Wei Hou

ORCID: 0000-0003-4944-1811
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Digital Media Forensic Detection
  • Advanced Steganography and Watermarking Techniques
  • Power Systems and Technologies
  • Chaos-based Image/Signal Encryption
  • Scheduling and Optimization Algorithms
  • Visual Attention and Saliency Detection
  • Advanced Authentication Protocols Security
  • Advanced Data Compression Techniques
  • Smart Grid and Power Systems
  • Digital Rights Management and Security
  • Manufacturing Process and Optimization
  • IPv6, Mobility, Handover, Networks, Security
  • Advanced Manufacturing and Logistics Optimization

Xi’an University of Posts and Telecommunications
2021-2022

Nanchang University
2018

Northeast Electric Power University
2013-2014

In the fierce market competition environment, to maximize production efficiency, manufacturing enterprises mostly adopt many varieties of small batch and discrete mode production. The process has very strong flexibility. But are lack scheduling management or parallel machine unit adopts method static quota system, so flexible resource in enterprise system began reveal inadequate it reduce efficiency enterprise. This paper provide Nested Partition Method for problem, establishing mathematic...

10.4028/www.scientific.net/amm.459.488 article EN Applied Mechanics and Materials 2013-10-01

Welcome to the WIT Press eLibrary - home of Transactions Wessex Institute collection, providing on-line access papers presented at Institute's prestigious international conferences and from its State-of-the-Art in Science & Engineering publications.

10.2495/iceee140811 article EN WIT transactions on engineering sciences 2014-06-01

As the development of Internet, E-commerce gradually becomes a new form business activities; security traditional cryptographic technique application method is under threat too. Not only domestic scholars but also foreign are all devoting themselves to study solutions faced application. Using with and very important practical significance. This paper studied problems e-commerce transactions analyzed combining password techniques from technology angle; moreover aimed at characteristics...

10.4028/www.scientific.net/amr.679.121 article EN Advanced materials research 2013-04-01

The embedding capacity of the traditional reversible information hiding algorithm based on asymmetric prediction error histogram is limited by number pixels at peak point, available in image are not fully utilized, resulting increase invalid shift points, which makes visual quality camouflage poor. In this paper, a new multi-bit translation proposed, aims to greatly improve carrier with minimal impact quality. more use correlation between adjacent pixels, so that value concentrated near and...

10.1145/3573942.3574067 article EN 2022-09-23

This paper proposes a new symmetric information hiding scheme, aiming to increase the degree of disguise and security. scheme utilizes randomness image cover itself generate secret key which has high randomness, so as improve effect stego-objects security scheme. In addition, this also test method, can give more accurate quantitative results is suitable for testing cover. Experimental studies show that method stego-object steganographic algorithm, enhance robustness some extent.

10.1109/nana53684.2021.00058 article EN 2022 International Conference on Networking and Network Applications (NaNA) 2021-10-01
Coming Soon ...