Browsing NTNU Open by Author "Raja, Kiran"
Now showing items 1-20 of 33
-
Ansikt til ansikt med teknologi: En ny æra av kontorinnsjekk
Al-Zouabi, Jabr; Behrens, Jakob; Sørli, Kristian (Bachelor thesis, 2024)Evidi ønsket å transformere måten ansatte registrerer seg ved ankomst til kontoret, og søkte en innovativ løsning for dette formålet. Løsningen som ble foreslått, er en digital infotavle drevet av Microsoft’s Azure AI Face ... -
Compact and Mobile Full-Field Optical Coherence Tomography Sensor for Subsurface Fingerprint Imaging
Auksorius, Egidijus; Raja, Kiran; Topcu, Berkay; Ramachandra, Raghavendra; Busch, Christoph; Boccara, Claude A (Peer reviewed; Journal article, 2020)Conventional fingerprint sensors that are deployed in real-life applications lack the ability to peer inside a finger beyond the external surface. Subsurface information can provide complimentary biometric characteristics ... -
Cross-sensor periocular biometrics in a global pandemic: Comparative benchmark and novel multialgorithmic approach
Alonso-Fernandez, Fernando; Raja, Kiran; Ramachandra, Raghavendra; Busch, Christoph; Bigun, Josef; Vera-Rodriguez, Ruben; Fierrez, Julian (Peer reviewed; Journal article, 2022)The massive availability of cameras and personal devices results in a wide variability between imaging conditions, producing large intra-class variations and a significant performance drop if images from heterogeneous ... -
Data Architecture and Design of in-vivo Neurosurgical Hyperspectral Image Database
Hisuin, Gemal Hamid (Master thesis, 2022)In recent years, the use of hyperspectral imaging (HSI) for microneurosurgical applications has been introduced. One of the most significant challenge that researchers and neurosurgeons face when developing or applying ... -
Detecting Sexual Predatory Chats by Perturbed Data and Balanced Ensembles
Borj, Parisa Rezaee; Raja, Kiran; Bours, Patrick (Chapter, 2021)Securing the safety of the children on online platforms is critical to avoid the mishaps of them being abused for sexual favors, which usually happens through predatory conversations. A number of approaches have been ... -
E2F-GAN: Eyes-to-Face Inpainting via Edge-Aware Coarse-to-Fine GANs
Hassanpour, Ahmad; Daryani, Amir Etefaghi; Mirmahdi, Mahdieh; Raja, Kiran; Yang, Bian; Busch, Christoph; Fierrez, Julian (Peer reviewed; Journal article, 2022)Face inpainting is a challenging task aiming to fill the damaged or masked regions in face images with plausibly synthesized contents. Based on the given information, the reconstructed regions should look realistic and ... -
Efficiently Weaponizing Vulnerabilities and Automating Vulnerability Hunting
Bai, Simen; Bøe, Even Bryhn; Hegland-Antonsen, Ruben Christoffer (Bachelor thesis, 2022)Cybersikkerhet har aldri vært viktigere, spesielt med hensyn til den økende avhengigheten av informasjonsteknologi. Cybersikkerhetsindustrien opplever en rask vekst i mengden rapporterte sårbarheter; en trend som forventes ... -
Estimating Bidirectional Reflectance of Materials Using Machine Learning Techniques
Nath, Shaikat Deb (Master thesis, 2022)A Bidirectional Reflectance Distribution Function (BRDF) characterizes the reflectance behavior of materials to define their optical properties. Bidirectional reflectance can be used to understand the visual appearance ... -
An Experience Report on Transitioning to Blended Learning and Portfolio-assessment: a Cross-campus Course in Programming
Rouhani, Majid; Olsø, Atle; Styve, Arne; Raja, Kiran (Peer reviewed; Journal article, 2022)The transition from traditional to digital teaching has led to several challenges for students and educators under the COVID-19 pandemic. Most universities are experiencing remote online delivery and assessment for the ... -
From Roadside-rendering to Reality: Advancing NeRF Pipeline for Photorealistic 3D Views in Autonomous Driving
Tabassum, Shaira (Master thesis, 2024)Neural Radiance Fields (NeRF) have emerged as a prominent research area over the last three years showcasing considerable potential in 3D scene representation and high-fidelity novel-view synthesis. Its rapid growth has ... -
