Filters
total: 30204
filtered: 6060
-
Catalog
- Publications 6060 available results
- Journals 714 available results
- Conferences 173 available results
- Publishing Houses 3 available results
- People 249 available results
- Inventions 1 available results
- Projects 25 available results
- Laboratories 1 available results
- e-Learning Courses 191 available results
- Events 25 available results
- Open Research Data 22762 available results
Chosen catalog filters
displaying 1000 best results Help
Search results for: CRYPTOGRAPHY, MEDICAL DATA, QUATERNION ROTATION, LOSSLESS SCHEME, SECURITY, DICOM, JULIA SETS.
-
Secure Quaternion Feistel Cipher for DICOM Images
PublicationAn improved and extended version of a quaternion-based lossless encryption technique for digital image and communication on medicine (DICOM) images is proposed. We highlight and address several security flaws present in the previous version of the algorithm originally proposed by Dzwonkowski et al. (2015). The newly proposed secure quater- nion Feistel cipher (S-QFC) algorithm...
-
A new quaternion-based encryption method for DICOM images
PublicationIn this paper, a new quaternion-based lossless encryption technique for digital image and communication on medicine (DICOM) images is proposed. We have scrutinized and slightly modified the concept of the DICOM network to point out the best location for the proposed encryption scheme, which significantly improves speed of DICOM images encryption in comparison with those originally embedded into DICOM advanced encryption standard...
-
A New Quaternion Encryption Scheme for Image Transmission
PublicationQuaternions are hypercomplex number of rank 4. They are often applied to mechanics in three-dimensional space and considered as one of the best ways to represent rotations. In this paper a new encryption scheme, based on the rotation of data vector in three-dimensional space around another quaternion (key) is proposed. A computer-based simulation was created to analyze the potential of the proposed encryption technique.
-
Digital Fingerprinting Based on Quaternion Encryption Scheme for Gray-Tone Images
PublicationIn this paper a new idea of digital images fingerprinting is proposed. The method is based on quaternion encryption in the Cipher Block Chaining (CBC) mode. Quaternion sare hyper-complex numbers of rank 4 and thus often applied to mechanics in three-dimensional space. The encryption algorithm described in the paper is designed for gray-tone images but can easily be adopted for color ones. For the encryption purpose, the algorithm...
-
Reversible data hiding in encrypted DICOM images using sorted binary sequences of pixels
PublicationIn this paper, a novel reversible data hiding method for encrypted DICOM images is proposed. The method utilizes binary decomposition of the input data paired with a sorting process of the obtained binary sequences to ensure efficient data embedding in each predefined data block for specific most significant bit (MSB) planes while exploiting the properties of run-length encoding. The proposed scheme is lossless, and based on the...
-
Joint fingerprinting and decryption method for color images based on quaternion rotation with cipher quaternion chaining
PublicationThis paper addresses the problem of unauthorized redistribution of multimedia content by malicious users (pirates). In this method three color channels of the image are considered a 3D space and each component of the image is represented as a point in this 3D space. The distribution side uses a symmetric cipher to encrypt perceptually essential components of the image with the encryption key and then sends the encrypted data via...
-
Digital fingerprinting for color images based on the quaternion encryption scheme
PublicationIn this paper we present a new quaternion-based encryption technique for color images. In the proposed encryption method, images are written as quaternions and are rotated in a three-dimensional space around another quaternion, which is an encryption key. The encryption process uses the cipher block chaining (CBC) mode. Further, this paper shows that our encryption algorithm enables digital fingerprinting as an additional feature....
-
The DICOM standard for medical thermal imaging
PublicationW pracy przedstawiono propozycję schematu danych dla potrzeb ujęcia jej w międzynarodowej normie DICOM. Schemat danych oraz oprogramowanie referencyjne przygotowane dla potrzeb aplikacji termografii w medycynie.
-
Reversible Data Hiding in Encrypted DICOM Images Using Cyclic Binary Golay (23, 12) Code
PublicationIn this paper, a novel reversible data hiding method for encrypted images (RDHEI) is proposed. An efficient coding scheme based on cyclic binary Golay (23, 12) code is designed to embed additional data into the least significant bits (LSBs) of the encrypted image. The most significant bits (MSBs) are used to ensure the reversibility of the embedding process. The proposed scheme is lossless, and based on the receiver’s privileges,...
-
Active Annotation in Evaluating the Credibility of Web-Based Medical Information: Guidelines for Creating Training Data Sets for Machine Learning
PublicationMethods Results Discussion References Abbreviations Copyright Abstract Background: The spread of false medical information on the web is rapidly accelerating. Establishing the credibility of web-based medical information has become a pressing necessity. Machine learning offers a solution that, when properly deployed, can be an effective tool in fighting medical misinformation on the web. Objective: The aim of this study is to...
-
Digital Fingerprinting based on Quaternion Encryption for Image Transmission
PublicationIn this paper a new digital fingerprinting scheme for images is proposed. A proposed method is based on quaternion encryption with Cipher Block Chaining (CBC) mode of operation. Quaternions are hyper-complex numbers of rank 4 and thus often applied to mechanics in three-dimensional space. The encryption algorithm is designed for grey-tone images. For purpose of encryption, the algorithm uses the rotation of data vectors presented...
-
Data Model Development for Security Information Sharing in Smart Grids
PublicationThe smart grid raises new security concerns which require novel solutions. It is commonly agreed that to protect the grid, the effective collaboration and information sharing between the relevant stakeholders is prerequisite. Developing a security information sharing platform for the smart grid is a new research direction which poses several challenges related to the highly distributed and heterogeneous character of the grid. In...
-
General scheme for construction of scalar separability criteria from positive maps
PublicationStandardowe nierówności entropijne są znanym narzędziem do detekcji splątania dwupodukładowych stanów kwantowych. W pracy podano metodę wyprowadzania nierówności przypominających standardowe nierówności entropijne z dowolnych odwzorowań dodatnich. Ponadto, przebadano nierówności w przypadku kilku znanych z literatury odwzorowań dodatnich.
-
A quaternion-based modified feistel cipher for multimedia transmission
PublicationIn this paper a quaternion-based modified Feistel Cipher is proposed. The algorithm is based on the scheme proposed by Sastry and Kumar (2012). Our algorithm uses special properties of quaternions to perform rotations of data sequences in 3D space for each of the cipher rounds. The plaintext (image in gray-tone) is divided into two square matrices of equal size which consist of Lipschitz quaternions. A modular arithmetic was implemented...
-
Quaternion Encryption Method for Image and Video Transmission
PublicationQuaternions are hyper-complex numbers of rank 4. They are often applied to mechanics in 3D space and are considered to be one of the best ways of representing rotations. In this paper a quaternion encryption method, based on algorithm by Nagase et al. (2004) has been proposed. According to a computer-based simulation the results of the performed research yield a high level of security, which is additionally strengthened by the...
-
Interaction with medical data using QR-codes
PublicationBar-codes and QR-codes (Quick Response ) are often used in healthcare. In this paper an application of QR-codes to exchange of laboratory results is presented. The secure data exchange is proposed between a laboratory and a patient and between a patient and Electronic Health Records. Advanced Encryption Standard was used to provide security of data encapsulated within a QR-code. The experimental setup, named labSeq is described....
-
Receiver-side fingerprinting method based on quaternion sandwich product
PublicationIn this paper a new receiver-side fingerprinting method for color images is proposed. The proposed method belongs to the group of Joint Fingerprinting and Decryption (JFD) methods. Each component of the color image is represented as a point in 3D space, which is formed by 3 color channels. Encryption and fingerprinting can be interpreted as rotation, scaling and translation of these points. Calculations are performed using quaternion...
-
SDN testbed for validation of cross-layer data-centric security policies
PublicationSoftware-defined networks offer a promising framework for the implementation of cross-layer data-centric security policies in military systems. An important aspect of the design process for such advanced security solutions is the thorough experimental assessment and validation of proposed technical concepts prior to their deployment in operational military systems. In this paper, we describe an OpenFlow-based testbed, which was...
-
Data on LEGO sets release dates and worldwide retail prices combined with aftermarket transaction prices in Poland between June 2018 and June 2023
PublicationThe dataset contains LEGO bricks sets item count and pricing history for AI-based set pricing prediction. The data spans the timeframe from June 2018 to June 2023. The data was obtained from three sources: Brickset.com (LEGO sets retail prices, release dates, and IDs), Lego.com official web page (ID number of each set that was released by Lego, its retail prices, the current status of the set) and promoklocki.pl web page (the retail...
-
Security information sharing for smart grids: Developing the right data model
PublicationThe smart grid raises new security concerns which require novel solutions. It is commonly agreed that to protect the grid the effective collaboration and information sharing between the relevant stakeholders is prerequisite. Developing a security information sharing platform for the smart grid is a new research direction which poses several challenges related to the highly distributed and heterogeneous character of the grid. In...
-
Medical Image Dataset Annotation Service (MIDAS)
PublicationMIDAS (Medical Image Dataset Annotation Service) is a custom-tailored tool for creating and managing datasets either for deep learning, as well as machine learning or any form of statistical research. The aim of the project is to provide one-fit-all platform for creating medical image datasets that could easily blend in hospital's workflow. In our work, we focus on the importance of medical data anonimization, discussing the...
-
Receiver-side fingerprinting method for color images based on a series of quaternion rotations
PublicationThe proposed method is a new Joint Fingerprinting and Decryption (JFD) method that uses a cipher based on quaternion rotation to encrypt color images that are then sent to all users via multicast transmission. Individual encryption keys depend on the users’ fingerprints, so that a unique fingerprint is introduced into the image during decryption for each decryption key. A simulation-based research was conducted to examine the method’s...
-
A Novel Spatio–Temporal Deep Learning Vehicle Turns Detection Scheme Using GPS-Only Data
PublicationWhether the computer is driving your car or you are, advanced driver assistance systems (ADAS) come into play on all levels, from weather monitoring to safety. These modern-day ADASs use various assisting tools for drivers to keep the journey safe; these sophisticated tools provide early signals of numerous events, such as road conditions, emerging traffic scenarios, and weather warnings. Many urban applications, such as car-sharing...
-
Using Synchronously Registered Biosignals Dataset for Teaching Basics of Medical Data Analysis – Case Study
PublicationMedical data analysis and processing strongly relies on the data quality itself. The correct data registration allows many unnecessary steps in data processing to be avoided. Moreover, it takes a certain amount of experience to acquire data that can produce replicable results. Because consistency is crucial in the teaching process, students have access to pre-recorded real data without the necessity of using additional equipment...
-
BIG DATA SIGNIFICANCE IN REMOTE MEDICAL DIAGNOSTICS BASED ON DEEP LEARNING TECHNIQUES
PublicationIn this paper we discuss the evaluation of neural networks in accordance with medical image classification and analysis. We also summarize the existing databases with images which could be used for training deep models that can be later utilized in remote home-based health care systems. In particular, we propose methods for remote video-based estimation of patient vital signs and other health-related parameters. Additionally, potential...
-
Quaternion encryption methods for multimedia transmission, a survey of existing approaches
PublicationIn this paper we review quaternion encryption methods for multimedia transmission. We explain their weak and strong properties as well as suggest possible modifications. Our main focus is an algorithm QFC presented in paper by Dzwonkowski et al. (2015). All encryption methods, presented in this paper, use special properties of quaternions to perform rotations of data sequences in 3D space. Each method uses a common key generation...
-
Lossless Compression of Binary Trees with Correlated Vertex Names
PublicationCompression schemes for advanced data structures have become the challenge of today. Information theory has traditionally dealt with conventional data such as text, image, or video. In contrast, most data available today is multitype and context-dependent. To meet this challenge, we have recently initiated a systematic study of advanced data structures such as unlabeled graphs [1]. In this paper, we continue this program by considering...
