Skip to main content

Showing 1–11 of 11 results for author: Spreeuwers, L

Searching in archive cs. Search in all archives.
.
  1. arXiv:2505.07530  [pdf, ps, other

    cs.CV

    FLUXSynID: A Framework for Identity-Controlled Synthetic Face Generation with Document and Live Images

    Authors: Raul Ismayilov, Dzemila Sero, Luuk Spreeuwers

    Abstract: Synthetic face datasets are increasingly used to overcome the limitations of real-world biometric data, including privacy concerns, demographic imbalance, and high collection costs. However, many existing methods lack fine-grained control over identity attributes and fail to produce paired, identity-consistent images under structured capture conditions. We introduce FLUXSynID, a framework for gene… ▽ More

    Submitted 13 May, 2025; v1 submitted 12 May, 2025; originally announced May 2025.

  2. arXiv:2402.05090  [pdf, other

    cs.RO cs.CV

    Language-Based Augmentation to Address Shortcut Learning in Object Goal Navigation

    Authors: Dennis Hoftijzer, Gertjan Burghouts, Luuk Spreeuwers

    Abstract: Deep Reinforcement Learning (DRL) has shown great potential in enabling robots to find certain objects (e.g., `find a fridge') in environments like homes or schools. This task is known as Object-Goal Navigation (ObjectNav). DRL methods are predominantly trained and evaluated using environment simulators. Although DRL has shown impressive results, the simulators may be biased or limited. This creat… ▽ More

    Submitted 7 February, 2024; originally announced February 2024.

    Comments: 8 pages, 6 figures, to be published in IEEE IRC 2023

  3. Worst-Case Morphs using Wasserstein ALI and Improved MIPGAN

    Authors: Una M. Kelly, Meike Nauta, Lu Liu, Luuk J. Spreeuwers, Raymond N. J. Veldhuis

    Abstract: A morph is a combination of two separate facial images and contains identity information of two different people. When used in an identity document, both people can be authenticated by a biometric Face Recognition (FR) system. Morphs can be generated using either a landmark-based approach or approaches based on deep learning such as Generative Adversarial Networks (GAN). In a recent paper, we intr… ▽ More

    Submitted 13 October, 2023; v1 submitted 12 October, 2023; originally announced October 2023.

  4. arXiv:2309.14806  [pdf, other

    cs.CV

    3D printed realistic finger vein phantoms

    Authors: Luuk Spreeuwers, Rasmus van der Grift, Pesigrihastamadya Normakristagaluh

    Abstract: Finger vein pattern recognition is an emerging biometric with a good resistance to presentation attacks and low error rates. One problem is that it is hard to obtain ground truth finger vein patterns from live fingers. In this paper we propose an advanced method to create finger vein phantoms using 3D printing where we mimic the optical properties of the various tissues inside the fingers, like bo… ▽ More

    Submitted 26 September, 2023; originally announced September 2023.

  5. arXiv:2309.12118  [pdf

    cs.CV

    Vulnerability of 3D Face Recognition Systems to Morphing Attacks

    Authors: Sanjeet Vardam, Luuk Spreeuwers

    Abstract: In recent years face recognition systems have been brought to the mainstream due to development in hardware and software. Consistent efforts are being made to make them better and more secure. This has also brought developments in 3D face recognition systems at a rapid pace. These 3DFR systems are expected to overcome certain vulnerabilities of 2DFR systems. One such problem that the domain of 2DF… ▽ More

    Submitted 21 September, 2023; originally announced September 2023.

  6. arXiv:2111.15416  [pdf, other

    cs.CV

    Worst-Case Morphs: a Theoretical and a Practical Approach

    Authors: Una M. Kelly, Raymond Veldhuis, Luuk Spreeuwers

    Abstract: Face Recognition (FR) systems have been shown to be vulnerable to morphing attacks. We examine exactly how challenging morphs can become. By showing a worst-case construction in the embedding space of an FR system and using a mapping from embedding space back to image space we generate images that show that this theoretical upper bound can be approximated if the FR system is known. The resulting m… ▽ More

    Submitted 19 September, 2022; v1 submitted 30 November, 2021; originally announced November 2021.

