Beijing National Security Science and Technology Co.

Beijing, China

Beijing National Security Science and Technology Co.

Beijing, China
SEARCH FILTERS
Time filter
Source Type

Yan X.-X.,Beijing University of Posts and Telecommunications | Yan X.-X.,Beijing National Security Science and Technology Co. | Ma Z.-F.,Beijing University of Posts and Telecommunications | Ma Z.-F.,Beijing National Security Science and Technology Co. | And 4 more authors.
Tongxin Xuebao/Journal on Communications | Year: 2012

In order to create a security domain environment in the E-document management, an identity domain key distribution scheme using bilinear pairings for large and dynamic domain was proposed. The scheme could handle the joining and leaving of domain members efficiently, and updateed the domain key in the manner of broadcast, which avoided the complex protocols of key agreement. In addition, the distribution protocol based sharing-domain for E-document was also given, which aimed to realize the function of sharing the documents in a domain and distributing the documents between different domains securely. With the protocol, the E-documents obtained by a domain member could be transmitted to other domain members seamlessly. On the opposite, the E-document which was distributed to another domain need to be upload to the server, which would verify the identity of the domain member and encrypt the documents with the specified domain key.


Tang X.,Beijing University of Posts and Telecommunications | Ma Z.,Beijing University of Posts and Telecommunications | Ma Z.,Beijing National Security Science and Technology Co. | Niu X.,Beijing University of Posts and Telecommunications | Yang Y.,Beijing University of Posts and Telecommunications
Chinese Journal of Electronics | Year: 2015

A novel compressive sensing-based audio semi-fragile zero-watermarking algorithm is proposed in this paper. This algorithm transforms the original audio signal into the wavelet domain and applies compressive sensing theory to the approximation wavelet coefficients. The zero-watermarking is constructed according to the positive and negative properties of elements in the measurement vector. The experimental results show that the proposed algorithm is robust against common audio signal processing and fragile to malicious tampering. Compared with the existing algorithms, the proposed algorithm improves malicious tampering detection accuracy in common audio signal processing environments. © 2015 Chinese Institute of Electronics.


Tang X.,Beijing University of Posts and Telecommunications | Ma Z.-F.,Beijing University of Posts and Telecommunications | Ma Z.-F.,Beijing National Security Science and Technology Co. | Niu X.-X.,Beijing University of Posts and Telecommunications | Yang Y.-X.,Beijing University of Posts and Telecommunications
Tien Tzu Hsueh Pao/Acta Electronica Sinica | Year: 2015

An audio watermarking algorithm based on EMD(Empirical Mode Decomposition) was proposed. Residual signal components decomposed from EMD were selected to embed watermark by the proposed algorithm and the watermarked components are proved to be still residual signal components, which provides the theoretical basis for the watermark embedding and extraction. The optimal audio watermark embedding strength in EMD was solved by particle swarm optimization algorithm. The robustness and imperceptibility of watermarking can be satisfied according to this embedding strength. The simulation results show that using the optimal embedding strength to embed watermark can guarantee the imperceptibility and robustness of the watermark in most attack conditions. ©, 2015, Chinese Institute of Electronics. All right reserved.


Tang X.,Beijing University of Posts and Telecommunications | Ma Z.-F.,Beijing University of Posts and Telecommunications | Ma Z.-F.,Beijing National Security Science and Technology Co. | Niu X.-X.,Beijing University of Posts and Telecommunications | Yang Y.-X.,Beijing University of Posts and Telecommunications
Tongxin Xuebao/Journal on Communications | Year: 2015

In order to improve the performance of audio watermarking detection, a blind audio watermarking mechanism using the statistical characteristics based on MFCC features of audio frames was proposed. The spread spectrum watermarking was embedded in the DCT coefficients of audio frames. MFCC features extracted from watermarked audio frames as well as un-watermarked ones were trained to establish their Gaussian mixture models and to estimate the parameters by vatiational Bayesian learning method respectively. The watermarking was detected according to the maximum likelihood principle. The experimental results show that our method can lower the false detection rate compared with the method using EM algorithm when the audio signal was under noise and malicious attacks. Also, the experiments show that the proposed method achieves better performance in handling insufficient training data as well as getting rid of over-fitting problem. ©, 2015, Editorial Board of Journal on Communications. All right reserved.


Huang Q.,Beijing University of Posts and Telecommunications | Huang Q.,Beijing National Security Science and Technology Co. | Ma Z.,Beijing University of Posts and Telecommunications | Ma Z.,Beijing National Security Science and Technology Co. | And 4 more authors.
Journal of Computers (Finland) | Year: 2013

The existing digital rights management (DRM) schemes in cloud computing introduce a heavy computation overhead on the content provider for key distribution. In this paper, we propose an attribute-based DRM scheme in cloud computing by combining the techniques of ciphertextpolicy attribute-based encryption (CP-ABE) and proxy reencryption (PRE). We first divide the content encryption key into two parts, content master key and assistant key. Then we enforce access policies based on attributes to distribute the content master key securely. Thus the users who satisfy the access policy can recover the content master key, and then obtain assistant key from the key server and decrypt the content. Furthermore, we achieve efficient attribute and user revocation by allowing the attribute authority to delegate the key server to refuse to issue the assistant key for the revoked users. The security and performance analyses indicate that the proposed scheme is secure, efficient, and privacy-preserving. © 2013 ACADEMY PUBLISHER.


