Hao Yin - Academia.edu (original) (raw)
Papers by Hao Yin
Concurrency and Computation: Practice and Experience, 2010
Ad hoc Networks (MANETs). However, existing multipath routing protocols are often practically inf... more Ad hoc Networks (MANETs). However, existing multipath routing protocols are often practically infeasible due to its security venerability if they suffer from attacks in MANETs, such as repudiation attacks, Denial of Service attacks. In this paper we propose a novel secure multipath routing protocol, referred to as SMRP, and investigate its feasibility and performance. SMRP applies a new heuristic algorithm increasing the number of disjoint paths and a smart authentication mechanism to enhance the security against the attacks in MANETs. The performance results from extensive analysis and experiments show that SMRP can efficiently enhance the security in MANETs while preserving the low overhead of computing and communication.
Journal of Chromatography A, 2008
Journal of Biotechnology, 2013
Here we bioengineered a metastatic pancreatic tumor model with homogenous human CD133(+)CXCR4(+) ... more Here we bioengineered a metastatic pancreatic tumor model with homogenous human CD133(+)CXCR4(+) cancer stem cells (CSC) and a polyglyconate/gelatin electrospun scaffold. The scaffold sported a highly porous microstructure with the majority of fibers possessing a diameter between 500μm and 1500μm. The scaffold supported the growth of tumor cells without provoking apoptosis. The homogeneous CD133(+)CXCR4(+) CSC was transplanted with the scaffold into the pancreas of nude mice to establish a metastatic pancreatic tumor. After 8 weeks, the tumor volume and weight in the scaffold model were 40.52% and 51.49% greater than the traditional model, respectively. The scaffold also increased the incidence of tumor formation and readily induced a hepatic metastasis. In this model we found that FOLFIRINOX possessed a superior capability of preventing the hepatic metastasis of pancreatic tumor cells than gemcitabine. A mechanistic study attributed this superiority to the fact that FOLFIRINOX could induce a greater apoptosis of CD133(+)CXCR4(+) CSC, thus depriving the driving force of hepatic metastasis. This metastatic tumor model showed an increased incidence of tumor formation, an accelerated tumorigenesis and a significant hepatic metastasis, therefore offering scientists a proven platform to study chemotherapeutic drugs.
Cheminform, 2010
ChemInform is a weekly Abstracting Service, delivering concise information at a glance that was e... more ChemInform is a weekly Abstracting Service, delivering concise information at a glance that was extracted from about 100 leading journals. To access a ChemInform Abstract of an article which was published elsewhere, please select a “Full Text” option. The original article is trackable via the “References” option.
International Journal of Minerals, Metallurgy and Materials, 2009
Quaternary alloys Mg 2 Sn 0.4 Si 0.6 x Ge x (x=0, 0.02, 0.05, 0.08 0.1, and 0.2) were prepared us... more Quaternary alloys Mg 2 Sn 0.4 Si 0.6 x Ge x (x=0, 0.02, 0.05, 0.08 0.1, and 0.2) were prepared using induction melting followed by hot-pressing. Relative densities of the sintered samples were over 97% of the theoretical values. Multiple phases were detected in the samples. It was found that the Seebeck coefficient was sensitive to the content of Mg 2 Ge and a maximum value of about 350 V K 1 was obtained. The introduction of Ge increases the electrical conductivity and the thermal conductivity simultaneously. The mechanism of this phenomenon was discussed. A maximum dimensionless figure of merit, ZT, of about 0.28 was obtained for Mg 2 Sn 0.4 Si 0.55 Ge 0.05 at 550 K.
Journal of Computer Research and Development, 2005
Digital watermarking, the technology of embedding special information into multimedia data, is a ... more Digital watermarking, the technology of embedding special information into multimedia data, is a topic that has recently gained increasing attention all over the world. The watermark of digital images, audio, video, and other media products in general has been proposed for ...
Journal of Computer Research and Development, 2005
Digital watermarking, the technology of embedding special information into multimedia data, is a ... more Digital watermarking, the technology of embedding special information into multimedia data, is a topic that has recently gained increasing attention all over the world. The watermark of digital images, audio, video, and other media products in general has been proposed for ...
21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07), 2007
The IEEE 802.15.4/ZigBee is developed to meet the needs in wireless personal area networks by ado... more The IEEE 802.15.4/ZigBee is developed to meet the needs in wireless personal area networks by adopting CSMA/CA algorithm as the retransfer mechanism after the collision occurred. But existed evaluation for 802.15.4 mainly bases on simulation and the only few existed ...
