Nowadays, most of digital images are stored in the digital form for future utilization. The digit... more Nowadays, most of digital images are stored in the digital form for future utilization. The digital data protection against illegal use becomes still more important. In the field of digital images, the protection against copying or modifications is most important. One way how to protect digital images is to use digital watermarking techniques. There exist two general ideas: the visible watermark and the invisible watermark. Visible watermarks are mainly known for example as logos of television stations. The invisible watermarks are used especially for author rights authentication to the digital content (image, video). Generally speaking, invisible watermarks can be inserted in the spatial domain or in the transform domain [1]. There exist lots of methods which use the spatial domain for watermark insertion [2] and [3]. The most famous and firstly published method uses the least significant bits of the image data for watermark insertion. However, most of these methods are not robust ...
2018 25th International Conference on Systems, Signals and Image Processing (IWSSIP), 2018
This paper deals with objective and subjective video assessment methods and evaluation of modern ... more This paper deals with objective and subjective video assessment methods and evaluation of modern video codecs. The paper begins with a short introduction to video quality evaluation methods. Mainly, it focuses on common objective measurement methods such as Peak-to-Signal Noise Ratio, Structural Similarity, M-Singular Value Decomposition and subjective measurement methods described in ITU-T P.910 standard such as Absolute Category Rating, Degradation Category Rating and Pair Comparison Method. These methods are described in detail in the second and the third chapter of this paper. Finally, the Absolute Category Rating method was used to evaluate H.264 AVC (Advanced Video Coding), H.265 HEVC (High Efficiency Video Coding), VP8 and VP9 codecs for different video sequences with different resolutions. Evaluation process was done on Nexus 9 tablet with Android operating system. All results obtained from evaluation of subjects (6 – 71 years old) are shown in graphs in the last chapter.
2018 25th International Conference on Systems, Signals and Image Processing (IWSSIP), 2018
This paper deals with objective and subjective video assessment methods and evaluation of modern ... more This paper deals with objective and subjective video assessment methods and evaluation of modern video codecs. The paper begins with a short introduction to video quality evaluation methods. Mainly, it focuses on common objective measurement methods such as Peak-to-Signal Noise Ratio, Structural Similarity, M-Singular Value Decomposition and subjective measurement methods described in ITU-T P.910 standard such as Absolute Category Rating, Degradation Category Rating and Pair Comparison Method. These methods are described in detail in the second and the third chapter of this paper. Finally, the Absolute Category Rating method was used to evaluate H.264 AVC (Advanced Video Coding), H.265 HEVC (High Efficiency Video Coding), VP8 and VP9 codecs for different video sequences with different resolutions. Evaluation process was done on Nexus 9 tablet with Android operating system. All results obtained from evaluation of subjects (6 – 71 years old) are shown in graphs in the last chapter.
2017 Progress In Electromagnetics Research Symposium - Spring (PIERS), 2017
Besides the other parts, advanced communication networks also contain switches. These networks an... more Besides the other parts, advanced communication networks also contain switches. These networks and these switches must guarantee Quality of Service (QoS) and a comparison of switch controlling alternatives is the main aim of this paper. Two alternatives applicable for switch controlling — classical method and using of neural network for this purpose are designed and simulated. Both models are simulated by MATLAB-SIMULINK environment for four differential QoS demands, a web server, an Internet Protocol Television (IPTV) server, a Voice over Internet Protocol (VoIP) user and a printer. A comparison of Switch Controlling alternatives shows that controlling by neural network is faster than classic method and using of neural networks for this purpose is more useful.
2017 Progress In Electromagnetics Research Symposium - Spring (PIERS), 2017
This paper deals with subjective video assessment methods. The paper begins with a short introduc... more This paper deals with subjective video assessment methods. The paper begins with a short introduction to video quality evaluation methods. Mainly, it focuses on common subjective measurement methods. Next part of this paper describes videosequences, resolutions and methodology used for video sequence evaluating according to ACR (Absolute Category Rating) method. The results reached from 89 subjects (18–28 years old) are shown in tables in last section.
This paper deals with a problem of stabilisation in digital video sequences. You will find the th... more This paper deals with a problem of stabilisation in digital video sequences. You will find the the brief introduction of current hardwareand softwaremethods for stabilisation and the proposing of a new softwarebased stabilisation method which does not change the final video resolution. The new method is based on finding of motion vectors that are used in video compression techniques. The final part of this paper deals with a testing of proposed method. Key–Words: Digital video stabilisation, software-based stabilisation
2018 10th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), 2018
This article deals with development of a network emulator of transmission parameters of data netw... more This article deals with development of a network emulator of transmission parameters of data networks working with the TCP/IP protocol suite. The article contains a specification of transmission parameters of data networks and a specification of currently developed open-source systems, which can be used to emulate transmission parameters of data networks. Further, the design and implementation of the network emulator is described. The proposed network emulator uses Traffic Control, NetEm, iptables, web service and Apache JMeter. The graphical user interface (GUI) of the network emulator is implemented by a web service and a module to the GUI of the stress tester Apache JMeter. The article also deals with measurement of transmission parameters of data networks using the developed network emulator and the Station A and Station B. The measured values are discussed.
