Xianfeng Zhao

According to our database1, Xianfeng Zhao authored at least 107 papers between 2002 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2021
A Siamese CNN for Image Steganalysis.
IEEE Trans. Inf. Forensics Secur., 2021

Minimizing Embedding Impact for H.264 Steganography by Progressive Trellis Coding.
IEEE Trans. Inf. Forensics Secur., 2021

JPEG steganalysis based on ResNeXt with Gauss partial derivative filters.
Multim. Tools Appl., 2021

2020
Improved JPEG Phase-Aware Steganalysis Features Using Multiple Filter Sizes and Difference Images.
IEEE Trans. Circuits Syst. Video Technol., 2020

An Adaptive Double-Layered Embedding Scheme for MP3 Steganography.
IEEE Signal Process. Lett., 2020

Fast and Secure Steganography Based on J-UNIWARD.
IEEE Signal Process. Lett., 2020

Adaptive fault-tolerant consensus for a class of leader-following systems using neural network learning strategy.
Neural Networks, 2020

An AAC steganography scheme for adaptive embedding with distortion minimization model.
Multim. Tools Appl., 2020

Impact of altruistic motivation perception on corporate hypocrisy: A study based on fuzzy set qualitative comparative analysis.
J. Intell. Fuzzy Syst., 2020

MP3 steganalysis based on joint point-wise and block-wise correlations.
Inf. Sci., 2020

A Video Steganalytic Approach Against Quantized Transform Coefficient-Based H.264 Steganography by Exploiting In-Loop Deblocking Filtering.
IEEE Access, 2020

Constrained Image Splicing Detection and Localization With Attention-Aware Encoder-Decoder and Atrous Convolution.
IEEE Access, 2020

On the Sharing-Based Model of Steganography.
Proceedings of the Digital Forensics and Watermarking - 19th International Workshop, 2020

Generating JPEG Steganographic Adversarial Example via Segmented Adversarial Embedding.
Proceedings of the Digital Forensics and Watermarking - 19th International Workshop, 2020

Deepfake Video Detection Using Audio-Visual Consistency.
Proceedings of the Digital Forensics and Watermarking - 19th International Workshop, 2020

A Robust Video Steganographic Method against Social Networking Transcoding Based on Steganographic Side Channel.
Proceedings of the IH&MMSec '20: ACM Workshop on Information Hiding and Multimedia Security, 2020

2019
Improving the Robustness of Adaptive Steganographic Algorithms Based on Transport Channel Matching.
IEEE Trans. Inf. Forensics Secur., 2019

AHCM: Adaptive Huffman Code Mapping for Audio Steganography Based on Psychoacoustic Model.
IEEE Trans. Inf. Forensics Secur., 2019

Adversarial Learning for Constrained Image Splicing Detection and Localization Based on Atrous Convolution.
IEEE Trans. Inf. Forensics Secur., 2019

Boosting Image Steganalysis Under Universal Deep Learning Architecture Incorporating Ensemble Classification Strategy.
IEEE Signal Process. Lett., 2019

RestegNet: a residual steganalytic network.
Multim. Tools Appl., 2019

Adaptive spatial steganography based on adversarial examples.
Multim. Tools Appl., 2019

Detecting and Distinguishing Adaptive and Non-Adaptive Steganography by Image Segmentation.
Int. J. Digit. Crime Forensics, 2019

Light Multiscale Conventional Neural Network for MP3 Steganalysis.
Proceedings of the Digital Forensics and Watermarking - 18th International Workshop, 2019

Improving Audio Steganalysis Using Deep Residual Networks.
Proceedings of the Digital Forensics and Watermarking - 18th International Workshop, 2019

IStego100K: Large-Scale Image Steganalysis Dataset.
Proceedings of the Digital Forensics and Watermarking - 18th International Workshop, 2019

New Steganalytic Approach for AMR Steganography Based on Block-Wise of Pulse Position Distribution and Neighboring Joint Density.
Proceedings of the Digital Forensics and Watermarking - 18th International Workshop, 2019

Defining Joint Embedding Distortion for Adaptive MP3 Steganography.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019

Adaptive VP8 Steganography Based on Deblocking Filtering.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019

Recurrent Convolutional Neural Networks for AMR Steganalysis Based on Pulse Position.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019

RHFCN: : Fully CNN-based Steganalysis of MP3 with Rich High-pass Filtering.
Proceedings of the IEEE International Conference on Acoustics, 2019

2018
Relationship Between Entrepreneurial Motivation and Crowdfunding Success Based on Qualitative Analysis-Based on Kickstarer Website Data.
Wirel. Pers. Commun., 2018

A deep learning approach to patch-based image inpainting forensics.
Signal Process. Image Commun., 2018

Universal embedding strategy for batch adaptive steganography in both spatial and JPEG domain.
Multim. Tools Appl., 2018

A Priori knowledge based secure payload estimation.
Multim. Tools Appl., 2018

Copy-move forgery detection based on convolutional kernel network.
Multim. Tools Appl., 2018

Highly accurate real-time image steganalysis based on GPU.
J. Real Time Image Process., 2018

Adaptive finite-time consensus of a class of disturbed multi-agent systems.
J. Frankl. Inst., 2018

Digital Image Splicing Detection Based on Markov Features in QDCT and QWT Domain.
Int. J. Digit. Crime Forensics, 2018

Adversarial Learning for Image Forensics Deep Matching with Atrous Convolution.
CoRR, 2018

Weakening the Detecting Capability of CNN-based Steganalysis.
CoRR, 2018

Convolutional Neural Network for Larger JPEG Images Steganalysis.
Proceedings of the Digital Forensics and Watermarking - 17th International Workshop, 2018

A Deep Residual Multi-scale Convolutional Network for Spatial Steganalysis.
Proceedings of the Digital Forensics and Watermarking - 17th International Workshop, 2018

Pitch Delay Based Adaptive Steganography for AMR Speech Stream.
Proceedings of the Digital Forensics and Watermarking - 17th International Workshop, 2018

CNN-based Steganalysis of MP3 Steganography in the Entropy Code Domain.
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, 2018

Maintaining Rate-Distortion Optimization for IPM-Based Video Steganography by Constructing Isolated Channels in HEVC.
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, 2018

Image Forgery Localization based on Multi-Scale Convolutional Neural Networks.
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, 2018

Cover Block Decoupling for Content-Adaptive H.264 Steganography.
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, 2018

2017
A Steganalytic Approach to Detect Motion Vector Modification Using Near-Perfect Estimation for Local Optimality.
IEEE Trans. Inf. Forensics Secur., 2017

Segmentation Based Video Steganalysis to Detect Motion Vector Modification.
Secur. Commun. Networks, 2017

Constructing local information feature for spatial image steganalysis.
Multim. Tools Appl., 2017

ListNet-based object proposals ranking.
Neurocomputing, 2017

A Steganalytic Scheme Based on Classifier Selection Using Joint Image Characteristics.
Int. J. Digit. Crime Forensics, 2017

Further Study on GFR Features for JPEG Steganalysis.
CoRR, 2017

The A Priori Knowledge Based Secure Payload Estimation for Additive Model.
Proceedings of the Media Watermarking, Security, and Forensics 2017, Burlingame, CA, USA, 29 January 2017, 2017

Information Hiding Using CAVLC: Misconceptions and a Detection Strategy.
Proceedings of the Digital Forensics and Watermarking - 16th International Workshop, 2017

Adaptive MP3 Steganography Using Equal Length Entropy Codes Substitution.
Proceedings of the Digital Forensics and Watermarking - 16th International Workshop, 2017

A Prediction Mode-Based Information Hiding Approach for H.264/AVC Videos Minimizing the Impacts on Rate-Distortion Optimization.
Proceedings of the Digital Forensics and Watermarking - 16th International Workshop, 2017

Improving GFR Steganalysis Features by Using Gabor Symmetry and Weighted Histograms.
Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, 2017

A Steganalytic Algorithm to Detect DCT-based Data Hiding Methods for H.264/AVC Videos.
Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, 2017

Improving spatial image adaptive steganalysis incorporating the embedding impactont he feature.
Proceedings of the 2017 IEEE International Conference on Image Processing, 2017

2016
Motion vector-based video steganography with preserved local optimality.
Multim. Tools Appl., 2016

On More Paradigms of Steganalysis.
Int. J. Digit. Crime Forensics, 2016

Novel cover selection criterion for spatial steganography using linear pixel prediction error.
Sci. China Inf. Sci., 2016

The Application of Ad-Hoc Network in Smart Container Tracking System.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Research on Key Technologies and Standard Framework of Secure and Smart Container.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Accelerating the DCTR Features Extraction for JPEG Steganalysis Based on CUDA.
Proceedings of the Media Watermarking, 2016

Embedding Strategy for Batch Adaptive Steganography.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

An Adaptive Video Steganography Based on Intra-prediction Mode and Cost Assignment.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