-
Simulation of parallel similarity measure computations for large data sets
PublicationThe paper presents our approach to implementation of similarity measure for big data analysis in a parallel environment. We describe the algorithm for parallelisation of the computations. We provide results from a real MPI application for computations of similarity measures as well as results achieved with our simulation software. The simulation environment allows us to model parallel systems of various sizes with various components...
-
Cost assessment of computer security activities
PublicationComprehensive cost-benefit analysis plays a crucial role in the decision-making process when it comes to investments in information security solutions. The cost of breaches needs to be analysed in the context of spending on protection measures. However, no methods exist that facilitate the quick and rough prediction of true expenditures on security protection systems. Rafal Leszczyna of Gdansk University of Technology presents...
-
The effect of environmental turbulence on cyber security risk management and organizational resilience
PublicationEven though there is a plethora of research on the role of environmental turbulence in organizational performance in general, little attention has been paid to the effect of environmental turbulence on cyber security risk management and further - organizational resilience. Drawing on the resource-based view and contingency theory, this study investigates how technological and market turbulence influence organizational cyber security...
-
A reliable synthesis of discrete-time H-inf control. Part I: basic theorems and J-lossless conjugators
PublicationThe paper gives a basis for solving many problems of numerically reliable synthesis of sub-optimal discrete-time control in H-inf. The approach is based on J-lossless factorisation of the delta-domain chain-scattering description of continuous-time plants being controlled. Relevant properties of poles and zeroes of chain-scattering models are given. Necessary and sufficient conditions for the existence of stabilising J-lossless...
-
Practical Evaluation of Internet Systems' Security Mechanisms
PublicationA proposed Internet systems security layer with context-oriented security mechanisms reduces the risk associated with possible vulnerabilities. A metric of the system trust level is proposed, and then evaluated according to a university Internet system.
-
Stacking and rotation-based technique for machine learning classification with data reduction
Publication -
Architecture of security and application layer structure of radio system for monitoring and acquisition of data from traffic enforcement cameras
PublicationThe study presents architecture of security and application layer structure of Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras. It also provides general assumptions concerning the range of the system as well as its modules and application components.
-
Data processing methods for dynamic medical thermography.
PublicationArtykuł przedstawia zastosowanie nowej metody syntezy obrazów w termografii dla potrzeb opisu ilościowego właściwości termicznych tkanek. Opis taki umożliwia różnicowanie przypadków medycznych. Metodę zastosowania dla licznych pomiarów fantomowych i in vitro w eksperymentach na zwierzętach (świnia domowa). Przedstawiono i omówiono rezultaty prac.
-
External Security Strategies of Belarus
PublicationUnder President Lukashenko, three Belarusian national security strategies have been announced: the first in 1995, the second in 2001 and the third in 2011. The first proposal, formulated after Lukashenko’s victory in the presidential elections in 1994, outlined Belarus as a neutral state, unbound to any military block in the absence of external enemies. The direction of the foreign policy pursued by the president of Belarus was...
-
Reproducibility of Finding Enriched Gene Sets in Biological Data Analysis
Publication -
Approach to security assessment of critical infrastructures' information systems
PublicationThis study presents an approach to the security assessment of the information systems of critical infrastructures. The approach is based on the faithful reconstruction of the evaluated information system in a computer security laboratory followed by simulations of possible threats against the system. The evidence collected during the experiments, stored and organised using a proprietary system InSAW, may later be used for the creation...
-
Operating system security by integrity checking and recovery using write-protected storage
PublicationThe paper presents an Integrity Checking and Recovery (ICAR) system which protects file system integrity and automatically restores modified files. The system enables files cryptographic hashes generation and verification, as well as configuration of security constraints. All of the crucial data, including ICAR system binaries, file backups and hashes database are stored in a physically write protected storage to eliminate the...
