- Advanced Steganography and Watermarking Techniques
- Cryptography and Data Security
- Digital Rights Management and Security
- Blockchain Technology Applications and Security
- Privacy-Preserving Technologies in Data
- Chaos-based Image/Signal Encryption
- Cloud Data Security Solutions
- Digital Media Forensic Detection
- Internet Traffic Analysis and Secure E-voting
- Vehicle License Plate Recognition
- Advanced Authentication Protocols Security
- Peer-to-Peer Network Technologies
- Web Data Mining and Analysis
- Mobile Ad Hoc Networks
- Image Retrieval and Classification Techniques
- IoT and Edge/Fog Computing
- Advanced Data Compression Techniques
- Complexity and Algorithms in Graphs
- Digital and Cyber Forensics
- Video Coding and Compression Technologies
- Opportunistic and Delay-Tolerant Networks
- Quantum Computing Algorithms and Architecture
- Access Control and Trust
- Network Security and Intrusion Detection
- Technology and Security Systems
Beijing University of Posts and Telecommunications
2015-2024
Sengkang General Hospital
2024
Shanghai Key Laboratory of Trustworthy Computing
2023
Wuhan University
2011-2019
Ludwig-Maximilians-Universität München
2019
Pennsylvania State University
2019
Uppsala University
2019
Quaid-i-Azam University
2019
University of Science and Technology of China
2019
University of Nottingham
2019
With rapid development of computing technologies, large amount data are gathered from edge terminals or Internet Things (IoT) devices, however trust and security in environment very important issues to be considered, especially when the fraud dishonest, misused spread without any authorization, which may lead serious problems. In this article, a blockchain-based trusted management scheme (called BlockTDM) is proposed solve above problems, we flexible configurable blockchain architecture that...
With the fast development of Internet-of-Things (IoT) technologies, IoT big data and its applications are getting more useful. However, traditional management is fragile vulnerable. Once gathered untrusted or stored tampered with deliberately from internal users attacked by an external hacker, then have a serious problem to be utilized. To solve problems trust security management, in this article, we propose permissioned blockchain-based decentralized secure usage control scheme (called...
Authentication is the first entrance to kinds of information systems; however, traditional centered single-side authentication weak and fragile, which has security risk failure or breakdown caused by outside attacks internal cheating. In edge Internet-of-Things (IoT) environment, blockchain can apply devices better serve IoT provide decentralized high service solutions. this article, we proposed a blockchain-based modeling scheme (named BlockAuth) in environment more secure, reliable, strong...
With the development of storage and computing technologies, digital content such as music, movies, games, cartoon DV et al gets more popular for entertainment, how to control rights is now becoming a very important issue. In this paper, secure flexible Content Protection Secure DRM scheme(named CPSec DRM) proposed online/ offline management, in which objects(COs) objects(ROs) were separated respectively, COs was encrypted by encryption key(CEK), while ROs encapsulated key(REK) that related...
With the development of Internet technology, transmitting, editing and misusing digital multimedia bring great challenges in detection for content protection. In this paper we proposed an artwork image rights management scheme based on watermark blockchain with robustness high-level security. We embed right information such as author, RightHolder, Date Location into data. scheme, use Arnold transform to enhance security DCT coefficients middle frequency robustness. transparence watermark,...
The development of the Internet Things (IoT) technology has achieved remarkable results in recent years. A large number sensors and machinery are connected, combined with Internet, to achieve intelligent management operation. However, traditional centralized IoT data solution inevitably encounters challenges trust, security, sustainability, user privacy is difficult guarantee. This paper takes transportation sensor network as an example proposes a blockchain-based Vehicles (IoV) secure...
Privacy protection and open sharing are the core of data governance in AI‐driven era. A common data‐sharing management platform is indispensable existing solutions, users upload their to cloud server for storage dissemination. However, from moment server, they will lose absolute ownership data, security privacy become a critical issue. Although encryption access control considered up‐and‐coming technologies protecting personal on alleviate this problem certain extent. it still depends too...
In a general secure multi-party computation (MPC) protocol, two or more participants who do not trust each other, use their respective secret inputs to calculate joint function in distributed environment without centralized organization. They can get correct outputs on the premise of ensuring privacy and independence input. this paper, solve problem fairness robustness MPC, blockchain-based scheme (BFR-MPC) was proposed. The blockchain maintains an open reputation system for parties as...
