banner.jpg

zgx.jpg

张新鹏 博士、教授、博导、国家杰出青年科学基金获得者

办公室:

tyc1286太阳集团宝山校区东区通信楼(翔英楼815

通信地址:

上大路99号tyc1286太阳集团83号信箱通信与信息工程学院

邮政编码:

200444

电话:

021-66137263

电子邮件:

xzhang@shu.edu.cn

English Version

个人主页:

/Prof/zhangxp.htm

 

【教育经历】

2004年毕业于tyc1286太阳集团,获工学博士学位

2001年于tyc1286太阳集团获工学硕士学位

1995年毕业于吉林大学数学系,获理学学士学位

 

【工作经历】

20112012,德国Konstanz大学,Humboldt学者资深研究员

20102011,美国纽约州立大学Binghamton分校,访问学者

2008    ,tyc1286太阳集团,教授

20062008,tyc1286太阳集团,副教授

20042006,tyc1286太阳集团,讲师

 

【研究领域】

多媒体信息安全、信息隐藏、数字取证、加密域信号处理、图像处理

 

【科研项目】

20172020,新型信息隐藏的基础理论与关键技术研究,国家自然科学基金通用技术基础研究联合基金重点项目,主持

20162020,多媒体信息隐藏,国家杰出青年科学基金,主持

20162019,云数据安全处理,上海市优秀学术带头人计划,主持

20162018,上海高校特聘教授跟踪计划专项资助,主持

20152017,加密图像压缩研究,上海市曙光学者计划,主持

20152018,密文图像中的可逆信息隐藏,国家自然科学基金主持

20132015,广义率失真优化的信息隐藏,上海市浦江人才计划,主持

20122015,上海高校特聘教授专项资助,主持

20122014,高度安全的数字隐写研究教育部博士点基金(博导类),主持

20112013广义隐写编码与多载体安全隐写研究国家自然科学基金,主持

20102012数字图像内容的真伪鉴定研究上海市科委国际合作项目,主持

20102012数字图像中的新型安全隐写,上海市科技启明星跟踪计划,主持

20102011新型数字隐写编码研究,教育部科研重点项目,主持

20092011,数字图像真实性的被动取证研究,国家自然科学基金,主持

20092011数字隐写中的新型编码研究,上海市教委科研创新重点项目,主持

20072009,数字图像反隐写关键技术,国家高技术研究发展计划(863计划),主持

20062008,数字图像中的隐写分析反隐写综合措施研究,上海市青年科技启明星计划,主持

20062008,具有统计隐蔽性和抗干扰性的安全密写研究,国家自然科学基金,主持

20042007,抗统计分析的数字图像密写研究,上海市科委基础研究重点项目,主持

20042006,具有多重免疫性的安全数字水印协议与算法研究,上海市教委青年基金,主持

 

【授课情况】

信息科技概览(本科生通识课)

信息时代的思维(本科生新生研讨课)

信息论与编码(本科生)

数字图像处理(本科生)

信息网络与安全(本科生)

多媒体信息安全(本科生高年级研讨课)

通信与信息新技术进展(研究生)

 

【近期论文】

International Journal Papers:

1.        Z. Qian, H. Zhou, X. Zhang, and W. Zhang, Separable Reversible Data Hiding in Encrypted JPEG Bitstreams, IEEE Trans. on Dependable and Secure Computing, (to appear)

2.        Z. Zeng, H. Xiao, and X. Zhang, Self CNN-Based Time Series Stream Forecasting, Electronics Letters, (to appear)

3.        H. Yao, S. Wang, X. Zhang, C. Qin, and J. Wang, Detecting Image Splicing Based on Noise Level Inconsistency, Multimedia Tools and Applications, (to appear)

4.        Z. Yin, A. Abel, J. Tang, X. Zhang, and B. Luo, Reversible Data Hiding in Encrypted Images Based on Multi-Level Encryption and Block Histogram Modification, Multimedia Tools and Applications, (to appear)

5.        Y. Ren, S. Wang, and X. Zhang, Fully Secure Expressive Ciphertext-Policy Attribute-Based Encryption without Random Oracles, Information, (to appear)

6.        X. Zhang, J. Long, Z. Wang, and H. Cheng, Lossless and Reversible Data Hiding in Encrypted Images with Public Key Cryptography, IEEE Trans. on Circuits and Systems for Video Technology, 26(9), pp. 1622-1631, 2016.

7.        Z. Qian, and X. Zhang, Reversible Data Hiding in Encrypted Image with Distributed Source Encoding, IEEE Trans. on Circuits and Systems for Video Technology, 26(4), pp. 636-646, 2016.

8.        Y.-Q. Shi, X. Li, X. Zhang, H.-T. Wu, and B. Ma, Reversible Data Hiding: Advances in the Past Two Decades, IEEE Access, 4, pp. 3210-3237, 2016.

9.        Z. Qian, X. Zhang, and G. Feng, Reversible Data Hiding in Encrypted Images Based on Progressive Recovery, IEEE Signal Processing Letters, 23(11), pp. 1672-1676, 2016.

10.    J. Yu, F. Li, H. Cheng, and X. Zhang, Spatial Steganalysis Using Contrast of Residuals, IEEE Signal Processing Letters, 23(7), pp. 989-992, 2016.

11.    Z. Wang, X. Zhang, and Z. Yin, Hybrid Distortion Function for JPEG Steganography, Journal of Electronic Imaging, 25(5), 050501, 2016.

12.    Z. Qian, X. Zhang, Y. Ren, and G. Feng, Block Cipher Based Separable Reversible Data Hiding in Encrypted Images, Multimedia Tools and Applications, 75(21), pp. 13749-13763, 2016.

13.    H. Cheng, X. Zhang, and J. Yu, AC-Coefficient Histogram-Based Retrieval for Encrypted JPEG Images, Multimedia Tools and Applications, 75(21), pp. 13791-13803, 2016.

14.    J. Yu, X. Zhang, and F. Li, Spatial Steganalysis Using Redistributed Residuals and Diverse Ensemble Classifier, Multimedia Tools and Applications, 75(21), pp. 13613-13625, 2016.

15.    C. Qin, H. Wang, X. Zhang, and X. Sun, Self-Embedding Fragile Watermarking Based on Reference-Data Interleaving and Adaptive Selection of Embedding Mode, Information Sciences, 373, pp. 233-250, 2016.

16.    C. Qin, X. Chen, J. Dong, and X. Zhang, Perceptual Image Hashing with Selective Sampling for Salient Structure Features, Displays, 45, pp. 26-37, 2016.

17.    F. Li, X. Zhang, J. Yu, and H. Cheng, Digital Image Steganalysis Based on Local Textural Features and Double Dimensionality Reduction, Security and Communication Networks, 9(8), pp. 729-736, 2016.

18.    H. Cheng, X. Zhang, J. Yu, and Y. Zhang, Encrypted JPEG Image Retrieval Using Block-wise Feature Comparison, Journal of Visual Communication and Image Representation, 40, pp. 111-117, 2016.

19.    Z. Qian, S. Dai, F. Jiang, and X. Zhang, Improved Joint Reversible Data Hiding in Encrypted Images, Journal of Visual Communication and Image Representation, 40, pp. 732-738, 2016.

20.    J. Long, Z. Yin, J. Lv and X. Zhang, Rotation Based Reversible Data Hiding for JPEG Images, IETE Technical Review, 33(6), pp. 607-614, 2016.

21.    Y. Ren, N. Ding, X. Zhang, H. Lu, and D. Gu, Identity-Based Encryption with Verifiable Outsourced Revocation, The Computer Journal, 59(11), pp. 1659-1668, 2016.

22.    L. Du, X. Cao, W. Zhang, X. Zhang, N. Liu, and J. Wei, Semi-fragile Watermarking for Image Authentication Based on Compressive Sensing, Science China: Information Sciences, 59(5), pp. 059104:1-3, 2016.

23.    H. Cheng, X. Zhang, J. Yu, and F. Li, Markov Process-Based Retrieval for Encrypted JPEG Images, EURASIP Journal on Information Security, pp. 1-9, 2016.

