default search action
Xianfeng Zhao
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j61]Zeyu Zhang, Xianfeng Zhao, Yun Cao:
Unveiling tampering traces: Enhancing image reconstruction errors for visualization. J. Vis. Commun. Image Represent. 100: 104125 (2024) - [j60]Wei Lu, Lingyi Liu, Bolin Zhang, Junwei Luo, Xianfeng Zhao, Yicong Zhou, Jiwu Huang:
Detection of Deepfake Videos Using Long-Distance Attention. IEEE Trans. Neural Networks Learn. Syst. 35(7): 9366-9379 (2024) - [c81]Yewei Gu, Xianfeng Zhao, Xiaowei Yi:
RLVC: Robust and Lightweight Voice Conversion Using Cross-Adaptive Instance Normalization. ICME 2024: 1-6 - [c80]Kangwei Liu, Xiaowei Yi, Xianfeng Zhao:
ProDub: Progressive Growing of Facial Dubbing Networks for Enhanced Lip Sync and Fidelity. ICME 2024: 1-6 - 2023
- [j59]Jimin Zhang, Xianfeng Zhao, Xiaolei He:
Robust JPEG steganography based on the robustness classifier. EURASIP J. Inf. Secur. 2023(1): 11 (2023) - [j58]Gen Li, Xianfeng Zhao, Yun Cao:
Forensic Symmetry for DeepFakes. IEEE Trans. Inf. Forensics Secur. 18: 1095-1110 (2023) - [j57]Chen Wan, Fangjun Huang, Xianfeng Zhao:
Average Gradient-Based Adversarial Attack. IEEE Trans. Multim. 25: 9572-9585 (2023) - [c79]ShiXin Zhang, ZhiHong Yue, YuChen Liu, JiaQian Song, Peipei Liu, Xianfeng Zhao:
Design for a Communication Signal Modulation Pattern Recognition System Based on AP-SoC. ICCCS 2023: 97-102 - [c78]Jinghong Zhang, Xiaowei Yi, Xianfeng Zhao:
A Compressed Synthetic Speech Detection Method with Compression Feature Embedding. INTERSPEECH 2023: 5376-5380 - [c77]Yewei Gu, Xianfeng Zhao, Xiaowei Yi:
Robust Feature Decoupling in Voice Conversion by Using Locality-Based Instance Normalization. INTERSPEECH 2023: 5471-5475 - [c76]Jinchuan Li, Xianfeng Zhao, Yun Cao:
Generalizable Deep Video Inpainting Detection Based on Constrained Convolutional Neural Networks. IWDW 2023: 125-138 - [c75]Houchen Pu, Xiaowei Yi, Bowen Yang, Xianfeng Zhao, Changjun Liu:
Inversion Image Pairs for Anti-forensics in the Frequency Domain. IWDW 2023: 180-193 - [c74]Haoqin Tu, Bowen Yang, Xianfeng Zhao:
ZeroGen: Zero-Shot Multimodal Controllable Text Generation with Multiple Oracles. NLPCC (2) 2023: 494-506 - [c73]Pengfei Pei, Xianfeng Zhao, Jinchuan Li, Yun Cao:
VIFST: Video Inpainting Localization Using Multi-view Spatial-Frequency Traces. PRICAI (3) 2023: 434-446 - [e4]Xianfeng Zhao, Zhenjun Tang, Pedro Comesaña Alfaro, Alessandro Piva:
Digital Forensics and Watermarking - 21st International Workshop, IWDW 2022, Guilin, China, November 18-19, 2022, Revised Selected Papers. Lecture Notes in Computer Science 13825, Springer 2023, ISBN 978-3-031-25114-6 [contents] - [i13]Jimin Zhang, Xianfeng Zhao, Xiaolei He:
Errorless Robust JPEG Steganography Using Steganographic Polar Codes. CoRR abs/2306.15246 (2023) - [i12]Haoqin Tu, Bowen Yang, Xianfeng Zhao:
ZeroGen: Zero-shot Multimodal Controllable Text Generation with Multiple Oracles. CoRR abs/2306.16649 (2023) - [i11]Pengfei Pei, Xianfeng Zhao, Jinchuan Li, Yun Cao:
UVL: A Unified Framework for Video Tampering Localization. CoRR abs/2309.16126 (2023) - 2022
- [j56]Pingan Fan, Hong Zhang, Xianfeng Zhao:
Robust video steganography for social media sharing based on principal component analysis. EURASIP J. Inf. Secur. 2022(1): 4 (2022) - [j55]Yunzhao Yang, Xiaowei Yi, Xianfeng Zhao, Jinghong Zhang:
A fast and secure MP3 steganographic scheme with multi-domain. Signal Process. 190: 108332 (2022) - [j54]Jimin Zhang, Xianfeng Zhao, Xiaolei He, Hong Zhang:
Improving the Robustness of JPEG Steganography With Robustness Cost. IEEE Signal Process. Lett. 29: 164-168 (2022) - [j53]Ziyu Liu, Xiaowei Yi, Xianfeng Zhao, Yunzhao Yang:
Content-Aware Robust JPEG Steganography for Lossy Channels Using LPCNet. IEEE Signal Process. Lett. 29: 2253-2257 (2022) - [j52]Pingan Fan, Hong Zhang, Xianfeng Zhao:
Adaptive QIM With Minimum Embedding Cost for Robust Video Steganography on Social Networks. IEEE Trans. Inf. Forensics Secur. 17: 3801-3815 (2022) - [c72]Xiangling Ding, Pu Huang, Dengyong Zhang, Xianfeng Zhao:
Video Frame Interpolation via Local Lightweight Bidirectional Encoding with Channel Attention Cascade. ICASSP 2022: 1915-1919 - [c71]Zhenyu Zhang, Xianfeng Zhao, Xiaowei Yi:
Improving Robustness of Speech Anti-Spoofing System Using Resnext with Neighbor Filters. ICME 2022: 1-6 - [c70]Gen Li, Xianfeng Zhao, Yun Cao, Pengfei Pei, Jinchuan Li, Zeyu Zhang:
FMFCC-V: An Asian Large-Scale Challenging Dataset for DeepFake Detection. IH&MMSec 2022: 7-18 - [c69]Haocheng Fu, Xianfeng Zhao, Xiaolei He:
High-Performance Steganographic Coding Based on Sub-Polarized Channel. IWDW 2022: 3-19 - [c68]Yewei Gu, Xianfeng Zhao, Xiaowei Yi, Junchao Xiao:
Voice Conversion Using Learnable Similarity-Guided Masked Autoencoder. IWDW 2022: 53-67 - [c67]Pengfei Pei, Xianfeng Zhao, Yun Cao, Chengqiao Hu:
Visual Explanations for Exposing Potential Inconsistency of Deepfakes. IWDW 2022: 68-82 - [c66]Gen Li, Xianfeng Zhao, Yun Cao, Chengqiao Hu:
Manipulated Face Detection and Localization Based on Semantic Segmentation. IWDW 2022: 98-113 - [e3]Xianfeng Zhao, Alessandro Piva, Pedro Comesaña Alfaro:
Digital Forensics and Watermarking - 20th International Workshop, IWDW 2021, Beijing, China, November 20-22, 2021, Revised Selected Papers. Lecture Notes in Computer Science 13180, Springer 2022, ISBN 978-3-030-95397-3 [contents] - [d2]Yuntao Wang, Kun Yang, Yunzhao Yang, Jinghong Zhang, Xianfeng Zhao:
Audio Steganalysis Dataset. IEEE DataPort, 2022 - [i10]Jimin Zhang, Xianfeng Zhao, Xiaolei He:
Improving Robustness of TCM-based Robust Steganography with Variable Robustness. CoRR abs/2211.10095 (2022) - 2021
- [j51]Jiarui Liu, Kaiman Zhu, Wei Lu, Xiangyang Luo, Xianfeng Zhao:
A lightweight 3D convolutional neural network for deepfake detection. Int. J. Intell. Syst. 36(9): 4990-5004 (2021) - [j50]Sai Ma, Xianfeng Zhao:
Steganalytic feature based adversarial embedding for adaptive JPEG steganography. J. Vis. Commun. Image Represent. 76: 103066 (2021) - [j49]Zhaopeng Xu, Jiarui Liu, Wei Lu, Bozhi Xu, Xianfeng Zhao, Bin Li, Jiwu Huang:
Detecting facial manipulated videos based on set convolutional neural networks. J. Vis. Commun. Image Represent. 77: 103119 (2021) - [j48]Ante Su, Xiaolei He, Xianfeng Zhao:
JPEG steganalysis based on ResNeXt with Gauss partial derivative filters. Multim. Tools Appl. 80(3): 3349-3366 (2021) - [j47]Shuowei Liu, Beibei Liu, Yongjian Hu, Xianfeng Zhao:
Non-Degraded Adaptive HEVC Steganography by Advanced Motion Vector Prediction. IEEE Signal Process. Lett. 28: 1843-1847 (2021) - [j46]Wei Lu, Junhong Zhang, Xianfeng Zhao, Weiming Zhang, Jiwu Huang:
Secure Robust JPEG Steganography Based on AutoEncoder With Adaptive BCH Encoding. IEEE Trans. Circuits Syst. Video Technol. 31(7): 2909-2922 (2021) - [j45]Weike You, Hong Zhang, Xianfeng Zhao:
A Siamese CNN for Image Steganalysis. IEEE Trans. Inf. Forensics Secur. 16: 291-306 (2021) - [j44]Yu Wang, Yun Cao, Xianfeng Zhao:
Minimizing Embedding Impact for H.264 Steganography by Progressive Trellis Coding. IEEE Trans. Inf. Forensics Secur. 16: 333-345 (2021) - [j43]Yun Cao, Hong Zhang, Xianfeng Zhao, Xiaolei He:
Steganalysis of H.264/AVC Videos Exploiting Subtractive Prediction Error Blocks. IEEE Trans. Inf. Forensics Secur. 16: 3326-3338 (2021) - [c65]Gen Li, Yun Cao, Xianfeng Zhao:
Exploiting Facial Symmetry to Expose Deepfakes. ICIP 2021: 3587-3591 - [c64]Zhenyu Zhang, Xiaowei Yi, Xianfeng Zhao:
Fake Speech Detection Using Residual Network with Transformer Encoder. IH&MMSec 2021: 13-22 - [c63]Zeyu Zhang, Yun Cao, Xianfeng Zhao:
A Multi-level Feature Enhancement Network for Image Splicing Localization. IWDW 2021: 3-16 - [c62]Zhenyu Zhang, Yewei Gu, Xiaowei Yi, Xianfeng Zhao:
FMFCC-A: A Challenging Mandarin Dataset for Synthetic Speech Detection. IWDW 2021: 117-131 - [c61]Ante Su, Xianfeng Zhao, Xiaolei He:
Arbitrary-Sized JPEG Steganalysis Based on Fully Convolutional Network. IWDW 2021: 197-211 - [e2]Xianfeng Zhao, Yun-Qing Shi, Alessandro Piva, Hyoung Joong Kim:
Digital Forensics and Watermarking - 19th International Workshop, IWDW 2020, Melbourne, VIC, Australia, November 25-27, 2020, Revised Selected Papers. Lecture Notes in Computer Science 12617, Springer 2021, ISBN 978-3-030-69448-7 [contents] - [i9]Wei Lu, Lingyi Liu, Junwei Luo, Xianfeng Zhao, Yicong Zhou, Jiwu Huang:
Detection of Deepfake Videos Using Long Distance Attention. CoRR abs/2106.12832 (2021) - [i8]Zhenyu Zhang, Yewei Gu, Xiaowei Yi, Xianfeng Zhao:
FMFCC-A: A Challenging Mandarin Dataset for Synthetic Speech Detection. CoRR abs/2110.09441 (2021) - [i7]Pengfei Pei, Xianfeng Zhao, Jinchuan Li, Yun Cao, Xiaowei Yi:
Vision Transformer Based Video Hashing Retrieval for Tracing the Source of Fake Videos. CoRR abs/2112.08117 (2021) - 2020
- [j42]Yaqi Liu, Xianfeng Zhao:
Constrained Image Splicing Detection and Localization With Attention-Aware Encoder-Decoder and Atrous Convolution. IEEE Access 8: 6729-6741 (2020) - [j41]Hong Zhang, Weike You, Xianfeng Zhao:
A Video Steganalytic Approach Against Quantized Transform Coefficient-Based H.264 Steganography by Exploiting In-Loop Deblocking Filtering. IEEE Access 8: 186862-186878 (2020) - [j40]Yuntao Wang, Xiaowei Yi, Xianfeng Zhao:
MP3 steganalysis based on joint point-wise and block-wise correlations. Inf. Sci. 512: 1118-1133 (2020) - [j39]Yiqi Zhao, Yuanjian Qin, Xianfeng Zhao, Leilei Shi:
Impact of altruistic motivation perception on corporate hypocrisy: A study based on fuzzy set qualitative comparative analysis. J. Intell. Fuzzy Syst. 38(6): 6795-6803 (2020) - [j38]Zhenyu Zhang, Xiaowei Yi, Xianfeng Zhao:
An AAC steganography scheme for adaptive embedding with distortion minimization model. Multim. Tools Appl. 79(37-38): 27777-27790 (2020) - [j37]Xiao-Zheng Jin, Xianfeng Zhao, Jiguo Yu, Xiaoming Wu, Jing Chi:
Adaptive fault-tolerant consensus for a class of leader-following systems using neural network learning strategy. Neural Networks 121: 474-483 (2020) - [j36]Ante Su, Sai Ma, Xianfeng Zhao:
Fast and Secure Steganography Based on J-UNIWARD. IEEE Signal Process. Lett. 27: 221-225 (2020) - [j35]Yu Wang, Yun Cao, Xianfeng Zhao:
CEC: Cluster Embedding Coding for H.264 Steganography. IEEE Signal Process. Lett. 27: 955-959 (2020) - [j34]Yunzhao Yang, Haibo Yu, Xianfeng Zhao, Xiaowei Yi:
