Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Andreas Uhl is active.

Publication


Featured researches published by Andreas Uhl.


Eurasip Journal on Information Security | 2011

A survey on biometric cryptosystems and cancelable biometrics

Christian Rathgeb; Andreas Uhl

Form a privacy perspective most concerns against the common use of biometrics arise from the storage and misuse of biometric data. Biometric cryptosystems and cancelable biometrics represent emerging technologies of biometric template protection addressing these concerns and improving public confidence and acceptance of biometrics. In addition, biometric cryptosystems provide mechanisms for biometric-dependent key-release. In the last years a significant amount of approaches to both technologies have been published. A comprehensive survey of biometric cryptosystems and cancelable biometrics is presented. State-of-the-art approaches are reviewed based on which an in-depth discussion and an outlook to future prospects are given.


Proceedings of SPIE | 2001

Survey of wavelet-domain watermarking algorithms

Peter Meerwald; Andreas Uhl

In this paper, we will provide an overview of the wavelet-based watermarking techniques available today. We will see how previously proposed methods such as spread-spectrum watermarking have been applied to the wavelet transform domain in a variety of ways and how new concepts such as the multi-resolution property of the wavelet image decomposition can be exploited. One of the main advantages of watermarking in the wavelet domain is its compatibility with the upcoming image coding standard, JPEG2000. Although many wavelet-domain watermarking techniques have been proposed, only few fit the independent block coding approach of JPEG2000. We will illustrate how different watermarking techniques relate to image compression and examine the robustness of selected watermarking algorithms against image compression.


IEEE Transactions on Circuits and Systems for Video Technology | 2012

A Survey of H.264 AVC/SVC Encryption

Thomas Stütz; Andreas Uhl

Video encryption has been heavily researched in the recent years. This survey summarizes the latest research results on video encryption with a special focus on applicability and on the most widely-deployed video format H.264 including its scalable extension SVC. The survey intends to give researchers and practitioners an analytic and critical overview of the state-of-the-art of video encryption narrowed down to its joint application with the H.264 standard suite and associated protocols (packaging/streaming) and processes (transcoding/watermarking).


Multimedia Systems | 2003

Selective encryption of wavelet-packet encoded image data: efficiency and security

Andreas Pommer; Andreas Uhl

Abstract.Selective encryption provides the ability to strike a balance between security and processing demands, e.g., in mobile clients. Image encoding using wavelets, and especially wavelet packets, can be used for efficient selective encryption. We will show how two such methods work and discuss their advantages and disadvantages in terms of security and speed.


IEEE Reviews in Biomedical Engineering | 2011

Computer-Aided Decision Support Systems for Endoscopy in the Gastrointestinal Tract: A Review

Michael Liedlgruber; Andreas Uhl

Today, medical endoscopy is a widely used procedure to inspect the inner cavities of the human body. The advent of endoscopic imaging techniques-allowing the acquisition of images or videos-created the possibility for the development of the whole new branch of computer-aided decision support systems. Such systems aim at helping physicians to identify possibly malignant abnormalities more accurately. At the beginning of this paper, we give a brief introduction to the history of endoscopy, followed by introducing the main types of endoscopes which emerged so far (flexible endoscope, wireless capsule endoscope, and confocal laser endomicroscope). We then give a brief introduction to computer-aided decision support systems specifically targeted at endoscopy in the gastrointestinal tract. Then we present general facts and figures concerning computer-aided decision support systems and summarize work specifically targeted at computer-aided decision support in the gastrointestinal tract. This summary is followed by a discussion of some common issues concerning the approaches reviewed and suggestions of possible ways to resolve them.


Computers in Biology and Medicine | 2003

Confidential storage and transmission of medical image data

Roland Norcen; M. Podesser; Andreas Pommer; Haiko Schmidt; Andreas Uhl

We discuss computationally efficient techniques for confidential storage and transmission of medical image data. Two types of partial encryption techniques based on AES are proposed. The first encrypts a subset of bitplanes of plain image data whereas the second encrypts parts of the JPEG2000 bitstream. We find that encrypting between 20% and 50% of the visual data is sufficient to provide high confidentiality.


