Skip to main content

Showing 1–6 of 6 results for author: Veldhuis, R N J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2402.05548  [pdf, other

    cs.CV cs.HC

    Efficient Expression Neutrality Estimation with Application to Face Recognition Utility Prediction

    Authors: Marcel Grimmer, Raymond N. J. Veldhuis, Christoph Busch

    Abstract: The recognition performance of biometric systems strongly depends on the quality of the compared biometric samples. Motivated by the goal of establishing a common understanding of face image quality and enabling system interoperability, the committee draft of ISO/IEC 29794-5 introduces expression neutrality as one of many component quality elements affecting recognition performance. In this study,… ▽ More

    Submitted 8 February, 2024; originally announced February 2024.

  2. Worst-Case Morphs using Wasserstein ALI and Improved MIPGAN

    Authors: Una M. Kelly, Meike Nauta, Lu Liu, Luuk J. Spreeuwers, Raymond N. J. Veldhuis

    Abstract: A morph is a combination of two separate facial images and contains identity information of two different people. When used in an identity document, both people can be authenticated by a biometric Face Recognition (FR) system. Morphs can be generated using either a landmark-based approach or approaches based on deep learning such as Generative Adversarial Networks (GAN). In a recent paper, we intr… ▽ More

    Submitted 13 October, 2023; v1 submitted 12 October, 2023; originally announced October 2023.

  3. arXiv:2101.10631  [pdf, other

    cs.CR

    Biometric Verification Secure Against Malicious Adversaries

    Authors: Amina Bassit, Florian Hahn, Joep Peeters, Tom Kevenaar, Raymond N. J. Veldhuis, Andreas Peter

    Abstract: Biometric verification has been widely deployed in current authentication solutions as it proves the physical presence of individuals. To protect the sensitive biometric data in such systems, several solutions have been developed that provide security against honest-but-curious (semi-honest) attackers. However, in practice attackers typically do not act honestly and multiple studies have shown dra… ▽ More

    Submitted 26 January, 2021; originally announced January 2021.

    Comments: This is a complete reworking and major expansion of our paper arXiv:1705.09936 * Reworking of original semi-honest protocol and its security proof * Major expansions: tailored zero-knowledge proofs; efficient variant of original protocol that we prove secure against malicious adversaries; extensive experimental evaluation using three different datasets; in-depth comparison with related work

  4. arXiv:2001.04537  [pdf

    eess.IV cs.CV cs.LG

    Deep convolutional neural networks for multi-planar lung nodule detection: improvement in small nodule identification

    Authors: Sunyi Zheng, Ludo J. Cornelissen, Xiaonan Cui, Xue** **g, Raymond N. J. Veldhuis, Matthijs Oudkerk, Peter M. A. van Ooijen

    Abstract: Objective: In clinical practice, small lung nodules can be easily overlooked by radiologists. The paper aims to provide an efficient and accurate detection system for small lung nodules while kee** good performance for large nodules. Methods: We propose a multi-planar detection system using convolutional neural networks. The 2-D convolutional neural network model, U-net++, was trained by axial,… ▽ More

    Submitted 9 December, 2020; v1 submitted 13 January, 2020; originally announced January 2020.

  5. Automatic Pulmonary Nodule Detection in CT Scans Using Convolutional Neural Networks Based on Maximum Intensity Projection

    Authors: Sunyi Zheng, Jiapan Guo, Xiaonan Cui, Raymond N. J. Veldhuis, Matthijs Oudkerk, Peter M. A. van Ooijen

    Abstract: Accurate pulmonary nodule detection is a crucial step in lung cancer screening. Computer-aided detection (CAD) systems are not routinely used by radiologists for pulmonary nodule detection in clinical practice despite their potential benefits. Maximum intensity projection (MIP) images improve the detection of pulmonary nodules in radiological evaluation with computed tomography (CT) scans. Inspire… ▽ More

    Submitted 10 June, 2019; v1 submitted 11 April, 2019; originally announced April 2019.

    Comments: Submitted to IEEE TMI

  6. arXiv:1705.09936  [pdf, other

    cs.CR

    Fast and Accurate Likelihood Ratio Based Biometric Comparison in the Encrypted Domain

    Authors: Joep Peeters, Andreas Peter, Raymond N. J. Veldhuis

    Abstract: As applications of biometric verification proliferate, users become more vulnerable to privacy infringement. Biometric data is very privacy sensitive as it may contain information as gender, ethnicity and health conditions which should not be shared with third parties during the verification process. Moreover, biometric data that has fallen into the wrong hands often leads to identity theft. Secur… ▽ More

    Submitted 28 May, 2017; originally announced May 2017.