure I know I can download them all to my PC and decrypt them and use key word to search but I have thousands of such encrypted files in dropbox …”
  • “how can I prove I am the author of this news photo used by this website? But I do not want to disclose my identity to them …”

What are its use cases?

The fused data, combined with other cryptographic tools, can be used to achieve multiple purposes such as 
  • encrypting personal files (documents, photos, videos, graphic design, etc.) in two modes – (1) biometrics and one master password (or a private key); or (2) only biometrics, without worry about your privacy (your biometrics and password are not reconstructable from the data binding result!)
  • managing personal passwords (without needing re-set of your existing ones)
  • indexing encrypted files without needing decryption and without disclosing the search meta data to the untrusted database service provider like a public cloud service provider
  • verifying the ownership of the user’s digital assets without need of disclosing the ownership information itself (if guaranteed by the digital signature from the service provider).

Thanks to the truly irreversible binding scheme, the user will have much less security and privacy concerns compared to prior arts, such as the fuzzy commitment scheme. The security of the invented binding scheme and the derived application schemes can be guaranteed by the state-of-the- arts cryptographic mechanisms. Experimental tests of the invented scheme over fingerprint ISO minutiae templates from the public data FVC2002DB2 and FVC2006DB2 for identity authentication use achieved comparable accuracy performance as other plain or protected template comparison algorithms in the secret-stolen scenarios (i.e., comparing all protected fingerprint templates using a same secret for binding) and almost zero error rates for the two-factor case (i.e., protected templates are compared using user-specific secrets). 

What makes this invention different from the state of the arts?

Feature 1: Truly irreversibility of the data binding result (breach of one element of the {biometric data, personal secret} pair will not cause the breach of the other element) 

Feature 2: One biometrics-secret pair suits all applications (your do not need to change your current passwords but use the invention to add an extra layer of security) 

Feature 3: The biometrics-secret binding scheme, if not combined with other cryptographic tools, itself can be used as a biometric template protection scheme. (the secret can be owned by the user as a two-factor authentication scheme or can be generated in real time by the authentication system as a biometric-only authentication scheme) 

Feature 4: Independent of biometric modalities (so you can apply the invention to various modalities: fingerprint, face, iris, vein, ear, etc.) 

Feature 5: Tunable Security-Convenience settings (the weights on the two factors – the biometrics and the personal secret - can be fine-tuned to suit different applications including both the only-biometrics and the only-password cases) 

Feature 6: Cryptographically secure (interchangeable crypto-function component; perfect security achieved if two factors are kept well; computationally secure if one of the two is leaked)

Comparison to peer technologies


compsac 2014 header imageIEEE Computer Society logoIEEE Cloud Computing logo

SIMICE-2015: The 1st IEEE International Workshop on Secure Identity Management in the Cloud Environment 

adjunct to the 39th IEEE Annual International Computer, Software & Applications Conference (COMPSAC 2015), Taichung, Taiwan, July 1-5, 2015       


SIMICE Organizers


Bian Yang, Senior Researcher at Gjøvik University College, Norway

E-mail: bian.yang (at)


Julien Bringer, Senior Cryptography and Security Expert at Morpho, France

E-mail: julien.bringer (at)


SIMICE Advisor


Christoph Busch, Professor, Center for Advanced Security Research Darmstadt, Germany


Important Dates


Deadline for paper submission:             April 02nd, 2015

Notification of acceptance:                   April 21th, 2015

Camera-ready due:                              April 30th, 2015


Goal of the Workshop


While identity management solutions are increasingly migrating to cloud, conventional identity management approaches are facing challenges in trust, security, privacy, computational efficiency, interoperability, and service reliability in the cloud environment. Security concerns are reportedly among the biggest inhibitors holding back the wider adoption of cloud computing. Secure identity management, required by emerging cloud services, is receiving increasing attention from both service providers' and end users' perspectives, in terms of protection of enterprise assets and customers’ privacy in the cloud, respectively. This workshop solicits contributions describing state-of-the-art methodology and technology innovations in the field of secure identity management in the cloud computing environment, encourages experience sharing (both positive and negative ones), and also welcomes disruptive work-in-progress ideas towards future concepts.     


