当前位置: X-MOL首页全球导师 国内导师 › 钱振兴

个人简介

钱振兴,教授、博导。本科至博士毕业于中国科学技术大学,入选中组部青年拔尖人才计划,担任计算机学院院长助理、复旦大学文旅部重点实验室副主任。主要从事多媒体安全、人工智能安全、文旅智能计算等方面的研究,主持国家自然科学基金重点、国家重点研发计划课题等各类项目20余项,发表学术论文200篇,担任IEEE TCYB, IEEE TCSVT, SP, JVCI等多个著名期刊的AE,编著图书《多媒体安全基础导论》、《多媒体与人工智能安全极简综述》。研究成果在文旅部、上海文广等多个单位获得应用,获得上海市自然科学奖一等奖、上海市计算机学会自然科学二等奖、中国发明创业成果二等奖、中国图象图形学学会高等教育教学成果奖二等奖、中国图象图形学学会科普先进工作者、中国产学研合作创新成果奖、中国科技产业化促进会科技创新奖二等奖。现为上海市人工智能学会理事、IEEE高级会员、中国图象图形学学会高级会员。

研究领域

主要从事多媒体信息安全、隐写、数字水印、图像取证、密文域信号处理等方面的研究

近期论文

查看导师最新文章 (温馨提示:请注意重名现象,建议点开原文通过作者单位确认)

J. Lin, Z. Qian, Z. Wang, X. Zhang, and G. Feng, A New Steganography Method for Dynamic GIF Images Based on Palette Sort, Wireless Communications and Mobile Computing, accepted. H. Wang, Z. Qian, G. Feng, and X. Zhang, Defeating data hiding in social networks using generative adversarial network, EURASIP Journal on Image and Video Processing, 30(2020): 1-13, 2020. Y. Qiu, Z. Qian, H. He, H. Tian, and X. Zhang, Optimized Lossless Data Hiding in JPEG Bitstream and Relay Transfer Based Extension, IEEE Transactions on Circuits and Systems for Video Technology, doi: 10.1109/TCSVT.2020.3006494 Z. Qian, Z. Wang, and X. Zhang, Computing in Covert Domain Using Data Hiding, arXiv preprint arXiv:2002.06794, Conf. SPDE, 2020. F. Cao, T. Wu, C. Qin, Z. Qian, and X. Zhang, New Paradigm for Self-embedding Image Watermarking with Poisson Equation, H. Wang et al. (Eds.): IWDW 2019, LNCS 12022, pp. 184–191, 2020. Y. Ren, X. Zhang, G. Feng, Z. Qian, and F. Li, How to Extract Image Features based on Co-occurrence Matrix Securely and Efficiently in Cloud Computing, IEEE Transactions on Cloud Computing, 8(1): 207-219, 2020. Z. Wang, X. Zhang, and Z. Qian, Practical Cover Selection for Steganography, IEEE Signal Processing Letters, 27, 71-75, 2020 N. Zhong, Z. Qian, Z. Wang, X. Zhang, and X. Li, Batch Steganography via Generative Network, IEEE Transactions on Circuits and Systems for Video Technology, 2020, doi: 10.1109/TCSVT.2020.2974884 J. He, Q. Ying, Z. Qian, G. Feng, and X. Zhang, Semi-Structured Data Protection Scheme Based on Robust Watermarking, EURASIP Journal on Image and Video Processing, 12(2020): 1-10, 2020 Y. Qiu, Q. Ying, X. Lin, Y. Zhang, and Z. Qian, Reversible Data Hiding in Encrypted Images with Dual Data Embedding, IEEE Access, vol. 8, pp. 23209-23220, 2020. L. Dou, Z. Qian, C. Qin, G. Feng, and X. Zhang, Anti-Forensics of Diffusion-Based Image Inpainting, Journal of Electronic Imaging, accepted. T. Qiao, X. Luo, T. Wu, M. Xu, and Z. Qian, Adaptive Steganalysis Based on Statistical Model of Quantized DCT Coefficients for JPEG Images, IEEE Transactions on Dependable and Secure Computing, doi: 10.1109/TDSC.2019.2962672 Y. Qiu, Q. Ying, K. Lv, Z. Qian, N. Tang, and X. Zhang, Improved Scheme for Reversible Data Hiding for Encrypted Images using Interpolation Technique, ICSIDP 2019, accepted L. Yang, S. Li, Z. Qian, X. Zhang, and G. Feng, Hiding Data on Biometric Features, The 6th International Conference on Artificial Intelligence and Security, 2019. Y. Qiu, Z. Qian, H. Zeng, X. Lin, and X. Zhang, Reversible Data Hiding in Encrypted Images Using Adaptive Reversible Integer Transformation, Signal Processing, 167, 107288, 1-10, 2020. Y. Wang, L. Kong, Z. Qian, G. Feng, X. Zhang, and J. Zheng, Breaking Permutation-Based Mesh Steganography and Security Improvement, IEEE Access, 7(1): 183300-183310, 2019. Z. Wang, Z. Qian, X. Zhang and S. Li, An Improved Steganalysis Method Using Feature Combinations, the 5th International Conference on Artificial Intelligence and Security (ICAIS 2019), New York, USA, July, 2019, pp. 115-127. C. Qin, Z. Qian, G. Feng, and X. Zhang, Additional articles of special