Xianfeng Zhao

Orcid: 0000-0002-5617-8399

According to our database1, Xianfeng Zhao authored at least 144 papers between 2002 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Robust JPEG steganography based on the robustness classifier.
EURASIP J. Inf. Secur., December, 2023

Average Gradient-Based Adversarial Attack.
IEEE Trans. Multim., 2023

Forensic Symmetry for DeepFakes.
IEEE Trans. Inf. Forensics Secur., 2023

UVL: A Unified Framework for Video Tampering Localization.
CoRR, 2023

Errorless Robust JPEG Steganography Using Steganographic Polar Codes.
CoRR, 2023

VIFST: Video Inpainting Localization Using Multi-view Spatial-Frequency Traces.
Proceedings of the PRICAI 2023: Trends in Artificial Intelligence, 2023

ZeroGen: Zero-Shot Multimodal Controllable Text Generation with Multiple Oracles.
Proceedings of the Natural Language Processing and Chinese Computing, 2023

Design for a Communication Signal Modulation Pattern Recognition System Based on AP-SoC.
Proceedings of the 8th International Conference on Computer and Communication Systems, 2023

2022
Audio Steganalysis Dataset.
Dataset, May, 2022

Adaptive QIM With Minimum Embedding Cost for Robust Video Steganography on Social Networks.
IEEE Trans. Inf. Forensics Secur., 2022

Improving the Robustness of JPEG Steganography With Robustness Cost.
IEEE Signal Process. Lett., 2022

Content-Aware Robust JPEG Steganography for Lossy Channels Using LPCNet.
IEEE Signal Process. Lett., 2022

A fast and secure MP3 steganographic scheme with multi-domain.
Signal Process., 2022

Robust video steganography for social media sharing based on principal component analysis.
EURASIP J. Inf. Secur., 2022

Improving Robustness of TCM-based Robust Steganography with Variable Robustness.
CoRR, 2022

Visual Explanations for Exposing Potential Inconsistency of Deepfakes.
Proceedings of the Digital Forensics and Watermarking - 21st International Workshop, 2022

Manipulated Face Detection and Localization Based on Semantic Segmentation.
Proceedings of the Digital Forensics and Watermarking - 21st International Workshop, 2022

Voice Conversion Using Learnable Similarity-Guided Masked Autoencoder.
Proceedings of the Digital Forensics and Watermarking - 21st International Workshop, 2022

High-Performance Steganographic Coding Based on Sub-Polarized Channel.
Proceedings of the Digital Forensics and Watermarking - 21st International Workshop, 2022

FMFCC-V: An Asian Large-Scale Challenging Dataset for DeepFake Detection.
Proceedings of the IH&MMSec '22: ACM Workshop on Information Hiding and Multimedia Security, Santa Barbara, CA, USA, June 27, 2022

Improving Robustness of Speech Anti-Spoofing System Using Resnext with Neighbor Filters.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2022

Video Frame Interpolation via Local Lightweight Bidirectional Encoding with Channel Attention Cascade.
Proceedings of the IEEE International Conference on Acoustics, 2022

2021
A Siamese CNN for Image Steganalysis.
IEEE Trans. Inf. Forensics Secur., 2021

Minimizing Embedding Impact for H.264 Steganography by Progressive Trellis Coding.
IEEE Trans. Inf. Forensics Secur., 2021

Steganalysis of H.264/AVC Videos Exploiting Subtractive Prediction Error Blocks.
IEEE Trans. Inf. Forensics Secur., 2021

Secure Robust JPEG Steganography Based on AutoEncoder With Adaptive BCH Encoding.
IEEE Trans. Circuits Syst. Video Technol., 2021

Non-Degraded Adaptive HEVC Steganography by Advanced Motion Vector Prediction.
IEEE Signal Process. Lett., 2021

JPEG steganalysis based on ResNeXt with Gauss partial derivative filters.
Multim. Tools Appl., 2021

Detecting facial manipulated videos based on set convolutional neural networks.
J. Vis. Commun. Image Represent., 2021

Steganalytic feature based adversarial embedding for adaptive JPEG steganography.
J. Vis. Commun. Image Represent., 2021

A lightweight 3D convolutional neural network for deepfake detection.
Int. J. Intell. Syst., 2021

Vision Transformer Based Video Hashing Retrieval for Tracing the Source of Fake Videos.
CoRR, 2021

Detection of Deepfake Videos Using Long Distance Attention.
CoRR, 2021

FMFCC-A: A Challenging Mandarin Dataset for Synthetic Speech Detection.
Proceedings of the Digital Forensics and Watermarking - 20th International Workshop, 2021

