Patrick Bours
Background and activities
Studied Discrete Mathematics at Eindhoven University of Technology in the Netherlands (MSc 1990, PhD 1994). Worked 10 years at the Netherlands National Communication Security Agency (NLNCSA) as a senior policy member in the area of crypto with a focus on public key crypto and random number generation.
Started 7/2005 as a PostDoc at the Norwegian Information Security Laboratory (NISlab) at Gjøvik University College in a project "Authentication in a Health Service Environment". As of 7/2008 I was appointed as Associate Professor at NISlab and specialized in authentication and more specifically biometrics.
My main research interest is in behavioural biometrics with many papers on Gait Recognition (recognizing a person by his/her walking style), Keystroke Dynamics (recognizing a person by his/her typing style), and Continuous Authentication (making sure that the person that is using a device is the same as the person that logged on to that device, so detecting a change of user). From 9/2012 I have a full professor position at NISlab. I was also head of NISlab in the period from 7/2009 till 6/2012.
Currently working on the "Chatroom Security" project where the goal is to detect people with fake profiles and child predators based on their typing and stylometric behaviour.
Courses
- IMT6121 - Behavioural Biometrics
- TTM4191 - Fundamentals of Communication Technology and Security for SmartGrid
- IMT4205 - Research Project Planning
- TTM4190 - Communication Technologies in SmartGrid
- IMT4113 - Introduction to Cyber and Information Security Technology
- IMT4115 - Introduction to Information Security Management
- IMT4126 - Biometrics
- IMT4114 - Introduction to Digital Forensics
Scientific, academic and artistic work
Displaying a selection of activities. See all publications in the database
2021
- (2021) Detecting Sexual Predatory Chats by Perturbed Data and Balanced Ensembles. Proceedings of the 20th International Conference of the Biometrics Special Interest Group (BIOSIG2021).
- (2021) Us against the World: Detection of Radical Language in Online Platforms. Norsk Informasjonssikkerhetskonferanse (NISK). vol. 3.
- (2021) Impact of Unreliable Content on Social Media Users during COVID-19 and Stance Detection System. Electronics. vol. 10 (1).
- (2021) Sexual-predator Detection System based on Social Behavior Biometric (SSB) Features. Procedia Computer Science. vol. 189.
2020
- (2020) Lex-pos feature-based grammar error detection system for the English language. Electronics. vol. 9 (10).
- (2020) Ensemble Method for Sexual Predators Identification in Online Chats. 2020 8th International Workshop on Biometrics and Forensics (IWBF).
- (2020) Attention! Designing a Target Group-Oriented Risk Communication Strategy. Communications in Computer and Information Science. vol. 1226.
- (2020) Fusion of Texture and Optical Flow using Convolutional Neural Networks for Gender Classification in Videos. INTAP 3rd International Conference on Intelligent Technologies and Applications . Artificial Intelligence Research Group; Gjøvik. 2020-09-28 - 2020-09-30.
2019
- (2019) Detecting Liars in Chats using Keystroke Dynamics. International Conference on Biometric Engineering and Applications ; 2019-05-29 - 2019-05-31.
- (2019) Detecting Liars in Chats using Keystroke Dynamics. Proceedings of the 2019 International Conference on Biometric Engineering and Applications (ICBEA 2019).
- (2019) Predatory Conversation Detection. International Conference on Cyber Security for Emerging Technologies.
- (2019) On Preprocessing the Data for Improving Sexual Predator Detection. 14th International Workshop on Semantic and Social Media Adaptation and Personalization.
- (2019) International Conference on Cyber Security for Emerging Technologies. IEEE conference proceedings. 2019. ISBN 978-1-7281-4539-6.
- (2019) Using Behavioural Biometrics Beyond Gaining Access. International Conference on Biometric Engineering and Applications ; 2019-05-29 - 2019-05-31.
- (2019) Detection of Cyber Grooming in Online Conversations. IEEE International Workshop on Information Forensics and Security ; 2019-12-09 - 2019-12-12.
