What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Xianfeng Zhao
Google Scholar
ORCID:
0000-0002-5617-8399
30
publications in security and cryptology related venues
Year
Venue
Title
2023
journals/tifs
Forensic Symmetry for DeepFakes.
Gen Li
Xianfeng Zhao
Yun Cao
2022
journals/tifs
Adaptive QIM With Minimum Embedding Cost for Robust Video Steganography on Social Networks.
Pingan Fan
Hong Zhang
Xianfeng Zhao
2022
conf/ih
FMFCC-V: An Asian Large-Scale Challenging Dataset for DeepFake Detection.
Gen Li
Xianfeng Zhao
Yun Cao
Pengfei Pei
Jinchuan Li
Zeyu Zhang
2021
journals/tifs
Steganalysis of H.264/AVC Videos Exploiting Subtractive Prediction Error Blocks.
Yun Cao
Hong Zhang
Xianfeng Zhao
Xiaolei He
2021
journals/tifs
A Siamese CNN for Image Steganalysis.
Weike You
Hong Zhang
Xianfeng Zhao
2021
journals/tifs
Minimizing Embedding Impact for H.264 Steganography by Progressive Trellis Coding.
Yu Wang
Yun Cao
Xianfeng Zhao
2021
conf/ih
Fake Speech Detection Using Residual Network with Transformer Encoder.
Zhenyu Zhang
Xiaowei Yi
Xianfeng Zhao
2020
conf/ih
A Robust Video Steganographic Method against Social Networking Transcoding Based on Steganographic Side Channel.
Pingan Fan
Hong Zhang
Yifan Cai
Pei Xie
Xianfeng Zhao
2019
journals/tifs
Adversarial Learning for Constrained Image Splicing Detection and Localization Based on Atrous Convolution.
Yaqi Liu
Xiaobin Zhu
Xianfeng Zhao
Yun Cao
2019
journals/tifs
Improving the Robustness of Adaptive Steganographic Algorithms Based on Transport Channel Matching.
Zengzhen Zhao
Qingxiao Guan
Hong Zhang
Xianfeng Zhao
2019
journals/tifs
AHCM: Adaptive Huffman Code Mapping for Audio Steganography Based on Psychoacoustic Model.
Xiaowei Yi
Kun Yang
Xianfeng Zhao
Yuntao Wang
Haibo Yu
2019
conf/ih
Adaptive VP8 Steganography Based on Deblocking Filtering.
Pei Xie
Hong Zhang
Weike You
Xianfeng Zhao
Jianchang Yu
Yi Ma
2019
conf/ih
Recurrent Convolutional Neural Networks for AMR Steganalysis Based on Pulse Position.
Chen Gong
Xiaowei Yi
Xianfeng Zhao
Yi Ma
2019
conf/ih
Defining Joint Embedding Distortion for Adaptive MP3 Steganography.
Yunzhao Yang
Yuntao Wang
Xiaowei Yi
Xianfeng Zhao
Yi Ma
2018
conf/ih
CNN-based Steganalysis of MP3 Steganography in the Entropy Code Domain.
Yuntao Wang
Kun Yang
Xiaowei Yi
Xianfeng Zhao
Zhoujun Xu
2018
conf/ih
Image Forgery Localization based on Multi-Scale Convolutional Neural Networks.
Yaqi Liu
Qingxiao Guan
Xianfeng Zhao
Yun Cao
2018
conf/ih
Cover Block Decoupling for Content-Adaptive H.264 Steganography.
Yun Cao
Yu Wang
Xianfeng Zhao
Meineng Zhu
Zhoujun Xu
2018
conf/ih
Maintaining Rate-Distortion Optimization for IPM-Based Video Steganography by Constructing Isolated Channels in HEVC.
Yu Wang
Yun Cao
Xianfeng Zhao
Zhoujun Xu
Meineng Zhu
2017
journals/tifs
A Steganalytic Approach to Detect Motion Vector Modification Using Near-Perfect Estimation for Local Optimality.
Hong Zhang
Yun Cao
Xianfeng Zhao
2017
conf/ih
Improving GFR Steganalysis Features by Using Gabor Symmetry and Weighted Histograms.
Chao Xia
Qingxiao Guan
Xianfeng Zhao
Zhoujun Xu
Yi Ma
2017
conf/ih
A Steganalytic Algorithm to Detect DCT-based Data Hiding Methods for H.264/AVC Videos.
Peipei Wang
Yun Cao
Xianfeng Zhao
Meineng Zhu
2016
conf/ih
A Novel Embedding Distortion for Motion Vector-Based Steganography Considering Motion Characteristic, Local Optimality and Statistical Distribution.
Peipei Wang
Hong Zhang
Yun Cao
Xianfeng Zhao
2016
conf/ih
Constructing Near-optimal Double-layered Syndrome-Trellis Codes for Spatial Steganography.
Zengzhen Zhao
Qingxiao Guan
Xianfeng Zhao
2015
conf/ih
Video Steganography Based on Optimized Motion Estimation Perturbation.
Yun Cao
Hong Zhang
Xianfeng Zhao
Haibo Yu
2014
conf/ih
Video steganography with perturbed macroblock partition.
Hong Zhang
Yun Cao
Xianfeng Zhao
Weiming Zhang
Nenghai Yu
2013
journals/tifs
Fast Estimation of Optimal Marked-Signal Distribution for Reversible Data Hiding.
Xiaocheng Hu
Weiming Zhang
Xuexian Hu
Nenghai Yu
Xianfeng Zhao
Fenghua Li
2013
journals/tifs
Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption.
Kede Ma
Weiming Zhang
Xianfeng Zhao
Nenghai Yu
Fenghua Li
2011
conf/ih
Video Steganography with Perturbed Motion Estimation.
Yun Cao
Xianfeng Zhao
Dengguo Feng
Rennong Sheng
2008
conf/ih
Strengthening QIM-Based Watermarking by Non-uniform Discrete Cosine Transform.
Xianfeng Zhao
Bingbing Xia
Yi Deng
2008
conf/ih
Reversible Watermarking with Subliminal Channel.
Xianfeng Zhao
Ning Li
Coauthors
Bingbing Xia
(1)
Chao Xia
(1)
Chen Gong
(1)
Dengguo Feng
(1)
Fenghua Li
(2)
Gen Li
(2)
Haibo Yu
(2)
Hong Zhang
(10)
Jianchang Yu
(1)
Jinchuan Li
(1)
Kede Ma
(1)
Kun Yang
(2)
Meineng Zhu
(3)
Nenghai Yu
(3)
Ning Li
(1)
Pei Xie
(2)
Peipei Wang
(2)
Pengfei Pei
(1)
Pingan Fan
(2)
Qingxiao Guan
(4)
Rennong Sheng
(1)
Weike You
(2)
Weiming Zhang
(3)
Xianfeng Zhao
(30)
Xiaobin Zhu
(1)
Xiaocheng Hu
(1)
Xiaolei He
(1)
Xiaowei Yi
(5)
Xuexian Hu
(1)
Yaqi Liu
(2)
Yi Deng
(1)
Yi Ma
(4)
Yifan Cai
(1)
Yu Wang
(3)
Yun Cao
(14)
Yuntao Wang
(3)
Yunzhao Yang
(1)
Zengzhen Zhao
(2)
Zeyu Zhang
(1)
Zhenyu Zhang
(1)
Zhoujun Xu
(4)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to