2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), 2020
This paper describes a system for generating messages according to the sets of standards IEC 6087... more This paper describes a system for generating messages according to the sets of standards IEC 60870-6 (ICCP/TASE.2). Particular attention is paid to messages exchanged between the power grid nodes and control centers. We discussed the typical grid network architecture and communication strategies. On this basis, we proposed and implemented the software to simulate real TASE.2 system operation in two different communication modes. The architecture of the designed generator is described in detail, including methods to ensure high-performance and scalability. The system supports the cryptographic security of the generated traffic. The proposed generator allows users to perform the complex testing and verification of the TASE.2 network nodes configuration, including the testing of connection to the related system such as message brokers and analytics tools. Due to the high performance and scalability of the proposed generator, it is possible to perform the stress testing of these systems.
A new filtering structure of the 2nd-order universal frequency filter is presented. The proposed ... more A new filtering structure of the 2nd-order universal frequency filter is presented. The proposed filter operates in a current-input current-output form and it is designed using signal-flow graphs (SFG) method. Operational transconductance amplifiers (OTAs), current follower (CF) and operational transresistance amplifier (OTRA) are used in the proposal. The filter possesses ability to adjust the pole frequency and quality factor of the filter without violating each other. All output responses are taken directly from high-impedance outputs of used active elements. The proposal requires only two external passive elements, namely two capacitors which are both grounded. The proposed filter has been also designed in its fully-differential form. The proper function of the proposed S-E and F-D filter is verified by PSpice simulations and in case of the S-E filter also by experimental measurements. Demonstrations of possibility to tune the pole frequency and quality factor of the proposed S-...
Digital image watermarking methods are suitable for make a simple copyright protection on digital... more Digital image watermarking methods are suitable for make a simple copyright protection on digital images. There exist a lot of digital image watermarking methods in all over the word. These methods uses spatial or transformation domain to insert for example copyright information (watermark) into original image. Mostly, frequency domain is used to watermark insertion. Especially discrete cosine transforma and discrete wavelet transform are used in many watermarking techniques. Together with these transforms also other methods, like singular value decomposition, forward error-correction codes, etc., are used to increase watermark robustness. This paper describes influence of singular value decomposition and forward errorcorrection codes, concretely on watermark robustness.
2018 10th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), 2018
Cyber attacks are currently a major threat to individuals as well as businesses or institutions. ... more Cyber attacks are currently a major threat to individuals as well as businesses or institutions. Denial of service (DoS) attacks are very common cyber attacks that focuses on availability of network services or network devices. This paper deals with developing of new modules of DoS attacks and network traffic generator into Apache JMeter that is designed to load test functional behavior and measure performance. Modules developed together with Appache JMeter tool can test a network infrastructure and find weak localities prone to DoS cyber attacks. One goal of this paper is to compare tools for stress testing of web servers and services. The network generator module of DoS attacks allows stress testing of networks based on the Transmission Control Protocol/Internet Protocol (TCP/.IP). With using the generator developed it is possible to test the availability of network devices when exposure to DoS attacks. Selected cyber attacks targeting on the availability of network resources (DoS...
2016 39th International Conference on Telecommunications and Signal Processing (TSP), 2016
This paper deals with objective video assessment methods. The paper begins with a short introduct... more This paper deals with objective video assessment methods. The paper begins with a short introduction to video quality evaluation methods. Mainly it is concentrated to common objective measurement methods including Peak to Signal Noise Ratio (PSNR), Structural Similarity (SSIM), and Mean-Singular Value Decomposition (M-SVD). Next part of this paper describes a new application developed for video sequence encoding and evaluating. This application is used to evaluate HEVC/H.265 and VP9 codecs. These codecs were tested with four various video sequences. Graphs at the end of this paper show results of tests in detail.
