Author of the publication

Endoscopic egomotion computation.

, , , , and . Medical Imaging: Image Processing, volume 7623 of SPIE Proceedings, page 76232J. SPIE, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Physically Motivated Reconstruction of Fiberscopic Images., , and . ICPR (3), page 599-602. IEEE Computer Society, (2006)Automating Video File Carving and Content Identification., , , and . IFIP Int. Conf. Digital Forensics, volume 410 of IFIP Advances in Information and Communication Technology, page 195-212. Springer, (2013)Adaptive Rasterreduktion durch spektrale Ausblendung in Aufnahmen von flexiblen Endoskopen., , , , , and . Bildverarbeitung für die Medizin, page 45-49. Springer, (2005)Physically Motivated Enhancement of Color Images for Fiber Endoscopy., , , , and . MICCAI (2), volume 4792 of Lecture Notes in Computer Science, page 360-367. Springer, (2007)Rechtliche Fragen zur Praxis IT-forensischer Analysen in Organisationen - Methoden zur Aufklärung verbotener Handlungen im Spannungsfeld rechtlicher Interessen., , , , and . Datenschutz und Datensicherheit, 34 (2): 75-79 (2010)Erzeugung synthetischer Daten zum Test IT-forensischer Werkzeuge., , , and . Datenschutz und Datensicherheit, 34 (2): 90-95 (2010)Camera Calibration from Fiberscopic Views with Accuracy Evaluation., , and . Bildverarbeitung für die Medizin, page 424-428. Springer, (2006)Herausforderungen für die Anonymisierung von Daten., , and . GI-Jahrestagung, volume P-294 of LNI, page 339-352. GI, (2019)3LSPG: Forensic Tool Evaluation by Three Layer Stochastic Process-Based Generation of Data., , , and . ICWF, volume 6540 of Lecture Notes in Computer Science, page 200-211. Springer, (2010)F2S2: Fast forensic similarity search through indexing piecewise hash signatures., , and . Digital Investigation, 10 (4): 361-371 (2013)