A Multi-level Feature Enhancement Network for Image Splicing Localization.
Proceedings of the Digital Forensics and Watermarking - 20th International Workshop, 2021

Arbitrary-Sized JPEG Steganalysis Based on Fully Convolutional Network.
Proceedings of the Digital Forensics and Watermarking - 20th International Workshop, 2021

Fake Speech Detection Using Residual Network with Transformer Encoder.
Proceedings of the IH&MMSec '21: ACM Workshop on Information Hiding and Multimedia Security, 2021

Exploiting Facial Symmetry to Expose Deepfakes.
Proceedings of the 2021 IEEE International Conference on Image Processing, 2021

2020
GAN based synthesized audio dataset.
Dataset, May, 2020

Improved JPEG Phase-Aware Steganalysis Features Using Multiple Filter Sizes and Difference Images.
IEEE Trans. Circuits Syst. Video Technol., 2020

An Adaptive Double-Layered Embedding Scheme for MP3 Steganography.
IEEE Signal Process. Lett., 2020

CEC: Cluster Embedding Coding for H.264 Steganography.
IEEE Signal Process. Lett., 2020

Fast and Secure Steganography Based on J-UNIWARD.
IEEE Signal Process. Lett., 2020

Adaptive fault-tolerant consensus for a class of leader-following systems using neural network learning strategy.
Neural Networks, 2020

An AAC steganography scheme for adaptive embedding with distortion minimization model.
Multim. Tools Appl., 2020

Impact of altruistic motivation perception on corporate hypocrisy: A study based on fuzzy set qualitative comparative analysis.
J. Intell. Fuzzy Syst., 2020

MP3 steganalysis based on joint point-wise and block-wise correlations.
Inf. Sci., 2020

A Video Steganalytic Approach Against Quantized Transform Coefficient-Based H.264 Steganography by Exploiting In-Loop Deblocking Filtering.
IEEE Access, 2020

Constrained Image Splicing Detection and Localization With Attention-Aware Encoder-Decoder and Atrous Convolution.
IEEE Access, 2020

On the Sharing-Based Model of Steganography.
Proceedings of the Digital Forensics and Watermarking - 19th International Workshop, 2020

Generating JPEG Steganographic Adversarial Example via Segmented Adversarial Embedding.
Proceedings of the Digital Forensics and Watermarking - 19th International Workshop, 2020

Deepfake Video Detection Using Audio-Visual Consistency.
Proceedings of the Digital Forensics and Watermarking - 19th International Workshop, 2020

A Robust Video Steganographic Method against Social Networking Transcoding Based on Steganographic Side Channel.
Proceedings of the IH&MMSec '20: ACM Workshop on Information Hiding and Multimedia Security, 2020

2019
Improving the Robustness of Adaptive Steganographic Algorithms Based on Transport Channel Matching.
IEEE Trans. Inf. Forensics Secur., 2019

AHCM: Adaptive Huffman Code Mapping for Audio Steganography Based on Psychoacoustic Model.
IEEE Trans. Inf. Forensics Secur., 2019

Adversarial Learning for Constrained Image Splicing Detection and Localization Based on Atrous Convolution.
IEEE Trans. Inf. Forensics Secur., 2019

Boosting Image Steganalysis Under Universal Deep Learning Architecture Incorporating Ensemble Classification Strategy.
IEEE Signal Process. Lett., 2019

RestegNet: a residual steganalytic network.
Multim. Tools Appl., 2019

Adaptive spatial steganography based on adversarial examples.
Multim. Tools Appl., 2019

Detecting and Distinguishing Adaptive and Non-Adaptive Steganography by Image Segmentation.
Int. J. Digit. Crime Forensics, 2019

Light Multiscale Conventional Neural Network for MP3 Steganalysis.
Proceedings of the Digital Forensics and Watermarking - 18th International Workshop, 2019

Improving Audio Steganalysis Using Deep Residual Networks.
Proceedings of the Digital Forensics and Watermarking - 18th International Workshop, 2019

IStego100K: Large-Scale Image Steganalysis Dataset.
Proceedings of the Digital Forensics and Watermarking - 18th International Workshop, 2019

New Steganalytic Approach for AMR Steganography Based on Block-Wise of Pulse Position Distribution and Neighboring Joint Density.
Proceedings of the Digital Forensics and Watermarking - 18th International Workshop, 2019

Defining Joint Embedding Distortion for Adaptive MP3 Steganography.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019

Adaptive VP8 Steganography Based on Deblocking Filtering.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019

Recurrent Convolutional Neural Networks for AMR Steganalysis Based on Pulse Position.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019

