General

Xianfeng Zhao, Professor, Ph.D. Student Advisor

Institute of Information Engineering, Chinese Academy of Sciences
Email: zhaoxianfeng(at)iie.ac.cn
Telephone: 010-82546585
Address: Building 3, 89A, Minzhuang Road, Haidian District, Beijing, China
Postcode: 100093

Research Areas

Multimedia security, including multimedia processing, watermarking, steganograpgy and steganalysis, multimedia forensics, related machine learning and artificial intelligence

Education

He received the B.E. degree from Dalian University of Technology, Dalian, China, in 1991, and the M.S. degree from Nanchang University, Nanchang, China, in 1999. In 2003, he received his Ph.D. degree in computer science from Shanghai Jiao Tong University (SJTU), Shanghai.

Experience

   
Work Experience

(1) From Oct. 2003 to Dec. 2005, he was a postdoctoral fellow with the Graduate School of Chinese Academy of Sciences, Beijing, China. He continued his research on watermarking there.

(2) From Mar. 2006 to Dec. 2011, he was an associate research professor and a master student advisor with the Institute of Software, Chinese Academy of Sciences, Beijing, China. He worked in the State Key Laboratory of Information Security (SKLOIS), which is the largest research group specializing in information security in China. He began studying more aspects of multimedia security, including steganography, steganalysis, watermarking, digital rights management, and content forensics.

(3) From Jan. 2012 to Aug. 2012, he was an associate research professor with the Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China because SKLOIS had been moved there.

(4) From Sept. 2012 to the present, he has been a research professor and a Ph.D. student advisor with the Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China. His research field is still multimedia security.

(5) From Oct. 2015 to the present, he has also been a professor with the University of Chinese Academy of Sciences (UCAS). He has taught the class of Information Hiding in each fall semester since 2015.

Teaching Experience

 Prof. Zhao has taught the class of Information Hiding in each fall semester at UCAS since 2015.

Publications

   
Selected Papers

  1. X. W. Yi, K. Yang, X. F. Zhao, Y. T. Wang, H. B. Yu. AHCM: Adaptive Huffman Code Mapping for Audio Steganography Based on Psychoacoustic Model, IEEE Transactions on Information Forensics and Security, DOI 10.1109/TIFS.2019.2895200, Jan. 2019

  2. Y. Q. Liu, X. B. Zhu, X. F. Zhao. Adversarial learning for image forensics deep matching with atrous convolution, IEEE Transactions on Information Forensics and Security, DOI 10.1109/TIFS.2019.2902826, March 2019

  3. Z. Z. Zhao, Q. X. Guan, H. Zhang, X. F. Zhao. Improving the robustness of adaptive steganographic algorithms based on transport channel matching, IEEE Transactions on Information Forensics and Security, DOI 10.1109/TIFS.2018.2885438, Dec. 2018

  4. H. ZhangY. Cao,X. F. Zhao. A steganalytic approach to detect motion vector modification using near-perfect estimation for local optimality,IEEE Transactions on Information Forensics and Security, 12(2): 465-478, 2017

  5. K. D. Ma, W. M. Zhang,X. F. Zhao, N. H. Yu, F. H. Li. Reversible data hiding in encrypted images by reserving room before encryption,IEEE Transaction on Information Forensics and Security, 8(3): 553-562, 2013

  6. X. C. Hu, W. M. Zhang, X. X. Hu, N. H. Yu,X. F. Zhao, F. H. Li. Fast Estimation of Optimal Marked-Signal Distribution for Reversible Data Hiding,IEEE Transaction on Information Forensics and Security, 8(5): 779 –788, 2013

  7. Y. Cao, H. Zhang,X. F. Zhao, H. B. Yu, Covert communication by compressed videos exploiting the uncertainty of motion estimation,IEEE Communication Letters, 19(2): 203-206, 2015

  8. Y. Cao,X. F. Zhao, D. G. Feng. Video steganalysis exploiting motion vector reversion-based features,IEEE Signal Processing Letters, 19(1): 35-38, 2012

  9. X. F. Zhao, J. Zhu, H. B. Yu. On more paradigms of steganalysis,International Journal on Digital Crime and Forensics, 8(2):1-15, Apr. 2016, IGI Global

  10. X. F. Zhao, D. G. Feng. Bypassing the decomposition attacks on two-round multivariate schemes by a practical cubic round,IET Information Security, 4(3): 167-184, 2010

  11. P. P. Wang, Y. Cao,X. F. Zhao. Segmentation based video steganalysis to detect motion vector modification,Security and Communication Networks, Vol. 2017, Article ID 8051389, pp.1-12, Hindawi

  12. C. Xia, Q. X. Guan,X. F. Zhao, C. D. Zhao. Highly accurate real-time image steganalysis based on GPU,Journal of Real-Time Image Processing, 14(1): 223-236, 2018, Springer

