基本信息
赵险峰  男  博导  中国科学院信息工程研究所
电子邮件: zhaoxianfeng@iie.ac.cn
通信地址: 北京市海淀区杏石口路65号C2东段
邮政编码: 100093

研究领域

多媒体安全与智能分析的理论与技术,包括多媒体处理与智能分析、多媒体信息隐藏与检测、多媒体伪造取证与防护、数字水印与版权保护、网络多媒体大数据分析等。

招生信息

招生方向:多媒体信息智能化处理、人工智能安全、多媒体信息安全

欢迎信息安全、计算机、电子、自动化、应用数学等相关专业的学生和工作人员报考

教育与科研经历

2003年于上海交通大学电子信息工程学院获得博士学位;2003至2005年为中国科学院研究生院信息安全国家重点实验室博士后。

2005年12月进入中国科学院软件研究所信息安全国家重点实验室工作,2011年12月调入中国科学院信息工程研究所信息安全国家重点实验室工作。目前为中国科学院信息工程研究所研究员,中国科学院大学网络空间安全学院教授,博士生导师。研究方向为多媒体安全与智能分析的理论与技术,包括多媒体处理与智能分析、多媒体信息隐藏与检测、多媒体伪造取证与防护、数字水印与版权保护、网络多媒体大数据分析等。曾承担国家自然科学基金、国家重点研发计划、中科院战略性先导专项、部委与部队专项等任务60余项,任重大项目主任设计师、总师;在IEEE TIFS、ACM IH & MMSec等本领域重要刊物和会议上发表论文150余篇,获得与申请专利31项,撰写或参与撰写著作5部,任IJDCF、FSI-R、IWDW、InsCrypt等期刊、会议的编委、主席或委员,任中国人工智能学会人工智能与安全专委会、中国电子学会通信与信息安全专委会、中国图象图形学会多媒体取证与安全专委会等学术组织的委员,IEEE等国内外学会高级会员。主持研制的系统有重要应用,获部级科学技术奖一等奖、中科院“朱李月华”优秀教师等荣誉。

社会兼职
2019-03-01-今,Forensic Science International: Reports, 编委
2018-08-19-今,中国人工智能学会人工智能与安全专委会, 委员
2017-08-01-今,中国图象图形学会数字媒体取证与安全专委会, 委员
2016-12-01-今,International Journal on Digital Crime and Forensics, AE
2016-04-30-今,中国电子学会通信与信息安全专家委员会, 委员
2015-12-19-今,中国保密协会隐私保护专委会, 委员
2014-08-31-今,中国电子学会计算机取证专家委员会, 委员

出版信息


  • 部分论文
  1. Y. Gu, X. Zhao, C. Gong, X. Yi. Deepfake Video Detection Using Audio-Visual Consistency. In: X. Zhao, Y.-Q. Shi, A. Piva, H.J. Kim (eds) Digital Forensics and Watermarking. IWDW 2020. LNCS 12617,  pp.168-180, Springer, 2021
  2. Y. Q. Liu, X. B. Zhu, X. F. Zhao, Y. Cao. Adversarial Learning for Constrained Image Splicing Detection and Localization Based on Atrous Convolution, IEEE Transactions on Information Forensics and Security, 14(10): 2551-2566, 2019
  3. X. W. Yi, K. Yang, X. F. Zhao, Y. T. Wang, H. B. Yu. AHCM: Adaptive Huffman Code Mapping for Audio Steganography Based on Psychoacoustic Model,IEEE Transactions on Information Forensics and Security, 14(8): 2217-2231, 2019
  4. Z. Z. Zhao, Q. X. Guan, H. Zhang,X. F. Zhao. Improving the robustness of adaptive steganographic algorithms based on transport channel matching,IEEE Transactions on Information Forensics and Security, 14(7): 1843-1856, 2019
  5. H. Zhang,Y. Cao,X. F. Zhao. A steganalytic approach to detect motion vector modification using near-perfect estimation for local optimality, IEEE Transactions on Information Forensics and Security, 12(2): 465-478, 2017
  6. K. Ma, W. M. Zhang, X. F. Zhao, N. H. Yu, F. H. Li. Reversible data hiding in encrypted images by reserving room before encryption, IEEE Transaction on Information Forensics and Security, 8(3): 553-562, March, 2013
  7. Weike You , Hong Zhang , and Xianfeng Zhao. A Siamese CNN for Image Steganalysis. IEEE Transactions on Information Forensics and Security, vol. 16, pp. 291-306, 2021
  8. Yu Wang , Yun Cao , and Xianfeng Zhao.Minimizing Embedding Impact for H.264 Steganography by Progressive Trellis Coding. IEEE Transactions on Information Forensics and Security, vol. 16, pp. 333-345, 2021
  9. Y. T. Wang, X.W. Yi, X. F. Zhao. MP3 steganalysis based on joint point-wise and block-wise correlations. Information Science, 512 (2020): 1118–1133, Elsevier
  10. A. T. Su, S. Ma, X. F. Zhao. Fast and secure steganography based on J-UNIWARD. IEEE Signal Processing Letters, Vol. 27: 221-225, 2020
  11. A. T. Su, X. F. Zhao. Boosting Image Steganalysis under Universal Deep Learning Architecture Incorporating Ensemble Classification Strategy. IEEE Signal Processing Letters, 26(12): 1852-1856, 2019
  12. Yu Wang , Yun Cao , and Xianfeng Zhao. CEC: Cluster Embedding Coding for H.264 Steganography. IEEE Signal Processing Letters, vol. 27, pp. 955-959, 2020
  13. Y. Cao, X. F. Zhao, D. G. Feng. Video steganalysis exploiting motion vector reversion-based features, IEEE Signal Processing Letters, 19(1): 35-38, 2012
  14. Y. Q. Liu, X. F. Zhao. Constrained Image Splicing Detection and Localization with Attention-Aware Encoder-Decoder and Atrous Convolution, IEEE Access, Vol.8, pp.6729-6741, 2020
  15. X. S. Zhu, Y. J. Qian, X. F. Zhao, B. Sun, Y. Sun. A deep learning approach to patch-based image inpainting forensics. Signal Processing: Image Communication, 67(2018): 90-99, 2018, Elsevier
  16. Y. Cao, H. Zhang, X. F. Zhao, H. B. Yu, Covert communication by compressed videos exploiting the uncertainty of motion estimation, IEEE Communication Letters, 19(2): 203-206, 2015
  17. X. F. Zhao, D. G Feng. Bypassing the decomposition attacks on two-round multivariate schemes by a practical cubic round, IET Information Security, 4(3): 167-184, 2010
  18. P. P. Wang, Y. Cao, X. F. Zhao. Segmentation based video steganalysis to detect motion vector modification, Security and Communication Networks, Vol. 2017, Article ID 8051389, pp.1-12
  19. S. Ma, X. F. Zhao, Q. X. Guan, Z. J. Xu, Y. Ma. A priori knowledge based secure payload estimation. Multimedia Tools and Applications, 77(14): 17889–17911, July 2018
  20. S. Ma, X. F. Zhao, Y. Q. Liu. Adaptive spatial steganography based on adversarial examples. Multimedia Tools and Applications, 78(22): 32503-32522, 2019, Springer
  21. W. K. You, X. F. Zhao, S. Ma, Y. Q. Liu. RestegNet: a residual steganalytic network. Multimedia Tools and Applications, 78(16): 22711–22725, 2019, Springer
  22. Y. Q. Liu, Q. X. Guan, X. F. Zhao. Copy-move forgery detection via convolutional kernel network. Multimedia Tools and Applications, 77(14): 18269–18293 , July 2018, Springer
  23. Z. Z. Zhao, Q. X. Guan, X. F. Zhao, H. B. Yu, C. J. Liu. Universal embedding strategy for batch adaptive steganography in both spatial and JPEG domain. Multimedia Tools and Applications, 77(11): 14093–14113, June 2018
  24. X. F. Zhao, J. Zhu, H. B. Yu. On more paradigms of steganalysis, International Journal on Digital Crime and Forensics, 8(2):1-15, Apr. 2016
  25. Y. T. Wang, X. W. Yi, X. F. Zhao, A. T. Su. RHFCN: Fully CNN-based Steganalysis of MP3 with Rich High-pass Filtering. In Proc. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2627-2631, 2019
  26. P. P. Wang, Y. Cao, X. F. Zhao. An adaptive detecting strategy against motion vector-based steganography. In Proc. 2015 IEEE International Conference on Multimedia and Expo (ICME), pp. 1-6, 2015
  27. P. A. Fan, H. Zhang, Y. F. Cai, P. Xie, X. F. Zhao. A robust video steganographic method against social networking transcoding based on steganographic side channel,  8th ACM Workshop on Information Hiding and Multimedia Security (IH & MMSec' 20)
  28. Y. Z. Yang, Y. T. Wang, X. W. Yi, X. F. Zhao, Y. Ma. Defining Joint Embedding Distortion for Adaptive MP3 Steganography, 7th ACM Workshop on Information Hiding and Multimedia Security (IH & MMSec' 19), pp. 14-24
  29. C. Gong, X. W. Yi, X. F. Zhao, Y. Ma. Recurrent Convolutional Neural Networks for AMR Steganalysis Based on Pulse Position, 7th ACM Workshop on Information Hiding and Multimedia Security (IH & MMSec' 19), pp. 2-13
  30. P. Xie, H. Zhang, W. K. You, X. F. Zhao. Adaptive VP8 Steganography Based on Deblocking Filtering, 7th ACM Workshop on Information Hiding and Multimedia Security (IH & MMSec' 19), pp. 25-30
  31. Y. Q. Liu, Q. X. Guan, X. F. Zhao, Y. Cao. Image forgery localization based on multi-scale convolutional neural networks. In Proc. 6th ACM Workshop on Information Hiding and Multimedia Security (IH & MMSec’18), Innsbruck, Austria, June 20-22, 2018, pp. 85-90
  32. Y. T. Wang, K. Yang, X. W. Yi, X. F. Zhao, Z. J. Xu. CNN-based steganalysis of MP3 steganography in the entropy code domain. In Proc. 6th ACM Workshop on Information Hiding and Multimedia Security (IH & MMSec’18), Innsbruck, Austria, June 20-22, 2018, pp. 55-65
  33. Y. Wang, Y. Cao, X. F. Zhao, Z. J. Xu, M. N. Zhu. Maintaining rate-distortion optimization for IPM-based video steganography by constructing isolated channels in HEVC. In Proc. 6th ACM Workshop on Information Hiding and Multimedia Security (IH & MMSec’18), Innsbruck, Austria, June 20-22, 2018, pp. 97-107
  34. Y. Cao, Y. Wang, X. F. Zhao, M. N. Zhu, Z. J. Xu. Cover block decoupling for content-adaptive H.264 Steganography. InProc. 6th ACM Workshop on Information Hiding and Multimedia Security (IH & MMSec' 18), pp. 23-30, 2018
  35. P. P. Wang, Y. Cao, X. F. Zhao, M. N. Zhu. A steganalytic algorithm to detect DCT-based data hiding methods for H.264/AVC videos. In Proc. 5th ACM Workshop on Information Hiding and Multimedia Security (IH & MMSec' 17), Philadelphia, PA, USA, June 20-22, 2017, pp. 123-133
  36. C. Xia, Q. X. Guan, X. F. Zhao, Z. Xu, Y. Ma. Improving GFR steganalysis features by using Gabor symmetry and weighted histograms. In Proc. 5th ACM Workshop on Information Hiding and Multimedia Security (IH & MMSec' 17), Philadelphia, PA, USA, June 20-22, 2017, pp. 55-66
  37. Z. Z. Zhao, Q. X. Guan, X. F. Zhao. Constructing near-optimal double-layered syndrome-trellis codes for spatial steganography, In Proc. 4th ACM Workshop on Information Hiding and Multimedia Security (IH & MMSec' 16), Vigo, Spain, Aug.20-22, 2016, pp.139-148
  38. P. P. Wang, H. Zhang, Y. Cao, X. F. Zhao. A novel embedding distortion for motion vector-based steganography considering motion characteristic, local optimality and statistical distribution, In Proc. 4th ACM Workshop on Information Hiding and Multimedia Security (IH & MMSec' 16), Vigo, Spain, Aug.20-22, 2016, pp.127-137
  39. Y. Cao, H. Zhang, X. F. Zhao, H. B. Yu. Video steganography based on optimized motion estimation perturbation, In Proc. 3rd ACM Workshop on Information Hiding and Multimedia Security (IH & MMSec' 15), June 17-19, 2015, Portland, Oregon, USA, pp. 25 – 31
  40. H. Zhang, Y. Cao, X. F. Zhao. Video steganography with perturbed macroblock partition. In Proc. 2nd ACM Workshop on Information Hiding and Multimedia Security (IH & MMSec' 14), June 11 - 13, 2014, Salzburg, Austria, pp. 115-122
  41. X. F. Zhao, N. Li. Reversible watermarking with subliminal channel. In Revised Selected Paper of 10th International Workshop on Information Hiding (IH 2008), Santa Barbara, CA, USA, May 19-21, 2008, LNCS 5284: 118-131, Springer, 2008
  42. X. F. Zhao, B. B Xia, Y. Deng. Strengthening QIM-based watermarking by non-uniform discrete cosine transform. In Revised Selected Paper of 10th International Workshop on Information Hiding (IH 2008), Santa Barbara, CA, USA, May 19-21, 2008, LNCS 5284: 309-324, Springer, 2008
  43. X. F. Zhao, Y. X. Dai, D. G. Feng. Towards the Public but Noninvertible Watermarking. In Revised Selected Papers of 3rd International Workshop on Watermarking (IWDW' 04), Seoul, Korea, Oct. 30 - Nov. 1, 2004, LNCS 3304: 218-231, Springer, 2005
  44. X. F. Zhao, Y. X. Dai, D. G. Feng. A Generalized Method for Constructing and Proving Zero-Knowledge Watermark Proof Systems. In Revised Selected Papers of 3rd International Workshop on Watermarking (IWDW' 04), Seoul, Korea, Oct. 30 - Nov. 1, 2004, LNCS 3304: 204-217, Springer, 2005
  • 部分专著与教材:
    1. 冯登国, 赵险峰. 信息安全技术概论(普通高等教育十一五国家级规划教材),北京: 电子工业出版社,2009年3月(第二版,2014年2月)
    2. 赵险峰,张弘. 隐写学原理与技术(信息安全国家重点实验室信息隐藏领域丛书),北京: 科学出版社,2018年10月

教授课程

信息隐藏、 网络与信息安全系列讲座
目前开设课程

信息隐藏(秋季)

多媒体编码及其信息安全应用(春季)

专利与奖励

部分专利情况

1. 赵险峰, 黄炜. 一种扩展防伪数字水印和电子印章信息量的方法. 专利号: ZL 200810056193.7,已授权
2. 李宁, 赵险峰, 黄炜. 一种数字视频内容的快速保护及解保护方法,专利号:ZL 200810056192.2,已授权
3. 曹纭, 赵险峰, 冯登国. 一种加密的Huffman编码方法及其解码方法. 专利号: ZL 200910076038.6,已授权
4. 黄炜, 赵险峰, 冯登国. 一种基于图像和音频再编码处理的隐写防范方法. 专利号: ZL 201010230477.6,已授权
5. 赵险峰, 夏冰冰, 黄炜. 一种基于隐写测评的隐写分析方法. 专利号:ZL 201210394104.6,已授权

部分获奖信息

1. 中国科学院“朱李月华”优秀教师奖

2. 部级科学技术奖一等奖

3. IGI Global's Ninth Annual Excellence in Research Journal Awards, 2017

4. 2018 ACM Workshop on Information Hiding and Multimedia Security,Best Paper Award

科研活动


部分科研项目
1. 提高多媒体安全分析准确性的关键技术,信息安全国家重点实验室重点部署项目,主持,2014.6-2015.5

2. 非马尔可夫模型下基于数据关联的隐写分析研究,国家自然科学基金面上项目,主持, 2012.1- 2015.12
3. 数字权力管理(DRM)独特安全模型的研究,国家自然科学基金面上项目,主持,2006.1-2008.12
4. 基于关联运算的隐写分析研究,北京市自然科学基金面上项目,主持,2011.1–2013.12
5. 数字媒体安全防护关键技术,中国科学院战略性先导科技专项课题,主持,2012.1- 2016.12
6. 数字媒体内容安全关键技术及测评方法的研究,国家自然科学基金重点项目,主持子课题,2007.1- 2010.12

承担其他任务:国家重点研发计划、信息安全专项、部委项目多项