{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T13:37:51Z","timestamp":1740145071387,"version":"3.37.3"},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,12,13]],"date-time":"2019-12-13T00:00:00Z","timestamp":1576195200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,12,13]],"date-time":"2019-12-13T00:00:00Z","timestamp":1576195200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2020,1]]},"DOI":"10.1007\/s11623-019-1214-3","type":"journal-article","created":{"date-parts":[[2019,12,13]],"date-time":"2019-12-13T09:21:57Z","timestamp":1576228917000},"page":"9-15","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Vereinbarkeit von Biometrieforschung und Datenschutz"],"prefix":"10.1007","volume":"44","author":[{"given":"Arndt","family":"von Twickel","sequence":"first","affiliation":[]},{"given":"Jennifer","family":"Breuer","sequence":"additional","affiliation":[]},{"given":"Ralph","family":"Breithaupt","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,12,13]]},"reference":[{"key":"1214_CR1","doi-asserted-by":"crossref","unstructured":"Anil K. Jain, Patrick Flynn, Arun A. Ross: Handbook of Biometrics, Springer, (2008)","DOI":"10.1007\/978-0-387-71041-9"},{"key":"1214_CR2","unstructured":"BSI: Grunds\u00e4tzliche Funktionsweise biometrischer Verfahren, https:\/\/www.bsi.bund.de\/DE\/Themen\/DigitaleGesellschaft\/Biometrie\/AllgemeineEinfuehrung\/einfuehrung.html, (2019)"},{"key":"1214_CR3","unstructured":"Richtlinie (EU) 2015\/2366 des europ\u00e4ischen Parlaments und des Rates vom 25. November 2015 \u00fcber Zahlungsdienste im Binnenmarkt, zur \u00c4nderung der Richtlinien 2002\/65\/EG, 2009\/110\/EG und 2013\/36\/EU und der Verordnung (EU) Nr. 1093\/2010 sowie zur Aufhebung der Richtlinie 2007\/64\/EG, https:\/\/eur-lex.europa.eu\/legal-content\/DE\/TXT\/PDF\/?uri=CELEX:32015L2366&from=DE, (2015)"},{"key":"1214_CR4","unstructured":"Verordnung (EU) 2017\/2226 des Europ\u00e4ischen Parlaments und des Rates vom 30. November 2017 \u00fcber ein Einreise-\/Ausreisesystem (EES) zur Erfassung der Ein- und Ausreisedaten sowie der Einreiseverweigerungsdaten von Drittstaatsangeh\u00f6rigen an den Au\u00dfengrenzen der Mitgliedstaaten und zur Festlegung der Bedingungen f\u00fcr den Zugang zum EES zu Gefahrenabwehr- und Strafverfolgungszwecken und zur \u00c4nderung des \u00dcbereinkommens zur Durchf\u00fchrung des \u00dcbereinkommens von Schengen sowie der Verordnungen (EG) Nr. 767\/2008 und (EU) Nr. 1077\/2011, https:\/\/eur-lex.europa.eu\/legal-content\/DE\/TXT\/PDF\/?uri=CELEX:32017R2226&from=EN, (2017)"},{"key":"1214_CR5","unstructured":"Amtsblatt der Europ\u00e4ischen Union: Verordnung (EU) 2016\/679 des europ\u00e4ischen Parlaments und des Rates vom 27. April 2016 zum Schutz nat\u00fcrlicher Personen bei der Verarbeitung personenbezogener Daten, zum freien Datenverkehr und zur Aufhebung der Richtlinie 95\/46\/EG (Datenschutz-Grundverordnung), https:\/\/eur-lex.europa.eu\/legal-content\/DE\/TXT\/PDF\/?uri=CELEX:32016R0679&from=DE, (2016)"},{"key":"1214_CR6","doi-asserted-by":"publisher","first-page":"1530","DOI":"10.1109\/ACCESS.2014.2381273","volume":"2","author":"J Galbally","year":"2015","unstructured":"Galbally, J., Marcel, S., and Fierrez, J: Biometric antispoofing methods: a survey in face recognition. IEEE Access 2, 1530--1552. doi: 10.1109\/ACCESS.2014.2381273, (2015)","journal-title":"IEEE Access"},{"key":"1214_CR7","doi-asserted-by":"crossref","unstructured":"Makrushin, Andrey; Neubert, Tom; Dittmann, Jana: Humans Vs. Algorithms \u2013 Assessment of Security Risks Posed by Facial Morphing to Identity Verification at Border Control: Proceedings of the 14th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications \u2013 Set\u00fabal, Portugal: Scitepress, S. 513-520, URL: http:\/\/dx.doi.org\/10.5220\/0007378905130520, (2019)","DOI":"10.5220\/0007378905130520"},{"key":"1214_CR8","doi-asserted-by":"crossref","unstructured":"Patrick Grother, Mei Ngan, Kayee Hanaoka: Face Recognition Vendor Test (FRVT) Part 2: Identification, NISTIR 8271, https:\/\/doi.org\/10.6028\/NIST.IR.8271, (2019)","DOI":"10.6028\/NIST.IR.8271"},{"key":"1214_CR9","doi-asserted-by":"crossref","unstructured":"Sharif, Bhagavatula, Bauer and Reiter: Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS '16). ACM, (2016)","DOI":"10.1145\/2976749.2978392"},{"key":"1214_CR10","doi-asserted-by":"publisher","first-page":"1096","DOI":"10.1038\/s41467-019-08987-4","volume":"10","author":"S Lapuschkin","year":"2019","unstructured":"Sebastian Lapuschkin, Stephan W\u00e4ldchen, Alexander Binder, Gr\u00e9goire Montavon, Wojciech Samek, and Klaus-Robert M\u00fcller:Unmasking Clever Hans Predictors and Assessing What Machines Really Learn, Nature Communications, 10:1096, (2019)","journal-title":"Nature Communications"},{"key":"1214_CR11","unstructured":"Konferenz der unabh\u00e4ngigen Datenschutzaufsichtsbeh\u00f6rden des Bundes und der L\u00e4nder: Positionspapier zur biometrischen Analyse, Version 1.0, Stand: 3. April 2019, https:\/\/www.datenschutzkonferenz-online.de\/media\/oh\/20190405_oh_positionspapier_biometrie.pdf, (2019)"},{"key":"1214_CR12","unstructured":"C. Busch: \u201cStandards for Presentation Attack Detection\u201d, in Handbook of Biometric Anti-Spoofing -- Presentation Attack Detection, second Edition, Springer, pp 503-214, (2019)"},{"key":"1214_CR13","unstructured":"ISO\/IEC 19795-1:2006 Information technology -- Biometric performance testing and reporting -- Part 1: Principles and framework, (2006)"},{"key":"1214_CR14","unstructured":"ISO\/IEC 30107-1:2016 Information technology -- Biometric presentation attack detection -- Part 1: Framework, (2016)"},{"key":"1214_CR15","unstructured":"ISO\/IEC 30136:2018 Information technology -- Performance testing of biometric template protection schemes, (2018)"},{"key":"1214_CR16","unstructured":"J. A. Hasselgren. Measuring Usability at the Maryland Test Facility. Federal Identity Summit. AFCEA, (2017)"},{"key":"1214_CR17","unstructured":"A.Merle , J. Bringer, J. Fierrez, N. Tekampe: BEAT: a Methodology for Common Criteria evaluations of Biometrics systems, International Conference on Common Criteria (ICCC), (2015)"},{"issue":"1","key":"1214_CR18","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1016\/S0969-4765(13)70014-6","volume":"2013","author":"S\u00e9bastien Marcel","year":"2013","unstructured":"S. Marcel: \u201cBEAT biometrics evaluation and testing\u201d, Biometric Technology Today, 2013(1):5-7, (2013)","journal-title":"Biometric Technology Today"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-019-1214-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-019-1214-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-019-1214-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,12]],"date-time":"2020-12-12T01:03:14Z","timestamp":1607734994000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-019-1214-3"}},"subtitle":["Vereinbarkeit von Biometrieforschung und Datenschutz"],"short-title":[],"issued":{"date-parts":[[2019,12,13]]},"references-count":18,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,1]]}},"alternative-id":["1214"],"URL":"https:\/\/doi.org\/10.1007\/s11623-019-1214-3","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"type":"print","value":"1614-0702"},{"type":"electronic","value":"1862-2607"}],"subject":[],"published":{"date-parts":[[2019,12,13]]},"assertion":[{"value":"13 December 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}