Entity

Time filter

Source Type


Tang X.,Beijing University of Posts and Telecommunications | Ma Z.-F.,Beijing University of Posts and Telecommunications | Ma Z.-F.,Beijing National Security Science and Technology Co. | Niu X.-X.,Beijing University of Posts and Telecommunications | Yang Y.-X.,Beijing University of Posts and Telecommunications
Tien Tzu Hsueh Pao/Acta Electronica Sinica | Year: 2015

An audio watermarking algorithm based on EMD(Empirical Mode Decomposition) was proposed. Residual signal components decomposed from EMD were selected to embed watermark by the proposed algorithm and the watermarked components are proved to be still residual signal components, which provides the theoretical basis for the watermark embedding and extraction. The optimal audio watermark embedding strength in EMD was solved by particle swarm optimization algorithm. The robustness and imperceptibility of watermarking can be satisfied according to this embedding strength. The simulation results show that using the optimal embedding strength to embed watermark can guarantee the imperceptibility and robustness of the watermark in most attack conditions. ©, 2015, Chinese Institute of Electronics. All right reserved. Source


Tang X.,Beijing University of Posts and Telecommunications | Ma Z.,Beijing University of Posts and Telecommunications | Ma Z.,Beijing National Security Science and Technology Co. | Niu X.,Beijing University of Posts and Telecommunications | Yang Y.,Beijing University of Posts and Telecommunications
Chinese Journal of Electronics | Year: 2015

A novel compressive sensing-based audio semi-fragile zero-watermarking algorithm is proposed in this paper. This algorithm transforms the original audio signal into the wavelet domain and applies compressive sensing theory to the approximation wavelet coefficients. The zero-watermarking is constructed according to the positive and negative properties of elements in the measurement vector. The experimental results show that the proposed algorithm is robust against common audio signal processing and fragile to malicious tampering. Compared with the existing algorithms, the proposed algorithm improves malicious tampering detection accuracy in common audio signal processing environments. © 2015 Chinese Institute of Electronics. Source


Tang X.,Beijing University of Posts and Telecommunications | Ma Z.-F.,Beijing University of Posts and Telecommunications | Ma Z.-F.,Beijing National Security Science and Technology Co. | Niu X.-X.,Beijing University of Posts and Telecommunications | Yang Y.-X.,Beijing University of Posts and Telecommunications
Tongxin Xuebao/Journal on Communications | Year: 2015

In order to improve the performance of audio watermarking detection, a blind audio watermarking mechanism using the statistical characteristics based on MFCC features of audio frames was proposed. The spread spectrum watermarking was embedded in the DCT coefficients of audio frames. MFCC features extracted from watermarked audio frames as well as un-watermarked ones were trained to establish their Gaussian mixture models and to estimate the parameters by vatiational Bayesian learning method respectively. The watermarking was detected according to the maximum likelihood principle. The experimental results show that our method can lower the false detection rate compared with the method using EM algorithm when the audio signal was under noise and malicious attacks. Also, the experiments show that the proposed method achieves better performance in handling insufficient training data as well as getting rid of over-fitting problem. ©, 2015, Editorial Board of Journal on Communications. All right reserved. Source


Huang Q.-L.,Beijing University of Posts and Telecommunications | Huang Q.-L.,Beijing National Security Science and Technology Co. | Ma Z.-F.,Beijing University of Posts and Telecommunications | Ma Z.-F.,Beijing National Security Science and Technology Co. | And 4 more authors.
Tongxin Xuebao/Journal on Communications | Year: 2013

Aiming at the copyright protection of multimedia content, a novel general format multimedia digital rights management model was designed which includes encryption and packaging of content, key management, security engine, license management and distribution, DRM client, DRM management and other functional units. This model uses unstructured encryption method which overcomes the limitations of encryption method based on the content format to support the general format multimedia. In addition, this model uses the license acquisition number as the only certificate to download license to solve the problem of license reissue and transfer, and supports fine-grained control model. Combined with this model, a multimedia digital rights management system was developed based on fixed and mobile converged services which is used in the field of digital consumer. The experimental results and practical application show that this scheme with good practice in the copyright protection of multimedia content does not affect the multimedia quality, and have high efficiency and safety. Source


Ma Z.,Beijing University of Posts and Telecommunications | Ma Z.,Beijing National Security Science and Technology Co. | Huang J.,Beijing University of Posts and Telecommunications | Yang Y.,Beijing University of Posts and Telecommunications | Niu X.,Beijing University of Posts and Telecommunications
Journal of Software | Year: 2013

With fast development of network computing and storage technologies, it became more and more convenient to share and spread digital resources through kinds of network services, however without protection and constraint of copyright, digital content can be illegally copied, altered and distributed, which could cause revenue loss to commercial digital resource providers, to solve this problem, digital rights management(DRM) is adopted to control copyrights of digital resources in a reasonable degree. Most of current DRM systems were built up in centered authorization mode which can work efficiently in normal case, but once the DRM administrator is unauthentic or the server collapsed, it will not provide authentication and authorization service again. In this paper, a verifiable threshold authorization scheme (VETAS) based on ellipse curve cryptosystem (ECC) and Lagrange polynomial is adopted for scalable and robust digital rights management, in which authorization was based on t-out of n qualified members, less than t members cannot implement authorization, and the system can still work well once part of the members are unauthentic. The advantage of the VETAS scheme is that it works in a "mutual authentication and threshold authorization" mode, thus end-user and the authorization center can authenticate each other to enhance security of corresponding identity, another advantage of the VETAS scheme is it can provide real-time rights management with fairly good robustness and reliability in a threshold authorization mode. © 2013 ACADEMY PUBLISHER. Source

Discover hidden collaborations