International Journal of Distributed Sensor Networks, 2016
Internet of Things (IoT) is expected to become a driver in an emerging era of interconnected worl... more Internet of Things (IoT) is expected to become a driver in an emerging era of interconnected world through the advanced connectivity of smart devices, systems, and services. IoT goes beyond a broad range of Machine-to-Machine (M2M) communication technologies and covers a wide variety of networking protocols. There exist solutions like MQTT or SIP collecting data from sensors, CoAP for constrained devices and networks, or XMPP for interconnecting devices and people. Also there is a plethora of standards and frameworks (OSGi, AllJoyn) bringing closer the paradigm of IoT vision. However, the main constraint of most existing platforms is their limited mutual interoperability. To this end, we provide a comprehensive description of protocols suitable to support the IoT vision. Further, we advocate an alternative approach to already known principles and employ the SIP protocol as a container for M2M data. We provide description of data structures and practical implementation principles of ...
Cyber-attacks hit us every day and threat to individuals as well as businesses sphere. This paper... more Cyber-attacks hit us every day and threat to individuals as well as businesses sphere. This paper describes Denial-of-service (DoS) attacks which are the common types of cyber-attacks. A denial-of-service attack floods online systems with traffic to exhaust resources and bandwidth. As a result, the system is unable to fulfil legitimate requests. Attackers can also use multiple compromised devices to launch this attack. This is known as a distributed-denial-of-service (DDoS) attack. The paper deals with developing of universal stress tester and network emulator based on open source project Apache JMeter. New modules developed for DoS attacks and network traffic generator into Apache JMeter will be described in this paper. The modules can test a network infrastructure and network parameters. First part of the paper contains a comparison of tools for stress testing and network emulators, description of common (D)DoS attacks and specification of transmission parameters of data networks....
Recent developments in massive machine-type communication (mMTC) scenarios have given rise to nev... more Recent developments in massive machine-type communication (mMTC) scenarios have given rise to never-seen requirements, which triggered the Industry 4.0 revolution. The new scenarios bring even more pressure to comply with the reliability and communication security and enable flawless functionality of the critical infrastructure, e.g., smart grid infrastructure. We discuss typical network grid architecture, communication strategies, and methods for building scalable and high-speed data processing and storage platform. This paper focuses on the data transmissions using the sets of standards IEC 60870-6 (ICCP/TASE.2). The main goal is to introduce the TASE.2 traffic generator and the data collection back-end with the implemented load balancing functionality to understand the limits of current protocols used in the smart grids. To this end, the assessment framework enabling generating and collecting TASE.2 communication with long-term data storage providing high availability and load ba...
Nowadays, most of digital images are stored in the digital form for future utilization. The digit... more Nowadays, most of digital images are stored in the digital form for future utilization. The digital data protection against illegal use becomes still more important. In the field of digital images, the protection against copying or modifications is most important. One way how to protect digital images is to use digital watermarking techniques. There exist two general ideas: the visible watermark and the invisible watermark. Visible watermarks are mainly known for example as logos of television stations. The invisible watermarks are used especially for author rights authentication to the digital content (image, video). Generally speaking, invisible watermarks can be inserted in the spatial domain or in the transform domain [1]. There exist lots of methods which use the spatial domain for watermark insertion [2] and [3]. The most famous and firstly published method uses the least significant bits of the image data for watermark insertion. However, most of these methods are not robust ...
2018 25th International Conference on Systems, Signals and Image Processing (IWSSIP), 2018
This paper deals with objective and subjective video assessment methods and evaluation of modern ... more This paper deals with objective and subjective video assessment methods and evaluation of modern video codecs. The paper begins with a short introduction to video quality evaluation methods. Mainly, it focuses on common objective measurement methods such as Peak-to-Signal Noise Ratio, Structural Similarity, M-Singular Value Decomposition and subjective measurement methods described in ITU-T P.910 standard such as Absolute Category Rating, Degradation Category Rating and Pair Comparison Method. These methods are described in detail in the second and the third chapter of this paper. Finally, the Absolute Category Rating method was used to evaluate H.264 AVC (Advanced Video Coding), H.265 HEVC (High Efficiency Video Coding), VP8 and VP9 codecs for different video sequences with different resolutions. Evaluation process was done on Nexus 9 tablet with Android operating system. All results obtained from evaluation of subjects (6 – 71 years old) are shown in graphs in the last chapter.
2018 25th International Conference on Systems, Signals and Image Processing (IWSSIP), 2018
This paper deals with objective and subjective video assessment methods and evaluation of modern ... more This paper deals with objective and subjective video assessment methods and evaluation of modern video codecs. The paper begins with a short introduction to video quality evaluation methods. Mainly, it focuses on common objective measurement methods such as Peak-to-Signal Noise Ratio, Structural Similarity, M-Singular Value Decomposition and subjective measurement methods described in ITU-T P.910 standard such as Absolute Category Rating, Degradation Category Rating and Pair Comparison Method. These methods are described in detail in the second and the third chapter of this paper. Finally, the Absolute Category Rating method was used to evaluate H.264 AVC (Advanced Video Coding), H.265 HEVC (High Efficiency Video Coding), VP8 and VP9 codecs for different video sequences with different resolutions. Evaluation process was done on Nexus 9 tablet with Android operating system. All results obtained from evaluation of subjects (6 – 71 years old) are shown in graphs in the last chapter.