Data Hiding in H.264/AVC Video Files Using the Coded Block Pattern.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

Reliable Pooled Steganalysis Using Fine-Grained Parameter Estimation and Hypothesis Testing.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

A Novel Robust Image Forensics Algorithm Based on L1-Norm Estimation.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

Constructing Near-optimal Double-layered Syndrome-Trellis Codes for Spatial Steganography.
Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, 2016

A Novel Embedding Distortion for Motion Vector-Based Steganography Considering Motion Characteristic, Local Optimality and Statistical Distribution.
Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, 2016

Video Steganalysis Based on Centralized Error Detection in Spatial Domain.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016

2015
Robust FMO algorithm and adaptive redundant slice allocation for wireless video transmission.
Telecommun. Syst., 2015

Strengthening Spread Spectrum Watermarking Security via Key Controlled Wavelet Filter.
Trans. Data Hiding Multim. Secur., 2015

Defining embedding distortion for motion vector-based video steganography.
Multim. Tools Appl., 2015

Covert Communication by Compressed Videos Exploiting the Uncertainty of Motion Estimation.
IEEE Commun. Lett., 2015

Video Steganalysis Based on Intra Prediction Mode Calibration.
Proceedings of the Digital-Forensics and Watermarking - 14th International Workshop, 2015

Video Steganography Based on Optimized Motion Estimation Perturbation.
Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, 2015

An adaptive detecting strategy against motion vector-based steganography.
Proceedings of the 2015 IEEE International Conference on Multimedia and Expo, 2015

A Practical Method to Determine Achievable Rates for Secure Steganography.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Motion vector reversion-based steganalysis revisited.
Proceedings of the IEEE China Summit and International Conference on Signal and Information Processing, 2015

2014
Multi-class JPEG Image Steganalysis by Ensemble Linear SVM Classifier.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

Video steganography with perturbed macroblock partition.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2014

Differential forensics of DC-DM based watermarking.
Proceedings of the IEEE China Summit & International Conference on Signal and Information Processing, 2014

2013
Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption.
IEEE Trans. Inf. Forensics Secur., 2013

Fast Estimation of Optimal Marked-Signal Distribution for Reversible Data Hiding.
IEEE Trans. Inf. Forensics Secur., 2013

Cryptographic Secrecy Analysis of Matrix Embedding.
Int. J. Comput. Intell. Syst., 2013

Video steganography with multi-path motion estimation.
Proceedings of the Media Watermarking, 2013

Steganography Based on Adaptive Pixel-Value Differencing Scheme Revisited.
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013

2012
Video Steganalysis Exploiting Motion Vector Reversion-Based Features.
IEEE Signal Process. Lett., 2012

2011
Video Steganography with Perturbed Motion Estimation.
Proceedings of the Information Hiding - 13th International Conference, 2011

Benchmarking for Steganography by Kernel Fisher Discriminant Criterion.
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011

2010
Bypassing the decomposition attacks on two-round multivariate schemes by a practical cubic round.
IET Inf. Secur., 2010

2009
Entropy codec based on evolutionary MHT and its application in video encryption.
Proceedings of the Multimedia and Security Workshop, 2009

2008
Strengthening QIM-Based Watermarking by Non-uniform Discrete Cosine Transform.
Proceedings of the Information Hiding, 10th International Workshop, 2008

Reversible Watermarking with Subliminal Channel.
Proceedings of the Information Hiding, 10th International Workshop, 2008

Structural Optimization on Superscalar Processors.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

2007
Representing an N-Dimensional Device Color Gamut.
Proceedings of the 15th Color and Imaging Conference, 2007

2004
Towards the Public but Noninvertible Watermarking.
Proceedings of the Digital Watermarking, Third InternationalWorkshop, 2004

A Generalized Method for Constructing and Proving Zero-Knowledge Watermark Proof Systems.
Proceedings of the Digital Watermarking, Third InternationalWorkshop, 2004

2003
On the spectral singularities of watermarked audio.
Proceedings of the 3rd International Conference on WEB Delivering of Music (WEDELMUSIC 2003), 2003

Multimedia Tampering Localization Based on the Perturbation in Reverse Processing.
Proceedings of the Advances in Web-Age Information Management, 2003

On the Noninvertibility of Adaptive Digital Watermarking.
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003

2002
Exploiting the Intrinsic Irreversibility of Adaptive Technologies to Enhance the Security of Digital Watermarking.
Proceedings of the Advances in Web-Age Information Management, 2002


  Loading...