International Conference on Communications and Networking in China, 2007
Recent development of peer-to-peer (P2P) based media streaming technique brings unprecedented new... more Recent development of peer-to-peer (P2P) based media streaming technique brings unprecedented new momentum to the Internet streaming, which has been shown to be cost effective, scalable and easy to deploy. However, before these applications can be successfully and commercially deployed, it is very significant to achieve efficient access control mechanisms. Based our earlier research of secure streaming architecture of TrustStream, this work continues in-depth study on how to ensure that only the authorized users can access the correct media in p2p live streaming systems by adopting proposed user authentication and key management schemes. The main properties of presented secure systems include: i) the management server issues each authorized user a unique public- key certificate for other participant verifying its legal identity; ii) the lifetime of issued certificate is based upon media content instead of host's system time; iii) one-way hash-chain technique is employed to extend the certificate's lifetime; iv) the media is encrypted by the session key (SK) and then delivered to the communication group members; v) the SK is updated periodically and irrespective of clients' behaviors; vi) the re- keying messages are selectively distributed to legitimate users via the p2p overlay network. Moreover, the analysis shows the efficiency, scalability and robustness of given schemes in p2p live streaming systems, named "sStream".
Advanced Information Networking and Applications, 2008
Recently efficient and scalable live video streaming system over the Internet has become a hot to... more Recently efficient and scalable live video streaming system over the Internet has become a hot topic. In order to improve the system performance metrics, such as startup delay, source-to-end delay, playback continuity and scalability, many previous works developed two successful cases of content distribution network (CDN) and peer-to-peer (P2P) Network for the design of large-scale live video streaming systems, but no single one has yet delivered both the scale and service quality. To combine the advantages of CDN and P2P network has been considered as a feasible orientation for large-scale video stream delivering. In this paper, we propose a peer-assisted content distribution network, i.e. PACDN, which borrows the mesh-based P2P ideas into the traditional CDN to enhance the performance and scalability. The basic features of PACDN include: 1) To meet the real time requirement of live video stream service, i.e. to ensure that the video stream could be continuously and stably delivered from the source to each edge server for offering good QoS to different regions clients, the placement edge servers and source streaming server(s) build a hierarchical multi-tree based and in-hierarchy peer-assisted overlay, which is optimized according to the knowledge of underlying physical topology. This scheme in the design is called "server side peer-assisted". 2) To enhance the system scalability and reduce the deployment cost, clients and edge servers construct a Client/Server based and P2P network assisted overlay with the increasing of viewers, which is called "client side peer-assisted" in this design. We compare the inner performance of PACDN with existing approaches based on comprehensive simulations and analysis. The results show that our proposed design outperforms previous systems in the service quality and scalability. PACDN has been implemented as an Internet live video streaming service and it was successfully deployed for broadcasting many important live programs in Ch- ina in 2007. The industrial experiences prove that this design is scalable and reliable. We believe that the wide deployment of PACDN and its further development will soon benefit many more Internet users.
Grid and Cooperative Computing, 2006
Mobile Ad-hoc Network (MANET) is an appealing technology that has attracted lots of research effo... more Mobile Ad-hoc Network (MANET) is an appealing technology that has attracted lots of research efforts over past years. Although the principle of wireless, structure-less, dynamic networks is attractive, there are still some major flaws that prevent commercial expansion. Security is ...
21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07), 2007
The IEEE 802.15.4/ZigBee is developed to meet the needs in wireless personal area networks by ado... more The IEEE 802.15.4/ZigBee is developed to meet the needs in wireless personal area networks by adopting CSMA/CA algorithm as the retransfer mechanism after the collision occurred. But existed evaluation for 802.15.4 mainly bases on simulation and the only few existed ...
IEEE Communications Magazine, 2007
... There is a general belief that the P2P appli-cation is inherently scalable, which is ... 2006... more ... There is a general belief that the P2P appli-cation is inherently scalable, which is ... 2006. [13] X. Zhang, J. Liu, and B. Li, On Large-Scale Peer-to-Peer Live Video Distribution: CoolStreaming and Its Pre-liminary Experimental Results, Proc. IEEE MMSP '05, Oct. 2005. ...
