Papers by Reiner Creutzburg
Electronic Imaging
In this work, the most relevant 3D LiDAR technologies and their applications in 2022 were investi... more In this work, the most relevant 3D LiDAR technologies and their applications in 2022 were investigated. For this purpose, applications of LiDAR systems were classified into the typical application areas "3D modeling", "smart city", "robotics", "smart automotive" and "consumer goods". The investigation has shown that neither "mechanical" LiDAR technologies, nor so-called solid-state LiDAR technologies, nor "hybrid" LiDAR technologies can be evaluated as optimal for the typical application areas. In none of the application areas could all of the elaborated requirements be met. However, the "hybrid" LiDAR technologies such as sequential MEMS LiDAR technology and sequential flash LiDAR technology proved to be among the most suitable for most typical application areas. However, other technologies also tended to be suitable for individual typical application areas. Finally, it was found that several of the LiDAR technologies investigated are currently equally suitable for some typical application areas. To evaluate the suitability, concrete LiDAR systems-of different technologies and properties-were compared with the specific requirements of exemplary applications of an application area. The results of the investigation provide an orientation as to which LiDAR technology is promising for which application area. [1, p. I]
Proceedings of SPIE, Mar 11, 2015
ABSTRACT Proactive monitoring, control and protection of critical companies data - across devices... more ABSTRACT Proactive monitoring, control and protection of critical companies data - across devices, applications, data and network, are of increasing importance in today's society. Organizations and companies are committed Enterprise Mobility Management solution to meet new and demanding requirements. The aim of this paper is to show, based on certain specific scenarios, which benefits or risks for IT infrastructures exist. The investigation shows a significant step in assessing these applications with respect to the level of protection required in enterprise networks.
Proceedings of SPIE, Feb 18, 2014
This paper deals with the possibilities of retracing copyright violations on current video game c... more This paper deals with the possibilities of retracing copyright violations on current video game consoles (e.g. Microsoft Xbox, Sony PlayStation, ...) by studying the corresponding optical storage media DVD and Blu-ray. The possibilities of forensic investigation of DVD and Blu-ray Discs are presented. It is shown which information can be read by using freeware and commercial software for forensic examination. A detailed analysis is given on the visualization of hidden content and the possibility to find out information about the burning hardware used for writing on the optical discs. In connection with a forensic analysis of the Windows registry of a suspects PC a detailed overview of the crime scene for forged DVD and Blu-ray Discs can be obtained. Optical discs are examined under forensic aspects and the obtained results are implemented into automatic analysis scripts for the commercial forensics program EnCase Forensic. It is shown that for the optical storage media a possibility of identification of the drive used for writing can be obtained. In particular Blu-ray Discs contain the serial number of the burner. These and other findings were incorporated into the creation of various EnCase scripts for the professional forensic investigation with EnCase Forensic. Furthermore, a detailed flowchart for a forensic investigation of copyright infringement was developed.
Proceedings of SPIE, May 28, 2013
ABSTRACT The aim of this paper is to show the usefulness of modern forensic software tools for pr... more ABSTRACT The aim of this paper is to show the usefulness of modern forensic software tools for processing large-scale digital investigations. In particular, we focus on the new version of Nuix 4.2 and compare it with AccessData FTK 4.2, X-Ways Forensics 16.9 and Guidance Encase Forensic 7 regarding its performance, functionality, usability and capability. We will show how these software tools work with large forensic images and how capable they are in examining complex and big data scenarios.
Proceedings of SPIE, Mar 7, 2013
ABSTRACT Communication over the Internet is indispensable in this day and age. Mainly include Int... more ABSTRACT Communication over the Internet is indispensable in this day and age. Mainly include Internet telephony and instant messaging, plus e-mail exchanges, the most rapid means of communication. The user should be aware of here is that all data and information that are exchanged there, stored in a variety of ways. Therefore, such information is primarily in law enforcement and security interest. Therefore, the law of telecommunications surveillance was introduced to the recording of telephone conversations and digital correspondence (e-mail, SMS, etc.) are allowed. Even the currently inactive data retention that allows telecommunications providers to collect personal data without suspicion (in stock), is proof that digital communication has long been part of life and is used not only by normal users, but also for criminals a base forms. Thus, the digital communication for forensic of particular interest. In the present study, a Skype client side forensics is performed. It is designed to explain what data is stored on the computer as a user and with which tools can read it a forensic investigator. There are both manual analysis and an analysis of open source and commercial tools performed the work is similar, but can only be partially used for court-forensic purposes.
