Refine
Year of publication
Document Type
- Master's Thesis (39)
- Bachelor Thesis (19)
- Article (4)
- Conference Proceeding (4)
- Book (1)
- Contribution to a Periodical (1)
Has Fulltext
- yes (68)
Keywords
- ImageJ (7)
- Bildqualität (4)
- Bildverarbeitung (4)
- Image Processing (4)
- Probekörper <Werkstoffprüfung> (4)
- Detektion (3)
- Modulationsübertragungsfunktion (3)
- Tone Mapping (3)
- Authentifikation (2)
- Browser (2)
- Digitalkamera (2)
- HDR (2)
- Hough-Transformation (2)
- Internet (2)
- Java (2)
- Kalibrieren <Messtechnik> (2)
- Konstanzprüfung (2)
- Lichtfarbe (2)
- MTF (2)
- Mammographie (2)
- PAS 1054 (2)
- Passwort (2)
- Photographie (2)
- Polarisation (2)
- Prüfkörper (2)
- Radiologie (2)
- Rauschunterdrückung (2)
- Spatial Frequency Response (2)
- Weißabgleich (2)
- constancy test (2)
- digital mammography (2)
- 3D Recovery (1)
- 3D reconstruction (1)
- 3D-Character (1)
- 3D-Charakter (1)
- 3D-Rekonstruktion (1)
- 8-Punkt-Algo-rithmus (1)
- 8-point algorithm (1)
- ActionScript (1)
- Adobe Flex 3.0 (1)
- Algorithm (1)
- Algorithmus (1)
- Ambisonics (1)
- Android (1)
- Angenieux (1)
- Approximation (1)
- Arnold-und-Richter-KG München (1)
- Aufnahmehelfer (1)
- Augenfolgebewegung (1)
- Authentication (1)
- Authentifizierung (1)
- Autofokus (1)
- Automation (1)
- BRDF (1)
- Back Projection (1)
- Beamer (1)
- Beamforming (1)
- Beamforming <Signalverarbeitung> (1)
- Beleuchtungsmodelle (1)
- Belichtungsreihe (1)
- Bewegungsschätzung (1)
- Bewegungsunschärfe (1)
- Bidirektionale Reflektanzverteilungsfunktion (1)
- Bilateral Filtering (1)
- Bildfehler (1)
- Bildkodierung (1)
- Bildwand (1)
- Bildwiedergabesysteme (1)
- Binaural Rendering (1)
- Binaural Reproduction (1)
- Bioluminescence (1)
- Biolumineszenz (1)
- Black box testing (1)
- Blackbox (1)
- Blockchain (1)
- Brennweite (1)
- Browser Cache (1)
- CIE L*a*b* (1)
- COVID-19 Pandemic (1)
- Calibration (1)
- Camera calibration (1)
- Carl Zeiss Jena GmbH (1)
- Cascaded Hough Transform (1)
- Cg (1)
- CgFx (1)
- China (1)
- Circle recognition (1)
- Colour Constancy (1)
- Colour of the Illumination (1)
- Compression (1)
- Computer Aided Detection (1)
- Computer Generated Hologram (1)
- Computer Science (1)
- Computer generierte Hologramme (1)
- Computeranimation (1)
- Consumer-Kameras (1)
- DICOM (1)
- DQE (1)
- DSC (1)
- DVB <Rundfunktechnik> (1)
- Datenvisualisierung (1)
- Debevec and Malik (1)
- Detection (1)
- Deutschland (1)
- Deutschland / Bundesamt für Strahlenschutz (1)
- Deviation (1)
- Digital Still Camera (1)
- Digital mammography (1)
- Digitale Mammographie (1)
- Digitale Photographie (1)
- Distortion (1)
- Dreidimensionale Rekonstruktion (1)
- Dynamikkompression (1)
- E-Health (1)
- E-Learning (1)
- EIT (1)
- Echtzeit (1)
- Eigengesichter (1)
- Eliza (1)
- Endoskopie (1)
- Epipolar Geometry (1)
- Epipolargeometrie (1)
- Evaluation (1)
- Event Information Table (1)
- Extraction (1)
- Extraktion (1)
- Eye-Tracking (1)
- Fachverband für Strahlenschutz (1)
- Farberscheinung (1)
- Farbkorrektur (1)
- Farbmetrik (1)
- Farbraumtransformation (1)
- Farbwiedergabe (1)
- Filmobjektive (1)
- Flachdetektor (1)
- Fluchtpunktdetektion (1)
- Fluoroscopy (1)
- Fluoroskopie (1)
- Flüssigkristallanzeige (1)
- Fokus (1)
- Fotopolymer (1)
- Fouriertransformation (1)
- Fractal Dimension (1)
- Fraktale Dimension (1)
- Frequenz (1)
- Frequenzanalyse (1)
- Fresnel Lens (1)
- Fresnellinse (1)
- Fujinon (1)
- Fundamental Matrix (1)
- Fundamental-Matrix (1)
- GPU (1)
- Gabor wavelets (1)
- Germany (1)
- Gesichtserkennung (1)
- Gesundheitstelematik (1)
- Gewebephantom (1)
- Glanzdetektion (1)
- Glanzkorrektur (1)