Ma Z.,Beijing University of Posts and Telecommunications | Ma Z.,Beijing National Security Science and Technology Co. | Huang J.,Beijing University of Posts and Telecommunications | Yang Y.,Beijing University of Posts and Telecommunications | Niu X.,Beijing University of Posts and Telecommunications
Journal of Software | Year: 2013

With fast development of network computing and storage technologies, it became more and more convenient to share and spread digital resources through kinds of network services, however without protection and constraint of copyright, digital content can be illegally copied, altered and distributed, which could cause revenue loss to commercial digital resource providers, to solve this problem, digital rights management(DRM) is adopted to control copyrights of digital resources in a reasonable degree. Most of current DRM systems were built up in centered authorization mode which can work efficiently in normal case, but once the DRM administrator is unauthentic or the server collapsed, it will not provide authentication and authorization service again. In this paper, a verifiable threshold authorization scheme (VETAS) based on ellipse curve cryptosystem (ECC) and Lagrange polynomial is adopted for scalable and robust digital rights management, in which authorization was based on t-out of n qualified members, less than t members cannot implement authorization, and the system can still work well once part of the members are unauthentic. The advantage of the VETAS scheme is that it works in a "mutual authentication and threshold authorization" mode, thus end-user and the authorization center can authenticate each other to enhance security of corresponding identity, another advantage of the VETAS scheme is it can provide real-time rights management with fairly good robustness and reliability in a threshold authorization mode. © 2013 ACADEMY PUBLISHER.


Huang Q.-L.,Beijing University of Posts and Telecommunications | Huang Q.-L.,Beijing National Security Science and Technology Co Ltd | Ma Z.-F.,Beijing University of Posts and Telecommunications | Ma Z.-F.,Beijing National Security Science and Technology Co Ltd | And 4 more authors.
Tongxin Xuebao/Journal on Communications | Year: 2014

In order to meet the needs of digital content and user privacy protection in cloud computing environment, a privacy-preserving digital rights management (DRM) scheme in cloud computing was proposed. The framework of digital content copyright lifecycle protection and user privacy protection in cloud computing was firstly designed, which includes four protocols: system setup, content encryption, license acquisition and content decryption, and then a content encryption key protection and distribution mechanism based on attribute-based encryption and additively homomorphic encryption was proposed, which ensures the security of content encryption key. In addition, the proposed scheme also allows the users to purchase content and acquire license anonymously from cloud service provider, which protects the user privacy and prevents cloud service provider, license server and key server in the cloud from collecting the user's sensitive information. Compared with existing DRM schemes in cloud computing, the proposed scheme which not only protects the data security and user privacy, but also supports fine-grained access control, and supports online and super-distribution application modes, is more applicable in the copyright protection for cloud computing.


Huang Q.-L.,Beijing University of Posts and Telecommunications | Huang Q.-L.,Beijing National Security Science and Technology Co. | Ma Z.-F.,Beijing University of Posts and Telecommunications | Ma Z.-F.,Beijing National Security Science and Technology Co. | And 4 more authors.
Tongxin Xuebao/Journal on Communications | Year: 2013

Aiming at the copyright protection of multimedia content, a novel general format multimedia digital rights management model was designed which includes encryption and packaging of content, key management, security engine, license management and distribution, DRM client, DRM management and other functional units. This model uses unstructured encryption method which overcomes the limitations of encryption method based on the content format to support the general format multimedia. In addition, this model uses the license acquisition number as the only certificate to download license to solve the problem of license reissue and transfer, and supports fine-grained control model. Combined with this model, a multimedia digital rights management system was developed based on fixed and mobile converged services which is used in the field of digital consumer. The experimental results and practical application show that this scheme with good practice in the copyright protection of multimedia content does not affect the multimedia quality, and have high efficiency and safety.


Yan X.-X.,Beijing University of Posts and Telecommunications | Yan X.-X.,Beijing National Security Science and Technology Company Ltd | Yan X.-X.,Henan Polytechnic University | Ma Z.-F.,Beijing University of Posts and Telecommunications | And 5 more authors.
Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications | Year: 2012

In view of the domain environment in E-documents management, an interoperable cross-domain distribution protocol for E-document is proposed. Based on proxy re-encryption, the scheme uses a semi-trusted entity called proxy server to re-encrypt the document ciphertext without decrypting the ciphertext, such that only users can decrypt the data with his private key. Compared with the existing system, the scheme relieves the server from intense encryption/decryption processing, and achieves reliable decentralized encryption/decryption with good scalability and efficiency.


Qinlong H.,Beijing University of Posts and Telecommunications | Qinlong H.,Beijing National Security Science and Technology Co. | Zhaofeng M.,Beijing University of Posts and Telecommunications | Zhaofeng M.,Beijing National Security Science and Technology Co. | And 4 more authors.
International Journal of Security and its Applications | Year: 2014

Streaming media is widely adopted by thousands of applications in cloud computing, how to effectively protect streaming media contents is a new challenge. In this paper, we propose an efficient online digital rights management (DRM) scheme supporting dynamic license in cloud computing. The content provider encrypts media content and outsources the encrypted content to cloud storage, while the user acquires dynamic license from the license server and consumes the streaming media content from the cloud storage. Further, we present a secure key distribution protocol based on proxy re-encryption, which protects the confidentiality of content encryption key, and reduces the work of key management in the cloud, and also supports domain key to realize user domain management. In addition, we develop a prototype system with Google cloud storage APIs based on the proposed scheme, and the implementation and comparison results show that the proposed scheme satisfies the requirements of online media content protection in cloud computing. © 2014 SERSC.

Loading Beijing National Security Science and Technology Co. collaborators
Loading Beijing National Security Science and Technology Co. collaborators