{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,3,19]],"date-time":"2023-03-19T19:40:34Z","timestamp":1679254834187},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2023,1]]},"DOI":"10.1007\/s11623-022-1710-8","type":"journal-article","created":{"date-parts":[[2023,1,2]],"date-time":"2023-01-02T11:15:19Z","timestamp":1672658119000},"page":"22-26","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Synthetische Daten in der Biometrie"],"prefix":"10.1007","volume":"47","author":[{"given":"Andrey","family":"Makrushin","sequence":"first","affiliation":[]},{"given":"Jana","family":"Dittmann","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,1,2]]},"reference":[{"key":"1710_CR1","unstructured":"N. Orlans, D. Buettner, and J. Marques. A survey of synthetic biometrics: Capabilities and benefits. In Proc. Int. Conf. on Artificial Intelligence (IC-AI\u201904), vol. 1, pp. 499\u2013505, 2004."},{"key":"1710_CR2","doi-asserted-by":"crossref","unstructured":"S. Yanushkevich. Synthetic biometrics: A survey. In Proc. IEEE Int. Joint Conference on Neural Networks (IJCNN\u201906), pp. 676\u2013683, 2006.","DOI":"10.1109\/IJCNN.2006.246749"},{"key":"1710_CR3","unstructured":"I. Goodfellow, J. Pouget-Abadie, M. Mirza, B. Xu, D. Warde-Farley, S. Ozair, A. Courville, and Y. Bengio. Generative adversarial nets. In Proc. 27th Int. Conf. on Neural Information Processing Systems \u2013 Vol. 2 (NIPS\u201914), pp. 2672\u20132680, 2014."},{"key":"1710_CR4","unstructured":"Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 (General Data Protection Regulation)."},{"key":"1710_CR5","doi-asserted-by":"crossref","unstructured":"D. S. Quintana. A synthetic dataset primer for the biobehavioural sciences to promote reproducibility and hypothesis generation. eLife, 9:e53275, March 2020.","DOI":"10.7554\/eLife.53275"},{"key":"1710_CR6","unstructured":"Y. Ma, M. Schuckers, and B. Cukic. Guidelines for appropriate use of simulated data for bio-authentication research. In 4th IEEE Workshop on Automatic Identification Advanced Technologies (AutoID\u201905), pp. 251\u2013256, 2005."},{"key":"1710_CR7","doi-asserted-by":"crossref","unstructured":"D. J. Buettner. Biometric sample synthesis. In S. Z. Li and A. K. Jain, editors, Encyclopedia of Biometrics, Second Edition, pp. 211\u2013217, Springer US, 2015.","DOI":"10.1007\/978-1-4899-7488-4_1"},{"key":"1710_CR8","doi-asserted-by":"crossref","unstructured":"M. Gomez-Barrero and J. Galbally. Reversing the irreversible: A survey on inverse biometrics. Computer Security, 90(C), March 2020.","DOI":"10.1016\/j.cose.2019.101700"},{"key":"1710_CR9","doi-asserted-by":"crossref","unstructured":"P. Grother and E. Tabassi. Face image data interchange formats, standardization. In S. Z. Li and A. Jain, editors, Encyclopedia of Biometrics, pp. 314\u2013321. Springer US, Boston, MA, 2009.","DOI":"10.1007\/978-0-387-73003-5_237"},{"key":"1710_CR10","doi-asserted-by":"crossref","unstructured":"J. Daugman. Information theory and the IrisCode. IEEE Trans. on Information Forensics and Security, 11(2):400\u2013409, 2016.","DOI":"10.1109\/TIFS.2015.2500196"},{"key":"1710_CR11","doi-asserted-by":"crossref","unstructured":"J. Galbally, M. Savvides, S. Venugopalan, and A. A. Ross. Iris image reconstruction from binary templates. In K. W. Bowyer and M. J. Burge, editors, Handbook of Iris Recognition, pp. 469\u2013496. Springer London, 2016","DOI":"10.1007\/978-1-4471-6784-6_20"},{"key":"1710_CR12","unstructured":"ISO\/IEC. 19794-2:2011 Information technology \u2014 Biometric data interchange formats \u2014 Part 2: Finger minutiae data."