Ren Honge
Northeast Forestry University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Ren Honge.
international conference on electronic measurement and instruments | 2007
Ren Honge; Shang Zhenwei; Wang Yuanzhi; Zhang Jian
Through the analysis of relationship between chaotic characteristics and cryptology, putting forward a chaotic algorithm of image encryption with double keys. Using the discrete Logistic map to produce the chaotic sequence, the original value of the sequence is regarded as the secret key. Then using the discrete Logistic map to produce the corresponding scrambling sequence, in order to utilize it to carry out the gray scrambling and location scrambling on the pixels that getting discretely from the image, so as to realize the image encryption. Finally using Matlab to actualize the simulation experiment, and the result indicates that this algorithm has widest secret keys space, and the ability of resisting statistic attack.
international conference on automation and logistics | 2009
Ren Honge; Zhong Qiubo; Kang Junfeng
Vision system is the critical component for soccer robot. During the football competition, most information perceived by robot is from vision system. Because of the variable illumination conditions, traditional image segmentation method based on color information is not satisfactory. An object recognition algorithm, which combined color image segmentation with edge detection is presented in this paper based on the color information and shape information of the object. This algorithm implement image segmentation using color information in the HSV color space obtain the pixel of the object, and use this pixel implement edge detection to recognize the object. Experiments show that this algorithm can recognize the object exactly in the different illumination conditions, satisfy the requirement of the competition.
international conference on advanced computer control | 2010
Zhu Jiamei; Ren Honge
Proposesing a multi-state adaptive ant pheromones mechanism base on researching on ant colony algorithm model, pheromones update and pheromones selection had been improved. Make up the traditional ant colony algorithm for the calculation of distribution network planning that is slow and easy to fall into local optimal solution. And improved the convergence of the optimal solution. The validity of the improved algorithm has been verified using a testing function. Moreover, a satisfactory optimum solution for a Power Distribution Network Planning that has 73 user has been obtained. And the effective design method for permanent-magnet synchronous motor has been suggested based on the improved ACO.
environmental science and information application technology | 2010
Chang Ying-Ii; Ren Honge; Dong Benzhi
According to the two video cameras in system of binocular stereo vision are at the same horizontal line and the collected images have the public areas, an improved feature point matching algorithm is put forward. This algorithm extracts the public areas from the two images, makes the feature point locate in a rectangular area and reduces the searching range in the matching process; then, it completes the coarse matching by the cross template matching and matches the feature point accurately using the epipolar line constraints and removes the edge points mismatched. Experimental results show that this method is simple and efficient, and it has the certain practical.
international workshop on chaos-fractals theories and applications | 2009
Ren Honge; Chang Chunwu; Zhang Jian
Base on the thought of shifting histogram, a new reversible data hiding algorithm is proposed. This method utilizes two adjacent pixels of which difference is 1 to hide information, for the sake of improving payload, odd-even layer adopt different block mode and modification methods for gray values. Plenty of experimental results show that, comparing with other algorithm, the proposed method has advantages of large hiding capacity and high quality of carrier image after hiding information.
Archive | 2015
Ren Honge; Cao Xuehai; Guo Jifeng
Computer Engineering | 2008
Ren Honge
computational intelligence and security | 2007
Ren Honge; Zhang Jian; Wang Xing-jian; Shang Zhenwei
Archive | 2014
Ma Yan; Ren Honge; Yang Chunmei; Kuang Lilian; Bao Yuying
Archive | 2014
Ma Yan; Ren Honge; Yang Chunmei; Kuang Lilian; Bao Yuying