Bartosz Czaplewski

Bartosz Czaplewski
  • Phd, Eng
  • Professor (Assistant) at Gdansk University of Technology

About

55
Publications
4,005
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
254
Citations
Current institution
Gdansk University of Technology
Current position
  • Professor (Assistant)

Publications

Publications (55)
Article
This paper addresses the problem of unauthorized redistribution of multimedia content by malicious users (pirates). In this method three color channels of the image are considered a 3D space and each component of the image is represented as a point in this 3D space. The distribution side uses a symmetric cipher to encrypt perceptually essential com...
Article
This paper addresses the problem of unauthorized redistribution of multimedia content by malicious users (pirates). The solution proposed here is a new joint fingerprinting and decryption method which meets the requirements for both imperceptibility and robustness of fingerprints and scalability in terms of design and distribution of fingerprinted...
Article
In this paper we present a new quaternion-based encryption technique for color images. In the proposed encryption method, images are written as quaternions and are rotated in a three-dimensional space around another quaternion, which is an encryption key. The encryption process uses the cipher block chaining (CBC) mode. Further, this paper shows th...
Article
Full-text available
The purpose of the study was to: (1) evaluate the subarachnoid space (SAS) width and pial artery pulsation in both hemispheres, and (2) directly compare magnetic resonance imaging (MRI) to near-infrared transillumination/backscattering sounding (NIR-T/BSS) measurements of SAS width changes in healthy volunteers. The study was performed on three sep...
Conference Paper
Forward error correction is crucial for communication, enabling error rate or required SNR reduction. Longer codes improve correction ratio. Iterated codes offer a solution for constructing long codes with a simple coder and decoder. However, a basic iterative code decoder cannot fully exploit the code’s potential, as some error patterns within its...
Conference Paper
Antenna far-field performance is normally evaluated in expensive laboratories that maintain strict control over the propagation environment. Alternatively, the responses can be measured in non-anechoic conditions and then refined to extract the information on the structure field-related behavior. Here, a framework for correction of antenna measurem...
Article
Full-text available
Nematodes Caenorhabditis elegans (C. elegans) have been used as model organisms in a wide variety of biological studies, especially those intended to obtain a better understanding of aging and age-associated diseases. This paper focuses on automating the analysis of C. elegans imagery to classify the muscle age of nematodes based on the known and w...
Article
Full-text available
The diversity and non-uniformity of the positioning systems available in maritime navigation systems often impede the watchkeeping officer in the selection of the appropriate positioning system, in particular, in restricted basins. Thus, it is necessary to introduce a mathematical apparatus to suggest, in an automated manner, which of the available...
Article
In this paper, a novel reversible data hiding method for encrypted DICOM images is proposed. The method utilizes binary decomposition of the input data paired with a sorting process of the obtained binary sequences to ensure efficient data embedding in each predefined data block for specific most significant bit (MSB) planes while exploiting the pr...
Article
The article concerns the automation of vessel movement anomaly detection for maritime and coastal traffic safety services. Deep Learning techniques, specifically Convolutional Neural Networks (CNNs), were used to solve this problem. Three variants of the datasets, containing samples of vessel traffic routes in relation to the prohibited area in the...
Article
It is crucial for the Border Guard to be equipped with a communication-teleinformatic infrastructure designed to support them in efficient realization of their operational tasks. STRADAR – a system which results are presented in this paper – is such an infrastructure. It is a distributed solution for the maritime division of the border guard. The s...
Article
Full-text available
Satellite geodetic networks are commonly used in surveying tasks, but they can also be used in mobile surveys. Mobile satellite surveys can be used for trackage inventory, diagnostics and design. The combination of modern technological solutions with the adaptation of research methods known in other fields of science offers an opportunity to acquir...
Article
STRADAR to rozproszony system danych multimedialnych, przeznaczony do monitorowania granic morskich kraju, co jest ważnym zadaniem Morskiego Oddziału Straży Granicznej. System umożliwia przechowywanie, wyszukiwanie i wyświetlanie danych dotyczących zdarzenia będącego obiektem zainteresowania dla Straży Granicznej. Przedstawiono kolejny etap rozwoju...
Article
STRADAR jest systemem nadzoru przeznaczonym do wspierania działań operacyjnych morskiej straży granicznej, umożliwiającym zbieranie, przetwarzanie i udostępnianie informacji i danych pochodzących z takich sensorów, jak radary, kamery wideo, AIS, GPS, aparaty fotograficzne oraz z połączeń audio, wiadomości SMS, plików i notatek. Informacje te mogą b...
Article
Full-text available
Monitoring of country maritime border is an important task of the Border Guard. This activity can be enhanced with the use of the technology enabling gathering information from distributed sources, processing of that information and its visualization. The paper presents the next stage of development of the STRADAR project (Streaming of real-time da...
Chapter
