近期论文
查看导师新发文章
(温馨提示:请注意重名现象,建议点开原文通过作者单位确认)
Y. Gu, X. Zhao, C. Gong, X. Yi. Deepfake Video Detection Using Audio-Visual Consistency. In: X. Zhao, Y.-Q. Shi, A. Piva, H.J. Kim (eds) Digital Forensics and Watermarking. IWDW 2020. LNCS 12617, pp.168-180, Springer, 2021
Y. Q. Liu, X. B. Zhu, X. F. Zhao, Y. Cao. Adversarial Learning for Constrained Image Splicing Detection and Localization Based on Atrous Convolution, IEEE Transactions on Information Forensics and Security, 14(10): 2551-2566, 2019
X. W. Yi, K. Yang, X. F. Zhao, Y. T. Wang, H. B. Yu. AHCM: Adaptive Huffman Code Mapping for Audio Steganography Based on Psychoacoustic Model,IEEE Transactions on Information Forensics and Security, 14(8): 2217-2231, 2019
Z. Z. Zhao, Q. X. Guan, H. Zhang,X. F. Zhao. Improving the robustness of adaptive steganographic algorithms based on transport channel matching,IEEE Transactions on Information Forensics and Security, 14(7): 1843-1856, 2019
H. Zhang,Y. Cao,X. F. Zhao. A steganalytic approach to detect motion vector modification using near-perfect estimation for local optimality, IEEE Transactions on Information Forensics and Security, 12(2): 465-478, 2017
K. Ma, W. M. Zhang, X. F. Zhao, N. H. Yu, F. H. Li. Reversible data hiding in encrypted images by reserving room before encryption, IEEE Transaction on Information Forensics and Security, 8(3): 553-562, March, 2013
Weike You , Hong Zhang , and Xianfeng Zhao. A Siamese CNN for Image Steganalysis. IEEE Transactions on Information Forensics and Security, vol. 16, pp. 291-306, 2021
Yu Wang , Yun Cao , and Xianfeng Zhao.Minimizing Embedding Impact for H.264 Steganography by Progressive Trellis Coding. IEEE Transactions on Information Forensics and Security, vol. 16, pp. 333-345, 2021
Y. T. Wang, X.W. Yi, X. F. Zhao. MP3 steganalysis based on joint point-wise and block-wise correlations. Information Science, 512 (2020): 1118–1133, Elsevier
A. T. Su, S. Ma, X. F. Zhao. Fast and secure steganography based on J-UNIWARD. IEEE Signal Processing Letters, Vol. 27: 221-225, 2020
A. T. Su, X. F. Zhao. Boosting Image Steganalysis under Universal Deep Learning Architecture Incorporating Ensemble Classification Strategy. IEEE Signal Processing Letters, 26(12): 1852-1856, 2019
Yu Wang , Yun Cao , and Xianfeng Zhao. CEC: Cluster Embedding Coding for H.264 Steganography. IEEE Signal Processing Letters, vol. 27, pp. 955-959, 2020
Y. Cao, X. F. Zhao, D. G. Feng. Video steganalysis exploiting motion vector reversion-based features, IEEE Signal Processing Letters, 19(1): 35-38, 2012
Y. Q. Liu, X. F. Zhao. Constrained Image Splicing Detection and Localization with Attention-Aware Encoder-Decoder and Atrous Convolution, IEEE Access, Vol.8, pp.6729-6741, 2020
X. S. Zhu, Y. J. Qian, X. F. Zhao, B. Sun, Y. Sun. A deep learning approach to patch-based image inpainting forensics. Signal Processing: Image Communication, 67(2018): 90-99, 2018, Elsevier
Y. Cao, H. Zhang, X. F. Zhao, H. B. Yu, Covert communication by compressed videos exploiting the uncertainty of motion estimation, IEEE Communication Letters, 19(2): 203-206, 2015
X. F. Zhao, D. G Feng. Bypassing the decomposition attacks on two-round multivariate schemes by a practical cubic round, IET Information Security, 4(3): 167-184, 2010
P. P. Wang, Y. Cao, X. F. Zhao. Segmentation based video steganalysis to detect motion vector modification, Security and Communication Networks, Vol. 2017, Article ID 8051389, pp.1-12
S. Ma, X. F. Zhao, Q. X. Guan, Z. J. Xu, Y. Ma. A priori knowledge based secure payload estimation. Multimedia Tools and Applications, 77(14): 17889–17911, July 2018
S. Ma, X. F. Zhao, Y. Q. Liu. Adaptive spatial steganography based on adversarial examples. Multimedia Tools and Applications, 78(22): 32503-32522, 2019, Springer
W. K. You, X. F. Zhao, S. Ma, Y. Q. Liu. RestegNet: a residual steganalytic network. Multimedia Tools and Applications, 78(16): 22711–22725, 2019, Springer
Y. Q. Liu, Q. X. Guan, X. F. Zhao. Copy-move forgery detection via convolutional kernel network. Multimedia Tools and Applications, 77(14): 18269–18293 , July 2018, Springer
Z. Z. Zhao, Q. X. Guan, X. F. Zhao, H. B. Yu, C. J. Liu. Universal embedding strategy for batch adaptive steganography in both spatial and JPEG domain. Multimedia Tools and Applications, 77(11): 14093–14113, June 2018
X. F. Zhao, J. Zhu, H. B. Yu. On more paradigms of steganalysis, International Journal on Digital Crime and Forensics, 8(2):1-15, Apr. 2016
Y. T. Wang, X. W. Yi, X. F. Zhao, A. T. Su. RHFCN: Fully CNN-based Steganalysis of MP3 with Rich High-pass Filtering. In Proc. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2627-2631, 2019
P. P. Wang, Y. Cao, X. F. Zhao. An adaptive detecting strategy against motion vector-based steganography. In Proc. 2015 IEEE International Conference on Multimedia and Expo (ICME), pp. 1-6, 2015
P. A. Fan, H. Zhang, Y. F. Cai, P. Xie, X. F. Zhao. A robust video steganographic method against social networking transcoding based on steganographic side channel, 8th ACM Workshop on Information Hiding and Multimedia Security (IH & MMSec' 20)
Y. Z. Yang, Y. T. Wang, X. W. Yi, X. F. Zhao, Y. Ma. Defining Joint Embedding Distortion for Adaptive MP3 Steganography, 7th ACM Workshop on Information Hiding and Multimedia Security (IH & MMSec' 19), pp. 14-24
C. Gong, X. W. Yi, X. F. Zhao, Y. Ma. Recurrent Convolutional Neural Networks for AMR Steganalysis Based on Pulse Position, 7th ACM Workshop on Information Hiding and Multimedia Security (IH & MMSec' 19), pp. 2-13
P. Xie, H. Zhang, W. K. You, X. F. Zhao. Adaptive VP8 Steganography Based on Deblocking Filtering, 7th ACM Workshop on Information Hiding and Multimedia Security (IH & MMSec' 19), pp. 25-30
Y. Q. Liu, Q. X. Guan, X. F. Zhao, Y. Cao. Image forgery localization based on multi-scale convolutional neural networks. In Proc. 6th ACM Workshop on Information Hiding and Multimedia Security (IH & MMSec’18), Innsbruck, Austria, June 20-22, 2018, pp. 85-90
Y. T. Wang, K. Yang, X. W. Yi, X. F. Zhao, Z. J. Xu. CNN-based steganalysis of MP3 steganography in the entropy code domain. In Proc. 6th ACM Workshop on Information Hiding and Multimedia Security (IH & MMSec’18), Innsbruck, Austria, June 20-22, 2018, pp. 55-65