Theme of the Workshop


The workshop is dedicated to the security aspect of identity management (IDM) in the cloud. To facilitate the communication between the two domains - conventional cryptography and cloud computing, two tracks namely “New cryptography and security mechanisms for IDM in the cloud” and “Cloud computing technology innovation to secure IDM in the cloud” are planned to attract works from the two domains; looking at the same thing from two different perspectives. A third track “Cross-sectoral aspects of cloud identity management” is also planned to attract works addressing the cross-domain challenges.


Scope of the Workshop


Any submission whose content is relevant to the area of secure identity management in the cloud environment will be considered, but any submission whose subject matter is related to one of the following 3 tracks’ topics will be particularly welcome. Practically-oriented approaches will also be appreciated.


Track 1: New cryptography and security mechanisms for IDM in the cloud

·         privacy-preserving and trusted identities as services

·         cloud-based password managers

·         privacy-preserving biometrics authentication for cloud-based services

·         biometric data protection and management in the cloud

·         data processing and analysis in a protected domain

·         secure operations on encrypted data, e.g., via efficient homomorphic encryption and searchable encryption, for cloud services

·         private database querying in the cloud environment

·         digital rights management for media data for cloud storage and sharing

·         privacy protection of outsourced personal data from mobile device and social network


Track 2: Cloud computing technology innovation to secure IDM in the cloud

·         data separation design in the cloud environment

·         hybrid cloud architecture design for secure data management

·         federated and distributed identity management in the cloud

·         user-centric identity management in the cloud environment

·         hybrid hardware (e.g., chip-based) / software security enhancement mechanism

·         security-enhanced distributed computing framework design, e.g., MapReduce

·         secure database architecture and services for IDM in the cloud environment

·         identity management in a cyber-physical cloud

·         applications of new computer and software technologies to IDM context


Track 3: Cross-sectoral aspects of cloud identity management

·         lessons and best practice learnt from different sectors

·         culture, ethical, legal, and regulation factors

·         discrepancy in the understanding of trust and privacy cross different sectors

·         survey of data security concerns and understandings from various sectors

·         standardization


Workshop Paper Submission


Workshop papers are limited to 6 pages. Up to 2 additional pages (for a total of 8 pages) will be available for $250 per additional page charge. Camera ready submissions of accepted papers must follow the formatting and submission guidelines provided by IEEE Computer Society at


Policy for Authors Submitting Multiple Papers


Main Conference papers:

An author can have at most three accepted papers in the main conference including full (regular) (no more than 2), short and special-session papers, excluding Doctoral Symposium and Poster papers. EACH accepted paper for the Main Conference must be registered separately, by paying one FULL registration fee per accepted paper. In case of multiple authors, each author must pay FULL registration fee to attend the conference with an individual name badge. Discounted student registration fee only applies to Doctoral Symposium papers.


Doctoral Symposium papers:

Each accepted Doctoral Symposium paper must have a student as the sole or first author and pay a discounted student registration fee for a student name badge, perhaps with a reduced set of privileges depending on the overall conference budget conditions. Faculty or senior authors of a Doctoral Symposium paper must also register with FULL fee to obtain a name badge (or have already secured a name badge through registration in other paper categories) in order to attend.


Workshop papers:

Workshops are affiliated, loosely coupled and co-located events. We do not limit the number of accepted workshop papers for workshop authors. However, each accepted Workshop paper must register with FULL fee, and in the case of multiple authors each attending a workshop, the author must register with FULL fee and receive an individual name badge.


Poster papers:

Each Poster paper must register in a discounted registration fee with reduced privileges.


