Zichi Wang

ORCID: 0000-0003-0283-5338
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Steganography and Watermarking Techniques
  • Digital Media Forensic Detection
  • Chaos-based Image/Signal Encryption
  • Generative Adversarial Networks and Image Synthesis
  • Adversarial Robustness in Machine Learning
  • Advanced Image and Video Retrieval Techniques
  • Internet Traffic Analysis and Secure E-voting
  • Vehicle License Plate Recognition
  • Biometric Identification and Security
  • Advanced Malware Detection Techniques
  • HVDC Systems and Fault Protection
  • Anomaly Detection Techniques and Applications
  • Advanced Neural Network Applications
  • Advanced Image Processing Techniques
  • High-Voltage Power Transmission Systems
  • Video Analysis and Summarization
  • Microgrid Control and Optimization
  • Privacy-Preserving Technologies in Data
  • Handwritten Text Recognition Techniques
  • Privacy, Security, and Data Protection
  • Image and Signal Denoising Methods
  • Cryptography and Data Security
  • Image Retrieval and Classification Techniques
  • Computer Graphics and Visualization Techniques
  • User Authentication and Security Systems

Shanghai University
2016-2025

Shenzhen University
2022-2024

Guangxi Normal University
2022

Yangtze River Delta Physics Research Center (China)
2021

This paper proposes lossless, reversible, and combined data hiding schemes for ciphertext images encrypted by public-key cryptosystems with probabilistic homomorphic properties. In the lossless scheme, pixels are replaced new values to embed additional into several least significant bit planes of multilayer wet coding. Then, embedded can be directly extracted from domain, data-embedding operation does not affect decryption original plaintext image. reversible a preprocessing is employed...

10.1109/tcsvt.2015.2433194 article EN IEEE Transactions on Circuits and Systems for Video Technology 2015-05-14

Posting images on social network platforms is happening everywhere and every single second. Thus, the communication channels offered by various networks have a great potential for covert communication. However, transmitted through such will usually be JPEG compressed, which fails most of existing steganographic schemes. In this paper, we propose novel image steganography framework that robust channels. particular, first obtain channel compressed version (i.e., output) original image. Secret...

10.1109/tcsvt.2018.2881118 article EN IEEE Transactions on Circuits and Systems for Video Technology 2018-11-13

This letter proposes a batch steganographic method, which combines cover-selection and payload-allocation by distortion optimization. We first proved that with the value of payload increasing, first-order derivative single cover is monotonically increasing. Then, we deduced covers selected from given set should be equal if total corresponding minimal. Finally, an algorithm was designed to combine payload-allocation, so optimal stego-covers can obtained. Experiment results show...

10.1109/lsp.2018.2865888 article EN IEEE Signal Processing Letters 2018-08-17

This paper proposes a framework to improve the existing distortion functions designed for JPEG steganography, which results in better capability of countering steganalysis. Different from steganography approach that minimizes image distortion, we minimize feature caused by data embedding. Given image, construct reference close before compression. Guided both and minimization, state-of-the-art syndrome trellis coding embedding are improved distinguishing costs +1 versus -1 has three...

10.1109/access.2018.2884198 article EN cc-by-nc-nd IEEE Access 2018-01-01

10.1109/jiot.2024.3434656 article EN IEEE Internet of Things Journal 2024-07-29

In the past decade, diversification of steganographic techniques has posed significant threats to information security, necessitating effective countermeasures. Current defenses, mainly reliant on steganalysis, struggle with detection accuracy. While “image vaccines” have been proposed, they often target specific methodologies. This paper introduces a universal vaccine enhance steganalysis Our symmetric approach integrates existing methods protect images before online dissemination using...

10.3390/sym17010066 article EN cc-by Symmetry 2025-01-02

This paper investigates on the defense against steganography, and overall purpose of study is to design a satisfactory scheme in encrypted domain. Image vaccine steganography an effective technique discover utilization with extremely high detection accuracy. However, image owner provider are not same person usually. To meet requirements privacy protection simultaneously, this proposes for images. After encrypting entire data original using stream cipher, can be injected into without knowing...

