Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Guo Dong-hui is active.

Publication


Featured researches published by Guo Dong-hui.


international conference on anti-counterfeiting, security, and identification | 2007

Digital Watermarking based on Non-Sampled Contourlet Transform

Lian Xueqiang; Ding Xinghao; Guo Dong-hui

In this paper, a novel digital watermarking algorithm based on non-sampled contourlet transform (NSCT) is proposed. This algorithm gives a model of human visual system (HVS) in NSCT domain, exploiting the masking characteristics of HVS to embed watermark adaptively. NSCT has the characteristics of multi-resolution, localization, multi-directionality and anisotropy. Thus NSCT is much more similar to the information processing mechanism of the HVS than wavelet transform. Additionally, NSCT is a redundant transform, which can increase robustness to additive noise processing, and watermark can be considered as noise, it can be assumed that this algorithm can outperform the algorithm in wavelet domain. This assume is confirmed by experiments , compared to the algorithm in wavelet domain, this algorithm can embed much more watermark data, and the watermark is much more robust, achieved the best compromise between robustness and invisibility.


international conference on anti-counterfeiting, security, and identification | 2007

AES Algorithm Implemented for PDA Secure Communication with Java

Liu Niansheng; Guo Dong-hui; Huang Jiaxiang

Since Rijndael algorithm was selected as the AES (advanced encryption system) to substitute the DES (data encryption standard), the foremost concern for people has been its security. The result of new attack methods shows that there may be some lacuna in the design of S-box and key schedule with AES algorithm. The problem is the weakness of linearity existing in the S-box and key schedule. In order to keep from the new attacks and implement the AES for PDA secure communication in Java, we analyze in detail on the AES algorithm and give out a new implementation scheme for increasing complexity of nonlinear transformation in design of S-box. The experimental results show our implementation scheme with Java is feasible for the PDA application and is of an acceptable speed for data encryption and decryption.


international conference on anti-counterfeiting, security, and identification | 2007

STBC-MIMO Communication System for Image Encrypt via CNN

Lei Guo-wei; Zhuang Ming-jie; Guo Dong-hui

CNNs(cellular neural networks) are well-suited for parallel image processing. So CNN operations are normally used to the image encrypt and image transmission in wireless communication. In order to combat attenuation due to destructive addition of multi-path and due to interference from other users, in the paper, a novel scheme of multiple-input and multiple-output employing space-time block coding (STBC-MIMO) communication system combined with CNN image processing is presented, and STBC-MIMO system performance is analyzed. To examine the performance benefits of our proposed system, the simulation results are given in the end.


Computer Technology and Development | 2008

Study on Image Stitching Methods and Its Key Technologies

Guo Dong-hui


海洋学报(英文版) | 2007

Preliminary study of the retention mechanism of planktonic copepods in the Jiulong Estuary in China

Shang Xu; Wang Gui-zhong; 王桂忠; Li Shaojing; 李少菁; Guo Dong-hui; 郭东辉


Computer Engineering | 2006

Transmission Method of Image Information Hiding Based on Chaotic Encryption

Guo Dong-hui


Archive | 2006

Public key cipher encrypting and decrypting method based on nerval network chaotic attractor

Guo Dong-hui; Li Guogang; Liu Niansheng


Acta Oceanologica Sinica | 2012

Impacts of CO2-driven acidified seawater on the muscle and oocyte ultrastructure of two marine copepods

Zhang Dajuang; Li Shaojing; Wang Gui-zhong; Guo Dong-hui


China Integrated Circuit | 2008

Study of Slotted ALOHA based Anti-collision algorithm in RFID and its system implementation

Guo Dong-hui; It Microelectronic


Journal of Chinese Computer Systems | 2007

Method for Masquerade Intrusion Detection Based on HMM and Genetic Algorithm

Guo Dong-hui; Eda Lab; It Microelectronics

Collaboration


Dive into the Guo Dong-hui's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge