Prof. Claus Vielhauer
at Technische Hochschule Brandenburg
SPIE Involvement:
Author | Instructor
Publications (52)

Proceedings Article | 17 March 2015 Paper
Proceedings Volume 9393, 93930Q (2015) https://doi.org/10.1117/12.2077567
KEYWORDS: Firearms, Weapons, Data acquisition, 3D acquisition, Microchannel plates, Pattern recognition, Feature extraction, Confocal microscopy, 3D image processing, Forensic science

Proceedings Article | 17 March 2015 Paper
Eric Clausing, Claus Vielhauer
Proceedings Volume 9393, 939306 (2015) https://doi.org/10.1117/12.2079055
KEYWORDS: Image segmentation, Forensic science, Binary data, Microscopes, Confocal microscopy, 3D acquisition, 3D scanning, Process modeling, Source mask optimization, Shape analysis

Proceedings Article | 4 March 2015 Paper
Andrey Makrushin, Tobias Scheidat, Claus Vielhauer
Proceedings Volume 9409, 94090B (2015) https://doi.org/10.1117/12.2078876
KEYWORDS: Ultraviolet radiation, Visibility, Sensors, Visible radiation, Visualization, Spectroscopy, Forensic science, Imaging spectroscopy, Reflection, UV-Vis spectroscopy

Proceedings Article | 4 March 2015 Paper
Stefan Kirst, Claus Vielhauer
Proceedings Volume 9409, 94090D (2015) https://doi.org/10.1117/12.2081182
KEYWORDS: Confocal microscopy, Forensic science, Sensors, Aluminum, 3D acquisition, Matrices, Data acquisition, 3D modeling, Data modeling, Metals

Proceedings Article | 19 February 2014 Paper
Proceedings Volume 9028, 902808 (2014) https://doi.org/10.1117/12.2039074
KEYWORDS: Biometrics, Image quality, Forensic science, Sensors, Visualization, Pattern recognition, Feature extraction, Data acquisition, Image enhancement, Source mask optimization

Showing 5 of 52 publications
Conference Committee Involvement (12)
Media Watermarking, Security, and Forensics 2015
9 February 2015 | San Francisco, California, United States
Media Watermarking, Security, and Forensics 2014
3 February 2014 | San Francisco, California, United States
Media Watermarking, Security, and Forensics 2013
5 February 2013 | Burlingame, California, United States
Media Watermarking, Security, and Forensics 2012
23 January 2012 | Burlingame, California, United States
Media Watermarking, Security, and Forensics XIII
24 January 2011 | San Francisco Airport, California, United States
Showing 5 of 12 Conference Committees
Course Instructor
SC816: Multimedia and Security: An Introduction to Cryptography, Digital Watermarking, Media Forensics, and Biometrics and How Things go Together
This course will present an integrative overview of recent work of cryptography, digital watermarking, media forensics, and biometrics in the field of multimedia systems. Recent advances in image, video, and audio processing to achieve security are introduced covering the full range of security aspects: data confidentiality, data integrity and authenticity, and non-repudiation, as well as user identification and authentication. The first part of the course will introduce symmetric (private-key) and asymmetric (public-key) crypto systems to ensure confidentiality along with authentication techniques to ensure integrity and authenticity. Infrastructure solutions for non-repudiation of digital signatures will be discussed. Furthermore, the course will describe digital watermarking techniques that include both spatial, spectral, and temporal watermarking algorithms, as well as the approaches and roles of steganography, perceptual hashing techniques, and media forensics. The goal is to show which security aspects can be met by security mechanisms, as well as how all mechanisms can be combined usefully to achieve, for example, data authentication. Additionally, the unique nature of these new technologies relative to intellectual property rights and digital rights management systems (DRM) will be presented. In the second part of the course, particular emphasis will be placed on user authentication techniques by image and signal processing and multimodal approaches by combining and fusing multiple single biometric traits for more convenient and reliable identification or verification of users. Based on a case-by-case examination of the modalities of face (2D and 3D face analysis), fingerprint (fingerprint image analysis), signature (handwriting analysis of visual and dynamic signals), and voice (speech signals), the underlying technical concepts will be elaborated and design paradigms, as well as performance evaluations, will be given.
SC686: Biometrics: Applications, Technologies, Standards and Evaluation
Biometric technologies are currently on the verge of large-scale deployment in everyday life in applications such as travel documents and access control. Over the past decades, a wide variety of biometric modalities have been suggested, from passive properties like fingerprint, face, and iris recognition to active traits such as voice or signatures. Consequently, with these developments, issues of standardization and system evaluation have emerged recently. As the increasing complexity of these noticeable developments makes it difficult to maintain a comprehensive overview, this tutorial will provide an opportunity for experts and decision-makers to get compact insight in the actual status quo by a well-known expert in the biometric research domain. The goals of this course are fourfold: • to acquire a general overview with respect to applications for biometrics; • to discuss the advantages and disadvantages of the most relevant biometric modalities; • to summarize and elaborate on the actual standards in the domain; and • to present guidelines for evaluation and classification of biometric user authentication technology in different application domains.
SC872: Media Forensics - New Perspectives of Sensometrics and Tamper Detection
This course will present an overview of recent work of media forensics with focus on sensometrics for sensor identification and signal processing for tamper detection. Particularly, we define sensometrics as the application of methods for the analysis and determination of a particular sensor (capturing or sampling device for digital media), whereby the actual application and context in which the original sampling has been performed can vary. For example, for identifying digital cameras, any photographic image can be taken into account, whereas for identifying pen digitizer, sensors for capturing handwriting samples such as signatures can be analyzed. The general fundamentals will be introduced and specific approaches for selected media examples of image, audio and digital handwritten documents will be discussed to show the recent advances and still open problems.
SIGN IN TO:
  • View contact details

UPDATE YOUR PROFILE
Is this your profile? Update it now.
Don’t have a profile and want one?

Advertisement
Advertisement
Back to Top