IEEE Transactions on Image Processing | 2010

Lightweight Probabilistic Texture Retrieval

Roland Kwitt; Andreas Uhl

This paper contemplates the framework of probabilistic image retrieval in the wavelet domain from a computational point of view. We not only focus on achieving high retrieval rates, but also discuss possible performance bottlenecks which might prevent practical application. We propose a novel retrieval approach which is motivated by previous research work on modeling the marginal distributions of wavelet transform coefficients. The building blocks of our work are the dual-tree complex wavelet transform and a number of statistical models for the coefficient magnitudes. Image similarity measurement is accomplished by using closed-form solutions for the Kullback-Leibler divergences between the statistical models. We provide an in-depth computational analysis regarding the number of arithmetic operations required for similarity measurement and model parameter estimation. The experimental retrieval results on a widely used texture image database show that we achieve competitive retrieval results at low computational cost.


international conference on information security | 2009

Cancelable Iris Biometrics Using Block Re-mapping and Image Warping

Jutta Hämmerle-Uhl; Andreas Uhl

The concept of cancelable biometrics provides a way to protect biometric templates. A possible technique to achieve such protection for iris images is to apply a repeatable, non-reversible transformation in the image domain prior to feature extraction. We applied two classical transformations, block re-mapping and texture warping , to iris textures obtained from the CASIA V3 Iris database and collected experimental results on the matching performance and key sensitivity of a popular iris recognition method.


international conference on biometrics | 2012

Weighted adaptive Hough and ellipsopolar transforms for real-time iris segmentation

Andreas Uhl; Peter Wild

Efficient and robust segmentation of less intrusively or non-cooperatively captured iris images is still a challenging task in iris biometrics. This paper proposes a novel two-stage algorithm for the localization and mapping of iris texture in images of the human eye into Daugmans doubly dimensionless polar coordinates. Motivated by the growing demand for real-time capable solutions, coarse center detection and fine boundary localization usually combined in traditional approaches are decoupled. Therefore, search space at each stage is reduced without having to stick to simpler models. Another motivation of this work is independence of sensors. A comparison of reference software on different datasets highlights the problem of database-specific optimizations in existing solutions. This paper instead proposes the application of Gaussian weighting functions to incorporate model-specific prior knowledge. An adaptive Hough transform is applied at multiple resolutions to estimate the approximate position of the iris center. Subsequent polar transform detects the first elliptic limbic or pupillary boundary, and an ellipsopolar transform finds the second boundary based on the outcome of the first. This way, both iris images with clear limbic (typical for visible-wavelength) and with clear pupillary boundaries (typical for near infrared) can be processed in a uniform manner.


international symposium on visual computing | 2011

BlenSor: blender sensor simulation toolbox

Michael Gschwandtner; Roland Kwitt; Andreas Uhl; Wolfgang Pree

This paper introduces a novel software package for the simulation of various types of range scanners. The goal is to provide researchers in the fields of obstacle detection, range data segmentation, obstacle tracking or surface reconstruction with a versatile and powerful software package that is easy to use and allows to focus on algorithmic improvements rather than on building the software framework around it. The simulation environment and the actual simulations can be efficiently distributed with a single compact file. Our proposed approach facilitates easy regeneration of published results, hereby highlighting the value of reproducible research.

Collaboration


Dive into the Andreas Uhl's collaboration.

Top Co-Authors

Avatar

Andreas Vécsei

Boston Children's Hospital

View shared research outputs
Top Co-Authors

Avatar

Christian Rathgeb

Darmstadt University of Applied Sciences

View shared research outputs
Top Co-Authors

Avatar

Peter Wild

University of Salzburg

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Michael Häfner

Medical University of Vienna

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge