当前位置: X-MOL首页全球导师 国内导师 › 赵险峰

个人简介

招生方向:多媒体信息智能化处理、人工智能安全、多媒体信息安全 欢迎信息安全、计算机、电子、自动化、应用数学等相关专业的学生和工作人员报考 教育与科研经历 2003年于上海交通大学电子信息工程学院获得博士学位;2003至2005年为中国科学院研究生院信息安全国家重点实验室博士后。 2005年12月进入中国科学院软件研究所信息安全国家重点实验室工作,2011年12月调入中国科学院信息工程研究所信息安全国家重点实验室工作。目前为中国科学院信息工程研究所研究员,中国科学院大学网络空间安全学院教授,博士生导师。研究方向为多媒体安全与智能分析的理论与技术,包括多媒体处理与智能分析、多媒体信息隐藏与检测、多媒体深度伪造取证与防护、多媒体内容智能生成转换与无缝编辑、数字水印与版权保护、网络多媒体大数据分析等。曾承担国家自然科学基金、国家重点研发计划、中科院战略性先导专项、部委与部队专项等任务60余项,任重大项目主任设计师、总师,型号装备软件系统负责人;在IEEE TIFS、ACM IH & MMSec等本领域重要刊物和会议上发表论文150余篇,获得与申请专利31项,撰写或参与撰写著作5部,任IJDCF、FSI-R、IWDW等期刊、会议的编委、主席或委员,任中国人工智能学会人工智能与安全专委会、中国电子学会通信与信息安全专委会、中国图象图形学会多媒体取证与安全专委会等学术组织的委员,IEEE等国内外学会高级会员。主持研制的成果有重要应用,获部级科学技术奖一等奖、中科院“朱李月华”优秀教师奖、省部级优秀学位论文奖等荣誉。 部分专著与教材: 1. 冯登国, 赵险峰. 信息安全技术概论(普通高等教育十一五国家级规划教材),北京: 电子工业出版社,2009年3月(第二版,2014年2月) 2. 赵险峰,张弘. 隐写学原理与技术(信息安全国家重点实验室信息隐藏领域丛书),北京: 科学出版社,2018年10月 教授课程 信息隐藏、 网络与信息安全系列讲座 目前开设课程 信息隐藏(秋季) 多媒体编码及其信息安全应用(春季) 部分专利情况 1. 赵险峰, 黄炜. 一种扩展防伪数字水印和电子印章信息量的方法. 专利号: ZL 200810056193.7,已授权 2. 李宁, 赵险峰, 黄炜. 一种数字视频内容的快速保护及解保护方法,专利号:ZL 200810056192.2,已授权 3. 曹纭, 赵险峰, 冯登国. 一种加密的Huffman编码方法及其解码方法. 专利号: ZL 200910076038.6,已授权 4. 黄炜, 赵险峰, 冯登国. 一种基于图像和音频再编码处理的隐写防范方法. 专利号: ZL 201010230477.6,已授权 5. 赵险峰, 夏冰冰, 黄炜. 一种基于隐写测评的隐写分析方法. 专利号:ZL 201210394104.6,已授权 部分获奖信息 1. 中国科学院“朱李月华”优秀教师奖 2. 部级科学技术奖一等奖 3. IGI Global's Ninth Annual Excellence in Research Journal Awards, 2017 4. 2018 ACM Workshop on Information Hiding and Multimedia Security,Best Paper Award 部分科研项目 1. 提高多媒体安全分析准确性的关键技术,信息安全国家重点实验室重点部署项目,主持,2014-2015 2. 非马尔可夫模型下基于数据关联的隐写分析研究,国家自然科学基金面上项目,主持, 2012.1-2015 3. 数字权力管理(DRM)独特安全模型的研究,国家自然科学基金面上项目,主持,2006-2008 4. 基于关联运算的隐写分析研究,北京市自然科学基金面上项目,主持,2011-2013 5. 数字媒体安全防护关键技术,中国科学院战略性先导科技专项课题,主持,2012-2016​ 6. 数字媒体内容安全关键技术及测评方法的研究,国家自然科学基金重点项目,主持子课题,2007.1- 2010.12 7. 多媒体伪造智能取证关键技术,国家重点研发计划课题,主持,2019-2021 8. 深度多媒体伪造智能检测技术,攀登计划项目,主持,2020-2021 承担其他任务:国家重点研发计划、信息安全专项、部委项目多项

研究领域

多媒体安全与智能分析的理论与技术,包括多媒体处理与智能分析、多媒体信息隐藏与检测、多媒体伪造取证与防护、数字水印与版权保护、网络多媒体大数据分析等。

近期论文

查看导师最新文章 (温馨提示:请注意重名现象,建议点开原文通过作者单位确认)

Y. Gu, X. Zhao, C. Gong, X. Yi. Deepfake Video Detection Using Audio-Visual Consistency. In: X. Zhao, Y.-Q. Shi, A. Piva, H.J. Kim (eds) Digital Forensics and Watermarking. IWDW 2020. LNCS 12617, pp.168-180, Springer, 2021 Y. Q. Liu, X. B. Zhu, X. F. Zhao, Y. Cao. Adversarial Learning for Constrained Image Splicing Detection and Localization Based on Atrous Convolution, IEEE Transactions on Information Forensics and Security, 14(10): 2551-2566, 2019 X. W. Yi, K. Yang, X. F. Zhao, Y. T. Wang, H. B. Yu. AHCM: Adaptive Huffman Code Mapping for Audio Steganography Based on Psychoacoustic Model,IEEE Transactions on Information Forensics and Security, 14(8): 2217-2231, 2019 Z. Z. Zhao, Q. X. Guan, H. Zhang,X. F. Zhao. Improving the robustness of adaptive steganographic algorithms based on transport channel matching,IEEE Transactions on Information Forensics and Security, 14(7): 1843-1856, 2019 H. Zhang,Y. Cao,X. F. Zhao. A steganalytic approach to detect motion vector modification using near-perfect estimation for local optimality, IEEE Transactions on Information Forensics and Security, 12(2): 465-478, 2017 K. Ma, W. M. Zhang, X. F. Zhao, N. H. Yu, F. H. Li. Reversible data hiding in encrypted images by reserving room before encryption, IEEE Transaction on Information Forensics and Security, 8(3): 553-562, March, 2013 Weike You , Hong Zhang , and Xianfeng Zhao. A Siamese CNN for Image Steganalysis. IEEE Transactions on Information Forensics and Security, vol. 16, pp. 291-306, 2021 Yu Wang , Yun Cao , and Xianfeng Zhao.Minimizing Embedding Impact for H.264 Steganography by Progressive Trellis Coding. IEEE Transactions on Information Forensics and Security, vol. 16, pp. 333-345, 2021 Y. T. Wang, X.W. Yi, X. F. Zhao. MP3 steganalysis based on joint point-wise and block-wise correlations. Information Science, 512 (2020): 1118–1133, Elsevier A. T. Su, S. Ma, X. F. Zhao. Fast and secure steganography based on J-UNIWARD. IEEE Signal Processing Letters, Vol. 27: 221-225, 2020 A. T. Su, X. F. Zhao. Boosting Image Steganalysis under Universal Deep Learning Architecture Incorporating Ensemble Classification Strategy. IEEE Signal Processing Letters, 26(12): 1852-1856, 2019 Yu Wang , Yun Cao , and Xianfeng Zhao. CEC: Cluster Embedding Coding for H.264 Steganography. IEEE Signal Processing Letters, vol. 27, pp. 955-959, 2020 Y. Cao, X. F. Zhao, D. G. Feng. Video steganalysis exploiting motion vector reversion-based features, IEEE Signal Processing Letters, 19(1): 35-38, 2012 Y. Q. Liu, X. F. Zhao. Constrained Image Splicing Detection and Localization with Attention-Aware Encoder-Decoder and Atrous Convolution, IEEE Access, Vol.8, pp.6729-6741, 2020 X. S. Zhu, Y. J. Qian, X. F. Zhao, B. Sun, Y. Sun. A deep learning approach to patch-based image inpainting forensics. Signal Processing: Image Communication, 67(2018): 90-99, 2018, Elsevier Y. Cao, H. Zhang, X. F. Zhao, H. B. Yu, Covert communication by compressed videos exploiting the uncertainty of motion estimation, IEEE Communication Letters, 19(2): 203-206, 2015 X. F. Zhao, D. G Feng. Bypassing the decomposition attacks on two-round multivariate schemes by