|
张新鹏 博士、教授、博导、国家杰出青年科学基金获得者 |
|
办公室: |
上海大学宝山校区东区通信楼(翔英楼)815室 |
|
通信地址: |
上大路99号上海大学83号信箱十大网赌博正规信誉网址 |
|
邮政编码: |
200444 |
|
电话: |
021-66137263 |
|
电子邮件: |
||
English Version |
个人主页: |
|
【教育经历】 2004年毕业于十大网赌博正规信誉网址,获工学博士学位 2001年于十大网赌博正规信誉网址获工学硕士学位 1995年毕业于吉林大学数学系,获理学学士学位 【工作经历】 2011~2012,德国Konstanz大学,Humboldt学者资深研究员 2010~2011,美国纽约州立大学Binghamton分校,访问学者 2008~ ,十大网赌博正规信誉网址,教授 2006~2008,十大网赌博正规信誉网址,副教授 2004~2006,十大网赌博正规信誉网址,讲师 【研究领域】 多媒体信息安全、信息隐藏、数字取证、加密域信号处理、图像处理 【科研项目】 2017~2020,新型信息隐藏的基础理论与关键技术研究,国家自然科学基金通用技术基础研究联合基金重点项目,主持 2016~2020,多媒体信息隐藏,国家杰出青年科学基金,主持 2016~2019,云数据安全处理,上海市优秀学术带头人计划,主持 2016~2018,上海高校特聘教授跟踪计划专项资助,主持 2015~2017,加密图像压缩研究,上海市曙光学者计划,主持 2015~2018,密文图像中的可逆信息隐藏,国家自然科学基金,主持 2013~2015,广义率失真优化的信息隐藏,上海市浦江人才计划,主持 2012~2015,上海高校特聘教授专项资助,主持 2012~2014,高度安全的数字隐写研究,教育部博士点基金(博导类),主持 2011~2013,广义隐写编码与多载体安全隐写研究,国家自然科学基金,主持 2010~2012,数字图像内容的真伪鉴定研究,上海市科委国际合作项目,主持 2010~2012,数字图像中的新型安全隐写,上海市科技启明星跟踪计划,主持 2010~2011,新型数字隐写编码研究,教育部科研重点项目,主持 2009~2011,数字图像真实性的被动取证研究,国家自然科学基金,主持 2009~2011,数字隐写中的新型编码研究,上海市教委科研创新重点项目,主持 2007~2009,数字图像反隐写关键技术,国家高技术研究发展计划(863计划),主持 2006~2008,数字图像中的隐写分析与反隐写综合措施研究,上海市青年科技启明星计划,主持 2006~2008,具有统计隐蔽性和抗干扰性的安全密写研究,国家自然科学基金,主持 2004~2007,抗统计分析的数字图像密写研究,上海市科委基础研究重点项目,主持 2004~2006,具有多重免疫性的安全数字水印协议与算法研究,上海市教委青年基金,主持 【授课情况】 信息科技概览(本科生通识课) 信息时代的思维(本科生新生研讨课) 信息论与编码(本科生) 数字图像处理(本科生) 信息网络与安全(本科生) 多媒体信息安全(本科生高年级研讨课) 通信与信息新技术进展(研究生) 【近期论文】 International Journal Papers: 1.
Z.
Qian, H. Zhou, X. Zhang, and W. Zhang, Separable
Reversible Data Hiding in Encrypted JPEG Bitstreams,
IEEE Trans. on Dependable and Secure
Computing, (to appear) 2.
Z. Zeng, H.
Xiao, and X. Zhang, Self CNN-Based
Time Series Stream Forecasting, Electronics
Letters, (to appear) 3.
H. Yao, S. Wang, X. Zhang, C. Qin, and J. Wang, Detecting Image Splicing Based on
Noise Level Inconsistency, Multimedia Tools and
Applications,
(to appear) 4.
Z. Yin, A. Abel, J. Tang, X. Zhang, and B. Luo,
Reversible Data Hiding in Encrypted Images Based on Multi-Level Encryption
and Block Histogram Modification, Multimedia Tools and
Applications,
(to appear) 5.
Y. Ren, S.
Wang, and X. Zhang, Fully Secure
Expressive Ciphertext-Policy Attribute-Based
Encryption without Random Oracles, Information,
(to appear) 6.
X. Zhang, J.
Long, Z. Wang, and H. Cheng, Lossless and Reversible Data Hiding in Encrypted
Images with Public Key Cryptography, IEEE Trans. on Circuits and Systems for
Video Technology, 26(9), pp. 1622-1631, 2016. 7.
Z. Qian, and X.
Zhang, Reversible Data Hiding in Encrypted Image with Distributed Source
Encoding, IEEE Trans. on
Circuits and Systems for Video Technology, 26(4), pp. 636-646, 2016. 8.
Y.-Q. Shi, X.
Li, X. Zhang, H.-T. Wu, and B. Ma, Reversible Data Hiding: Advances in
the Past Two Decades, IEEE Access,
4, pp. 3210-3237, 2016. 9.
Z. Qian, X.
Zhang, and G. Feng, Reversible Data Hiding in Encrypted Images Based on
Progressive Recovery, IEEE
Signal Processing Letters, 23(11), pp. 1672-1676, 2016. 10. J.
Yu, F. Li, H. Cheng, and X. Zhang,
Spatial Steganalysis Using Contrast of
Residuals, IEEE Signal Processing
Letters, 23(7), pp. 989-992,
2016. 11. Z.
Wang, X. Zhang, and Z. Yin, Hybrid Distortion Function
for JPEG Steganography, Journal of Electronic Imaging, 25(5), 050501, 2016. 12. Z. Qian, X. Zhang, Y. Ren, and G. Feng, Block
Cipher Based Separable Reversible Data Hiding in Encrypted Images, Multimedia Tools and Applications, 75(21), pp.
13749-13763, 2016. 13. H.
Cheng, X. Zhang, and J. Yu,
AC-Coefficient Histogram-Based Retrieval for Encrypted JPEG Images, Multimedia Tools and Applications, 75(21), pp.
13791-13803, 2016. 14. J.
Yu, X. Zhang, and F. Li, Spatial Steganalysis Using Redistributed Residuals and Diverse
Ensemble Classifier, Multimedia Tools and
Applications,
75(21), pp. 13613-13625, 2016. 15. C. Qin, H. Wang, X. Zhang, and X. Sun,
Self-Embedding Fragile Watermarking Based on Reference-Data Interleaving and
Adaptive Selection of Embedding Mode, Information
Sciences, 373, pp. 233-250, 2016. 16.
C. Qin, X.
Chen, J. Dong, and X. Zhang, Perceptual Image Hashing with Selective
Sampling for Salient Structure Features, Displays,
45, pp. 26-37, 2016. 17. F.
Li, X. Zhang, J. Yu, and H. Cheng,
Digital Image Steganalysis Based on Local Textural
Features and Double Dimensionality Reduction, Security and
Communication Networks,
9(8), pp. 729-736, 2016. 18. H.
Cheng, X. Zhang, J. Yu, and Y.
Zhang, Encrypted JPEG Image Retrieval Using Block-wise Feature Comparison, Journal
of Visual Communication and Image Representation, 40, pp. 111-117, 2016. 19. Z. Qian, S. Dai, F. Jiang, and X. Zhang, Improved Joint Reversible Data Hiding in
Encrypted Images, Journal of Visual Communication and Image
Representation, 40, pp.
732-738, 2016. 20. J.
Long, Z. Yin, J. Lv and X. Zhang, Rotation Based Reversible Data Hiding for JPEG
Images, IETE Technical Review, 33(6), pp. 607-614, 2016. 21. Y. Ren, N. Ding, X.
Zhang, H. Lu, and D. Gu, Identity-Based
Encryption with Verifiable Outsourced Revocation, The Computer Journal, 59(11),
pp. 1659-1668, 2016. 22. L. Du, X. Cao, W. Zhang, X. Zhang, N. Liu,
and J. Wei, Semi-fragile Watermarking for Image
Authentication Based on Compressive Sensing, Science China: Information Sciences, 59(5), pp. 059104:1-3,
2016. 23. H. Cheng, X. Zhang, J. Yu, and F. Li,
Markov Process-Based Retrieval for Encrypted JPEG Images, EURASIP Journal on Information Security, pp. 1-9, 2016. 24.
A. Wu, G.
Feng, X. Zhang, and Y. Ren, Unbalanced JPEG Image Steganalysis via
Multiview Data Match, Journal of Visual
Communication and Image Representation, 32, pp. 103-107, 2016. 25. X. Zhang, and W.
Zhang, Semantic Image Compression Based on Data Hiding, IET Image Processing, 9(1), pp. 54-61,
2015. 26.
G. Feng, Y. Lan, X. Zhang,
and Z. Qian, Dynamic Adjustment of Hidden Node Parameters for Extreme Learning
Machine, IEEE Trans. on Cybernetics, 45(2), pp. 279-288, 2015. 27.
C. Qin, and X.
Zhang, Effective Reversible Data Hiding in Encrypted Image with Privacy
Protection for Image Content, Journal
of Visual Communication and Image Representation, 31, pp. 154-164, 2015. 28.
Z. Qian, X.
Zhang, and Y. Ren, JPEG Encryption for Image Rescaling in the Encrypted
Domain, Journal of Visual
Communication and Image Representation, 26(1), pp. 9-13, 2015. 29. L. Shen, Z. Zhang, X.
Zhang, P. An, and Z. Liu, Fast TU Size Decision Algorithm for HEVC
Encoders Using Bayesian Theorem Detection, Signal Processing: Image Communication, 32, pp. 121-128,
2015. 30. Y. Ren, S. Wang, X.
Zhang, and M.-S. Hwang, An Efficient Batch Verifying Scheme for Detecting
Illegal Signatures, International
Journal of Network Security, 17(4), pp. 463-470, 2015. 31. X. Zhang, Y. Ren, L. Shen, Z. Qian, and G. Feng, Compressing
Encrypted Images with Auxiliary Information, IEEE Trans. on
Multimedia,
16(5), pp. 1327-1336,
2014. 32. X. Zhang, Z. Qian, G. Feng, and Y. Ren, Efficient Reversible Data Hiding in Encrypted
Images, Journal of Visual Communication and Image
Representation,
25(2), pp. 322-328, 2014. 33. X. Zhang, C. Qin, and
L. Shen, Efficient Wet Paper Embedding for Steganography with Multi-layer Construction, Annals of Telecommunications, 69, pp.
441-447, 2014. 34. X. Zhang, G. Sun, L. Shen, and C. Qin, Compression of Encrypted Images with
Multi-layer Decomposition, Multimedia Tools and
Applications,
72, pp. 489-502,
2014. 35.
Z. Qian, X. Zhang, and S. Wang, Reversible Data Hiding in Encrypted JPEG
Bitstream, IEEE Trans. on Multimedia, 16(5), pp.
1486-1491,
2014. 36. F.
Li, X. Zhang, J. Yu, and W. Shen, Adaptive JPEG Steganography
with New Distortion Function, Annals of
Telecommunications, 69, pp. 431-440,
2014. 37. Z. Qian, and X. Zhang, Improved Anti-forensics of JPEG Compression, Journal of Systems and Software, 91,
pp. 100-108,
2014. 38. B. Chen, G. Feng, X. Zhang, and F. Li, Mixing
High-Dimensional Features for JPEG Steganalysis with Ensemble Classifier, Signal, Image and Video Processing, 8(8), pp. 1475-1482, 2014. 39. G. Feng, H. Zhang, and X. Zhang, Effective
Feature Selection for Image Steganalysis Using
Extreme Learning Machine, Journal
of Electronic Imaging, 23(6), 063020,
2014. 40. L. Shen, P. An, X.
Zhang, and Z. Zhang, Adaptive Transform Size Decision Algorithm for
High-Efficiency Video Coding Inter Coding, Journal of Electronic Imaging, 23(4), 043023,
2014. 41.
X. Han, Z.
Qian, G. Feng, and X. Zhang, Reversible Data Hiding in Encrypted
Images Based on Image Interpolation, International
Journal of Digital Crime and Forensics, 6(3), pp. 16-29, 2014. 42. Y. Ren, Z. Niu, and X. Zhang, Fully Anonymous
Identity-based Broadcast Encryption without Random Oracles, International Journal of Network Security,
16(4), 256-264, 2014. 43. R. Schmitz, S. Li, C. Grecos,
and X. Zhang, Towards Robust Invariant Commutative
Watermarking-Encryption Based on Image Histograms, International Journal of Multimedia Data Engineering and Management,
5(4), pp. 36-52,
2014. 44. X. Zhang, Reversible
Data Hiding with Optimal Value Transfer, IEEE Trans. on
Multimedia,
15(2), pp. 316-325, 2013. 45. X. Zhang, Commutative
Reversible Data Hiding and Encryption, Security and
Communication Networks, 6, pp. 1396-1403,
2013. 46. Y.
Zhao, S. Wang, X. Zhang, and H.
Yao, Robust Hashing for Image Authentication Using Zernike Moments and Local
Features, IEEE Trans. on Information Forensics &
Security,
8(1), pp. 55-63, 2013. 47. L. Shen, Z. Liu, X.
Zhang, W. Zhao, and Z. Zhang, An Effective CU Size Decision Method for
HEVC Encoders, IEEE Trans. on Multimedia, 15(2), pp. 465-470, 2013. 48. F.
Li, X. Zhang, B. Chen, and G.
Feng, JPEG Steganalysis with High-Dimensional Features and Bayesian Ensemble
Classifier, IEEE Signal Processing
Letters, 20(3), pp. 233-236, 2013. 49. G.
Sun, X. Zhang, G. Li, and J. Yin,
Robust Degraded Face Recognition with Novel Face Representation and
Multi-scale Fusion, Optical Engineering,
52(7), 2013. 50. Y. Ren, S. Wang, and X.
Zhang, Practical Parallel Key-Insulated Encryption with Multiple Helper
Keys, Computers and Mathematics with
Applications, 65(9), pp. 1403-1412, 2013. 51. C. Qin, C.-C. Chang, W.-B.
Lee, and X. Zhang, A Secure Image Delivery Scheme with Regional Protection
Capability Using Image Inpainting and Editing, The Imaging Science Journal, 61, pp. 509-517, 2013. 52. X. Zhang, G. Feng, Y. Ren, and Z. Qian, Scalable Coding of Encrypted Images, IEEE Trans. on Image Processing, 21(6), pp. 3108-3114, 2012. 53. X. Zhang, Separable
Reversible Data Hiding in Encrypted Image, IEEE Trans. on
Information Forensics & Security, 7(2), pp. 826-832, 2012. 54. X. Zhang and S. Wang, Efficient Data Hiding with Histogram-Preserving Property,
Telecommunication Systems, 49(2), pp. 179-185, 2012. 55. H.
Yao, S. Wang, Y. Zhao, and X. Zhang,
Detecting Image Forgery Using Perspective Constraints, IEEE Signal Processing Letters, 19(3), pp. 123-126, 2012. 56. G. Feng, Z. Qian, and X. Zhang, Evolutionary
Selection Extreme Learning Machine Optimization for Regression, Soft
Computing, 16(9), pp. 1485-1491, 2012. 57.
C. Qin, S.
Wang, and X. Zhang, Simultaneous inpainting for image structure and
texture using anisotropic heat transfer model, Multimedia Tools and
Applications,
56(3), pp. 469-483, 2012. 58. Z. Qian, and X. Zhang,
Lossless Data Hiding in JPEG Bitstream, Journal of Systems and Software, 85(2), pp. 309-313, 2012. 59. G. Feng, Z. Qian, and X. Zhang,
Spectrum-Estimation Based Lossless Information Recovery for Sparse Array
Patterns, Telecommunication Systems, 49(2),
pp. 163-169,
2012. 60. X. Zhang, Z. Qian, Y. Ren, and G. Feng, Watermarking
with Flexible Self-Recovery Quality Based on Compressive Sensing and Compositive Reconstruction, IEEE Trans. on
Information Forensics & Security, 6(4),
pp. 1223-1232,
2011. 61.
X. Zhang, S. Wang, Z. Qian, and G.
Feng, Reference Sharing Mechanism for Watermark Self-Embedding, IEEE Trans. on Image Processing, 20(2), pp. 485-495, 2011. 62. X. Zhang, Lossy Compression and Iterative Reconstruction for
Encrypted Image, IEEE Trans. on Information Forensics &
Security, 6(1), pp. 53-58, 2011. 63. X. Zhang, Reversible Data Hiding in Encrypted
Image, IEEE Signal
Processing Letters, 18(4), pp. 255-258, 2011. 64. X. Zhang, S. Wang, and G. Feng, Reversible Visible Watermarking with Lossless
Data Embedding Based on Difference Value Shift, Intelligent Automation and Soft Computing, 17(2), pp. 233-243, 2011. 65. X. Zhang, S. Wang, Z. Qian, and G. Feng,
Self-Embedding Watermark with Flexible Restoration Quality, Multimedia
Tools and Applications, 54(2), pp. 385-395, 2011. 66.
Q. Wu, S. Wang, and X. Zhang, Log-Polar Based Scheme for
Revealing Duplicated Regions in Digital Images, IEEE Signal Processing Letters, 18(10), pp. 559-562, 2011. 67.
Y. Ren, S. Wang, and X. Zhang, Improved
Hierarchical Identity-Based Parallel Key-Insulated Encryption, Journal of
Internet Technology, 12(4), pp. 647-658, 2011. 68.
C. Qin, F.
Cao, and X. Zhang, Efficient Image Inpainting Using Adaptive
Edge-Preserving Propagation, The Imaging Science Journal, 59(4), pp. 211-218, 2011. 69.
Z. Qian, G.
Feng, X. Zhang, and S. Wang, Image
Self-Embedding with High-Quality Restoration Capability, Digital Signal Processing, 21(2), pp. 278-286, 2011. 70.
Z. Tang, S.
Wang, X. Zhang, W. Wei, and Y. Zhao, Lexicographical framework for image hashing with implementation based on DCT and NMF, Multimedia Tools and Applications, 52(2-3),
pp. 325-345, 2011. 71.
Z. Tang, S.
Wang, X. Zhang, and W. Wei, Structural Feature Based Image Hashing and
Similarity Metric for Tampering Detection, Fundamenta Informaticae, 106(1), pp. 75-91, 2011. 72. C. Kim, D. Shin, D. Shin, and X. Zhang,
Improved Steganographic Embedding Exploiting Modification Direction in
Multimedia Communications, Communications
in Computer and Information Science, 186(1), pp. 130-138, 2011. 73. X. Zhang, Efficient Data Hiding with Plus-Minus One or Two, IEEE Signal Processing Letters, 17(7), pp. 635-638, 2010. 74. X. Zhang, S. Wang, Z. Qian, and G. Feng, Reversible Fragile
Watermarking for Locating Tampered Blocks in JPEG Images, Signal Processing, 90(12), pp. 3026-3036, 2010. 75. S. Wang, S. Huang, X. Zhang, and W. Wu, Hologram-Based
Watermarking Capable of Surviving Print-Scan Process, Applied Optics, 49(7), pp. 1170-1178, 2010. 76.
W. Zhang, X. Zhang, and S.
Wang, Near-Optimal Codes
for Information Embedding in Gray-Scale Signals, IEEE Trans. on Information Theory, 56(3), pp. 1262-1270, 2010. 77.
H. J. Kim, C. Kim, Y. Choi, S. Wang, X. Zhang,
Improved Modification Direction Methods, Computers
and Mathematics with Applications, 60(2), pp. 319-325,
2010. 78. W.
Wei, S. Wang, X. Zhang, and Z.
Tang, Estimation of Image Rotation Angle Using
Interpolation-Related Spectral Signatures with Application to Blind Detection
of Image Forgery, IEEE Trans. on
Information Forensics & Security, 5(3), pp. 507-517, 2010. 79.
Z. Qian, X.
Zhang, G. Feng, and Y. Ren, Color Filter Array Interpolation Based Self
Recovery with Anti-cropping Capability, International
Journal of Multimedia Intelligence and Security, 1(2), pp. 191-203, 2010. 80.
C. Qin, Q. Mao, and
X. Zhang, Image Watermarking Scheme
With Unequal Protection Capability Based on Error Correcting Codes, Journal of Multimedia, 5(5), pp. 427-433, 2010. 81.
Y. Ren, D. Gu, S. Wang, and X. Zhang, New
Fuzzy Identity Based Encryption Scheme in the Standard Model, Informatica, 21(3), pp. 393-407, 2010. 82.
Y. Ren, D. Gu,
S. Wang, and X. Zhang, Hierarchical Identity-Based Proxy Re-encryption
without Random Oracles, International
Journal of Foundations of Computer Science, 21(6), pp. 1049-1063, 2010. 83.
X. Zhang and S. Wang, Fragile Watermarking Scheme Using a Hierarchical Mechanism, Signal Processing, 89(4), pp. 675-679, 2009. 84. X. Zhang, S. Wang and W. Zhang, Steganography Combining Data
Decomposition Mechanism and Stego-coding Method, Informatica, 33(1), pp. 41–48, 2009. 85. X. Zhang and S. Wang, Fragile Watermarking with Error-Free
Restoration Capability, IEEE Trans. on
Multimedia, 10(8), pp.
1490-1499, 2008. 86. X. Zhang, S. Wang, and Z. Zhou, Multibit Assignment
Steganography in Palette Images, IEEE
Signal Processing Letters, 15,
pp. 553-556, 2008. 87. Z. Tang, S. Wang, X. Zhang, W. Wei, and S. Su, Robust
Image Hashing for Tamper Detection Using Non-Negative Matrix Factorization, Journal of Ubiquitous Convergence and
Technology, 2(1), pp. 18-26, 2008. 88. X. Zhang, W. Zhang, and S. Wang, Integrated Encoding with High
Efficiency for Digital Steganography, Electronics
Letters, 43(22), pp. 1191-1192,
2007. 89. W. Zhang, X. Zhang, and S. Wang, A Double
Layered “Plus-Minus One” Data Embedding Scheme, IEEE Signal Processing Letters, 14(11), pp. 848-851, 2007. 90. X. Zhang and S. Wang, Statistical Fragile Watermarking Capable
of Locating Individual Tampered Pixels, IEEE
Signal Processing Letters, 14(10),
pp. 727-730,
2007. 91. W. Zhang, S. Wang, and X. Zhang, Improving Embedding
Efficiency of Covering Codes for Applications in Steganography, IEEE Communications Letters, 11(8), pp. 680-682,
2007. 92. X. Zhang, W. Zhang and S. Wang, Efficient Double-Layered
Steganographic Embedding, Electronics
Letters, 43(8), pp. 482-483,
2007. 93. X. Zhang and S. Wang, Watermarking Scheme Capable of Resisting
Sensitivity Attack, IEEE Signal
Processing Letters, 14(2),
pp. 125-128, 2007. 94. X. Zhang and S. Wang, Image Restoration Using
Truncated SVD Filter Bank Based on an Energy Criterion, IEE Proceedings - Vision, Image & Signal Processing, 153(6), pp. 825-836, 2006. 95. X. Zhang and S. Wang, Efficient Steganographic Embedding by
Exploiting Modification Direction, IEEE
Communications Letters, 10(11),
pp. 781-783, 2006. 96. X. Zhang and S. Wang, Dynamical Running Coding in Digital Steganography, IEEE Signal Processing Letters, 13(3), pp. 165-168, 2006. 97. X. Zhang and S. Wang, Stego-Encoding with Error Correction
Capability, IEICE Transactions on
Fundamentals of Electronics, Communications and Computer Sciences,
E88-A(12), pp. 3663-3667, 2005. 98. X. Zhang and S. Wang, Steganography
Using Multiple-Base Notational System and Human Vision Sensitivity, IEEE
Signal Processing Letters, 12(1),
pp. 67-70, 2005. 99. X. Zhang and S. Wang, Invertibility Attack against Watermarking
Based on Forged Algorithm and a Countermeasure, Pattern Recognition
Letters, 25(8), pp. 967-973, 2004. 100.X. Zhang and S. Wang, Vulnerability of Pixel-Value Differencing
Steganography to Histogram Analysis and Modification for Enhanced Security, Pattern
Recognition Letters, 25(3),
pp. 331-339, 2004. 101.X. Zhang and S. Wang, Watermarking Scheme Capable of Resisting
Attacks Based on Availability of Inserter, Signal Processing, 82(11), pp. 1801-1804, 2002. 102.S. Wang and X. Zhang, Least Square Convolution
Mask for Image Restoration, Journal of the Imaging Society of Japan, 41(4), pp. 392-397, 2002. 103.S.