issue on Real?time image watermarking and forensics in cloud computing, Journal of Real-Time Image Processing, 16(4): 811-812, 2019 C. Qin, Z. Qian, G. Feng, and X. Zhang, Special issue on real-time image watermarking and forensics in cloud computing, Journal of Real-Time Image Processing, 16(3): 559-563, 2019 Q. Ying, J. Lin, Z. Qian, H. Xu, and X. Zhang, Robust Digital Watermarking for Color Images in Combined DFT and DT-CWT Domains, Mathematical Biosciences and Engineering, 16(5): 4788–4801, 2019. N. Zhong, Z. Qian, Z. Wang, and X. Zhang, Steganography in Stylized Images, Journal of Electronic Imaging, 28(3): 033005, 2019. Q. Ying, Z. Qian, X. Zhang, and D. Ye, Reversible Data Hiding with Image Enhancement using Histogram Shifting, IEEE Access, 7(1): 46506-46521, 2019. L. Shi, Z. Wang, Z. Qian, N. Huang, P. Puteaux and X. Zhang, Distortion Function for Emoji Image Steganography, Computers, Materials & Continua, 59(3): 943-953, 2019. L. Liu, Z. Wang, Z. Qian, X. Zhang, and G. Feng, Steganography in Beautified Images, Mathematical Biosciences and Engineering, 16(4): 2322-2333, 2019. G. Feng, X. Zhang, Y. Ren, Z. Qian, and S. Li, Diversity-based Cascade Filters for JPEG Steganalysis, IEEE Transactions on Circuits and Systems for Video Technology, doi: 10.1109/TCSVT.2019.2891778 Z. Qian, Z. Wang, X. Zhang, G. Feng, Breaking Steganography: Slight Modification with Distortion Minimization, International Journal of Digital Crime and Forensics, 11(1), 114-125, 2019. Z. Qian, H. Xu, X. Luo, and X. Zhang, New framework of reversible data hiding in encrypted JPEG bitstreams, IEEE Transactions on Circuits and Systems for Video Technology, 29(2): 351-362, 2019. H. Ge, Y. Chen, Z. Qian, and J. Wang, A High Capacity Multi-Level Approach for Reversible Data Hiding in Encrypted Images, IEEE Transactions on Circuits and Systems for Video Technology, 29(8), 2285-2295, 2019. Y. Qiu, H. Wang, Z. Wang, Z. Qian, G. Feng, and X. Zhang, Reversible Contrast Mapping based Reversible Data Hiding in Encrypted Images, IEEE International Workshop on Information Forensics and Security (WIFS 2018), Hong Kong, Dec. 11-13, 2018. Y. Puyang, Z. Yin, and Z. Qian, Reversible Data Hiding in Encrypted Images with Two-MSB Prediction, IEEE International Workshop on Information Forensics and Security (WIFS 2018), Hong Kong, Dec. 11-13, 2018. Z. Wang, Z. Qian, and X. Zhang, Single Actor Pooled Steganalysis, in Proc. 12th International Conference on Genetic and Evolutionary Computing (ICGEC 2018), Changzhou, Jiangsu, China, Dec. 2018. pp. 339-347, Springer, Singapore. Z. Qian, C. Huang, Z. Wang, and X. Zhang, Breaking CNN Based Steganalysis, in Proc. 12th International Conference on Genetic and Evolutionary Computing (ICGEC 2018), Changzhou, Jiangsu, China, Dec. 2018, pp. 483-491, Springer, Singapore. C. Qin, Z. Qian, J. Wang, and X. Zhang, New Advances of Privacy Protection and Multimedia Content Security for Big Data and Cloud Computing, IETE Technical Review, 35(sup1), 1-3, 2018. Z. Wang, Z. Qian, X. Zhang, M. Yang, and D. Ye, On Improving Distortion Functions for JPEG Steganography, IEEE Access, 6(1): 74917-74930, 2018. L. Shi, Z. Wang, Z. Qian, and X. Zhang, Distortion Function for Steganography in Texture Synthesized Images, In: Pan JS., Ito A., Tsai PW., Jain L. (eds) Recent Advances in Intelligent Information Hiding and Multimedia Signal Processing. IIH-MSP 2018. Smart Innovation, Systems and Technologies, Springer, Cham, vol 109, 313-320, 2018 Z. Qian, H. Zhou, X. Zhang, and W. Zhang, Separable reversible data hiding in encrypted JPEG bitstreams, IEEE Transactions on Dependable and Secure Computing, 15(6): 1055-1067, 