Blaž MedenUniversity of Ljubljana · Faculty of Computer and Information Science
Blaž Meden
PhD (Computer Science)
About
25
Publications
50,455
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
801
Citations
Introduction
Image-based biometrics, Generative models, Deep learning, Computer vision
Publications
Publications (25)
In recent years, there has been increasing interest in the conversion of images into audio descriptions. This is a field that lies at the intersection of Computer Vision (CV) and Natural Language Processing (NLP), and it involves various tasks, including creating textual descriptions of images and converting them directly into auditory representati...
Achieving Lifelong Open-ended Learning Autonomy (LOLA) is a key challenge in the field of robotics to advance to a new level of intelligent response. Robots should be capable of discovering goals and learn skills in specific domains that permit achieving the general objectives the designer establishes for them. In addition, robots should reuse prev...
Biometric recognition technology has made significant advances over the last decade and is now used across a number of services and applications. However, this widespread deployment has also resulted in privacy concerns and evolving societal expectations about the appropriate use of the technology. For example, the ability to automatically extract...
Ear detection represents one of the key components of contemporary ear recognition systems. While significant progress has been made in the area of ear detection over recent years, most of the improvements are direct results of advances in the field of visual object detection. Only a limited number of techniques presented in the literature are doma...
In this work we have implemented and tested a framework for training and analyzing auto-encoding architectures for the purpose of encoding state space representations into latent space, and thus compressing the essential space properties depicted in the training image dataset. We explored the possibility of incorporating a forward model in between...
>>> Springer Nature SharedIt initiative publicly shares a full-text view-only version of the paper by using the link https://rdcu.be/Os7a! >>> Ear recognition technology has long been dominated by (local) descriptor-based techniques due to their formidable recognition performance and robustness to various sources of image variability. While deep-le...
Purpose:
The required training sample size for a particular machine learning (ML) model applied to medical imaging data is often unknown. The purpose of this study was to provide a descriptive review of current sample-size determination methodologies in ML applied to medical imaging and to propose recommendations for future work in the field.
Met...
In this work we analyze the impact of denoising, contrast and edge enhancement using the Deceived Non Local Means (DNLM) filter in a Convolutional Neural Network (CNN) based approach for age estimation using digital X-ray images from hands. The DNLM filter contains two parameters which control edge enhancement and denoising. Increasing levels were...
Image and video data are today being shared between government entities and other relevant stakeholders on a regular basis and require careful handling of the personal information contained therein. A popular approach to ensure privacy protection in such data is the use of deidentification techniques, which aim at concealing the identity of individ...
Among the different biometric traits that can be used for person recognition, the human iris is generally considered to be among the most accurate. However, despite a plethora of desirable characteristics, iris recognition is not widely as widely used as competing biometric modalities likely due to the high cost of existing commercial iris-recognit...
IoT has seen steady growth over recent years – smart home appliances, smart personal gear, personal assistants and many more. The same is true for the field of bio-metrics where the need for automatic and secure recognition schemes have spurred the development of fingerprint-and face-recognition mechanisms found today in most smart phones and simil...
Face deidentification is an active topic amongst privacy and security researchers. Early deidentification methods relying on image blurring or pixelization were replaced in recent years with techniques based on formal anonymity models that provide privacy guaranties and at the same time aim at retaining certain characteristics of the data even afte...
The article describes the making of an art piece combining stone sculpture and virtual water. The motivation for this art piece was to enrich the usual static format of a stone sculpture with a dynamic dimension. The dynamic dimension is attained with virtual water droplets running over the stone surface which behave as real water droplets. The 3-D...
In this paper we present the implementation of a tracking system, which operates in near-infrared (IR) spectrum and visible spectrum. The system was developed to track moving objects in closed areas. Practical usage was demonstrated by tracking IR markers on moving people, while they were interacting with each other. We used IR markers to improve t...