Guangyong Gao

Orcid: 0000-0003-3975-737X

According to our database1, Guangyong Gao authored at least 34 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Efficient Robust Reversible Watermarking Based on ZMs and Integer Wavelet Transform.
IEEE Trans. Ind. Informatics, March, 2024

Enhancing accessibility of web-based SVG buttons: An optimization method and best practices.
Expert Syst. Appl., March, 2024

AccessFixer: Enhancing GUI Accessibility for Low Vision Users With R-GCN Model.
IEEE Trans. Software Eng., February, 2024

Reversible Data Hiding in Encrypted Images With Adaptive Huffman Code Based on Dynamic Prediction Axes.
IEEE Trans. Multim., 2024

Reversible Data Hiding-Based Contrast Enhancement With Multi-Group Stretching for ROI of Medical Image.
IEEE Trans. Multim., 2024

2023
Energy Efficient Three-Factor Authentication in Wireless Sensor Networks With Resisting Insider Attacks.
IEEE Trans. Green Commun. Netw., September, 2023

A hue preservation lossless contrast enhancement method with RDH for color images.
Digit. Signal Process., May, 2023

A novel watermarking scheme for authenticating individual data integrity of WSNs.
KSII Trans. Internet Inf. Syst., March, 2023

High-performance reversible data hiding in encrypted images with adaptive Huffman code.
Digit. Signal Process., March, 2023

A Universal Reversible Data Hiding Method in Encrypted Image Based on MSB Prediction and Error Embedding.
IEEE Trans. Cloud Comput., 2023

A Data Integrity Authentication Scheme in WSNs Based on Double Watermark.
IEEE Internet Things J., 2023

2022
Automatic contrast enhancement with reversible data hiding using bi-histogram shifting.
J. Inf. Secur. Appl., 2022

2021
Data Authentication for Wireless Sensor Networks with High Detection Efficiency Based on Reversible Watermarking.
Wirel. Commun. Mob. Comput., 2021

Reversible data hiding with automatic contrast enhancement for medical images.
Signal Process., 2021

2020
Reversible Multiple Items Authentication Scheme for WSNs.
IEEE Access, 2020

2019
Visual object tracking with discriminative correlation filtering and hybrid color feature.
Multim. Tools Appl., 2019

Digital Watermark-Based Independent Individual Certification Scheme in WSNs.
IEEE Access, 2019

An Independent Individual Certification Scheme Based on Digital Watermark in WSNs.
Proceedings of the 2019 IEEE International Conference on Smart Internet of Things (SmartIoT), 2019

2018
Blind Reversible Authentication Based on PEE and CS Reconstruction.
IEEE Signal Process. Lett., 2018

Certificate-Based Generalized Ring Signcryption Scheme.
Int. J. Found. Comput. Sci., 2018

2017
Certificateless Signcryption in the Standard Model.
Wirel. Pers. Commun., 2017

Reversible data hiding with contrast enhancement and tamper localization for medical images.
Inf. Sci., 2017

Identity Authentication Protection for "Spatial Watermarking + QR Code" Paper-cutting Digital Image.
Proceedings of the VI International Conference on Network, Communication and Computing, 2017

2016
An efficient subscription index for publication matching in the cloud.
Knowl. Based Syst., 2016

Efficient Identity-Based Generalized Ring Signcryption Scheme.
KSII Trans. Internet Inf. Syst., 2016

Reversible Watermarking with Adaptive Embedding Threshold Matrix.
KSII Trans. Internet Inf. Syst., 2016

Efficient key management for publish/subscribe system in cloud scenarios.
Int. J. High Perform. Comput. Netw., 2016

2015
Reversible Data Hiding Using Controlled Contrast Enhancement and Integer Wavelet Transform.
IEEE Signal Process. Lett., 2015

Bessel-Fourier moment-based robust image zero-watermarking.
Multim. Tools Appl., 2015

Efficient Key Management for IOT Owner in the Cloud.
Proceedings of the Fifth IEEE International Conference on Big Data and Cloud Computing, 2015

2014
Improved Method of Prediction Error-based Reversible Watermarking for Copyright Protection.
Proceedings of the International Conference on Internet Multimedia Computing and Service, 2014

2013
Composite chaos-based lossless image authentication and tamper localization.
Multim. Tools Appl., 2013

A lossless copyright authentication scheme based on Bessel-Fourier moment and extreme learning machine in curvature-feature domain.
J. Syst. Softw., 2013

2011
A zero-watermarking image authentication scheme using Zernike moment and extreme learning machine.
Proceedings of the 2011 International Conference on Wireless Communications & Signal Processing, 2011


  Loading...