2018. Z. Yin, Y. Xiang, Z. Qian, & Y. Zhang, Unified Data Hiding and Scrambling Method for JPEG Images. In: Hong R., Cheng WH., Yamasaki T., Wang M., Ngo CW. (eds) Advances in Multimedia Information Processing – PCM 2018. PCM 2018. Lecture Notes in Computer Science, Springer, Cham, vol 11166, pp. 373-383, 2018. S. Li, X. Chen, Z. Wang, Z. Qian, and X. Zhang, Data hiding in Iris Image for Privacy Protection, IETE Technical Review, 35(sup1), 34-41, 2018. Z. Qian, L. Pan, N. Huang, and X. Zhang, Constructive Steganography by Tangles, KSII Transactions on Internet and Information Systems, 12(8): 3911-3925, 2018. H. Zhou, K. Chen, W. Zhang, Z. Qian, and N. Yu, Targeted Attack and Security Enhancement on Texture Synthesis Based Steganography, Journal of Visual Communication and Image Representation, 54: 100-107, 2018. Y. Ren, M. Dong, Z. Qian, X. Zhang, and G. Feng, Efficient Algorithm for Secure Outsourcing of Modular Exponentiation with Single Server, IEEE Transactions on Cloud Computing, doi: 10.1109/TCC.2018.2851245. Z. Qian, N. Huang, S. Li, and X. Zhang, Constructive Steganography Using Texture Synthesis, IETE Technical Review, 35(sup1), 14-22, 2018. Z. Qian, L. Pan, S. Li, and X. Zhang, Steganography by Constructing Marbling Texture, International Conference on Cloud Computing and Security, 428-439, Haikou, China, 2018. Y. Puyang, Z. Qian, Z. Yin, and X. Zhang, Style Transferring Based Data Hiding for Color Images, International Conference on Cloud Computing and Security, 440-449, Haikou, China, 2018. Z. Qian, K. K. R. Choo, R. Cogranne, X. Zhang, Multimedia Security: Novel Steganography and Privacy Preserving, Security and Communication Networks, 2018 Z. Tang, M. Ling, H. Yao, Z. Qian, X. Zhang, J. Zhang, and S. Xu, Robust Image Hashing via Random Gabor Filtering and DWT, Computers Materials & Continua, 55(2): 331-344, 2018. S. Li, X. Zhang, Z. Qian, G. Feng, and Y. Ren, Key based Artificial Fingerprint Generation for Privacy Protection, IEEE Transactions on Dependable and Secure Computing, 2018, DOI: 10.1109/TDSC.2018.2812192 Y. Qiu, H. He, Z. Qian, S. Li, and X. Zhang, Lossless Data Hiding in JPEG Bitstream Using Alternative Embedding, Journal of Visual Communication and Image Representation, 52: 86-91, 2018. Z. Qian, S. Dai, and B. Chen, Reversible data hiding in JPEG images using ordered embedding, KSII Transactions on Internet and Information Systems, 11(2): 945-958, 2017. Z. Qian, H. Zhou, W. Zhang, and X. Zhang, Robust steganography using texture synthesis, in: Proceeding of the Twelfth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Nov., 21–23, 2016, Kaohsiung, Taiwan, vol. 1, pp. 25–33, Springer, 2017. Z. Qian, and X. Zhang, Reversible data hiding in encrypted image with distributed source encoding, IEEE Transactions on Circuits and Systems for Video Technology, 26(4): 636-646, 2016. Z. Qian, X. Zhang, and G. Feng, Reversible data hiding in encrypted images based on progressive recovery, IEEE Signal Processing Letters, 23(11): 1672-1676, 2016. Y. Qiu, Z. Qian, and L. Yu, Adaptive Reversible data hiding by extending the generalized integer transformation, IEEE Signal Processing Letters, 23(1): 130-134, 2016. Z. Qian, S. Dai, F. Jiang, and X. Zhang, Improved joint reversible data hiding in encrypted images, Journal of Visual Communication and Image Representation, 40: 732-738, 2016. Z. Qian, X. Zhang, Y. Ren, and G. Feng, Block cipher based separable reversible data hiding in encrypted images, Multimedia Tools and Applications, 75(21): 13749-13763, 2016. Z. Qian, X. Zhang, W. Zhang, and Y. Wang, Reversible contrast enhancement, International Conference on Cloud Computing and Security, ICCCS 2016, Springer International Publishing, 18-27, 2016. 