2017 Progress In Electromagnetics Research Symposium - Spring (PIERS), 2017
Besides the other parts, advanced communication networks also contain switches. These networks an... more Besides the other parts, advanced communication networks also contain switches. These networks and these switches must guarantee Quality of Service (QoS) and a comparison of switch controlling alternatives is the main aim of this paper. Two alternatives applicable for switch controlling — classical method and using of neural network for this purpose are designed and simulated. Both models are simulated by MATLAB-SIMULINK environment for four differential QoS demands, a web server, an Internet Protocol Television (IPTV) server, a Voice over Internet Protocol (VoIP) user and a printer. A comparison of Switch Controlling alternatives shows that controlling by neural network is faster than classic method and using of neural networks for this purpose is more useful.
2017 Progress In Electromagnetics Research Symposium - Spring (PIERS), 2017
This paper deals with subjective video assessment methods. The paper begins with a short introduc... more This paper deals with subjective video assessment methods. The paper begins with a short introduction to video quality evaluation methods. Mainly, it focuses on common subjective measurement methods. Next part of this paper describes videosequences, resolutions and methodology used for video sequence evaluating according to ACR (Absolute Category Rating) method. The results reached from 89 subjects (18–28 years old) are shown in tables in last section.
This paper deals with a problem of stabilisation in digital video sequences. You will find the th... more This paper deals with a problem of stabilisation in digital video sequences. You will find the the brief introduction of current hardwareand softwaremethods for stabilisation and the proposing of a new softwarebased stabilisation method which does not change the final video resolution. The new method is based on finding of motion vectors that are used in video compression techniques. The final part of this paper deals with a testing of proposed method. Key–Words: Digital video stabilisation, software-based stabilisation
2018 10th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), 2018
This article deals with development of a network emulator of transmission parameters of data netw... more This article deals with development of a network emulator of transmission parameters of data networks working with the TCP/IP protocol suite. The article contains a specification of transmission parameters of data networks and a specification of currently developed open-source systems, which can be used to emulate transmission parameters of data networks. Further, the design and implementation of the network emulator is described. The proposed network emulator uses Traffic Control, NetEm, iptables, web service and Apache JMeter. The graphical user interface (GUI) of the network emulator is implemented by a web service and a module to the GUI of the stress tester Apache JMeter. The article also deals with measurement of transmission parameters of data networks using the developed network emulator and the Station A and Station B. The measured values are discussed.
2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), 2020
This paper describes a system for generating messages according to the sets of standards IEC 6087... more This paper describes a system for generating messages according to the sets of standards IEC 60870-6 (ICCP/TASE.2). Particular attention is paid to messages exchanged between the power grid nodes and control centers. We discussed the typical grid network architecture and communication strategies. On this basis, we proposed and implemented the software to simulate real TASE.2 system operation in two different communication modes. The architecture of the designed generator is described in detail, including methods to ensure high-performance and scalability. The system supports the cryptographic security of the generated traffic. The proposed generator allows users to perform the complex testing and verification of the TASE.2 network nodes configuration, including the testing of connection to the related system such as message brokers and analytics tools. Due to the high performance and scalability of the proposed generator, it is possible to perform the stress testing of these systems.
A new filtering structure of the 2nd-order universal frequency filter is presented. The proposed ... more A new filtering structure of the 2nd-order universal frequency filter is presented. The proposed filter operates in a current-input current-output form and it is designed using signal-flow graphs (SFG) method. Operational transconductance amplifiers (OTAs), current follower (CF) and operational transresistance amplifier (OTRA) are used in the proposal. The filter possesses ability to adjust the pole frequency and quality factor of the filter without violating each other. All output responses are taken directly from high-impedance outputs of used active elements. The proposal requires only two external passive elements, namely two capacitors which are both grounded. The proposed filter has been also designed in its fully-differential form. The proper function of the proposed S-E and F-D filter is verified by PSpice simulations and in case of the S-E filter also by experimental measurements. Demonstrations of possibility to tune the pole frequency and quality factor of the proposed S-...