International Conference on Communications and Networking in China, 2007
Recent development of peer-to-peer (P2P) based media streaming technique brings unprecedented new... more Recent development of peer-to-peer (P2P) based media streaming technique brings unprecedented new momentum to the Internet streaming, which has been shown to be cost effective, scalable and easy to deploy. However, before these applications can be successfully and commercially deployed, it is very significant to achieve efficient access control mechanisms. Based our earlier research of secure streaming architecture of TrustStream, this work continues in-depth study on how to ensure that only the authorized users can access the correct media in p2p live streaming systems by adopting proposed user authentication and key management schemes. The main properties of presented secure systems include: i) the management server issues each authorized user a unique public- key certificate for other participant verifying its legal identity; ii) the lifetime of issued certificate is based upon media content instead of host's system time; iii) one-way hash-chain technique is employed to extend the certificate's lifetime; iv) the media is encrypted by the session key (SK) and then delivered to the communication group members; v) the SK is updated periodically and irrespective of clients' behaviors; vi) the re- keying messages are selectively distributed to legitimate users via the p2p overlay network. Moreover, the analysis shows the efficiency, scalability and robustness of given schemes in p2p live streaming systems, named "sStream".
IEEE Transactions on Multimedia, 2006
Information security has been a critical issue in the design and development of reliable distribu... more Information security has been a critical issue in the design and development of reliable distributed communication systems and has attracted significant research efforts. A challenging task is how to maintain information security at a high level for multiple-destination video applications with the huge volume of data and dynamic property of clients. This paper proposes a novel Content-Aware Secure Multicast (CASM) protocol for video distribution that seamlessly integrates three important modules: 1) a scalable light-weight algorithm for group key management; 2) a content-aware key embedding algorithm that can make video quality distortion imperceptible and is reliable for clients to detect embedded keys; and 3) a smart two-level video encryption algorithm that can selectively encrypt a small set of video data only, and yet ensure the video as well as the embedded keys unrecognizable without a genuine key. The implementation of the CASM protocol is independent of the underlying multicast mechanism and is fully compatible with existing coding standards. Performance evaluation studies built upon a CASM prototype have demonstrated that CASM is highly robust and scalable in dynamic multicast environments. Moreover, it ensures secure distribution of key and video data with minimized communication and computation overheads. The proposed content-aware key embedding and encryption algorithms are fast enough to support real-time video multicasting.
Fourth International Conference on Image and Graphics (ICIG 2007), 2007
This paper, based on DCT transform and image scrambling, presents the digital watermark embedding... more This paper, based on DCT transform and image scrambling, presents the digital watermark embedding scheme. Embedding and extracting watermark in compressed video field are carried out in this way. In this paper, DCT transform is used as MPEG4 use DCT transform to compress. Before watermark is embedded, scrambling image is adopted to transform watermark information. Also, the embedding position of the watermark bit is modified by one chaos sequence, and this method promotes the robustness and the security of the watermark. Experiments make it clear that the scheme adopted in this paper satisfy the requirements for imperceptibility, robustness and security.
Advanced Information Networking and Applications, 2008
Recently efficient and scalable live video streaming system over the Internet has become a hot to... more Recently efficient and scalable live video streaming system over the Internet has become a hot topic. In order to improve the system performance metrics, such as startup delay, source-to-end delay, playback continuity and scalability, many previous works developed two successful cases of content distribution network (CDN) and peer-to-peer (P2P) Network for the design of large-scale live video streaming systems, but no single one has yet delivered both the scale and service quality. To combine the advantages of CDN and P2P network has been considered as a feasible orientation for large-scale video stream delivering. In this paper, we propose a peer-assisted content distribution network, i.e. PACDN, which borrows the mesh-based P2P ideas into the traditional CDN to enhance the performance and scalability. The basic features of PACDN include: 1) To meet the real time requirement of live video stream service, i.e. to ensure that the video stream could be continuously and stably delivered from the source to each edge server for offering good QoS to different regions clients, the placement edge servers and source streaming server(s) build a hierarchical multi-tree based and in-hierarchy peer-assisted overlay, which is optimized according to the knowledge of underlying physical topology. This scheme in the design is called "server side peer-assisted". 2) To enhance the system scalability and reduce the deployment cost, clients and edge servers construct a Client/Server based and P2P network assisted overlay with the increasing of viewers, which is called "client side peer-assisted" in this design. We compare the inner performance of PACDN with existing approaches based on comprehensive simulations and analysis. The results show that our proposed design outperforms previous systems in the service quality and scalability. PACDN has been implemented as an Internet live video streaming service and it was successfully deployed for broadcasting many important live programs in Ch- ina in 2007. The industrial experiences prove that this design is scalable and reliable. We believe that the wide deployment of PACDN and its further development will soon benefit many more Internet users.
