Andrzej Dziech

According to our database1, Andrzej Dziech authored at least 45 papers between 1989 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2022
Analysis of New Orthogonal Transforms for Digital Watermarking.
Sensors, 2022

2020
Multi-sector Assessment Framework - a New Approach to Analyse Cybersecurity Challenges and Opportunities.
Proceedings of the Multimedia Communications, Services and Security, 2020

A Novel Watermark Method for Image Protection Based on Periodic Haar Piecewise-Linear Transform.
Proceedings of the Multimedia Communications, Services and Security, 2020

Workflow Management System with Automatic Correction.
Proceedings of the Multimedia Communications, Services and Security, 2020

2019
Communication system for Intelligent Road Signs network.
Proceedings of the 6th International Conference on Models and Technologies for Intelligent Transportation Systems, 2019

2018
A capable multimedia content discovery platform based on visual content analysis and intelligent data enrichment.
Multim. Tools Appl., 2018

2017
Application of Logistic Regression for Background Substitution.
Proceedings of the Multimedia Communications, Services and Security, 2017

Contour Extraction and Compression Scheme Utilizing Both the Transform and Spatial Image Domains.
Proceedings of the Multimedia Communications, Services and Security, 2017

2016
CCTV object detection with fuzzy classification and image enhancement.
Multim. Tools Appl., 2016

Guest Editorial: Intelligent Audio-Visual Observation Systems for Urban Environments.
Multim. Tools Appl., 2016

INSIGMA: an intelligent transportation system for urban mobility enhancement.
Multim. Tools Appl., 2016

Face Localization Algorithms as Element of Silhouette Localization Process.
Proceedings of the Information Technologies in Medicine - 5th International Conference, 2016

2015
Towards Practical Self-Embedding for JPEG-Compressed Digital Images.
IEEE Trans. Multim., 2015

Real data performance evaluation of CAISS watermarking scheme.
Multim. Tools Appl., 2015

Visual detection of knives in security applications using Active Appearance Models.
Multim. Tools Appl., 2015

Guest Editorial: Intelligent Processing for Citizen Security.
Multim. Tools Appl., 2015

2014
A new approach to high-capacity annotation watermarking based on digital fountain codes.
Multim. Tools Appl., 2014

Guest Editorial: Multimedia, Communications, Services and Security.
Multim. Tools Appl., 2014

Iterative filtering for semi-fragile self-recovery.
Proceedings of the 2014 IEEE International Workshop on Information Forensics and Security, 2014

Key indicators for monitoring of audiovisual quality.
Proceedings of the 2014 22nd Signal Processing and Communications Applications Conference (SIU), 2014

Methods for Face Localization in Static Colour Images with an Unknown Background.
Proceedings of the Multimedia Communications, Services and Security, 2014

Contribution of the INSIGMA Project to the Field of Intelligent Transportation Systems.
Proceedings of the Multimedia Communications, Services and Security, 2014

New Robust Video Watermarking Techniques Based on Enhanced 2D Hadamard Error Correcting Code and Discrete Wavelet Transform.
Proceedings of the Advances in Mass Data Analysis of Images and Signals in Medicine, 2014

2013
A Distributed Architecture for Multimedia File Storage, Analysis and Processing.
Proceedings of the Intelligent Tools for Building a Scientific Information Platform, 2013

Efficient Method for Content Reconstruction With Self-Embedding.
IEEE Trans. Image Process., 2013

Large-scale Research on Quality of Experience (QoE) Algorithms.
Comput. Sci., 2013

Practical Implementation of Visual Hash Functions for CCTV Footage Authentication.
Proceedings of the Multimedia Communications, Services and Security, 2013

Depth Estimation in Image Sequences in Single-Camera Video Surveillance Systems.
Proceedings of the Multimedia Communications, Services and Security, 2013

High-quality self-embedding for JPEG-compressed digital images.
Proceedings of the 21st European Signal Processing Conference, 2013

Overview of Recent Advances in CCTV Processing Chain in the INDECT and INSIGMA Projects.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
Towards Robust Visual Knife Detection in Images: Active Appearance Models Initialised with Shape-Specific Interest Points.
Proceedings of the Multimedia Communications, Services and Security, 2012

An efficient zonal sampling method for contour extraction and image compression using DCT transform.
Proceedings of the 2012 International Conference on Multimedia Computing and Systems, 2012

Reconfigurable self-embedding with high quality restoration under extensive tampering.
Proceedings of the 19th IEEE International Conference on Image Processing, 2012

2011
The Use of Selected Transforms to Improve the Accuracy of Face Recognition for Images with Uneven Illumination.
Proceedings of the Mobile Multimedia Communications - 7th International ICST Conference, 2011

LDA for Face Profile Detection.
Proceedings of the Multimedia Communications, Services and Security, 2011

A High-Capacity Annotation Watermarking Scheme.
Proceedings of the Multimedia Communications, Services and Security, 2011

A novel approach to adaptive image authentication.
Proceedings of the 18th IEEE International Conference on Image Processing, 2011

2010
A scheme for censorship of sensitive image content with high-quality reconstruction ability.
Proceedings of the 2010 IEEE International Conference on Multimedia and Expo, 2010

2007
The Data Collection Module of the Agent based Search System (Abss).
Proceedings of the WEBIST 2007, 2007

Profiled Search Methods for e-Learning Systems.
Proceedings of the First International Workshop on Learning Object Discovery & Exchange, 2007

2004
Methods of Image Compression by PHL Transform.
J. Intell. Robotic Syst., 2004

2002
Image compression using periodic Haar piecewise-linear PHL transform.
Proceedings of the 14th International Conference on Digital Signal Processing, 2002

2001
Communication between End-users and Databases using Mobile Agent Technology.
Proceedings of the Fifth IASTED International Conference Internet and Multimedia Systems and Applications (IMSA 2001), 2001

2000
Contour recognition using neural network application.
Proceedings of the 10th European Signal Processing Conference, 2000

1989
Bounds on the throughput of an unslotted ALOHA channel in the case of a heterogeneous users' population.
Kybernetika, 1989


  Loading...