Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Zhaofeng Ma is active.

Publication


Featured researches published by Zhaofeng Ma.


Journal of Computers | 2013

Attribute Based DRM Scheme with Efficient Revocation in Cloud Computing

Qinlong Huang; Zhaofeng Ma; Jingyi Fu; Xinxin Niu; Yixian Yang

The existing digital rights management (DRM) schemes in cloud computing introduce a heavy computation overhead on the content provider for key distribution. In this paper, we propose an attribute-based DRM scheme in cloud computing by combining the techniques of ciphertext-policy attribute-based encryption (CP-ABE) and proxy re-encryption (PRE). We first divide the content encryption key into two parts, content master key and assistant key. Then we enforce access policies based on attributes to distribute the content master key securely. Thus the users who satisfy the access policy can recover the content master key, and then obtain assistant key from the key server and decrypt the content. Furthermore, we achieve efficient attribute and user revocation by allowing the attribute authority to delegate the key server to refuse to issue the assistant key for the revoked users. The security and performance analyses indicate that the proposed scheme is secure, efficient, and privacy-preserving.


Future Generation Computer Systems | 2018

Blockchain for digital rights management

Zhaofeng Ma; Ming Jiang; Hongmin Gao; Zhen Wang

Abstract Online digital content service becomes more and more easily, however, free consumption and excessive spreading without rights protection will hurt the content providers’ benefits and causes business loss, another problem is once the content provider supply illegal or politically sensitive content such as terroristic opinion or multimedia content, it will cause serious social problem such as fright or social crisis. To solve this problem, in this paper we proposed a blockchain-based scheme for digital rights management(named DRMChain), which supports the right content serves the right users in a right way, the DRMChain can provide trusted and high-level credible content protection and conditional traceability of violation content service. In the proposed DRMChain, we use two isolated blockchain application interfaces (BAI) to respectively store plain and cipher summary information of original and DRM-protected digital content, and considering large capacity of digital content such as image, audio or video, we proposed external flexible storage of plain/cipher digital content and creates hashID of the content itself and links with the blockchain. In DRMChain scheme, we named the BAI plain interface as BAIP for summary metadata storage of original content, and the BAI cipher interface as BAIC for DRM-protected content service. In the DRMChain scheme we proposed efficient and secure authentication, privacy protection and multi-signature-based conditional traceability approaches, and thus the DRM license, usage control and constrain information can be easily retrieved form the blockchain, and customs can query all the consumption transaction lists of free or paid consumption history to prevent baleful fee-deduction. Analysis and performance evaluation manifest the DRMChain scheme provides a reliable, secure, efficient and tamper-resistance digital content service and DRM practice.


China Communications | 2017

Digital rights management: Model, technology and application

Zhaofeng Ma

with rapid achievement of current information technology and computing ability and applications, much more digital content such as films, cartoons, design drawings, office documents and software source codes are produced in daily work, however to protect the content being copying, shared or deliberately stolen by inside or outside, digital rights management (DRM) became more and more important for digital content protection. In this paper, we studied various DRM model, technology and application, and first proposed DRM Security Infrastructure (DSI), in which we defined encryption, hash, signature algorithm, watermarking algorithms, authentication, usage control, trusted counter, conditional trace, secure payment, and based on the DSI we then proposed a whole classification approach and architecture of all kinds of DRMs, in which we proposed 6 typical classes of copyrights and content protection DRMs architecture: (1) Software-oriented DRM,(2) eBook-oriented DRM, (3) Video-oriented DRM, (4)Image-Oriented DRM (5) Unstructured data oriented DRM, (6) Text-oriented DRM. Based on the above DSI, we then proposed a dynamic DRM model selection method for various DRM application, which can be adapted dynamically for different technology of different applications, which can provide a whole solution for variant DRM development in a rapid and customized mode. The proposed DRM method, technology and application in this paper provided a common, flexible and extendable solution for variant DRM scenes, and can support rapid and customized development. Moreover, we proposed an opinion that the future life will enter into a new era that the content usage and consumption will not again adopt DRM technology rather than with law, liberty and morality.


Archive | 2013

A Digital Watermarking Method Based on Particle Swarm Optimization and Contourlet Transform

Jia Mo; Zhaofeng Ma; Yixian Yang; Xinxin Niu

As a key technology for digital content copyright protection, digital watermark often sees a dilemma between imperceptibility and robustness. In view of the problem, this paper suggests a CT-SVD-based intelligent watermarking scheme that embraces three major algorithms including the watermark preprocessing, the watermark embedding, and extracting. The host image is first decomposed by contourlet transform to get the low frequency subband images on which the SVD decomposition is then implemented before embedding the preprocessed watermark. The watermark extracting is an inversion of watermark embedding. To maximize the watermark robustness while maintaining its imperceptibility, particle swarm optimization (PSO) is applied to have heuristic searches for scaling factor. The experiment has demonstrated that this scheme is capable of resisting frequent image attacks with better imperceptibility and robustness.


Archive | 2009

Licence managing method of internet protocol television copyright management system

Yu Xin; Zhaofeng Ma; Zhichao Zhao; Jianqing Huang; Licong Chen; Yixian Yang; Xinxin Niu; Baoyin Sun


Chinese Journal of Electronics | 2015

EABDS: Attribute-Based Secure Data Sharing with Efficient Revocation in Cloud Computing

Qinlong Huang; Zhaofeng Ma; Yixian Yang; Jingyi Fu; Xinxin Niu


International Journal of Digital Content Technology and Its Applications | 2011

An HVS-Based JPEG Image Watermarking Method for Copyright Protection

Ming Jiang; Zhaofeng Ma; Xinxin Niu(钮心忻); Yixian Yang


Chinese Journal of Electronics | 2016

A Video Watermarking DRM Method Based on H.264 Compressed Domain with Low Bit-Rate Increasement

Zhaofeng Ma; Jianqing Huang; Ming Jiang; Xinxin Niu


China Communications | 2014

Attribute based DRM scheme with dynamic usage control in cloud computing

Qinlong Huang; Zhaofeng Ma; Yixian Yang; Xinxin Niu; Jingyi Fu


International Journal of Digital Content Technology and Its Applications | 2012

An Innovative Video Watermarking Scheme Based on H.264 for Copyright Protection

Ming Jiang; Yixian Yang; Zhaofeng Ma; Xinxin Niu(钮心忻)

Collaboration


Dive into the Zhaofeng Ma's collaboration.

Top Co-Authors

Avatar

Yixian Yang

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Xinxin Niu

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Ming Jiang

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Hongmin Gao

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Jianqing Huang

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Jingyi Fu

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Qinlong Huang

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Xinxin Niu(钮心忻)

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Zhen Wang

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Jia Mo

University of Electronic Science and Technology of China

View shared research outputs
Researchain Logo
Decentralizing Knowledge