IEEE Transactions on Circuits and Systems for Video Technology, 2008
To effectively address the explosive growth of multimedia applications over the Internet, a large... more To effectively address the explosive growth of multimedia applications over the Internet, a large-scale media streaming system has to fully take into account the issues of security, quality of service (QoS), scalability, and heterogeneity. However, current streaming solutions do not address all these challenges simultaneously. To address this limitation, this paper proposes a secure and high-performance streaming system called TrustStream, which combines the best features of scalable coding, content distribution network (CDN) and peer-to-peer (P2P) networks to achieve unprecedented security, scalability, heterogeneity, and certain QoS simultaneously under a unified architecture. In this architecture, raw video is encoded into two layers, namely, the base layer, which contains the most critical media content and is transmitted through a CDN-featured single-source multi-receiver (S-M) P2P network to guarantee a minimal level of quality, and the enhancement layer, which is transmitted in a pure multisource multi-receiver (M-M) P2P framework to achieve maximum scalability and bandwidth utilization. Heterogeneity is therefore addressed by delivering only the layers that a receiver is able to manage. Security is provided by combining our key distribution mechanism and key-embedding scheme under our proposed S-M P2P topology. We have implemented TrustStream system over the Internet. Deployed by ChinaCache, the largest CDN provider in China, TrustStream has broadcasted several popular live video programs over the Internet. The experimental results demonstrate the advantages and effectiveness of our architecture and system. where he is currently an Associate Professor.
Grid and Cooperative Computing, 2006
Mobile Ad-hoc Network (MANET) is an appealing technology that has attracted lots of research effo... more Mobile Ad-hoc Network (MANET) is an appealing technology that has attracted lots of research efforts over past years. Although the principle of wireless, structure-less, dynamic networks is attractive, there are still some major flaws that prevent commercial expansion. Security is ...
Concurrency and Computation: Practice and Experience, 2010
Ad hoc Networks (MANETs). However, existing multipath routing protocols are often practically inf... more Ad hoc Networks (MANETs). However, existing multipath routing protocols are often practically infeasible due to its security venerability if they suffer from attacks in MANETs, such as repudiation attacks, Denial of Service attacks. In this paper we propose a novel secure multipath routing protocol, referred to as SMRP, and investigate its feasibility and performance. SMRP applies a new heuristic algorithm increasing the number of disjoint paths and a smart authentication mechanism to enhance the security against the attacks in MANETs. The performance results from extensive analysis and experiments show that SMRP can efficiently enhance the security in MANETs while preserving the low overhead of computing and communication.
Journal of Chromatography A, 2008
Journal of Biotechnology, 2013
Here we bioengineered a metastatic pancreatic tumor model with homogenous human CD133(+)CXCR4(+) ... more Here we bioengineered a metastatic pancreatic tumor model with homogenous human CD133(+)CXCR4(+) cancer stem cells (CSC) and a polyglyconate/gelatin electrospun scaffold. The scaffold sported a highly porous microstructure with the majority of fibers possessing a diameter between 500μm and 1500μm. The scaffold supported the growth of tumor cells without provoking apoptosis. The homogeneous CD133(+)CXCR4(+) CSC was transplanted with the scaffold into the pancreas of nude mice to establish a metastatic pancreatic tumor. After 8 weeks, the tumor volume and weight in the scaffold model were 40.52% and 51.49% greater than the traditional model, respectively. The scaffold also increased the incidence of tumor formation and readily induced a hepatic metastasis. In this model we found that FOLFIRINOX possessed a superior capability of preventing the hepatic metastasis of pancreatic tumor cells than gemcitabine. A mechanistic study attributed this superiority to the fact that FOLFIRINOX could induce a greater apoptosis of CD133(+)CXCR4(+) CSC, thus depriving the driving force of hepatic metastasis. This metastatic tumor model showed an increased incidence of tumor formation, an accelerated tumorigenesis and a significant hepatic metastasis, therefore offering scientists a proven platform to study chemotherapeutic drugs.
Cheminform, 2010
ChemInform is a weekly Abstracting Service, delivering concise information at a glance that was e... more ChemInform is a weekly Abstracting Service, delivering concise information at a glance that was extracted from about 100 leading journals. To access a ChemInform Abstract of an article which was published elsewhere, please select a “Full Text” option. The original article is trackable via the “References” option.
International Journal of Minerals, Metallurgy and Materials, 2009
Quaternary alloys Mg 2 Sn 0.4 Si 0.6 x Ge x (x=0, 0.02, 0.05, 0.08 0.1, and 0.2) were prepared us... more Quaternary alloys Mg 2 Sn 0.4 Si 0.6 x Ge x (x=0, 0.02, 0.05, 0.08 0.1, and 0.2) were prepared using induction melting followed by hot-pressing. Relative densities of the sintered samples were over 97% of the theoretical values. Multiple phases were detected in the samples. It was found that the Seebeck coefficient was sensitive to the content of Mg 2 Ge and a maximum value of about 350 V K 1 was obtained. The introduction of Ge increases the electrical conductivity and the thermal conductivity simultaneously. The mechanism of this phenomenon was discussed. A maximum dimensionless figure of merit, ZT, of about 0.28 was obtained for Mg 2 Sn 0.4 Si 0.55 Ge 0.05 at 550 K.
Journal of Computer Research and Development, 2005
Digital watermarking, the technology of embedding special information into multimedia data, is a ... more Digital watermarking, the technology of embedding special information into multimedia data, is a topic that has recently gained increasing attention all over the world. The watermark of digital images, audio, video, and other media products in general has been proposed for ...
Journal of Computer Research and Development, 2005
Digital watermarking, the technology of embedding special information into multimedia data, is a ... more Digital watermarking, the technology of embedding special information into multimedia data, is a topic that has recently gained increasing attention all over the world. The watermark of digital images, audio, video, and other media products in general has been proposed for ...
21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07), 2007
The IEEE 802.15.4/ZigBee is developed to meet the needs in wireless personal area networks by ado... more The IEEE 802.15.4/ZigBee is developed to meet the needs in wireless personal area networks by adopting CSMA/CA algorithm as the retransfer mechanism after the collision occurred. But existed evaluation for 802.15.4 mainly bases on simulation and the only few existed ...
International Conference on Communications and Networking in China, 2007
Recent development of peer-to-peer (P2P) based media streaming technique brings unprecedented new... more Recent development of peer-to-peer (P2P) based media streaming technique brings unprecedented new momentum to the Internet streaming, which has been shown to be cost effective, scalable and easy to deploy. However, before these applications can be successfully and commercially deployed, it is very significant to achieve efficient access control mechanisms. Based our earlier research of secure streaming architecture of TrustStream, this work continues in-depth study on how to ensure that only the authorized users can access the correct media in p2p live streaming systems by adopting proposed user authentication and key management schemes. The main properties of presented secure systems include: i) the management server issues each authorized user a unique public- key certificate for other participant verifying its legal identity; ii) the lifetime of issued certificate is based upon media content instead of host's system time; iii) one-way hash-chain technique is employed to extend the certificate's lifetime; iv) the media is encrypted by the session key (SK) and then delivered to the communication group members; v) the SK is updated periodically and irrespective of clients' behaviors; vi) the re- keying messages are selectively distributed to legitimate users via the p2p overlay network. Moreover, the analysis shows the efficiency, scalability and robustness of given schemes in p2p live streaming systems, named "sStream".