RHFCN: : Fully CNN-based Steganalysis of MP3 with Rich High-pass Filtering.
Proceedings of the IEEE International Conference on Acoustics, 2019

2018
Relationship Between Entrepreneurial Motivation and Crowdfunding Success Based on Qualitative Analysis-Based on Kickstarer Website Data.
Wirel. Pers. Commun., 2018

A deep learning approach to patch-based image inpainting forensics.
Signal Process. Image Commun., 2018

Universal embedding strategy for batch adaptive steganography in both spatial and JPEG domain.
Multim. Tools Appl., 2018

A Priori knowledge based secure payload estimation.
Multim. Tools Appl., 2018

Copy-move forgery detection based on convolutional kernel network.
Multim. Tools Appl., 2018

Highly accurate real-time image steganalysis based on GPU.
J. Real Time Image Process., 2018

Adaptive finite-time consensus of a class of disturbed multi-agent systems.
J. Frankl. Inst., 2018

Digital Image Splicing Detection Based on Markov Features in QDCT and QWT Domain.
Int. J. Digit. Crime Forensics, 2018

Adversarial Learning for Image Forensics Deep Matching with Atrous Convolution.
CoRR, 2018

Weakening the Detecting Capability of CNN-based Steganalysis.
CoRR, 2018

Convolutional Neural Network for Larger JPEG Images Steganalysis.
Proceedings of the Digital Forensics and Watermarking - 17th International Workshop, 2018

A Deep Residual Multi-scale Convolutional Network for Spatial Steganalysis.
Proceedings of the Digital Forensics and Watermarking - 17th International Workshop, 2018

Pitch Delay Based Adaptive Steganography for AMR Speech Stream.
Proceedings of the Digital Forensics and Watermarking - 17th International Workshop, 2018

CNN-based Steganalysis of MP3 Steganography in the Entropy Code Domain.
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, 2018

Maintaining Rate-Distortion Optimization for IPM-Based Video Steganography by Constructing Isolated Channels in HEVC.
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, 2018

Image Forgery Localization based on Multi-Scale Convolutional Neural Networks.
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, 2018

Cover Block Decoupling for Content-Adaptive H.264 Steganography.
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, 2018

2017
A Steganalytic Approach to Detect Motion Vector Modification Using Near-Perfect Estimation for Local Optimality.
IEEE Trans. Inf. Forensics Secur., 2017

Segmentation Based Video Steganalysis to Detect Motion Vector Modification.
Secur. Commun. Networks, 2017

Constructing local information feature for spatial image steganalysis.
Multim. Tools Appl., 2017

ListNet-based object proposals ranking.
Neurocomputing, 2017

A Steganalytic Scheme Based on Classifier Selection Using Joint Image Characteristics.
Int. J. Digit. Crime Forensics, 2017

Further Study on GFR Features for JPEG Steganalysis.
CoRR, 2017

The A Priori Knowledge Based Secure Payload Estimation for Additive Model.
Proceedings of the Media Watermarking, Security, and Forensics 2017, Burlingame, CA, USA, 29 January 2017, 2017

Information Hiding Using CAVLC: Misconceptions and a Detection Strategy.
Proceedings of the Digital Forensics and Watermarking - 16th International Workshop, 2017

Adaptive MP3 Steganography Using Equal Length Entropy Codes Substitution.
Proceedings of the Digital Forensics and Watermarking - 16th International Workshop, 2017

A Prediction Mode-Based Information Hiding Approach for H.264/AVC Videos Minimizing the Impacts on Rate-Distortion Optimization.
Proceedings of the Digital Forensics and Watermarking - 16th International Workshop, 2017

Improving GFR Steganalysis Features by Using Gabor Symmetry and Weighted Histograms.
Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, 2017

A Steganalytic Algorithm to Detect DCT-based Data Hiding Methods for H.264/AVC Videos.
Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, 2017

Improving spatial image adaptive steganalysis incorporating the embedding impactont he feature.
Proceedings of the 2017 IEEE International Conference on Image Processing, 2017

2016
Motion vector-based video steganography with preserved local optimality.
Multim. Tools Appl., 2016

On More Paradigms of Steganalysis.
Int. J. Digit. Crime Forensics, 2016

Novel cover selection criterion for spatial steganography using linear pixel prediction error.
Sci. China Inf. Sci., 2016

The Application of Ad-Hoc Network in Smart Container Tracking System.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Research on Key Technologies and Standard Framework of Secure and Smart Container.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Accelerating the DCTR Features Extraction for JPEG Steganalysis Based on CUDA.
Proceedings of the Media Watermarking, 2016