  13. H. Zhang, Y. Cao,X. F. Zhao. Motion vector-based video steganography with preserved local optimality,Multimedia Tools and Applications, 75(21): 13503–13519, 2016, Springer

  14. S. Ma,X. F. Zhao, Q. X. Guan, Z. J. Xu, Y. Ma. A priori knowledge based secure payload estimation,Multimedia Tools and Applications, 77(14): 17889-17911, 2018, Springer

  15. Y. Q. Liu, Q. X. Guan,X. F. Zhao. Copy-move forgery detection via convolutional kernel network,Multimedia Tools and Applications, 77(14): 18269-18293, 2018, Springer

  16. Z. Z. Zhao, Q. X. Guan,X. F. Zhao, H. B. Yu, C. J. Liu. Universal embedding strategy for batch adaptive steganography in both spatial and JPEG domain,Multimedia Tools and Applications, 77(11): 14093-14113, 2018, Springer

  17. W. Q. Cao, Q. X. Guan,X. F. Zhao, K. R. Wang, J. S. Han. Constructing local information feature for spatial image steganalysis,Multimedia Tools and Applications, 76(11): 13221-13237, 2017, Springer

  18. X. S. Zhu, Y. J. Qian,X. F. Zhao, B. Sun, Y. Sun. A deep learning approach to patch-based image inpainting forensics,Signal Processing: Image Communication, 67(2018): 90-99, Elsevier

  19. J. Y. Chen, J. F. Liu, W. M. Zhang, H. S. Liu,X. F. Zhao. Cryptographic secrecy analysis of matrix embedding,International J. of Computational Intelligence Systems, 6(4): 639-647, 2013, Taylor & Francis

  20. X. F. Zhao,N. Li. Reversible watermarking with subliminal channel. InProc. 10th International Workshop on Information Hiding (IH’08), Santa Barbara, CA, USA, May 19-21, 2008, LNCS 5284: 118-131, Springer

  21. X. F. Zhao, B. B. Xia, Y. Deng. Strengthening QIM-based watermarking by non-uniform discrete cosine transform. InProc. 10th International Workshop on Information Hiding (IH’08), Santa Barbara, CA, USA, May 19-21, 2008, LNCS 5284: 309-324, Springer

  22. Y. Cao,X. F. Zhao, D. G. Feng, R. N. Sheng. Video steganography with perturbed motion estimation, InProc. 13th International Workshop on Information Hiding (IH’11), Prague, Czech, May 18-20, 2011, LNCS 6958: 193-207, Springer

  23. H. Zhang, Y. Cao,X. F. Zhao. Video steganography with perturbed macroblock partition. InProc. 2ndACM Workshop on Information Hiding and Multimedia Security (IH & MMSec’14), June 11 - 13, 2014, Salzburg, Austria, pp. 115-122

  24. Y. Cao, H. Zhang,X. F. Zhao, H. B. Yu. Video steganography based on optimized motion estimation perturbation. InProc. 3rdACM Workshop on Information Hiding and Multimedia Security (IH & MMSec’15), June 17-19, 2015, Portland, Oregon, USA, pp. 25 – 31

  25. P. P. Wang, H. Zhang, Y. Cao,X. F. Zhao. A Novel embedding distortion for motion vector-based steganography considering motion characteristic, local optimality and statistical distribution. InProc. 4thACM Workshop on Information Hiding and Multimedia Security (IH & MMSec’16), Vigo, Spain, Aug.20-22, 2016, pp. 127-137

  26. Z. Z. Zhao, Q. X. Guan,X. F. Zhao. Constructing near-optimal double-layered syndrome-trellis codes for spatial steganography. InProc. 4thACM Workshop on Information Hiding and Multimedia Security (IH & MMSec’16), Vigo, Spain, Aug.20-22, 2016, pp.139-148

  27. C. Xia, Q. X. Guan,X. F. Zhao, Z. J. Xu, Y. Ma. Improving GFR steganalysis features by using Gabor symmetry and weighted histograms. In Proc.5th ACM Workshop on Information Hiding and Multimedia Security (IH & MMSec’17), Philadelphia, PA, USA, June 20-22, 2017, pp. 55-66

  28. P. P. Wang, Y. Cao,X. F. Zhao, M. N. Zhu. A Steganalytic Algorithm to Detect DCT-based Data Hiding Methods for H.264/AVC Videos. InProc. 5th ACM Workshop on Information Hiding and Multimedia Security (IH & MMSec’17), Philadelphia, PA, USA, June 20-22, 2017, pp. 123-133

  29. Y. Wang, Y. Cao,X. F. Zhao, Z. J. Xu, M. N. Zhu. Maintaining rate-distortion optimization for IPM-based video steganography by constructing isolated channels in HEVC. InProc. 6th ACM Workshop on Information Hiding and Multimedia Security (IH & MMSec’18), Innsbruck, Austria, June 20-22, 2018, pp. 97-107

  30. Y. Cao, Y. Wang,X. F. Zhao, M. N. Zhu, Z. J. Xu. Cover block decoupling for content-adaptive H.264 Steganography. InProc. 6thACM Workshop on Information Hiding and Multimedia Security (IH & MMSec’18), Innsbruck, Austria, June 20-22, 2018, pp. 23-30

  31. Y. T. Wang, K. Yang, X. W. Yi,X. F. Zhao, Z. J. Xu. CNN-based steganalysis of MP3 steganography in the entropy code domain. InProc. 6thACM Workshop on Information Hiding and Multimedia Security (IH & MMSec’18), Innsbruck, Austria, June 20-22, 2018, pp. 55-65

  32. Y. Q. Liu, Q. X. Guan,X. F. Zhao, Y. Cao. Image forgery localization based on multi-scale convolutional neural networks. InProc. 6thACM Workshop on Information Hiding and Multimedia Security (IH & MMSec’18), Innsbruck, Austria, June 20-22, 2018, pp. 85-90

  33. P. P. Wang, Y. Cao,X. F. Zhao. An adaptive detecting strategy against motion vector-based steganography. InProc. 2015 IEEE International Conference on Multimedia and Expo (ICME), Torino, Italy, June 29 - July 3, 2015, pp. 1-6

  34. X. F. Zhao, Y. X. Dai, D. G. Feng. Towards the public but noninvertible watermarking schemes. InProc. 3rdInternational Workshop on Digital Watermarking (IWDW’04), Oct. 30 – Nov. 01, 2014, Seoul, South Korea, LNCS 3304: 218-231, Springer

  35. X. F. Zhao, Y. X. Dai, D. G. Feng. A generalized method for constructing and proving zero-knowledge watermark proof systems. InProc. 3rdInternational Workshop on Digital Watermarking (IWDW’04), LNCS 3304: 204-217, Springer


Granted Patents

  1. X. F. Zhao, W. Huang. A method for enlarging the information capacity of anti-tampering watermarking and digital stamp. Certificate No. 200810056193.7, Issued in June 2011

  2. X. F. Zhao, B. B. Xia, W. Huang. A steganalytic method based on the evaluation of steganography. Certificate No. 201210394104.6, Issued in Jan. 2015

  3. X. F. Zhao, J. Y. Zhang, N. Y. An, B. B. Xia, N. Zhou. A steganalytic method based on parameter recognition and estimation. Certificate No. 201310214534.X, Issued in April 2016

  4. N. Li, X. F. Zhao, W. Huang. A method for fast encrypting and decrypting digital video content. Certificate No. 200810056192.2, Issued in July 2010

  5. Y. Cao, X. F. Zhao, D. G. Feng. A Huffman coding method for encryption and its decoding method. Certificate No. 200910076038.6, Issued in Jan. 2011

  6. W. Huang, X. F. Zhao, D. G. Feng. An anti-steganography method based on recoding the images and audios. Certificate No. 201010230477.6, Issued in Mar. 2012

  7. K. Chen, Y. J. Zhang, X. F. Zhao. A method for automatically locating the vulnerabilities in binary software. Certificate No. 201310104953.8, Issued in June 2016

  8. K. Chen, Y. J. Zhang, X. F. Zhao. A method and system for the mobile apps to automatically generate watermarks. Certificate No. 201410089718.2, Issued in Jan. 2017

  9. H. Zhang, Y. Cao, X. F. Zhao, H. B. Yu. A video steganographic method based on perturbing the division of macro-blocks. Certificate No. 201410233838.5, Issued in Feb. 2017

  10. P. P. Wang, Y. Cao, X. F. Zhao. An improved video steganalytic method based on revision of moving vectors. Certificate No. 201510309316.3, Issued in Jan. 2017

  11. P. P. Wang, Y. Cao, X. F. Zhao, H. B. Yu. A video steganalytic method based on content adaptation. Certificate No. 201510222280.5, Issued in May 2017

Selected Awards

  1. Provincial Excellent Master Thesis Award, granted by Jiangxi Provincial Government in 2001

  2. Zhuliyuehua Excellent Lecturer Award of Chinese Academy of Sciences, granted by Chinese Academy of Sciences in 2016

  3. IGI Global ’s Ninth Annual Excellence in Research Journal Awards, granted by IGI Global Publisher in 2017

  4. Best Paper Award of the 6th ACM Workshop on Information Hiding and Multimedia Security (IH & MMSec’18), granted by the co-chairs of the workshop in 2018

  5. Best Paper Award of the 7th IEEE Symposium on Cyberspace Safety and Security (CSS’15), granted by the co-chairs of the workshop in 2015

  6. National Science and Technology Award for Information Protection (First Level), granted by the Chinese governmental agency in 2017

  7. Annual Excellent Engineering Awards (First Level), granted by the State Key Laboratory of Information Security (SKLOIS), the largest Chinese laboratory specialized in research on information security, in 2012