- document
-
Bouma, H. (author), van van Mil, J.D. (author), ten Hove, R.J.M. (author), Pruim, R. (author), van Rooijen, A.L. (author), Kern, A.S.Y. (author), Ballan, L. (author), Kromhout, B. (author), Dominic Wolbers, D. (author), de Moel, H. (author), Dolstra, N. (author), Bomhof, G. (author), de Rooij, D. (author)It is important to combat fraud on travel documents (e.g., passports), identity documents (e.g., ID-card) and breeder documents (e.g., birth certificates) to facilitate the travel of bona-fide travelers and to prevent criminal cross-border activities, such as terrorism, illegal migration, smuggling, and human trafficking. However, it is...conference paper 2022
- document
-
Rooij S.B. van, (author), Bouma, H. (author), van Mil, J.D. (author), ten Hove, R.J.M. (author)The increasing complexity of security challenges requires Law Enforcement Agencies (LEAs) to have improved analysis capabilities, e.g., with the use of Artificial Intelligence (AI). However, it is challenging to make large enough high-quality training and testing datasets available to the community that is developing AI tools to support LEAs in...conference paper 2022
- document
-
Bouma, H. (author), Reuter, A. (author), Brouwer, P. (author), George, M. (author), Ferryman, J. (author), Boyle, J. (author), Juršėnas, A. (author), Karinsalo, A. (author), Pruim, R.H.R. (author), van Rooijen, A.L. (author), ten Hove, R.J.M. (author), van Mil, J.D. (author), Gicic, D. (author), Goller, G. (author), Ledinauskas, E. (author), Ruseckas, J. (author), Kromhout, B. (author), de Moel, H. (author), Dolstra, N. (author)Authentication of travel documents (e.g., passports) and breeder documents (e.g., birth certificates) is important to facilitate legal movement of passengers and to prevent cross-border crime, such as terrorism, smuggling, illegal migration and human trafficking. However, it is time consuming and difficult to verify all security features, the...conference paper 2021
- document
-
Bouma, H. (author), Pruim, R.H.R. (author), van Rooijen, A.L. (author), ten Hove, R.J.M. (author), van Mil, J.D. (author), Kromhout, B. (author)The current capabilities and capacities of border guards and immigration services can be enhanced using technologies that automate the analysis of travel, identity and breeder documents in order to detect fraud. These technologies can be relevant for countering emerging threats in document and identity verification (e.g., forged documents,...conference paper 2020
- document
-
Repasi, E. (author), Keßler, S. (author), Bijl, P. (author), ten Hove, R.J.M. (author), Labarre, L. (author), Wegner, D. (author), Wittenstein, W. (author), Bürsing, H. (author)ECOMOS is a multinational effort within the framework of an EDA Project Arrangement. Its aim is to provide a generally accepted and harmonized European computer model for computing nominal Target Acquisition (TA) ranges of optronic imagers operating in the Visible or thermal Infrared (IR). The project involves close co-operation of defense and...conference paper 2019
- document
-
Bouma, H. (author), Schutte, K. (author), ten Hove, R.J.M. (author), Burghouts, G.J. (author), Baan, J. (author)Surveillance systems are essential for the protection of military compounds and critical infrastructures. Automatic recognition of suspicious activities can augment human operators to find relevant threats. Common solutions for behavior analysis or action recognition require large amounts of training data. However, suspicious activities and...conference paper 2018
- document
-
Dijk, J. (author), Bijl, P. (author), Oppeneer, M. (author), ten Hove, R.J.M. (author), van Iersel, M. (author)The Electro-Optical Signal Transmission and Ranging (EOSTAR) model is an image-based Tactical Decision Aid (TDA) for thermal imaging systems (MWIR/LWIR) developed for a sea environment with an extensive atmosphere model. The Triangle Orientation Discrimination (TOD) Target Acquisition model calculates the sensor and signal processing effects on...conference paper 2017
- document
-
Schutte, K. (author), Burghouts, G. (author), van der Stap, N. (author), Westerwoudt, V.L. (author), Bouma, H. (author), Kruithof, M.C. (author), Baan, J. (author), ten Hove, R.J.M. (author)The bottleneck in situation awareness is no longer in the sensing domain but rather in the data interpretation domain, since the number of sensors is rapidly increasing and it is not affordable to increase human data-analysis capacity at the same rate. Automatic image analysis can assist a human analyst by alerting when an event of interest...conference paper 2016
- document
-
Bouma, H. (author), Burghouts, G.J. (author), den Hollander, R.J.M. (author), van der Zee, S. (author), Baan, J. (author), ten Hove, R.J.M. (author), van Diepen, C.J. (author), van den Haak, W.P. (author), van Rest, J. (author)Deception detection is valuable in the security domain to distinguish truth from lies. It is desirable in many security applications, such as suspect and witness interviews and airport passenger screening. Interviewers are constantly trying to assess the credibility of a statement, usually based on intuition without objective technical support....conference paper 2016
- document
-
Burghouts, G.J. (author), van Slingerland, P. (author), ten Hove, R.J.M. (author), den Hollander, R.J.M. (author), Schutte, K. (author)Theft of cargo from a truck or attacks against the driver are threats hindering the day to day operations of trucking companies. In this work we consider a system, which is using surveillance cameras mounted on the truck to provide an early warning for such evolving threats. Low-level processing involves tracking people and calculating motion...conference paper 2014
- document
-
Burghouts, G.J (author), Schutte, K (author), ten Hove, R.J.M. (author), van den Broek, S.P. (author), Baan, J. (author), Rajadell, O. (author), van Huis, J.R. (author), van Rest, J.H.C. (author), Hanckmann, P. (author), Bouma, H. (author), Sanroma, G. (author), Evans, M. (author), Ferryman, J. (author)Threat detection is a challenging problem, because threats appear in many variations and differences to normal behaviour can be very subtle. In this paper, we consider threats on a parking lot, where theft of a truck’s cargo occurs. The theft takes place in very different forms, in the midst of many people who pose no threat. The threats range...article 2014
- document
-
Burghouts, G.J. (author), de Penning, H.L.H. (author), ten Hove, R.J.M. (author), Landsmeer, S. (author), van den Broek, S.P. (author), Hollander, R.J.M. (author), Hanckmann, P. (author), Kruithof, M.C. (author), van Leeuwen, C.J. (author), Korzec, S. (author), Bouma, H. (author), Schutte, K. (author)The contribution of this paper is a search engine that recognizes and describes 48 human actions in realistic videos. The core algorithms have been published recently, from the early visual processing (Bouma, 2012), discriminative recognition (Burghouts, 2012) and textual description (Hankmann, 2012) of 48 human actions. We summarize the key...conference paper 2013
- document
-
Burghouts, G.J. (author), van den Broek, S.P. (author), ten Hove, R.J.M. (author)Human actions are spatio-temporal patterns. A popular representation is to describe the action by features at interest points. Because the interest point detection and feature description are generic processes, they are not tuned to discriminate one particular action from the other. In this paper we propose a saliency measure for each individual...conference paper 2013
- document
-
Burghouts, G.J. (author), Eendebak, P.T. (author), Bouma, H. (author), ten Hove, R.J.M. (author)Action recognition is a hard problem due to the many degrees of freedom of the human body and the movement of its limbs. This is especially hard when only one camera viewpoint is available and when actions involve subtle movements. For instance, when looked from the side, checking one’s watch may look very similar to crossing one’s arms. In this...conference paper 2013
- document
-
Bouma, H. (author), Burghouts, G.J. (author), de Penning, H.L.H. (author), Hanckmann, P. (author), ten Hove, R.J.M. (author), Korzec, S. (author), Kruithof, M.C. (author), Landsmeer, S. (author), van Leeuwen, C.J. (author), van den Broek, S.P. (author), Halma, A.H.R. (author), den Hollander, R.J.M. (author), Schutte, K. (author)Ground surveillance is normally performed by human assets, since it requires visual intelligence. However, especially for military operations, this can be dangerous and is very resource intensive. Therefore, unmanned autonomous visual-intelligence systems are desired. In this paper, we present an improved system that can recognize actions of a...conference paper 2013
- document
-
Burghouts, G.J. (author), Eendebak, P.T. (author), Bouma, H. (author), ten Hove, R.J.M. (author)This paper describes the TNO action recognition system that was used to generate the results for our submission to the competition track of the THUMOS ’13 challenge at ICCV ’13. This system deploys only the STIP features that were provided on the website of the challenge. A bag-of-features model is extended with three noveltiesconference paper 2013
- document
-
Bouma, H. (author), Azzopardi, G. (author), Spitters, M.M. (author), de Wit, J.J. (author), Versloot, C.A. (author), van der Zon, R.W.L. (author), Eendebak, P.T. (author), Baan, J. (author), ten Hove, R.J.M. (author), van Eekeren, A.W.M. (author), ter Haar, F.B. (author), den Hollander, R.J.M. (author), van Huis, R.J. (author), de Boer, M.H.T. (author), van Antwerpen, G. (author), Broekhuijsen, B.J. (author), Daniele, L.M. (author), Brandt, P. (author), Schavemaker, J.G.M. (author), Kraaij, W. (author), Schutte, K. (author)We describe the TNO system and the evaluation results for TRECVID 2013 Multimedia Event Detection (MED) and instance search (INS) tasks. The MED system consists of a bag-of-word (BOW) approach with spatial tiling that uses low-level static and dynamic visual features, an audio feature and high-level concepts. Automatic speech recognition (ASR)...conference paper 2013
- document
-
Bouma, H. (author), Hanckmann, P. (author), Marck, J.W. (author), de Penning, H.L.H. (author), den Hollander, R.J.M. (author), ten Hove, R.J.M. (author), van den Broek, S.P. (author), Schutte, K. (author), Burghouts, G.J. (author)Surveillance is normally performed by humans, since it requires visual intelligence. However, it can be dangerous, especially for military operations. Therefore, unmanned visual-intelligence systems are desired. In this paper, we present a novel system that can recognize human actions. Central to the system is a break-down of high-level...conference paper 2012