},{"key":"1710_CR13","doi-asserted-by":"crossref","unstructured":"K. P. Wijewardena, S. A. Grosz, K. Cao, and A. K. Jain. Fingerprint template invertibility: Minutiae vs. deep templates. CoRR, abs\/2205.03809, 2022.","DOI":"10.1109\/TIFS.2022.3229587"},{"key":"1710_CR14","doi-asserted-by":"crossref","unstructured":"A. Makrushin, C. Kauba, S. Kirchgasser, S. Seidlitz, C. Kraetzer, A. Uhl, and J. Dittmann. General requirements on synthetic fingerprint images for biometric authentication and forensic investigations. In Proc. ACM Workshop on Information Hiding and Multimedia Security, pp. 93\u2013104, 2021.","DOI":"10.1145\/3437880.3460410"},{"key":"1710_CR15","doi-asserted-by":"crossref","unstructured":"S. Kirchgasser, C. Kauba, and A. Uhl. Assessment of synthetically generated mated samples from single fingerprint samples instances. In Proc. IEEE Workshop on Information Forensics and Security (WIFS\u201921), pp. 1\u20136, 2021.","DOI":"10.1109\/WIFS53200.2021.9648394"},{"key":"1710_CR16","doi-asserted-by":"crossref","unstructured":"C. Kang, Is Synthetic Dataset Reliable for Benchmarking Generalizable Person Re-Identification? In Proc. IEEE Int. Joint Conference on Biometrics (IJCB\u201922), 2022.","DOI":"10.1109\/IJCB54206.2022.10007952"},{"key":"1710_CR17","doi-asserted-by":"crossref","unstructured":"R. Cappelli. SFinGe. In S. Z. Li and A. Jain, editors, Encyclopedia of Biometrics, pp. 1169\u20131176. Springer US, Boston, MA, 2009.","DOI":"10.1007\/978-0-387-73003-5_8"},{"key":"1710_CR18","unstructured":"M. Mirza and S. Osindero. Conditional generative adversarial nets. CoRR, abs\/1411.1784, 2014."},{"key":"1710_CR19","doi-asserted-by":"crossref","unstructured":"T. Karras, S. Laine and T. Aila. A Style-Based Generator Architecture for Generative Adversarial Networks. IEEE Trans. on Pattern Analysis and Machine Intelligence, 43(12):4217-4228, 2021.","DOI":"10.1109\/TPAMI.2020.2970919"},{"key":"1710_CR20","doi-asserted-by":"crossref","unstructured":"J. Mathai, I. Masi, and W. Abd-Almageed. Does Generative Face Completion Help Face Recognition? In Proc. IAPR Int. Conference on Biometrics (ICB\u201919), 2019.","DOI":"10.1109\/ICB45273.2019.8987388"},{"key":"1710_CR21","doi-asserted-by":"crossref","unstructured":"A. S. Joshi, A. Dabouei, J. Dawson, and N. M. Nasrabadi. FDeblur-GAN: Fingerprint deblurring using generative adversarial network. In Proc. IEEE Int. Joint Conference on Biometrics (IJCB\u201921), pp. 1\u20138, 2021.","DOI":"10.1109\/IJCB52358.2021.9484406"},{"key":"1710_CR22","unstructured":"R. Durall, J. Jam, D. Strassel, M. H. Yap, and J. Keuper. FacialGAN: FacialGAN: Style Transfer and Attribute Manipulation on Synthetic Faces. In Proc. 32nd British Machine Vision Conference (BMVC\u201921), pp. 1\u201314, 2021."},{"key":"1710_CR23","doi-asserted-by":"crossref","unstructured":"B. Gecer, S. Ploumpis, I. Kotsia, and S. Zafeiriou. Fast-GANFIT: Generative Adversarial Network for High Fidelity 3D Face Reconstruction. IEEE Trans. on Pattern Analysis and Machine Intelligence, 44(9):4879\u20134893, 2022.","DOI":"10.1109\/TPAMI.2021.3084524"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-022-1710-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11623-022-1710-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-022-1710-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,19]],"date-time":"2023-03-19T19:19:19Z","timestamp":1679253559000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11623-022-1710-8"}},"subtitle":["Sind echte biometrische Datens\u00e4tze ersetzbar durch synthetische?"],"short-title":[],"issued":{"date-parts":[[2023,1]]},"references-count":23,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,1]]}},"alternative-id":["1710"],"URL":"https:\/\/doi.org\/10.1007\/s11623-022-1710-8","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,1]]},"assertion":[{"value":"2 January 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}