- Grey Scale Display Function (GSDF) (1)
- HDRI (1)
- HDTV (1)
- Hierarchisches Graph Matching (1)
- High Dynamic Range (1)
- High Dynamic Range Imaging (1)
- Higher Education (1)
- Hochschulbildung (1)
- Holographic Optical Element (1)
- Holographie (1)
- Hough Transform (1)
- Human Motion Capture (1)
- Hybrid (1)
- Illumination (1)
- Image Coding (1)
- Image J (1)
- Image Quality (1)
- Individual Psychological and Social Coping Resources (1)
- Interaktives Fernsehen (1)
- Interferenz-Filter (1)
- Internationale Kommission für Strahlenschutz (1)
- Java <Programmiersprache> (1)
- Java Media Framework API (1)
- K-nearest Neighbors (1)
- Kalibrierung (1)
- Kamerakalibrierung (1)
- Kameraprofile (1)
- Kaskadierte Hough-Transformation (1)
- Kd-Tree (1)
- Kleintierröntgen (1)
- Kompression (1)
- Kontrast (1)
- Konturgenerierung (1)
- Koordinatentransformation (1)
- Kreiserkennung (1)
- LCD (1)
- LHT (1)
- Laplace-Pyramide (1)
- Laplacian-Pyramid (1)
- Lapped Transform (1)
- Leica (1)
- Lernplattform (1)
- Lernprogramm (1)
- Level-Set-Methoden (1)
- Linkage Descriptor (1)
- Live-Streaming (1)
- MPEG 2 (1)
- MPEG2 (1)
- MPEG2-Elementarstrom (1)
- Magnet-Resonanz-Tomographie (1)
- Mammography (1)
- Marker recognition (1)
- Marker-Erkennung (1)
- Mediensteuerung (1)
- Mensch-Maschine-Kommunikation (1)
- Microphone Arrays (1)
- Missing Joints or Markers (1)
- Models (1)
- Modulation Transfer Function (1)
- Monochromator (1)
- Multiple Exposures (1)
- NMR-Tomographie (1)
- NPS (1)
- Nelder-Mead Method (1)
- Nelder-Mead-Verfahren (1)
- Nichtlineare Diffusion (1)
- Noise (1)
- Noise Reduction (1)
- Noisereduction (1)
- Nonlinear Diffusion (1)
- OCR (1)
- Objektivcharakterisierung (1)
- Objektivparameter (1)
- Offline-Schnitt (1)
- Online Spiele (1)
- Optical Character Recognition (1)
- Optical Imaging (1)
- Optical motion capture (1)
- Optimization (1)
- Optische Bildgebung (1)
- Optische Zeichenerkennung (1)
- Optisches Motion Capture (1)
- Ortsauflösung (1)
- PAS (1)
- PMD (1)
- Parallaxe (1)
- Password (1)
- Peer Exclusion (1)
- Perceptual Evaluation (1)
- Phantom (1)
- Phasen (1)
- Photoakustische Spektrometrie (1)
- Photostudio (1)
- Pixelträgheit (1)
- Polarization (1)
- Porträtphotographie (1)
- Privacy (1)
- Privatheit (1)
- Projection Screen (1)
- Qualitätskriterien (1)
- Quantification of noise (1)
- RED Epic (1)
- Radiographie (1)
- Radiological Display-Devices (1)
- Radiological Guide (1)
- Radiologische Bildwiedergabesysteme (1)
- Raumauflösung (1)
- Raumwinkel (1)
- Rauschquantifizierung (1)
- Rauschreduktion (1)
- Real-time rendering (1)
- Realtime (1)
- Reflexion <Physik> (1)
- Rendering (1)
- Rich Internet Application (1)
- Risikobasierte Authentifizierung (1)
- Risk-based Authentication (1)
- Räumliche Frequenzantwort (1)
- Räumliches Sehen (1)
- Rückprojektion (1)
- SFR_Edge (1)
- SFR_Siemens (1)
- STEM – Science Technology Engineering Mathematics (1)
- Schatten (1)
- Schneider-Kreuznach (1)
- Schnittliste (1)
- Security (1)
- Security+-Zertifikat (1)
- Segmentierung (1)
- Selbstwirksamkeit (1)
- Self-Efficacy (1)
- Shader <Informatik> (1)
- Shadows (1)
- Shape measurement (1)
- Simulcast (1)
- Skull-Stripping (1)
- Small Animal Radiology (1)
- Software-Ergonomie (1)
- Softwareergonomie (1)
- Spatial Audio Reproduction (1)
- Spatial Light Modulator (1)
- Spektrale Empfindlichkeit (1)
- Spektralempfindlichkeit (1)
- Spherical Microphone Arrays (1)
- Sprachsteuerung (1)
- Stereo-3D (1)
- Stereobild (1)
- Stereobildpaar (1)
- Stereopsis (1)
- Stereoskopie (1)
- Stress (1)
- Studie (1)
- Study (1)
- Synthetisches Hologramm (1)
- Test Automatisierung (1)
- Testing framework (1)
- Testverfahren (1)
- Thermographie (1)
- Thermoregulation (1)
- Tiefenerkennung (1)
- Tiefenschätzung (1)
- Time of flight (1)
- Tissue like phantom (1)
- ToF-Kamera (1)
- Tonemapping (1)
- Touchscreen-Technologie (1)
- Two-wavelength holographic contouring (1)
- Usability (1)
- Verkehrsüberwachung (1)
- Verzeichnung (radiale) (1)
- Videoanalyse (1)
- Videobearbeitung (1)
- Videobild (1)
- Videofehler (1)
- Virtual Acoustics (1)
- Visualisierung (1)
- Westdeutscher Rundfunk (1)
- White Balance (1)
- Wärmebildkamera (1)
- Zeiss (1)
- Zusammenfassung (1)
- Zwei-Wellenlängen-Verfahren (1)
- approximation (1)
- automatische Auswertung (1)
- bilaterale Filter (1)
- camera profiles (1)
- color correction (1)
- colorspace transformation (1)
- consumer cameras (1)
- detection (1)
- digitale Kamera (1)
- digitale Mammographie (1)
- displaytechnology (1)
- edit decision list (1)
- elementary stream (1)
- flat panel detector (1)
- focal length (1)
- hochdynamische Bilder (1)
- holografisch optische Elemente (1)
- holographische Formvermessung (1)
- holography (1)
- human-computer-interaction (1)
- iCAM (1)
- iTV (1)
- image errors (1)
- inertance of pixels (1)
- interference filter (1)
- learning management system (1)
- mediacontrol (1)
- mobile Bildwiedergabesysteme (1)
- mobile Endgeräte (1)
- mobile devices (1)
- modulation transfer function (1)
- monochromator (1)
- motion blur (1)
- optical filtering (1)
- optische Filterung (1)
- phantom (1)
- photopolymer (1)
- photostudio (1)
- portraitphotography (1)
- prime lens (1)
- quality parameter (1)
- räumlicher Lichtmodulator (1)
- spectral response (1)
- statistical quality control (1)
- statistische Qualitätskontrolle (1)
- test procedure (1)
- touchscreen (1)
- vanishing point detection (1)
- video analysis (1)
- video cut (1)
- video errors (1)
- voice control (1)
- Überlappende Transformation (1)
Faculty
- Fakultät 07 / Institut für Medien- und Phototechnik (68) (remove)
In this work, we propose a novel data-driven approach to recover missing or corrupted motion capture data, either in the form of 3D skeleton joints or 3D marker trajectories. We construct a knowledge-base that contains prior existing knowledge, which helps us to make it possible to infer missing or corrupted information of the motion capture data. We then build a kd-tree in parallel fashion on the GPU for fast search and retrieval of this already available knowledge in the form of nearest neighbors from the knowledge-base efficiently. We exploit the concept of histograms to organize the data and use an off-the-shelf radix sort algorithm to sort the keys within a single processor of GPU. We query the motion missing joints or markers, and as a result, we fetch a fixed number of nearest neighbors for the given input query motion. We employ an objective function with multiple error terms that substantially recover 3D joints or marker trajectories in parallel on the GPU. We perform comprehensive experiments to evaluate our approach quantitatively and qualitatively on publicly available motion capture datasets, namely CMU and HDM05. From the results, it is observed that the recovery of boxing, jumptwist, run, martial arts, salsa, and acrobatic motion sequences works best, while the recovery of motion sequences of kicking and jumping results in slightly larger errors. However, on average, our approach executes outstanding results. Generally, our approach outperforms all the competing state-of-the-art methods in the most test cases with different action sequences and executes reliable results with minimal errors and without any user interaction.