24.    A. Wu, G. Feng, X. Zhang, and Y. Ren, Unbalanced JPEG Image Steganalysis via Multiview Data Match, Journal of Visual Communication and Image Representation, 32, pp. 103-107, 2016.

25.    X. Zhang, and W. Zhang, Semantic Image Compression Based on Data Hiding, IET Image Processing, 9(1), pp. 54-61, 2015.

26.    G. Feng, Y. Lan, X. Zhang, and Z. Qian, Dynamic Adjustment of Hidden Node Parameters for Extreme Learning Machine, IEEE Trans. on Cybernetics, 45(2), pp. 279-288, 2015.

27.    C. Qin, and X. Zhang, Effective Reversible Data Hiding in Encrypted Image with Privacy Protection for Image Content, Journal of Visual Communication and Image Representation, 31, pp. 154-164, 2015.

28.    Z. Qian, X. Zhang, and Y. Ren, JPEG Encryption for Image Rescaling in the Encrypted Domain, Journal of Visual Communication and Image Representation, 26(1), pp. 9-13, 2015.

29.    L. Shen, Z. Zhang, X. Zhang, P. An, and Z. Liu, Fast TU Size Decision Algorithm for HEVC Encoders Using Bayesian Theorem Detection, Signal Processing: Image Communication, 32, pp. 121-128, 2015.

30.    Y. Ren, S. Wang, X. Zhang, and M.-S. Hwang, An Efficient Batch Verifying Scheme for Detecting Illegal Signatures, International Journal of Network Security, 17(4), pp. 463-470, 2015.

31.    X. Zhang, Y. Ren, L. Shen, Z. Qian, and G. Feng, Compressing Encrypted Images with Auxiliary Information, IEEE Trans. on Multimedia, 16(5), pp. 1327-1336, 2014.

32.    X. Zhang, Z. Qian, G. Feng, and Y. Ren, Efficient Reversible Data Hiding in Encrypted Images, Journal of Visual Communication and Image Representation, 25(2), pp. 322-328, 2014.

33.    X. Zhang, C. Qin, and L. Shen, Efficient Wet Paper Embedding for Steganography with Multi-layer Construction, Annals of Telecommunications, 69, pp. 441-447, 2014.

34.    X. Zhang, G. Sun, L. Shen, and C. Qin, Compression of Encrypted Images with Multi-layer Decomposition, Multimedia Tools and Applications, 72, pp. 489-502, 2014.

35.    Z. Qian, X. Zhang, and S. Wang, Reversible Data Hiding in Encrypted JPEG Bitstream, IEEE Trans. on Multimedia, 16(5), pp. 1486-1491, 2014.

36.    F. Li, X. Zhang, J. Yu, and W. Shen, Adaptive JPEG Steganography with New Distortion Function, Annals of Telecommunications, 69, pp. 431-440, 2014.

37.    Z. Qian, and X. Zhang, Improved Anti-forensics of JPEG Compression, Journal of Systems and Software, 91, pp. 100-108, 2014.

38.    B. Chen, G. Feng, X. Zhang, and F. Li, Mixing High-Dimensional Features for JPEG Steganalysis with Ensemble Classifier, Signal, Image and Video Processing, 8(8), pp. 1475-1482, 2014.

39.    G. Feng, H. Zhang, and X. Zhang, Effective Feature Selection for Image Steganalysis Using Extreme Learning Machine, Journal of Electronic Imaging, 23(6), 063020, 2014.

40.    L. Shen, P. An, X. Zhang, and Z. Zhang, Adaptive Transform Size Decision Algorithm for High-Efficiency Video Coding Inter Coding, Journal of Electronic Imaging, 23(4), 043023, 2014.

41.    X. Han, Z. Qian, G. Feng, and X. Zhang, Reversible Data Hiding in Encrypted Images Based on Image Interpolation, International Journal of Digital Crime and Forensics, 6(3), pp. 16-29, 2014.

42.    Y. Ren, Z. Niu, and X. Zhang, Fully Anonymous Identity-based Broadcast Encryption without Random Oracles, International Journal of Network Security, 16(4), 256-264, 2014.

43.    R. Schmitz, S. Li, C. Grecos, and X. Zhang, Towards Robust Invariant Commutative Watermarking-Encryption Based on Image Histograms, International Journal of Multimedia Data Engineering and Management, 5(4), pp. 36-52, 2014.

44.    X. Zhang, Reversible Data Hiding with Optimal Value Transfer, IEEE Trans. on Multimedia, 15(2), pp. 316-325, 2013.

45.    X. Zhang, Commutative Reversible Data Hiding and Encryption, Security and Communication Networks, 6, pp. 1396-1403, 2013.

46.    Y. Zhao, S. Wang, X. Zhang, and H. Yao, Robust Hashing for Image Authentication Using Zernike Moments and Local Features, IEEE Trans. on Information Forensics & Security, 8(1), pp. 55-63, 2013.

47.    L. Shen, Z. Liu, X. Zhang, W. Zhao, and Z. Zhang, An Effective CU Size Decision Method for HEVC Encoders, IEEE Trans. on Multimedia, 15(2), pp. 465-470, 2013.

48.    F. Li, X. Zhang, B. Chen, and G. Feng, JPEG Steganalysis with High-Dimensional Features and Bayesian Ensemble Classifier, IEEE Signal Processing Letters, 20(3), pp. 233-236, 2013.

49.    G. Sun, X. Zhang, G. Li, and J. Yin, Robust Degraded Face Recognition with Novel Face Representation and Multi-scale Fusion, Optical Engineering, 52(7), 2013.

50.    Y. Ren, S. Wang, and X. Zhang, Practical Parallel Key-Insulated Encryption with Multiple Helper Keys, Computers and Mathematics with Applications, 65(9), pp. 1403-1412, 2013.

51.    C. Qin, C.-C. Chang, W.-B. Lee, and X. Zhang, A Secure Image Delivery Scheme with Regional Protection Capability Using Image Inpainting and Editing, The Imaging Science Journal, 61, pp. 509-517, 2013.

52.    X. Zhang, G. Feng, Y. Ren, and Z. Qian, Scalable Coding of Encrypted Images, IEEE Trans. on Image Processing, 21(6), pp. 3108-3114, 2012.

53.    X. Zhang, Separable Reversible Data Hiding in Encrypted Image, IEEE Trans. on Information Forensics & Security, 7(2), pp. 826-832, 2012.

54.    X. Zhang and S. Wang, Efficient Data Hiding with Histogram-Preserving Property, Telecommunication Systems, 49(2), pp. 179-185, 2012.

55.    H. Yao, S. Wang, Y. Zhao, and X. Zhang, Detecting Image Forgery Using Perspective Constraints, IEEE Signal Processing Letters, 19(3), pp. 123-126, 2012.

56.    G. Feng, Z. Qian, and X. Zhang, Evolutionary Selection Extreme Learning Machine Optimization for Regression, Soft Computing, 16(9), pp. 1485-1491, 2012.

57.    C. Qin, S. Wang, and X. Zhang, Simultaneous inpainting for image structure and texture using anisotropic heat transfer model, Multimedia Tools and Applications, 56(3), pp. 469-483, 2012.

58.    Z. Qian, and X. Zhang, Lossless Data Hiding in JPEG Bitstream, Journal of Systems and Software, 85(2), pp. 309-313, 2012.

59.    G. Feng, Z. Qian, and X. Zhang, Spectrum-Estimation Based Lossless Information Recovery for Sparse Array Patterns, Telecommunication Systems, 49(2), pp. 163-169, 2012.

60.    X. Zhang, Z. Qian, Y. Ren, and G. Feng, Watermarking with Flexible Self-Recovery Quality Based on Compressive Sensing and Compositive Reconstruction, IEEE Trans. on Information Forensics & Security, 6(4), pp. 1223-1232, 2011.

61.    X. Zhang, S. Wang, Z. Qian, and G. Feng, Reference Sharing Mechanism for Watermark Self-Embedding, IEEE Trans. on Image Processing, 20(2), pp. 485-495, 2011.

62.    X. Zhang, Lossy Compression and Iterative Reconstruction for Encrypted Image, IEEE Trans. on Information Forensics & Security, 6(1), pp. 53-58, 2011.

63.    X. Zhang, Reversible Data Hiding in Encrypted Image, IEEE Signal Processing Letters, 18(4), pp. 255-258, 2011.

64.    X. Zhang, S. Wang, and G. Feng, Reversible Visible Watermarking with Lossless Data Embedding Based on Difference Value Shift, Intelligent Automation and Soft Computing, 17(2), pp. 233-243, 2011.

65.    X. Zhang, S. Wang, Z. Qian, and G. Feng, Self-Embedding Watermark with Flexible Restoration Quality, Multimedia Tools and Applications, 54(2), pp. 385-395, 2011.

66.    Q. Wu, S. Wang, and X. Zhang, Log-Polar Based Scheme for Revealing Duplicated Regions in Digital Images, IEEE Signal Processing Letters, 18(10), pp. 559-562, 2011.

67.    Y. Ren, S. Wang, and X. Zhang, Improved Hierarchical Identity-Based Parallel Key-Insulated Encryption, Journal of Internet Technology, 12(4), pp. 647-658, 2011.

68.    C. Qin, F. Cao, and X. Zhang, Efficient Image Inpainting Using Adaptive Edge-Preserving Propagation, The Imaging Science Journal, 59(4), pp. 211-218, 2011.

69.    Z. Qian, G. Feng, X. Zhang, and S. Wang, Image Self-Embedding with High-Quality Restoration Capability, Digital Signal Processing, 21(2), pp. 278-286, 2011.

70.    Z. Tang, S. Wang, X. Zhang, W. Wei, and Y. Zhao, Lexicographical framework for image hashing with implementation based on DCT and NMF, Multimedia Tools and Applications, 52(2-3), pp. 325-345, 2011.

71.    Z. Tang, S. Wang, X. Zhang, and W. Wei, Structural Feature Based Image Hashing and Similarity Metric for Tampering Detection, Fundamenta Informaticae, 106(1), pp. 75-91, 2011.

72.    C. Kim, D. Shin, D. Shin, and X. Zhang, Improved Steganographic Embedding Exploiting Modification Direction in Multimedia Communications, Communications in Computer and Information Science, 186(1), pp. 130-138, 2011.

73.    X. Zhang, Efficient Data Hiding with Plus-Minus One or Two, IEEE Signal Processing Letters, 17(7), pp. 635-638, 2010.

74.    X. Zhang, S. Wang, Z. Qian, and G. Feng, Reversible Fragile Watermarking for Locating Tampered Blocks in JPEG Images, Signal Processing, 90(12), pp. 3026-3036, 2010.

75.    S. Wang, S. Huang, X. Zhang, and W. Wu, Hologram-Based Watermarking Capable of Surviving Print-Scan Process, Applied Optics, 49(7), pp. 1170-1178, 2010.

76.    W. Zhang, X. Zhang, and S. Wang, Near-Optimal Codes for Information Embedding in Gray-Scale Signals, IEEE Trans. on Information Theory, 56(3), pp. 1262-1270, 2010.

77.    H. J. Kim, C. Kim, Y. Choi, S. Wang, X. Zhang, Improved Modification Direction Methods, Computers and Mathematics with Applications, 60(2), pp. 319-325, 2010.

78.    W. Wei, S. Wang, X. Zhang, and Z. Tang, Estimation of Image Rotation Angle Using Interpolation-Related Spectral Signatures with Application to Blind Detection of Image Forgery, IEEE Trans. on Information Forensics & Security, 5(3), pp. 507-517, 2010.

79.    Z. Qian, X. Zhang, G. Feng, and Y. Ren, Color Filter Array Interpolation Based Self Recovery with Anti-cropping Capability, International Journal of Multimedia Intelligence and Security, 1(2), pp. 191-203, 2010.

80.    C. Qin, Q. Mao, and X. Zhang, Image Watermarking Scheme With Unequal Protection Capability Based on Error Correcting Codes, Journal of Multimedia, 5(5), pp. 427-433, 2010.

81.    Y. Ren, D. Gu, S. Wang, and X. Zhang, New Fuzzy Identity Based Encryption Scheme in the Standard Model, Informatica, 21(3), pp. 393-407, 2010.

82.    Y. Ren, D. Gu, S. Wang, and X. Zhang, Hierarchical Identity-Based Proxy Re-encryption without Random Oracles, International Journal of Foundations of Computer Science, 21(6), pp. 1049-1063, 2010.

83.    X. Zhang and S. Wang, Fragile Watermarking Scheme Using a Hierarchical Mechanism, Signal Processing, 89(4), pp. 675-679, 2009.

84.    X. Zhang, S. Wang and W. Zhang, Steganography Combining Data Decomposition Mechanism and Stego-coding Method, Informatica, 33(1), pp. 41–48, 2009.

85.    X. Zhang and S. Wang, Fragile Watermarking with Error-Free Restoration Capability, IEEE Trans. on Multimedia, 10(8), pp. 1490-1499, 2008.

86.    X. Zhang, S. Wang, and Z. Zhou, Multibit Assignment Steganography in Palette Images, IEEE Signal Processing Letters, 15, pp. 553-556, 2008.

87.    Z. Tang, S. Wang, X. Zhang, W. Wei, and S. Su, Robust Image Hashing for Tamper Detection Using Non-Negative Matrix Factorization, Journal of Ubiquitous Convergence and Technology, 2(1), pp. 18-26, 2008.

88.    X. Zhang, W. Zhang, and S. Wang, Integrated Encoding with High Efficiency for Digital Steganography, Electronics Letters, 43(22), pp. 1191-1192, 2007.

89.    W. Zhang, X. Zhang, and S. Wang, A Double Layered “Plus-Minus One” Data Embedding Scheme, IEEE Signal Processing Letters, 14(11), pp. 848-851, 2007.  

90.    X. Zhang and S. Wang, Statistical Fragile Watermarking Capable of Locating Individual Tampered Pixels, IEEE Signal Processing Letters, 14(10), pp. 727-730, 2007.

91.    W. Zhang, S. Wang, and X. Zhang, Improving Embedding Efficiency of Covering Codes for Applications in Steganography, IEEE Communications Letters, 11(8), pp. 680-682, 2007.

92.    X. Zhang, W. Zhang and S. Wang, Efficient Double-Layered Steganographic Embedding, Electronics Letters, 43(8), pp. 482-483, 2007.

93.    X. Zhang and S. Wang, Watermarking Scheme Capable of Resisting Sensitivity Attack, IEEE Signal Processing Letters, 14(2), pp. 125-128, 2007.

94.    X. Zhang and S. Wang, Image Restoration Using Truncated SVD Filter Bank Based on an Energy Criterion, IEE Proceedings - Vision, Image & Signal Processing, 153(6), pp. 825-836, 2006.

95.    X. Zhang and S. Wang, Efficient Steganographic Embedding by Exploiting Modification Direction, IEEE Communications Letters, 10(11), pp. 781-783, 2006.

96.    X. Zhang and S. Wang, Dynamical Running Coding in Digital Steganography, IEEE Signal Processing Letters, 13(3), pp. 165-168, 2006.

97.    X. Zhang and S. Wang, Stego-Encoding with Error Correction Capability, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E88-A(12), pp. 3663-3667, 2005.

98.    X. Zhang and S. Wang, Steganography Using Multiple-Base Notational System and Human Vision Sensitivity, IEEE Signal Processing Letters, 12(1), pp. 67-70, 2005.

99.    X. Zhang and S. Wang, Invertibility Attack against Watermarking Based on Forged Algorithm and a Countermeasure, Pattern Recognition Letters, 25(8), pp. 967-973, 2004.

100.X. Zhang and S. Wang, Vulnerability of Pixel-Value Differencing Steganography to Histogram Analysis and Modification for Enhanced Security, Pattern Recognition Letters, 25(3), pp. 331-339, 2004.

101.X. Zhang and S. Wang, Watermarking Scheme Capable of Resisting Attacks Based on Availability of Inserter, Signal Processing, 82(11), pp. 1801-1804, 2002.

102.S. Wang and X. Zhang, Least Square Convolution Mask for Image Restoration, Journal of the Imaging Society of Japan, 41(4), pp. 392-397,  2002. 

103.S. Wang, X. Zhang, and T. Ma, Image Watermarking Using Dither Modulation in Dual-Transform Domain, Journal of the Imaging Society of Japan, 41(4), pp. 398-402,  2002. 

 

International Conference Papers:

1.         X. Zhang, Behavior Steganography in Social Network, In Advances in Intelligent Information Hiding and Multimedia Signal Processing: Proceeding of the Twelfth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2016), Nov. 21-23, Kaohsiung, Taiwan, Nov. 2016, Springer vol.1, pp. 21-23, 2017.

2.         Z. Qian, H. Zhou, W. Zhang, and X. Zhang, Robust Steganography Using Texture Synthesis, In Advances in Intelligent Information Hiding and Multimedia Signal Processing: Proceeding of the Twelfth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2016), Nov. 21-23, Kaohsiung, Taiwan, Nov. 2016, Springer vol.1, pp. 25-33, 2017.

3.         X. Niu, Z. Yin, X. Zhang, J. Tang, and B. Luo, Reversible Data Hiding in Encrypted AMBTC Compressed Images, Proceedings of 15th International Workshop on Digital-forensics and Watermarking (IWDW2016), Beijing, China, September 17-19, 2016.

4.         Z. Wang, J. Lv, Q. Wei, and X. Zhang, Distortion Function for Spatial Image Steganography Based on the Polarity of Embedding Change, Proceedings of 15th International Workshop on Digital-forensics and Watermarking (IWDW2016), Beijing, China, September 17-19, 2016.

5.         Z. Qian, X. Zhang, W. Zhang, and Y. Wang, Reversible Contrast Enhancement, Proceedings of Second International Conference on Cloud Computing and Security (ICCCS 2016), Nanjing, China, July 29-31, Lecture Notes in Computer Science, 10039, 2016, pp. 18-27.

6.         Y. Ren, N. Ding, X. Zhang, H. Lu, and D. Gu,Verifiable Outsourcing Algorithms for Modular Exponentiations with Improved Checkability, Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security (AsiaCCS 2016), Xi'an, China, May 30 - June 3, 2016, pp. 293-303.

7.         Z. Yin, A. Abel, X. Zhang, and B. Luo, Reversible Data Hiding in Encrypted Images Based on Block Histogram Shifting, Proceedings of 41st IEEE International Conference on Acoustics, Speech and Signal Processing, Shanghai, China, 2016, pp. 2129-2133.

8.         X. Zhang, Z. Wang, J. Yu, and Z. Qian, Reversible visible watermark embedded in encrypted domain, Proceedings of 3rd IEEE China Summit & International Conference on Signal and Information Processing (ChinaSIP), Chengdu, China, 2015, pp. 826-830.

9.         H. Chen, X. Zhang, J. Yu, and F. Li, Markov Process Based Retrieval for Encrypted JPEG Images, Proceedings of 10th International Conference on Availability, Reliability and Security (ARES 2015), Toulouse, France, August 24-27, 2015, pp. 417-421.

10.     Y. Zhang, X. Zhang, C. Qin, and J. Yu, Multiple Description Coding for Encrypted Images, Proceedings of the 11th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2015), Adelaide, Australia, Sep. 23-25, 2015, pp. 85-88.

11.     R. Schmitz, S. Li, C. Grecos, and X. Zhang, Content-Fragile Commutative Watermarking-Encryption Based on Pixel Entropy, Proceedings of 16th International Conference on Advanced Concepts for Intelligent Vision Systems (ACIVS 2015), Lecture Notes in Computer Science, 9386, Catania, Italy, October 26-29, 2015, pp. 474-485.

12.     Z. YinH. WangH. ZhaoB. Luo, and X. Zhang, Complete Separable Reversible Data Hiding in Encrypted Image, Proceedings of First International Conference on Cloud Computing and Security (ICCCS 2015), Nanjing, China, August 13-15, 2015, pp. 101-110.

13.     X. Zhang, and H. Cheng, Histogram-Based Retrieval for Encrypted JPEG Images, Proceedings of 2nd IEEE China Summit & International Conference on Signal and Information Processing (ChinaSIP), Xi'an, China, July 9-13, 2014, pp. 446-449.

14.     R. Schmitz, S. Li, C. Grecos, and X. Zhang, Towards More Robust Commutative Watermarking-Encryption of Images, Proceedings of 2013 IEEE International Symposium on Multimedia (ISM13), California, USA, Dec. 9-11, 2013, pp. 283-286.

15.     Z. Qian, X. Han, and X. Zhang, Separable Reversible Data hiding in Encrypted Images by n-nary Histogram Modification, Proceedings of 3rd International Conference on Multimedia Technology (ICMT 2013), Guangzhou, China, Nov. 29-Dec. 1, 2013, pp. 869-876.

16.     X. Zhang, G. Sun, and C. Qin, Reversible Data Hiding in Encrypted Images Using Pseudorandom Sequence Modulation, Proceeding of the 11th International Workshop on Digital-Forensics Watermark (IWDW 2012), Shanghai, China, Oct. 31-Nov. 02, 2012, Lecture Notes in Computer Science, 7809, pp. 358-367, 2013.

17.     Y. Ren, S. Wang, and X. Zhang, Anonymous Hierarchical Identity-Based Encryption in Prime Order Groups, Proceedings of the 3rd International Conference on Data & Knowledge Engineering (ICDKE 2012), Lecture Notes in Computer Science, 7696, Wuyishan, Fujian, China, Nov. 21-23, 2012, pp. 230-242.

18.     Z. Qian, W. Wang, and X. Zhang, Generalized Quality Assessment of Blocking Artifacts for Compressed Images, Proceedings of 9th International Forum on Digital TV and Wireless Multimedia Communication (IFTC 2012), Communications in Computer and Information Science, 331, Shanghai, China, Nov. 9-10, 2012, pp. 110-116.

19.     Z. Qian, and X. Zhang, Analysis of Matrix Embedding with Error Correction Capabilities, Proceedings of the 4th International Conference on Multimedia Information Networking & Security (MINES 2012), Nov. 2-4, 2012, pp. 740-743, Nanjing, China.

20.     Y. Ren, S. Wang, and X. Zhang, Non-interactive Dynamic Identity-Based Broadcast Encryption without Random Oracles, Proceedings of the 14th International Conference on Information & Communications Security (ICICS 2012), Lecture Notes in Computer Science, 7618, Hongkong, China, Oct. 29-31, 2012, pp. 479-487.

21.     R. Schmitz, S. Li, C. Grecos, and X. Zhang, A New Approach to Commutative Watermarking-Encryption, Proceedings of the 13th IFIP TC6/TC11 International Conference on Communications and Multimedia Security (CMS12), Lecture Notes in Computer Science, 7394, Canterbury, UK, Sept. 3-5, 2012, pp. 117-130.

22.     G. Li, G. Sun, and X. Zhang, Robust Face Recognition in Low Resolution and Blurred Image Using Joint Information in Space and Frequency, Proceedings of the 9th IFIP International Conference on Network and Parallel Computing (NPC 2012), Lecture Notes in Computer Science, 7513, Gwangju, Korea, Sept. 6-8, 2012, pp. 622-630.

23.     L. Hou, W. Wu, S. Yang, T. Yang, X. Zhang, Subjective and Objective Quality Assessment of Re-Sampling Audio, Proceedings of International Conference on Audio, Language and Image Processing (ICALIP 2012), July 2012, pp.324-327, Shanghai, China.

24.     X. Zhang, Z. Qian, F. Li, G. Feng, and Y. Ren, Efficient Data Hiding with High Payload, Proceedings of the 3rd International Conference on Multimedia Information Networking & Security (MINES 2011), Nov 4-6, 2011, pp. 318-321, Shanghai, China.

25.     Y. Ren, S. Wang, X. Zhang, and Z. Qian, Fully Secure Ciphertext-Policy Attribute-Based Encryption with Constant Size Ciphertext, Proceedings of the 3rd International Conference on Multimedia Information Networking & Security (MINES 2011), Nov. 4-6, 2011, pp. 380-384, Shanghai, China.

26.     X. Zhang, Y. Ren, G. Feng, and Z. Qian, Compressing Encrypted Image Using Compressive Sensing, Proceedings of the 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2011), Oct. 14-16, 2011, pp. 222-225, Dalian, China.

27.     H. Mao, G. Feng, X. Zhang, and H. Yao, A Robust and Fast Video Fingerprinting Based on 3D-DCT and LSH, Proceedings of the 2011 International Conference on Multimedia Technology (ICMT 2011), July 26-28, 2011, pp. 108-111, Hangzhou, China.

28.     F. Li, L. Shi, X. Zhang, and Y. Chen, Data Embedding with Multi-ary Tree Coding, Proceedings of the 2011 International Conference on Multimedia Technology (ICMT 2011), July 26-28, 2011, pp. 267-270, Hangzhou, China.

29.     L. Shi, F. Li, Y. Chen, and X. Zhang, Steganographic Embedding in JPEG Images with Visual Criterion, Proceedings of the 2011 International Conference on Multimedia Technology (ICMT 2011), July 26-28, 2011, pp. 743-746, Hangzhou, China.

30.     H. Liu, G. Liao, X. Zhang, Z. Xu, Visually Optimized High-Quality JPEG Steganography, Proceedings of the 2nd International Conference on Image Analysis and Signal Processing (IASP 2010), Xiamen, China, April 12-14, 2010, pp. 77-81.

31.     Y. Ren, S. Wang, X. Zhang, and Z. Qian, Identity-Based Parallel Key-Insulated Encryption with Multiple Long-Term Keys, Proceedings of 2010 International Colloquium on Computing, Communication, Control, and Management (CCCM 2010), IEEE Technology Management Council, Yangzhou, China, Aug. 2010, pp. 376-379.

32.     K. Xu, X. Zhang, and S. Wang, VoE Based Steganalysis on LSB Matching in Raw Images, Proceedings of the 2nd International Conference on Multimedia and Computational Intelligence (ICMCI 2010), Wuhan, China, Sept. 29-30, 2010, pp. 492-495.

33.     Y. Ren, S. Wang, X. Zhang, and Z. Qian, Fully Secure Anonymous Identity-Based Encryption under Simple Assumptions, Proceedings of the 2010 International Conference on Multimedia Information Networking and Security (MINES 2010), Nanjing, China, Nov. 4–6, 2010, pp. 428-432.

34.     C. Qin, J.-H. Li, W.-B. Lee, and X. Zhang, Secure Image Delivery Scheme Using Poisson Editing, Proceedings of the 2010 International Conference on Multimedia Information Networking and Security (MINES 2010), Nanjing, China, Nov. 4–6, 2010, pp. 902-906.

35.     Z. Fang, S. Wang, and X. Zhang, Image Splicing Detection Using Color Edge Inconsistency, Proceedings of the 2010 International Conference on Multimedia Information Networking and Security (MINES 2010), Nanjing, China, Nov. 4–6, 2010, pp. 923-926.

36.     Q. Wu, S. Wang, and X. Zhang, Detection of Image Region-Duplication with Rotation and Scaling Tolerance, Proceedings of the 2nd International Conference on Computational Collective Intelligence (ICCCI 2010), Lecture Notes in Computer Science, 6421, Springer-Verlag, Kaohsiung, Taiwan, Nov. 10-12, 2010, pp. 100-108.

37.     G. Liao, and X. Zhang, A Reversible Data Hiding for JPEG Images, Proceedings of the 2010 International Conference on Electrical Engineering and Automatic Control (ICEEAC 2010), Zibo, China, Nov. 26-28, 2010, pp. 448-451.

38.     H. Yao, S. Wang and X. Zhang, Detect Piecewise Linear Contrast Enhancement and Estimate Parameters using Spectral Analysis of Image Histogram, Proceedings of 2009 IET International Communication Conference on Wireless Mobile & Computing, Shanghai, China, December 2009, pp. 94-97.

39.     S. Li, A. C. Kot, X. Zhang, Data Hiding in Images Based on Tolerable Error Range, Proceedings of the 7th International Conference on Information, Communications and Signal Processing (ICICS 2009), Macau, China, December 2009, pp. 1-5.

40.     X. Zhang, W. Zhang, and S. Wang, Steganography with Histogram-Preserving and Distortion-Constraining Properties, Proceedings of the First International Conference on Multimedia Information Networking & Security (MINES 2009), Wuhan, China, Nov 18-20, 2009, pp. 30-34.

41.     Z. Fang, S. Wang, and X. Zhang, Image Splicing Detection Using Camera Characteristic Inconsistency, Proceedings of the First International Conference on Multimedia Information Networking & Security (MINES 2009), Wuhan, China, Nov 18-20, 2009, pp. 20-24.

42.     C. Qin, Q. Mao, and X. Zhang, Image Watermarking With Unequal Error Protection Capability, Proceedings of the First International Conference on Multimedia Information Networking & Security (MINES 2009), Wuhan, China, Nov 18-20, 2009, pp. 81-84.

43.     Z. Qian, X. Zhang, and S. Wang, Matrix Selection for High Payload Embedding, Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2009), Kyoto, Japan, Sep. 12-14, 2009, pp. 328-331.

44.     X. Zhang, S. Wang, and G. Feng, Fragile Watermarking Scheme with Extensive Content Restoration Capability, Proceeding of the 8th International Workshop on Digital Watermark (IWDW 2009), Guildford, UK, August 24-26, 2009, pp. 268-278, Lecture Notes in Computer Science, 5703, pp. 268-278.

45.     Z. Tang, S. Wang, X. Zhang, and W. Wei, Perceptual Similarity Metric Resilient to Rotation for Application in Robust Image Hashing, Proceedings of the 3rd International Conference on Multimedia and Ubiquitous Engineering (MUE 2009), Qingdao, China, June 4-6, 2009, pp.183-188.

46.     X. Zhang, S. Wang, and W. Zhang, Efficient Steganography Based on a Data Decomposition Mechanism, Proceedings of the International Workshop on Multimedia Security in Communication (MUSIC'08), Hangzhou, China, August 28, 2008.

47.     C. Qin, S. Wang, and X. Zhang, Image Editing without Color Inconsistency Using Modified Poisson Equation, Proceedings of the Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2008), Harbin, China, August 15-17, 2008, pp.397-401.

48.     W. Zhang, X. Zhang, and S. Wang, Twice Grid Colorings in Steganography, Proceedings of the Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2008), Harbin, China, August 15-17, 2008, pp.1301-1304.

49.     Q. Li, S. Wang, and X. Zhang, Hierarchical Identification of Visually Salient Image Regions, Proceedings of International Conference on Audio, Language and Image Processing (ICALIP 2008), Shanghai, China, July 2008, pp.1709-1712.

50.     C.-C. Chang, X. Zhang, and S. Wang, Generalized Running Coding for Efficient Data Hiding, Proceedings of International Conference on Audio, Language and Image Processing (ICALIP 2008), Shanghai, China, July 2008, pp.490-494.

51.     W. Zhang, X. Zhang, and S. Wang, Maximizing Steganographic Embedding Efficiency by Combining Hamming Codes and Wet Paper Codes, Proceedings of the 10th Information Hiding Workshop (IH 2008), Santa Barbara, USA, May 2008, pp. 61-73.

52.     C. Qin, C. Liu, S. Wang, and X. Zhang, Simultaneous Inpainting of Image Structure and Texture with PDE, Proceedings of the 6th International Conference on Imaging Science and Hardcopy (ICISH’08), Zhanjiang, China, Jan. 2008, pp. 40-42.

53.     S. Wang, and X. Zhang, Attacks on Perceptual Image Hashing, Proceedings of 2nd International Conference on Ubiquitous Information Technologies and Applications, Bali, Indonesia, Dec. 2007, pp. 199-203.

54.     C.-C. Wang, C.-C. Chang, X. Zhang, and J.-K. Jan, Senary Huffman Compression - A Reversible Data Hiding Scheme for Binary Images, Proceedings of International Workshop on Multimedia Content Analysis and Mining (MCAM’07), Lecture Notes in Computer Science, 4577, Weihai, China, June 2007, pp.351-360.

55.     C. Qin, W.-B. Lee, X. Zhang, and S. Wang, Copyright Management Using Progressive Image Delivery, Visible Watermarking and Robust Fingerprinting, 9th Int. Conf. Control, Automation, Robotics and Vision (ICARCV 2006), Singapore, Dec. 2006, pp. 1766-1769.

56.     C. Chen, S. Wang, and X. Zhang, Information Hiding in Text Using Typesetting Tools with Stego-Encoding, First International Conference on Innovative Computing, Information and Control (ICICIC'06) - Volume I, Beijing, China, Aug. 2006, pp. 459-462.

57.     X. Zhang and S. Wang, Information Capacity of Quantization Steganography in the Presence of Active Attack, Proceedings of the 12th International Multi-Media Modelling Conference (MMM2006), Beijing, China, Jan. 2006, pp. 385-388.

58.     X. Zhang and S. Wang, Watermarking Protocol Compatible with Secret Algorithms for Resisting Invertibility Attack, Knowledge-Based Intelligent Information and Engineering Systems, Lecture Notes in Artificial Intelligence, 3682, Melbourne, Australia, Sep. 2005, pp. 1134-1144.

59.     X. Zhang and S. Wang, Analysis of Parity Assignment Steganography in Palette Images, Knowledge-Based Intelligent Information and Engineering Systems, Lecture Notes in Artificial Intelligence, 3683, Melbourne, Australia, Sep. 2005, pp. 1025-1031.

60.     X. Zhang and S. Wang, A New Watermarking Scheme against Inserter-Based Attacks Suitable for Digital Media with Moderate Size, Proceedings of the Third International Conference on Information Security, Shanghai, China, Nov. 2004, pp. 247-248.

61.     X. Zhang, S. Wang, and K. Zhang, Steganography with Least Histogram Abnormality, Computer Network Security, Lecture Notes in Computer Science, 2776, St. Petersburg, Russia, Sep. 2003, pp. 395-406.

62.     X. Zhang, S. Wang, and K. Zhang, Multi-bit Watermarking Scheme Based on Addition of Orthogonal Sequences, Computer Network Security, Lecture Notes in Computer Science, 2776, St. Petersburg, Russia, Sep. 2003, pp. 407-418.

63.     S. Wang, X. Zhang, and K. Zhang, Data Hiding in Digital Audio by Frequency Domain Dithering, Computer Network Security, Lecture Notes in Computer Science, 2776, St. Petersburg, Russia, Sep. 2003, pp. 383-394.

64.     K. Zhang, S. Wang, and X. Zhang, Detection and Removal of Hidden Data in Images Embedded with Quantization Index Modulation, Computer Network Security, Lecture Notes in Computer Science, 2776, St. Petersburg, Russia, Sep. 2003, pp. 360-370.

65.     X. Zhang and S. Wang, A Novel Deconvolution Approach to Image Restoration, Second International Conference on Image and Graphics, Proceedings of SPIE, 4875, Hefei, China, Aug. 2002, pp. 103-110.

66.     K. Zhang, S. Wang, and X. Zhang, A New Metric for Quality Assessment of Digital Images Based on Weighted-Mean Square Error, Second International Conference on Image and Graphics, Proceedings of SPIE, 4875, Hefei, China, Aug. 2002, pp. 491-497.

67.     S. Wang and X. Zhang, Least Square Convolution Mask for Image Restoration, in Proceedings of International Congress of Image Science 2002 (ICIS’02), Tokyo, Japan, May 2002, pp. 688-689.

68.     X. Zhang, K. Zhang, and S. Wang, Watermarking with Identifiability of Embedding Order, Proceedings of International Congress of Image Science 2002 (ICIS’02), Tokyo, Japan, May 2002, pp. 608-609.

69.     X. Zhang, K. Zhang, and S. Wang, Multispectral Image Watermarking Based on KLT, Image Compression and Encryption Technologies, Proceedings of SPIE, 4551,Wuhan, China, Oct. 2001, pp. 107-114.

 

中文期刊论文:

1.         辛昕,钱振兴,张新鹏,代舒,基于安全水印的三方交易系统,应用科学学报,33(6), pp. 575-584, 2015.

2.         吕金鹏,梁海华,张新鹏,混合进制嵌入的调色板图像无损信息隐藏,应用科学学报,33(6), pp. 290-298, 2015.

3.         徐淼,程航,余江,张新鹏,基于新的失真代价函数的自适应JPEG隐写,应用科学学报,33(3), pp. 637-643, 2015.

4.         栗风永张新鹏结合通道共生和选择集成的彩色图像隐写分析,中国图象图形学报,20(5), pp. 609-617, 2015.

5.         韩喜玉,钱振兴,张新鹏,姜飞,按需发送的加密图像中的可逆信息隐藏,应用科学学报,33(1), pp. 50-58, 2015.

6.         张晓琳,方针,张新鹏,利用通道间相关性的CFA图像取证,应用科学学报,33(1), pp. 87-94, 2015.

7.         王子驰,张媛,张新鹏,多比特嵌入的加密图像中可逆信息隐藏方法,小型微型计算机系统,35(10), pp. 2331-2335, 2014.

8.         杨乾星,栗风永,张新鹏,申文峰,基于DCT系数修改的自适应稳健可逆信息隐藏,tyc1286太阳集团学报,20(5), pp. 605-611, 2014.

9.         栗风永,张新鹏,余江,结合集成比例训练的彩色JPEG图像隐写分析电子与信息学报,36(1), pp. 114-120, 2014.

10.     任慧,栗风永,张新鹏,余江,结合重排序和直方图平移的调色板图像可逆信息隐藏,tyc1286太阳集团学报,19(3), pp. 254-258, 2013.

11.     马志鹏,栗风永,张新鹏,基于汉明码与从属像素补偿的半色调图像信息隐藏,tyc1286太阳集团学报,19(2), pp. 111-115, 2013.

12.     乔通,钱振兴,张新鹏,王文文,基于局部能量方差特性的数字图像取证,模式识别与人工智能,25(2), pp. 280-284, 2012.

13.     张新鹏,刘焕,张颖春,王朔中,融合方向编码和湿纸编码的高效信息隐藏,tyc1286太阳集团学报,16(1), pp. 1-4, 2010.

14.     郁志鸣、王朔中、张新鹏、刘婷婷,结合对比特性与局部清晰特性的图像显著区域检测,应用科学学报,28(1), pp. 24-31, 2010.

15.     秦川、王朔中、张新鹏基于各向异性热传导模型的自适应图像修复,仪器仪表学报,31(6), pp. 1303-1309, 2010.

16.     秦运龙孙广玲王朔中张新鹏,根据GOP异常进行视频序列剪辑篡改的盲检测,电子学报,38(7), pp. 1597-1602, 2010.

17.     王朔中、张新鹏张卫明,以数字图像为载体的隐写分析研究进展,计算机学报,32(7), pp. 1247-1263, 2009.

18.     张卫明、王朔中、张新鹏基于嵌入影响变化率的灰度图像LSB匹配检测方法,计算机研究与发展,46(Suppl.1), pp. 188-191, 2009.

19.     秦运龙、孙广玲、张新鹏,利用运动矢量进行视频篡改检测,计算机研究与发展,46(Suppl.1), pp. 227-233, 2009.

20.     秦川、王朔中、张新鹏,针对Poisson方程图像编辑的篡改检测,计算机研究与发展,46(Suppl.1), pp. 234-238, 2009.

21.     唐振军、王朔中、魏为民、张新鹏,利用分块相似系数构造感知图像Hash,计算机研究与发展,46(Suppl.1), pp. 311-317, 2009.

22.     孙文颙、刘婷婷、张新鹏、王朔中,彩色图像通用隐写分析的多类统计特征,中国图象图形学报,13(10), pp. 1914-1917, 2008.

23.     李茜、王朔中、金秋明、张新鹏,兼顾视觉质量和载体图像无损重建的可见水印,中国图象图形学报,13(10), pp. 1947-1950, 2008.

24.     金秋明、王朔中、李茜、张新鹏,基于角点检测的稳健图像摘要,中国图象图形学报,13(8), pp. 1454-1458, 2008.

25.     李晟、张新鹏,利用JPEG压缩特性的合成图像检测,应用科学学报,26(3), pp. 281-287, 2008.

26.     孙文颙、张新鹏、王朔中,基于直方图差异的模型隐写分析,tyc1286太阳集团学报,14(2), pp. 111-115, 2008.

27.     张卫明、张新鹏、王朔中,适用于灰度级信号的数据嵌入方法,南京理工大学学报,32(2), pp. 209-213, 2008.

28.     张新鹏、王朔中,基于稀疏表示的密写编码,电子学报,35(10), pp. 1892-1896, 2007.

29.     张新鹏、王朔中、周振宇,对于抗敏感性攻击水印的强化攻击,东南大学学报,37(Sup.1), pp. 53-57, 2007.

30.     唐振军、魏为民、张新鹏、王朔中,用于图像检索的稳健Hash,东南大学学报,37(Sup.1), pp. 105-108, 2007.

31.     李晟、张新鹏、王朔中,基于可容忍失真的数字图像隐写,中国图象图形学报,12(2), pp. 212-217, 2007.

32.     刘春庆、梁光岚、王朔中、张新鹏,应用二值图像信息隐藏技术实现彩色图像中的安全隐写,应用科学学报,25(4), pp. 342-347, 2007.

33.     秦川、王朔中、张新鹏,一种基于视觉特性的图像摘要算法,中国图象图形学报,11(11), pp. 1678-1681, 2006.

34.     张新鹏、王朔中、陈超,不需权威第三方的非对称指纹方案,哈尔滨工业大学学报,38(增刊), pp. 727-730, 2006.

35.     陈超、王朔中、张新鹏,应用TeX控制功能和图像检测的文本密写,应用科学学报,24(2), pp. 115-119, 2006.

36.     张新鹏、王朔中,JPEG图像中的安全密写方案,电子与信息学报,27(11), pp. 1813-1817, 2005.

37.     周振宇、张新鹏、王朔中,抗随机几何攻击的音频水印方案,中国图象图形学报,10(11), pp. 1466-1470, 2005.

38.     张新鹏、王朔中,基于像素交换的无损信息隐藏,光电子·激光,16(8), pp. 956-960, 2005.

39.     张新鹏、王朔中,对空域BPCS密写的统计分析,计算机辅助设计与图形学学报,17(7), pp. 1625-1629, 2005.

40.     刘伟、王朔中、张新鹏,抗MP3编码的音频水印频域嵌入方案,应用科学学报,23(4), pp. 341-344, 2005.

41.     张新鹏、王朔中,对OPA密写的检测和增强安全性的调色板图像密写方案,电子学报,32(10), pp. 1702-1705, 2004.

42.     张新鹏、王朔中,抗可逆性攻击和嵌入器攻击的安全水印系统,中山大学学报(自然科学版),43(增刊2), pp. 10-13, 2004.

43.     刘伟、王朔中、张新鹏,一种基于部分MP3编码原理的音频水印,中山大学学报(自然科学版),43(增刊2), pp. 26-28, 2004.

44.     贾骏、王朔中、张新鹏,码分复用数字音频水印嵌入方案,上海交通大学学报,38(12), pp. 2073-2077, 2004.

45.     胡烨雯、张新鹏、王朔中,一种可估计最低位平面嵌入信息量的密写分析方法,上海交通大学学报,38(增刊), pp. 122-124, 2004.

46.     贾骏、王朔中、张新鹏,一种基于人耳听觉特性的数字音频水印方案,西安电子科技大学学报,31(4), pp. 652–656, 2004.

47.     张新鹏、王朔中、张开文,基于统计特性的LSB密写分析,应用科学学报,22(1), pp. 16-19, 2004.

48.     张新鹏、王朔中、张开文,基于视觉特性的多比特量化水印方案,光电子·激光,14(11), pp. 1179-1182, 2003.

49.     张新鹏、王朔中,JPEG图象中的无损信息隐藏,中国图象图形学报,8(特刊), pp. 563–566, 2003.

50.     张新鹏、王朔中、张开文,抗统计分析的LSB密写方案,中国图象图形学报,8(9), pp. 1055-1060, 2003.

51.     张开文、张新鹏、王朔中,图像及音频信号中隐蔽嵌入信息存在性的统计检验,电子与信息学报,25(7)871–877, 2003.

52.     张新鹏、王朔中、张开文,迭加与量化两种水印嵌入方案的比较及量化参数优化,光电子·激光,14(8), pp. 858-861, 2003.

 

【学术著作】

王朔中,张新鹏,张开文,数字密写和密写分析——互联网时代的信息战技术,清华大学出版社,北京,2005

 

【发明专利】

1.         张新鹏,王朔中,王威娜,基于灰度调整的无损信息隐藏方法,ZL200410067794.X,授权时间:20075

2.         周振宇,梁光岚,张新鹏,王朔中,路兴,数字图像中最不重要位替换信息隐藏的快速检测方法,ZL 200710038710.3,授权时间:200812

3.         陈轶,张新鹏,王朔中,魏为民,基于连“1”特性的JPEG图像再次编码检测方法,ZL 200810201976.1授权时间20108

4.         秦运龙,孙广玲,张新鹏,刘焕,王朔中,魏为民,一种基于压缩域的视频序列Copy-Move篡改检测方法,ZL 200910198209.2授权时间:201110

5.         魏为民,王朔中,张新鹏,唐振军,数字图像缩放因子的盲检测方法,ZL200810203981.4授权时间:201111

6.         黄素娟,王朔中,张新鹏,吴蔚,抗照片打印-扫描攻击和硬拷贝剪切的全息图像水印方法,申请号:200910046528.4,申请时间:20091

7.         刘焕,张新鹏,廖贵龙,张颖春,王朔中,魏为民,基于像素分组策略的可逆数据隐藏方法,申请号:200910196507.8,申请时间:20099

8.         施柳,栗风永,张新鹏,钱振兴,王朔中,机密信息的游动编码隐藏方法, ZL201110171393.9 授权时间:20152 

9.         余江,张新鹏,栗风永,王朔中,程航,基于载体图像校验码的加密域无损可逆信息隐藏方法, ZL201310198542.X授权时间:20165

10.     钱振兴,王文文,张新鹏,基于多尺度分解的压缩图像质量无参评估方法, ZL201310464607.0授权时间:20161

11.     程航,张新鹏,童人婷,徐淼,王子驰,基于JPEG图像交流系数直方图的密文域图像检索方法,申请号:201410591470.X,申请日期:201410

12.     钱振兴,吕梦琪,张新鹏,基于纹理合成的鲁棒隐写 ZL201610965782.1,申请时间:201611

 

【获奖情况】

张新鹏,王朔中,王怀清,网络环境下的信息隐藏与监控研究,上海市自然科学奖二等奖,2012

张新鹏,上海市新长征突击手,2009

张新鹏YOCSEF上海IT新锐奖,2009

张新鹏,tyc1286太阳集团十佳杰出青年,2009

张新鹏,tyc1286太阳集团优秀青年教师,2006

张新鹏,上海市优秀博士学位论文,2005

王朔中,吴光华,夏明一,孙达华,张新鹏,陶碧云,王威娜,李研,档案领域的数字水印技术应用研究与产品开发,上海市档案科技成果奖特等奖、国家档案局优秀科技成果奖三等奖,2004

 