Proceedings of SPIE, Mar 5, 1999
Methods for determining fractal dimensions of image objects have gained increasing importance in ... more Methods for determining fractal dimensions of image objects have gained increasing importance in recent developments of image processing 17• Mainly for the classification of shape and textures of natural objects the fractal dimension has proven its usefulness 23,57 The fractal dimension D of a set A in a metric space is defined by D = lim log(.iV(A,c)) (1) E-o log1 where .Af(A, e) denotes the smallest number of closed balls of radius > 0 needed to cover the set A. The aim of this paper is to introduce a new fast algorithm for computing the fractal dimension of binary images according to (1). Consider a binary image that is represented as a matrix of binary pixels stored in a rectangular array I(x, y). Let this image denote a subset of the set of all pixels in the plane.
Proceedings of SPIE, Feb 10, 2011
ABSTRACT
Proceedings of SPIE, May 13, 2011
ABSTRACT The aim of this article is to show forensic investigation methods for mobile phones to s... more ABSTRACT The aim of this article is to show forensic investigation methods for mobile phones to students in a university forensic lab environment. Students have to learn the usefulness of forensic procedures to ensure evidence collection, evidence preservation, forensic analysis, and reporting. Open source tools as well as commercial forensic tools for forensic investigation of modern mobile (smart) phones are used. It is demonstrated how important data stored in the mobile device are investigated. Different scenarios of investigations are presented that are well-suited for forensics lab work in university.
Proceedings of SPIE, Mar 7, 2013
ABSTRACT
Proceedings of SPIE, May 1, 2012
ABSTRACT
IS&T International Symposium on Electronic Imaging Science and Technology, Jan 29, 2017
Color is an important aspect of the camera quality. Above all in a Visual Effects Pipeline (VFX) ... more Color is an important aspect of the camera quality. Above all in a Visual Effects Pipeline (VFX) it is necessary to maintain a linear relationship of the pixel color in the recorded image to the original light of the scene throughout every step in the production pipeline. This means that the plate recorded by the camera is not permitted to be subject of changes in any way ("do no harm to the plate"). Unfortunately most of the camera vendors are applying certain functions during the input step to the recorded RAW material, mostly to meet the needs of the display devices at the end of the pipeline. But they also are adding functions to establish a certain look, the camera company is associated with.
IS&T International Symposium on Electronic Imaging Science and Technology, Jan 29, 2017
OCT (Optical coherence tomography) has become a popular method for macular degeneration diagnosis... more OCT (Optical coherence tomography) has become a popular method for macular degeneration diagnosis. The advantages over other methods are: OCT is noninvasive, it has a high penetration and it has a high resolution. However, the always present speckle noise and the low contrast differences make it hard to segment the layers for the measurements correctly. The aim of this paper is to show the importance of optimizing the retinal segmentation process. Actual automatic segmentation algorithms are capable of detecting up to eleven layers in real time, but often fail at images with (strong) macular degeneration, which are complicating the separation of the layers from each other. This paper sums up some actual aspects of developments in retinal segmentation and shows the limits of actual algorithms. As a comprehensive test process for this paper, we tested all common image processing algorithms and implemented found promising, modern OCT segmentation methods. The result is a wide scale analysis which can be used as a roadmap for optimizing the process of retinal segmentation. Promising algorithms were found with the Canny edge detector, graph cuts and dynamic programming. Combining these algorithms results, the graph-, gradient-, intensity information, and decreasing the search region step by step has shown to be a fast and reliable solution. All tests were using 2D image data, 3D data could be used as well but plays no role in this paper. The testing process includes pre-filtering for image denoising, which can be done fast and is creating better preconditions for the segmentation process.