潘琳, 钱振兴, 张新鹏, 基于构造纹理图像的数字隐写,应用科学学报, 34(5): 625-632, 2016. 张新鹏, 钱振兴, 李晟, 信息隐藏研究展望, 应用科学学报, 34(5): 475-489, 2016. Z. Qian, X. Zhang and Y. Ren, JPEG encryption for image rescaling in the encrypted domain, Journal of Visual Communication and Image Representation, 26: 9–13, 2015. B. Xu, Q. Xiao, Z. Qian and C. Qin, Unequal protection mechanism for digital speech transmission based on Turbo codes, International Journal of Network Security, 17(1): 85-93, 2015. G. Feng, Y. Lan, X. Zhang, and Z. Qian. Dynamic adjustment of hidden node parameters for extreme learning machine, IEEE Transactions on Cybernetics, 45(2): 279-288, 2015. X. Zhang, Z. Wang, J. Yu, and Z. Qian, Reversible visible watermark embedded in encrypted domain, IEEE China Summit and International Conference on Signal and Information Processing, ChinaSIP 2015, 826-830, 2015. Z. Qian, X. Zhang, and S. Wang, Reversible data hiding in encrypted JPEG bitstream, IEEE Transactions on Multimedia, 16(5): 1486-1491, 2014. Z. Qian, and X. Zhang, Improved anti-forensics of JPEG compression, Journal of Systems & Software, 91: 100-108, 2014. X. Han, Z. Qian, G. Feng and X. Zhang, Reversible data hiding in encrypted images based on image interpolation, International Journal of Digital Crime and Forensics, 6(2), 73-84, 2014. X. Zhang, Z. Qian, G. Feng, and Y. Ren, Efficient reversible data hiding in encrypted images, Journal of Visual Communication and Image Representation, 25: 322-328, 2014. X. Zhang, Y. Ren, L. Shen, Z. Qian, and G. Feng. Compressing encrypted images with auxiliary information, IEEE Transactions on Multimedia, 16(5): 1327-1336, 2014. L. Zhao, Z. Qian, C. Qin, and Y. Xie, An image self-recovery approach with variable payload, The 9th IEEE Conference on Industrial Electronics and Applications, ICIEA 2014, Hangzhou, China, 2014. S. Yang, C. Qin, Z. Qian, and B. Xu, Tampering detection and content recovery for digital images using halftone mechanism, The Fifth Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2014, Japan, 2014. 陈刚, 钱振兴, 王朔中, 保持纹理细节的自适应非局部均值图像降噪, 上海大学学报(自然科学版), 20(1), 99-106, 2014. 廖纯, 钱振兴, 倪婧, 王朔中, 结合嵌入式小波零树编码和喷泉码的图像自嵌入, 应用科学学报, 32(1): 65-73, 2014. 赵丽丽, 钱振兴, 韩喜玉, 基于显著性分类的数字图像自嵌入方法, 应用科学学报, 32(2): 178-184, 2014. Z. Qian, T. Qiao, Simplified anti-forensics of JPEG compression, Journal of Computers (Finland), 8(10): 2483-2488, 2013. Z. Qian, X. Han, and X. Zhang, Separable reversible data hiding in encrypted images by n-nary histogram modification, Third International Conference on Multimedia Technology, ICMT 2013, 869-876, Guangzhou, China, 2013. S. Wang, Z. Qian, L. Wang, et al, Recognition of layered structure using phase-frequency characteristics of reflected sound waves, 20th International Congress on Sound and Vibration 2013, ICSV 2013, 1633-1637, Bangkok, Thailand, July, 2013. S. Wang, G. Feng, T. Zou, Z. Qian, et al, Robust audio watermarking capable of surviving play-record process based on chroma features, 20th International Congress on Sound and Vibration 2013, ICSV 2013, 1504-1509, Bangkok, Thailand, July, 2013. 任艳丽, 张新鹏, 钱振兴, 素数阶群中基于身份的匿名加密方案, 北京邮电大学学报, 36(5), 96-98, 2013. Z. Qian, and X. Zhang, Lossless data hiding in jpeg bitstream, Journal of Systems and Software, 85(2): 309-313, 2012. Z. Qian, W. Wang, and T. Qiao, An edge detection method in DCT domain, Procedia Engineering, 29: 344-348, 2012. G. Feng, Z. Qian, and X. Zhang, Evolutionary selection extreme learning machine optimization for regression, Soft Computing, 16: 1485-1491, 2012. G. Feng, Z. Qian, and N. Dai, Reversible watermarking via extreme learning machine prediction, Neurocomputing, 82: 62-68, 2012. G. Feng, Z. Qian and X. Zhang, Spectrum-estimation based lossless information recovery for sparse array patterns, Telecommunication Systems, 49(2): 163-169, 2012. Z. Qian, and X. Zhang, Analysis of matrix embedding with error correction capabilities, Fourth International Conference on Multimedia Information Networking and Security, IEEE MINES 2012, 740-743, 2012. Z. Qian, W. Wang, and X. Zhang, Generalized quality assessment of blocking artifacts for compressed images, IFTC 2012, CCIS 331, 110–116, 2012. 乔通, 钱振兴, 张新鹏, 王文文. 基于局部能量方差特性的数字图像取证, 模式识别与人工智能, 25(2): 280-284, 2012. Z. Qian, G. Feng, X. Zhang, and S. Wang, Image self-embedding with high-quality restoration capability, Digital Signal Processing, 21(2): 278-286, 2011. X. Zhang, Z. Qian, Y. Ren, and G. Feng, Watermarking with flexible self-recovery quality based on compressive sensing and compositive reconstruction, IEEE Transactions on Information Forensics & Security, 6(4): 1223-1232, 2011. X. Zhang, S. Wang, Z. Qian, and G. Feng, Reference sharing mechanism for watermark self-embedding, IEEE Transactions on Image Processing, 20(2): 485-495, 2011. X. Zhang, S. Wang, Z. Qian, and G. Feng, Self-embedding watermark with flexible restoration quality, Multimedia Tools and Applications, 54(2): 385-395, 2011. X. Zhang, Z. Qian, et al. Efficient data hiding with high payload, Third International Conference on Multimedia Information Networking and Security, MINES 2011, 318-321, 2011. X. Zhang, Y. Ren, G. Feng, and Z. Qian, Compressing encrypted image using compressive sensing, International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2011, 222-225, 2011. Y. Ren, S. Wang, X. Zhang, and Z. Qian. Fully secure ciphertext-policy attribute-based encryption with constant size ciphertext, Proceedings of 2011 International Conference on Multimedia Information Networking and Security, IEEE MINES 2011, 380-384, 2011. Y. Ren, S. Wang, X. Zhang, and Z. Qian. Identity-based parallel key-insulated encryption with multiple long-term keys, Proceedings of the 2011 International Conference on Informatics, Cybernetics, and Computer Engineering, ICCE2011, 277-283, 2011. 冯国瑞, 钱振兴, 戴宁街. 最小均方预测高容量无损水印方案, 光电子?激光, 22(6): 911-915, 2011. Z. Qian, and G. Feng, Inpainting assisted self recovery with decreased embedding data, IEEE Signal Processing Letters, 17(11): 929-932, 2010. Z. Qian, X. Zhang, G. Feng, and Y. Ren, Color filter array interpolation based self-recovery with anti-cropping capability, International Journal of Multimedia Intelligence and Security. 1(2): 191–203, 2010. X. Zhang, S. Wang, Z. Qian, and G. Feng, Reversible fragile watermarking for locating tampered blocks in JPEG images, Signal Processing, 90(12): 3026-3036, 2010. Z. Qian, and T. Qiao, Image self-embedding with large-area restoration capability, International Conference on Multimedia Information Networking and Security, MINES 2010, 649-652, Nanjing, China, Nov. 4-6, 2010. Z. Qian, G. Feng, and Y. Ren, Fragile watermarking for color image recovery based on color filter array interpolation, L. Chen et al. (Eds.): WAIM 2010, LNCS in Computer Science, 6184: 537-543, 2010. Y. Ren, S. Wang, X. Zhang, and Z. Qian. Fully secure anonymous identity-based encryption under simple assumptions, Proceedings of 2010 International Conference on Multimedia Information Networking and Security, IEEE MINES 2010, 428-432, 2010. 任艳丽, 王朔中, 张新鹏, 钱振兴, 标准模型中基于身份的匿名加密方案, 第9届全国信息隐藏暨多媒体信息安全学术大会论文集, 441-446, 2010. Z. Qian, X. Zhang, and S. Wang. Matrix Selection for High Payload Embedding, The Fifth Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2009, 328-331, Kyoto, Japan, Sept. 2009.

推荐链接
down
wechat
bug