Regular
automatic identificationACESautonomous flying projectorAcademy Color Encoding Systemartificial intelligenceautomated Windows system monitoringAssistive Technologyassessmentanomaly detectionApps
biobankBarcode
critical infrastructurescyber securityCybersecurity and ForensicsCloudCensyscritical infrastructurecybersecuritycritical infrastructure maintenance
digital signagedrone-projectordigital healthcare
eHealthethical hacking
forensic educationforensic trainingfirewallfilm compsiting
high capacityhigh resolution panoramahealthcare securityhealthcareHead-based PointingHead TrackingHands-free Interaction
IoTiOSICSintelligent monitoringIT securityImagingIoT securityInternet of Thingsintelligent surveillanceindustrial control systems
JAB Code
Look Modification TransformLMT
Mobile Devicemachine learningMobile Devicesmobile healthcaremobile forensicsMaltegoMultimediaMicrocomputerMobile cloud computingmHealthMicrocomputer cluster
neural networks
open source intelligenceOSINT
Pointing TechniquesPassiveTotalPerformanceprivacypolychrome Barcode
remote maintenance protocolrisk management
security self checksecurity auditSmart Home Securitysecure remote controlSmart Homesecure remote servicestabilizationsecure remote desktopShodanSCADAsecuritysecurity operationssmart homesmart home devices
VFX EnvironmentVirtual RealityVR and AR
360 panorama
 Filters
Month and year
 
  13  0
Image
Pages A03-1 - A03-5,  © Society for Imaging Science and Technology 2020
Digital Library: EI
Published Online: January  2020
  27  6
Image
Pages 205-1 - 205-14,  © Society for Imaging Science and Technology 2020
Volume 32
Issue 3

Look Modification Transforms (LMTs) are a very powerful component of the Academy Color Encoding System (ACES) and offer extraordinary flexibility in ACES-based workflows. In ACES, the look of a project can be defined by a Look Transform, previously referred to as a Look Modification Transform, or LMT, applied before the Output Transform. The advantage of this approach is that technically the Look Transform should not have to change regardless of whether the Output Transform chosen is for [1]. The Academy Technical Bulletin TB-2014-10 describes the application of a Look Transform using the Academy Common LUT Format (CLF). Since CLF is not yet widely supported, any look applied using a LUT or grading operation, which spans an entire scene or show, and is used in series with per-shot adjustments can be considered to be a Look Transform. Therefore the import and export to other programs and color pipelines like 8 bit image processing programs, as well as video and film cameras, are of particular importance [1]. This paper aims to discuss the possibilities of importing and exporting Rec.709-coded imagery into the Foundry's Nuke 12 ACEScg workspace using the OCIO ACES1.1 configuration. Presented are the implemented Rec.709 transforms and possible alternatives. We also discuss the behavior of transforms concerning processing the transfer function (gamma) and color conversion of primaries and their complementary colors.

Digital Library: EI
Published Online: January  2020
  17  5
Image
Pages 206-1 - 206-14,  © Society for Imaging Science and Technology 2020
Volume 32
Issue 3

360-degree image and movie content have been gaining popularity in the last few years all over the media industry. There are two main reasons for this development. On the one hand, it is the immersive character of this media form and, on the other hand, the development of recording and presentation technology has made great progress in terms of resolution and quality. 360-degree panoramas are particularly widespread in VR and AR technology. Despite the high immersive potential, these forms of presentation have the disadvantage that the users are isolated and have no social contact during the presentation. Efforts have therefore been made to project 360-degree content in specially equipped rooms or planetariums to enable a shared experience for the audience. One area of application for 360- degree single-line cylindrical panorama with moving imagery included are modern conference rooms in hotels, which create an immersive environment for their clients to encourage creativity. The aim of this work is to generate high-resolution 25K 360-degree videos for projection in a conference room. The creation of the panoramas uses the single-line cylinder technique and is based on composition technologies that are used in the film industry. Video sequences are partially composed into a still image panorama in order to enable a high native resolution of the final film. A main part of this work is the comparison of different film, video and DSLR cameras, in which different image parameters are examined with respect to the quality of the images. Finally, the advantages, disadvantages and limitations of the procedure are examined.

Digital Library: EI
Published Online: January  2020
  64  29
Image
Pages 207-1 - 207-7,  © Society for Imaging Science and Technology 2020
Volume 32
Issue 3

This paper presents the design and implementation of an encoder and decoder of a colored barcode with high data density and storage capacity and freedom in shape. The approximately three times higher data density compared to conventional 2D matrix codes such as DataMatrix, QR or Aztec code is achieved by the use of eight colors and enables new applications, especially in the endconsumer market as well as in IT security. The challenges associated with the use of the color channel in printing with conventional office printers and recording by smartdevices under typical scenarios are addressed. The flexibility in the barcode shape is achieved by combining a primary and several secondary symbols according to a given scheme and give the necessary freedom for various applications. The presented code stores colors redundantly in a color palette as a reference in order to provide high robustness. JAB code, Just Another Barcode, has been specified, implemented, tested and is avaiable in github and www.jabcode.org under the license LGPL 2.1. JAB code is currently in the standardization process at the International Organization for Standardization ISO.

Digital Library: EI
Published Online: January  2020
  81  22
Image
Pages 252-1 - 252-11,  © Society for Imaging Science and Technology 2020
Volume 32
Issue 3

Like many other industries, small and medium IT enterprises (IT SMEs) find themselves challenged by globalization and digital transformation. This paper highlights the implications and challenges for IT SMEs in the area of IT security, compliance, and data governance. It describes the secure and compliant integration of IT products and services of IT SMEs in order to enhance their relative competitive position against global players of the IT industry. The paper presents an approach that entails competence areas for IT security, compliance, and data governance and shows a web-based tool for surveying and measuring areas in order to derive actual readiness of IT SMEs in these areas. The paper concludes with an outlook on the expected findings and planned further developments of the approach and tool.

Digital Library: EI
Published Online: January  2020
  54  19
Image
Pages 253-1 - 253-16,  © Society for Imaging Science and Technology 2020
Volume 32
Issue 3

Industrial Control Systems occur in automation processes and process control procedures within Critical Infrastructures (CI) - these are institutions with important significance for the common good of the state and thus for the maintenance of a society. Failures or disturbances in industrial plants can have serious physical consequences, such as power outages or interruptions in production. Energy suppliers, in particular, are an attractive target for cyber attacks due to their interdependencies with other infrastructures. A large number of SCADA systems and Industrial Control Systems are directly connected to the Internet and inadequately secured from an information technology perspective, this represents a considerable risk for IT security and, consequently, for the availability of Critical Infrastructures. The Shodan search engine reveals a worrying extent of exposed industrial control equipment on the Internet. The collected information and metadata about Industrial Control Systems from this search are freely available online. They can serve as a basis for potential attacks. Without authentication mechanisms, anyone can connect to open ports using industrial and remote maintenance protocols. The resulting risks and consequences for the companies, operators as well as for the society due the exposure of industrial plants and Critical Infrastructures are examined based on the Shodan search engine within the scope of this work.

Digital Library: EI
Published Online: January  2020
  35  12
Image
Pages 254-1 - 254-10,  © Society for Imaging Science and Technology 2020
Volume 32
Issue 3

Many organisations, especially Critical Infrastructures, are facing an increasingly severe cyber threat situation and are continuously improving their IT-security. We present the state of the art of sector specific security operation of CI operators with the German health sector as an example. To improve the situation we propose several spheres of activity with practical exemplary measures, e.g. for relevant protocols. In this way we help to prepare a CI sector governance with sourcing options for security operation for all relevant actors: from the responsible authorities in the country via a single point of contact in the health sector to hospital centres and the medical practice.

Digital Library: EI
Published Online: January  2020
  42  13
Image
Pages 275-1 - 275-11,  © Society for Imaging Science and Technology 2020
Volume 32
Issue 3

The Internet of Things and the Smart Home have become an increasingly important topic in recent years. The growing popularity of Smart Home Devices such as Smart TVs, Smart Door Locks, Smart Light Bulbs, and other devices is causing a rapid increase of vulnerabilities. Also, there are several vulnerabilities in software and hardware that make the security situation more complex and troublesome. Many of these systems and devices also process personal or secret data and control critical industrial processes. The need for security is extremely high. Owners and administrators of modern IoT devices are often overwhelmed with the task of securing their systems. Today, the spectrum of Smart Home technologies is growing faster than security can be guaranteed. Unsecured vulnerabilities endanger the security and privacy of consumers. This paper aims to examine the security and privacy aspects of Wi-Fi Connected and App-Controlled IoT-Based Smart Home Devices. For this purpose, the communication between the device, app, and the manufacturer's servers, as well as the firmware of the individual devices, will be examined. In particular, this paper highlights why it is important to make consumers aware of the security and privacy aspects of Smart Home devices. Finally, it will be shown which dangers exist when using these devices, how the use of these devices affects the privacy and security of the device and its users, and whether the devices comply with the European General Data Protection Regulation.

Digital Library: EI
Published Online: January  2020
  15  3
Image
Pages 276-1 - 276-15,  © Society for Imaging Science and Technology 2020
Volume 32
Issue 3

Since its invention, the Internet has changed the world, but above all, it has connected people. With the advent of the Internet of Things, the Internet connects things today much more than people do. A large part of the Internet of Things consists of IoT controlled Smart Home devices. The Internet of Things and the Smart Home have become an increasingly important topic in recent years. The growing popularity of Smart Home devices such as Smart TVs, Smart Door Locks, Smart Light Bulbs, and others is causing a rapid increase in vulnerable areas. In the future, many IoT devices could be just as many targets. The many new and inexperienced manufacturers and the absence of established uniform standards also contribute to the precarious situation. Therefore, new methods are needed to sensitize and detect these threats. In this paper, different existing approaches like those of the National Institute of Standards and Technology (NIST) and the Open Web Application Security Project (OWASP) are combined with concepts of this work like the Smart Home Device Life Cycle. In the context of this paper, a universal 31-page question-based test procedure is developed that can be applied to any Smart Home device. Based on this new, innovative security checklist, the communication between device, app, and the manufacturer's servers, as well as the firmware of IoT devices, can be analyzed and documented in detail. In the course of this paper, also a handout in the abbreviated form will be created, which serves the same purpose.

Digital Library: EI
Published Online: January  2020
  39  11
Image
Pages 277-1 - 277-8,  © Society for Imaging Science and Technology 2020
Volume 32
Issue 3

The aim of this paper is to describe the new concept of a Master level university course for computer science students to address the issues of IoT and Smart Home Security. This concept is well suited for professional training for interested customers and allows the creation of practical exercises. The modular structure of the course contains lectures and exercises on the following topics: 1. Introduction - IoT and Smart Home Technology and Impact 2. Homematic Technology and Smart Home Applications 3. Loxone Technology and Smart Home Applications 4. Raspberry Pi and Smart Home Applications 5. Security of IoT and Smart Home Systems and contains laboratory exercises of diverse complexities.

Digital Library: EI
Published Online: January  2020

Keywords

[object Object] [object Object] [object Object] [object Object] [object Object] [object Object] [object Object] [object Object] [object Object] [object Object] [object Object] [object Object] [object Object] [object Object] [object Object] [object Object] [object Object] [object Object]