Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Conghuan Ye is active.

Publication


Featured researches published by Conghuan Ye.


distributed multimedia systems | 2014

Joint fingerprinting and encryption in hybrid domains for multimedia sharing in social networks

Conghuan Ye; Zenggang Xiong; Yaoming Ding; Guangwei Wang; Jiping Li; Kaibing Zhang

The advent of social networks and cloud computing has made social multimedia sharing in social networks become easier and more efficient. The lowered cost of redistribution, however, also invites much motivation for large-scale copyright infringement, so it is necessary to safeguard multimedia sharing for security and privacy. In this paper, we proposed a novel framework for joint fingerprinting and encryption (JFE) based on Cellular Automata (CA) and social network analysis (SNA) with the purpose of protecting media distribution in social networks. The motivation is to map the hierarchical community structure of social networks into the tree structure of Discrete Wavelet Transform (DWT) for fingerprinting and encryption. First, the fingerprint code is produced by using SNA. Then the obtained fingerprints are embedded into the DWT domain. Afterwards, CA is used for permutation in the DWT domain. Finally, the image is diffused with XOR operation in the spatial domain. The proposed method, to the best of our knowledge, is the first JFE method using CA and SNA in hybrid domains for security and privacy in social networks. The use of fingerprinting along with encryption can provide a double-layer protection for media sharing in social networks. Both theoretical analysis and experimental results validate the effectiveness of the proposed scheme. We proposed a new content sharing scheme using joint fingerprinting and encryption.We proposed a new encryption scheme with Cellular Automata.The encryption and fingerprinting are processed in hybrid domains.The proposed multimedia sharing scheme can provide a double-layer of protectionThe gray histograms of the encrypted images are nearly uniform.


trust security and privacy in computing and communications | 2014

Secure Multimedia Big Data Sharing in Social Networks Using Fingerprinting and Encryption in the JPEG2000 Compressed Domain

Conghuan Ye; Zenggang Xiong; Yaoming Ding; Jiping Li; Guangwei Wang; Xuemin Zhang; Kaibing Zhang

With the advent of social networks and cloud computing, the amount of multimedia data produced and communicated within social networks is rapidly increasing. In the mean time, social networking platform based on cloud computing has made multimedia big data sharing in social network easier and more efficient. The growth of social multimedia, as demonstrated by social networking sites such as Facebook and YouTube, combined with advances in multimedia content analysis, underscores potential risks for malicious use such as illegal copying, piracy, plagiarism, and misappropriation. Therefore, secure multimedia sharing and traitor tracing issues have become critical and urgent in social network. In this paper, we propose a scheme for implementing the Tree-Structured Harr (TSH) transform in a homomorphic encrypted domain for fingerprinting using social network analysis with the purpose of protecting media distribution in social networks. The motivation is to map hierarchical community structure of social network into tree structure of TSH transform for JPEG2000 coding, encryption and fingerprinting. Firstly, the fingerprint code is produced using social network analysis. Secondly, the encrypted content is decomposed by the TSH transform. Thirdly, the content is fingerprinted in the TSH transform domain. At last, the encrypted and fingerprinted contents are delivered to users via hybrid multicast-unicast. The use of fingerprinting along with encryption can provide a double-layer of protection to media sharing in social networks. Theory analysis and experimental results show the effectiveness of the proposed scheme.


distributed multimedia systems | 2015

Joint Fingerprinting and Encryption for JPEG Images Sharing in Mobile Social Network

