RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 학술지명
        • 주제분류
        • 발행연도
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • Joint Fingerprinting and Encryption in the DWT Domain for Secure M2M Communication

        Conghuan Ye,Zenggang Xiong,Yaoming Ding,Xueming Zhang,Guangwei Wang,Fang Xu 보안공학연구지원센터 2016 International Journal of Security and Its Applicat Vol.10 No.1

        Machine-to-machine (M2M) communication is viewed as one of the next frontiers in wireless communications. Because of unguarded communication, new security threats emerge. Considering that multimedia will be widely used in various applications over M2M network, it is very urgent to meet new security requirements for multimedia communication. This paper focuses on a joint fingerprinting and encryption (JFE) scheme in the DWT domain with the purpose of protecting multimedia distribution. A multimedia encryption scheme is first to scramble the multimedia content before distribution, and the fingerprinting scheme is then introduced to provide further protection. The goal of the proposed content distribution scheme is to provide secure content communication and deter the device from illegally redistributing the content. The proposed method, to the best of our knowledge, is the first JFE method in the DWT domain for secure M2M communication. The use of fingerprinting along with encryption can provide a double-layer of protection to digital media. Theory analysis and experimental results show the effectiveness of the proposed scheme.

      • Parallel Joint Fingerprinting and Encryption for Social Multimedia Sharing Based on Game of Life

        Conghuan Ye,Zenggang Xiong,Yaoming Ding,Xuemin Zhang,Guangwei Wang,Fang Xu,Kaibing Zhang 보안공학연구지원센터 2016 International Journal of Security and Its Applicat Vol.10 No.7

        The advent of online social network and mobile multimedia communication has made content sharing in social network easier and more efficient. It is very important to combine fingerprinting and encryption for social multimedia content protection. In this paper, a parallel JFE (joint fingerprinting and encryption) framework is proposed. Firstly, the multi-level social fingerprint code is produced using social network analysis, and followed by TSH (tree structure harr) wavelet decomposition for multimedia content. And then, fingerprints are embedded into all the LL, HL and LH subbands parallelly. At last, GoL(Game of Life) are used to for confusion for wavelet coefficients parallelly. The proposed parallel JFE method, to the best of our knowledge, is the first JFE method using GoL in the TSH wavelet domain for security and privacy. Theory analysis and experimental results demonstrate the effectiveness of the proposed JFE scheme.

      • Joint Fingerprinting/Encryption for Medical Image Security

        Conghuan Ye,Zenggang Xiong,Yaoming Ding,Xueming Zhang,Guangwei Wang,Fang Xu 보안공학연구지원센터 2015 International Journal of Security and Its Applicat Vol.9 No.1

        Electronic health records (EHRs) facilitates the healthcare process. However, it can also cause serious security and privacy problems. While various conventional encryption mechanisms can solve some aspects of these problems, they cannot address the illegal distribution of decrypted medical images. To protect decrypted medical images from being illegally distributed by an authorized staff member, the scheme proposed in this paper provides a joint fingerprinting and encryption (JFE) scheme based on GoL (Game of Life) and DNA computing with the purpose of protecting medical media distribution. In this study, GoL and DNA are used to confuse in DWT domain and diffusion in spatial domain respectively, and fingerprints are embedded into the HL and LH subbands of DWT domain. The use of fingerprinting along with encryption can provide a double-layer of protection to medical image. Experimental results show the effectiveness of the proposed scheme.

      • Secure Multimedia Content Distribution for M2M Communication

        Conghuan Ye,Zenggang Xiong,Yaoming Ding,Xuemin Zhang,Guangwei Wang,Fang Xu 보안공학연구지원센터 2016 International Journal of Security and Its Applicat Vol.10 No.4

        Multimedia content distribution based on M2M communication is attracting increasing attentions nowadays. Considering that multimedia will be widely used in various applications over M2M network, the wide range of multimedia content and M2M devices has raised new security requirements for multimedia communication. In this paper, we focus on an aspect of DRM that involves secure multimedia distribution which combines multimedia encryption, copy detection, and digital fingerprinting to prevent widespread piracy. Multimedia encryption is used to encrypt multimedia content firstly before distribution, then, Copy detection is used to verify whether a protected multimedia content is a redistributed copy of its or no, At last, digital fingerprinting is introduced to protect multimedia content further. In this paper, we first use using encryption, fingerprinting and copy detection for secure distribution in M2M communication environments. The secure effect of the proposed scheme has been verified through theory analysis and experimental results.

      • A New Collusion Attack Using Interpolation for Multimedia Fingerprinting

        Conghuan Ye,Zenggang Xiong,Yaoming Ding,Xuemin Zhang,Guangwei Wang,Fang Xu 보안공학연구지원센터 2016 International Journal of Security and Its Applicat Vol.10 No.5

        Digital fingerprinting is a special digital watermarking technology that can deter legal user to redistribute multimedia content to others. With traitor tracing, it can detect illegal users who use multimedia content illegally. However, collusion attack can avoid some illegal users being detected. With different fingerprinted copies, collusion attack can produce a new colluded fingerprinted copy for get rid of the fingerprint information from the colluded copy, so digital fingerprinting technique should deter collusion attacks. In order to improve the performance of new digital fingerprinting technique in future, this paper presents a new collusion attack approach based on interpolation. The proposed interpolation collusion attack scheme comes from the idea of image fusion. The experimental results demonstrate that the proposed interpolation collusion attack method outperform average attack and maximum attack.

      • P2PCloud-W: A Novel P2PCloud Workflow Management Architecture Based on Petri Net

        Xuemin Zhang,Zenggang Xiong,Gangwei Wang,Conghuan Ye,Xu Fang 보안공학연구지원센터 2015 International Journal of Grid and Distributed Comp Vol.8 No.2

        IaaS model in the Cloud Computing provides infrastructure services to users. However, the provider of such centralized Cloud requires notable investments to maintain the infrastructures. P2P Cloud, whose infrastructures are provided by multiple volunteer nodes in the P2P network, gives a low cost option to the provision of Cloud Computing. P2PCloud workflow is used to handle tasks with control and data dependencies, and plays an important role in P2PCloud environment. It is essential to design an appropriate model to satisfy the distributed and heterogeneous workflow systems that must be flexible, reusable, dynamic feature in higher level. In this paper, An architecture of a P2PCloud system firstly is proposed, and then a P2PCloud-W(P2PCloud workflow system) framework is proposed, which is a novel hybrid decentralized workflow management system facilitating both Cloud and P2P technologies. Finally, a P2PCloud-W case is analyzed using Petri Net.

      • The Study of Services Management Based on the Network Environment

        Xuemin Zhang,Zenggang Xiong,Guangwei Wang,Conghuan Ye,Fang Xu 보안공학연구지원센터 2015 International Journal of Smart Home Vol.9 No.5

        Service-Oriented Architecture (SOA) constructs applications by publishing services in an open network environment. In network environment individual service changes highly dynamically, it is required the system based on services to adapt to this change. But the current service management in network environment doesn’t have a good, unified management mode, management mechanism, service and quality control system, and lacks of theoretical foundation to express formal service system. In this paper, a service management framework is designed. A mechanism and method based on strategy and dynamic network environment service management are proposed. The method can effectively solve the problem of dynamic service management in network environment, and is widely used in dynamic service management based on Web services.

      • A Novel Social Context-Aware Data Forwarding Scheme in Mobile Social Networks

        Fang Xu,Huyin Zhang,Min Deng,Ning Xu,Zhiyong Wang,Zenggang Xiong,Conghuan Ye 보안공학연구지원센터 2016 International Journal of Smart Home Vol.10 No.6

        Routing in disconnected delay-tolerant mobile ad hoc networks (MANETs) continues to be a challenging issue. Several works have been done to address the routing issues using the social behaviors of each node. Mobile Social Networks (MSNs) are increasingly popular type of Delay Tolerant Networks (DTNs). The routing performance improves when knowledge regarding the expected topology and the social context information of the networks. In this paper, we introduce a new metric for data forwarding based on social context information, in which node’s social context information is used to calculate the encounter utility between a node and destination, and the social relationship of network nodes is used to calculate the betweenness centrality utility of a node. We combine two utility functions to derive the social strength among users and their importance. We also present social context-based data forwarding algorithm for routing decision. Extensive simulations on real traces show that the introduced algorithm is more efficient than the existing algorithms.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