IS&T International Symposium on Electronic Imaging Science and Technology, Jan 28, 2018
The RED film cameras are important for professional film productions. Therefore, the Academy of M... more The RED film cameras are important for professional film productions. Therefore, the Academy of Motion Picture Arts and Science (AMPAS) inserted to their new Input Device Transforms (IDTs) in ACES 1.0.3 among others a couple of conversions from RED color spaces. These transforms are intended to establish a linear relationship of the recorded pixel color to the original light of the scene. To achieve this goal the IDTs are applied to the different RED color spaces, which are provided by the camera manufacturer. This results in a linearization of the recorded image colors. Following this concept the conversion should render comparable results for each color space with an acceptable deviation from the original light of the scene. In color science color space conversions need a documentation of the three main components of the individual color spaces: primaries, whitepoint and transfer function. For the RED colorspaces in question these parameters are only available for the REDWideGamutRGB color space, whereas the other color spaces are not documented. For this reason the behavior of the color conversion can only be tested, but not calculated. The goal of this paper is to compare the results of the color conversions of the main RED color spaces: REDWideGamutRGB, REDcolor4 and REDdragoncolor2. Additionally a conversion to the for television usage important color space REC2020 (ITU-R BT.2020) is added. The test setup contains a GretagMacbeth ColorChecker, which is recorded by a RED Scarlet-X camera and a mobile spectrometer (rgbphotonics Qmini). The latter captures the spectral distribution of the individual ColorChecker patches under the same lighting conditions. To compare the results, the recordings of both devices were converted to the CIE xychromaticity diagram using The Foundry Nuke11X. Additionally a comparison to reference data provided by the ACES document TB-2014-004 is included. Finally it is reviewed if the ACES IDT concept is working for the RED Scarlet-X camera.
Proceedings of SPIE, Mar 11, 2015
ABSTRACT Nowadays, wearable and implantable medical devices are being increasingly deployed to im... more ABSTRACT Nowadays, wearable and implantable medical devices are being increasingly deployed to improve diagnosis, monitoring, and therapy for various medical conditions. Compared to other types of electronics and computing systems, security attacks on these medical devices have extreme consequences and must be carefully analyzed and prevented with strongest efforts. Often, the security vulnerabilities of such systems are not well understood or underestimated. The aim of this paper is to demonstrate security attacks that can easily be done in the laboratory on a popular infusion pump on the market, and to propose defenses against such attacks.
Electronic Imaging, 2020
Industrial Control Systems occur in automation processes and process control procedures within Cr... more Industrial Control Systems occur in automation processes and process control procedures within Critical Infrastructures (CI) - these are institutions with important significance for the common good of the state and thus for the maintenance of a society. Failures or disturbances in industrial plants can have serious physical consequences, such as power outages or interruptions in production. Energy suppliers, in particular, are an attractive target for cyber attacks due to their interdependencies with other infrastructures. A large number of SCADA systems and Industrial Control Systems are directly connected to the Internet and inadequately secured from an information technology perspective, this represents a considerable risk for IT security and, consequently, for the availability of Critical Infrastructures. The Shodan search engine reveals a worrying extent of exposed industrial control equipment on the Internet. The collected information and metadata about Industrial Control Syst...
Electronic Imaging, 2018
The aim of this paper is to give a bibliographic review of the growing number of different Cybers... more The aim of this paper is to give a bibliographic review of the growing number of different Cybersecurity and Forensic Challenges for educational and vocational training purposes. Special attention is given to the hacking lab, which enables effective training in cybersecurity and computer forensics in the university environment and in vocational education and training.
SPIE Proceedings, 2015
ABSTRACT Nowadays, wearable and implantable medical devices are being increasingly deployed to im... more ABSTRACT Nowadays, wearable and implantable medical devices are being increasingly deployed to improve diagnosis, monitoring, and therapy for various medical conditions. Compared to other types of electronics and computing systems, security attacks on these medical devices have extreme consequences and must be carefully analyzed and prevented with strongest efforts. Often, the security vulnerabilities of such systems are not well understood or underestimated. The aim of this paper is to demonstrate security attacks that can easily be done in the laboratory on a popular infusion pump on the market, and to propose defenses against such attacks.
Mobile Devices and Multimedia: Enabling Technologies, Algorithms, and Applications 2015, 2015
ABSTRACT Proactive monitoring, control and protection of critical companies data - across devices... more ABSTRACT Proactive monitoring, control and protection of critical companies data - across devices, applications, data and network, are of increasing importance in today's society. Organizations and companies are committed Enterprise Mobility Management solution to meet new and demanding requirements. The aim of this paper is to show, based on certain specific scenarios, which benefits or risks for IT infrastructures exist. The investigation shows a significant step in assessing these applications with respect to the level of protection required in enterprise networks.
Multimedia on Mobile Devices 2007, 2007
Platform independence is the major advantage of the Java programming language. Whereas Java is wi... more Platform independence is the major advantage of the Java programming language. Whereas Java is widespread on servers, desktop computers and mobile phones. In contrast, PDA and Pocket PC applications are usually based on C or C# applications in the .NET Compact Framework. The paper focuses on the J2ME standard and its suitability for Pocket PCs and PDA. In that context
Uploads
Papers by Reiner Creutzburg