Upon flaws of current blockchain platforms heavyweight, large capacity ledger, and time-consuming synchronization data, in this paper, we proposed a new paradigm master-slave scheme (MSB) for pervasive computing that suitable general PC, mobile device such as smart phones or PADs to participants the working mining verification, which separated traditional model 2 layer defined master node series slavery agents layer, then approaches partially model(P-CM) non-computing model(NCM) MSB...
Blockchain, as an emerging technology, is constantly evolving due to its remarkable advantages but also subject unalterability, which leads the misuse of blockchain storage and causes adverse effects. Hence, redactable was proposed, can alleviate above issues in a controlled manner. However, situation exists modifiers specified by customized identities or attributes existing schemes may be malicious, easily lead malicious modification events. Evaluating, filtering, limiting advance feasible...
with rapid achievement of current information technology and computing ability applications, much more digital content such as films, cartoons, design drawings, office documents software source codes are produced in daily work, however to protect the being copying, shared or deliberately stolen by inside outside, rights management (DRM) became important for protection. In this paper, we studied various DRM model, application, first proposed Security Infrastructure (DSI), which defined...
Instant messaging (IM) systems can be considered the most frequently used applications in mobile social networks. Nowadays, people are becoming increasingly concerned about data security and privacy protection with IM applications. Therefore, a comprehensive enhanced secure scheme was proposed this paper, which is based on elliptic curve cryptosystem advanced encryption standard algorithm. An offline key agreement process between users designed under computational Diffie-Hellman (CDH)...
Upon the fairness, security and flexibility problems of traditional digital rights management, we proposed a blockchain infrastructure service based DRM platform with high-level credit security, in which first Blockchain as (BaaS) architecture to decrease complexity difficulty building up blockchain-based business model, BaaS transparently provides easily-developed user interface implement all core functions such genesis block creation, consensus mechanism definition, node initialization...
A novel compressive sensing-based audio semi-fragile zero-watermarking algorithm is proposed in this paper. This transforms the original signal into wavelet domain and applies sensing theory to approximation coefficients. The constructed according positive negative properties of elements measurement vector. experimental results show that robust against common processing fragile malicious tampering. Compared with existing algorithms, improves tampering detection accuracy environments.
With the in-depth application of new technologies such as big data in education fields, storage and sharing model student records still faces many challenges terms privacy protection efficient transmission. In this paper, we propose a security scheme based on consortium blockchain, which is credible search without verification. our scheme, implementation using blockchain server together. detail, smart contract provides for keywords, stores after masking, ensures traceability query...
Blockchain has become an integral part of various IoT applications, and it been successful in boosting performance aspects. Applying blockchain as a trust solution for Internet-of-Things is viable approach. The immutability essential to prevent anyone from manipulating registered data transactions illegitimate benefits. However, the increasing abuse storage negatively impacts development potential stakeholders are discouraged joining sharing recorded on contains private information. Hence,...
Ciphertext-policy attribute-based encryption (CP-ABE) is becoming a promising solution to guarantee data security in cloud computing. In this paper, we present an secure sharing scheme with Efficient revocation (EABDS) Our first encrypts Data key (DEK) using symmetric and then DEK based on CP-ABE, which guarantees the confidentiality achieves fine-grained access control. order solve escrow problem current attribute schemes, our adopts additively homomorphic generate secret keys of users by...
Objective: Diabetic foot ulcer (DFU) is a common complication in patients with diabetes. With current treatment, only two-thirds of heal, median duration 3–6 months. Hard-to-heal DFUs are major source morbidity and mortality. Improving wound healing via soft tissue reconstruction may be the key to improving clinical outcomes. Thus, Limb Salvage (DLS) service Sengkang General Hospital, Singapore, was established provide streamlined, one-stop, comprehensive dedicated DFU reconstruction. The...
Despite that existing data sharing systems in online social networks (OSNs) propose to encrypt before sharing, the multiparty access control of encrypted has become a challenging issue. In this paper, we secure scheme OSNs based on ciphertext-policy attribute-based proxy re-encryption and secret sharing. order protect users' sensitive data, our allows users customize policies their then outsource service provider. Our presents model, which enables disseminator update policy ciphertext if...
It gets more and important for video copyright protection, it is necessary to provide efficient H.264 compression domain watermarking Digital rights management(DRM). A new method based on compressed proposed DRM, in which the embedding extracting procedure are performed using syntactic elements of bit stream. In this way, complete decoding unnecessary both processes. Based analysis time space, some appropriate sub-blocks selected watermarks, increasing watermark robustness while reducing...