菜单

Prof. Xianfeng Zhao

02/07/2018 - Faculty Members
Prof. Xianfeng Zhao

Prof. Xianfeng Zhao received his Ph.D. degree in computer science from Shanghai Jiao Tong University in 2003. From 2003 to 2005, he was a postdoctoral fellow with the Data Assurance and Communication Security Center, Chinese Academy of Sciences (CAS), Beijing. From 2006 to 2011, he was an associate professor with the State Key Laboratory of Information Security (SKLOIS), Institute of Software, CAS, Beijing. Since 2012, he has been a professor with SKLOIS, which was moved to Institute of Information Engineering, CAS, Beijing, in 2012. Since 2013, Prof. Zhao has also worked as a professor with the School of Cyber Security, University of Chinese Academy of Sciences (UCAS). 

Prof. Zhao's research interests are information hiding and multimedia security, including watermarking, steganography, steganalysis, and content forensics. In these fields, he has published more than 130 papers, owned and applied more than 20 patents, served as PC members or chairs of the conferences such as IWDW, InsCrypt, and IWDCF, and worked as an associate editor of International Journal of Digital Crime and Forensics. He is a senior member of IEEE. By his achievements, he has acquired many prizes and honors such as the National Prize for Information Secrecy Technology (First-level) and the Excellent Teacher of Chinese Academy of Sciences.

Email: zhaoxianfeng AT iie.ac.cn 

Selected Papers:

  1. Y. Q. Liu, X. B. Zhu, X. F. Zhao, Y. Cao. Adversarial Learning for Constrained Image Splicing Detection and Localization Based on Atrous Convolution, IEEE Transactions on Information Forensics and Security, 14(10): 2551-2566, 2019

  2. X. W. Yi, K. Yang, X. F. Zhao, Y. T. Wang, H. B. Yu. AHCM: Adaptive Huffman Code Mapping for Audio Steganography Based on Psychoacoustic Model,IEEE Transactions on Information Forensics and Security, 14(8): 2217-2231, 2019

  3. Z. Z. Zhao, Q. X. Guan, H. Zhang,X. F. Zhao. Improving the robustness of adaptive steganographic algorithms based on transport channel matching,IEEE Transactions on Information Forensics and Security, 14(7): 1843-1856, 2019

  4. H. Zhang,Y. Cao,X. F. Zhao. A steganalytic approach to detect motion vector modification using near-perfect estimation for local optimality, IEEE Transactions on Information Forensics and Security, 12(2): 465-478, 2017

  5. K. Ma, W. M. Zhang, X. F. Zhao, N. H. Yu, F. H. Li. Reversible data hiding in encrypted images by reserving room before encryption, IEEE Transaction on Information Forensics and Security, 8(3): 553-562, March, 2013

  6. Y. Cao, H. Zhang, X. F. Zhao, H. B. Yu, Covert communication by compressed videos exploiting the uncertainty of motion estimation, IEEE Communication Letters, 19(2): 203-206, 2015

  7. Y. Cao, X. F. Zhao, D. G. Feng. Video steganalysis exploiting motion vector reversion-based features, IEEE Signal Processing Letters, 19(1): 35-38, 2012

  8. X. F. Zhao, D. G Feng. Bypassing the decomposition attacks on two-round multivariate schemes by a practical cubic round, IET Information Security, 4(3): 167-184, 2010

  9. S. Ma, X. F. Zhao, Q. X. Guan, Z. J. Xu, Y. Ma. A priori knowledge based secure payload estimation. Multimedia Tools and Applications, 77(14): 17889–17911, July 2018

  10. Y. Q. Liu, Q. X. Guan, X. F. Zhao. Copy-move forgery detection via convolutional kernel network. Multimedia Tools and Applications, 77(14): 18269–18293 , July 2018, Springer

  11. P. P. Wang, Y. Cao, X. F. Zhao. Segmentation based video steganalysis to detect motion vector modification, Security and Communication Networks, Vol. 2017, Article ID 8051389, pp.1-12

  12. X. F. Zhao, J. Zhu, H. B. Yu. On more paradigms of steganalysis, International Journal on Digital Crime and Forensics, 8(2):1-15, Apr. 2016

  13. P. P. Wang, Y. Cao, X. F. Zhao, M. N. Zhu. A steganalytic algorithm to detect DCT-based data hiding methods for H.264/AVC videos. In Proc. 5th ACM Workshop on Information Hiding and Multimedia Security (IH & MMSec 2017), Philadelphia, PA, USA, June 20-22, 2017, pp. 123-133

  14. C. Xia, Q. X. Guan, X. F. Zhao, Z. Xu, Y. Ma. Improving GFR steganalysis features by using Gabor symmetry and weighted histograms. In Proc. 5th ACM Workshop on Information Hiding and Multimedia Security (IH & MMSec 2017), Philadelphia, PA, USA, June 20-22, 2017, pp. 55-66

  15. Z. Z. Zhao, Q. X. Guan, X. F. Zhao. Constructing near-optimal double-layered syndrome-trellis codes for spatial steganography, In Proc. 4th ACM Workshop on Information Hiding and Multimedia Security (IH & MMSec 2016), Vigo, Spain, Aug.20-22, 2016, pp.139-148

  16. P. P. Wang, H. Zhang, Y. Cao, X. F. Zhao. A novel embedding distortion for motion vector-based steganography considering motion characteristic, local optimality and statistical distribution, In Proc. 4th ACM Workshop on Information Hiding and Multimedia Security (IH & MMSec 2016), Vigo, Spain, Aug.20-22, 2016, pp.127-137

  17. Y. Cao, H. Zhang, X. F. Zhao, H. B. Yu. Video steganography based on optimized motion estimation perturbation, In Proc. 3rd ACM Workshop on Information Hiding and Multimedia Security (IH & MMSec 2015), June 17-19, 2015, Portland, Oregon, USA, pp. 25 – 31

  18. H. Zhang, Y. Cao, X. F. Zhao. Video steganography with perturbed macroblock partition. In Proc. 2nd ACM Workshop on Information Hiding and Multimedia Security (IH & MMSec 2014), June 11 - 13, 2014, Salzburg, Austria, pp. 115-122

  19. X. F. Zhao, N. Li. Reversible watermarking with subliminal channel. In Revised Selected Paper of 10th International Workshop on Information Hiding (IH 2008), Santa Barbara, CA, USA, May 19-21, 2008, LNCS 5284: 118-131, Springer, 2008

  20. X. F. Zhao, B. B Xia, Y. Deng. Strengthening QIM-based watermarking by non-uniform discrete cosine transform. In Revised Selected Paper of 10th International Workshop on Information Hiding (IH 2008), Santa Barbara, CA, USA, May 19-21, 2008, LNCS 5284: 309-324, Springer, 2008