Advanced Information Networking and Applications, 2008
Recently efficient and scalable live video streaming system over the Internet has become a hot to... more Recently efficient and scalable live video streaming system over the Internet has become a hot topic. In order to improve the system performance metrics, such as startup delay, source-to-end delay, playback continuity and scalability, many previous works developed two successful cases of content distribution network (CDN) and peer-to-peer (P2P) Network for the design of large-scale live video streaming systems, but no single one has yet delivered both the scale and service quality. To combine the advantages of CDN and P2P network has been considered as a feasible orientation for large-scale video stream delivering. In this paper, we propose a peer-assisted content distribution network, i.e. PACDN, which borrows the mesh-based P2P ideas into the traditional CDN to enhance the performance and scalability. The basic features of PACDN include: 1) To meet the real time requirement of live video stream service, i.e. to ensure that the video stream could be continuously and stably delivered from the source to each edge server for offering good QoS to different regions clients, the placement edge servers and source streaming server(s) build a hierarchical multi-tree based and in-hierarchy peer-assisted overlay, which is optimized according to the knowledge of underlying physical topology. This scheme in the design is called "server side peer-assisted". 2) To enhance the system scalability and reduce the deployment cost, clients and edge servers construct a Client/Server based and P2P network assisted overlay with the increasing of viewers, which is called "client side peer-assisted" in this design. We compare the inner performance of PACDN with existing approaches based on comprehensive simulations and analysis. The results show that our proposed design outperforms previous systems in the service quality and scalability. PACDN has been implemented as an Internet live video streaming service and it was successfully deployed for broadcasting many important live programs in Ch- ina in 2007. The industrial experiences prove that this design is scalable and reliable. We believe that the wide deployment of PACDN and its further development will soon benefit many more Internet users.
Grid and Cooperative Computing, 2006
Mobile Ad-hoc Network (MANET) is an appealing technology that has attracted lots of research effo... more Mobile Ad-hoc Network (MANET) is an appealing technology that has attracted lots of research efforts over past years. Although the principle of wireless, structure-less, dynamic networks is attractive, there are still some major flaws that prevent commercial expansion. Security is ...
21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07), 2007
The IEEE 802.15.4/ZigBee is developed to meet the needs in wireless personal area networks by ado... more The IEEE 802.15.4/ZigBee is developed to meet the needs in wireless personal area networks by adopting CSMA/CA algorithm as the retransfer mechanism after the collision occurred. But existed evaluation for 802.15.4 mainly bases on simulation and the only few existed ...
IEEE Communications Magazine, 2007
... There is a general belief that the P2P appli-cation is inherently scalable, which is ... 2006... more ... There is a general belief that the P2P appli-cation is inherently scalable, which is ... 2006. [13] X. Zhang, J. Liu, and B. Li, On Large-Scale Peer-to-Peer Live Video Distribution: CoolStreaming and Its Pre-liminary Experimental Results, Proc. IEEE MMSP '05, Oct. 2005. ...
International Conference on Communications and Networking in China, 2007
Recent development of peer-to-peer (P2P) based media streaming technique brings unprecedented new... more Recent development of peer-to-peer (P2P) based media streaming technique brings unprecedented new momentum to the Internet streaming, which has been shown to be cost effective, scalable and easy to deploy. However, before these applications can be successfully and commercially deployed, it is very significant to achieve efficient access control mechanisms. Based our earlier research of secure streaming architecture of TrustStream, this work continues in-depth study on how to ensure that only the authorized users can access the correct media in p2p live streaming systems by adopting proposed user authentication and key management schemes. The main properties of presented secure systems include: i) the management server issues each authorized user a unique public- key certificate for other participant verifying its legal identity; ii) the lifetime of issued certificate is based upon media content instead of host's system time; iii) one-way hash-chain technique is employed to extend the certificate's lifetime; iv) the media is encrypted by the session key (SK) and then delivered to the communication group members; v) the SK is updated periodically and irrespective of clients' behaviors; vi) the re- keying messages are selectively distributed to legitimate users via the p2p overlay network. Moreover, the analysis shows the efficiency, scalability and robustness of given schemes in p2p live streaming systems, named "sStream".
IEEE Transactions on Multimedia, 2006
Information security has been a critical issue in the design and development of reliable distribu... more Information security has been a critical issue in the design and development of reliable distributed communication systems and has attracted significant research efforts. A challenging task is how to maintain information security at a high level for multiple-destination video applications with the huge volume of data and dynamic property of clients. This paper proposes a novel Content-Aware Secure Multicast (CASM) protocol for video distribution that seamlessly integrates three important modules: 1) a scalable light-weight algorithm for group key management; 2) a content-aware key embedding algorithm that can make video quality distortion imperceptible and is reliable for clients to detect embedded keys; and 3) a smart two-level video encryption algorithm that can selectively encrypt a small set of video data only, and yet ensure the video as well as the embedded keys unrecognizable without a genuine key. The implementation of the CASM protocol is independent of the underlying multicast mechanism and is fully compatible with existing coding standards. Performance evaluation studies built upon a CASM prototype have demonstrated that CASM is highly robust and scalable in dynamic multicast environments. Moreover, it ensures secure distribution of key and video data with minimized communication and computation overheads. The proposed content-aware key embedding and encryption algorithms are fast enough to support real-time video multicasting.
