Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Yaoming Ding is active.

Publication


Featured researches published by Yaoming Ding.


distributed multimedia systems | 2014

Joint fingerprinting and encryption in hybrid domains for multimedia sharing in social networks

Conghuan Ye; Zenggang Xiong; Yaoming Ding; Guangwei Wang; Jiping Li; Kaibing Zhang

The advent of social networks and cloud computing has made social multimedia sharing in social networks become easier and more efficient. The lowered cost of redistribution, however, also invites much motivation for large-scale copyright infringement, so it is necessary to safeguard multimedia sharing for security and privacy. In this paper, we proposed a novel framework for joint fingerprinting and encryption (JFE) based on Cellular Automata (CA) and social network analysis (SNA) with the purpose of protecting media distribution in social networks. The motivation is to map the hierarchical community structure of social networks into the tree structure of Discrete Wavelet Transform (DWT) for fingerprinting and encryption. First, the fingerprint code is produced by using SNA. Then the obtained fingerprints are embedded into the DWT domain. Afterwards, CA is used for permutation in the DWT domain. Finally, the image is diffused with XOR operation in the spatial domain. The proposed method, to the best of our knowledge, is the first JFE method using CA and SNA in hybrid domains for security and privacy in social networks. The use of fingerprinting along with encryption can provide a double-layer protection for media sharing in social networks. Both theoretical analysis and experimental results validate the effectiveness of the proposed scheme. We proposed a new content sharing scheme using joint fingerprinting and encryption.We proposed a new encryption scheme with Cellular Automata.The encryption and fingerprinting are processed in hybrid domains.The proposed multimedia sharing scheme can provide a double-layer of protectionThe gray histograms of the encrypted images are nearly uniform.


trust security and privacy in computing and communications | 2014

Secure Multimedia Big Data Sharing in Social Networks Using Fingerprinting and Encryption in the JPEG2000 Compressed Domain

Conghuan Ye; Zenggang Xiong; Yaoming Ding; Jiping Li; Guangwei Wang; Xuemin Zhang; Kaibing Zhang

With the advent of social networks and cloud computing, the amount of multimedia data produced and communicated within social networks is rapidly increasing. In the mean time, social networking platform based on cloud computing has made multimedia big data sharing in social network easier and more efficient. The growth of social multimedia, as demonstrated by social networking sites such as Facebook and YouTube, combined with advances in multimedia content analysis, underscores potential risks for malicious use such as illegal copying, piracy, plagiarism, and misappropriation. Therefore, secure multimedia sharing and traitor tracing issues have become critical and urgent in social network. In this paper, we propose a scheme for implementing the Tree-Structured Harr (TSH) transform in a homomorphic encrypted domain for fingerprinting using social network analysis with the purpose of protecting media distribution in social networks. The motivation is to map hierarchical community structure of social network into tree structure of TSH transform for JPEG2000 coding, encryption and fingerprinting. Firstly, the fingerprint code is produced using social network analysis. Secondly, the encrypted content is decomposed by the TSH transform. Thirdly, the content is fingerprinted in the TSH transform domain. At last, the encrypted and fingerprinted contents are delivered to users via hybrid multicast-unicast. The use of fingerprinting along with encryption can provide a double-layer of protection to media sharing in social networks. Theory analysis and experimental results show the effectiveness of the proposed scheme.


Journal of Communications | 2016

Cryptanalysis of Kim Jiye et al.’s Two-Factor Mutual Authentication with Key Agreement in WSNs

Jiping Li; Yaoming Ding; Zenggang Xiong; Shouyin Liu; Honglai Li

—User authentication and key management play an important role in the security of WSNs (Wireless Sensor Networks). In WSNs, for some applications, the user needs to obtain real-time data directly from dedicated sensors. For this case, several user authentication schemes have been proposed in recent years. Among these schemes, Kim Jiye et. al’s scheme is very novel. However, in the current work, we find that Kim Jiye et. al’s scheme is still vulnerable to some attacks such as offline password guessing attack, user impersonation attack using his/her own smart card, sensor node impersonation attack and gateway node bypassing attack. In this paper, we give detailed cryptanalysis of Kim Jiye et. al’s two-factor mutual authentication with key agreement in WSNs.