Conghuan Ye; Zenggang Xiong; Yaoming Ding; Guangwei Wang; Xuemin Zhang; Fang Xu

The advent of mobile social network and smartphone has made social multimedia sharing in social network easier and more efficient. However, it can also cause serious security and privacy problems, secure social multimedia sharing and traitor tracing issues have become critical and urgent. In this paper, we propose a joint fingerprinting and encryption (JFE) scheme based on Game of Life (GL) and singular value decomposition (SVD) with the purpose of protecting JPEG images sharing in mobile social networks. Firstly, the fingerprint code is produced using social network analysis. After that, a fast inter- transformation from block DCTs to DWT is employed. Then, fingerprints are embedded into the LL, HL and LH subbands. At last, GL and SVD are used to for confusion and diffusion respectively. The proposed method, to the best of our knowledge, is the first JFE method using GL and SVD in the JPEG compressed domain for security and privacy in JPEG images sharing. The use of fingerprinting along with encryption can provide a double-layer of protection to JPEG images sharing in social network. Theory analysis and experimental results show the effectiveness of the proposed JFE scheme. Most importantly, the performance of inter-transformation between block DCT and one-level DWT has a profound effect on lowering computational cost in our proposed JFE scheme. In the end, our JFE method can secure JPEG images sharing in social networks and meet the real-time requirement.


International Journal of Reasoning-based Intelligent Systems | 2016

Secure social multimedia content distribution based on social network analysis

Conghuan Ye; Zenggang Xiong; Yaoming Ding; Xueming Zhang; Guangwei Wang; Fang Xu; Zhen Liu

Multimedia fingerprinting is an effective technique to trace traitor who redistribute copyrighted social multimedia contents. However, several traitors can make an average collusion attack with their fingerprinted copies to avoid to be traced by digital fingerprints; furthermore, the commercial value of the colluded fingerprinted copy is often time-sensitive in social networks. The earlier the colluded content being redistributed in social network, the more profit the colluder will make from it. In this paper, a new desynchronisation fingerprinting is proposed. Random grid templates are used to produce desynchronised copies. This research has dealt with random distortions due to local geometric transformations of random grid template of image based on chaos, and then the processed fingerprinted content is distributed using social network analysis. The experimental results show that the average collusion will produce collude copy with low commercial value, and although colluders can try to use image registration to resynchronisation with expensive computational cost, and the visual quality does not improve with the increase of the number of copies.


International Journal of Knowledge-based and Intelligent Engineering Systems | 2016

A trust-based cloud computing access control model

Lanying Huang; Zenggang Xiong; Guangwei Wang; Conghuan Ye

The paper introduces the current status of the research on the trust-based access control model. On the based of the traditional TRBAC model, the paper presents a new trust model where the concepts are introduced, e.g. authentication, trust threshold value and secondary verification, etc. In this paper, the trust value is ranked and a detailed computing method is disclosed for credibility value. When the trust grade is at certain level, the service provider would perform permission granting. The experiment shows that the new model has relatively strong competence to resist malicious attacks.


Archive | 2015

Joint Fingerprinting/Encryption for Medical Image Security

Conghuan Ye; Zenggang Xiong; Yaoming Ding; Xueming Zhang; Guangwei Wang; Fang Xu


Information Technology Journal | 2013

Object Detection Using Edge Direction Histogram Features

Guangwei Wang; Zenggang Xiong; Yihua Lan; Conghuan Ye


International journal of security and its applications | 2016

Secure Multimedia Content Distribution for M2M Communication

Conghuan Ye; Zenggang Xiong; Yaoming Ding; Xuemin Zhang; Guangwei Wang; Fang Xu


SoftTech 2015 | 2015

Services Management Model Based on the SOA

Xuemin Zhang; Zenggang Xiong; Guangwei Wang; Conghuan Ye; Fang Xu


Archive | 2015

P2PCloud-W: A Novel P2PCloud Workflow Management Architecture Based on Petri Net

Xuemin Zhang; Zenggang Xiong; Gangwei Wang; Conghuan Ye; Xu Fang

Collaboration


Dive into the Conghuan Ye's collaboration.

Top Co-Authors

Avatar

Zenggang Xiong

University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Guangwei Wang

University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Yaoming Ding

University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Xuemin Zhang

University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Jiping Li

University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Kaibing Zhang

University of Science and Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge