Minqing Zhang

ORCID: 0000-0002-8783-3608
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Steganography and Watermarking Techniques
  • Digital Media Forensic Detection
  • Chaos-based Image/Signal Encryption
  • Cryptography and Data Security
  • Privacy-Preserving Technologies in Data
  • Generative Adversarial Networks and Image Synthesis
  • Complexity and Algorithms in Graphs
  • Internet Traffic Analysis and Secure E-voting
  • Video Coding and Compression Technologies
  • Cloud Data Security Solutions
  • Vehicle License Plate Recognition
  • Cryptographic Implementations and Security
  • Security in Wireless Sensor Networks
  • Image and Video Stabilization
  • Advanced Algorithms and Applications
  • Medical Image Segmentation Techniques
  • Coding theory and cryptography
  • Mobile Ad Hoc Networks
  • Medical Imaging and Analysis
  • Human Pose and Action Recognition
  • Brain Tumor Detection and Classification
  • Advanced Authentication Protocols Security
  • Cellular Automata and Applications
  • Advanced Graph Neural Networks
  • Technology and Security Systems

Chinese People's Armed Police Force Engineering University
2016-2025

State Key Laboratory of Cryptology
2014-2024

Chinese University of Hong Kong
2024

Ministry of Education of the People's Republic of China
2024

Chinese People's Armed Police Force
2021-2023

Ministry of Public Security of the People's Republic of China
2022

Xi’an University
2018-2021

Zhejiang Sci-Tech University
2007-2021

The First People's Hospital of Wenling
2021

United Imaging Healthcare (China)
2019-2020

In the past few years, Generative Adversarial Network (GAN), which proposed in 2014, has achieved great success. There have been increasing research achievements based on GAN field of computer vision and natural language processing. Image steganography is an information security technique aiming at hiding secret messages common digital images for covert communication. Recently, image demonstrated potential by introducing other neural network techniques. this paper, we review art with GANs...

10.1109/access.2020.2983175 article EN cc-by IEEE Access 2020-01-01

This paper proposes a fully homomorphic encryption encapsulated difference expansion (FHEE-DE) scheme for reversible data hiding in encrypted domain (RDH-ED). The circuits and ciphertext operations are elaborated. Key-switching bootstrapping techniques introduced to control the extension decryption failure of encryption. A key-switching based least-significant-bit (KS-LSB) method has been designed realize extraction directly from without private key. In application, user first encrypts...

10.1109/tcsvt.2019.2963393 article EN IEEE Transactions on Circuits and Systems for Video Technology 2020-01-01

In this paper, a novel data-driven information hiding scheme called "generative steganography by sampling" (GSS) is proposed. Unlike in traditional modification-based steganography, our method the stego image directly sampled powerful generator: no explicit cover used. Both parties share secret key used for message embedding and extraction. The Jensen-Shannon divergence introduced as new criterion evaluating security of generative steganography. Based on these principles, we propose simple...

10.1109/access.2019.2920313 article EN cc-by-nc-nd IEEE Access 2019-01-01

Schemes of reversible data hiding in encrypted domain (RDH-ED) based on symmetric or public key encryption are mainly applied the scenarios end-to-end communication. To provide security guarantees for multi-party scenarios, a RDH-ED scheme secret image sharing Chinese remainder theorem (CRT) is presented. In application (<inline-formula> <tex-math notation="LaTeX">$t$ </tex-math></inline-formula>, <inline-formula> notation="LaTeX">$n$ </tex-math></inline-formula>) sharing, an first shared...

10.1109/tcsvt.2021.3081575 article EN IEEE Transactions on Circuits and Systems for Video Technology 2021-05-17

Traditional image steganography modifies the content of more or less, it is hard to resist detection steganalysis tools. To address this problem, a novel method named generative coverless information hiding based on adversarial networks proposed in paper. The main idea that class label replaced with secret as driver generate hidden directly, and then extract from through discriminator. It's first time achieved by networks. Compared traditional steganography, does not modify original image....

10.48550/arxiv.1712.06951 preprint EN other-oa arXiv (Cornell University) 2017-01-01

This paper focuses on several theoretical issues and principles in steganography security, defines four security levels by analyzing the corresponding algorithm instances. In analysis, we discuss differences between watermarking security. The two necessary conditions for are obtained. Under current technology situation, then analyze indistinguishability of cover stego-cover, consider that should rely key secrecy with algorithms open. By specifying role steganography, a secure theory formally...

10.1109/access.2018.2881680 article EN cc-by-nc-nd IEEE Access 2018-01-01

Existing deep-learning-based image steganalysis networks have problems such as large model sizes, significant runtime memory usage, and extensive computational operations, which hinder their deployment in many practical applications. To address these challenges, we applied compression techniques to designed a called SASRNet, slimming-assisted residual network. We observed that the trainable scale factor of BN (batch normalization) layer network can be used channel scaling for pruning. The...

10.31577/cai_2024_2_295 article EN Computing and Informatics 2024-01-01

10.32604/cmc.2025.065887 article EN Computers, materials & continua/Computers, materials & continua (Print) 2025-01-01

In this paper, we analyze the video steganography technique, which is used to ensure national security and confidentiality of information governmental agencies enterprises. Videos may be transmit secrets conduct covert communication. As such, present an algorithm based on a secret sharing scheme Error-Correcting Code (ECC), combines Grey Relational Analysis (GRA) with partition mode in compression standard H.264/AVC. First, process by sharing, then use ECC obtained information. Moreover,...

10.23919/tst.2017.7889641 article EN Tsinghua Science & Technology 2017-04-01

10.1007/s11042-018-6640-y article EN Multimedia Tools and Applications 2018-09-24

Based on the H.264/AVC Video coding standard, a new video steganography algorithm is proposed and realized in this paper. The designed motion vector component feature to control embedding, also be secret carrier. information embedded will not significantly affect sequence's visual invisibility statistical invisibility. Experiments show that has large embedding capacity with high carrier utilization, can implement fast effectively.

10.1109/iccsn.2011.6013642 article EN 2011-05-01

NTRU (Number Theory Research Unit) has the characteristics of resistance to quantum computing attacks, fast encryption and decryption, high security. It is very suitable for wireless confidential data networks authentication systems. Combined with reversible hiding technology, a separable scheme in homomorphic encrypted domain based on proposed. The image owner directly divides cover-image into groups reference pixel T adjacent pixels. Then, grouped by NTRU. Finally, uploaded hider. divided...

10.1109/access.2020.2990903 article EN cc-by IEEE Access 2020-01-01

10.1016/j.jvcir.2018.05.002 article EN Journal of Visual Communication and Image Representation 2018-05-09
Coming Soon ...