-
Scientific tools for collecting and analysing medical data in rhinology.
Publication -
Chest Injuries Based on Medical Rescue Team Data
Publication -
J-lossless and extended J-lossless factorisations approach for delta do main Hinf control.
Publication.
-
Smart and resilient cities- new challanges for Polish cities in terms of 2020 energy efficiency and climate action
PublicationGlobal climate change action along with energy efficiency optimizations are becoming increasingly pressing principles in terms of moving towards sustainable development. As a member of EU and UN Poland is also obliged to follow restricted rules concerning energy efficiency of buildings which come to force in 2020. To meet new goals, innovative approaches - like moving towards smart and resilient cities -may be required. Through...
-
Processing of musical data employing rough sets and artificial neural networks
PublicationArtykuł opisuje założenia systemu automatycznej identyfikacji muzyki i dźwięków muzycznych. Dokonano przeglądu standardu MPEG-7, ze szczególnym naciskiem na parametry opisowe dźwięku. Przedyskutowano problemy analizy danych audio, związane z zastosowaniami wykorzystującymi MPEG-7. W oparciu o eksperymenty przedstawiono efektywność deskryptorów niskiego poziomu w automatycznym rozpoznawaniu dźwięków instrumentów muzycznych. Przedyskutowano...
-
Processing of musical data employing rough sets and artificial neural networks
PublicationArtykuł opisuje założenia systemu automatycznej identyfikacji muzyki i dźwięków muzycznych. Dokonano przeglądu standardu MPEG-7, ze szczególnym naciskiem na parametry opisowe dźwięku. Przedyskutowano problemy analizy danych audio, związane z zastosowaniami wykorzystującymi MPEG-7. W oparciu o eksperymenty przedstawiono efektywność deskryptorów niskiego poziomu w automatycznym rozpoznawaniu dźwięków instrumentów muzycznych. Przedyskutowano...
-
SMART AND RESILIENT CITIES – NEW CHALLENGES FOR POLISH CITIES IN TERMS OF 2020 BUILDING ENERGY EFFICIENCY AND CLIMATE CHANGE ACTION.
PublicationGlobal climate change action along with energy efficiency optimizations are becoming increasingly pressing principles in terms of moving towards sustainable development. As a member of EU and UN Poland is also obliged to follow restricted rules concerning energy efficiency of buildings which come to force in 2020. To meet new goals, innovative approaches - like moving towards smart and resilient cities -may be required. Through...
-
Quantum security and theory of decoherence
PublicationWe sketch a relation between two crucial, yet independent, fields in quantum information research, viz. quantum decoherence and quantum cryptography. We investigate here how the standard cryptographic assumption of shielded laboratory, stating that data generated by a secure quantum device remain private unless explicitly published, is disturbed by the einselection mechanism of quantum Darwinism explaining the measurement process...
-
Implementation of AES cryptography alghoritm in FPGA
PublicationW artykule przedstawiono porównanie dwóch realizacji algorytmu kryptograficznego AES w układzie programowalnym FPGA. W pierwszej wersji zrealizowano algorytm prosty i odwrotny łącznie z modułami sprzętowej realizacji rozwijania klucza. W drugiej wersji klucze są rozwijane programowo poprzez wbudowany procesor. Obie realizacje zostały przetestowane praktycznie na płytce prototypowej. Przedstawiono osiągnięte przepustowości jak również...
-
Minimal 2-dominating sets in Trees
PublicationWe provide an algorithm for listing all minimal 2-dominating sets of a tree of order n in time O(1.3247^n). This leads to that every tree has at most 1.3247^n minimal 2-dominating sets. We also show that thisbound is tight.
-
Minimal double dominating sets in trees
PublicationWe provide an algorithm for listing all minimal double dominating sets of a tree of order $n$ in time $\mathcal{O}(1.3248^n)$. This implies that every tree has at most $1.3248^n$ minimal double dominating sets. We also show that this bound is tight.