Fourth International Conference on Image and Graphics (ICIG 2007), 2007
This paper, based on DCT transform and image scrambling, presents the digital watermark embedding... more This paper, based on DCT transform and image scrambling, presents the digital watermark embedding scheme. Embedding and extracting watermark in compressed video field are carried out in this way. In this paper, DCT transform is used as MPEG4 use DCT transform to compress. Before watermark is embedded, scrambling image is adopted to transform watermark information. Also, the embedding position of the watermark bit is modified by one chaos sequence, and this method promotes the robustness and the security of the watermark. Experiments make it clear that the scheme adopted in this paper satisfy the requirements for imperceptibility, robustness and security.
Advanced Information Networking and Applications, 2008
Recently efficient and scalable live video streaming system over the Internet has become a hot to... more Recently efficient and scalable live video streaming system over the Internet has become a hot topic. In order to improve the system performance metrics, such as startup delay, source-to-end delay, playback continuity and scalability, many previous works developed two successful cases of content distribution network (CDN) and peer-to-peer (P2P) Network for the design of large-scale live video streaming systems, but no single one has yet delivered both the scale and service quality. To combine the advantages of CDN and P2P network has been considered as a feasible orientation for large-scale video stream delivering. In this paper, we propose a peer-assisted content distribution network, i.e. PACDN, which borrows the mesh-based P2P ideas into the traditional CDN to enhance the performance and scalability. The basic features of PACDN include: 1) To meet the real time requirement of live video stream service, i.e. to ensure that the video stream could be continuously and stably delivered from the source to each edge server for offering good QoS to different regions clients, the placement edge servers and source streaming server(s) build a hierarchical multi-tree based and in-hierarchy peer-assisted overlay, which is optimized according to the knowledge of underlying physical topology. This scheme in the design is called "server side peer-assisted". 2) To enhance the system scalability and reduce the deployment cost, clients and edge servers construct a Client/Server based and P2P network assisted overlay with the increasing of viewers, which is called "client side peer-assisted" in this design. We compare the inner performance of PACDN with existing approaches based on comprehensive simulations and analysis. The results show that our proposed design outperforms previous systems in the service quality and scalability. PACDN has been implemented as an Internet live video streaming service and it was successfully deployed for broadcasting many important live programs in Ch- ina in 2007. The industrial experiences prove that this design is scalable and reliable. We believe that the wide deployment of PACDN and its further development will soon benefit many more Internet users.
IEEE Transactions on Circuits and Systems for Video Technology, 2008
To effectively address the explosive growth of multimedia applications over the Internet, a large... more To effectively address the explosive growth of multimedia applications over the Internet, a large-scale media streaming system has to fully take into account the issues of security, quality of service (QoS), scalability, and heterogeneity. However, current streaming solutions do not address all these challenges simultaneously. To address this limitation, this paper proposes a secure and high-performance streaming system called TrustStream, which combines the best features of scalable coding, content distribution network (CDN) and peer-to-peer (P2P) networks to achieve unprecedented security, scalability, heterogeneity, and certain QoS simultaneously under a unified architecture. In this architecture, raw video is encoded into two layers, namely, the base layer, which contains the most critical media content and is transmitted through a CDN-featured single-source multi-receiver (S-M) P2P network to guarantee a minimal level of quality, and the enhancement layer, which is transmitted in a pure multisource multi-receiver (M-M) P2P framework to achieve maximum scalability and bandwidth utilization. Heterogeneity is therefore addressed by delivering only the layers that a receiver is able to manage. Security is provided by combining our key distribution mechanism and key-embedding scheme under our proposed S-M P2P topology. We have implemented TrustStream system over the Internet. Deployed by ChinaCache, the largest CDN provider in China, TrustStream has broadcasted several popular live video programs over the Internet. The experimental results demonstrate the advantages and effectiveness of our architecture and system. where he is currently an Associate Professor.
Grid and Cooperative Computing, 2006
Mobile Ad-hoc Network (MANET) is an appealing technology that has attracted lots of research effo... more Mobile Ad-hoc Network (MANET) is an appealing technology that has attracted lots of research efforts over past years. Although the principle of wireless, structure-less, dynamic networks is attractive, there are still some major flaws that prevent commercial expansion. Security is ...