The topic of this paper is the use of deep learning techniques, more specifically convolutional neural networks, for steganalysis of digital images. The steganalysis scenario of the repeated use of the stego-key is considered. Firstly, a study of the influence of the depth and width of the convolution layers on the effectiveness of classification w...
Conference Paper
Monitoring of country maritime border is an important task of the Border Guard. This activity can be enhanced with the use of the technology enabling gathering information from distributed sources, processing of that information and its visualization. The system presented in the paper is an advancement of the previously developed distributed map da...
Article
Full-text available
Security of national borders requires utilization of multimedia surveillance systems automatically gathering, processing and sharing various data. The paper presents such a system developed for the Maritime Division of the Polish Border Guard within the STRADAR project. The system, apart from providing communication means, gathers data, such as map...
Article
Full-text available
Surveillance of the sea borders is a very important task for the Border Guard. Monitoring of country maritime border is an important task of the Border Guard. This task can be facilitated with the use of the technology enabling gathering information from distributed sources and its supervision and visualization. This task can be accomplished using...
Article
Efektywne działanie służb granicznych wymaga odpowiedniego wsparcia w dziedzinie infrastruktury telekomunikacyjnej i informacyjnej. W artykule opisano system, który spełnia oczekiwania tych służ, dotyczące gromadzenia, przetwarzania i dynamicznego udostępniania danych multimedialnych, pozyskiwanych przez jednostki mobilne, punkty obserwacyjne i cen...
Conference Paper
STRADAR project is dedicated to streaming real-time data in a distributed dispatcher and teleinformation system of the Border Guard. The Events Visualization Post is a software designed for simultaneous visualization of data of different types in BG headquarters. The software allows the operator to visualize files, images, SMS, SDS, video, audio, a...
Article
The paper concerns blind steganalysis techniques in the passive steganalysis scenario designed to detect the steganographic cover modification schemes. The goal is to investigate the state-of-art in the field of steganalysis, and, above all, to recognize current trends existing in this field and determine guidelines for constructions of new stegana...
Article
Events Visualization Post is a part of the STRADAR project, which is dedicated to streaming real-time data in distributed dispatcher and teleinformation systems of the Border Guard. Events Visualization Post is a software designed for simultaneous visualization of data of different types. In the paper, the structure of the software is presented, th...
Conference Paper
Events Visualization Post is a part of the STRADAR project, which is dedicated to streaming real-time data in distributed dispatcher and teleinformation systems of the Border Guard. Events Visualization Post is a software designed for simultaneous visualization of data of different types. In the paper, the structure of the software is presented, th...
Article
Full-text available
STRADAR project is dedicated to streaming real-time data in a distributed dispatcher and teleinformation system of the Border Guard. The Events Visualization Post is a software designed for simultaneous visualization of data of different types in BG headquarters. The software allows the operator to visualize files, images, SMS, SDS, video, audio, a...
Chapter
Border guards have to be equipped with technology enabling a communication, an acquisition, an exchange, and a visualization of data in different operational situations. This also applies to the staff, which is located on mobile units such as ground vehicles, aircrafts and vessels. Within the project realized for the Polish Border Guard and finance...
Chapter
wadays created the need to design and develop systems supporting the BG personnel [3,7,8,11,12]. The volume and types of information gathered by the BG require a specially designated system architecture, particularly when multiple, potentially multicomponent (multimedia), operational tasks have to be presented on a multi-display. The requirement fo...
Article
W artykule porównano nowe metody łącznego fingerprintingu i deszyfracji JFD (ang. Joint Fingerprinting and Decryption) dla obrazów kolorowych zaproponowane w rozprawie doktorskiej dr inż. Bartosza Czaplewskiego. Metody porównano z innymi metodami JFD znanymi z literatury. Metody zostały porównane w kontekście niezauważalności fingerprintów, odporno...
Article
The paper addresses the fairness of the security provided by digital fingerprinting methods. It was noted that the digital fingerprinting techniques are designed primarily to protect service providers against the actions of malicious users, while honest users remain vulnerable to acts of malicious providers. The paper describes the customer’s right...
Article
The paper addresses the fairness of the security provided by digital fingerprinting methods. It was noted that the digital fingerprinting techniques are designed primarily to protect service providers against the actions of malicious users, while honest users remain vulnerable to acts of malicious providers. The paper describes the customer’s right...
Article
Full-text available
The paper presents the implementation of two multithreaded applications for data visualizatio of marine objects written in C#, designed to run on operator consoles with 32-bit or 64-bit Windows 7 OS. The article describes the most important functionality and features of the developed C# .NET user controls for data visualization on digital maps and...
Article
The proposed method is a new Joint Fingerprinting and Decryption (JFD) method that uses a cipher based on quaternion rotation to encrypt color images that are then sent to all users via multicast transmission. Individual decryption keys depend on the users’ fingerprints, so that a unique fingerprint is introduced into the image during decryption fo...
Article
The proposed method is a new Joint Fingerprinting and Decryption (JFD) method that uses a cipher based on quaternion rotation to encrypt color images that are then sent to all users via multicast transmission. Individual decryption keys depend on the users’ fingerprints, so that a unique fingerprint is introduced into the image during decryption fo...
Article
The paper presents the implementation of two multithreaded applications for data visualizatio of marine objects written in C#, designed to run on operator consoles with 32-bit or 64-bit Windows 7 OS. The article describes the most important functionality and features of the developed C# .NET user controls for data visualization on digital maps and...
Article
In this paper a new receiver-side fingerprinting method for color images is proposed. The proposed method belongs to the group of Joint Fingerprinting and Decryption (JFD) methods. Each component of the color image is represented as a point in 3D space, which is formed by 3 color channels. Encryption and fingerprinting can be interpreted as rotatio...
Article
In this paper a new receiver-side fingerprinting method for color images is proposed. The proposed method belongs to the group of Joint Fingerprinting and Decryption (JFD) methods. Each component of the color image is represented as a point in 3D space, which is formed by 3 color channels. Encryption and fingerprinting can be interpreted as rotatio...
Article
Full-text available
In this paper a new idea of digital images finger-printing is proposed. The method is based on quaternion en-cryption in the Cipher Block Chaining (CBC) mode. Quater-nions are hyper-complex numbers of rank 4 and thus often applied to mechanics in three-dimensional space. The encryp-tion algorithm described in the paper is designed for gray-tone ima...
Conference Paper
W referacie przedstawiono opis zagrożeń i słabych punktów pod względem bezpieczeństwa transmisji w sieciach Ad Hoc. Opisano również rodzaje ataków i metody wykrywania włamań do tego rodzaju sieci.
Article
In this paper a new digital fingerprinting scheme for images is proposed. A proposed method is based on quaternion encryption with Cipher Block Chaining (CBC) mode of operation. Quaternions are hyper-complex numbers of rank 4 and thus often applied to mechanics in three-dimensional space. The encryption algorithm is designed for grey-tone images. F...
Article
This paper considers a Joint Fingerprinting and Decryption method, called Hillcast, for the copyright protection and traitor tracing in case of Video on Demand services. Because the method is based on the Hill cipher, it is vulnerable to a known-plaintext attack. The goal of this paper is to present an efficient periodic key exchange mechanism to m...
Article
This paper considers a Joint Fingerprinting and Decryption method, called Hillcast, for the copyright protection and traitor tracing in case of Video on Demand services. Because the method is based on the Hill cipher, it is vulnerable to a known-plaintext attack. The goal of this paper is to present an efficient periodic key exchange mechanism to m...
Article
In this paper a new digital fingerprinting scheme for images is proposed. A proposed method is based on quaternion encryption with Cipher Block Chaining (CBC) mode of operation. Quaternions are hyper-complex numbers of rank 4 and thus often applied to mechanics in three-dimensional space. The encryption algorithm is designed for grey-tone images. F...
Chapter
W rozdziale przedstawione zostały problemy ochrony usług masowej dystrybucji treści multimedialnych w sieciach komputerowych przed kopiowaniem i nielegalnym rozpowszechnianiem multimediów, z wykorzystaniem metod fingerprintingu, a w szczególności podgrupy tych metod – metod fingercastingu. W odróżnieniu od innych metod fingerprintingu, metody finge...
Article
Full-text available
Vessel traffic systems provide a high level of safety on coastal waters due to coastal radar stations and industrial cameras transmitting information to traffic supervision centers, as well. To improve a vessel traffic services is very important to ensure the speed and secrecy for the transmission of video images. The paper presents the basic issue...
Conference Paper
The main goal of this paper is to present the advantages of a digital fingerprinting in a frequency domain over a pixel domain, in case of VoD services (Video on Demand). The paper presents basic issues of a multimedia data protection by digital fingerprinting. It also describes threats to embedded fingerprints from both collusion attacks and from...
Article
Full-text available
In order to maintain a high level of security in areas where vessel traffic services operate, there is a great use of industrial cameras, which transmit information to the VTS controllers. Two very important elements of the video image transmission are speed and confidentiality of the transmitted data. Currently, one of the major problems in front...
Article
W referacie przedstawiono rozwinięcie metody Hillcast znakowania obrazów, która należy do grupy metod wprowadzających fingerprinting przy deszyfracji zabezpieczonego kryptograficznie obrazu, której głównym przeznaczeniem są usługi wideo na żądanie. Losowo wybierane fragmenty danych szyfrowane są wspólnym kluczem, a następnie wysyłane są do wszystki...
Article
W referacie przedstawiono rozwinięcie metody Hillcast znakowania obrazów, która należy do grupy metod wprowadzających fingerprinting przy deszyfracji zabezpieczonego kryptograficznie obrazu, której głównym przeznaczeniem są usługi wideo na żądanie. Losowo wybierane fragmenty danych szyfrowane są wspólnym kluczem, a następnie wysyłane są do wszystki...

Network

Cited By