a practical cubic round, IET Information Security, 4(3): 167-184, 2010 P. P. Wang, Y. Cao, X. F. Zhao. Segmentation based video steganalysis to detect motion vector modification, Security and Communication Networks, Vol. 2017, Article ID 8051389, pp.1-12 S. Ma, X. F. Zhao, Q. X. Guan, Z. J. Xu, Y. Ma. A priori knowledge based secure payload estimation. Multimedia Tools and Applications, 77(14): 17889–17911, July 2018 S. Ma, X. F. Zhao, Y. Q. Liu. Adaptive spatial steganography based on adversarial examples. Multimedia Tools and Applications, 78(22): 32503-32522, 2019, Springer W. K. You, X. F. Zhao, S. Ma, Y. Q. Liu. RestegNet: a residual steganalytic network. Multimedia Tools and Applications, 78(16): 22711–22725, 2019, Springer Y. Q. Liu, Q. X. Guan, X. F. Zhao. Copy-move forgery detection via convolutional kernel network. Multimedia Tools and Applications, 77(14): 18269–18293 , July 2018, Springer Z. Z. Zhao, Q. X. Guan, X. F. Zhao, H. B. Yu, C. J. Liu. Universal embedding strategy for batch adaptive steganography in both spatial and JPEG domain. Multimedia Tools and Applications, 77(11): 14093–14113, June 2018 X. F. Zhao, J. Zhu, H. B. Yu. On more paradigms of steganalysis, International Journal on Digital Crime and Forensics, 8(2):1-15, Apr. 2016 Y. T. Wang, X. W. Yi, X. F. Zhao, A. T. Su. RHFCN: Fully CNN-based Steganalysis of MP3 with Rich High-pass Filtering. In Proc. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2627-2631, 2019 P. P. Wang, Y. Cao, X. F. Zhao. An adaptive detecting strategy against motion vector-based steganography. In Proc. 2015 IEEE International Conference on Multimedia and Expo (ICME), pp. 1-6, 2015 P. A. Fan, H. Zhang, Y. F. Cai, P. Xie, X. F. Zhao. A robust video steganographic method against social networking transcoding based on steganographic side channel, 8th ACM Workshop on Information Hiding and Multimedia Security (IH & MMSec' 20) Y. Z. Yang, Y. T. Wang, X. W. Yi, X. F. Zhao, Y. Ma. Defining Joint Embedding Distortion for Adaptive MP3 Steganography, 7th ACM Workshop on Information Hiding and Multimedia Security (IH & MMSec' 19), pp. 14-24 C. Gong, X. W. Yi, X. F. Zhao, Y. Ma. Recurrent Convolutional Neural Networks for AMR Steganalysis Based on Pulse Position, 7th ACM Workshop on Information Hiding and Multimedia Security (IH & MMSec' 19), pp. 2-13 P. Xie, H. Zhang, W. K. You, X. F. Zhao. Adaptive VP8 Steganography Based on Deblocking Filtering, 7th ACM Workshop on Information Hiding and Multimedia Security (IH & MMSec' 19), pp. 25-30 Y. Q. Liu, Q. X. Guan, X. F. Zhao, Y. Cao. Image forgery localization based on multi-scale convolutional neural networks. In Proc. 6th ACM Workshop on Information Hiding and Multimedia Security (IH & MMSec’18), Innsbruck, Austria, June 20-22, 2018, pp. 85-90 Y. T. Wang, K. Yang, X. W. Yi, X. F. Zhao, Z. J. Xu. CNN-based steganalysis of MP3 steganography in the entropy code domain. In Proc. 6th ACM Workshop on Information Hiding and Multimedia Security (IH & MMSec’18), Innsbruck, Austria, June 20-22, 2018, pp. 55-65 Y. Wang, Y. Cao, X. F. Zhao, Z. J. Xu, M. N. Zhu. Maintaining rate-distortion optimization for IPM-based video steganography by constructing isolated channels in HEVC. In Proc. 6th ACM Workshop on Information Hiding and Multimedia Security (IH & MMSec’18), Innsbruck, Austria, June 20-22, 2018, pp. 97-107 Y. Cao, Y. Wang, X. F. Zhao, M. N. Zhu, Z. J. Xu. Cover block decoupling for content-adaptive H.264 Steganography. InProc. 6th ACM Workshop on Information Hiding and Multimedia Security (IH & MMSec' 18), pp. 23-30, 2018 P. P. Wang, Y. Cao, X. F. Zhao, M. N. Zhu. A steganalytic algorithm to detect DCT-based data hiding methods for H.264/AVC videos. In Proc. 5th ACM Workshop on Information Hiding and Multimedia Security (IH & MMSec' 17), Philadelphia, PA, USA, June 20-22, 2017, pp. 123-133 C. Xia, Q. X. Guan, X. F. Zhao, Z. Xu, Y. Ma. Improving GFR steganalysis features by using Gabor symmetry and weighted histograms. In Proc. 5th ACM Workshop on Information Hiding and Multimedia Security (IH & MMSec' 17), Philadelphia, PA, USA, June 20-22, 2017, pp. 55-66 Z. Z. Zhao, Q. X. Guan, X. F. Zhao. Constructing near-optimal double-layered syndrome-trellis codes for spatial steganography, In Proc. 4th ACM Workshop on Information Hiding and Multimedia Security (IH & MMSec' 16), Vigo, Spain, Aug.20-22, 2016, pp.139-148 P. P. Wang, H. Zhang, Y. Cao, X. F. Zhao. A novel embedding distortion for motion vector-based steganography considering motion characteristic, local optimality and statistical distribution, In Proc. 4th ACM Workshop on Information Hiding and Multimedia Security (IH & MMSec' 16), Vigo, Spain, Aug.20-22, 2016, pp.127-137 Y. Cao, H. Zhang, X. F. Zhao, H. B. Yu. Video steganography based on optimized motion estimation perturbation, In Proc. 3rd ACM Workshop on Information Hiding and Multimedia Security (IH & MMSec' 15), June 17-19, 2015, Portland, Oregon, USA, pp. 25 – 31 H. Zhang, Y. Cao, X. F. Zhao. Video steganography with perturbed macroblock partition. In Proc. 2nd ACM Workshop on Information Hiding and Multimedia Security (IH & MMSec' 14), June 11 - 13, 2014, Salzburg, Austria, pp. 115-122 X. F. Zhao, N. Li. Reversible watermarking with subliminal channel. In Revised Selected Paper of 10th International Workshop on Information Hiding (IH 2008), Santa Barbara, CA, USA, May 19-21, 2008, LNCS 5284: 118-131, Springer, 2008 X. F. Zhao, B. B Xia, Y. Deng. Strengthening QIM-based watermarking by non-uniform discrete cosine transform. In Revised Selected Paper of 10th International Workshop on Information Hiding (IH 2008), Santa Barbara, CA, USA, May 19-21, 2008, LNCS 5284: 309-324, Springer, 2008 X. F. Zhao, Y. X. Dai, D. G. Feng. Towards the Public but Noninvertible Watermarking. In Revised Selected Papers of 3rd International Workshop on Watermarking (IWDW' 04), Seoul, Korea, Oct. 30 - Nov. 1, 2004, LNCS 3304: 218-231, Springer, 2005 X. F. Zhao, Y. X. Dai, D. G. Feng. A Generalized Method for Constructing and Proving Zero-Knowledge Watermark Proof Systems. In Revised Selected Papers of 3rd International Workshop on Watermarking (IWDW' 04), Seoul, Korea, Oct. 30 - Nov. 1, 2004, LNCS 3304: 204-217, Springer, 2005

学术兼职

2019-03-01-今,Forensic Science International: Reports, 编委 2018-08-19-今,中国人工智能学会人工智能与安全专委会, 委员 2017-08-01-今,中国图象图形学会数字媒体取证与安全专委会, 委员 2016-12-01-今,International Journal on Digital Crime and Forensics, AE 2016-04-30-今,中国电子学会通信与信息安全专家委员会, 委员 2015-12-19-今,中国保密协会隐私保护专委会, 委员 2014-08-31-今,中国电子学会计算机取证专家委员会, 委员

推荐链接
down
wechat
bug