  7. arXiv:2006.11366  [pdf, other

    cs.CV

    A survey of face recognition techniques under occlusion

    Authors: Dan Zeng, Raymond Veldhuis, Luuk Spreeuwers

    Abstract: The limited capacity to recognize faces under occlusions is a long-standing problem that presents a unique challenge for face recognition systems and even for humans. The problem regarding occlusion is less covered by research when compared to other challenges such as pose variation, different expressions, etc. Nevertheless, occluded face recognition is imperative to exploit the full potential of… ▽ More

    Submitted 19 June, 2020; originally announced June 2020.

  8. Morphing Attack Detection -- Database, Evaluation Platform and Benchmarking

    Authors: Kiran Raja, Matteo Ferrara, Annalisa Franco, Luuk Spreeuwers, Illias Batskos, Florens de Wit Marta Gomez-Barrero, Ulrich Scherhag, Daniel Fischer, Sushma Venkatesh, Jag Mohan Singh, Guoqiang Li, Loïc Bergeron, Sergey Isadskiy, Raghavendra Ramachandra, Christian Rathgeb, Dinusha Frings, Uwe Seidel, Fons Knopjes, Raymond Veldhuis, Davide Maltoni, Christoph Busch

    Abstract: Morphing attacks have posed a severe threat to Face Recognition System (FRS). Despite the number of advancements reported in recent works, we note serious open issues such as independent benchmarking, generalizability challenges and considerations to age, gender, ethnicity that are inadequately addressed. Morphing Attack Detection (MAD) algorithms often are prone to generalization challenges as th… ▽ More

    Submitted 28 September, 2020; v1 submitted 11 June, 2020; originally announced June 2020.

    Comments: This paper is a pre-print. The article is accepted for publication in IEEE Transactions on Information Forensics and Security (TIFS)

    Journal ref: 10.1109/TIFS.2020.3035252

  9. arXiv:1902.00671  [pdf, other

    cs.CV

    A Layer-Based Sequential Framework for Scene Generation with GANs

    Authors: Mehmet Ozgur Turkoglu, William Thong, Luuk Spreeuwers, Berkay Kicanaoglu

    Abstract: The visual world we sense, interpret and interact everyday is a complex composition of interleaved physical entities. Therefore, it is a very challenging task to generate vivid scenes of similar complexity using computers. In this work, we present a scene generation framework based on Generative Adversarial Networks (GANs) to sequentially compose a scene, breaking down the underlying problem into… ▽ More

    Submitted 2 February, 2019; originally announced February 2019.

    Comments: This paper was accepted at AAAI 2019

  10. arXiv:1510.07119  [pdf, other

    cs.CV

    Predicting Face Recognition Performance Using Image Quality

    Authors: Abhishek Dutta, Raymond Veldhuis, Luuk Spreeuwers

    Abstract: This paper proposes a data driven model to predict the performance of a face recognition system based on image quality features. We model the relationship between image quality features (e.g. pose, illumination, etc.) and recognition performance measures using a probability density function. To address the issue of limited nature of practical training data inherent in most data driven models, we h… ▽ More

    Submitted 24 October, 2015; originally announced October 2015.

    Comments: Submitted to TPAMI journal on Apr. 22, 2015. Decision of "Revise and resubmit as new" received on Sep. 10, 2015. At present, updating the paper to address the feedback and concerns of the two reviewers. The re-submitted paper will be uploaded as version 2 on arXiv

  11. arXiv:1310.6376  [pdf, other

    cs.CV

    Can Facial Uniqueness be Inferred from Impostor Scores?

    Authors: Abhishek Dutta, Raymond Veldhuis, Luuk Spreeuwers

    Abstract: In Biometrics, facial uniqueness is commonly inferred from impostor similarity scores. In this paper, we show that such uniqueness measures are highly unstable in the presence of image quality variations like pose, noise and blur. We also experimentally demonstrate the instability of a recently introduced impostor-based uniqueness measure of [Klare and Jain 2013] when subject to poor quality facia… ▽ More

    Submitted 23 October, 2013; originally announced October 2013.

    Comments: A 6 page paper presented in the Biometric Technologies in Forensic Science (BTFS) 2013 Conference, Oct 14-15 2013, Nijmegen, Netherlands. Full proceeding is available at http://www.ru.nl/clst/btfs/btfs-2013/