RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
        • 등재정보
        • 학술지명
        • 주제분류
        • 발행연도
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • Joint Fingerprinting/Encryption for Medical Image Security

        Conghuan Ye,Zenggang Xiong,Yaoming Ding,Xueming Zhang,Guangwei Wang,Fang Xu 보안공학연구지원센터 2015 International Journal of Security and Its Applicat Vol.9 No.1

        Electronic health records (EHRs) facilitates the healthcare process. However, it can also cause serious security and privacy problems. While various conventional encryption mechanisms can solve some aspects of these problems, they cannot address the illegal distribution of decrypted medical images. To protect decrypted medical images from being illegally distributed by an authorized staff member, the scheme proposed in this paper provides a joint fingerprinting and encryption (JFE) scheme based on GoL (Game of Life) and DNA computing with the purpose of protecting medical media distribution. In this study, GoL and DNA are used to confuse in DWT domain and diffusion in spatial domain respectively, and fingerprints are embedded into the HL and LH subbands of DWT domain. The use of fingerprinting along with encryption can provide a double-layer of protection to medical image. Experimental results show the effectiveness of the proposed scheme.

      • KCI등재

        An Improved Two-Factor Mutual Authentication Scheme with Key Agreement in Wireless Sensor Networks

        ( Jiping Li ),( Yaoming Ding ),( Zenggang Xiong ),( Shouyin Liu ) 한국인터넷정보학회 2017 KSII Transactions on Internet and Information Syst Vol.11 No.11

        As a main component of Internet of Things (IoTs), the wireless sensor networks (WSNs) have been widely applied to various areas, including environment monitoring, health monitoring of human body, farming, commercial manufacture, reconnaissance mission in military, and calamity alert etc. Meanwhile, the privacy concerns also arise when the users are required to get the real-time data from the sensor nodes directly. To solve this problem, several user authentication and key agreement schemes with a smart card and a password have been proposed in the past years. However, these schemes are vulnerable to some attacks such as offline password guessing attack, user impersonation attack by using attacker’s own smart card, sensor node impersonation attack and gateway node bypassing attack. In this paper, we propose an improved scheme which can resist a wide variety of attacks in WSNs. Cryptanalysis and performance analysis show that our scheme can solve the weaknesses of previously proposed schemes and enhance security requirements while maintaining low computational cost.

      • A New Collusion Attack Using Interpolation for Multimedia Fingerprinting

        Conghuan Ye,Zenggang Xiong,Yaoming Ding,Xuemin Zhang,Guangwei Wang,Fang Xu 보안공학연구지원센터 2016 International Journal of Security and Its Applicat Vol.10 No.5

        Digital fingerprinting is a special digital watermarking technology that can deter legal user to redistribute multimedia content to others. With traitor tracing, it can detect illegal users who use multimedia content illegally. However, collusion attack can avoid some illegal users being detected. With different fingerprinted copies, collusion attack can produce a new colluded fingerprinted copy for get rid of the fingerprint information from the colluded copy, so digital fingerprinting technique should deter collusion attacks. In order to improve the performance of new digital fingerprinting technique in future, this paper presents a new collusion attack approach based on interpolation. The proposed interpolation collusion attack scheme comes from the idea of image fusion. The experimental results demonstrate that the proposed interpolation collusion attack method outperform average attack and maximum attack.

      • Joint Fingerprinting and Encryption in the DWT Domain for Secure M2M Communication

        Conghuan Ye,Zenggang Xiong,Yaoming Ding,Xueming Zhang,Guangwei Wang,Fang Xu 보안공학연구지원센터 2016 International Journal of Security and Its Applicat Vol.10 No.1

        Machine-to-machine (M2M) communication is viewed as one of the next frontiers in wireless communications. Because of unguarded communication, new security threats emerge. Considering that multimedia will be widely used in various applications over M2M network, it is very urgent to meet new security requirements for multimedia communication. This paper focuses on a joint fingerprinting and encryption (JFE) scheme in the DWT domain with the purpose of protecting multimedia distribution. A multimedia encryption scheme is first to scramble the multimedia content before distribution, and the fingerprinting scheme is then introduced to provide further protection. The goal of the proposed content distribution scheme is to provide secure content communication and deter the device from illegally redistributing the content. The proposed method, to the best of our knowledge, is the first JFE method in the DWT domain for secure M2M communication. The use of fingerprinting along with encryption can provide a double-layer of protection to digital media. Theory analysis and experimental results show the effectiveness of the proposed scheme.

      • Secure Multimedia Content Distribution for M2M Communication

        Conghuan Ye,Zenggang Xiong,Yaoming Ding,Xuemin Zhang,Guangwei Wang,Fang Xu 보안공학연구지원센터 2016 International Journal of Security and Its Applicat Vol.10 No.4

        Multimedia content distribution based on M2M communication is attracting increasing attentions nowadays. Considering that multimedia will be widely used in various applications over M2M network, the wide range of multimedia content and M2M devices has raised new security requirements for multimedia communication. In this paper, we focus on an aspect of DRM that involves secure multimedia distribution which combines multimedia encryption, copy detection, and digital fingerprinting to prevent widespread piracy. Multimedia encryption is used to encrypt multimedia content firstly before distribution, then, Copy detection is used to verify whether a protected multimedia content is a redistributed copy of its or no, At last, digital fingerprinting is introduced to protect multimedia content further. In this paper, we first use using encryption, fingerprinting and copy detection for secure distribution in M2M communication environments. The secure effect of the proposed scheme has been verified through theory analysis and experimental results.

      • Parallel Joint Fingerprinting and Encryption for Social Multimedia Sharing Based on Game of Life

        Conghuan Ye,Zenggang Xiong,Yaoming Ding,Xuemin Zhang,Guangwei Wang,Fang Xu,Kaibing Zhang 보안공학연구지원센터 2016 International Journal of Security and Its Applicat Vol.10 No.7

        The advent of online social network and mobile multimedia communication has made content sharing in social network easier and more efficient. It is very important to combine fingerprinting and encryption for social multimedia content protection. In this paper, a parallel JFE (joint fingerprinting and encryption) framework is proposed. Firstly, the multi-level social fingerprint code is produced using social network analysis, and followed by TSH (tree structure harr) wavelet decomposition for multimedia content. And then, fingerprints are embedded into all the LL, HL and LH subbands parallelly. At last, GoL(Game of Life) are used to for confusion for wavelet coefficients parallelly. The proposed parallel JFE method, to the best of our knowledge, is the first JFE method using GoL in the TSH wavelet domain for security and privacy. Theory analysis and experimental results demonstrate the effectiveness of the proposed JFE scheme.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