Xinpeng Zhang

ORCID: 0000-0002-0212-3501
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Steganography and Watermarking Techniques
  • Digital Media Forensic Detection
  • Chaos-based Image/Signal Encryption
  • Generative Adversarial Networks and Image Synthesis
  • Advanced Image Processing Techniques
  • Advanced Image and Video Retrieval Techniques
  • Face recognition and analysis
  • Internet Traffic Analysis and Secure E-voting
  • Image Processing Techniques and Applications
  • Photopolymerization techniques and applications
  • Advanced biosensing and bioanalysis techniques
  • Adversarial Robustness in Machine Learning
  • DNA and Nucleic Acid Chemistry
  • Cryptography and Data Security
  • Advanced Polymer Synthesis and Characterization
  • Biometric Identification and Security
  • Image and Signal Denoising Methods
  • Photochromic and Fluorescence Chemistry
  • Image Retrieval and Classification Techniques
  • Video Analysis and Summarization
  • Gut microbiota and health
  • Privacy-Preserving Technologies in Data
  • Image and Video Quality Assessment
  • Topic Modeling
  • RNA Interference and Gene Delivery

Fudan University
2017-2025

Beijing Institute of Technology
2013-2025

Shanxi Agricultural University
2025

Liaocheng University
2022-2024

Shanghai University
2002-2024

University of Nebraska–Lincoln
2022-2024

Chengdu Third People's Hospital
2023-2024

Chongqing Medical University
2023-2024

Southwest Jiaotong University
2023-2024

Shandong University
2008-2024

In the past two decades, reversible data hiding (RDH), also referred to as lossless or invertible hiding, has gradually become a very active research area in field of hiding. This been verified by more and papers on increasingly wide-spread subjects RDH that have published these days. this paper, various algorithms researches classified into following six categories: 1) image spatial domain; 2) compressed domain (e.g., JPEG); 3) suitable for semi-fragile authentication; 4) with contrast...

10.1109/access.2016.2573308 article EN cc-by-nc-nd IEEE Access 2016-01-01

Carbohydrate active enzymes (CAZymes) are made by various organisms for complex carbohydrate metabolism. Genome mining of CAZymes has become a routine data analysis in (meta-)genome projects, owing to the importance bioenergy, microbiome, nutrition, agriculture, and global carbon recycling. In 2012, dbCAN was provided as an online web server automated CAZyme annotation. dbCAN2 (https://bcb.unl.edu/dbCAN2) further developed 2018 meta combine multiple tools improved also included CGC-Finder,...

10.1093/nar/gkad328 article EN cc-by-nc Nucleic Acids Research 2023-05-01

With the development of cloud storage and privacy protection, reversible data hiding in encrypted images (RDHEI) has attracted increasing attention as a technology that can embed additional encryption domain. In general, an RDHEI method embeds secret image while ensuring embedded be extracted error-free original restored lossless. this paper, A high-capacity algorithm is proposed. At first, Most Significant Bits (MSB) each pixel was predicted adaptively marked by Huffman coding image. Then,...

10.1109/tmm.2019.2936314 article EN IEEE Transactions on Multimedia 2019-08-22

Generating falsified faces by artificial intelligence, widely known as DeepFake, has attracted attention worldwide since 2017. Given the potential threat brought this novel technique, forensics researchers dedicated themselves to detect video forgery. Except for exposing faces, there could be extended research directions DeepFake such anti-forensics. It can disclose vulnerability of current methods. Besides, it also enable videos tactical weapons if are more subtle detected. In paper, we...

10.1109/tmm.2021.3098422 article EN publisher-specific-oa IEEE Transactions on Multimedia 2021-07-26

Reversible data hiding in encrypted images (RDHEI) is an effective technique of security. Most state-of-the-art RDHEI methods do not achieve desirable payload yet. To address this problem, we propose a new method with hierarchical embedding. Our contributions are twofold. (1) A novel label map generation proposed for the bit-planes plaintext image. The calculated by using prediction technique, and it compressed embedded into (2) Hierarchical embedding designed to high payload. This...

10.1109/tcsvt.2021.3062947 article EN cc-by IEEE Transactions on Circuits and Systems for Video Technology 2021-03-01

With the popularity of cloud storage services, people are increasingly accustomed to storing images in cloud. However, services raise privacy concerns, e.g., leakage unauthorized third parties and service providers may exploit image detection technologies portrait users without permission. Although concerns can be solved by encrypting before they uploaded cloud, traditional encryption methods significantly affect usability user experience, for example, cannot preview Recently, Marohn <i>et...

10.1109/tcsvt.2021.3070348 article EN IEEE Transactions on Circuits and Systems for Video Technology 2021-04-01

Video watermarking on the dual tree-complex wavelet (DT CWT) domain is shown to be effective offer high robustness. Existing DT CWT video schemes tend use all coefficients high-pass sub-bands of for watermark embedding and detection, which lack investigating correlations among different fail explore stable robust watermarking. In this paper, we propose a novel scheme by exploring joint sub-bands. We first extract set candidate applying block singular value decomposition (SVD) domain. Then,...

10.1109/tcsvt.2021.3092004 article EN IEEE Transactions on Circuits and Systems for Video Technology 2021-06-24

Abstract Carbohydrate Active EnZymes (CAZymes) are significantly important for microbial communities to thrive in carbohydrate rich environments such as animal guts, agricultural soils, forest floors, and ocean sediments. Since 2017, microbiome sequencing assembly have produced numerous metagenome assembled genomes (MAGs). We updated our dbCAN-seq database (https://bcb.unl.edu/dbCAN_seq) include the following new data features: (i) ∼498 000 CAZymes ∼169 CAZyme gene clusters (CGCs) from 9421...

10.1093/nar/gkac1068 article EN cc-by Nucleic Acids Research 2022-11-18

Fake news detection (FND) has attracted much research interests in social forensics. Many existing approaches introduce tailored attention mechanisms to fuse unimodal features. However, they ignore the impact of cross-modal similarity between modalities. Meanwhile, potential pretrained multimodal feature learning models FND not been well exploited. This paper proposes an FND-CLIP framework, i.e., a News Detection network based on Contrastive Language-Image Pretraining (CLIP). extracts deep...

10.1109/icme55011.2023.00480 article EN 2022 IEEE International Conference on Multimedia and Expo (ICME) 2023-07-01

Ostwald ripening, the dominant mechanism of droplet size growth for an O/W nanoemulsion at high surfactant concentrations, depends on micelles in water phase and aqueous solubility oil, especially spontaneously formed nanoemulsions. In our study, nanoemulsions were by mixing a with oil containing fatty alcohol polyoxypropylene polyoxyethylene ether (APE). By monitoring periodically via dynamic light scattering, we demonstrated that are stable against i.e., growth. contrast, droplets grew...

10.1021/acs.langmuir.3c03019 article EN Langmuir 2024-01-04

An efficient visible-light-sensitive photobase generator for thiol-Michael addition reactions was synthesized and evaluated. This highly reactive catalyst designed by protecting a strong base (tetramethyl guanidine, TMG) with visible-light-responsive group which coumarin derivative. The coumarin-coupled TMG shown to exhibit extraordinary catalytic activity toward initiation of the reaction, including addition-based polymerization, upon visible-light irradiation, leading stoichiometric...

10.1021/acsmacrolett.5b00923 article EN ACS Macro Letters 2016-01-22

We report a wavelength-selective polymerization process controlled by visible/UV light, whereby base is generated for anion-mediated thiol–Michael reaction upon exposure at one wavelength (400–500 nm), while radicals are subsequently second stage radical second, independent (365 nm). Dual wavelength, light sequential not only provides relatively soft intermediate polymer that facilitates optimum processing and modification under visible but also enables highly cross-linked, rigid final...

10.1021/acs.macromol.7b01117 article EN Macromolecules 2017-07-17

In this paper, a novel lossy compression scheme for encrypted image based on inpainting is proposed. order to maintain confidentiality, the content owner encrypts original through modulo-256 addition encryption and block permutation mask content. Then, third party, such as cloud server, can compress selective before transmitting receiver. During compression, blocks are categorized into four sets corresponding different complexity degrees in plaintext domain without loss of security. By...

10.1109/tcsvt.2018.2878026 article EN IEEE Transactions on Circuits and Systems for Video Technology 2018-10-25

Most current reversible data hiding (RDH) techniques are designed for uncompressed images. However, JPEG images more commonly used in our daily lives. Up to now, several RDH methods have been proposed, yet few of them investigated the adaptive embedding as lack accurate measurement distortion. To realize and optimize performance, this article, a novel scheme based on multiple histogram modification (MHM) rate-distortion optimization is proposed. Firstly, with selected coefficients,...

10.1109/tcsvt.2020.3027391 article EN IEEE Transactions on Circuits and Systems for Video Technology 2020-09-30

Image quality assessment (IQA) is an important task of image processing and has diverse applications, such as super-resolution reconstruction, transmission monitoring systems. This paper proposes a perceptual hashing algorithm with complementary color wavelet transform (CCWT) compressed sensing (CS) for reduced-reference (RR) IQA. The CCWT exploited to decompose input into different sub-bands. Since the calculation uses all channels without discarding any information, distortions introduced...

10.1109/tcsvt.2022.3190273 article EN cc-by IEEE Transactions on Circuits and Systems for Video Technology 2022-07-13

People are accustomed to utilizing mobile phones capture images and uploading them the cloud due various incomparable advantages such as saving storage space on device. In this context, privacy concerns raised since may contain some sensitive information. Encrypting by traditional schemes can alleviate leak, but usability is often deprived it tough browse cloud. Recently, Tajik et al. proposed an ideal <italic xmlns:mml="http://www.w3.org/1998/Math/MathML"...

10.1109/tmm.2022.3200310 article EN IEEE Transactions on Multimedia 2022-08-19

Steganography usually modifies cover media to embed secret data. A new steganographic approach called generative steganography (GS) has emerged recently, in which stego images (images containing data) are generated from data directly without media. However, existing GS schemes often criticized for their poor performances. In this paper, we propose an advanced network (GSN) that can generate realistic using images. We firstly introduce the mutual information mechanism GS, helps achieve high...

10.1145/3503161.3548217 article EN Proceedings of the 30th ACM International Conference on Multimedia 2022-10-10

JPEG image encryption aims at effectively converting the original into a noise-like that does not contain any useful information of image. Existing schemes for encryption, however, may attain good balance in terms file size increment and security. To address problem, we design novel scheme. Different from existing schemes, first predict DC coefficients by an adaptive prediction method. Subsequently, histogram coefficient errors is encrypted combining random integers to reduce encoded length,...

10.1109/tmm.2022.3148591 article EN IEEE Transactions on Multimedia 2022-02-07
Coming Soon ...