Embedding Strategy for Batch Adaptive Steganography.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

An Adaptive Video Steganography Based on Intra-prediction Mode and Cost Assignment.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

Data Hiding in H.264/AVC Video Files Using the Coded Block Pattern.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

Reliable Pooled Steganalysis Using Fine-Grained Parameter Estimation and Hypothesis Testing.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

A Novel Robust Image Forensics Algorithm Based on L1-Norm Estimation.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

Constructing Near-optimal Double-layered Syndrome-Trellis Codes for Spatial Steganography.
Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, 2016

A Novel Embedding Distortion for Motion Vector-Based Steganography Considering Motion Characteristic, Local Optimality and Statistical Distribution.
Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, 2016

Video Steganalysis Based on Centralized Error Detection in Spatial Domain.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016

2015
Robust FMO algorithm and adaptive redundant slice allocation for wireless video transmission.
Telecommun. Syst., 2015

Strengthening Spread Spectrum Watermarking Security via Key Controlled Wavelet Filter.
Trans. Data Hiding Multim. Secur., 2015

Defining embedding distortion for motion vector-based video steganography.
Multim. Tools Appl., 2015

Covert Communication by Compressed Videos Exploiting the Uncertainty of Motion Estimation.
IEEE Commun. Lett., 2015

Video Steganalysis Based on Intra Prediction Mode Calibration.
Proceedings of the Digital-Forensics and Watermarking - 14th International Workshop, 2015

Video Steganography Based on Optimized Motion Estimation Perturbation.
Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, 2015

An adaptive detecting strategy against motion vector-based steganography.
Proceedings of the 2015 IEEE International Conference on Multimedia and Expo, 2015

A Practical Method to Determine Achievable Rates for Secure Steganography.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Motion vector reversion-based steganalysis revisited.
Proceedings of the IEEE China Summit and International Conference on Signal and Information Processing, 2015

2014
Multi-class JPEG Image Steganalysis by Ensemble Linear SVM Classifier.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

Video steganography with perturbed macroblock partition.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2014

Differential forensics of DC-DM based watermarking.
Proceedings of the IEEE China Summit & International Conference on Signal and Information Processing, 2014

2013
Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption.
IEEE Trans. Inf. Forensics Secur., 2013

Fast Estimation of Optimal Marked-Signal Distribution for Reversible Data Hiding.
IEEE Trans. Inf. Forensics Secur., 2013

Cryptographic Secrecy Analysis of Matrix Embedding.
Int. J. Comput. Intell. Syst., 2013

Video steganography with multi-path motion estimation.
Proceedings of the Media Watermarking, 2013

Steganography Based on Adaptive Pixel-Value Differencing Scheme Revisited.
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013

2012
Video Steganalysis Exploiting Motion Vector Reversion-Based Features.
IEEE Signal Process. Lett., 2012

2011
Video Steganography with Perturbed Motion Estimation.
Proceedings of the Information Hiding - 13th International Conference, 2011

Benchmarking for Steganography by Kernel Fisher Discriminant Criterion.
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011

2010
Bypassing the decomposition attacks on two-round multivariate schemes by a practical cubic round.
IET Inf. Secur., 2010

2009
Entropy codec based on evolutionary MHT and its application in video encryption.
Proceedings of the Multimedia and Security Workshop, 2009

2008
Strengthening QIM-Based Watermarking by Non-uniform Discrete Cosine Transform.
Proceedings of the Information Hiding, 10th International Workshop, 2008

Reversible Watermarking with Subliminal Channel.
Proceedings of the Information Hiding, 10th International Workshop, 2008

Structural Optimization on Superscalar Processors.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

2007
Representing an N-Dimensional Device Color Gamut.
Proceedings of the 15th Color and Imaging Conference, 2007

2004
Towards the Public but Noninvertible Watermarking.
Proceedings of the Digital Watermarking, Third InternationalWorkshop, 2004

A Generalized Method for Constructing and Proving Zero-Knowledge Watermark Proof Systems.
Proceedings of the Digital Watermarking, Third InternationalWorkshop, 2004

2003
On the spectral singularities of watermarked audio.
Proceedings of the 3rd International Conference on WEB Delivering of Music (WEDELMUSIC 2003), 2003

Multimedia Tampering Localization Based on the Perturbation in Reverse Processing.
Proceedings of the Advances in Web-Age Information Management, 2003

On the Noninvertibility of Adaptive Digital Watermarking.
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003

2002
Exploiting the Intrinsic Irreversibility of Adaptive Technologies to Enhance the Security of Digital Watermarking.
Proceedings of the Advances in Web-Age Information Management, 2002


  Loading...