Wykaz publikacji wybranego autora

Katarzyna Koptyra, dr inż.

adiunkt

Wydział Elektrotechniki, Automatyki, Informatyki i Inżynierii Biomedycznej
WEAIiIB-kair, Katedra Automatyki i Robotyki

[dyscyplina wiodąca] dziedzina nauk inżynieryjno-technicznych / informatyka techniczna i telekomunikacja


Identyfikatory Autora Informacje o Autorze w systemach zewnętrznych

ORCID: 0000-0002-0646-3255

ResearcherID: brak

Scopus: 56681094600

OPI Nauka Polska

System Informacyjny AGH (SkOs)





Liczba pozycji spełniających powyższe kryteria selekcji: 22, z ogólnej liczby 22 publikacji Autora


1
  • Advanced human motion analysis and visualization: comparison of mawashi-geri kick of two elite karate athletes
2
  • Application of assistive computer vision methods to Oyama karate techniques recognition
3
  • Application of Hidden Markov Models and Gesture Description Language classifiers to Oyama karate techniques recognition
4
  • Averaging of motion capture recordings for movements’ templates generation
5
  • Averaging three-dimensional time-varying sequences of rotations: application to preprocessing of motion capture data
6
  • Biometric traits in multi-secret digital steganography
7
  • Concealing additional secrets using sharing approach in steganography
8
  • Data-driven approach to human motion modelling with Lua and Gesture Description Language
9
  • Effectiveness comparison of Kinect and Kinect 2 for recognition of Oyama karate techniques
10
  • Embedding strategies in multi-secret steganography
11
  • False and multi-secret steganography in digital images
12
  • Fuzzy vault schemes in multi-secret digital steganography
13
  • Human actions modelling and recognition in low-dimensional feature space
14
  • Human actions recognition from motion capture recordings using signal resampling and pattern recognition methods
15
16
  • Key generation for multi-secret steganography
17
  • Learning from annotated video – an initial study based on Oyama karate tournament recordings
18
  • Multi-level steganography based on fuzzy vault systems and secret sharing techniques
19
  • Multi-level steganography based on fuzzy vault systems and secret sharing techniques
20
21
  • Porównanie wybranych algorytmów steganografii cyfrowej
22
  • Visual pattern embedding in multi-secret image steganography