- document
-
Bouma, H. (author), van van Mil, J.D. (author), ten Hove, R.J.M. (author), Pruim, R. (author), van Rooijen, A.L. (author), Kern, A.S.Y. (author), Ballan, L. (author), Kromhout, B. (author), Dominic Wolbers, D. (author), de Moel, H. (author), Dolstra, N. (author), Bomhof, G. (author), de Rooij, D. (author)It is important to combat fraud on travel documents (e.g., passports), identity documents (e.g., ID-card) and breeder documents (e.g., birth certificates) to facilitate the travel of bona-fide travelers and to prevent criminal cross-border activities, such as terrorism, illegal migration, smuggling, and human trafficking. However, it is...conference paper 2022
- document
-
Rooij S.B. van, (author), Bouma, H. (author), van Mil, J.D. (author), ten Hove, R.J.M. (author)The increasing complexity of security challenges requires Law Enforcement Agencies (LEAs) to have improved analysis capabilities, e.g., with the use of Artificial Intelligence (AI). However, it is challenging to make large enough high-quality training and testing datasets available to the community that is developing AI tools to support LEAs in...conference paper 2022
- document
-
Bouma, H. (author), Reuter, A. (author), Brouwer, P. (author), George, M. (author), Ferryman, J. (author), Boyle, J. (author), Juršėnas, A. (author), Karinsalo, A. (author), Pruim, R.H.R. (author), van Rooijen, A.L. (author), ten Hove, R.J.M. (author), van Mil, J.D. (author), Gicic, D. (author), Goller, G. (author), Ledinauskas, E. (author), Ruseckas, J. (author), Kromhout, B. (author), de Moel, H. (author), Dolstra, N. (author)Authentication of travel documents (e.g., passports) and breeder documents (e.g., birth certificates) is important to facilitate legal movement of passengers and to prevent cross-border crime, such as terrorism, smuggling, illegal migration and human trafficking. However, it is time consuming and difficult to verify all security features, the...conference paper 2021
- document
-
van Rooijen, A.L. (author), Bouma, H. (author), Pruim, R.H.R. (author), Baan, J. (author), Uijens, W.R. (author), van Mil, J.D. (author)Person re-identification (Re-ID) is a valuable technique because it can assist in finding suspects after a terrorist attack. However, the machine learning algorithms for person Re-ID are usually trained on large datasets with images of many different people in a public space. This could pose privacy concerns for the people involved. One way to...conference paper 2020
- document
-
Bouma, H. (author), Pruim, R.H.R. (author), van Rooijen, A.L. (author), ten Hove, R.J.M. (author), van Mil, J.D. (author), Kromhout, B. (author)The current capabilities and capacities of border guards and immigration services can be enhanced using technologies that automate the analysis of travel, identity and breeder documents in order to detect fraud. These technologies can be relevant for countering emerging threats in document and identity verification (e.g., forged documents,...conference paper 2020
- document
- van Mil, J.D. (author) public lecture 2020