An Adaptive Double-Layered Embedding Scheme for MP3 Steganography. IEEE Signal Process. Lett. 27: 1984-1988 (2020) - [j33]Chao Xia, Qingxiao Guan, Xianfeng Zhao, Keke Wu:
Improved JPEG Phase-Aware Steganalysis Features Using Multiple Filter Sizes and Difference Images. IEEE Trans. Circuits Syst. Video Technol. 30(11): 4100-4113 (2020) - [c60]Pingan Fan, Hong Zhang, Yifan Cai, Pei Xie, Xianfeng Zhao:
A Robust Video Steganographic Method against Social Networking Transcoding Based on Steganographic Side Channel. IH&MMSec 2020: 127-137 - [c59]Sai Ma, Xianfeng Zhao:
Generating JPEG Steganographic Adversarial Example via Segmented Adversarial Embedding. IWDW 2020: 68-79 - [c58]Xianfeng Zhao, Chunfang Yang, Fenlin Liu:
On the Sharing-Based Model of Steganography. IWDW 2020: 94-105 - [c57]Yewei Gu, Xianfeng Zhao, Chen Gong, Xiaowei Yi:
Deepfake Video Detection Using Audio-Visual Consistency. IWDW 2020: 168-180 - [e1]Hongxia Wang, Xianfeng Zhao, Yunqing Shi, Hyoung Joong Kim, Alessandro Piva:
Digital Forensics and Watermarking - 18th International Workshop, IWDW 2019, Chengdu, China, November 2-4, 2019, Revised Selected Papers. Lecture Notes in Computer Science 12022, Springer 2020, ISBN 978-3-030-43574-5 [contents] - [d1]Zhenyu Zhang, Xiaowei Yi, Xianfeng Zhao:
GAN based synthesized audio dataset. IEEE DataPort, 2020
2010 – 2019
- 2019
- [j32]Jie Zhu, Xianfeng Zhao, Qingxiao Guan:
Detecting and Distinguishing Adaptive and Non-Adaptive Steganography by Image Segmentation. Int. J. Digit. Crime Forensics 11(1): 62-77 (2019) - [j31]Weike You, Xianfeng Zhao, Sai Ma, Yaqi Liu:
RestegNet: a residual steganalytic network. Multim. Tools Appl. 78(16): 22711-22725 (2019) - [j30]Sai Ma, Xianfeng Zhao, Yaqi Liu:
Adaptive spatial steganography based on adversarial examples. Multim. Tools Appl. 78(22): 32503-32522 (2019) - [j29]Ante Su, Xianfeng Zhao:
Boosting Image Steganalysis Under Universal Deep Learning Architecture Incorporating Ensemble Classification Strategy. IEEE Signal Process. Lett. 26(12): 1852-1856 (2019) - [j28]Zengzhen Zhao, Qingxiao Guan, Hong Zhang, Xianfeng Zhao:
Improving the Robustness of Adaptive Steganographic Algorithms Based on Transport Channel Matching. IEEE Trans. Inf. Forensics Secur. 14(7): 1843-1856 (2019) - [j27]Xiaowei Yi, Kun Yang, Xianfeng Zhao, Yuntao Wang, Haibo Yu:
AHCM: Adaptive Huffman Code Mapping for Audio Steganography Based on Psychoacoustic Model. IEEE Trans. Inf. Forensics Secur. 14(8): 2217-2231 (2019) - [j26]Yaqi Liu, Xiaobin Zhu, Xianfeng Zhao, Yun Cao:
Adversarial Learning for Constrained Image Splicing Detection and Localization Based on Atrous Convolution. IEEE Trans. Inf. Forensics Secur. 14(10): 2551-2566 (2019) - [c56]Yuntao Wang, Xiaowei Yi, Xianfeng Zhao, Ante Su:
RHFCN: : Fully CNN-based Steganalysis of MP3 with Rich High-pass Filtering. ICASSP 2019: 2627-2631 - [c55]Chen Gong, Xiaowei Yi, Xianfeng Zhao, Yi Ma:
Recurrent Convolutional Neural Networks for AMR Steganalysis Based on Pulse Position. IH&MMSec 2019: 2-13 - [c54]Yunzhao Yang, Yuntao Wang, Xiaowei Yi, Xianfeng Zhao, Yi Ma:
Defining Joint Embedding Distortion for Adaptive MP3 Steganography. IH&MMSec 2019: 14-24 - [c53]Pei Xie, Hong Zhang, Weike You, Xianfeng Zhao, Jianchang Yu, Yi Ma:
Adaptive VP8 Steganography Based on Deblocking Filtering. IH&MMSec 2019: 25-30 - [c52]Jinghong Zhang, Xiaowei Yi, Xianfeng Zhao, Yun Cao:
