Filters
total: 8088
filtered: 4866
-
Catalog
- Publications 4866 available results
- Journals 93 available results
- Conferences 79 available results
- People 160 available results
- Inventions 12 available results
- Projects 7 available results
- Laboratories 3 available results
- Research Teams 2 available results
- e-Learning Courses 208 available results
- Events 32 available results
- Open Research Data 2626 available results
Chosen catalog filters
displaying 1000 best results Help
Search results for: DATA ENCRYPTION
-
Visual Data Encryption for Privacy Enhancement in Surveillance Systems
PublicationIn this paper a methodology for employing reversible visual encryption of data is proposed. The developed algorithms are focused on privacy enhancement in distributed surveillance architectures. First, motivation of the study performed and a short review of preexisting methods of privacy enhancement are presented. The algorithmic background, system architecture along with a solution for anonymization of sensitive regions of interest...
-
Hybrid Obfuscation of Encryption
Publication -
A New Quaternion Encryption Scheme for Image Transmission
PublicationQuaternions are hypercomplex number of rank 4. They are often applied to mechanics in three-dimensional space and considered as one of the best ways to represent rotations. In this paper a new encryption scheme, based on the rotation of data vector in three-dimensional space around another quaternion (key) is proposed. A computer-based simulation was created to analyze the potential of the proposed encryption technique.
-
Quaternion Encryption Method for Image and Video Transmission
PublicationQuaternions are hyper-complex numbers of rank 4. They are often applied to mechanics in 3D space and are considered to be one of the best ways of representing rotations. In this paper a quaternion encryption method, based on algorithm by Nagase et al. (2004) has been proposed. According to a computer-based simulation the results of the performed research yield a high level of security, which is additionally strengthened by the...
-
Digital Fingerprinting based on Quaternion Encryption for Image Transmission
PublicationIn this paper a new digital fingerprinting scheme for images is proposed. A proposed method is based on quaternion encryption with Cipher Block Chaining (CBC) mode of operation. Quaternions are hyper-complex numbers of rank 4 and thus often applied to mechanics in three-dimensional space. The encryption algorithm is designed for grey-tone images. For purpose of encryption, the algorithm uses the rotation of data vectors presented...
-
A new quaternion-based encryption method for DICOM images
PublicationIn this paper, a new quaternion-based lossless encryption technique for digital image and communication on medicine (DICOM) images is proposed. We have scrutinized and slightly modified the concept of the DICOM network to point out the best location for the proposed encryption scheme, which significantly improves speed of DICOM images encryption in comparison with those originally embedded into DICOM advanced encryption standard...
-
Quaternion encryption methods for multimedia transmission, a survey of existing approaches
PublicationIn this paper we review quaternion encryption methods for multimedia transmission. We explain their weak and strong properties as well as suggest possible modifications. Our main focus is an algorithm QFC presented in paper by Dzwonkowski et al. (2015). All encryption methods, presented in this paper, use special properties of quaternions to perform rotations of data sequences in 3D space. Each method uses a common key generation...
-
Digital fingerprinting for color images based on the quaternion encryption scheme
PublicationIn this paper we present a new quaternion-based encryption technique for color images. In the proposed encryption method, images are written as quaternions and are rotated in a three-dimensional space around another quaternion, which is an encryption key. The encryption process uses the cipher block chaining (CBC) mode. Further, this paper shows that our encryption algorithm enables digital fingerprinting as an additional feature....
-
Protection of visual data transmission for vessel traffic systems using joint fingerprinting and decryption method based on modified hill cipher
Publication -
Digital Fingerprinting Based on Quaternion Encryption Scheme for Gray-Tone Images
PublicationIn this paper a new idea of digital images fingerprinting is proposed. The method is based on quaternion encryption in the Cipher Block Chaining (CBC) mode. Quaternion sare hyper-complex numbers of rank 4 and thus often applied to mechanics in three-dimensional space. The encryption algorithm described in the paper is designed for gray-tone images but can easily be adopted for color ones. For the encryption purpose, the algorithm...
-
Joint fingerprinting and decryption method for color images based on quaternion rotation with cipher quaternion chaining
PublicationThis paper addresses the problem of unauthorized redistribution of multimedia content by malicious users (pirates). In this method three color channels of the image are considered a 3D space and each component of the image is represented as a point in this 3D space. The distribution side uses a symmetric cipher to encrypt perceptually essential components of the image with the encryption key and then sends the encrypted data via...