Program Committee


·         Erik-Oliver Blass (Airbus Group Innovations, Germany)

·         Julien Bringer (Morpho, France)

·         Christoph Busch (CASED, Germany)

·         Hervé Chabanne (Morpho and Télécom ParisTech, France)

·         Martin Gilje Jaatun (SINTEF, Norway)

·         Qi Han (Harbin Institute of Technology, China)

      ·         Pei-Yun Hsueh (IBM T.J. Watson Research Center, United States)

·         Thomas Kemmerich (Norwegian Information Security Laboratory, Norway)

·         Els Kindt (KU Leuven, Belgium)

·         Mingyu Li (Chinese Academy of Science, China)

·         Qiong Li (Harbin Institute of Technology, China)

·         Zheming Lu (Zhejiang University, China)

·         Hao Luo (Zhejiang University, China)

·         Xiamu Niu (Harbin Institute of Technology, China)

·         Shantanu Rane (PARC, USA)

·         Christian Rathgeb (CASED, Germany)

·         Chik-How Tan (National University of Singapore, Singapore)

·         Qiang Tang (Interdisciplinary Centre for Security, Reliability and Trust, Luxembourg)

·         Per Thorsheim (God Praksis AS, Norway)

·         Bian Yang (Norwegian Information Security Laboratory, Norway)

·         Jiantao Zhou (University of Macao, Macao)

·         Xuebing Zhou (Huawei European Research Center, Germany)



IWCCSP 2014 Call for Papers
Indexing and Journal Special Issue (October 2, 2013)
IWCCSP 2014 will be held in conjunction with the IEEE International Conference on Cloud Engineering (IC2E 2014). Accepted papers will be included in the published proceedings of IC2E 2014. The proceedings will be submitted for inclusion in the IEEE Xplore Digital Library and will also be submitted to EI and INSPEC for indexing. Some of the papers will be selected for a special issue of the International Journal on Big Data Intelligence.

IEEE International Workshop on Cloud Computing for Signal Processing, Coding and Networking (IWCCSP) is a newly launched series of workshops in the interdisciplinary area of Cloud Computing and Signal Processing. Cloud Computing is playing an increasing role in the field of signal processing and multimedia systems. Siri provides speech recognition services based on cloud computing. YouTube and Brightcove are SaaS systems providing video storage, coding, streaming and delivering services. There are cloud-assisted (mobile) video conferencing systems based on inter-datacenter networks. NIST is proposing standards about Biometrics as a Service. Signal processing for large-scale sensor networks also relies on the power of cloud computing. How to utilize cloud computing technologies to improve the efficiency, capacity, intelligence and user experience of signal processing and multimedia service systems is an emerging topic nowadays.

The aim of IEEE International Workshop on Cloud Computing for Signal Processing, Coding and Networking (IWCCSP 2014) is to bring together researchers and engineers from both the areas of cloud computing and signal processing to share their latest achievements, exchange ideas and identify potential research directions in signal processing, coding and networking with cloud computing technologies.

Topics of interest for this workshop include, but are not limited to:

  • Signal processing platform as a service
  • Video coding and scalable streaming as a service
  • Biometric as a service
  • Signal detection and identification as a service
  • Speech recognition and its application based on cloud
  • Audio, image and video processing with cloud
  • Coding method for inter-datacenter networking
  • Multimedia streaming and desktop virtualization
  • Storage of encoded signals in cloud
  • Distributed and parallel computing for signal processing
  • Signal processing for large-scale sensor networks based on cloud
  • Security of multimedia communication and cloud computing
  • Secure signal processing, coding and storage in cloud
  • IWCCSP 2014 Important Dates
    Paper SubmissionNovember 30, 2013
    Acceptance notificationDecember 30, 2013
    Camera-ready copies dueJanuary 15, 2014
    Author registrationJanuary 17, 2014
    Early bird registration     February 7, 2014


    Norwegian Biometrics Laboratory Workshop 2013

    We cordially invite you to participate in the 3rd Norwegian Biometrics Laboratory Workshop 2013 which is an open and free-to-attend event organized by Norwegian Biometrics Laboratory at Gjøvik University College. This event is facing all who are interested in technologies, policies, applications, and wider acceptability of biometrics. The event in 2013 focuses on the topic "off-the-shelf technologies" to realize user-centered biometrics with a better acceptability, higher efficiency, and lower deployment cost.