Light Multiscale Conventional Neural Network for MP3 Steganalysis. IWDW 2019: 43-56 - [c51]Zhenyu Zhang, Xiaowei Yi, Xianfeng Zhao:
Improving Audio Steganalysis Using Deep Residual Networks. IWDW 2019: 57-70 - [c50]Chen Gong, Xianfeng Zhao:
New Steganalytic Approach for AMR Steganography Based on Block-Wise of Pulse Position Distribution and Neighboring Joint Density. IWDW 2019: 307-321 - [c49]Zhongliang Yang, Ke Wang, Sai Ma, Yongfeng Huang, Xiangui Kang, Xianfeng Zhao:
IStego100K: Large-Scale Image Steganalysis Dataset. IWDW 2019: 352-364 - [i6]Zhongliang Yang, Ke Wang, Sai Ma, Yongfeng Huang, Xiangui Kang, Xianfeng Zhao:
IStego100K: Large-scale Image Steganalysis Dataset. CoRR abs/1911.05542 (2019) - 2018
- [j25]Ruxin Wang, Wei Lu, Jixian Li, Shijun Xiang, Xianfeng Zhao, Jinwei Wang:
Digital Image Splicing Detection Based on Markov Features in QDCT and QWT Domain. Int. J. Digit. Crime Forensics 10(4): 90-107 (2018) - [j24]Xiao-Zheng Jin, Xianfeng Zhao, Jiahu Qin, Wei Xing Zheng, Yu Kang:
Adaptive finite-time consensus of a class of disturbed multi-agent systems. J. Frankl. Inst. 355(11): 4644-4664 (2018) - [j23]Chao Xia, Qingxiao Guan, Xianfeng Zhao, Chengduo Zhao:
Highly accurate real-time image steganalysis based on GPU. J. Real Time Image Process. 14(1): 223-236 (2018) - [j22]Zengzhen Zhao, Qingxiao Guan, Xianfeng Zhao, Haibo Yu, Changjun Liu:
Universal embedding strategy for batch adaptive steganography in both spatial and JPEG domain. Multim. Tools Appl. 77(11): 14093-14113 (2018) - [j21]Sai Ma, Xianfeng Zhao, Qingxiao Guan, Zhoujun Xu, Yi Ma:
A Priori knowledge based secure payload estimation. Multim. Tools Appl. 77(14): 17889-17911 (2018) - [j20]Yaqi Liu, Qingxiao Guan, Xianfeng Zhao:
Copy-move forgery detection based on convolutional kernel network. Multim. Tools Appl. 77(14): 18269-18293 (2018) - [j19]Xinshan Zhu, Yongjun Qian, Xianfeng Zhao, Biao Sun, Ya Sun:
A deep learning approach to patch-based image inpainting forensics. Signal Process. Image Commun. 67: 90-99 (2018) - [j18]Yiqi Zhao, Yuanjian Qin, Xianfeng Zhao, Leilei Shi:
Relationship Between Entrepreneurial Motivation and Crowdfunding Success Based on Qualitative Analysis-Based on Kickstarer Website Data. Wirel. Pers. Commun. 102(2): 1723-1734 (2018) - [c48]Yun Cao, Yu Wang, Xianfeng Zhao, Meineng Zhu, Zhoujun Xu:
Cover Block Decoupling for Content-Adaptive H.264 Steganography. IH&MMSec 2018: 23-30 - [c47]Yuntao Wang, Kun Yang, Xiaowei Yi, Xianfeng Zhao, Zhoujun Xu:
CNN-based Steganalysis of MP3 Steganography in the Entropy Code Domain. IH&MMSec 2018: 55-65 - [c46]Yaqi Liu, Qingxiao Guan, Xianfeng Zhao, Yun Cao:
Image Forgery Localization based on Multi-Scale Convolutional Neural Networks. IH&MMSec 2018: 85-90 - [c45]Yu Wang, Yun Cao, Xianfeng Zhao, Zhoujun Xu, Meineng Zhu:
Maintaining Rate-Distortion Optimization for IPM-Based Video Steganography by Constructing Isolated Channels in HEVC. IH&MMSec 2018: 97-107 - [c44]Qian Zhang, Xianfeng Zhao, Changjun Liu:
Convolutional Neural Network for Larger JPEG Images Steganalysis. IWDW 2018: 14-28 - [c43]Shiyang Zhang, Hong Zhang, Xianfeng Zhao, Haibo Yu:
A Deep Residual Multi-scale Convolutional Network for Spatial Steganalysis. IWDW 2018: 40-52 - [c42]Chen Gong, Xiaowei Yi, Xianfeng Zhao:
Pitch Delay Based Adaptive Steganography for AMR Speech Stream. IWDW 2018: 275-289 - [i5]Sai Ma, Qingxiao Guan, Xianfeng Zhao, Yaqi Liu:
Weakening the Detecting Capability of CNN-based Steganalysis. CoRR abs/1803.10889 (2018) - [i4]Yaqi Liu, Xianfeng Zhao, Xiaobin Zhu, Yun Cao:
Adversarial Learning for Image Forensics Deep Matching with Atrous Convolution. CoRR abs/1809.02791 (2018) - 2017
- [j17]Jie Zhu, Qingxiao Guan, Xianfeng Zhao, Yun Cao, Gong Chen:
A Steganalytic Scheme Based on Classifier Selection Using Joint Image Characteristics. Int. J. Digit. Crime Forensics 9(4): 1-14 (2017) - [j16]Yaqi Liu, Xiaoyu Zhang, Xiaobin Zhu, Qingxiao Guan, Xianfeng Zhao:
ListNet-based object proposals ranking. Neurocomputing 267: 182-194 (2017) - [j15]Weiquan Cao, Qingxiao Guan, Xianfeng Zhao, Keren Wang, Jiesi Han:
Constructing local information feature for spatial image steganalysis. Multim. Tools Appl. 76(11): 13221-13237 (2017) - [j14]Peipei Wang, Yun Cao, Xianfeng Zhao:
Segmentation Based Video Steganalysis to Detect Motion Vector Modification. Secur. Commun. Networks 2017: 8051389:1-8051389:12 (2017) - [j13]Hong Zhang, Yun Cao, Xianfeng Zhao:
A Steganalytic Approach to Detect Motion Vector Modification Using Near-Perfect Estimation for Local Optimality. IEEE Trans. Inf. Forensics Secur. 12(2): 465-478 (2017) - [c41]Chao Xia, Qingxiao Guan, Xianfeng Zhao, Jing Dong, Zhoujun Xu:
Improving spatial image adaptive steganalysis incorporating the embedding impactont he feature. ICIP 2017: 515-519 - [c40]Chao Xia, Qingxiao Guan, Xianfeng Zhao, Zhoujun Xu, Yi Ma:
Improving GFR Steganalysis Features by Using Gabor Symmetry and Weighted Histograms. IH&MMSec 2017: 55-66 - [c39]Peipei Wang, Yun Cao, Xianfeng Zhao, Meineng Zhu:
A Steganalytic Algorithm to Detect DCT-based Data Hiding Methods for H.264/AVC Videos. IH&MMSec 2017: 123-133 - [c38]Yu Wang, Yun Cao, Xianfeng Zhao, Linna Zhou:
A Prediction Mode-Based Information Hiding Approach for H.264/AVC Videos Minimizing the Impacts on Rate-Distortion Optimization. IWDW 2017: 163-176 - [c37]Weike You, Yun Cao, Xianfeng Zhao:
Information Hiding Using CAVLC: Misconceptions and a Detection Strategy. IWDW 2017: 187-201 - [c36]Kun Yang, Xiaowei Yi, Xianfeng Zhao, Linna Zhou:
Adaptive MP3 Steganography Using Equal Length Entropy Codes Substitution. IWDW 2017: 202-216 - [c35]Sai Ma, Xianfeng Zhao, Qingxiao Guan, Chengduo Zhao:
The A Priori Knowledge Based Secure Payload Estimation for Additive Model. Media Watermarking, Security, and Forensics 2017: 16-21 - [i3]Chao Xia, Qingxiao Guan, Xianfeng Zhao:
Further Study on GFR Features for JPEG Steganalysis. CoRR abs/1706.07576 (2017) - [i2]Yaqi Liu, Qingxiao Guan, Xianfeng Zhao, Yun Cao:
Image Forgery Localization Based on Multi-Scale Convolutional Neural Networks. CoRR abs/1706.07842 (2017) - [i1]Yaqi Liu, Qingxiao Guan, Xianfeng Zhao:
Copy-move Forgery Detection based on Convolutional Kernel Network. CoRR abs/1707.01221 (2017) - 2016
- [j12]Wei Huang, Xianfeng Zhao:
Novel cover selection criterion for spatial steganography using linear pixel prediction error. Sci. China Inf. Sci. 59(5): 059103:1-059103:3 (2016) - [j11]Xianfeng Zhao, Jie Zhu, Haibo Yu:
On More Paradigms of Steganalysis. Int. J. Digit. Crime Forensics 8(2): 1-15 (2016) - [j10]Hong Zhang, Yun Cao, Xianfeng Zhao:
Motion vector-based video steganography with preserved local optimality. Multim. Tools Appl. 75(21): 13503-13519 (2016) - [c34]Yu Wang, Yun Cao, Xianfeng Zhao:
Video Steganalysis Based on Centralized Error Detection in Spatial Domain. Inscrypt 2016: 472-483 - [c33]Peipei Wang, Hong Zhang, Yun Cao, Xianfeng Zhao:
A Novel Embedding Distortion for Motion Vector-Based Steganography Considering Motion Characteristic, Local Optimality and Statistical Distribution. IH&MMSec 2016: 127-137 - [c32]Zengzhen Zhao, Qingxiao Guan, Xianfeng Zhao:
Constructing Near-optimal Double-layered Syndrome-Trellis Codes for Spatial Steganography. IH&MMSec 2016: 139-148 - [c31]Xin He, Qingxiao Guan, Yanfei Tong, Xianfeng Zhao, Haibo Yu:
A Novel Robust Image Forensics Algorithm Based on L1-Norm Estimation. IWDW 2016: 145-158 - [c30]Zengzhen Zhao, Qingxiao Guan, Xianfeng Zhao, Haibo Yu, Changjun Liu:
Embedding Strategy for Batch Adaptive Steganography. IWDW 2016: 494-505 - [c29]Lingyu Zhang, Xianfeng Zhao:
An Adaptive Video Steganography Based on Intra-prediction Mode and Cost Assignment. IWDW 2016: 518-532 - [c28]Wei Huang, Xianfeng Zhao:
Reliable Pooled Steganalysis Using Fine-Grained Parameter Estimation and Hypothesis Testing. IWDW 2016: 550-563 - [c27]Hong Zhang, Yun Cao, Xianfeng Zhao, Haibo Yu, Changjun Liu:
Data Hiding in H.264/AVC Video Files Using the Coded Block Pattern. IWDW 2016: 588-600 - [c26]Chao Xia, Qingxiao Guan, Xianfeng Zhao, Yong Deng:
Accelerating the DCTR Features Extraction for JPEG Steganalysis Based on CUDA. Media Watermarking, Security, and Forensics 2016: 1-6 - [c25]Jing Wang, Xianfeng Zhao, Yanjie Deng, Shibo Xu, Jichun Li:
Research on Key Technologies and Standard Framework of Secure and Smart Container. Trustcom/BigDataSE/ISPA 2016: 2063-2067 - [c24]Shibo Xu, Qingzhou Li, Peng Ni, Wensheng Cao, Xianfeng Zhao:
The Application of Ad-Hoc Network in Smart Container Tracking System. Trustcom/BigDataSE/ISPA 2016: 2068-2072 - 2015
- [j9]Yun Cao, Hong Zhang, Xianfeng Zhao, Haibo Yu:
Covert Communication by Compressed Videos Exploiting the Uncertainty of Motion Estimation. IEEE Commun. Lett. 19(2): 203-206 (2015) - [j8]Yuanzhi Yao, Weiming Zhang, Nenghai Yu, Xianfeng Zhao:
Defining embedding distortion for motion vector-based video steganography. Multim. Tools Appl. 74(24): 11163-11186 (2015) - [j7]Bingbing Xia, Xianfeng Zhao, Dengguo Feng, Mingsheng Wang:
Strengthening Spread Spectrum Watermarking Security via Key Controlled Wavelet Filter. Trans. Data Hiding Multim. Secur. 10: 1-20 (2015) - [j6]Feng Zhu, Weiming Zhang, Nenghai Yu, Xianfeng Zhao:
Robust FMO algorithm and adaptive redundant slice allocation for wireless video transmission. Telecommun. Syst. 59(3): 357-363 (2015) - [c23]Peipei Wang, Yun Cao, Xianfeng Zhao, Bin Wu:
Motion vector reversion-based steganalysis revisited. ChinaSIP 2015: 463-467 - [c22]Lingyu Zhang, Diao Chen, Yun Cao, Xianfeng Zhao:
A Practical Method to Determine Achievable Rates for Secure Steganography. HPCC/CSS/ICESS 2015: 1274-1281 - [c21]Peipei Wang, Yun Cao, Xianfeng Zhao, Haibo Yu:
An adaptive detecting strategy against motion vector-based steganography. ICME 2015: 1-6 - [c20]Yun Cao, Hong Zhang, Xianfeng Zhao, Haibo Yu:
Video Steganography Based on Optimized Motion Estimation Perturbation. IH&MMSec 2015: 25-31 - [c19]Yanbin Zhao, Hong Zhang, Yun Cao, Peipei Wang, Xianfeng Zhao:
Video Steganalysis Based on Intra Prediction Mode Calibration. IWDW 2015: 119-133 - 2014
- [c18]Xianfeng Zhao, Haibo Yu, Jie Zhu, Yong Deng:
Differential forensics of DC-DM based watermarking. ChinaSIP 2014: 611-615 - [c17]Hong Zhang, Yun Cao, Xianfeng Zhao, Weiming Zhang, Nenghai Yu:
Video steganography with perturbed macroblock partition. IH&MMSec 2014: 115-122 - [c16]Jie Zhu, Qingxiao Guan, Xianfeng Zhao:
Multi-class JPEG Image Steganalysis by Ensemble Linear SVM Classifier. IWDW 2014: 470-484 - 2013
- [j5]Jiayong Chen, Jiufen Liu, Weiming Zhang, Huisheng Liu, Xianfeng Zhao:
Cryptographic Secrecy Analysis of Matrix Embedding. Int. J. Comput. Intell. Syst. 6(4): 639-647 (2013) - [j4]Kede Ma, Weiming Zhang, Xianfeng Zhao, Nenghai Yu, Fenghua Li:
Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption. IEEE Trans. Inf. Forensics Secur. 8(3): 553-562 (2013) - [j3]Xiaocheng Hu, Weiming Zhang, Xuexian Hu, Nenghai Yu, Xianfeng Zhao, Fenghua Li:
Fast Estimation of Optimal Marked-Signal Distribution for Reversible Data Hiding. IEEE Trans. Inf. Forensics Secur. 8(5): 779-788 (2013) - [c15]Hong Zhang, Qingxiao Guan, Xianfeng Zhao:
Steganography Based on Adaptive Pixel-Value Differencing Scheme Revisited. IWDW 2013: 32-47 - [c14]Yun Cao, Xianfeng Zhao, Fenghua Li, Nenghai Yu:
Video steganography with multi-path motion estimation. Media Watermarking, Security, and Forensics 2013: 86650K - 2012
- [j2]Yun Cao, Xianfeng Zhao, Dengguo Feng:
Video Steganalysis Exploiting Motion Vector Reversion-Based Features. IEEE Signal Process. Lett. 19(1): 35-38 (2012) - 2011
- [c13]Wei Huang, Xianfeng Zhao, Dengguo Feng, Rennong Sheng:
Benchmarking for Steganography by Kernel Fisher Discriminant Criterion. Inscrypt 2011: 113-130 - [c12]Yun Cao, Xianfeng Zhao, Dengguo Feng, Rennong Sheng:
Video Steganography with Perturbed Motion Estimation. Information Hiding 2011: 193-207 - 2010
- [j1]Xianfeng Zhao, Dengguo Feng:
Bypassing the decomposition attacks on two-round multivariate schemes by a practical cubic round. IET Inf. Secur. 4(3): 167-184 (2010)
2000 – 2009
- 2009
- [c11]Yun Cao, Xianfeng Zhao, Dengguo Feng:
Entropy codec based on evolutionary MHT and its application in video encryption. MM&Sec 2009: 155-160 - 2008
- [c10]Xianfeng Zhao:
Structural Optimization on Superscalar Processors. CSSE (3) 2008: 427-430 - [c9]Xianfeng Zhao, Ning Li:
Reversible Watermarking with Subliminal Channel. Information Hiding 2008: 118-131 - [c8]Xianfeng Zhao, Bingbing Xia, Yi Deng:
Strengthening QIM-Based Watermarking by Non-uniform Discrete Cosine Transform. Information Hiding 2008: 309-324 - 2007
- [c7]Xianfeng Zhao:
Representing an N-Dimensional Device Color Gamut. CIC 2007: 278-282 - 2004
- [c6]Xianfeng Zhao, Yingxia Dai, Dengguo Feng:
A Generalized Method for Constructing and Proving Zero-Knowledge Watermark Proof Systems. IWDW 2004: 204-217 - [c5]Xianfeng Zhao, Yingxia Dai, Dengguo Feng:
Towards the Public but Noninvertible Watermarking. IWDW 2004: 218-231 - 2003
- [c4]Xianfeng Zhao, Weinong Wang, Kefei Chen:
On the Noninvertibility of Adaptive Digital Watermarking. DEXA Workshops 2003: 347-351 - [c3]Xianfeng Zhao, Weinong Wang, Kefei Chen:
Multimedia Tampering Localization Based on the Perturbation in Reverse Processing. WAIM 2003: 483-494 - [c2]Xianfeng Zhao, Weinong Wang, Kefei Chen:
On the spectral singularities of watermarked audio. WEDELMUSIC 2003: 67-70 - 2002
- [c1]Xianfeng Zhao, Weinong Wang, Kefei Chen:
Exploiting the Intrinsic Irreversibility of Adaptive Technologies to Enhance the Security of Digital Watermarking. WAIM 2002: 430-440
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-08 20:34 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint