Yun Cao

Orcid: 0000-0003-3433-0764

Affiliations:
  • Chinese Academy of Sciences, Institute of Information Engineering, State Key Laboratory of Information Security, Beijing, China
  • University of Chinese Academy of Sciences, Beiing, China (PhD 2012)


According to our database1, Yun Cao authored at least 49 papers between 2009 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Triple-Stage Robust Audio Steganography Framework with AAC Encoding for Lossy Social Media Channels.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2025

2024
Temporal Diversified Self-Contrastive Learning for Generalized Face Forgery Detection.
IEEE Trans. Circuits Syst. Video Technol., December, 2024

Unveiling tampering traces: Enhancing image reconstruction errors for visualization.
J. Vis. Commun. Image Represent., 2024

On the Performance Bounds of Steganographic Polar Codes.
Proceedings of the 16th International Conference on Wireless Communications and Signal Processing, 2024

OC-SAN: Unsupervised Deepfake Detection for Specific Individual Protection Based on Deep One-Class Classification.
Proceedings of the Pattern Recognition and Computer Vision - 7th Chinese Conference, 2024

2023
A novel model compression method based on joint distillation for deepfake video detection.
J. King Saud Univ. Comput. Inf. Sci., October, 2023

Forensic Symmetry for DeepFakes.
IEEE Trans. Inf. Forensics Secur., 2023

Generalized Fake Image Detection Method Based on Gated Hierarchical Multi-Task Learning.
IEEE Signal Process. Lett., 2023

UVL: A Unified Framework for Video Tampering Localization.
CoRR, 2023

VIFST: Video Inpainting Localization Using Multi-view Spatial-Frequency Traces.
Proceedings of the PRICAI 2023: Trends in Artificial Intelligence, 2023

Generalizable Deep Video Inpainting Detection Based on Constrained Convolutional Neural Networks.
Proceedings of the Digital Forensics and Watermarking - 22nd International Workshop, 2023

2022
Channel Attention Image Steganography With Generative Adversarial Networks.
IEEE Trans. Netw. Sci. Eng., 2022

Visual Explanations for Exposing Potential Inconsistency of Deepfakes.
Proceedings of the Digital Forensics and Watermarking - 21st International Workshop, 2022

Manipulated Face Detection and Localization Based on Semantic Segmentation.
Proceedings of the Digital Forensics and Watermarking - 21st International Workshop, 2022

FMFCC-V: An Asian Large-Scale Challenging Dataset for DeepFake Detection.
Proceedings of the IH&MMSec '22: ACM Workshop on Information Hiding and Multimedia Security, Santa Barbara, CA, USA, June 27, 2022

2021
Minimizing Embedding Impact for H.264 Steganography by Progressive Trellis Coding.
IEEE Trans. Inf. Forensics Secur., 2021

Steganalysis of H.264/AVC Videos Exploiting Subtractive Prediction Error Blocks.
IEEE Trans. Inf. Forensics Secur., 2021

GIFMarking: The robust watermarking for animated GIF based deep learning.
J. Vis. Commun. Image Represent., 2021

Vision Transformer Based Video Hashing Retrieval for Tracing the Source of Fake Videos.
CoRR, 2021

A Multi-level Feature Enhancement Network for Image Splicing Localization.
Proceedings of the Digital Forensics and Watermarking - 20th International Workshop, 2021

Exploiting Facial Symmetry to Expose Deepfakes.
Proceedings of the 2021 IEEE International Conference on Image Processing, 2021

2020
CEC: Cluster Embedding Coding for H.264 Steganography.
IEEE Signal Process. Lett., 2020

2019
Adversarial Learning for Constrained Image Splicing Detection and Localization Based on Atrous Convolution.
IEEE Trans. Inf. Forensics Secur., 2019

Light Multiscale Conventional Neural Network for MP3 Steganalysis.
Proceedings of the Digital Forensics and Watermarking - 18th International Workshop, 2019

2018
Adversarial Learning for Image Forensics Deep Matching with Atrous Convolution.
CoRR, 2018

Maintaining Rate-Distortion Optimization for IPM-Based Video Steganography by Constructing Isolated Channels in HEVC.
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, 2018

Image Forgery Localization based on Multi-Scale Convolutional Neural Networks.
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, 2018

Cover Block Decoupling for Content-Adaptive H.264 Steganography.
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, 2018

2017
A Steganalytic Approach to Detect Motion Vector Modification Using Near-Perfect Estimation for Local Optimality.
IEEE Trans. Inf. Forensics Secur., 2017

Segmentation Based Video Steganalysis to Detect Motion Vector Modification.
Secur. Commun. Networks, 2017

A Steganalytic Scheme Based on Classifier Selection Using Joint Image Characteristics.
Int. J. Digit. Crime Forensics, 2017

Information Hiding Using CAVLC: Misconceptions and a Detection Strategy.
Proceedings of the Digital Forensics and Watermarking - 16th International Workshop, 2017

A Prediction Mode-Based Information Hiding Approach for H.264/AVC Videos Minimizing the Impacts on Rate-Distortion Optimization.
Proceedings of the Digital Forensics and Watermarking - 16th International Workshop, 2017

A Steganalytic Algorithm to Detect DCT-based Data Hiding Methods for H.264/AVC Videos.
Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, 2017

2016
Motion vector-based video steganography with preserved local optimality.
Multim. Tools Appl., 2016

Data Hiding in H.264/AVC Video Files Using the Coded Block Pattern.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

A Novel Embedding Distortion for Motion Vector-Based Steganography Considering Motion Characteristic, Local Optimality and Statistical Distribution.
Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, 2016

Video Steganalysis Based on Centralized Error Detection in Spatial Domain.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016

2015
Covert Communication by Compressed Videos Exploiting the Uncertainty of Motion Estimation.
IEEE Commun. Lett., 2015

Video Steganalysis Based on Intra Prediction Mode Calibration.
Proceedings of the Digital-Forensics and Watermarking - 14th International Workshop, 2015

Video Steganography Based on Optimized Motion Estimation Perturbation.
Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, 2015

An adaptive detecting strategy against motion vector-based steganography.
Proceedings of the 2015 IEEE International Conference on Multimedia and Expo, 2015

A Practical Method to Determine Achievable Rates for Secure Steganography.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Motion vector reversion-based steganalysis revisited.
Proceedings of the IEEE China Summit and International Conference on Signal and Information Processing, 2015

2014
Video steganography with perturbed macroblock partition.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2014

2013
Video steganography with multi-path motion estimation.
Proceedings of the Media Watermarking, 2013

2012
Video Steganalysis Exploiting Motion Vector Reversion-Based Features.
IEEE Signal Process. Lett., 2012

2011
Video Steganography with Perturbed Motion Estimation.
Proceedings of the Information Hiding - 13th International Conference, 2011

2009
Entropy codec based on evolutionary MHT and its application in video encryption.
Proceedings of the Multimedia and Security Workshop, 2009


  Loading...