-
Data Analysis in Bridge of Data
PublicationThe chapter presents the data analysis aspects of the Bridge of Data project. The software framework used, Jupyter, and its configuration are presented. The solution’s architecture, including the TRYTON supercomputer as the underlying infrastructure, is described. The use case templates provided by the Stat-reducer application are presented, including data analysis related to spatial points’ cloud-, audio- and wind-related research.
-
Secure Quaternion Feistel Cipher for DICOM Images
PublicationAn improved and extended version of a quaternion-based lossless encryption technique for digital image and communication on medicine (DICOM) images is proposed. We highlight and address several security flaws present in the previous version of the algorithm originally proposed by Dzwonkowski et al. (2015). The newly proposed secure quater- nion Feistel cipher (S-QFC) algorithm...
-
Matrix-based robust joint fingerprinting and decryption method for multicast distribution of multimedia
PublicationThis paper addresses the problem of unauthorized redistribution of multimedia content by malicious users (pirates). The solution proposed here is a new joint fingerprinting and decryption method which meets the requirements for both imperceptibility and robustness of fingerprints and scalability in terms of design and distribution of fingerprinted multimedia content. The proposed method uses a simple block cipher based on matrix...
-
Data reduction and stacking for imbalanced data classification
Publication -
Harmony Search for Data Mining with Big Data
PublicationIn this paper, some harmony search algorithms have been proposed for data mining with big data. Three areas of big data processing have been studied to apply new metaheuristics. The first problem is related to MapReduce architecture that can be supported by a team of harmony search agents in grid infrastructure. The second dilemma involves development of harmony search in preprocessing of data series before data mining. Moreover,...
-
Receiver-side fingerprinting method for color images based on a series of quaternion rotations
PublicationThe proposed method is a new Joint Fingerprinting and Decryption (JFD) method that uses a cipher based on quaternion rotation to encrypt color images that are then sent to all users via multicast transmission. Individual encryption keys depend on the users’ fingerprints, so that a unique fingerprint is introduced into the image during decryption for each decryption key. A simulation-based research was conducted to examine the method’s...
-
Data Reduction Algorithm for Machine Learning and Data Mining
Publication -
Data governance: Organizing data for trustworthy Artificial Intelligence
PublicationThe rise of Big, Open and Linked Data (BOLD) enables Big Data Algorithmic Systems (BDAS) which are often based on machine learning, neural networks and other forms of Artificial Intelligence (AI). As such systems are increasingly requested to make decisions that are consequential to individuals, communities and society at large, their failures cannot be tolerated, and they are subject to stringent regulatory and ethical requirements....
-
For Your Eyes Only – Biometric Protection of PDF Documents
PublicationThe paper introduces a concept of a digital document content encryption/decryption with facial biometric data coming from a legitimate user. Access to the document content is simple and straightforward, especially during collaborative work with mobile devices equipped with cameras. Various contexts of document exchange are presented with regard to the next generation pro-active digital documents proposed by authors. An important...
-
DATA INTEROPERABILITY AND THE OPEN DATA ECOSYSTEM: ROLES AND RESEARCH AREAS
PublicationSustainability and value-creation are considered important parameters to measure the success of an open data system. Unfortunately, existing open data systems are not meeting their promises to achieve a sustainable and value-based open data system. Van Loenen et al. (2021) proposed a sustainable and value-creating open data ecosystem. According to their study, the open data ecosystem needs to be user-driven, inclusive, circular,...
-
Asking Data in a Controlled Way with Ask Data Anything NQL
PublicationWhile to collect data, it is necessary to store it, to understand its structure it is necessary to do data-mining. Business Intelligence (BI) enables us to make intelligent, data-driven decisions by the mean of a set of tools that allows the creation of a potentially unlimited number of machine-generated, data-driven reports, which are calculated by a machine as a response to queries specified by humans. Natural Query Languages...
-
Data Extraction, Transformation and Loading process in data warehouse development.
PublicationOmówiono podstawowe elementy procesu projektowania hurtowni danych.
