Zhaofeng Ma
Beijing University of Posts and Telecommunications
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Zhaofeng Ma.
Journal of Computers | 2013
Qinlong Huang; Zhaofeng Ma; Jingyi Fu; Xinxin Niu; Yixian Yang
The existing digital rights management (DRM) schemes in cloud computing introduce a heavy computation overhead on the content provider for key distribution. In this paper, we propose an attribute-based DRM scheme in cloud computing by combining the techniques of ciphertext-policy attribute-based encryption (CP-ABE) and proxy re-encryption (PRE). We first divide the content encryption key into two parts, content master key and assistant key. Then we enforce access policies based on attributes to distribute the content master key securely. Thus the users who satisfy the access policy can recover the content master key, and then obtain assistant key from the key server and decrypt the content. Furthermore, we achieve efficient attribute and user revocation by allowing the attribute authority to delegate the key server to refuse to issue the assistant key for the revoked users. The security and performance analyses indicate that the proposed scheme is secure, efficient, and privacy-preserving.
Future Generation Computer Systems | 2018
Zhaofeng Ma; Ming Jiang; Hongmin Gao; Zhen Wang
Abstract Online digital content service becomes more and more easily, however, free consumption and excessive spreading without rights protection will hurt the content providers’ benefits and causes business loss, another problem is once the content provider supply illegal or politically sensitive content such as terroristic opinion or multimedia content, it will cause serious social problem such as fright or social crisis. To solve this problem, in this paper we proposed a blockchain-based scheme for digital rights management(named DRMChain), which supports the right content serves the right users in a right way, the DRMChain can provide trusted and high-level credible content protection and conditional traceability of violation content service. In the proposed DRMChain, we use two isolated blockchain application interfaces (BAI) to respectively store plain and cipher summary information of original and DRM-protected digital content, and considering large capacity of digital content such as image, audio or video, we proposed external flexible storage of plain/cipher digital content and creates hashID of the content itself and links with the blockchain. In DRMChain scheme, we named the BAI plain interface as BAIP for summary metadata storage of original content, and the BAI cipher interface as BAIC for DRM-protected content service. In the DRMChain scheme we proposed efficient and secure authentication, privacy protection and multi-signature-based conditional traceability approaches, and thus the DRM license, usage control and constrain information can be easily retrieved form the blockchain, and customs can query all the consumption transaction lists of free or paid consumption history to prevent baleful fee-deduction. Analysis and performance evaluation manifest the DRMChain scheme provides a reliable, secure, efficient and tamper-resistance digital content service and DRM practice.
China Communications | 2017
Zhaofeng Ma
with rapid achievement of current information technology and computing ability and applications, much more digital content such as films, cartoons, design drawings, office documents and software source codes are produced in daily work, however to protect the content being copying, shared or deliberately stolen by inside or outside, digital rights management (DRM) became more and more important for digital content protection. In this paper, we studied various DRM model, technology and application, and first proposed DRM Security Infrastructure (DSI), in which we defined encryption, hash, signature algorithm, watermarking algorithms, authentication, usage control, trusted counter, conditional trace, secure payment, and based on the DSI we then proposed a whole classification approach and architecture of all kinds of DRMs, in which we proposed 6 typical classes of copyrights and content protection DRMs architecture: (1) Software-oriented DRM,(2) eBook-oriented DRM, (3) Video-oriented DRM, (4)Image-Oriented DRM (5) Unstructured data oriented DRM, (6) Text-oriented DRM. Based on the above DSI, we then proposed a dynamic DRM model selection method for various DRM application, which can be adapted dynamically for different technology of different applications, which can provide a whole solution for variant DRM development in a rapid and customized mode. The proposed DRM method, technology and application in this paper provided a common, flexible and extendable solution for variant DRM scenes, and can support rapid and customized development. Moreover, we proposed an opinion that the future life will enter into a new era that the content usage and consumption will not again adopt DRM technology rather than with law, liberty and morality.
Archive | 2013
Jia Mo; Zhaofeng Ma; Yixian Yang; Xinxin Niu
As a key technology for digital content copyright protection, digital watermark often sees a dilemma between imperceptibility and robustness. In view of the problem, this paper suggests a CT-SVD-based intelligent watermarking scheme that embraces three major algorithms including the watermark preprocessing, the watermark embedding, and extracting. The host image is first decomposed by contourlet transform to get the low frequency subband images on which the SVD decomposition is then implemented before embedding the preprocessed watermark. The watermark extracting is an inversion of watermark embedding. To maximize the watermark robustness while maintaining its imperceptibility, particle swarm optimization (PSO) is applied to have heuristic searches for scaling factor. The experiment has demonstrated that this scheme is capable of resisting frequent image attacks with better imperceptibility and robustness.
Archive | 2009
Yu Xin; Zhaofeng Ma; Zhichao Zhao; Jianqing Huang; Licong Chen; Yixian Yang; Xinxin Niu; Baoyin Sun
Chinese Journal of Electronics | 2015
Qinlong Huang; Zhaofeng Ma; Yixian Yang; Jingyi Fu; Xinxin Niu
International Journal of Digital Content Technology and Its Applications | 2011
Ming Jiang; Zhaofeng Ma; Xinxin Niu(钮心忻); Yixian Yang
Chinese Journal of Electronics | 2016
Zhaofeng Ma; Jianqing Huang; Ming Jiang; Xinxin Niu
China Communications | 2014
Qinlong Huang; Zhaofeng Ma; Yixian Yang; Xinxin Niu; Jingyi Fu
International Journal of Digital Content Technology and Its Applications | 2012
Ming Jiang; Yixian Yang; Zhaofeng Ma; Xinxin Niu(钮心忻)