Wang, X. Zhang, and T. Ma, Image Watermarking Using Dither Modulation
in Dual-Transform Domain, Journal of the Imaging Society of Japan, 41(4), pp. 398-402, 2002. International Conference Papers: 1.
X. Zhang, Behavior Steganography
in Social Network, In Advances in Intelligent Information Hiding and
Multimedia Signal Processing: Proceeding of the Twelfth International
Conference on Intelligent Information Hiding and Multimedia Signal Processing
(IIH-MSP 2016), Nov. 21-23, Kaohsiung, Taiwan, Nov. 2016, Springer vol.1,
pp. 21-23, 2017. 2.
Z.
Qian, H. Zhou, W. Zhang, and X. Zhang,
Robust Steganography Using Texture Synthesis, In
Advances in Intelligent Information Hiding and Multimedia Signal Processing:
Proceeding of the Twelfth International Conference on Intelligent Information
Hiding and Multimedia Signal Processing (IIH-MSP 2016), Nov. 21-23,
Kaohsiung, Taiwan, Nov. 2016, Springer vol.1, pp. 25-33, 2017. 3.
X. Niu,
Z. Yin, X. Zhang, J. Tang, and B. Luo, Reversible
Data Hiding in Encrypted AMBTC Compressed Images, Proceedings
of 15th International Workshop on Digital-forensics and Watermarking (IWDW2016), Beijing, China, September 17-19, 2016. 4.
Z. Wang, J. Lv, Q. Wei, and X.
Zhang, Distortion Function for Spatial Image Steganography
Based on the Polarity of Embedding Change, Proceedings
of 15th International Workshop on Digital-forensics and Watermarking (IWDW2016), Beijing, China, September 17-19, 2016. 5.
Z.
Qian, X. Zhang, W. Zhang, and Y. Wang, Reversible Contrast Enhancement,
Proceedings of Second International Conference on Cloud Computing and Security
(ICCCS 2016), Nanjing, China, July 29-31, Lecture Notes in Computer
Science, 10039, 2016,
pp. 18-27. 6.
Y. Ren, N. Ding, X. Zhang, H. Lu, and D. Gu,Verifiable Outsourcing Algorithms for Modular
Exponentiations with Improved Checkability, Proceedings of the 11th ACM on Asia
Conference on Computer and Communications Security (AsiaCCS
2016), Xi'an, China, May 30 - June 3, 2016, pp. 293-303. 7.
Z. Yin, A. Abel, X. Zhang, and B. Luo,
Reversible Data Hiding in Encrypted Images Based on Block Histogram Shifting,
Proceedings of 41st IEEE International
Conference on Acoustics, Speech and Signal Processing, Shanghai, China,
2016, pp. 2129-2133. 8.
X. Zhang, Z. Wang, J. Yu,
and Z. Qian, Reversible visible watermark embedded in encrypted domain, Proceedings of 3rd IEEE
China Summit & International Conference on Signal and Information
Processing (ChinaSIP), Chengdu, China,
2015, pp. 826-830. 9.
H. Chen, X. Zhang, J. Yu, and F. Li, Markov
Process Based Retrieval for Encrypted JPEG Images, Proceedings of 10th International Conference on Availability,
Reliability and Security (ARES 2015), Toulouse, France, August
24-27, 2015, pp. 417-421. 10. Y.
Zhang, X. Zhang, C. Qin, and J.
Yu, Multiple Description Coding for Encrypted Images, Proceedings of the 11th International Conference on
Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP
2015), Adelaide, Australia, Sep. 23-25, 2015, pp.
85-88. 11. R. Schmitz, S. Li, C. Grecos,
and X. Zhang, Content-Fragile
Commutative Watermarking-Encryption Based on Pixel Entropy, Proceedings of 16th International Conference on
Advanced Concepts for Intelligent Vision Systems (ACIVS 2015), Lecture Notes in Computer Science, 9386, Catania, Italy, October 26-29, 2015, pp. 474-485. 12. Z. Yin, H. Wang, H. Zhao, B. Luo, and X. Zhang, Complete Separable
Reversible Data Hiding in Encrypted Image, Proceedings
of First
International Conference on Cloud Computing and Security (ICCCS 2015),
Nanjing, China, August 13-15, 2015, pp. 101-110. 13. X. Zhang, and H. Cheng, Histogram-Based Retrieval for Encrypted
JPEG Images, Proceedings of 2nd IEEE
China Summit & International Conference on Signal and Information
Processing (ChinaSIP), Xi'an, China,
July 9-13, 2014, pp. 446-449. 14. R. Schmitz, S. Li, C. Grecos,
and X. Zhang, Towards More Robust Commutative Watermarking-Encryption
of Images, Proceedings of 2013 IEEE
International Symposium on Multimedia (ISM’13), California, USA, Dec. 9-11, 2013, pp. 283-286. 15.
Z. Qian, X. Han, and X. Zhang, Separable Reversible Data hiding
in Encrypted Images by n-nary Histogram Modification, Proceedings of 3rd International Conference
on Multimedia Technology (ICMT 2013), Guangzhou, China, Nov. 29-Dec. 1, 2013, pp. 869-876. 16. X. Zhang, G. Sun, and C. Qin, Reversible Data Hiding in Encrypted Images Using Pseudorandom Sequence
Modulation, Proceeding of
the 11th International
Workshop on Digital-Forensics
Watermark (IWDW 2012), Shanghai, China, Oct. 31-Nov. 02, 2012, Lecture Notes in Computer
Science, 7809, pp. 358-367, 2013. 17. Y. Ren, S. Wang, and X.
Zhang, Anonymous Hierarchical
Identity-Based Encryption in Prime Order Groups, Proceedings of the 3rd International Conference on Data & Knowledge
Engineering (ICDKE 2012), Lecture Notes in Computer Science, 7696, Wuyishan, Fujian, China, Nov. 21-23, 2012, pp. 230-242. 18. Z. Qian, W. Wang, and X.
Zhang, Generalized Quality Assessment of Blocking Artifacts for
Compressed Images, Proceedings
of 9th International Forum on Digital TV and Wireless Multimedia
Communication (IFTC 2012), Communications
in Computer and Information Science, 331, Shanghai,
China, Nov. 9-10, 2012, pp. 110-116. 19. Z. Qian, and X. Zhang, Analysis of Matrix Embedding with Error Correction Capabilities, Proceedings
of the 4th International
Conference on Multimedia Information Networking & Security (MINES 2012),
Nov. 2-4,
2012, pp.
740-743, Nanjing,
China. 20. Y. Ren, S. Wang, and X.
Zhang, Non-interactive
Dynamic Identity-Based Broadcast Encryption without Random Oracles, Proceedings of the 14th International Conference on Information & Communications
Security (ICICS 2012), Lecture Notes in Computer Science, 7618, Hongkong, China, Oct. 29-31, 2012, pp. 479-487. 21. R. Schmitz, S. Li, C. Grecos,
and X. Zhang, A New Approach to Commutative Watermarking-Encryption, Proceedings of the 13th
IFIP TC6/TC11 International Conference on Communications and Multimedia
Security (CMS’12), Lecture Notes in Computer Science, 7394, Canterbury, UK, Sept. 3-5, 2012, pp. 117-130. 22. G. Li, G. Sun, and X.
Zhang, Robust Face Recognition in Low Resolution and Blurred Image Using
Joint Information in Space and Frequency, Proceedings
of the 9th IFIP International
Conference on Network and Parallel Computing (NPC 2012), Lecture Notes in Computer Science, 7513, Gwangju, Korea, Sept. 6-8, 2012, pp. 622-630. 23. L. Hou, W. Wu, S. Yang, T.
Yang, X. Zhang, Subjective
and Objective Quality Assessment of Re-Sampling Audio, Proceedings of International
Conference on Audio, Language and Image Processing (ICALIP 2012),
July 2012, pp.324-327, Shanghai, China. 24. X. Zhang, Z. Qian, F. Li, G. Feng, and Y. Ren, Efficient Data Hiding with High Payload, Proceedings
of the 3rd International
Conference on Multimedia Information Networking & Security (MINES 2011),
Nov 4-6,
2011, pp.
318-321, Shanghai,
China. 25. Y. Ren, S. Wang, X.
Zhang, and Z. Qian, Fully Secure Ciphertext-Policy
Attribute-Based Encryption with Constant Size Ciphertext, Proceedings of the 3rd
International Conference on Multimedia Information Networking & Security (MINES 2011),
Nov. 4-6,
2011,
pp. 380-384, Shanghai, China. 26. X. Zhang, Y. Ren, G. Feng, and Z. Qian, Compressing Encrypted Image Using Compressive Sensing, Proceedings of the
7th International Conference on Intelligent Information Hiding and Multimedia
Signal Processing (IIHMSP 2011), Oct. 14-16, 2011,
pp. 222-225, 27. H. Mao, G. Feng, X. Zhang, and H. Yao, A Robust and
Fast Video Fingerprinting Based on 3D-DCT and LSH, Proceedings of the 2011
International Conference on Multimedia Technology (ICMT 2011), July
26-28, 2011, pp. 108-111, Hangzhou, China. 28. F. Li, L. Shi, X.
Zhang, and Y. Chen, Data Embedding with Multi-ary
Tree Coding, Proceedings of the 2011 International Conference on
Multimedia Technology (ICMT 2011), July 26-28, 2011, pp. 267-270,
Hangzhou, China. 29. L. Shi, F. Li, Y. Chen, and X. Zhang, Steganographic Embedding in
JPEG Images with Visual Criterion, Proceedings of the 2011 International
Conference on Multimedia Technology (ICMT 2011), July 26-28, 2011, pp.
743-746, Hangzhou, China. 30. H. Liu, G. Liao, X. Zhang, Z. Xu, Visually
Optimized High-Quality JPEG Steganography, Proceedings of the 2nd International Conference on Image Analysis and
Signal Processing (IASP 2010), Xiamen, China, April 12-14, 2010, pp. 77-81. 31. Y. Ren, S. Wang, X. Zhang, and Z. Qian,
Identity-Based Parallel Key-Insulated Encryption with Multiple Long-Term
Keys, Proceedings of 2010 International Colloquium on
Computing, Communication, Control, and Management (CCCM 2010), IEEE Technology Management Council, Yangzhou, China, Aug. 2010, pp.
376-379. 32. K. Xu, X. Zhang, and S. Wang, VoE Based
Steganalysis on LSB Matching in Raw Images, Proceedings of the 2nd International Conference on
Multimedia and Computational Intelligence (ICMCI 2010), Wuhan, China, Sept. 29-30, 2010,
pp. 492-495. 33. Y. Ren, S. Wang, X. Zhang, and Z. Qian, Fully Secure Anonymous Identity-Based
Encryption under Simple Assumptions, Proceedings of the 2010 International
Conference on Multimedia Information Networking and Security (MINES 2010), Nanjing, China, Nov. 4–6, 2010, pp. 428-432. 34. C. Qin, J.-H. Li, W.-B. Lee, and X. Zhang,
Secure Image Delivery Scheme Using Poisson Editing, Proceedings of the 2010 International Conference on Multimedia Information Networking and
Security (MINES 2010), Nanjing,
China, Nov. 4–6, 2010, pp. 902-906. 35. Z. Fang, S. Wang, and X. Zhang, Image
Splicing Detection Using Color Edge Inconsistency, Proceedings of the 2010 International Conference on Multimedia Information Networking and
Security (MINES 2010), Nanjing,
China, Nov. 4–6, 2010, pp. 923-926. 36. Q. Wu, S. Wang, and X. Zhang, Detection of
Image Region-Duplication with Rotation and Scaling Tolerance, Proceedings of the 2nd International
Conference on Computational Collective Intelligence (ICCCI 2010),
Lecture Notes in Computer Science, 6421, Springer-Verlag, Kaohsiung,
Taiwan, Nov. 10-12, 2010, pp. 100-108. 37. G. Liao, and X. Zhang, A Reversible Data
Hiding for JPEG Images, Proceedings of
the 2010 International
Conference on Electrical Engineering and Automatic Control (ICEEAC 2010), Zibo, China, Nov. 26-28, 2010, pp. 448-451. 38. H. Yao, S. Wang and X. Zhang, Detect Piecewise Linear
Contrast Enhancement and Estimate Parameters using Spectral Analysis of Image
Histogram, Proceedings of 2009 IET
International Communication Conference on Wireless Mobile & Computing,
Shanghai, China, December 2009, pp. 94-97. 39. S. Li, A. C. Kot, X. Zhang, Data Hiding in Images Based
on Tolerable Error Range, Proceedings
of the 7th International Conference on Information, Communications and Signal
Processing (ICICS 2009), Macau,
China, December 2009, pp. 1-5. 40. X. Zhang, W. Zhang, and S. Wang, Steganography with
Histogram-Preserving and Distortion-Constraining Properties, Proceedings of the First International
Conference on Multimedia Information Networking & Security (MINES 2009),
Wuhan, China, Nov 18-20, 2009, pp. 30-34. 41. Z. Fang, S. Wang, and X. Zhang, Image Splicing Detection
Using Camera Characteristic Inconsistency, Proceedings of the First International Conference on Multimedia
Information Networking & Security (MINES 2009), Wuhan, China, Nov
18-20, 2009, pp. 20-24. 42. C. Qin, Q. Mao, and X. Zhang, Image Watermarking With
Unequal Error Protection Capability, Proceedings
of the First International Conference on Multimedia Information Networking
& Security (MINES 2009), Wuhan, China, Nov 18-20, 2009, pp. 81-84. 43. Z. Qian, X. Zhang, and S. Wang, Matrix Selection for
High Payload Embedding, Proceedings of the Fifth
International Conference on Intelligent Information Hiding and Multimedia
Signal Processing (IIHMSP 2009), Kyoto, Japan, Sep. 12-14, 2009, pp. 328-331. 44. X. Zhang, S. Wang, and G. Feng, Fragile Watermarking Scheme
with Extensive Content Restoration Capability, Proceeding of the 8th International Workshop on Digital
Watermark (IWDW 2009), Guildford, UK, August 24-26, 2009, pp. 268-278, Lecture Notes in Computer Science, 5703, pp. 268-278. 45. Z. Tang, S. Wang, X. Zhang, and W. Wei, Perceptual
Similarity Metric Resilient to Rotation for Application in Robust Image
Hashing, Proceedings of the 3rd
International Conference on Multimedia and Ubiquitous Engineering (MUE 2009),
Qingdao, China, June 4-6, 2009, pp.183-188. 46. X. Zhang, S. Wang, and W. Zhang, Efficient
Steganography Based on a Data Decomposition Mechanism, Proceedings of the International Workshop on Multimedia Security in Communication
(MUSIC'08), Hangzhou, China,
August 28, 2008. 47. C.
Qin, S. Wang, and X. Zhang, Image Editing without Color Inconsistency Using
Modified Poisson Equation, Proceedings
of the Fourth International
Conference on Intelligent Information Hiding and Multimedia Signal Processing
(IIHMSP 2008), Harbin, China, August 15-17, 2008, pp.397-401. 48. W.
Zhang, X. Zhang, and S. Wang, Twice
Grid Colorings in Steganography, Proceedings
of the Fourth International Conference
on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP
2008), Harbin, China, August
15-17, 2008, pp.1301-1304. 49. Q. Li, S. Wang, and X. Zhang, Hierarchical Identification
of Visually Salient Image Regions, Proceedings
of International Conference on Audio,
Language and Image Processing (ICALIP 2008), Shanghai, China, July 2008, pp.1709-1712. 50. C.-C. Chang, X. Zhang, and S. Wang, Generalized Running Coding for Efficient
Data Hiding, Proceedings of International Conference on Audio, Language
and Image Processing (ICALIP
2008), Shanghai, China, July
2008, pp.490-494. 51. W. Zhang, X. Zhang, and S. Wang, Maximizing
Steganographic Embedding Efficiency by Combining Hamming Codes and Wet Paper
Codes, Proceedings of the 10th
Information Hiding Workshop (IH 2008), Santa Barbara, USA, May 2008, pp. 61-73. 52. C.
