Ganzhou, China
Ganzhou, China

Time filter

Source Type

Teng Z.,Jiaxing University | Qiu X.,Gannan Normal College | Liu J.,Beihang University
Applied Mechanics and Materials | Year: 2013

The copyright protection of multimedia information is more and more important in the digital age, digital watermarking is a solution to address the topic. This paper proposes a new robust image watermarking scheme based on discrete ridgelet transform (DRT) and discrete wavelet transform (DWT). The scheme respectively embeds a copy of color image watermark into DWT domain and DRT domain, and uses a conception of semi-watermark. Experiment results demonstrate that the watermark can resist various attacks such as adding Gaussian or Union Distribution Noise, JPEG compression, brightness adjustment, contrast adjustment, altering color balance, lens blur, zooming in or out, cropping and some combined attacks etc. © (2013) Trans Tech Publications, Switzerland.


Qiu X.-F.,Beihang University | Qiu X.-F.,Gannan Normal College | Liu J.-W.,Beihang University | Sangi A.R.,Beihang University
Proceedings - 2010 IEEE Youth Conference on Information, Computing and Telecommunications, YC-ICT 2010 | Year: 2010

Routing security is an important and well known issue in Ad hoc network applications and development. Various kinds of solutions have been proposed but they are impractical to be fully applied. In this paper, firstly the wormhole attack topology is analyzed, then cryptography and trust mechanism are combined to design a new multipath trust-based secure routing protocol(MTSR). MTSR based on AODV and SAODV, is distributed and can resist almost all available routing attacks such as discarding, Sybil, spoofing, jamming, flooding, rushing, and especially wormhole attack. Its trust value computation follows the principle of slowly increasing but sharply decreasing, and it does not require any additional equipment, strict assumptions, node location and precise time information. © 2010 IEEE.


Qiu X.-F.,Gannan Normal College | Liu J.-W.,Beihang University | Zhao P.-C.,Beihang University
2011 2nd International Conference on Artificial Intelligence, Management Science and Electronic Commerce, AIMSEC 2011 - Proceedings | Year: 2011

There are tremendous business prospects for the cloud computing application on mobile internet. But combining cloud computing technology into mobile internet gives birth to a serial of security problems. One of the challenges is to construct the cloud computing secure architecture on mobile internet. After analyzing the available cloud computing security risks and secure architectures, and taking into account the characteristics of mobile internet, this paper designs a general secure cloud computing architecture on mobile internet with the advantages such as multi-hierarchy, multi-level, elasticity, cross-platform and unified user interface. © 2011 IEEE.


Liu J.,Beihang University | Qiu X.,Beihang University | Qiu X.,Gannan Normal College
Journal of Computational Information Systems | Year: 2012

Aggregate signatures are well-known technology in special areas where the signatures on n distinct messages generated by n distinct users need to be efficiently compressed to a single signature. Blind signature is an efficient technique to secure the user's privacy. It is very attractive for authentications in bandwidth-limited applications such as vehicle ad hoc networks and sensor networks to design a signature scheme with both properties of blinding and aggregate. However, as the best of our known, few research work have considered the combination of the aggregate signature and the blind signature or offered formal security proofs. In this paper, we present an randomized blind aggregate signature scheme with constant pairing computations, Furthermore, we provide concrete security proofs for the proposed scheme in the random oracle model under the Computational Diffie-Hellman assumption. © 2012 Binary Information Press.


Qiu X.,Gannan Normal College | Qiu X.,Beihang University | Liu J.,Beihang University
International Journal of Advancements in Computing Technology | Year: 2012

Because the expenditure of analyzing and designing ad hoc network secure protocols in real network environment is enormous, it has a great significance to develop a simulation system that can analyze the performance of different ad hoc network secure protocols. on the basis of analyzing specific requirements of ad hoc network secure protocol simulation, this paper designed and implemented a simulation system that integrates functions of generating network topology, configuring secure protocol, setting up data flows and attack events, generating simulation scripts automatically, running attacks and comparing protocol performance, etc. Through the comparative analysis to Delay, Control Overhead, Throughput, Packet Loss Rate, Package Delivery Rate, and Jitter of simulation results from running different secure protocols under different attacks, the system can realize the performance analysis to various ad hoc network secure protocols, and demonstrate the dynamic changes of a network under attacks in the form of animation.


Liu J.,Beihang University | Qiu X.,Beihang University | Qiu X.,Gannan Normal College
China Communications | Year: 2012

A Verifiably Encrypted Signature (VES) plays an essential role in the construction of a fair data exchange. The paper proposes an Identity-based Proxy Verifiably Encrypted Signature (IPVES) to combine the advantages of a proxy signature and a VES in order to delegate the signing capability of the VES of an entity called the original signer to another entity, called the proxy signer. In this IPVES scheme, the original signer delegates his/her signing capability to the proxy signer. The proxy signer issues a signature by using a proxy signing key, encrypts the signature under a designated public key, and subsequently convinces a verifier that the resulting ciphertext contains such a signature. We prove that the proposed IPVES scheme is secure in a random oracle model under the computational Diffie-Hellman assumption.


Jia R.P.,Shanghai Institute of Technology | Tao L.,Shanghai Institute of Technology | Tao L.,Gannan Normal College | Zheng K.S.,Shanghai Institute of Technology
Applied Mechanics and Materials | Year: 2011

In this work, highly functionalized carbon nanotubes (CNTs) were achieved using plasma inducing-graft technique, in which maleic anhydride (MAH) was used as graft monomer. Then they were introduced into epoxy resin (EP) curing system to obtain CNTs/EP composites. The modification performance of this proposed method was summarized and contrasted with that of argon (Ar) plasma atmosphere. Results show that these two plasma methods can improve CNTs' surface activity, and corresponding optimum powers are both 60 W. Meanwhile, thin polymaleic anhydride film can be coated on the surface of CNTs during MAH plasma inducing-graft, which can make sure of effectively dispersion and adhesion of CNTs in epoxy. Such treatment can not only obtain highly functionalized CNTs, but also overcome its serious self-entangling and aggregation problem. Compared with those composites modified by argon (Ar) plasma, the mechanical and thermal properties of CNTs/EP composites modified by MAH plasma are greatly enhanced. © (2011) Trans Tech Publications, Switzerland.


Jia R.-P.,Shanghai Institute of Technology | Tao L.,Shanghai Institute of Technology | Tao L.,Gannan Normal College | Teng N.,Shanxi Institute of Coal CAS Chemistry
Xinxing Tan Cailiao/New Carbon Materials | Year: 2010

Plasma-induced graft polymerization was used to modify carbon nanotubes (CNTs), in which maleic anhydride (MAH) was used as polymeric monomer and argon as plasma source. The polymer film-modified CNTs (p-CNTs) were introduced into epoxy resin (EP) to obtain p-CNT/EP composites and their effects on EP properties were studied. The p-CNTs were characterized by FTIR and scanning electron microscopy. Results show that maleic anhydride can be graft polymerized onto the surface of CNTs using the plasma technique, forming a uniform polymaleic anhydride (PMAH) film. The mechanical properties of EP were greatly improved by adding p-CNTs.

Loading Gannan Normal College collaborators
Loading Gannan Normal College collaborators