    Registration (deadline: 18.02.2013)

    Date:February 22nd, 2013
    Venue:Room K102, Gjøvik University College (Høgskolen i Gjøvik), Gjøvik, Norway
    Participation:Open and free; registration needed.
    Sponsor:European Association of Biometrics (EAB)  (
    Research Council of Norway ( 
    Theme:Off-the-Shelf Technologies for Biometrics - from Instrument-Centered to User-Centered


    10:00-10:05WelcomeNils Kalstad Svendsen (Section leader NISlab), GUC
    10:05-10:15Introduction, overview, and vision of theNorwegian Biometrics LaboratoryChristoph Busch (Head of NBL), GUC
    10:15-10:20The theme of workshop 2013 and topics in briefBian Yang, GUC
    10:20-10:50Biometrics in a networked worldKevin C. Mangold, NIST
    10:50-11:20Challenges and opportunities of cloud biometricsHo Chang, BioID GmbH
    11:20-11:35Coffee break / demo of NBL smartphone fingerprint collection via web-based service 
    11:35-12:05Human dynamics for identification - research in Center for Machine Vision Research (CMV)Guoying Zhao, Univ. of Oulu
    12:05-12:20Preliminary analysis and vision of fingerprints collection using smartphone camerasBian Yang, GUC
    12:20-12:45Face recognition using light field camera: a preliminary studyRaghavendra Ramachandra, GUC
    12:45-13:45Lunch break 
    13:45-14:15Biometrics and Identity - Challenges and opportunities for immigration managementFrøy Løvåsdal and Knut Ivarson Øvregård, Norwegian ID Centre
    14:15-14:45On the fly head shape parameter estimation for Automatic Border Control applicationsCatherine Herold, Morpho
    14:45-15:15Panel discussion:
    Key factors for deployment of Mobile and User-Centered Biometrics

    Magnar Aukrust (Magnar Aukrust IDadvice), Ho Chang (BioID), Kevin Mangold (NIST), Alexander Nouak (EAB/Fraunhofer IGD), Xuebing Zhou (CASED), Patrick Bours (GUC), Christoph Busch (GUC)


    Contact: Bian Yang,  e-mail:,  tel.: +47 61 13 54 86

    Practical Information:

    Arrival: Gjøvik is located in the center of Norway, about 140 kilometers from Oslo. You can go from Oslo by train: or by bus: . Traveling time is approx. 2 hours. The fastest and most convenient way from Oslo Gardermoen Airport to Gjøvik is the bus, Gjøvik is the last station so can not miss it. You can find the time tables of the bus route 15 here .

    Location: The workshop will take place on the campus of GUC , Building K, Room K102. You can find Gjøvik University College here: google map.

    Accommodation: The two most common hotels are the Quality Hotel Strand and the Comfort Hotel Grand . Both hotels are within walking distance of the railway station and from GUC. 
    The third hotel option is the Youth Hostel Hovdetun . This is however further away from the center of the city so transportation is needed to travel between railway station, youth hostel and GUC.

    [Talks and speakers]

    1. Biometrics in a networked world (Kevin C. Mangold, NIST)

    The need for high degrees of interoperability between various system components have been rapidly increasing. Interoperability is commonly thought of between different systems-however it is just as important to have this within a system. Recognizing this need is only a starting point. Properly defining each component's scope is a challenge in itself. These types of challenges and opportunities will be discussed and what NIST and other initiatives are doing to help in these areas.

    Kevin Mangold is a computer scientist at the National Institute of Standards and Technology (NIST). Lately, his work includes biometric standards development, identity management, and biometric technologies research with a high degree of focus on interoperability and web services. He is the editor of 19785-3 – Common Biometric Exchange Formats Framework (CBEFF) revision project within ISO/IEC JTC 1 SC 37 subcommittee on biometrics and is very active in the development of other projects within the subcommittee. He also actively participates in INCITS M1 technical committee on biometrics, and co-chairs the Biometric Identity Assurance Services (BIAS) Integration technical committee at OASIS.

    2. Challenges and opportunities of cloud biometrics (Ho Chang, BioID GmbH)

    As more and more applications and services are available in the cloud, "knowing your users" is becoming more critical to ensure trust between service providers and end-users. Cloud biometrics can help. But what are the challenges in terms of technology/algorithm deployment? Where are the opportunities for cloud biometrics?

    Ho Chang brings more than 19 years CEO-level experience in the biometrics and IT industry to BioID. His knowledge and long-term experience in the software and security industry, as well as his extensive experience in sales and management are essential to the successful commercialization of BioID’s technologies. He graduated from the University of Toronto in Mathematics and Computer Science and has worked for companies such as Hewlett-Packard and Ontario Hydro.

    3. Human dynamics for identification - research in Center for Machine Vision Research (CMV) (Guoying Zhao, University of Oulu)

    Biometrics is a method of identifying persons based on his physiological/behavioral characteristics, such as face, voice/speech, iris, fingerprints, hand geometry, gait etc. It plays an increasingly important role in human identification primarily due to the universality and uniqueness of these characteristics. In my talk, emphasis will be put on the human dynamics for identification: to identify people by the way they walk (gait recognition) and by the way they speak (speaker recognition using mouth movements) using local spatiotemporal dynamic features.

    Guoying Zhao received the PhD degree in computer science from the Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China in 2005. From July 2005 to August 2010, she was a Senior Researcher in the Center for Machine Vision Research at the University of Oulu. From September of 2010, she is an adjunct professor at the University of Oulu. Her research interests include gait analysis, dynamic texture recognition, facial expression recognition, human motion analysis, and person identification. She has authored over 70 papers in journals and conferences, and has served as a reviewer for many journals and conferences. She has authored/edited three books and a special issue on IEEE Transactions on Systems, Man, and Cybernetics-Part B: Cybernetics and is editing another special issue on Elsevier Journal on Image and Vision Computing. She was a co-chair of ECCV 2008 Workshop on Machine Learning for Vision-based Motion Analysis (MLVMA), and MLVMA workshop at ICCV 2009 and CVPR 2011.

    4. Biometrics and Identity - Challenges and opportunities for immigration management (Frøy Løvåsdal and Knut Ivarson Øvregård, Norwegian ID Centre)

    The Norwegian ID Centre has recently published a report entitled ‘Biometrics and Identity – Challenges and New Opportunities for the Immigration Authorities. The report provides an overview of biometrics used by the Immigration Authorities today, as well as considering possibilities and limitations within the current legal framework. Moreover, it gives recommendations as to how identity work in Norway could be simplified and streamlined to achieve better efficiency, service and quality.

    Frøy Løvåsdal is a Senior Adviser in the ID Person Section at the Norwegian ID Centre, specializing in biometrics. She is the former Section Head (Visas) at the Norwegian Embassy in Manila, and previously worked with system development (Schengen’s Visa Information System, an application portal for visa applicants, case handling systems, etc.) at the Norwegian Directorate of Immigration.

    Knut Ivarson Øvregård is a Senior Adviser in the ID Person Section at the Norwegian ID Centre, and project manager for the "Biometrics Project". Specializing in biometrics and eID, he is the former Assistant Chief of Police, and project manager for implementation of the VIS (Schengen’s Visa Information System) at the National Police Directorate, Norway.

    5. On the fly head shape parameter estimation for Automatic Border Control applications (Catherine Herold, Morpho)

    The presentation will begin with a quick overview of the FIDELITY European project and in particular its links with Morpho activities on face authentication. Then we will focus on a specific research study: As Automated Border Control (ABC) is based on the comparison between video sequences and frontal ICAO pictures, an intermediate step is to generate a frontal view using a 3D model for which we optimize the parameters given the observations. In ABC, as images arrive successively in video sequences, specific interest is accorded to the way to update these parameters. Indeed, we want to provide a head estimation on-the-fly instead of waiting the end of the sequence to start the optimization process. The proposed approach is based on a particle filter to update the deformation parameter distribution, thus affording an improved frontal view at each time.

    Catherine Herold received the MSc in computer science and image processing from the Paris VI University in 2010. She is currently a PhD student in Telecom ParisTech and LIP6, Paris, in collaboration with Morpho, Safran. Her research interests include computer vision, especially in the areas of face tracking and reconstruction, and particle filter methods for dynamic and static parameter estimation

    6. Are light field cameras suitable for face recognition: a preliminary analysis (Raghavendra Ramachandra, GUC)

    The problem of face recognition is well addressed by the research community from past two decades. However, there still exists a wide spectrum of that hinders the performance of the face recognition system when used in real time scenarios. This talk explores the strength of plenoptic (or near-field) cameras to address the most common problem in the face recognition i.e. focus. We present and discuss preliminary results indicating both qualitative and quantitative performance of the plenoptic cameras over conventional cameras for accurate face recognition.

    R. Raghavendra is working as a researcher at NISlab with a research focus on computer vision and pattern recognition applications for the biometrics.  Previously, he was a researcher at the facility of computer imaging, Italian Institute of Technology (IIT) in Genoa, Italy. Before that, he received his PhD from University of Mysore, India and Telecom Sudparis, Paris, France (join work) in 2010.

    7. Preliminary analysis and vision of fingerprints collection using smartphone cameras (Bian Yang, GUC)

    As a general-purposed device, smartphones are promising to complement existing professional biometric sensors with advantages in convenience, privacy, and portability. This talk discloses GUC’s preliminary analysis over the accuracy performance and sample quality control effectiveness using smartphone cameras for fingerprint collection.

    Bian Yang is a researcher in NISlab since 2008. He got his B.S., M.S., and Ph.D. degree from Harbin Institute of Technology by 2005. He worked with Fraunhofer IGD Darmstadt as a visiting scientist during 2003-2005, as a lecturer to Harbin Institute of Technology during 2005-2007, and worked with Thomson Corporate Research (Beijing) 2007-2008. He is with Norway Standards in the mirror committee to ISO/IEC SC27/37 and as a co-editor to ISO 24722. He published around 60 peer-reviewed papers and was involved in several European projects (ECRYPT, AXMEDIS, TURBINE, FIDELITY, INGRESS).    

    [Other Panelists]

    Magnar Aukrust, Legal consultant/id management advisor, Deputy Director General for Ministry of Justice and the Police, Norway from 1990 to 2012.

    Patrick Bours received his MSc and PhD in Discrete Mathematics from Eindhoven University of Technology in the Netherlands. He worked for 10 years for the Netherlands National Communication Security Agency as a senior policy member in cryptology. He started working as a Postdoc researcher at NISlab in 2005 in the area of behavioural biometrics and authentication. In 2008 he became an Associate Professor and since 2012 a full Professor. His main focus in research is on continuous keystroke and mouse dynamics, gesture recognition and gait recognition.

    Christoph Busch is a professor with the Gjøvik University College (GUC) and Hochschule Darmstadt (HDA). He was project coordinator for the project series BioIS, BioFace, BioFinger, BioKeyS and initiator of the Integrated Projects 3D-Face and FIDELITY. He is leader of the Norwegian Biometrics Laboratory (NBL) and general chair of the annual IEEE BIOSIG conference. Also he is convenor of WG3 in ISO/IEC JTC1 SC37 on Biometrics and board member of the European Association for Biometrics (EAB).

    Alexander Nouak is head of the Competence Center "Identification and Biometrics" of the Fraunhofer Institute for Computer Graphics Research IGD in Darmstadt, Germany. He is responsible for the acquisition, the management, and the controlling of various applied research and development projects. Alexander Nouak was last coordinator of the project BEST Network funded within the 7th framework for research programme by the European Commission. Before he was responsible for "Research and Technology" within the Integrated Project "3D Face" funded within the 6th FRP that aimed for unattended border control. He is an active member of the DIN NIA 37 working group on biometrics as well as a contributor to the WG5 on "Biometric testing and reporting" of ISO/IEC JTC1 SC37. Since 2009, Alexander Nouak is a certified Common Criteria Evaluator (CC 3.1) and a member of IEEE. As a member of the Gesellschaft für Informatik (GI) he participates in the steering committee of the special group BIOSIG. Alexander Nouak is co-founder and chair of the European Association for Biometrics.

    Xuebing Zhou received her Dipl.-Ing. (2005) and PhD (2011) from Technische Universität Darmstadt, Germany. She is working as a postdoctoral researcher at Center for Advanced Security Research Darmstadt (CASED) since 2011. She was involved in EU-FP6 project ECRYPT, AXMEDIS, 3DFACE, and as project manager at Fraunhofer IGD for the projects "BioKeyS-Testing" and "BioKeyS – Pilot-DB – Teil 2" funded by the Federal Office for Information Security (BSI). She has experience and expertise in biometrics, privacy enhancing technologies, security analysis, and multimedia security.