10.1038/s41598-025-88384-8 article EN cc-by Scientific Reports 2025-02-03

10.1109/lsp.2025.3545805 article EN IEEE Signal Processing Letters 2025-01-01

10.1109/tcsvt.2025.3556892 article EN IEEE Transactions on Circuits and Systems for Video Technology 2025-01-01

A hybrid distortion function for JPEG steganography exploiting block fluctuation and quantization steps is proposed. To resist multidomain steganalysis, both spatial domain discrete cosine transformation (DCT) are involved in the proposed function. In domain, a value allotted each 8×8 according to fluctuation. DCT employed allot values coefficients block. The two elements, steps, combined together measure embedding risk. By employing syndrome trellis coding embed secret data, changes...

10.1117/1.jei.25.5.050501 article EN Journal of Electronic Imaging 2016-09-06

In recent decades, a large number of perceptual image hashing schemes have been designed to secure the authenticity and integrity digital images. However, feasible criterion evaluate performances has not developed yet. To this end, unified performance evaluation method for is proposed in paper. The contains six modules: robustness, discrimination, tampering detection, security, computational efficiency hash length. order relationship analysis (ORA) employed assign score proportion each...

10.1109/tifs.2022.3161149 article EN IEEE Transactions on Information Forensics and Security 2022-01-01

Batch steganography is a technique that hides information into multiple covers. To achieve better performance on the security of data hiding, we propose novel strategy batch using generative network. In this method, approaches cover selection, payload allocation, and distortion evaluation are considered in round. We define quality metric to evaluate between image stego. When training generation function, an objective function containing two parts: entropy loss steganalytic loss. While used...

10.1109/tcsvt.2020.2974884 article EN IEEE Transactions on Circuits and Systems for Video Technology 2020-02-18

Content similarity is a representative property of natural images, for example, similar regions, which utilized by modern steganalysis. Existing JPEG steganographic methods mainly focus on the complexity content but ignore similarity. This article investigates to improve undetectability steganography. Specifically, DCT blocks and 64 parallel channels used design distortion function. Given image, initial embedding costs are assigned quantized coefficients using an appropriate algorithm among...

10.1109/tcyb.2022.3155732 article EN IEEE Transactions on Cybernetics 2022-05-17

The advancement of internet has greatly facilitated development healthcare technology, particularly in the field remote diagnosis. However, during transmission medical images and electronic records through internet, there are risks such as theft, tampering, compression, which may result leakage or damage patients' information. A robust zero-watermarking scheme using DTCWT improved differential entropy is proposed to protect copyright security images. Firstly, low-frequency information image...

10.1016/j.jksuci.2023.101708 article EN cc-by-nc-nd Journal of King Saud University - Computer and Information Sciences 2023-08-16

10.1038/s41598-024-72693-5 article EN cc-by-nc-nd Scientific Reports 2024-09-12

Existing cover selection methods for steganography cannot resist pooled steganalysis. This paper proposes a secure method which is able to steganalysis and single object meanwhile. To steganalysis, the maximum mean discrepancy (MMD) distance between stego set clear arbitrary image kept not larger than normal threshold during selection, where MMD two sets. Under this constraint, searching strategy designed select minimal steganographic distortion images within affordable computational...

10.1109/access.2019.2914226 article EN cc-by-nc-nd IEEE Access 2019-01-01

This letter focus on a practical scenario of cover selection for steganography, in which part the available images sender have been processed to improve visual quality, e.g., contrast enhancement, image denoising. In this case, not only embedding distortion (caused by steganography), but also processing processing) should be considered when selecting image. We propose method combine two kinds together measure suitability steganography images. To calculate distortion, classifier is trained...

10.1109/lsp.2019.2956416 article EN IEEE Signal Processing Letters 2019-11-28

Existing cover selection methods for steganography mainly focus on embedding distortion of each image, but ignore the similarity between images. When images are similar, a number relevant samples provided to steganalysis, which is disadvantageous steganography. This paper proposes new method joint image and distortion. Due difference other processing tasks, e.g., reconstruction, recognition, we propose customized calculate based SVD (singular value decomposition). Importantly, small singular...

10.1109/tdsc.2022.3181039 article EN IEEE Transactions on Dependable and Secure Computing 2022-01-01

As generative models find broader applications in Internet of Things (IoT) image processing tasks, safeguarding the copyright these assumes increasing significance. Embedding watermarks on output images generated by such has been proposed some researchers as a means protecting intellectual property. However, prevailing methods for generating model inadvertently introduce significant high-frequency artifacts regions, compromising imperceptibility and security watermarking system. In pursuit...

10.1109/jiot.2024.3363613 article EN IEEE Internet of Things Journal 2024-02-07
Coming Soon ...