Zhaofeng Ma

ORCID: 0000-0001-7875-4169
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Steganography and Watermarking Techniques
  • Cryptography and Data Security
  • Digital Rights Management and Security
  • Blockchain Technology Applications and Security
  • Privacy-Preserving Technologies in Data
  • Chaos-based Image/Signal Encryption
  • Cloud Data Security Solutions
  • Digital Media Forensic Detection
  • Internet Traffic Analysis and Secure E-voting
  • Vehicle License Plate Recognition
  • Advanced Authentication Protocols Security
  • Peer-to-Peer Network Technologies
  • Web Data Mining and Analysis
  • Mobile Ad Hoc Networks
  • Image Retrieval and Classification Techniques
  • IoT and Edge/Fog Computing
  • Advanced Data Compression Techniques
  • Complexity and Algorithms in Graphs
  • Digital and Cyber Forensics
  • Video Coding and Compression Technologies
  • Opportunistic and Delay-Tolerant Networks
  • Quantum Computing Algorithms and Architecture
  • Access Control and Trust
  • Network Security and Intrusion Detection
  • Technology and Security Systems

Beijing University of Posts and Telecommunications
2015-2024

Sengkang General Hospital
2024

Shanghai Key Laboratory of Trustworthy Computing
2023

Wuhan University
2011-2019

Ludwig-Maximilians-Universität München
2019

Pennsylvania State University
2019

Uppsala University
2019

Quaid-i-Azam University
2019

University of Science and Technology of China
2019

University of Nottingham
2019

With rapid development of computing technologies, large amount data are gathered from edge terminals or Internet Things (IoT) devices, however trust and security in environment very important issues to be considered, especially when the fraud dishonest, misused spread without any authorization, which may lead serious problems. In this article, a blockchain-based trusted management scheme (called BlockTDM) is proposed solve above problems, we flexible configurable blockchain architecture that...

10.1109/tii.2019.2933482 article EN IEEE Transactions on Industrial Informatics 2019-08-06

10.1016/j.future.2018.07.029 article EN Future Generation Computer Systems 2018-07-23

With the fast development of Internet-of-Things (IoT) technologies, IoT big data and its applications are getting more useful. However, traditional management is fragile vulnerable. Once gathered untrusted or stored tampered with deliberately from internal users attacked by an external hacker, then have a serious problem to be utilized. To solve problems trust security management, in this article, we propose permissioned blockchain-based decentralized secure usage control scheme (called...

10.1109/jiot.2019.2960526 article EN IEEE Internet of Things Journal 2019-12-18

Authentication is the first entrance to kinds of information systems; however, traditional centered single-side authentication weak and fragile, which has security risk failure or breakdown caused by outside attacks internal cheating. In edge Internet-of-Things (IoT) environment, blockchain can apply devices better serve IoT provide decentralized high service solutions. this article, we proposed a blockchain-based modeling scheme (named BlockAuth) in environment more secure, reliable, strong...

10.1109/jiot.2020.3037733 article EN IEEE Internet of Things Journal 2020-11-12

With the development of storage and computing technologies, digital content such as music, movies, games, cartoon DV et al gets more popular for entertainment, how to control rights is now becoming a very important issue. In this paper, secure flexible Content Protection Secure DRM scheme(named CPSec DRM) proposed online/ offline management, in which objects(COs) objects(ROs) were separated respectively, COs was encrypted by encryption key(CEK), while ROs encapsulated key(REK) that related...

10.1109/cis.2007.210 article EN 2007-12-01

With the development of Internet technology, transmitting, editing and misusing digital multimedia bring great challenges in detection for content protection. In this paper we proposed an artwork image rights management scheme based on watermark blockchain with robustness high-level security. We embed right information such as author, RightHolder, Date Location into data. scheme, use Arnold transform to enhance security DCT coefficients middle frequency robustness. transparence watermark,...

10.1186/s13640-018-0327-1 article EN cc-by EURASIP Journal on Image and Video Processing 2018-09-19

The development of the Internet Things (IoT) technology has achieved remarkable results in recent years. A large number sensors and machinery are connected, combined with Internet, to achieve intelligent management operation. However, traditional centralized IoT data solution inevitably encounters challenges trust, security, sustainability, user privacy is difficult guarantee. This paper takes transportation sensor network as an example proposes a blockchain-based Vehicles (IoV) secure...

10.1109/jsen.2020.3046752 article EN IEEE Sensors Journal 2020-12-23

Privacy protection and open sharing are the core of data governance in AI‐driven era. A common data‐sharing management platform is indispensable existing solutions, users upload their to cloud server for storage dissemination. However, from moment server, they will lose absolute ownership data, security privacy become a critical issue. Although encryption access control considered up‐and‐coming technologies protecting personal on alleviate this problem certain extent. it still depends too...

10.1155/2021/6658920 article EN cc-by Wireless Communications and Mobile Computing 2021-01-01

In a general secure multi-party computation (MPC) protocol, two or more participants who do not trust each other, use their respective secret inputs to calculate joint function in distributed environment without centralized organization. They can get correct outputs on the premise of ensuring privacy and independence input. this paper, solve problem fairness robustness MPC, blockchain-based scheme (BFR-MPC) was proposed. The blockchain maintains an open reputation system for parties as...

10.1109/access.2019.2934147 article EN cc-by IEEE Access 2019-01-01

Upon flaws of current blockchain platforms heavyweight, large capacity ledger, and time-consuming synchronization data, in this paper, we proposed a new paradigm master-slave scheme (MSB) for pervasive computing that suitable general PC, mobile device such as smart phones or PADs to participants the working mining verification, which separated traditional model 2 layer defined master node series slavery agents layer, then approaches partially model(P-CM) non-computing model(NCM) MSB...

10.1109/cc.2018.8438282 article EN China Communications 2018-08-01

Blockchain, as an emerging technology, is constantly evolving due to its remarkable advantages but also subject unalterability, which leads the misuse of blockchain storage and causes adverse effects. Hence, redactable was proposed, can alleviate above issues in a controlled manner. However, situation exists modifiers specified by customized identities or attributes existing schemes may be malicious, easily lead malicious modification events. Evaluating, filtering, limiting advance feasible...

10.1109/tifs.2023.3326379 article EN IEEE Transactions on Information Forensics and Security 2023-10-20

with rapid achievement of current information technology and computing ability applications, much more digital content such as films, cartoons, design drawings, office documents software source codes are produced in daily work, however to protect the being copying, shared or deliberately stolen by inside outside, rights management (DRM) became important for protection. In this paper, we studied various DRM model, application, first proposed Security Infrastructure (DSI), which defined...

10.1109/cc.2017.7961371 article EN China Communications 2017-01-01

Instant messaging (IM) systems can be considered the most frequently used applications in mobile social networks. Nowadays, people are becoming increasingly concerned about data security and privacy protection with IM applications. Therefore, a comprehensive enhanced secure scheme was proposed this paper, which is based on elliptic curve cryptosystem advanced encryption standard algorithm. An offline key agreement process between users designed under computational Diffie-Hellman (CDH)...

10.1109/access.2018.2813432 article EN cc-by-nc-nd IEEE Access 2018-01-01

Upon the fairness, security and flexibility problems of traditional digital rights management, we proposed a blockchain infrastructure service based DRM platform with high-level credit security, in which first Blockchain as (BaaS) architecture to decrease complexity difficulty building up blockchain-based business model, BaaS transparently provides easily-developed user interface implement all core functions such genesis block creation, consensus mechanism definition, node initialization...

10.1049/cje.2018.07.003 article EN Chinese Journal of Electronics 2018-09-01

10.1016/s1005-8885(13)60113-2 article EN The Journal of China Universities of Posts and Telecommunications 2013-12-01

A novel compressive sensing-based audio semi-fragile zero-watermarking algorithm is proposed in this paper. This transforms the original signal into wavelet domain and applies sensing theory to approximation coefficients. The constructed according positive negative properties of elements measurement vector. experimental results show that robust against common processing fragile malicious tampering. Compared with existing algorithms, improves tampering detection accuracy environments.

10.1049/cje.2015.07.009 article EN Chinese Journal of Electronics 2015-07-01

With the in-depth application of new technologies such as big data in education fields, storage and sharing model student records still faces many challenges terms privacy protection efficient transmission. In this paper, we propose a security scheme based on consortium blockchain, which is credible search without verification. our scheme, implementation using blockchain server together. detail, smart contract provides for keywords, stores after masking, ensures traceability query...

10.23919/jcc.2021.06.014 article EN China Communications 2021-06-01

Blockchain has become an integral part of various IoT applications, and it been successful in boosting performance aspects. Applying blockchain as a trust solution for Internet-of-Things is viable approach. The immutability essential to prevent anyone from manipulating registered data transactions illegitimate benefits. However, the increasing abuse storage negatively impacts development potential stakeholders are discouraged joining sharing recorded on contains private information. Hence,...

10.3390/electronics12071646 article EN Electronics 2023-03-30

Ciphertext-policy attribute-based encryption (CP-ABE) is becoming a promising solution to guarantee data security in cloud computing. In this paper, we present an secure sharing scheme with Efficient revocation (EABDS) Our first encrypts Data key (DEK) using symmetric and then DEK based on CP-ABE, which guarantees the confidentiality achieves fine-grained access control. order solve escrow problem current attribute schemes, our adopts additively homomorphic generate secret keys of users by...

10.1049/cje.2015.10.033 article EN Chinese Journal of Electronics 2015-10-01

Objective: Diabetic foot ulcer (DFU) is a common complication in patients with diabetes. With current treatment, only two-thirds of heal, median duration 3–6 months. Hard-to-heal DFUs are major source morbidity and mortality. Improving wound healing via soft tissue reconstruction may be the key to improving clinical outcomes. Thus, Limb Salvage (DLS) service Sengkang General Hospital, Singapore, was established provide streamlined, one-stop, comprehensive dedicated DFU reconstruction. The...

10.12968/jowc.2023.0008 article EN Journal of Wound Care 2024-12-02

Despite that existing data sharing systems in online social networks (OSNs) propose to encrypt before sharing, the multiparty access control of encrypted has become a challenging issue. In this paper, we secure scheme OSNs based on ciphertext-policy attribute-based proxy re-encryption and secret sharing. order protect users' sensitive data, our allows users customize policies their then outsource service provider. Our presents model, which enables disseminator update policy ciphertext if...

10.1109/cc.2014.6825263 article EN China Communications 2014-03-01

10.1016/s1005-8885(14)60344-7 article EN The Journal of China Universities of Posts and Telecommunications 2014-12-01

It gets more and important for video copyright protection, it is necessary to provide efficient H.264 compression domain watermarking Digital rights management(DRM). A new method based on compressed proposed DRM, in which the embedding extracting procedure are performed using syntactic elements of bit stream. In this way, complete decoding unnecessary both processes. Based analysis time space, some appropriate sub-blocks selected watermarks, increasing watermark robustness while reducing...

10.1049/cje.2016.07.010 article EN Chinese Journal of Electronics 2016-07-01
Coming Soon ...