- (2019) Exploring Keystroke Dynamics and Stylometry Features for Gender Prediction on Chatting Data. international convention on information and communication technology, electronics and microelectronics ; 2019-05-20 - 2019-05-24.
- (2019) Exploring Keystroke Dynamics and Stylometry Features for Gender Prediction on Chatting Data. Proceedings of the International Convention MIPRO.
- (2019) How re-training process affect the performance of no-reference image quality metric for face images. IS&T International Symposium on Electronic Imaging Science and Technology.
- (2019) The impact of physical restrictions on the typing behaviour. International Conference on Information Systems and Technology Innovations: Smart economy and digital transformation ; 2019-05-17 - 2019-05-18.
- (2019) Robust Algorithm for Multimodal Deception Detection. 2019 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR).
- (2019) Emotion-based Mining for Gender Prediction in Online Social Networks. ACM International Conference on Machine learning and Data Science ; 2019-12-16 - 2019-12-17.
- (2019) A Language-independent gender classifier for Online Social Networks. IEEE Conference on Information and Communication Technology ; 2019-12-06 - 2019-12-08.
2018
- (2018) Predicted Templates: Learning-curve Based Template Projection for Keystroke Dynamics. Proceedings of the 17th International Conference of the Biometrics Special Interest Group (BIOSIG 2018).
- (2018) A Mobile App Authentication Approach by Fusing the Scores from Multi-modal Data. Fusion 2018 (21st International Conference on Information Fusion) . Fusion 2018; Cambridge. 2018-07-10 - 2018-07-13.
- (2018) A Novel Mobilephone Application Authentication Approach based on Accelerometer and Gyroscope Data. (BIOSIG 2018) 17th International Conference of the Biometrics Special Interest Group . BIOSIG 2018; Darmstadt. 2018-09-26 - 2018-09-28.
- (2018) Studying WiFi and Accelerometer data based Authentication Method on Mobile Phones. ICBEA 2018 (International Conference on Biometric Engineering and Applications) . ICBEA 2018; Amsterdam. 2018-05-16 - 2018-05-18.
- (2018) Performance Evaluation of No-Reference Image Quality Metrics for Visible Wavelength Iris Biometric Images. 2018 26th European Signal Processing Conference (EUSIPCO).
- (2018) Study on color space for the performance of degraded face image recognition. IS&T International Symposium on Electronic Imaging Science and Technology.
- (2018) Can image quality enhancement methods improve the performance of biometric systems for degraded face images?. 2018 Colour and Visual Computing Symposium (CVCS); 19th and 20th September, 2018, Gjøvik, Norway.
- (2018) Performance evaluation of no-reference image quality metrics for face biometric images. Journal of Electronic Imaging (JEI). vol. 27 (2).
2017
- (2017) Language dependent challenge-based keystroke dynamics. 2017 International Carnahan Conference on Security Technology (ICCST).
- (2017) The Shakespeare experiment: Preliminary results for the recognition of a person based on the sound of walking. 2017 International Carnahan Conference on Security Technology (ICCST).
- (2017) Biometric Acoustic Ear Recognition. Biometric Security and Privacy Opportunities & Challenges in The Big Data Era.
- (2017) Can no-reference image quality metrics assess visible wavelength iris sample quality?. Proceedings of IEEE international conference on image processing.
- (2017) A study on continuous authentication using a combination of keystroke and mouse biometrics. Neurocomputing. vol. 230.
- (2017) Person Identification by Keystroke Dynamics Using Pairwise User Coupling. IEEE Transactions on Information Forensics and Security. vol. 12 (6).
- (2017) Importance of a Versatile Logging Tool for Behavioural Biometrics and Continuous Authentication Research. Developing Next-Generation Countermeasures for Homeland Security Threat Prevention.
- (2017) Improving static audio keystroke analysis by score fusion of acoustic and timing data. Multimedia tools and applications.
- (2017) Classification of Fingerprints Captured Using Optical Coherence Tomography. Image Analysis 20th Scandinavian Conference, SCIA 2017 Tromsø, Norway, June 12–14, 2017 Proceedings, Part II.
2016
- (2016) An improved 3-step contactless fingerprint image enhancement approach for minutiae detection. 2016 6th European Workshop on Visual Information Processing (EUVIP).
- (2016) The influence of fingerprint image degradations on the performance of biometric system and quality assessment. Lecture Notes in Informatics. vol. P-260.
- (2016) Combining Keystroke and Mouse Dynamics for Continuous User Authentication and Identification. 2016 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA).
- (2016) Using current biometrics technologies for authentication in e-learning assessment. 2016 International Conference on Emerging eLearning Technologies and Applications (ICETA).
- (2016) Acoustical keystroke analysis for user identification and authentication. 2016 26th International Conference Radioelektronika (RADIOELEKTRONIKA).
2015
- (2015) A Mobile Phone Device as a Biometrics Authentication Method for an ATM Terminal. PROCEEDINGS: The 15th IEEE International Conference on Computer and Information Technology (CIT 2015); The 14th IEEE International Conference on Ubiquitous Computing and Communications (IUCC 2015); The 13th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC 2015); The 13th IEEE International Conference on Pervasive Intelligence and Computing (PICom 2015) — CIT/IUCC/DASC/PICom 2015 — ; 26–28 October 2015, Liverpool, United Kingdom.
- (2015) Static Audio Keystroke Dynamics. Multimedia Communications, Services and Security 8th International Conference, MCSS 2015, Kraków, Poland, November 24, 2015. Proceedings.
- (2015) Continuous Authentication with Keystroke Dynamics. Recent Advances in User Authentication Using Keystroke Dynamics Biometrics.
- (2015) Performance evaluation of continuous authentication systems. IET Biometrics. vol. 4 (4).
- (2015) Keystroke Dynamics Performance Enhancement With Soft Biometrics. 2015 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA); 23 - 25 March 2015, Hong Kong.
- (2015) Data forensic techniques using Benford's law and Zipf's law for keystroke dynamics. 3rd International Workshop on Biometrics and Forensics (IWBF2015);3‐4th March 2015, Gjøvik, Norway.
- (2015) One-handed Keystroke Biometric Identification Competition. The 8th IAPR International Conference on Biometrics, ICB; May 19-22 2015, Phuket, Thailand.
- (2015) A Computational Approach to the Continuous Authentication Biometric System. Information Sciences. vol. 304.
- (2015) Context independent continuous authentication using behavioural biometrics. 2015 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA); 23 - 25 March 2015, Hong Kong.
- (2015) Continuous Authentication in a Real World Settings. ICAPR 2015, The Eighth International Conference on Advances in Pattern Recognition; January 4-7 2015; Kolkata, India.
- (2015) Continuous authentication and identification for mobile devices: Combining security and forensics. 2015 IEEE International Workshop on Information Forensics and Security (WIFS).
- (2015) Does Context matter for the Performance of Continuous Authentication Biometric Systems? An Empirical Study on Mobile Device. BIOSIG 2015: Proceedings of the 14th International Conference of the Biometrics Special Interest Group.
- (2015) Swipe Gesture based Continuous Authentication for Mobile Devices. The 8th IAPR International Conference on Biometrics, ICB; May 19-22 2015, Phuket, Thailand.
- (2015) Acoustical user identification based on MFCC analysis of keystrokes. Advances in Electrical and Electronic Engineering. vol. 13 (4).
2014
- (2014) Performance of keystroke dynamics when allowing typing corrections. 2nd International Workshop on Biometrics and Forensics (IWBF2014); 27-28th March 2014, Valletta, Malta.
- (2014) Applying keystroke dynamics on one-time pin codes. 2nd International Workshop on Biometrics and Forensics (IWBF2014); 27-28th March 2014, Valletta, Malta.
- (2014) Soft Biometrics for Keystroke Dynamics: Profiling Individuals While Typing Passwords. Computers & Security. vol. 45 (September).
- (2014) Continuous Authentication using Fuzzy Logic. Proceedings of the 7th International Conference on Security of Information and Networks SIN'14 ; September, 9-11 2014 Glasgow/UK.
- (2014) User Identification Based on Eye Gaze Data. Norsk Informasjonssikkerhetskonferanse (NISK).
- (2014) Content Reconstruction using Keystroke Dynamics: Preliminary Results. Fifth International Conference on Emerging Security Technologies, EST 2014; Alcalá de Henares, Spain, 10-12 September 2014.
2013
- (2013) Continuous Authentication using Behavioural Biometrics. The Collaborative European Research Conference (CERC) ; Cork. 2013-10-17 - 2013-10-18.
- (2013) Gait and Activity Recognition using Commercial Phones. Computers & Security. vol. 39 (Part B).
- (2013) Independent Performance Evaluation of Pseudonymous Identifier Fingerprint Verification Algorithms. Image Analysis and Recognition. 10th International Conference, ICIAR 2013, Póvoa do Varzim, Portugal, June 26-28, 2013. Proceedings.
- (2013) Soft Biometrics Database: a Benchmark for Keystroke Dynamics Biometric Systems. BIOSIG 2013 Proceedings of the 12th International Conference of the Biometrics Special Interest Group; 04.-06. September 2013 in Darmstadt, Germany.
- (2013) Soft Biometrics for Keystroke Dynamics. Image Analysis and Recognition. 10th International Conference, ICIAR 2013, Póvoa do Varzim, Portugal, June 26-28, 2013. Proceedings.
- (2013) Continuous Authentication using Mouse Dynamics. BIOSIG 2013 Proceedings of the 12th International Conference of the Biometrics Special Interest Group; 04.-06. September 2013 in Darmstadt, Germany.
- (2013) Complexity measurement of a password for keystroke dynamics: preliminary study. Proceedings of the 6th International Conference on Security of Information and Networks.
2012
- (2012) Continuous keystroke dynamics: A different perspective towards biometric evaluation. Information Security Technical Report. vol. 17 (1/2).
- (2012) Towards Continuous Authentication Based on Gait Using Wearable Motion Recording Sensors. Continuous Authentication Using Biometrics: Data, Models, and Metrics.
- (2012) Biometric Access Control using Near Field Communication and Smart Phones. 5th IAPR International Conference on Biometrics (ICB), Proceedings; March 29 - April 1, 2012 New Delhi, India.
2011
- (2011) Towards an automatic gait recognition system using activity recognition (wearable based). Proceedings of the 3rd International Workshop On Securityand Communication Networks (IWSCN 2011), 18-20 May, 2011, Gjøvik, Norway.
- (2011) Gait Recognition in Children under Special Circumstances. Proceedings of the 3rd International Workshop On Securityand Communication Networks (IWSCN 2011), 18-20 May, 2011, Gjøvik, Norway.
- (2011) Performance of Gait Recognition in Children's Walking Compared to Adults. Proceedings of the 3rd International Workshop On Securityand Communication Networks (IWSCN 2011), 18-20 May, 2011, Gjøvik, Norway.
- (2011) Feature Selection in Keystroke Dynamics. Norsk informasjonssikkerhetskonferanse, NISK 2011.
- (2011) Proceedings of the 3rd International Workshop On Securityand Communication Networks (IWSCN 2011), 18-20 May, 2011, Gjøvik, Norway. 2011. ISBN 978-82-91313-67-2.
- (2011) Gait Recognition for Children over a Longer Period. BIOSIG 2011, Proceedings - International Conference of the Biometrics Special Interest Group; 8.-9. September 2011 in Darmstadt.
- (2011) User authentication based on foot motion. Signal, Image and Video Processing. vol. 5 (4).
- (2011) Fusion in fingerprint authentication: two finger types vs. two scanner types. SAC'11 The 2011 ACM Symposium on Applied Computing; TaiChung, Taiwan — March 21 - 24, 2011.
- (2011) Walk the Walk: Attacking Gait Biometrics by Imitation. Information Security, 13th International Conference, ISC 2010 Boca Raton, FL, USA, October 2010.
- (2011) Scenario test of accelerometer-based biometric gait recognition. Proceedings of the 3rd International Workshop On Securityand Communication Networks (IWSCN 2011), 18-20 May, 2011, Gjøvik, Norway.
- (2011) How to comprehensively describe a biometric update mechnism for keystroke dynamics. Proceedings of the 3rd International Workshop On Securityand Communication Networks (IWSCN 2011), 18-20 May, 2011, Gjøvik, Norway.
2010
- (2010) Norwegian Information Security Conference = Norsk Informasjonssikkerhetskonferanse : NISK 2010 . Gjøvik University College, Gjøvik, 23-24 November 2010. Tapir Akademisk Forlag. 2010. ISBN 978-82-519-2705-5.
- (2010) Eigensteps : a giant leap for gait recognition. 2nd International Workshop On Security and Communication networks (IWSCN), May 26-28, 2010, Karlstad, Sweden.
- (2010) Improved Cycle Detection for Accelerometer Based Gait Authentication. Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2010 Sixth International Conference on - 15-17 Oct. 2010.
- (2010) Fusion of gait and fingerprint for user authentication on mobile devices. 2nd International Workshop On Security and Communication networks (IWSCN), May 26-28, 2010, Karlstad, Sweden.
- (2010) Unobtrusive User-Authentication on Mobile Phones Using Biometric Gait Recognition. Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2010 Sixth International Conference on - 15-17 Oct. 2010.
- (2010) Improved Hip-Based Individual Recognition Using Wearable Motion Recording Sensor. Communications in Computer and Information Science. vol. 122.
- (2010) Improved Hip-Based Individual Recognition Using Wearable Motion Recording Sensor. Security Technology, Disaster Recovery and Business Continuity.
- (2010) GUC100 Multi-scanner Fingerprint Database for In-House (Semi-public) Performance and Interoperability Evaluation. 10th International Conference on Computational Science and its Applications : ICCSA 2010, Fukuoka, Japan, March 23-26, 2010.
- (2010) Impact of Finger Type in Fingerprint Authentication. Communications in Computer and Information Science. vol. 122.
- (2010) Impact of Finger Type in Fingerprint Authentication. Security Technology, Disaster Recovery and Business Continuity.
- (2010) Fusion in Fingerprint Authentication: Two Finger Scenarios. Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2010 Sixth International Conference on - 15-17 Oct. 2010.
- (2010) Improved Gait Recognition Performance Using Cycle Matching. 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, (WAINA 2010).
- (2010) Independent Performance Evaluation of Biometric Systems: Minutiae Performance versus Pseudonymous Identifier Performance. The first International Biometric Performance Conference (IBPC 2010) . NIST ITL's Information Access Division (IAD); Gaithersburg. 2010-03-02 - 2010-03-04.
- (2010) Independent Performance Evaluation of Fingerprint Verification at the Minutiae and Pseudonymous Identifier Levels. IEEE International Conference on Systems, Man and Cybernetics (SMC).
- (2010) Independent Performance Evaluation of Fingerprint verification at the minutiae and pseudonymous identifier levels. 2010 IEEE International Conference on Systems Man and Cybernetics (SMC 2010).
- (2010) Robust minutiae hash for fingerprint template protection. SPIE Proceedings of Media Forensics and Security II.
- (2010) Renewable Minutiae Templates with Tunable Size and Security. Proceedings of the 20th International Conference on Pattern Recognition (ICPR) 2010.
- (2010) Encrypting Fingerprint Minutiae Templates by Random Quantization. Communications in Computer and Information Science. vol. 87 (5).
- (2010) Encrypting Fingerprint Minutiae Templates by Random Quantization. Networked Digital Technologies : Second International Conference, NDT 2010, Prague, Czech Republic, July 7-9, 2010. Proceedings, Part I.
2009
- (2009) Simulating the Influences of Aging and Ocular Disease on Biometric Recognition Performance. Advances in Biometrics.
- (2009) A Login System Using Mouse Dynamics. IIH-MSP '09. Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2009.
- (2009) Gait Mimicking - Attack Resistance Testing of Gait Authentication Systems. Norsk informasjonssikkerhetskonferanse : NISK 2:2009 : NTNU, Trondheim 24.-25. november 2009.
- (2009) Geometric-Aligned Cancelable Fingerprint Templates. Image Analysis and Processing ¿ ICIAP 2009.