distributed multimedia systems | 2015

Joint Fingerprinting and Encryption for JPEG Images Sharing in Mobile Social Network

Conghuan Ye; Zenggang Xiong; Yaoming Ding; Guangwei Wang; Xuemin Zhang; Fang Xu

The advent of mobile social network and smartphone has made social multimedia sharing in social network easier and more efficient. However, it can also cause serious security and privacy problems, secure social multimedia sharing and traitor tracing issues have become critical and urgent. In this paper, we propose a joint fingerprinting and encryption (JFE) scheme based on Game of Life (GL) and singular value decomposition (SVD) with the purpose of protecting JPEG images sharing in mobile social networks. Firstly, the fingerprint code is produced using social network analysis. After that, a fast inter- transformation from block DCTs to DWT is employed. Then, fingerprints are embedded into the LL, HL and LH subbands. At last, GL and SVD are used to for confusion and diffusion respectively. The proposed method, to the best of our knowledge, is the first JFE method using GL and SVD in the JPEG compressed domain for security and privacy in JPEG images sharing. The use of fingerprinting along with encryption can provide a double-layer of protection to JPEG images sharing in social network. Theory analysis and experimental results show the effectiveness of the proposed JFE scheme. Most importantly, the performance of inter-transformation between block DCT and one-level DWT has a profound effect on lowering computational cost in our proposed JFE scheme. In the end, our JFE method can secure JPEG images sharing in social networks and meet the real-time requirement.


International Journal of Reasoning-based Intelligent Systems | 2016

Secure social multimedia content distribution based on social network analysis

Conghuan Ye; Zenggang Xiong; Yaoming Ding; Xueming Zhang; Guangwei Wang; Fang Xu; Zhen Liu

Multimedia fingerprinting is an effective technique to trace traitor who redistribute copyrighted social multimedia contents. However, several traitors can make an average collusion attack with their fingerprinted copies to avoid to be traced by digital fingerprints; furthermore, the commercial value of the colluded fingerprinted copy is often time-sensitive in social networks. The earlier the colluded content being redistributed in social network, the more profit the colluder will make from it. In this paper, a new desynchronisation fingerprinting is proposed. Random grid templates are used to produce desynchronised copies. This research has dealt with random distortions due to local geometric transformations of random grid template of image based on chaos, and then the processed fingerprinted content is distributed using social network analysis. The experimental results show that the average collusion will produce collude copy with low commercial value, and although colluders can try to use image registration to resynchronisation with expensive computational cost, and the visual quality does not improve with the increase of the number of copies.


Archive | 2015

Joint Fingerprinting/Encryption for Medical Image Security

Conghuan Ye; Zenggang Xiong; Yaoming Ding; Xueming Zhang; Guangwei Wang; Fang Xu


International journal of security and its applications | 2016

Secure Multimedia Content Distribution for M2M Communication

Conghuan Ye; Zenggang Xiong; Yaoming Ding; Xuemin Zhang; Guangwei Wang; Fang Xu


Ksii Transactions on Internet and Information Systems | 2017

An Improved Two-Factor Mutual Authentication Scheme with Key Agreement in Wireless Sensor Networks

Jiping Li; Yaoming Ding; Zenggang Xiong; Shouyin Liu


multimedia and ubiquitous engineering | 2016

Recursive Chaotic Desynchronized Fingerprint for Large Scale Distribution Using Social Network Analysis

Conghuan Ye; Zenggang Xiong; Yaoming Ding; Xueming Zhang; Guangwei Wang; Fang Xu


Archive | 2016

A New Collusion Attack Using Interpolation for Multimedia Fingerprinting

Conghuan Ye; Zenggang Xiong; Yaoming Ding; Xuemin Zhang; Fang Xu

Collaboration


Dive into the Yaoming Ding's collaboration.

Top Co-Authors

Avatar

Zenggang Xiong

University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Conghuan Ye

University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Guangwei Wang

University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Jiping Li

University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Xuemin Zhang

University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Shouyin Liu

Central China Normal University

View shared research outputs
Top Co-Authors

Avatar

Kaibing Zhang

University of Science and Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge