Information Hiding

The group mainly studies information hiding technology. We are particularly interested in 1) steganography for covert communication, including multimedia steganography, robust steganography and generative steganography, 2) digital and physical watermarking for copyright protection, including printing-resilient watermarking and deep-network-based watermarking schemes.

publication

  1. Securing Fixed Neural Network Steganography
    Z. Luo, S. Li, G. Li, Z. Qian, and X. Zhang
    MM '23: Proceedings of the 30th ACM International Conference on Multimedia, 2023.
  2. Cross-Modal Text Steganography Against Synonym Substitution-Based Text attack
    W. Peng, T. Wang, Z. Qian, S. Li, and X. Zhang
    IEEE Signal Processing Letters, 2023
  3. Breaking Robust Data Hiding in Online Social Networks
    P. Wei, Z. Zhu, G. Luo, Z. Qian, and X. Zhang
    IEEE Signal Processing Letters
  4. Image Sanitization in Online Social Networks: A General Framework for Breaking Robust Information Hiding
    Z. Zhu, P. Wei, Z. Qian, S. Li, and X. Zhang
    IEEE Transactions on Circuits and Systems for Video Technology
  5. STFF-SM: Steganalysis Model Based on Spatial and Temporal Feature Fusion for Speech Streams
    H. Tian, Y. Qiu, Z. Qian, H. Li, and H. Quan
    IEEE Transactions on Audio, Speech and Language Processing
  6. Hiding Images in Deep Probabilistic Models
    H. Chen, L. Song, Z. Qian, X. Zhang, and K. Ma
    Thirty-Sixth Conference on Neural Information Processing Systems (NeurIPS), 2022
  7. Image Generation Network for Covert Transmission in Online Social Network
    Z. You, Y. Qichao, S. Li, Z. Qian, and X. Zhang
    MM '22: Proceedings of the 30th ACM International Conference on Multimedia, 2022
  8. Hiding Function with Neural Networks
    Y. Guo, Z. Qian, and X. Zhang
    IEEE 24th International Workshop on Multimedia Signal Processing
  9. Hiding Images into Images with Real-world Robustness
    Q. Ying, H. Zhou, X. Zeng, H. Xu, Z. Qian, and X. Zhang
    IEEE ICIP, 2022
  10. ACM MM
    Generative Steganography Network
    P. Wei, S. Li, X. Zhang, G. Luo, Z. Qian, and Q. Zhou
    MM '22: Proceedings of the 30th ACM International Conference on Multimedia, 2022
  11. Generative Steganographic Flow
    P. Wei, G. Luo, Q. Song, X. Zhang, Z. Qian, and S. Li
    IEEE International Conference on Multimedia and Expo (ICME), 2022, Taipei
  12. JPEG Steganography with Content Similarity Evaluation
    Z. Wang, G. Feng, Z. Qian, and X. Zhang
    IEEE Transactions on Cybernetics, accepted.
  13. Image Steganalysis with Convolutional Vision Transformer
    G. Luo, P. Wei, S. Zhu, X. Zhang, Z. Qian, and Sheng Li
    2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2022
  14. Batch Steganography via Generative Network
    N. Zhong, Z. Qian, Z. Wang, X. Zhang, and X. Li
    IEEE Transactions on Circuits and Systems for Video Technology
  15. Destroying Robust Steganography in Online Social Networks
    Z. Zhu, S. Li, Z. Qian, and X. Zhang
    Information Sciences
  16. Diversity-based Cascade Filters for JPEG Steganalysis
    G. Feng, X. Zhang, Y. Ren, Z. Qian, and S. Li
    IEEE Transactions on Circuits and Systems for Video Technology
  17. How to Extract Image Features based on Co-occurrence Matrix Securely and Efficiently in Cloud Computing
    Y. Ren, X. Zhang, G. Feng, Z. Qian, and F. Li
    IEEE Transactions on Cloud Computing
  18. Practical Cover Selection for Steganography
    Z. Wang, X. Zhang, and Z. Qian
    IEEE Signal Processing Letters, 27
  19. Steganography in Animated Emoji Using Self-Reference
    Z. Zhu, Q. Ying, Z. Qian, and X. Zhang
    Multimedia Systems
  20. A New Steganography Method for Dynamic GIF Images Based on Palette Sort
    J. Lin, Z. Qian, Z. Wang, X. Zhang, and G. Feng
    Wireless Communications and Mobile Computing, accepted.
  21. Defeating data hiding in social networks using generative adversarial network
    H. Wang, Z. Qian, G. Feng, and X. Zhang
    EURASIP Journal on Image and Video Processing, 2020
  22. Adaptive Steganalysis Based on Statistical Model of Quantized DCT Coefficients for JPEG Images
    T. Qiao, X. Luo, T. Wu, M. Xu, and Z. Qian
    IEEE Transactions on Dependable and Secure Computing
  23. Steganography in Stylized Images
    N. Zhong, Z. Qian, Z. Wang, and X. Zhang
    Journal of Electronic Imaging
  24. Distortion Function for Emoji Image Steganography
    L. Shi, Z. Wang, Z. Qian, N. Huang, P. Puteaux and X. Zhang
    Computers, Materials & Continua
  25. Steganography in Beautified Images
    L. Liu, Z. Wang, Z. Qian, X. Zhang, and G. Feng
    Mathematical Biosciences and Engineering
  26. On Improving Distortion Functions for JPEG Steganography
    Z. Wang, Z. Qian, X. Zhang, M. Yang, and D. Ye
    IEEE Access
  27. Distortion Function for Steganography in Texture Synthesized Images
    L. Shi, Z. Wang, Z. Qian, and X. Zhang
    In: Pan JS.
  28. Constructive Steganography Using Texture Synthesis
    Z. Qian, N. Huang, S. Li, and X. Zhang
    IETE Technical Review
  29. Targeted Attack and Security Enhancement on Texture Synthesis Based Steganography
    H. Zhou, K. Chen, W. Zhang, Z. Qian, and N. Yu
    Journal of Visual Communication and Image Representation
  30. Multimedia Security: Novel Steganography and Privacy Preserving
    Z. Qian, K. K. R. Choo, R. Cogranne, and X. Zhang
    Security and Communication Networks, 2018
  31. Robust steganography using texture synthesis
    Z. Qian, H. Zhou, W. Zhang, and X. Zhang
    in: Proceeding of the Twelfth International Conference on Intelligent Information Hiding and Multimedia Signal Processing
  32. High-Capacity Framework for Reversible Data Hiding in Encrypted Image Using Pixel Prediction and Entropy Encoding
    Y. Qiu, Q. Ying, Y. Yang, H. Zeng, S. Li, and Z. Qian
    IEEE Transactions on Circuits and Systems for Video Technology
  33. Optimized Lossless Data Hiding in JPEG Bitstream and Relay Transfer Based Extension
    Y. Qiu, Z. Qian, H. He, H. Tian, and X. Zhang
    IEEE Transactions on Circuits and Systems for Video Technology
  34. Reversible Data Hiding in Encrypted Images Using Adaptive Reversible Integer Transformation
    Y. Qiu, Z. Qian, H. Zeng, X. Lin, and X. Zhang
    Signal Processing
  35. New framework of reversible data hiding in encrypted JPEG bitstreams
    Z. Qian, H. Xu, X. Luo, and X. Zhang
    IEEE Transactions on Circuits and Systems for Video Technology
  36. A High Capacity Multi-Level Approach for Reversible Data Hiding in Encrypted Images
    H. Ge, Y. Chen, Z. Qian, and J. Wang
    IEEE Transactions on Circuits and Systems for Video Technology
  37. Reversible Contrast Mapping based Reversible Data Hiding in Encrypted Images
    Y. Qiu, H. Wang, Z. Wang, Z. Qian, G. Feng, and X. Zhang
    IEEE International Workshop on Information Forensics and Security (WIFS), 2018, Hong Kong
  38. Reversible Data Hiding in Encrypted Images with Two-MSB Prediction
    Y. Puyang, Z. Yin, and Z. Qian
    IEEE International Workshop on Information Forensics and Security (WIFS 2018), Hong Kong
  39. Separable reversible data hiding in encrypted JPEG bitstreams
    Z. Qian, H. Zhou, X. Zhang, and W. Zhang
    IEEE Transactions on Dependable and Secure Computing
  40. Lossless Data Hiding in JPEG Bitstream Using Alternative Embedding
    Y. Qiu, H. He, Z. Qian, S. Li, and X. Zhang
    Journal of Visual Communication and Image Representation
  41. Reversible data hiding in encrypted image with distributed source encoding
    Z. Qian, and X. Zhang
    IEEE Transactions on Circuits and Systems for Video Technology
  42. Reversible data hiding in encrypted images based on progressive recovery
    Z. Qian, X. Zhang, and G. Feng
    IEEE Signal Processing Letters
  43. Improved joint reversible data hiding in encrypted images
    Z. Qian, S. Dai, F. Jiang, and X. Zhang
    Journal of Visual Communication and Image Representation
  44. Adaptive Reversible data hiding by extending the generalized integer transformation
    Y. Qiu, Z. Qian, and L. Yu
    IEEE Signal Processing Letters
  45. Reversible visible watermark embedded in encrypted domain
    X. Zhang, Z. Wang, J. Yu, and Z. Qian
    IEEE China Summit and International Conference on Signal and Information Processing, ChinaSIP 2015
  46. Reversible data hiding in encrypted JPEG bitstream
    Z. Qian, X. Zhang, and S. Wang
    IEEE Transactions on Multimedia
  47. Efficient reversible data hiding in encrypted images
    X. Zhang, Z. Qian, G. Feng, and Y. Ren
    Journal of Visual Communication and Image Representation
  48. Lossless data hiding in JPEG bitstream
    Z. Qian, and X. Zhang
    Journal of Systems and Software
  49. Reversible watermarking via extreme learning machine prediction
    G. Feng, Z. Qian, and N. Dai
    Neurocomputing
  50. JPEG Image Encryption with Adaptive DC Coefficient Prediction and RSPair Permutation
    C. Qin, J. Hu, F Li, Z. Qian, and X. Zhang
    IEEE Transactions on Multimedia, 2022