【学术兼职】

《应用科学学报》,副主编

中国电子学会通信学分会多媒体安全专家委员会,专家委员

国家质检总局防伪技术专家

上海市计算机学会信息安全专业委员会,副主任委员

 

【国际期刊任职】

IEEE Trans. on Information Forensics & Security, Associate Editor

Intelligent Automation and Soft Computing, Associate Editor

Journal of Information Hiding and Multimedia Signal Processing, Associate Editor

International Journal of Information and Computer Science, Member of the editorial board

International Journal of Multimedia Intelligence and Security, Member of the editorial board

Conference Papers in Signal Processing, Member of the editorial board

Networking and Electronic Commerce Journal, Associate Editor

 

【国际期刊Guest Editor

1.         Special Issue on Multimedia Information Security and its Application in Cloud Computing, Multimedia Tools and Applications, 2017

2.         Special Issue on Real-Time Data Hiding and Visual Cryptography, Journal of Real-Time Image Processing, 2016

3.         Special Issue on Reversible Data Hiding for Digital Forensics, International Journal of Digital Crime and Forensics, 2014

 

【国际期刊审稿】

1.         IEEE Trans. Image Processing

2.         IEEE Trans. Information Forensics and Security

3.         IEEE Trans. Multimedia

4.         IEEE Trans. Circuits and Systems for Video Technology

5.         IEEE Trans. Systems, Man and Cybernetics

6.         IEEE Signal Processing Letters

7.         IEEE Communications Letters

8.         IEEE Communications Magazine

9.         IEEE Systems Journal

10.     IET Information Security

11.     IET Image Processing

12.     IEE Proc. Vision, Image & Signal Processing

13.     Optical Engineering

14.     Signal Processing

15.     Signal Processing: Image Communication

16.     Pattern Recognition

17.     Pattern Recognition Letters

18.     Neurocomputing

19.     Computers & Security

20.     Computers & Electrical Engineering

21.     Journal of Systems and Software

22.     Journal of Visual Communication and Image Representation

23.     Journal of Biomedical Informatics

24.     Journal of Applied Mathematics

25.     Journal of Information Security and Applications

26.     Image and Vision Computing

27.     Information Security Technical Report

28.     Digital Signal Processing

29.     Imaging Science Journal

30.     Multimedia Tools and Applications

31.     Evolving Systems

32.     Security and Communication Networks

33.     Annals of Telecommunications

34.     Informatica

35.     Journal of Electronic Imaging

36.     International Journal of Communication Systems

37.     International Journal of Computers and Applications

38.     International Journal on Intelligent Automation and Soft Computing

39.     International Journal of Multimedia Intelligence and Security

40.     International Journal of Computational Intelligence Systems

41.     International Journal of Image and Graphics

42.     EURASIP Journal on Information Security

43.     EURASIP Journal on Advances in Signal Processing

44.     EURASIP Journal on Image and Video Processing

45.     European Transactions on Telecommunications

46.     LNCS Trans. Data Hiding and Multimedia Security

47.     KSII Trans. Internet and Information Systems

48.     IETE Technical Review

49.     Journal of Information Science and Engineering

50.     IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

51.     The Scientific World Journal

52.     ETRI Journal

 

【国际学术会议大会特邀报告

1.         Reversible Data Hiding in Encrypted images, The 11th International Workshop on Digital-forensics and Watermarking (IWDW 2012), Shanghai, China

 

【国际学术会议TPC Chair

1.         The Third International Conference on Multimedia Information Networking and Security (MINES 2011), Shanghai, China

2.         IEEK CS International Symposium on Research in Ubiquitous and Multimedia Applications Systems (UMAS 2012), Gwangju, Korea

3.         IEEK CS International Symposium on Research in Ubiquitous and Multimedia Applications Systems (UMAS 2013), Daegu, Korea

 

【国际学术会议TPC Member

1.         The Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2007), Kaohsiung, Taiwan

2.         The 5th International Conference on Communications, Circuits And Systems (ICCCAS 2007), Xi’an, China

3.         The First International Workshop on Multimedia, Information Privacy and Intelligent Computing Systems (MPIS 2008), Yilan, Taiwan

4.         The 11th International Conference on Communications Technologies (ICCT 2008), Hangzhou, China

5.         The International Workshop on Recent Innovations and Breakthroughs in Cryptography (RIBC 2009), Fukuoka, Japan

6.         The Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2009), Kyoto, Japan

7.         The Fifth International Conference on Information Assurance and Security (IAS 09), Xi’an, China

8.         The International Conference on Multimedia Information Networking and Security (MINES 2009), Wuhan, China

9.         The Fourth International Conference on Genetic and Evolutionary Computing (ICGEC 2010), Shenzhen, China

10.     The Second International Conference on Multimedia Information Networking and Security (MINES 2010), Nanjing, China

11.     The FTRA 2010 International Workshop on Advanced Future Multimedia Services (AFMS 2010), Gwangju, Korea

12.     The IEEE International Conference on Multimedia and Expo (ICME 2011), Barcelona, Spain

13.     The Fifth International Conference on Genetic and Evolutionary Computing (ICGEC 2011), Kitakyushu, Japan

14.     The 10th International Workshop on Digital-forensics and Watermarking (IWDW 2011), Atlantic City, NJ, USA

15.     The IEEE International Conference on Multimedia and Expo (ICME 2012), Melbourne, Australia

16.     The 5th FTRA International Conference on Human-Centric Computing (HumanCom 2012), Gwangju, Korea

17.     The 2012 FTRA International Workshop on Advanced Future Multimedia Services (AFMS 2012), Jeju, Korea

18.     The 2012 FTRA International Conference on Advanced IT, engineering and Management (AIM 2012), Seoul, Korea

19.     The 15th International Conference on Network-Based Information Systems (NBiS-2012), Melbourne, Australia

20.     The 15th International Telecommunications Network Strategy and Planning Symposium (NETWORKS 2012), Rome, Italy

21.     Globecom 2012 - Communication and Information System Security Symposium (GC12 CISS), Anaheim, California, USA

22.     2012 FTRA International Conference on Advanced IT, engineering and Management (FTRA AIM Summer 2012), Jeju, Korea

23.     The 11th International Workshop on Digital-forensics and Watermarking (IWDW 2012), Shanghai, China

24.     The Second International Conference on Advances in Computing, Communications and Informatics (ICACCI 2013), Mysore, India

25.     The 2013 FTRA International Conference on Advanced IT, engineering and Management (FTRA AIM-13), Seoul, Korea

26.     The First IEEE China Summit & International Conference on Signal and Information Processing (ChinaSIP 2013), Bejing, China

27.     The 12th International Workshop on Digital-forensics and Watermarking (IWDW 2013), Auckland, New Zealand

28.     The 2014 International Symposium on Real-time Natural User Interface and Natural User eXperience (RNN 2014), Zhangjiajie, China

29.     The Third International Conference on Advances in Computing, Communications and Informatics (ICACCI 2014), Greater Noida, India

30.     The 5th FTRA International Conference on Creative Converged IT (CCIT 2014), Daejeon, Korea

31.     The 2014 FTRA International Advanced Multimedia Computing (AMC-14), Busan, Korea

32.     The Second IEEE China Summit & International Conference on Signal and Information Processing (ChinaSIP 2014), Xi’an, China

33.     The 13th International Workshop on Digital-forensics and Watermarking (IWDW 2014), Taipei, Taiwan

34.     The 7th FTRA International Conference on Human-centric Ubiquitous Computing and Applications (HumanCom-14), Ostrava, Czech Republic

35.     The 7th International Symposium on Cyberspace Safety and Security (CSS 2015), New York, USA

36.     The International Conference on Cloud Computing and Security (ICCCS 2015), Nanjing, China

37.     The 14th International Workshop on Digital-forensics and Watermarking (IWDW 2015), Tokyo, Japan

38.     The Third IEEE China Summit & International Conference on Signal and Information Processing (ChinaSIP 2015), Chengdu, China

39.     The 15th International Workshop on Digital-forensics and Watermarking (IWDW 2016), Beijing, China

 

 

Baidu
sogou