-
Data librarian and data steward – new tasks and responsibilities of academic libraries in the context of Open Research Data implementation in Poland
PublicationThesis/Objective – The policy of Open Access (OA) for researching resources in Europe has been implemented for more than 10 years. The first recommendations concerning providing OA to scientific materials were defined during the implementation of the 7th Framework Programme. Introducing another set of recommendations concerning OA to research data was the next stage. The recommendations were transformed into obligations under the...
-
Managing data from heterogeneous data sources using knowledge layer
PublicationW procesie integrowania danych przy użyciu ontologii, ważne jest aby zarządzać danymi przechowywanymi w zewnętrznych źródłach, analogicznie jak tymi przechowywanymi w Bazie Wiedzy. Zaprezentowana w poprzednich pracach metoda kartograficznej reprezentacji wiedzy pozwala na wnioskowanie z danych przechowywanych w Bazie wiedzy. Rozwiązanie zaprezentowane w tej pracy umożliwia wykorzystanie metody kartograficznej do wnioskowania z...
-
Managing Data from Heterogeneous Data Sources Using Knowledge Layer
Publication -
Atmospheric emissions of POPs in Europe - a discussion of existing data and data need
PublicationZaproponowano, aby schematy inwentaryzacji i raportowania emisji w przyszłości były tak dobrane, aby zaspokajały potrzeby zarówno administracji odpowiedzialnej za strategię redukcji emisji jak i naukowców wykorzystujących inwentaryzację emisji na potrzeby dalszych badań naukowych. Stan obecny inwentaryzacji emisji POP oszacowany został jako niezadowalający a dalsze usprawnienia są konieczne dla poprawienia wiarygodności wyników...
-
Big Data i 5V – nowe wyzwania w świecie danych (Big Data and 5V – New Challenges in the World of Data)
PublicationRodzaje danych, składające się na zbiory typu Big Data, to m.in. dane generowane przez użytkowników portali internetowych, dane opisujące transakcje dokonywane poprzez Internet, dane naukowe (biologiczne, astronomiczne, pomiary fizyczne itp.), dane generowane przez roboty w wyniku automatycznego przeszukiwania przez nie Internetu (Web mining, Web crawling), dane grafowe obrazujące powiązania pomiędzy stronami WWW itd. Zazwyczaj,...
-
Musical Instrument Tagging Using Data Augmentation and Effective Noisy Data Processing
PublicationDeveloping signal processing methods to extract information automatically has potential in several applications, for example searching for multimedia based on its audio content, making context-aware mobile applications (e.g., tuning apps), or pre-processing for an automatic mixing system. However, the last-mentioned application needs a significant amount of research to reliably recognize real musical instruments in recordings....
-
Manufacturing Data Analysis in Internet of Things/Internet of Data (IoT/IoD) Scenario
PublicationComputer integrated manufacturing (CIM) has enormous benefits as it increases the rate of production, reduces errors and production waste, and streamlines manufacturing sub-systems. However, there are some new challenges related to CIM operating in the Internet of Things/Internet of Data (IoT/IoD) scenarios associated with Industry 4.0 and cyber-physical systems. The main challenge is to deal with the massive volume of data flowing...
-
Synteza algorytmu detekcji pęknięcia szyby metodą ''data fission - data fusion''
PublicationPrzedstawiono założenia projektowe oraz proces syntezy algorytmu detekcyjnego akustycznego detektora pęknięcia szyby. W konstrukcji algorytmu użyto techniki rozszczepiania i syntezy danych. Przedstawiono użyte narzędzia badawcze, opracowany model pęknięcia szyby oraz wynki testowania finalnego algorytmu detekcyjnego. Metoda znalazła zastosowanie w konstrukcji akustycznego detektora pęknięcia szyby stosowanego w systemach alarmowych.
-
Enhanced uniform data sampling for constrained data‐driven modeling of antenna input characteristics
PublicationData-driven surrogates are the most popular replacement models utilized in many fields of engineering and science, including design of microwave and antenna structures. The primary practical issue is a curse of dimensionality which limits the number of independent parameters that can be accounted for in the modelling process. Recently, a performance-driven modelling technique has been proposed where the constrained domain of the...
