基本信息

赵险峰 男 博导 信息工程研究所
电子邮件:zhaoxianfeng@iie.ac.cn
通信地址:北京市海淀区树村路12号信工所东南门
邮政编码:100085

研究领域

多媒体安全与智能分析的理论与技术,包括多媒体处理与智能分析、多媒体信息隐藏与检测、多媒体伪造取证与防护、数字水印与版权保护、网络多媒体大数据分析等。

招生信息

招生方向:多媒体信息智能化处理、人工智能安全、多媒体信息安全

欢迎信息安全、计算机、电子、自动化、应用数学等相关专业的学生和工作人员报考

教育与科研经历

2003年于上海交通大学电子信息工程学院获得博士学位;2003至2005年为中国科学院研究生院信息安全国家重点实验室博士后。

2005年12月进入中国科学院软件研究所信息安全国家重点实验室工作,2011年12月调入中国科学院信息工程研究所信息安全国家重点实验室工作。目前为中国科学院信息工程研究所研究员,中国科学院大学网络空间安全学院教授,博士生导师。研究方向为多媒体安全与智能分析的理论与技术,包括多媒体处理与智能分析、多媒体信息隐藏与检测、多媒体深度伪造取证与防护、多媒体内容智能生成转换与无缝编辑、数字水印与版权保护、网络多媒体大数据分析等。曾承担国家自然科学基金、国家重点研发计划、中科院战略性先导专项、部委与部队专项等任务60余项,任重大项目主任设计师、总师,型号装备软件系统负责人;在IEEE TIFS、ACM IH & MMSec等本领域重要刊物和会议上发表论文150余篇,获得与申请专利31项,撰写或参与撰写著作5部,任IJDCF、FSI-R、IWDW等期刊、会议的编委、主席或委员,任中国人工智能学会人工智能与安全专委会、中国电子学会通信与信息安全专委会、中国图象图形学会多媒体取证与安全专委会等学术组织的委员,IEEE等国内外学会高级会员。主持研制的成果有重要应用,获部级科学技术奖一等奖、中科院“朱李月华”优秀教师奖、省部级优秀学位论文奖等荣誉。

社会兼职
2022-06-01-今,计算机研究与发展, 编委
2019-03-01-今,Forensic Science International: Reports, 编委
2018-08-19-今,中国人工智能学会人工智能与安全专委会, 委员
2017-08-01-今,中国图象图形学会数字媒体取证与安全专委会, 委员
2016-11-30-今,International Journal on Digital Crime and Forensics, 编委
2016-04-30-今,中国电子学会通信与信息安全专家委员会, 委员
2015-12-18-今,中国保密协会隐私保护专委会, 常委
2014-08-31-今,中国电子学会计算机取证专家委员会, 委员