Y. Wang, Y. Cao, X. F. Zhao, Z. J. Xu, M. N. Zhu. Maintaining rate-distortion optimization for IPM-based video steganography by constructing isolated channels in HEVC. In Proc. 6th ACM Workshop on Information Hiding and Multimedia Security (IH & MMSec’18), Innsbruck, Austria, June 20-22, 2018, pp. 97-107
Y. Cao, Y. Wang, X. F. Zhao, M. N. Zhu, Z. J. Xu. Cover block decoupling for content-adaptive H.264 Steganography. InProc. 6th ACM Workshop on Information Hiding and Multimedia Security (IH & MMSec' 18), pp. 23-30, 2018
P. P. Wang, Y. Cao, X. F. Zhao, M. N. Zhu. A steganalytic algorithm to detect DCT-based data hiding methods for H.264/AVC videos. In Proc. 5th ACM Workshop on Information Hiding and Multimedia Security (IH & MMSec' 17), Philadelphia, PA, USA, June 20-22, 2017, pp. 123-133
C. Xia, Q. X. Guan, X. F. Zhao, Z. Xu, Y. Ma. Improving GFR steganalysis features by using Gabor symmetry and weighted histograms. In Proc. 5th ACM Workshop on Information Hiding and Multimedia Security (IH & MMSec' 17), Philadelphia, PA, USA, June 20-22, 2017, pp. 55-66
Z. Z. Zhao, Q. X. Guan, X. F. Zhao. Constructing near-optimal double-layered syndrome-trellis codes for spatial steganography, In Proc. 4th ACM Workshop on Information Hiding and Multimedia Security (IH & MMSec' 16), Vigo, Spain, Aug.20-22, 2016, pp.139-148
P. P. Wang, H. Zhang, Y. Cao, X. F. Zhao. A novel embedding distortion for motion vector-based steganography considering motion characteristic, local optimality and statistical distribution, In Proc. 4th ACM Workshop on Information Hiding and Multimedia Security (IH & MMSec' 16), Vigo, Spain, Aug.20-22, 2016, pp.127-137
Y. Cao, H. Zhang, X. F. Zhao, H. B. Yu. Video steganography based on optimized motion estimation perturbation, In Proc. 3rd ACM Workshop on Information Hiding and Multimedia Security (IH & MMSec' 15), June 17-19, 2015, Portland, Oregon, USA, pp. 25 – 31
H. Zhang, Y. Cao, X. F. Zhao. Video steganography with perturbed macroblock partition. In Proc. 2nd ACM Workshop on Information Hiding and Multimedia Security (IH & MMSec' 14), June 11 - 13, 2014, Salzburg, Austria, pp. 115-122
X. F. Zhao, N. Li. Reversible watermarking with subliminal channel. In Revised Selected Paper of 10th International Workshop on Information Hiding (IH 2008), Santa Barbara, CA, USA, May 19-21, 2008, LNCS 5284: 118-131, Springer, 2008
X. F. Zhao, B. B Xia, Y. Deng. Strengthening QIM-based watermarking by non-uniform discrete cosine transform. In Revised Selected Paper of 10th International Workshop on Information Hiding (IH 2008), Santa Barbara, CA, USA, May 19-21, 2008, LNCS 5284: 309-324, Springer, 2008
X. F. Zhao, Y. X. Dai, D. G. Feng. Towards the Public but Noninvertible Watermarking. In Revised Selected Papers of 3rd International Workshop on Watermarking (IWDW' 04), Seoul, Korea, Oct. 30 - Nov. 1, 2004, LNCS 3304: 218-231, Springer, 2005
X. F. Zhao, Y. X. Dai, D. G. Feng. A Generalized Method for Constructing and Proving Zero-Knowledge Watermark Proof Systems. In Revised Selected Papers of 3rd International Workshop on Watermarking (IWDW' 04), Seoul, Korea, Oct. 30 - Nov. 1, 2004, LNCS 3304: 204-217, Springer, 2005