Qin, C. Liu, S. Wang, and X. Zhang, Simultaneous Inpainting
of Image Structure and Texture with PDE, Proceedings
of the 6th International Conference on Imaging Science and Hardcopy
(ICISH’08), Zhanjiang, China, Jan. 2008, pp. 40-42. 53. S. Wang, and X. Zhang, Attacks on Perceptual Image
Hashing, Proceedings of 2nd
International Conference on Ubiquitous Information Technologies and
Applications, Bali, Indonesia, Dec. 2007, pp. 199-203. 54. C.-C. Wang, C.-C. Chang, X. Zhang, and J.-K. Jan, Senary
Huffman Compression - A Reversible Data Hiding Scheme for Binary Images, Proceedings of International Workshop on
Multimedia Content Analysis and Mining (MCAM’07), Lecture Notes in Computer Science, 4577, Weihai, China, June
2007, pp.351-360. 55. C. Qin, W.-B. Lee, X. Zhang, and S. Wang, Copyright
Management Using Progressive Image Delivery, Visible Watermarking and Robust
Fingerprinting, 9th Int. Conf. Control,
Automation, Robotics and Vision (ICARCV 2006), Singapore, Dec. 2006, pp.
1766-1769. 56. C. Chen, S. Wang, and X. Zhang, Information Hiding in Text
Using Typesetting Tools with Stego-Encoding, First International Conference on Innovative Computing, Information
and Control (ICICIC'06) -
Volume I, Beijing, China, Aug. 2006, pp. 459-462. 57. X. Zhang and S. Wang, Information Capacity of Quantization
Steganography in the Presence of Active Attack, Proceedings of the 12th International Multi-Media
Modelling Conference (MMM2006), Beijing, China, Jan. 2006, pp. 385-388. 58. X. Zhang and S. Wang, Watermarking Protocol Compatible with
Secret Algorithms for Resisting Invertibility Attack, Knowledge-Based Intelligent Information and Engineering Systems, Lecture
Notes in Artificial Intelligence, 3682,
Melbourne, Australia, Sep. 2005, pp. 1134-1144. 59. X. Zhang and S. Wang, Analysis of Parity
Assignment Steganography in Palette Images, Knowledge-Based Intelligent Information and Engineering Systems, Lecture
Notes in Artificial Intelligence, 3683,
Melbourne, Australia, Sep. 2005, pp. 1025-1031. 60. X. Zhang and S. Wang, A New Watermarking Scheme against
Inserter-Based Attacks Suitable for Digital Media with Moderate Size, Proceedings
of the Third International Conference on Information Security, Shanghai,
China, Nov. 2004, pp. 247-248. 61. X. Zhang, S. Wang, and K. Zhang, Steganography with Least
Histogram Abnormality, Computer Network Security, Lecture Notes in
Computer Science, 2776, St. Petersburg, Russia, Sep. 2003, pp. 395-406. 62. X. Zhang, S. Wang, and K. Zhang, Multi-bit Watermarking Scheme
Based on Addition of Orthogonal Sequences, Computer Network Security, Lecture
Notes in Computer Science, 2776, St. Petersburg, Russia, Sep. 2003, pp.
407-418. 63. S.
Wang, X. Zhang, and K. Zhang, Data Hiding in Digital Audio by
Frequency Domain Dithering, Computer Network Security, Lecture Notes in
Computer Science, 2776, St. Petersburg, Russia, Sep. 2003, pp. 383-394. 64. K. Zhang, S. Wang, and X. Zhang, Detection and
Removal of Hidden Data in Images Embedded with Quantization Index Modulation,
Computer Network Security, Lecture Notes in Computer Science,
2776, St. Petersburg, Russia, Sep. 2003, pp. 360-370. 65. X. Zhang and S. Wang, A Novel Deconvolution Approach to Image
Restoration, Second International Conference on Image and Graphics, Proceedings of SPIE, 4875,
Hefei, China, Aug. 2002, pp. 103-110. 66. K.
Zhang, S. Wang,
and X. Zhang, A New Metric for Quality Assessment of
Digital Images Based on Weighted-Mean Square Error, Second
International Conference on Image and Graphics, Proceedings of SPIE, 4875, Hefei, China, Aug.
2002, pp. 491-497. 67. S. Wang and X. Zhang, Least Square Convolution
Mask for Image Restoration, in Proceedings of International Congress of
Image Science 2002 (ICIS’02), Tokyo, Japan, May 2002, pp. 688-689. 68. X. Zhang, K. Zhang, and S. Wang, Watermarking with
Identifiability of Embedding Order, Proceedings of International Congress
of Image Science 2002 (ICIS’02), Tokyo, Japan, May 2002, pp. 608-609. 69. X. Zhang, K. Zhang, and S. Wang, Multispectral Image
Watermarking Based on KLT, Image Compression and Encryption Technologies, Proceedings of SPIE, 4551,Wuhan, China, Oct. 2001,
pp. 107-114. 中文期刊论文: 1.
辛昕,钱振兴,张新鹏,代舒,基于安全水印的三方交易系统,应用科学学报,33(6), pp. 575-584, 2015. 2.
吕金鹏,梁海华,张新鹏,混合进制嵌入的调色板图像无损信息隐藏,应用科学学报,33(6), pp. 290-298, 2015. 3.
徐淼,程航,余江,张新鹏,基于新的失真代价函数的自适应JPEG隐写,应用科学学报,33(3), pp. 637-643, 2015. 4.
栗风永,张新鹏,结合通道共生和选择集成的彩色图像隐写分析,中国图象图形学报,20(5), pp. 609-617, 2015. 5.
韩喜玉,钱振兴,张新鹏,姜飞,按需发送的加密图像中的可逆信息隐藏,应用科学学报,33(1), pp. 50-58, 2015. 6.
张晓琳,方针,张新鹏,利用通道间相关性的CFA图像盲取证,应用科学学报,33(1), pp. 87-94,
2015. 7.
王子驰,张媛,张新鹏,多比特嵌入的加密图像中可逆信息隐藏方法,小型微型计算机系统,35(10), pp. 2331-2335, 2014. 8.
杨乾星,栗风永,张新鹏,申文峰,基于DCT系数修改的自适应稳健可逆信息隐藏,上海大学学报,20(5), pp. 605-611, 2014. 9.
栗风永,张新鹏,余江,结合集成比例训练的彩色JPEG图像隐写分析,电子与信息学报,36(1), pp. 114-120, 2014. 10.
任慧,栗风永,张新鹏,余江,结合重排序和直方图平移的调色板图像可逆信息隐藏,上海大学学报,19(3), pp. 254-258, 2013. 11.
马志鹏,栗风永,张新鹏,基于汉明码与从属像素补偿的半色调图像信息隐藏,上海大学学报,19(2), pp. 111-115, 2013. 12.
乔通,钱振兴,张新鹏,王文文,基于局部能量方差特性的数字图像取证,模式识别与人工智能,25(2),
pp. 280-284, 2012. 13.
张新鹏,刘焕,张颖春,王朔中,融合方向编码和湿纸编码的高效信息隐藏,上海大学学报,16(1), pp. 1-4, 2010. 14. 郁志鸣、王朔中、张新鹏、刘婷婷,结合对比特性与局部清晰特性的图像显著区域检测,应用科学学报,28(1), pp. 24-31, 2010. 15. 秦川、王朔中、张新鹏,基于各向异性热传导模型的自适应图像修复,仪器仪表学报,31(6), pp. 1303-1309, 2010. 16. 秦运龙、孙广玲、王朔中、张新鹏,根据GOP异常进行视频序列剪辑篡改的盲检测,电子学报,38(7), pp. 1597-1602, 2010. 17. 王朔中、张新鹏、张卫明,以数字图像为载体的隐写分析研究进展,计算机学报,32(7), pp. 1247-1263, 2009. 18. 张卫明、王朔中、张新鹏,基于嵌入影响变化率的灰度图像LSB匹配检测方法,计算机研究与发展,46(Suppl.1), pp. 188-191, 2009. 19. 秦运龙、孙广玲、张新鹏,利用运动矢量进行视频篡改检测,计算机研究与发展,46(Suppl.1), pp. 227-233, 2009. 20. 秦川、王朔中、张新鹏,针对Poisson方程图像编辑的篡改检测,计算机研究与发展,46(Suppl.1), pp. 234-238, 2009. 21. 唐振军、王朔中、魏为民、张新鹏,利用分块相似系数构造感知图像Hash,计算机研究与发展,46(Suppl.1), pp. 311-317, 2009. 22. 孙文颙、刘婷婷、张新鹏、王朔中,彩色图像通用隐写分析的多类统计特征,中国图象图形学报,13(10), pp. 1914-1917, 2008. 23. 李茜、王朔中、金秋明、张新鹏,兼顾视觉质量和载体图像无损重建的可见水印,中国图象图形学报,13(10), pp. 1947-1950, 2008. 24. 金秋明、王朔中、李茜、张新鹏,基于角点检测的稳健图像摘要,中国图象图形学报,13(8), pp. 1454-1458, 2008. 25. 李晟、张新鹏,利用JPEG压缩特性的合成图像检测,应用科学学报,26(3), pp. 281-287, 2008. 26. 孙文颙、张新鹏、王朔中,基于直方图差异的模型隐写分析,上海大学学报,14(2), pp. 111-115, 2008. 27. 张卫明、张新鹏、王朔中,适用于灰度级信号的数据嵌入方法,南京理工大学学报,32(2), pp. 209-213, 2008. 28. 张新鹏、王朔中,基于稀疏表示的密写编码,电子学报,35(10), pp. 1892-1896, 2007. 29. 张新鹏、王朔中、周振宇,对于抗敏感性攻击水印的强化攻击,东南大学学报,37(Sup.1), pp. 53-57, 2007. 30. 唐振军、魏为民、张新鹏、王朔中,用于图像检索的稳健Hash,东南大学学报,37(Sup.1), pp. 105-108, 2007. 31. 李晟、张新鹏、王朔中,基于可容忍失真的数字图像隐写,中国图象图形学报,12(2), pp. 212-217, 2007. 32. 刘春庆、梁光岚、王朔中、张新鹏,应用二值图像信息隐藏技术实现彩色图像中的安全隐写,应用科学学报,25(4), pp. 342-347, 2007. 33. 秦川、王朔中、张新鹏,一种基于视觉特性的图像摘要算法,中国图象图形学报,11(11), pp. 1678-1681, 2006. 34. 张新鹏、王朔中、陈超,不需权威第三方的非对称指纹方案,哈尔滨工业大学学报,38(增刊), pp. 727-730,
2006. 35. 陈超、王朔中、张新鹏,应用TeX控制功能和图像检测的文本密写,应用科学学报,24(2), pp. 115-119, 2006. 36. 张新鹏、王朔中,JPEG图像中的安全密写方案,电子与信息学报,27(11), pp. 1813-1817, 2005. 37. 周振宇、张新鹏、王朔中,抗随机几何攻击的音频水印方案,中国图象图形学报,10(11), pp. 1466-1470, 2005. 38. 张新鹏、王朔中,基于像素交换的无损信息隐藏,光电子·激光,16(8), pp. 956-960,
2005. 39. 张新鹏、王朔中,对空域BPCS密写的统计分析,计算机辅助设计与图形学学报,17(7), pp. 1625-1629, 2005. 40. 刘伟、王朔中、张新鹏,抗MP3编码的音频水印频域嵌入方案,应用科学学报,23(4), pp. 341-344, 2005. 41. 张新鹏、王朔中,对OPA密写的检测和增强安全性的调色板图像密写方案,电子学报,32(10), pp. 1702-1705, 2004. 42. 张新鹏、王朔中,抗可逆性攻击和嵌入器攻击的安全水印系统,中山大学学报(自然科学版),43(增刊2), pp. 10-13,
2004. 43. 刘伟、王朔中、张新鹏,一种基于部分MP3编码原理的音频水印,中山大学学报(自然科学版),43(增刊2), pp. 26-28,
2004. 44. 贾骏、王朔中、张新鹏,码分复用数字音频水印嵌入方案,上海交通大学学报,38(12), pp. 2073-2077, 2004. 45. 胡烨雯、张新鹏、王朔中,一种可估计最低位平面嵌入信息量的密写分析方法,上海交通大学学报,38(增刊), pp. 122-124,
2004. 46. 贾骏、王朔中、张新鹏,一种基于人耳听觉特性的数字音频水印方案,西安电子科技大学学报,31(4), pp. 652–656, 2004. 47. 张新鹏、王朔中、张开文,基于统计特性的LSB密写分析,应用科学学报,22(1), pp. 16-19, 2004. 48. 张新鹏、王朔中、张开文,基于视觉特性的多比特量化水印方案,光电子·激光,14(11), pp.
1179-1182, 2003. 49. 张新鹏、王朔中,JPEG图象中的无损信息隐藏,中国图象图形学报,8(特刊), pp. 563–566,
2003. 50. 张新鹏、王朔中、张开文,抗统计分析的LSB密写方案,中国图象图形学报,8(9), pp. 1055-1060, 2003. 51. 张开文、张新鹏、王朔中,图像及音频信号中隐蔽嵌入信息存在性的统计检验,电子与信息学报,25(7):871–877, 2003. 52. 张新鹏、王朔中、张开文,迭加与量化两种水印嵌入方案的比较及量化参数优化,光电子·激光,14(8), pp. 858-861,
2003. 【学术著作】 王朔中,张新鹏,张开文,数字密写和密写分析——互联网时代的信息战技术,清华大学出版社,北京,2005年 【发明专利】 1.
张新鹏,王朔中,王威娜,基于灰度调整的无损信息隐藏方法,ZL200410067794.X,授权时间:2007年5月 2.
周振宇,梁光岚,张新鹏,王朔中,路兴,数字图像中最不重要位替换信息隐藏的快速检测方法,ZL
200710038710.3,授权时间:2008年12月 3.
陈轶,张新鹏,王朔中,魏为民,基于连“1”特性的JPEG图像再次编码检测方法,ZL 200810201976.1,授权时间:2010年8月 4.
秦运龙,孙广玲,张新鹏,刘焕,王朔中,魏为民,一种基于压缩域的视频序列Copy-Move篡改检测方法,ZL 200910198209.2,授权时间:2011年10月 5.
魏为民,王朔中,张新鹏,唐振军,数字图像缩放因子的盲检测方法,ZL200810203981.4,授权时间:2011年11月 6.
黄素娟,王朔中,张新鹏,吴蔚,抗照片打印-扫描攻击和硬拷贝剪切的全息图像水印方法,申请号:200910046528.4,申请时间:2009年1月 7.
刘焕,张新鹏,廖贵龙,张颖春,王朔中,魏为民,基于像素分组策略的可逆数据隐藏方法,申请号:200910196507.8,申请时间:2009年9月 8.
施柳,栗风永,张新鹏,钱振兴,王朔中,机密信息的游动编码隐藏方法, ZL201110171393.9 ,授权时间:2015年2月 9.
余江,张新鹏,栗风永,王朔中,程航,基于载体图像校验码的加密域无损可逆信息隐藏方法, ZL201310198542.X,授权时间:2016年5月 10. 钱振兴,王文文,张新鹏,基于多尺度分解的压缩图像质量无参评估方法, ZL201310464607.0,授权时间:2016年1月 11. 程航,张新鹏,童人婷,徐淼,王子驰,基于JPEG图像交流系数直方图的密文域图像检索方法,申请号:201410591470.X,申请日期:2014年10月 12. 钱振兴,吕梦琪,张新鹏,基于纹理合成的鲁棒隐写, ZL201610965782.1,申请时间:2016年11月 【获奖情况】 - 张新鹏,王朔中,王怀清,网络环境下的信息隐藏与监控研究,上海市自然科学奖二等奖,2012 - 张新鹏,上海市新长征突击手,2009 - 张新鹏,YOCSEF上海IT新锐奖,2009 - 张新鹏,上海大学十佳杰出青年,2009 - 张新鹏,上海大学优秀青年教师,2006 - 张新鹏,上海市优秀博士学位论文,2005 - 王朔中,吴光华,夏明一,孙达华,张新鹏,陶碧云,王威娜,李研,档案领域的数字水印技术应用研究与产品开发,上海市档案科技成果奖特等奖、国家档案局优秀科技成果奖三等奖,2004 【学术兼职】 《应用科学学报》,副主编 中国电子学会通信学分会多媒体安全专家委员会,专家委员 国家质检总局防伪技术专家 上海市计算机学会信息安全专业委员会,副主任委员 【国际期刊任职】 IEEE Trans. on Information Forensics & Security, Associate Editor Intelligent Automation and Soft Computing, Associate Editor Journal of Information Hiding and Multimedia Signal Processing,
Associate Editor International Journal of Information and Computer Science, Member of the
editorial board International Journal of Multimedia Intelligence and Security, Member of
the editorial board Conference Papers in Signal Processing, Member of the editorial board Networking and Electronic Commerce Journal, Associate Editor 【国际期刊Guest
Editor】 1.
Special Issue on Multimedia
Information Security and its Application in Cloud Computing, Multimedia
Tools and Applications, 2017 2.
Special Issue on Real-Time Data Hiding
and Visual Cryptography, Journal of Real-Time Image Processing, 2016 3.
Special Issue on Reversible Data Hiding
for Digital Forensics, International Journal of Digital Crime and Forensics,
2014 【国际期刊审稿】 1.
IEEE Trans. Image Processing 2.
IEEE Trans. Information Forensics and
Security 3.
IEEE Trans. Multimedia 4.
IEEE Trans. Circuits and Systems for
Video Technology 5.
IEEE Trans. Systems, Man and Cybernetics
6.
IEEE Signal Processing Letters 7.
IEEE Communications Letters 8.
IEEE Communications Magazine 9.
IEEE Systems Journal 10.
IET Information Security 11.
IET Image Processing 12.
IEE Proc. Vision, Image & Signal
Processing 13.
Optical Engineering 14.
Signal Processing 15.
Signal Processing: Image Communication 16.
Pattern Recognition 17.
Pattern Recognition Letters 18.
Neurocomputing 19.
Computers & Security 20.
Computers & Electrical Engineering 21.
Journal of Systems and Software 22.
Journal of Visual Communication and
Image Representation 23.
Journal of Biomedical Informatics 24.
Journal of Applied Mathematics 25.
Journal of Information Security and
Applications 26.
Image and Vision Computing 27.
Information Security Technical Report 28.
Digital Signal Processing 29.
Imaging Science Journal 30.
Multimedia Tools and Applications 31.
Evolving Systems 32.
Security and Communication Networks 33.
Annals of Telecommunications 34.
Informatica 35.
Journal of Electronic Imaging 36.
International Journal of Communication
Systems 37.
International Journal of Computers and
Applications 38.
International Journal on Intelligent
Automation and Soft Computing 39.
International Journal of Multimedia
Intelligence and Security 40.
International Journal of Computational
Intelligence Systems 41.
International Journal of Image and
Graphics 42.
EURASIP Journal on Information Security 43.
EURASIP Journal on Advances in Signal
Processing 44.
EURASIP Journal on Image and Video
Processing 45.
European Transactions on
Telecommunications 46.
LNCS Trans. Data Hiding and Multimedia
Security 47.
KSII Trans. Internet and Information
Systems 48.
IETE Technical Review 49.
Journal of Information Science and
Engineering 50.
IEICE Transactions on Fundamentals of
Electronics, Communications and Computer Sciences 51.
The Scientific World Journal 52.
ETRI Journal 【国际学术会议大会特邀报告】 1.
Reversible Data Hiding in Encrypted
images, The 11th
International Workshop on Digital-forensics and Watermarking (IWDW 2012), 【国际学术会议TPC Chair】 1.
The Third International Conference on Multimedia Information Networking
and Security (MINES 2011), 2.
IEEK CS International Symposium on Research in Ubiquitous and
Multimedia Applications Systems (UMAS 2012), 3.
IEEK CS International Symposium on Research in Ubiquitous and
Multimedia Applications Systems (UMAS 2013), 【国际学术会议TPC Member】 1.
The Third International Conference on
Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP
2007), 2.
The 5th International Conference on
Communications, Circuits And Systems (ICCCAS 2007), 3.
The First International Workshop on
Multimedia, Information Privacy and Intelligent Computing Systems (MPIS
2008), 4.
The 11th International Conference on
Communications Technologies (ICCT 2008), 5.
The International Workshop on Recent
Innovations and Breakthroughs in Cryptography (RIBC 2009), 6.
The Fifth International Conference on
Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP
2009), 7.
The Fifth International Conference on
Information Assurance and Security (IAS 09), 8.
The International Conference on Multimedia Information Networking and
Security (MINES 2009), 9.
The Fourth International Conference on Genetic and Evolutionary
Computing (ICGEC 2010), 10.
The Second International Conference on Multimedia Information
Networking and Security (MINES 2010), 11.
The FTRA 2010 International Workshop on Advanced Future Multimedia
Services (AFMS 2010), 12.
The IEEE International Conference on Multimedia and Expo (ICME 2011), 13.
The Fifth International Conference on Genetic and Evolutionary
Computing (ICGEC 2011), 14.
The 10th International Workshop on Digital-forensics and
Watermarking (IWDW 2011), 15.
The IEEE International Conference on Multimedia and Expo (ICME 2012), 16. The 5th FTRA International Conference
on Human-Centric Computing (HumanCom 2012), 17. The 2012 FTRA International
Workshop on Advanced Future Multimedia Services (AFMS 2012), 18. The 2012 FTRA International
Conference on Advanced IT, engineering and Management (AIM 2012), 19. The 15th International
Conference on Network-Based Information Systems (NBiS-2012), 20. The 15th International
Telecommunications Network Strategy and Planning Symposium (NETWORKS 2012), 21.
Globecom 2012 - Communication and Information
System Security Symposium (GC12 CISS), 22.
2012 FTRA International Conference on Advanced IT, engineering and
Management (FTRA AIM Summer 2012), Jeju, 23.
The 11th International Workshop on Digital-forensics and
Watermarking (IWDW 2012), 24. The Second International
Conference on Advances in Computing, Communications and Informatics (ICACCI
2013), 25.
The 2013 FTRA International Conference on Advanced IT, engineering
and Management (FTRA AIM-13), 26.
The First IEEE China Summit & International Conference on Signal
and Information Processing (ChinaSIP 2013), Bejing, China 27. The 12th International
Workshop on Digital-forensics and Watermarking (IWDW 2013), 28. The 2014 International
Symposium on Real-time Natural User Interface and Natural User eXperience (RNN 2014), Zhangjiajie,
China 29. The Third International
Conference on Advances in Computing, Communications and Informatics (ICACCI
2014), Greater 30. The 5th FTRA International
Conference on Creative Converged IT (CCIT 2014), 31. The 2014 FTRA International
Advanced Multimedia Computing (AMC-14), 32. The Second IEEE China Summit
& International Conference on Signal and Information Processing (ChinaSIP 2014), Xi’an, China 33. The 13th International
Workshop on Digital-forensics and Watermarking (IWDW 2014), Taipei, Taiwan 34.
The 7th FTRA International Conference on Human-centric Ubiquitous
Computing and Applications (HumanCom-14), 35.
The 7th International Symposium on Cyberspace Safety and Security
(CSS 2015), New York, USA 36.
The International Conference on Cloud Computing and Security (ICCCS
2015), Nanjing, China 37.
The 14th International Workshop on Digital-forensics and Watermarking
(IWDW 2015), Tokyo, Japan 38.
The Third IEEE China Summit & International Conference on Signal
and Information Processing (ChinaSIP 2015),
Chengdu, China 39.
The 15th International Workshop on Digital-forensics and Watermarking
(IWDW 2016), Beijing, China |