Phone: (027) 8754-3924
Academic Areas: Multimedia Security
Xiaojing Ma is a lecture at School of Computer Science and Technology, Huazhong University of Science and Technology. Her research spans Privacy protection for surveillance video; Data Hiding; Multimedia Encryption; Encrypted Domain Signal Processing. She is a Project Reviewer of NSF of China and reviewer of some journals and conferences, such as IEEE Transactions on Circuits & Systems for Video Technology, IEEE Transactions on Cloud Computing et al.
PhD in Computer Science / Information security, 2010, School of Computer Science and Technology, Huazhong University of Science and Technology;
BA in Computer Science, 2003, Wuhan University of Science and Technology.
Lecture (2011-present), School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan, Hubei, China
Visiting Scholar (2013-2014), Computer Science Department,University of Missouri Columbia, Columbia, USA
Software Engineering (2003-2004), Capital On-Line Communication Inc, Beijing, China.
Xiaojing Ma, Zhitang Li, etc. A Readable Data Hiding Algorithm for H.264/AVC Video Streams Without Intra-frame Distortion Drift, IEEE Transactions on Circuits & Systems for Video Technology, vol. 20, no.4, pp.1320 – 1330, Oct.2010.
Xiaojing Ma “The Research on Video Data Hiding Algorithms Based On H.264/AVC,” Ph.D. Thesis, Huazhong University of Science and Technology, 8th November 2010. (in Chinese)
Xiaojing Ma, Zhitang Li, etc. Data Hiding in H.264/AVC Streams With Limited Intra-Frame Distortion Drift. International Symposium on Computer Network and Multimedia Technology. CNMT 2009, Wuhan, China, 2009.
Yunxia Liu, Zhitang Li, Xiaojing Ma, etc. A robust without intra-frame distortion drift data hiding algorithm based on H. 264/AVC. Multimedia Tools and Applications. Jan. 2013.
Xiaojing Ma, Zhitang Li, etc. Solving the Discrete Logarithm Problem Using P systems. International Conference on Networks Security, Wireless Communications. NSWCTC 2009, Wuhan, China, 2009.
Xiaojing Ma, Zhitang Li, etc. Using P systems to Solve the Discrete Logarithm Problem used in Diffie-Hellman Key Exchange Protocol. International Journal of Computer Network and Information Security (IJCNIS), vol. 1, no.1, pp. 24-31, 2009.
Xiaojing Ma, Zhitang Li, etc. A Scalable Multicast Key Management to Expel a Malicious Receiver in MARKS. International Conference on Networking, Architecture, and Storage.NAS 2007, Guilin, China, 2007.
Zhitang Li, Xiaojing Ma, etc. A scalable multicast key management scheme combined MARKS and TR-LKH. http://tools.ietf.org/html/draft-li-marks-trlkh-00.html (IETF draft)
Content Encryption and Authentication of Multimedia
Middleware of IOT
“Drift Prevention of Compressed Domain Privacy Protection for Surveillance Video” National Natural Science Foundation (NSF) of China, 2013-2015 (Leader)
“Fully reversible Privacy Protection for Surveillance Video in Compressed Domain” HUST Innovation Research Fund, 2013-2014 (Leader)
“Data Hiding in 3D videos” National Natural Science Foundation (NSF) of China 2013-2016 (2nd Researcher)
“Cloud Security” National 973 Basic Research Program of China 2014-2018 (Researcher)