Yaoming Ding
University of Science and Technology, Sana'a
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Yaoming Ding.
distributed multimedia systems | 2014
Conghuan Ye; Zenggang Xiong; Yaoming Ding; Guangwei Wang; Jiping Li; Kaibing Zhang
The advent of social networks and cloud computing has made social multimedia sharing in social networks become easier and more efficient. The lowered cost of redistribution, however, also invites much motivation for large-scale copyright infringement, so it is necessary to safeguard multimedia sharing for security and privacy. In this paper, we proposed a novel framework for joint fingerprinting and encryption (JFE) based on Cellular Automata (CA) and social network analysis (SNA) with the purpose of protecting media distribution in social networks. The motivation is to map the hierarchical community structure of social networks into the tree structure of Discrete Wavelet Transform (DWT) for fingerprinting and encryption. First, the fingerprint code is produced by using SNA. Then the obtained fingerprints are embedded into the DWT domain. Afterwards, CA is used for permutation in the DWT domain. Finally, the image is diffused with XOR operation in the spatial domain. The proposed method, to the best of our knowledge, is the first JFE method using CA and SNA in hybrid domains for security and privacy in social networks. The use of fingerprinting along with encryption can provide a double-layer protection for media sharing in social networks. Both theoretical analysis and experimental results validate the effectiveness of the proposed scheme. We proposed a new content sharing scheme using joint fingerprinting and encryption.We proposed a new encryption scheme with Cellular Automata.The encryption and fingerprinting are processed in hybrid domains.The proposed multimedia sharing scheme can provide a double-layer of protectionThe gray histograms of the encrypted images are nearly uniform.
trust security and privacy in computing and communications | 2014
Conghuan Ye; Zenggang Xiong; Yaoming Ding; Jiping Li; Guangwei Wang; Xuemin Zhang; Kaibing Zhang
With the advent of social networks and cloud computing, the amount of multimedia data produced and communicated within social networks is rapidly increasing. In the mean time, social networking platform based on cloud computing has made multimedia big data sharing in social network easier and more efficient. The growth of social multimedia, as demonstrated by social networking sites such as Facebook and YouTube, combined with advances in multimedia content analysis, underscores potential risks for malicious use such as illegal copying, piracy, plagiarism, and misappropriation. Therefore, secure multimedia sharing and traitor tracing issues have become critical and urgent in social network. In this paper, we propose a scheme for implementing the Tree-Structured Harr (TSH) transform in a homomorphic encrypted domain for fingerprinting using social network analysis with the purpose of protecting media distribution in social networks. The motivation is to map hierarchical community structure of social network into tree structure of TSH transform for JPEG2000 coding, encryption and fingerprinting. Firstly, the fingerprint code is produced using social network analysis. Secondly, the encrypted content is decomposed by the TSH transform. Thirdly, the content is fingerprinted in the TSH transform domain. At last, the encrypted and fingerprinted contents are delivered to users via hybrid multicast-unicast. The use of fingerprinting along with encryption can provide a double-layer of protection to media sharing in social networks. Theory analysis and experimental results show the effectiveness of the proposed scheme.
Journal of Communications | 2016
Jiping Li; Yaoming Ding; Zenggang Xiong; Shouyin Liu; Honglai Li
—User authentication and key management play an important role in the security of WSNs (Wireless Sensor Networks). In WSNs, for some applications, the user needs to obtain real-time data directly from dedicated sensors. For this case, several user authentication schemes have been proposed in recent years. Among these schemes, Kim Jiye et. al’s scheme is very novel. However, in the current work, we find that Kim Jiye et. al’s scheme is still vulnerable to some attacks such as offline password guessing attack, user impersonation attack using his/her own smart card, sensor node impersonation attack and gateway node bypassing attack. In this paper, we give detailed cryptanalysis of Kim Jiye et. al’s two-factor mutual authentication with key agreement in WSNs.
distributed multimedia systems | 2015
Conghuan Ye; Zenggang Xiong; Yaoming Ding; Guangwei Wang; Xuemin Zhang; Fang Xu
The advent of mobile social network and smartphone has made social multimedia sharing in social network easier and more efficient. However, it can also cause serious security and privacy problems, secure social multimedia sharing and traitor tracing issues have become critical and urgent. In this paper, we propose a joint fingerprinting and encryption (JFE) scheme based on Game of Life (GL) and singular value decomposition (SVD) with the purpose of protecting JPEG images sharing in mobile social networks. Firstly, the fingerprint code is produced using social network analysis. After that, a fast inter- transformation from block DCTs to DWT is employed. Then, fingerprints are embedded into the LL, HL and LH subbands. At last, GL and SVD are used to for confusion and diffusion respectively. The proposed method, to the best of our knowledge, is the first JFE method using GL and SVD in the JPEG compressed domain for security and privacy in JPEG images sharing. The use of fingerprinting along with encryption can provide a double-layer of protection to JPEG images sharing in social network. Theory analysis and experimental results show the effectiveness of the proposed JFE scheme. Most importantly, the performance of inter-transformation between block DCT and one-level DWT has a profound effect on lowering computational cost in our proposed JFE scheme. In the end, our JFE method can secure JPEG images sharing in social networks and meet the real-time requirement.
International Journal of Reasoning-based Intelligent Systems | 2016
Conghuan Ye; Zenggang Xiong; Yaoming Ding; Xueming Zhang; Guangwei Wang; Fang Xu; Zhen Liu
Multimedia fingerprinting is an effective technique to trace traitor who redistribute copyrighted social multimedia contents. However, several traitors can make an average collusion attack with their fingerprinted copies to avoid to be traced by digital fingerprints; furthermore, the commercial value of the colluded fingerprinted copy is often time-sensitive in social networks. The earlier the colluded content being redistributed in social network, the more profit the colluder will make from it. In this paper, a new desynchronisation fingerprinting is proposed. Random grid templates are used to produce desynchronised copies. This research has dealt with random distortions due to local geometric transformations of random grid template of image based on chaos, and then the processed fingerprinted content is distributed using social network analysis. The experimental results show that the average collusion will produce collude copy with low commercial value, and although colluders can try to use image registration to resynchronisation with expensive computational cost, and the visual quality does not improve with the increase of the number of copies.
Archive | 2015
Conghuan Ye; Zenggang Xiong; Yaoming Ding; Xueming Zhang; Guangwei Wang; Fang Xu
International journal of security and its applications | 2016
Conghuan Ye; Zenggang Xiong; Yaoming Ding; Xuemin Zhang; Guangwei Wang; Fang Xu
Ksii Transactions on Internet and Information Systems | 2017
Jiping Li; Yaoming Ding; Zenggang Xiong; Shouyin Liu
multimedia and ubiquitous engineering | 2016
Conghuan Ye; Zenggang Xiong; Yaoming Ding; Xueming Zhang; Guangwei Wang; Fang Xu
Archive | 2016
Conghuan Ye; Zenggang Xiong; Yaoming Ding; Xuemin Zhang; Fang Xu