Digital image watermarking methods are suitable for make a simple copyright protection on digital... more Digital image watermarking methods are suitable for make a simple copyright protection on digital images. There exist a lot of digital image watermarking methods in all over the word. These methods uses spatial or transformation domain to insert for example copyright information (watermark) into original image. Mostly, frequency domain is used to watermark insertion. Especially discrete cosine transforma and discrete wavelet transform are used in many watermarking techniques. Together with these transforms also other methods, like singular value decomposition, forward error-correction codes, etc., are used to increase watermark robustness. This paper describes influence of singular value decomposition and forward errorcorrection codes, concretely on watermark robustness.
2018 10th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), 2018
Cyber attacks are currently a major threat to individuals as well as businesses or institutions. ... more Cyber attacks are currently a major threat to individuals as well as businesses or institutions. Denial of service (DoS) attacks are very common cyber attacks that focuses on availability of network services or network devices. This paper deals with developing of new modules of DoS attacks and network traffic generator into Apache JMeter that is designed to load test functional behavior and measure performance. Modules developed together with Appache JMeter tool can test a network infrastructure and find weak localities prone to DoS cyber attacks. One goal of this paper is to compare tools for stress testing of web servers and services. The network generator module of DoS attacks allows stress testing of networks based on the Transmission Control Protocol/Internet Protocol (TCP/.IP). With using the generator developed it is possible to test the availability of network devices when exposure to DoS attacks. Selected cyber attacks targeting on the availability of network resources (DoS...
2016 39th International Conference on Telecommunications and Signal Processing (TSP), 2016
This paper deals with objective video assessment methods. The paper begins with a short introduct... more This paper deals with objective video assessment methods. The paper begins with a short introduction to video quality evaluation methods. Mainly it is concentrated to common objective measurement methods including Peak to Signal Noise Ratio (PSNR), Structural Similarity (SSIM), and Mean-Singular Value Decomposition (M-SVD). Next part of this paper describes a new application developed for video sequence encoding and evaluating. This application is used to evaluate HEVC/H.265 and VP9 codecs. These codecs were tested with four various video sequences. Graphs at the end of this paper show results of tests in detail.
International Journal of Distributed Sensor Networks, 2016
Internet of Things (IoT) is expected to become a driver in an emerging era of interconnected worl... more Internet of Things (IoT) is expected to become a driver in an emerging era of interconnected world through the advanced connectivity of smart devices, systems, and services. IoT goes beyond a broad range of Machine-to-Machine (M2M) communication technologies and covers a wide variety of networking protocols. There exist solutions like MQTT or SIP collecting data from sensors, CoAP for constrained devices and networks, or XMPP for interconnecting devices and people. Also there is a plethora of standards and frameworks (OSGi, AllJoyn) bringing closer the paradigm of IoT vision. However, the main constraint of most existing platforms is their limited mutual interoperability. To this end, we provide a comprehensive description of protocols suitable to support the IoT vision. Further, we advocate an alternative approach to already known principles and employ the SIP protocol as a container for M2M data. We provide description of data structures and practical implementation principles of ...
Cyber-attacks hit us every day and threat to individuals as well as businesses sphere. This paper... more Cyber-attacks hit us every day and threat to individuals as well as businesses sphere. This paper describes Denial-of-service (DoS) attacks which are the common types of cyber-attacks. A denial-of-service attack floods online systems with traffic to exhaust resources and bandwidth. As a result, the system is unable to fulfil legitimate requests. Attackers can also use multiple compromised devices to launch this attack. This is known as a distributed-denial-of-service (DDoS) attack. The paper deals with developing of universal stress tester and network emulator based on open source project Apache JMeter. New modules developed for DoS attacks and network traffic generator into Apache JMeter will be described in this paper. The modules can test a network infrastructure and network parameters. First part of the paper contains a comparison of tools for stress testing and network emulators, description of common (D)DoS attacks and specification of transmission parameters of data networks....
Recent developments in massive machine-type communication (mMTC) scenarios have given rise to nev... more Recent developments in massive machine-type communication (mMTC) scenarios have given rise to never-seen requirements, which triggered the Industry 4.0 revolution. The new scenarios bring even more pressure to comply with the reliability and communication security and enable flawless functionality of the critical infrastructure, e.g., smart grid infrastructure. We discuss typical network grid architecture, communication strategies, and methods for building scalable and high-speed data processing and storage platform. This paper focuses on the data transmissions using the sets of standards IEC 60870-6 (ICCP/TASE.2). The main goal is to introduce the TASE.2 traffic generator and the data collection back-end with the implemented load balancing functionality to understand the limits of current protocols used in the smart grids. To this end, the assessment framework enabling generating and collecting TASE.2 communication with long-term data storage providing high availability and load ba...
Uploads
Papers