Publications by authors named "Zbigniew Piotrowski"

This study is a survey of sound source localization and detection methods. The study provides a detailed classification of the methods used in the fields of science mentioned above. It classifies sound source localization systems based on criteria found in the literature.

View Article and Find Full Text PDF

Wideband spectrum sensing plays a crucial role in various wireless communication applications. Traditional methods, such as energy detection with thresholding, have limitations like detecting signals with low signal-to-noise ratio (SNR). This article proposes a novel deep learning-based approach for RF signal detection in the wideband spectrum.

View Article and Find Full Text PDF

This paper presents a method for the transparent, robust, and highly capacitive watermarking of video signals using an information mapper. The proposed architecture is based on the use of deep neural networks to embed the watermark in the luminance channel in the YUV color space. An information mapper was used to enable the transformation of a multi-bit binary signature of varying capacitance reflecting the entropy measure of the system into a watermark embedded in the signal frame.

View Article and Find Full Text PDF

This article presents a method for transparent watermarking of high-capacity watermarked video under H.265/HEVC (High-Efficiency Video Coding) compression conditions while maintaining high-quality encoded image. The aim of this paper is to present a method for watermark embedding using neural networks under conditions of subjecting video to lossy compression of the HEVC codec using the YUV420p color model chrominance channel for watermarking.

View Article and Find Full Text PDF

In this article, a superposition-based covert channel and its demodulator were proposed and examined. As a covert waveform, an 8FSK modulation was selected. The impact of the channel estimation error and resulting imperfect SIC operation (successive interference cancelation) on the covert information demodulation process was considered.

View Article and Find Full Text PDF

This paper presents a method of high-capacity and transparent watermarking based on the usage of deep neural networks with the adjustable subsquares properties algorithm to encode the data of a watermark in high-quality video using the H.265/HEVC (High-Efficiency Video Coding) codec. The aim of the article is to present a method of embedding a watermark in a video with HEVC codec compression by making changes in a video in a way that is not noticeable to the naked eye.

View Article and Find Full Text PDF

The proposed StegoFrameOrder (SFO) method enables the transmission of covert data in wireless computer networks exploiting non-deterministic algorithms of medium access (such as the distributed coordination function), especially in IEEE 802.11 networks. Such a covert channel enables the possibility of leaking crucial information outside secured network in a manner that is difficult to detect.

View Article and Find Full Text PDF

In localization systems based on the emission of reference radio signals, an important issue related to the reliability of sensor operation is the problem of operating time and power of the emitted reference radio signal. There are many localization methods that have proven useful in practice and that use a reference radio signal for this purpose. In the issue of determining the location of radio emitters, various radio signal propagation models are used to determine the effective range and distance of the sensor-receiver from the radio emitter.

View Article and Find Full Text PDF

Steganography is a technique that makes it possible to hide additional information (payload) in the original signal (cover work). This paper focuses on hiding information in a speech signal. One of the major problems with steganographic systems is ensuring synchronization.

View Article and Find Full Text PDF

In recent years, there has been a noticeable increase in interest in the possibilities of embedding additional data in the constellation of an already existing information signal in radio technology. This solution more precisely is based on adding a low power signal (or signals) to a stronger signal (cover). As will be described in the article, this technique is used in numerous radio communication areas, such as watermarking, covert channel creation, and multiple access techniques.

View Article and Find Full Text PDF