出版信息


  • 部分论文
  1. G. Li, X. Zhao, Y. Cao. Forensic Symmetry for DeepFakes. IEEE Transactions on Information Forensics and Security, Vol.18: 1095-1110, 2023
  2. Y. Gu, X. Zhao, C. Gong, X. Yi. Deepfake Video Detection Using Audio-Visual Consistency. In: X. Zhao, Y.-Q. Shi, A. Piva, H.J. Kim (eds) Digital Forensics and Watermarking. IWDW 2020. LNCS 12617, 168-180, Springer, 2021
  3. G. Li, Y. Cao, X. F. Zhao. Exploiting Facial Symmetry to Expose DeepFakes, IEEE ICIP 2021
  4. Z. Zhang, X. Yi, X. Zhao. Fake Speech Detection Using Residual Network with Transformer Encoder, ACM IH & MMSec 2021
  5. Z. P. Xu, J. R. Liu, W. Lu, B. Z. Xu, X. F. Zhao, B. Li, J. W. Huang. Detecting facial manipulated videos based on set convolutional neural networks, Journal of Visual Communication and Image Representation, 77(2021) 103119
  6. J. Liu, K. Zhu, W. Lu, X. Luo, X. Zhao. A Lightweight 3D Convolutional Neural Network for DeepFake Detection, International Journal of Intelligent Systems, 2021:1-15
  7. Y. Q. Liu, X. B. Zhu, X. F. Zhao, Y. Cao. Adversarial Learning for Constrained Image Splicing Detection and Localization Based on Atrous Convolution, IEEE Transactions on Information Forensics and Security, 14(10): 2551-2566, 2019
  8. X. W. Yi, K. Yang, X. F. Zhao, Y. T. Wang, H. B. Yu. AHCM: Adaptive Huffman Code Mapping for Audio Steganography Based on Psychoacoustic Model,IEEE Transactions on Information Forensics and Security, 14(8): 2217-2231, 2019
  9. Z. Z. Zhao, Q. X. Guan, H. Zhang,X. F. Zhao. Improving the robustness of adaptive steganographic algorithms based on transport channel matching,IEEE Transactions on Information Forensics and Security, 14(7): 1843-1856, 2019
  10. H. Zhang,Y. Cao,X. F. Zhao. A steganalytic approach to detect motion vector modification using near-perfect estimation for local optimality, IEEE Transactions on Information Forensics and Security, 12(2): 465-478, 2017
  11. K. Ma, W. M. Zhang, X. F. Zhao, N. H. Yu, F. H. Li. Reversible data hiding in encrypted images by reserving room before encryption, IEEE Transaction on Information Forensics and Security, 8(3): 553-562, March, 2013
  12. Weike You , Hong Zhang , and Xianfeng Zhao. A Siamese CNN for Image Steganalysis. IEEE Transactions on Information Forensics and Security, vol. 16, pp. 291-306, 2021
  13. Yu Wang , Yun Cao , and Xianfeng Zhao.Minimizing Embedding Impact for H.264 Steganography by Progressive Trellis Coding. IEEE Transactions on Information Forensics and Security, vol. 16, pp. 333-345, 2021
  14. Y. Cao, H. Zhang, X. Zhao, X. He. Steganalysis of H.264/AVC Videos Exploiting Subtractive Prediction Error Blocks, IEEE Transactions on Information Forensics and Security, vol. 16, pp. 3326-3338, 2021
  15. Y. T. Wang, X.W. Yi, X. F. Zhao. MP3 steganalysis based on joint point-wise and block-wise correlations. Information Science, 512 (2020): 1118–1133, Elsevier
  16. A. T. Su, S. Ma, X. F. Zhao. Fast and secure steganography based on J-UNIWARD. IEEE Signal Processing Letters, Vol. 27: 221-225, 2020
  17. A. T. Su, X. F. Zhao. Boosting Image Steganalysis under Universal Deep Learning Architecture Incorporating Ensemble Classification Strategy. IEEE Signal Processing Letters, 26(12): 1852-1856, 2019
  18. Yu Wang , Yun Cao , and Xianfeng Zhao. CEC: Cluster Embedding Coding for H.264 Steganography. IEEE Signal Processing Letters, vol. 27, pp. 955-959, 2020
  19. Y. Cao, X. F. Zhao, D. G. Feng. Video steganalysis exploiting motion vector reversion-based features, IEEE Signal Processing Letters, 19(1): 35-38, 2012
  20. Y. Q. Liu, X. F. Zhao. Constrained Image Splicing Detection and Localization with Attention-Aware Encoder-Decoder and Atrous Convolution, IEEE Access, Vol.8, pp.6729-6741, 2020
  21. X. S. Zhu, Y. J. Qian, X. F. Zhao, B. Sun, Y. Sun. A deep learning approach to patch-based image inpainting forensics. Signal Processing: Image Communication, 67(2018): 90-99, 2018, Elsevier
  22. Y. Cao, H. Zhang, X. F. Zhao, H. B. Yu, Covert communication by compressed videos exploiting the uncertainty of motion estimation, IEEE Communication Letters, 19(2): 203-206, 2015
  23. X. F. Zhao, D. G Feng. Bypassing the decomposition attacks on two-round multivariate schemes by a practical cubic round, IET Information Security, 4(3): 167-184, 2010
  24. P. P. Wang, Y. Cao, X. F. Zhao. Segmentation based video steganalysis to detect motion vector modification, Security and Communication Networks, Vol. 2017, Article ID 8051389, pp.1-12
  25. S. Ma, X. F. Zhao, Q. X. Guan, Z. J. Xu, Y. Ma. A priori knowledge based secure payload estimation. Multimedia Tools and Applications, 77(14): 17889–17911, July 2018
  26. S. Ma, X. F. Zhao, Y. Q. Liu. Adaptive spatial steganography based on adversarial examples. Multimedia Tools and Applications, 78(22): 32503-32522, 2019, Springer
  27. Y. Q. Liu, Q. X. Guan, X. F. Zhao. Copy-move forgery detection via convolutional kernel network. Multimedia Tools and Applications, 77(14): 18269–18293 , July 2018, Springer
  28. X. F. Zhao, J. Zhu, H. B. Yu. On more paradigms of steganalysis, International Journal on Digital Crime and Forensics, 8(2):1-15, Apr. 2016
  29. Y. T. Wang, X. W. Yi, X. F. Zhao, A. T. Su. RHFCN: Fully CNN-based Steganalysis of MP3 with Rich High-pass Filtering. In Proc. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2627-2631, 2019
  30. P. P. Wang, Y. Cao, X. F. Zhao. An adaptive detecting strategy against motion vector-based steganography. In Proc. 2015 IEEE International Conference on Multimedia and Expo (ICME), pp. 1-6, 2015
  31. P. A. Fan, H. Zhang, Y. F. Cai, P. Xie, X. F. Zhao. A robust video steganographic method against social networking transcoding based on steganographic side channel,  ACM IH & MMSec' 20
  32. Y. Z. Yang, Y. T. Wang, X. W. Yi, X. F. Zhao, Y. Ma. Defining Joint Embedding Distortion for Adaptive MP3 Steganography, 7th ACM Workshop on Information Hiding and Multimedia Security (IH & MMSec' 19), pp. 14-24
  33. C. Gong, X. W. Yi, X. F. Zhao, Y. Ma. Recurrent Convolutional Neural Networks for AMR Steganalysis Based on Pulse Position, 7th ACM Workshop on Information Hiding and Multimedia Security (IH & MMSec' 19), pp. 2-13
  34. Y. Q. Liu, Q. X. Guan, X. F. Zhao, Y. Cao. Image forgery localization based on multi-scale convolutional neural networks. In Proc. 6th ACM Workshop on Information Hiding and Multimedia Security (IH & MMSec’18), pp. 85-90
  35. Y. T. Wang, K. Yang, X. W. Yi, X. F. Zhao, Z. J. Xu. CNN-based steganalysis of MP3 steganography in the entropy code domain. In Proc. 6th ACM Workshop on Information Hiding and Multimedia Security (IH & MMSec’18), pp. 55-65
  36. Y. Wang, Y. Cao, X. F. Zhao, Z. J. Xu, M. N. Zhu. Maintaining rate-distortion optimization for IPM-based video steganography by constructing isolated channels in HEVC. In Proc. ACM IH & MMSec’18,  pp. 97-107
  37. Y. Cao, Y. Wang, X. F. Zhao, M. N. Zhu, Z. J. Xu. Cover block decoupling for content-adaptive H.264 Steganography. InProc. 6th ACM Workshop on Information Hiding and Multimedia Security (IH & MMSec' 18), pp. 23-30, 2018
  38. P. P. Wang, Y. Cao, X. F. Zhao, M. N. Zhu. A steganalytic algorithm to detect DCT-based data hiding methods for H.264/AVC videos. In Proc. 5th ACM Workshop on Information Hiding and Multimedia Security (IH & MMSec' 17), pp. 123-133
  39. C. Xia, Q. X. Guan, X. F. Zhao, Z. Xu, Y. Ma. Improving GFR steganalysis features by using Gabor symmetry and weighted histograms. In Proc. 5th ACM Workshop on Information Hiding and Multimedia Security (IH & MMSec' 17), pp. 55-66
  40. Z. Z. Zhao, Q. X. Guan, X. F. Zhao. Constructing near-optimal double-layered syndrome-trellis codes for spatial steganography, In Proc. 4th ACM Workshop on Information Hiding and Multimedia Security (IH & MMSec' 16), pp.139-148
  41. P. P. Wang, H. Zhang, Y. Cao, X. F. Zhao. A novel embedding distortion for motion vector-based steganography considering motion characteristic, local optimality and statistical distribution, In Proc. 4th ACM Workshop on Information Hiding and Multimedia Security (IH & MMSec' 16), pp.127-137
  42. Y. Cao, H. Zhang, X. F. Zhao, H. B. Yu. Video steganography based on optimized motion estimation perturbation, In Proc. ACM IH & MMSec' 15, pp. 25 – 31
  43. H. Zhang, Y. Cao, X. F. Zhao. Video steganography with perturbed macroblock partition. In Proc. ACM IH & MMSec' 14, pp. 115-122
  44. X. F. Zhao, N. Li. Reversible watermarking with subliminal channel. 10th International Workshop on Information Hiding (IH 2008), Santa Barbara, CA, USA, May 19-21, 2008, LNCS 5284: 118-131, Springer, 2008
  45. X. F. Zhao, B. B Xia, Y. Deng. Strengthening QIM-based watermarking by non-uniform discrete cosine transform. IH 2008, Santa Barbara, CA, USA, May 19-21, 2008, LNCS 5284: 309-324, Springer, 2008
  46. X. F. Zhao, Y. X. Dai, D. G. Feng. Towards the Public but Noninvertible Watermarking.3rd International Workshop on Watermarking (IWDW' 04), Seoul, Korea, Oct. 30 - Nov. 1, 2004, LNCS 3304: 218-231, Springer, 2005
  47. X. F. Zhao, Y. X. Dai, D. G. Feng. A Generalized Method for Constructing and Proving Zero-Knowledge Watermark Proof Systems. IWDW' 04, Seoul, Korea, Oct. 30 - Nov. 1, 2004, LNCS 3304: 204-217, Springer, 2005
  • 部分专著与教材:
    1. 冯登国, 赵险峰. 信息安全技术概论(普通高等教育十一五国家级规划教材),北京: 电子工业出版社,2009年3月(第二版,2014年2月)
    2. 赵险峰,张弘. 隐写学原理与技术(信息安全国家重点实验室信息隐藏领域丛书),北京: 科学出版社,2018年10月
  • 3. 赵险峰,张弘,曹纭. 视频隐写与隐写分析(信息安全国家重点实验室信息隐藏领域丛书),北京: 科学出版社,2021年5月
  • 4. 易小伟,赵险峰. 语音频隐写与隐写分析(信息安全国家重点实验室信息隐藏领域丛书),北京: 科学出版社,2022年2月

教授课程

信息隐藏
多媒体编码及其信息安全应用
网络与信息安全系列讲座
目前开设课程

多媒体信息隐藏与安全(秋季,2023~)

​多媒体生成及其信息挖掘(春季,2024~)


专利与奖励

部分专利情况

1. 赵险峰, 黄炜. 一种扩展防伪数字水印和电子印章信息量的方法. 专利号: ZL 200810056193.7,已授权
2. 李宁, 赵险峰, 黄炜. 一种数字视频内容的快速保护及解保护方法,专利号:ZL 200810056192.2,已授权
3. 曹纭, 赵险峰, 冯登国. 一种加密的Huffman编码方法及其解码方法. 专利号: ZL 200910076038.6,已授权
4. 黄炜, 赵险峰, 冯登国. 一种基于图像和音频再编码处理的隐写防范方法. 专利号: ZL 201010230477.6,已授权
5. 赵险峰, 夏冰冰, 黄炜. 一种基于隐写测评的隐写分析方法. 专利号:ZL 201210394104.6,已授权

部分获奖信息

1. 中国科学院“朱李月华”优秀教师奖

2. 部级科学技术奖一等奖

3. IGI Global's Ninth Annual Excellence in Research Journal Awards, 2017

4. 2018 ACM Workshop on Information Hiding and Multimedia Security,Best Paper Award

5. 中国科学院大学校级优秀课程奖

科研活动


部分科研项目
1. 提高多媒体安全分析准确性的关键技术,信息安全国家重点实验室重点部署项目,主持,2014-2015

2. 非马尔可夫模型下基于数据关联的隐写分析研究,国家自然科学基金面上项目,主持, 2012.1-2015
3. 数字权力管理(DRM)独特安全模型的研究,国家自然科学基金面上项目,主持,2006-2008
4. 基于关联运算的隐写分析研究,北京市自然科学基金面上项目,主持,2011-2013
5. 数字媒体安全防护关键技术,中国科学院战略性先导科技专项课题,主持,2012-2016
6. 数字媒体内容安全关键技术及测评方法的研究,国家自然科学基金重点项目,主持子课题,2007.1- 2010.12

7. 多媒体伪造智能取证关键技术,国家重点研发计划课题,主持,2019-2021

8. 深度多媒体伪造智能检测技术,攀登计划项目,主持,2020-2021

  承担其他任务:国家重点研发计划、信息安全专项、部委项目多项