-
DATA MINING IN CONSTRUCTION RESEARCH
Publication -
Differential analysis of impedance data
Publication -
Distributed Learning with Data Reduction
Publication -
Processing of Satellite Data in the Cloud
PublicationThe dynamic development of digital technologies, especially those dedicated to devices generating large data streams, such as all kinds of measurement equipment (temperature and humidity sensors, cameras, radio-telescopes and satellites – Internet of Things) enables more in-depth analysis of the surrounding reality, including better understanding of various natural phenomenon, starting from atomic level reactions, through macroscopic...
-
The Bridge of Data Project Objectives
PublicationOpen Research Data (ORD) is one of the emerging trends for researchers across the globe. However, it has to be stressed that the level of implementation and awareness of ORD varies between countries. Many initiatives have been created in Polish scientific institutions to support the process of opening publications. These are mainly Open Access (OA) repositories, implementing the so-called green road of OA. However, only a few universities...
-
BIG PROBLEMS WITH BIG DATA
PublicationThe article presents an overview of the most important issues related to the phenomenon called big data. The characteristics of big data concerning the data itself and the data sources are presented. Then, the big data life cycle concept is formulated. The next sections focus on two big data technologies: MapReduce for big data processing and NoSQL databases for big data storage.
-
Client-side versus server-side geographic data processing performance comparison: Data and code
PublicationThe data and code presented in this article are related to the research article entitled “Analysis of Server-side and Client-side Web-GIS data processing methods on the example of JTS and JSTS using open data from OSM and Geoportal” (Kulawiak et al., 2019). The provided 12 datasets include multi-point and multi-polygon data of different scales and volumes, representing real-world geographic features. The datasets cover the area...
-
Receiver-side fingerprinting method based on quaternion sandwich product
PublicationIn this paper a new receiver-side fingerprinting method for color images is proposed. The proposed method belongs to the group of Joint Fingerprinting and Decryption (JFD) methods. Each component of the color image is represented as a point in 3D space, which is formed by 3 color channels. Encryption and fingerprinting can be interpreted as rotation, scaling and translation of these points. Calculations are performed using quaternion...
-
RPC communication layer and introduction to data protection for embedded PC based control and data acquisition module
Publication -
A Text as a Set of Research Data. A Number of Aspects of Data Acquisition and Creation of Datasets in Neo-Latin Studies
PublicationIn this paper, the authors, who specialise in part in neo-Latin studies and the his-tory of early modern education, share their experiences of collecting sources for Open Research Data sets under the Bridge of Data project. On the basis of inscription texts from St. Mary’s Church in Gdańsk, they created 29 Open Research Data sets. In turn, the text of the lectures of the Gdańsk scholar Michael Christoph Hanow, Praecepta de arte...
-
A survey of medical researchers indicates poor awareness of research data management processes and a role for data librarians
Publication -
Streaming Real-time Data in Distributed Dispatcher and Teleinformation Systems for Visualization of Multimedia Data of the Border Guard
PublicationSurveillance of the sea borders is a very important task for the Border Guard. Monitoring of country maritime border is an important task of the Border Guard. This task can be facilitated with the use of the technology enabling gathering information from distributed sources and its supervision and visualization. This task can be accomplished using a technology that allows to collect information from distributed sensors of different...
-
DATA JOURNALS AND DATA PAPERS IN VARIOUS RESEARCH AREAS AND SCIENTIFIC DISCIPLINES – BIBLIOMETRIC ANALYSIS BASED ON INCITES
PublicationThe main aim of this work is to provide insight into a bibliometric analysis of Data Journals and Data Papers in terms of research areas, disciplines, publication year and country. In particular, we calculated many bibliometric indicators, especially: the number of publications and citations. Furthermore, this work also investigated the top 20 journals in which scientists published the largest number of Data Papers. It was found...
-
Generating molecular entities as structured data
Publication -
The molecular entities in linked data dataset
Publication -
Data acquisition methods for GEM detectors
Publication -
Software defined HF data modem
PublicationW artykule przedstawiono koncepcję budowy modemu krótkofalowego, opartego na technologii radia programowego. Zaproponowano rozwiązanie warstwy sprzętowej i programowej modemu, które zostało zweryfikowane na drodze pomiarowej w warunkach laboratoryjnych.
-
Ensemble Classifier for Mining Data Streams
Publication