High-quality rendering of spatial sound fields in real-time is becoming increasingly important with the steadily growing interest in virtual and augmented reality technologies. Typically, a spherical microphone array (SMA) is used to capture a spatial sound field. The captured sound field can be reproduced over headphones in real-time using binaural rendering, virtually placing a single listener in the sound field. Common methods for binaural rendering first spatially encode the sound field by transforming it to the spherical harmonics domain and then decode the sound field binaurally by combining it with head-related transfer functions (HRTFs). However, these rendering methods are computationally demanding, especially for high-order SMAs, and require implementing quite sophisticated real-time signal processing. This paper presents a computationally more efficient method for real-time binaural rendering of SMA signals by linear filtering. The proposed method allows representing any common rendering chain as a set of precomputed finite impulse response filters, which are then applied to the SMA signals in real-time using fast convolution to produce the binaural signals. Results of the technical evaluation show that the presented approach is equivalent to conventional rendering methods while being computationally less demanding and easier to implement using any real-time convolution system. However, the lower computational complexity goes along with lower flexibility. On the one hand, encoding and decoding are no longer decoupled, and on the other hand, sound field transformations in the SH domain can no longer be performed. Consequently, in the proposed method, a filter set must be precomputed and stored for each possible head orientation of the listener, leading to higher memory requirements than the conventional methods. As such, the approach is particularly well suited for efficient real-time binaural rendering of SMA signals in a fixed setup where usually a limited range of head orientations is sufficient, such as live concert streaming or VR teleconferencing.
Microphone arrays consisting of sensors mounted on the surface of a rigid, spherical scatterer are popular tools for the capture and binaural reproduction of spatial sound scenes. However, microphone arrays with a perfectly spherical body and uniformly distributed microphones are often impractical for the consumer sector, in which microphone arrays are generally mounted on mobile and wearable devices of arbitrary geometries. Therefore, the binaural reproduction of sound fields captured with arbitrarily shaped microphone arrays has become an important field of research. In this work, we present a comparison of methods for the binaural reproduction of sound fields captured with non-spherical microphone arrays. First, we evaluated equatorial microphone arrays (EMAs), where the microphones are distributed on an equatorial contour of a rigid, spherical 1.
Second, we evaluated a microphone array with six microphones mounted on a pair of glasses. Using these two arrays, we conducted two listening experiments comparing four rendering methods based on acoustic scenes captured in different rooms2. The evaluation includes a microphone-based stereo approach (sAB stereo), a beamforming-based stereo approach (sXY stereo), beamforming-based binaural reproduction (BFBR), and BFBR with binaural signal matching (BSM). Additionally, the perceptual evaluation included binaural Ambisonics renderings, which were based on measurements with spherical microphone arrays. In the EMA experiment we included a fourth-order Ambisonics rendering, while in the glasses array experiment we included a second-order Ambisonics rendering. In both listening experiments in which participants compared all approaches with a dummy head recording we applied non-head-tracked binaural synthesis, with sound sources only in the horizontal plane. The perceived differences were rated separately for the attributes timbre and spaciousness. Results suggest that most approaches perform similarly to the Ambisonics rendering. Overall, BSM, and microphone-based stereo were rated the best for EMAs, and BFBR and microphone-based stereo for the glasses array.
Due to the COVID-19 pandemic, university students worldwide have experienced drastic changes in their academic and social lives, with the rapid shift to online courses and contact restrictions being reported among the major stressors. In the present study, we aimed at examining students’ perceived stress over the course of the pandemic as well as individual psychological and social coping resources within the theoretical framework of the Transactional Model of Stress and Coping in the specific group of STEM students. In four cross-sectional studies with a total of 496 computer science students in Germany, we found that students reported significantly higher levels of perceived stress at both measurement time points in the second pandemic semester (October/November 2020; January/February 2021) as compared to the beginning of the first (April/May 2020), indicating that students rather became sensitized to the constant pandemic-related stress exposure than habituating to the “new normal”. Regarding students’ coping resources in the higher education context, we found that both high (a) academic self-efficacy and (b) academic online self-efficacy as well as low (c) perceived social and academic exclusion among fellow students significantly predicted lower levels of students’ (d) belonging uncertainty to their study program, which, in turn, predicted lower perceived stress at the beginning of the first pandemic semester. At the beginning of the second pandemic semester, we found that belonging uncertainty still significantly mediated the relationship between students’ academic self-efficacy and perceived stress. Students’ academic online self-efficacy, however, no longer predicted their uncertainty about belonging, but instead had a direct buffering effect on their perceived stress. Students’ perceived social and academic exclusion among fellow students only marginally predicted their belonging uncertainty and no longer predicted their perceived stress 6 months into the pandemic. We discuss the need and importance of assessing and monitoring students’ stress levels as well as faculty interventions to strengthen students’ individual psychological and social coping resources in light of the still ongoing pandemic.
Risikobasierte Authentifizierung (RBA) ist eine adaptive Sicherheitsmaßnahme zur Stärkung passwortbasierter Authentifizierung. Sie zeichnet Merkmale während des Logins auf und fordert zusätzliche Authentifizierung an, wenn sich Ausprägungen dieser Merkmale signifikant von den bisher bekannten unterscheiden. RBA bietet das Potenzial für gebrauchstauglichere Sicherheit. Bisher jedoch wurde RBA noch nicht ausreichend im Bezug auf Usability, Sicherheit und Privatsphäre untersucht. Dieser Extended Abstract legt das geplante Dissertationsvorhaben zur Erforschung von RBA dar. Innerhalb des Vorhabens konnte bereits eine Grundlagenstudie und eine darauf aufbauende Laborstudie durchgeführt werden. Wir präsentieren erste Ergebnisse dieser Studien und geben einen Ausblick auf weitere Schritte.
Web browsers use HTTP caches to reduce the amount of data to be transferred over the network and allow Web pages to load faster. Content such as scripts, images, and style sheets, which are static most of the time or shared across multiple websites, are stored and loaded locally when recurring requests ask for cached resources. This behaviour can be exploited if the cache is based on a naive implementation. This paper summarises possible attacks on the browser cache and shows through extensive experiments that even modern web browsers still do not provide enough safeguards to protect their users. Moreover, the available built-in as well as addable cache controls offer rather limited functionality in terms of protection and ease of use. Due to the volatile and inhomogeneous APIs for controlling the cache in modern browsers, the development of enhanced user-centric cache controls remains -until further notice- in the hands of browser manufacturers.
Online services such as social networks, online shops, and search engines deliver different content to users depending on their location, browsing history, or client device. Since these services have a major influence on opinion forming, understanding their behavior from a social science perspective is of greatest importance. In addition, technical aspects of services such as security or privacy are becoming more and more relevant for users, providers, and researchers. Due to the lack of essential data sets, automatic black box testing of online services is currently the only way for researchers to investigate these services in a methodical and reproducible manner. However, automatic black box testing of online services is difficult since many of them try to detect and block automated requests to prevent bots from accessing them.
In this paper, we introduce a testing tool that allows researchers to create and automatically run experiments for exploratory studies of online services. The testing tool performs programmed user interactions in such a manner that it can hardly be distinguished from a human user. To evaluate our tool, we conducted - among other things - a large-scale research study on Risk-based Authentication (RBA), which required human-like behavior from the client. We were able to circumvent the bot detection of the investigated online services with the experiments. As this demonstrates the potential of the presented testing tool, it remains to the responsibility of its users to balance the conflicting interests between researchers and service providers as well as to check whether their research programs remain undetected.
Risk-based authentication (RBA) is an adaptive security measure to strengthen password-based authentication. RBA monitors additional implicit features during password entry such as device or geolocation information, and requests additional authentication factors if a certain risk level is detected. RBA is recommended by the NIST digital identity guidelines, is used by several large online services, and offers protection against security risks such as password database leaks, credential stuffing, insecure passwords and large-scale guessing attacks. Despite its relevance, the procedures used by RBA-instrumented online services are currently not disclosed. Consequently, there is little scientific research about RBA, slowing down progress and deeper understanding, making it harder for end users to understand the security provided by the services they use and trust, and hindering the widespread adoption of RBA.
In this paper, with a series of studies on eight popular online services, we (i) analyze which features and combinations/classifiers are used and are useful in practical instances, (ii) develop a framework and a methodology to measure RBA in the wild, and (iii) survey and discuss the differences in the user interface for RBA. Following this, our work provides a first deeper understanding of practical RBA deployments and helps fostering further research in this direction.
Die Blockchain ist nicht nur im Bereich der Finanzwelt angekommen, auch andere Branchen versuchen sich an ihrer Anwendung. In diesem Artikel werden Konzepte und Modelle von Blockchain-Anwendungen außerhalb des Finanzbereichs vorgestellt, indem die zugehörigen Veröffentlichungen referiert und diskutiert werden. Die Anwendungsbereiche variieren aktuell über den Schutz persönlicher Daten bis zur Sicherung und Überwachung von Nahrungsmittelproduktionsketten.
Musik Frequenzen Formeln
(2018)