![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
138 Result(s)
-
Article
Open AccessNeRF-FF: a plug-in method to mitigate defocus blur for runtime optimized neural radiance fields
Neural radiance fields (NeRFs) have revolutionized novel view synthesis, leading to an unprecedented level of realism in rendered images. However, the reconstruction quality of NeRFs suffers significantly from...
-
Article
Open AccessUbiquitous multi-occupant detection in smart environments
Recent advancements in ubiquitous computing have emphasized the need for privacy-preserving occupancy detection in smart environments to enhance security. This work presents a novel occupancy detection solutio...
-
Chapter and Conference Paper
Distortion-Based Transparency Detection Using Deep Learning on a Novel Synthetic Image Dataset
Transparency detection is a hard problem, as suggested by animals and humans flying or running into glass. However, humans seem to be able to learn and improve on the task with experience, begging the question...
-
Chapter and Conference Paper
Acquisition of EFS and Capacitive Measurement Data on Low-Power and Connected IoT Devices
In this extended version of the paper “Linoc: A Prototy** Platform for Capacitive and Passive Electrical Field Sensing” [15], the Linoc prototy** toolkit is presented in more detail, accompanied by evaluation...
-
Article
Open AccessThe overlap** effect and fusion protocols of data augmentation techniques in iris PAD
Iris Presentation Attack Detection (PAD) algorithms address the vulnerability of iris recognition systems to presentation attacks. With the great success of deep learning methods in various computer vision fie...
-
Chapter and Conference Paper
ReGenMorph: Visibly Realistic GAN Generated Face Morphing Attacks by Attack Re-generation
Face morphing attacks aim at creating face images that are verifiable to be the face of multiple identities, which can lead to building faulty identity links in operations like border checks. While creating a ...
-
Chapter and Conference Paper
PW-MAD: Pixel-Wise Supervision for Generalized Face Morphing Attack Detection
A face morphing attack image can be verified to multiple identities, making this attack a major vulnerability to processes based on identity verification, such as border checks. Various methods have been propo...
-
Chapter and Conference Paper
Generalization of Fitness Exercise Recognition from Doppler Measurements by Domain-Adaption and Few-Shot Learning
In previous works, a mobile application was developed using an unmodified commercial smartphone to recognize whole-body exercises. The working principle was based on the ultrasound Doppler sensing with the dev...
-
Chapter and Conference Paper
AutoSNAP: Automatically Learning Neural Architectures for Instrument Pose Estimation
Despite recent successes, the advances in Deep Learning have not yet been fully translated to Computer Assisted Intervention (CAI) problems such as pose estimation of surgical instruments. Currently, neural ar...
-
Chapter and Conference Paper
Measurement Based AR for Geometric Validation Within Automotive Engineering and Construction Processes
We look at the final stages of the automobile design process, during which the geometric validation process for a design, in particular for the vehicle front end, is examined. A concept is presented showing h...
-
Chapter and Conference Paper
NannyCaps - Monitoring Child Conditions and Activity in Automotive Applications Using Capacitive Proximity Sensing
Children have to be transported safely. Securing children in a child seat is indicated. Due to structure and restraint systems, children are secured in case of an accident. Children require our attention to ke...
-
Chapter and Conference Paper
Privacy by Design: Analysis of Capacitive Proximity Sensing as System of Choice for Driver Vehicle Interfaces
Data collection is beneficial. Therefore, automotive manufacturers start including data collection services. At the same time, manufacturers install cameras for human machine interfaces in vehicles. But those ...
-
Article
Automatic procedural model generation for 3D object variation
3D objects are used for numerous applications. In many cases not only single objects but also variations of objects are needed. Procedural models can be represented in many different forms, but generally excel...
-
Article
Investigating large curved interaction devices
Large interactive surfaces enable novel forms of interaction for their users, particularly in terms of collaborative interaction. During longer interactions, the ergonomic factors of interaction systems have t...
-
Article
Unsupervised privacy-enhancement of face representations using similarity-sensitive noise transformations
Face images processed by a biometric system are expected to be used for recognition purposes only. However, recent work presented possibilities for automatically deducing additional information about an indivi...
-
Article
Open AccessSeamless and non-repetitive 4D texture variation synthesis and real-time rendering for measured optical material behavior
We show how to overcome the single weakness of an existing fully automatic system for acquisition of spatially varying optical material behavior of real object surfaces. While the expression of spatially varyi...
-
Article
Histograms of Gaussian normal distribution for 3D feature matching in cluttered scenes
3D feature descriptors provide essential information to find given models in captured scenes. In practical applications, these scenes often contain clutter. This imposes severe challenges on the 3D object reco...
-
Article
An experimental overview on electric field sensing
Electric fields exist everywhere. They are influenced by living beings, conductive materials, and other charged entities. Electric field sensing is a passive capacitive measurement technique that detects chang...
-
Article
Performing indoor localization with electric potential sensing
Location-based services or smart home applications all depend on an accurate indoor positioning system. Basically one divides these systems into token-based and token-free localization systems. In this work, w...
-
Chapter and Conference Paper
Piggybacking Detection Based on Coupled Body-Feet Recognition at Entrance Control
A major risk of an automated high-security entrance control is that an authorized person takes an unauthorized person into the secured area. This practice is called “piggybacking”. Known systems try to prevent...