Improved ear verification after surgery - An approach based on collaborative representation of locally competitive features
Ramachandra, Raghavendra; Raja, Kiran; Venkatesh, Sushma Krupa; Busch, Christoph (Journal article; Peer reviewed, 2018)Ear characteristic is a promising biometric modality that has demonstrated good biometric performance. In this paper, we investigate a novel and challenging problem to verify a subject (or user) based on the ear characteristics ... -
Konverterings- og overføringsprogram
Sharif, Fasih Mohammad (Bachelor thesis, 2023)Formålet med dette prosjektet er å utvikle et nytt program basert på en allerede eksisterende programvare ved å videreutvikle den og skape et bedre brukergrensesnitt. Programmet i seg selv må være i stand til å konvertere ... -
Konverterings- og overføringsprogram
Retterås, Ole Petter (Bachelor thesis, 2023)Innlandet fylkesarkiv ønsket seg en brukervennlig og moderne løsning, som kunne utføre konvertering av mange ulike filtyper for langtidsarkivering, ved å bevare filstruktur/mappestruktur som kunne eliminere menneskelig ... -
MIPGAN—Generating Strong and High Quality Morphing Attacks Using Identity Prior Driven GAN
Zhang, Haoyu; Venkatesh, Sushma; Ramachandra, Raghavendra; Raja, Kiran; Damer, Naser; Busch, Christoph (Journal article; Peer reviewed, 2021)Face morphing attacks target to circumvent Face Recognition Systems (FRS) by employing face images derived from multiple data subjects (e.g., accomplices and malicious actors). Morphed images can be verified against ... -
Morphing Attack Detection-Database, Evaluation Platform, and Benchmarking
Raja, Kiran; Ferrara, Matteo; Franco, Annalisa; Spreeuwers, Luuk; Batskos, Ilias; Wit, Florens de; Gomez-Barrero, Marta; Scherhag, Ulrich; Fischer, Daniel; Venkatesh, Sushma; Singh, Jag Mohan; Li, Guoqiang; Bergeron, Loïc; Isadskiy, Sergey; Ramachandra, Raghavendra; Rathgeb, Christian; Frings, Dinusha; Seidel, Uwe; Knopjes, Fons; Veldhuis, Raymond N.J.; Maltoni, Davide; Busch, Christoph (Peer reviewed; Journal article, 2021)Morphing attacks have posed a severe threat to Face Recognition System (FRS). Despite the number of advancements reported in recent works, we note serious open issues such as independent benchmarking, generalizability ... -
Morphing Attacks and Detection using Spectral Images
Aryal, Himali (Master thesis, 2022)Face recognition systems assume that a person's face serves as the unique link to identify them. A morph attack happens when two people with similar facial features morph their faces together, resulting in a face image ... -
Multichannel Residual Cues for Fine-Grained Classification in Wireless Capsule Endoscopy
Vats, Anuja; Raja, Kiran; Pedersen, Marius; Mohammed, Ahmed Kedir (Peer reviewed; Journal article, 2022)Early diagnosis of gastrointestinal pathologies leads to timely medical intervention and prevents disease development. Wireless Capsule Endoscopy (WCE) is used as a non-invasive alternative for gastrointestinal examination. ... -
On the Relation Between ROC and CMC
Veldhuis, Raymond Nicolaas Johan; Raja, Kiran (Journal article; Peer reviewed, 2023)We formulate a compact relation between the probabilistic Receiver Operating Characteristic (ROC) and the probabilistic Cumulative Match Characteristic (CMC) that predicts every entry of the probabilistic CMC as a functional ... -
Online Grooming Detection on Social Media Platforms
Borj, Parisa Rezaee (Doctoral theses at NTNU;2023:111, Doctoral thesis, 2023)Online grooming detection has become a critical research topic in the era of extensive data analysis. It is essential to protect vulnerable users, particularly adolescents, against sexual predation on online platforms and ... -
Online grooming detection: A comprehensive survey of child exploitation in chat logs
Rezaee Borj, Parisa; Raja, Kiran; Bours, Patrick Adrianus (Peer reviewed; Journal article, 2022)Social media platforms present significant threats against underage users targeted for predatory intents. Many early research works have applied the footprints left by online predators to investigate online grooming. While ...