Gang Wang

ORCID: 0000-0002-1813-2015
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Steganography and Watermarking Techniques
  • Digital Media Forensic Detection
  • Chaos-based Image/Signal Encryption
  • Vehicle License Plate Recognition
  • Image and Video Stabilization
  • Internet Traffic Analysis and Secure E-voting
  • Augmented Reality Applications
  • Virtual Reality Applications and Impacts
  • Blind Source Separation Techniques
  • Interactive and Immersive Displays
  • Surgical Simulation and Training
  • Software-Defined Networks and 5G
  • Wireless Communication Networks Research
  • Advanced Data Compression Techniques
  • Advanced Malware Detection Techniques
  • Biometric Identification and Security
  • Advanced Image and Video Retrieval Techniques
  • Advanced Wireless Communication Techniques
  • Network Security and Intrusion Detection
  • Anomaly Detection Techniques and Applications
  • Spam and Phishing Detection
  • Caching and Content Delivery
  • Network Packet Processing and Optimization

Ludong University
2013-2023

Southeast University
2017-2023

Guangdong Police College
2023

Xiamen University of Technology
2023

Taiyuan University of Technology
2022

Nankai University
2016

Hunan University
2016

Harbin Institute of Technology
2014

Zhejiang Sci-Tech University
2011

University of Electronic Science and Technology of China
2005

In this paper, a novel spatial domain color image watermarking technique is proposed to rapidly and effectively protect the copyright of image. First, direct current (DC) coefficient 2D-DFT obtained in discussed, relationship between change each pixel DC Fourier transform proved. Then, used embed extract watermark by quantization technique. The novelties paper include three points: 1) without true 2D-DFT; 2) block found, and; 3) method has short running time strong robustness. experimental...

10.1109/access.2019.2895062 article EN cc-by-nc-nd IEEE Access 2019-01-01

10.1016/j.jnca.2016.08.004 article EN Journal of Network and Computer Applications 2016-08-09

Security issues are important concerns of image hashing. A type hashing needs to randomly divide a given into several parts, usually rectangles. However, the security problem arises due rectangular shapes. So, we propose new method which enhances randomness by dividing zigzag blocks with random walk. analyses provided, and experiments show our has good distinguishing ability compared existing methods.

10.1109/trustcom.2016.0040 article EN 2015 IEEE Trustcom/BigDataSE/ISPA 2016-08-01

In order to improve the security of steganography system, this paper presents a scheme based on fractal images. This method makes use good properties creation images, such as ease generation, sensitive dependence their initial condition, information are embedded during creating images by secret and parameters. The receiver can extract comparing difference between Stego-Images Cover-Images recovered with same attackers can't recover without parameters, then don't get information. On other...

10.1109/icndc.2011.13 article EN 2011-09-01

With the inevitable dominance of video traffic on Internet, Internet service providers (ISP) are striving to deliver streaming with high quality. Video resolution, as a direct reflection quality, is key factor quality experience (QoE). Since displayed information cannot be observed by ISPs, ISPs can only measure resolution from traffic. However, HTTP/2 being gradually adopted in services, multiplexing feature allows audio and chunks mixed during transmission, making existing monitoring...

10.1145/3551891 article EN ACM Transactions on Multimedia Computing Communications and Applications 2022-07-28

The infrastructure to deploy security standards is often lacking during modern telemedicine. As a branch of watermarking technique, the fragile provides us good solution authentication for A algorithm based on least significant bit (LSB), hash function and chaotic sequence presented in this paper. To resist counterfeiting attack, watermark signal extracted from original image, so different image has signal. then processed by exclusive-OR (XOR) operation with order increase algorithm....

10.1109/iembs.2005.1617209 article EN 2005-01-01

A novel colour image watermarking scheme based on Schur decomposition is proposed in this paper. By analysing the 3 × unitary matrix U via decomposition, strong similarity relation between U2,1 and U3,1 found. This will represent one kind of embedded watermark information, i.e., '1' or '0', be used to extract from blind manner. Moreover, method requires lower computational complexity than other methods singular value (SVD) since only an intermediate step SVD decomposition. In addition, does...

10.1504/ijes.2020.105277 article EN International Journal of Embedded Systems 2020-01-01

This paper considers the blind estimation of carrier frequency offset (CFO) and sample (SFO) in orthogonal division multiplexing (OFDM) system. Conventional methods require periodically transmitted pilot tones domain or identical training symbols preamble. To achieve a scheme, joint maximum-likelihood (ML) estimator is proposed by applying another FFT within one symbol duration. Its simplified closed-form solution then derived to reduce computational complexity. Theoretical analysis...

10.1109/wcnc.2017.7925909 article EN 2022 IEEE Wireless Communications and Networking Conference (WCNC) 2017-03-01

In order to guarantee the programs play correctly and protect digital video copyright, this paper gets a method on high-definition (HD video) online recognition with strong robustness through analyzing TV monitoring system requirements characters, based DCT algorithm. This will embed watermark after obtaining embedding positions by frames. It can improve compression, noise filtering using Arnold scramble spread spectrum technology. is real-time measure extract recognize it in HD videos....

10.4028/www.scientific.net/amm.599-601.1535 article EN Applied Mechanics and Materials 2014-08-01

Physical exercise is essential for maintaining a healthy life, and regular health training critical patients with chronic diseases. Although the patient has access to wide range of prescriptions that combine aerobic, muscle-strengthening, stretching, neuromuscular activities, exercising effectively regularly difficult without motivation guidance at home. Therefore, we suggest system design enhance education experience home volumetric video wearable mixed reality. We track cycling data on an...

10.1109/ecei57668.2023.10105262 article EN 2023-02-03

A new steganalysis network based on local difference analysis to classify steganographic images by analyzing the feature differences between blocks within image was proposed in this paper, which reduces risk of payload mismatch and improves accuracy. The used a CNN residual structure extract features block images, formed sequence specific order performed analysis. We first introduce long short-term memory (LSTM) analyze smoothness sequence, then fuse extracted LSTM with statistical finally...

10.1109/csecs60003.2023.10428224 article EN 2023-12-22

Website fingerprinting (WF) attack enables an eavesdropper to spy on users' browsing activity for malicious purposes, which poses a critical threat Internet privacy. Prior research mainly focuses performance in local area networks. Meanwhile, with the upgrade of network infrastruc-ture, notable transition high-speed connectivity real-world nodes has emerged. While networks, there been mismatch between overall traffic transmission and upper limit attacker's processing capabilities. attacks...

10.1109/globecom54140.2023.10437244 article EN GLOBECOM 2022 - 2022 IEEE Global Communications Conference 2023-12-04

With the rapid development of Internet Things (loT) technology, there is explosive growth in number loT devices. Meanwhile, low security and network heterogeneity networks have brought new challenges to implementing management strategies smart homes small offices. Early accurate device-type identification first step towards networks. The existing machine learning-based deep models for traffic classification achieved decent results. However, most these methods rely on a long-term window...

10.1109/globecom54140.2023.10437132 article EN GLOBECOM 2022 - 2022 IEEE Global Communications Conference 2023-12-04

A novel colour image watermarking scheme based on Schur decomposition is proposed in this paper. By analysing the 3 × unitary matrix U via decomposition, strong similarity relation between U2,1 and U3,1 found. This will represent one kind of embedded watermark information, i.e., '1' or '0', be used to extract from blind manner. Moreover, method requires lower computational complexity than other methods singular value (SVD) since only an intermediate step SVD decomposition. In addition, does...

10.1504/ijes.2020.10026896 article EN International Journal of Embedded Systems 2020-01-01
Coming Soon ...