Zobrazeno 1 - 10
of 171
pro vyhledávání: '"Zbigniew Piotrowski"'
Publikováno v:
Applied Sciences, Vol 14, Iss 9, p 3934 (2024)
This study investigates the application of steganography for enhancing network security by detecting and promptly eliminating malicious packets to prevent flooding and consequent denial of service attacks while also identifying malicious equipment. T
Externí odkaz:
https://doaj.org/article/fcb6c838c279470188a8a3f9959f3777
Autor:
Adam Olesiński, Zbigniew Piotrowski
Publikováno v:
Applied Sciences, Vol 14, Iss 7, p 2990 (2024)
This paper presents the application of self-supervised deep contrastive learning in clustering signals detected in the wideband RF spectrum, presented in the form of spectrograms. Radio clustering is a method of searching for similar signals within t
Externí odkaz:
https://doaj.org/article/286e17102ff84e7296b40fdb11abb1bc
Autor:
Tomasz Walczyna, Zbigniew Piotrowski
Publikováno v:
Applied Sciences, Vol 14, Iss 5, p 2149 (2024)
The proliferation of “Deep fake” technologies, particularly those facilitating face-swapping in images or videos, poses significant challenges and opportunities in digital media manipulation. Despite considerable advancements, existing methodolog
Externí odkaz:
https://doaj.org/article/ceb28fa41aba436aa42d437a92c446bd
Autor:
Krzysztof Sawicki, Zbigniew Piotrowski
Publikováno v:
Journal of Telecommunications and Information Technology, Iss 1 (2023)
The paper presents a practical implementation of the non-classified data hiding system (NDHS) understood as a military platform for information warfare that takes advantage of the hidden data transmission for voice connections in order to gain inform
Externí odkaz:
https://doaj.org/article/c21f8e5b486b4216968e1f6cf7f0b1eb
Publikováno v:
Journal of Telecommunications and Information Technology, Iss 1 (2023)
The paper describes the method intended to authenticate identity of a VoIP subscriber with use of the data hiding technique that is specifically implemented by means of the echo hiding method. The scope includes presentation of experimental results r
Externí odkaz:
https://doaj.org/article/77378a8ed52b462d9cb40c33fe8c06dd
Publikováno v:
Sensors, Vol 24, Iss 1, p 68 (2023)
This study is a survey of sound source localization and detection methods. The study provides a detailed classification of the methods used in the fields of science mentioned above. It classifies sound source localization systems based on criteria fo
Externí odkaz:
https://doaj.org/article/ac3c9f5671d645c7a6dea14f60e3914f
Autor:
Adam Olesiński, Zbigniew Piotrowski
Publikováno v:
Sensors, Vol 23, Iss 14, p 6480 (2023)
Wideband spectrum sensing plays a crucial role in various wireless communication applications. Traditional methods, such as energy detection with thresholding, have limitations like detecting signals with low signal-to-noise ratio (SNR). This article
Externí odkaz:
https://doaj.org/article/956af2f87cf74520adfc191ddb71afd3
Autor:
Tomasz Walczyna, Zbigniew Piotrowski
Publikováno v:
Applied Sciences, Vol 13, Iss 11, p 6711 (2023)
Deep Fake technology has developed rapidly in its generation and detection in recent years. Researchers in both fields are outpacing each other in their axes achievements. The works use, among other methods, autoencoders, generative adversarial netwo
Externí odkaz:
https://doaj.org/article/8761218f4e45424cbf9fa251a5da4ca8
Autor:
Tomasz Walczyna, Zbigniew Piotrowski
Publikováno v:
Applied Sciences, Vol 13, Iss 5, p 3100 (2023)
Voice conversion is a process where the essence of a speaker’s identity is seamlessly transferred to another speaker, all while preserving the content of their speech. This usage is accomplished using algorithms that blend speech processing techniq
Externí odkaz:
https://doaj.org/article/a0797fd8299248c7b3510f30462b4434
Autor:
Marta Bistroń, Zbigniew Piotrowski
Publikováno v:
Entropy, Vol 25, Iss 2, p 284 (2023)
This paper presents a method for the transparent, robust, and highly capacitive watermarking of video signals using an information mapper. The proposed architecture is based on the use of deep neural networks to embed the watermark in the luminance c
Externí odkaz:
https://doaj.org/article/a3b5ef68b6534e08a296650dfa2d3650