Xiaojing Ma is a lecture at School of Computer Science and Technology, Huazhong University of Science and Technology. Her research spans Privacy protection for surveillance video; Data Hiding; Multimedia Encryption; Encrypted Domain Signal Processing. She is a Project Reviewer of NSF of China and reviewer of some journals and conferences, such as IEEE Transactions on Circuits & Systems for Video Technology, IEEE Transactions on Cloud Computing et al.
PhD in Computer Science / Information security, 2010, School of Computer Science and Technology, Huazhong University of Science and Technology;
BA in Computer Science, 2003, Wuhan University of Science and Technology.
Lecture (2011-present), School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan, Hubei, China
Visiting Scholar (2013-2014), Computer Science Department,University of Missouri Columbia, Columbia, USA
Software Engineering (2003-2004), Capital On-Line Communication Inc, Beijing, China.
Xiaojing Ma, Zhitang Li, etc. A Readable Data Hiding Algorithm for H.264/AVC Video Streams Without Intra-frame Distortion Drift, IEEE Transactions on Circuits & Systems for Video Technology, vol. 20, no.4, pp.1320 – 1330, Oct.2010.
< >，China Communication,Vol.11,No.9,Sep.14.
Xiaojing Ma “The Research on Video Data Hiding Algorithms Based On H.264/AVC,” Ph.D. Thesis, Huazhong University of Science and Technology, 8th November 2010. (in Chinese)
Xiaojing Ma, Zhitang Li, etc. Data Hiding in H.264/AVC Streams With Limited Intra-Frame Distortion Drift. International Symposium on Computer Network and Multimedia Technology. CNMT 2009, Wuhan, China, 2009.
Yunxia Liu, Zhitang Li, Xiaojing Ma, etc. A robust without intra-frame distortion drift data hiding algorithm based on H. 264/AVC. Multimedia Tools and Applications. Jan. 2013.
Xiaojing Ma, Zhitang Li, etc. Solving the Discrete Logarithm Problem Using P systems. International Conference on Networks Security, Wireless Communications. NSWCTC 2009, Wuhan, China, 2009.
Xiaojing Ma, Zhitang Li, etc. Using P systems to Solve the Discrete Logarithm Problem used in Diffie-Hellman Key Exchange Protocol. International Journal of Computer Network and Information Security (IJCNIS), vol. 1, no.1, pp. 24-31, 2009.
Xiaojing Ma, Zhitang Li, etc. A Scalable Multicast Key Management to Expel a Malicious Receiver in MARKS. International Conference on Networking, Architecture, and Storage.NAS 2007, Guilin, China, 2007.
Zhitang Li, Xiaojing Ma, etc. A scalable multicast key management scheme combined MARKS and TR-LKH. http://tools.ietf.org/html/draft-li-marks-trlkh-00.html (IETF draft)
Content Encryption and Authentication of Multimedia Computer Networks Middleware of IOT
“Drift Prevention of Compressed Domain Privacy Protection for Surveillance Video” National Natural Science Foundation (NSF) of China, 2013-2015 (Leader) “Fully reversible Privacy Protection for Surveillance Video in Compressed Domain” HUST Innovation Research Fund, 2013-2014 (Leader) “Data Hiding in 3D videos” National Natural Science Foundation (NSF) of China 2013-2016 (2nd Researcher) “Cloud Security” National 973 Basic Research Program of China 2014-2018 (Researcher)