钱振兴
职称:教授、博导、国家级青年人才获得者、国家文旅部重点实验室副主任
地址:上海市杨浦区淞沪路2005号复旦大学江湾校区二号交叉学科楼
Email:zxqian@fudan.edu.cn
English Page:http://tomzqian.github.io
钱振兴,本科至博士毕业于中国科学技术大学,现为复旦大学计算机学院教授和博士生导师,入选国家青年人才计划、上海市启明星人才计划。担任复旦大学数字文化保护与旅游数据智能计算文旅部重点实验室副主任。主要从事多媒体信息隐藏、人工智能安全研究,具体包括:数字水印、隐写、图像保护、神经网络模型安全、多媒体虚假内容检测、文化内容识别等。
至今主持项目20多项,包括国家自然科学基金重点、国家重点研发计划课题等。发表学术论文170余篇,出版专著与教材2本,申请发明专利十余项。多媒体安全方面的研究成果在文旅部单位、凤凰传媒、新华传媒、上海文广等单位获得应用,以第一完成人先后获上海计算机学会自然科学二等奖、中国产学研合作创新成果奖、中国发明创业成果奖等奖项。担任国际期刊Signal Processing和JVCI,担任中国图象图形学报编委。
Selected Papers
1) Neural Network Security
-
Z. Yuan, Z. You, S. Li, Z. Qian, X. Zhang, A. Kot, On Generating Identifiable Virtual Faces, MM '22: Proceedings of the 29th ACM International Conference on Multimedia, 2022
-
N. Zhong, Z. Qian, and X. Zhang, Imperceptible Backdoor Attack: From Input Space to Feature Representation, the 31st International Joint Conference on Artificial Intelligence and the 25th European Conference on Artificial Intelligence (IJCAI-ECAI 22), 2022.
-
Z. Zhu, H. Zhou, S. Xing, Z. Qian, S. Li, and X. Zhang, Perceptual Hash of Neural Networks, Symmetry, accepted.
-
X. Zeng, K. Chen, Q. Ying, S. Li, Z. Qian, and X. Zhang, Invertible Image Dataset Protection, IEEE International Conference on Multimedia and Expo (ICME) 2022, Taipei, Taiwan, 18-22 July, 2022
-
L. Feng, S. Li, Z. Qian, and X. Zhang, Unlabeled Backdoor Poisoning in Semi-Supervised Learning, IEEE International Conference on Multimedia and Expo (ICME) 2022, Taipei, Taiwan, 18-22 July, 2022
-
Q. Song, S. Li, P. Wei, L. Ge, X. Zhang, Z. Qian, Joint Learning for Addressee Selection and Response Generation in Multi-Party Conversation, 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP 2022), 22-27 May 2022, Singapore, accepted.
-
G. Li, S. Li, Z. Qian, and X. Zhang, Encryption Resistant Deep Neural Network Watermarking, 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP 2022), 22-27 May 2022, Singapore, accepted.
-
M. Li, N. Zhong, X. Zhang, Z. Qian, and Sheng Li, Object-Oriented Backdoor Attack Against Image Captioning, 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP 2022), 22-27 May 2022, Singapore, accepted.
-
L. Feng, S. Li, Z. Qian, and X. Zhang, Stealthy Backdoor Attack with Adversarial Training, 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP 2022), 22-27 May 2022, Singapore, accepted.
-
N. Zhong, Z.Qian, and X. Zhang, Deep Neural Network Retrieval, MM '21: Proceedings of the 29th ACM International Conference on Multimedia, October 2021, pp 3455–3463
-
R. Zhu, P. Wei, S. Li, Z. Yin, X. Zhang and Z. Qian, Fragile Neural Network Watermarking with Trigger Image Set, International Conference on Knowledge Science, Engineering and Management (KSEM 2021), Tokyo, Japan, 2021
-
Z. You, S. Li, Z. Qian, and X. Zhang, Reversible Privacy-Preserving Recognition, IEEE International Conference on Multimedia and Expo (ICME) 2021, Shenzhen, China, 5-9 July 2021
-
N. Zhong, Z. Qian, and X. Zhang, Undetectable Adversarial Examples based on Microscopical Regularization, IEEE International Conference on Multimedia and Expo (ICME) 2021, Shenzhen, China, 5-9 July 2021
-
M. Shi, S. Li, Z. Yin, X. Zhang, and Z. Qian, On Generating JPEG Adversarial Images, IEEE International Conference on Multimedia and Expo (ICME) 2021, Shenzhen, China, 5-9 July 2021
-
Y. Ren, M. Dong, Z. Qian, X. Zhang, and G. Feng, Efficient Algorithm for Secure Outsourcing of Modular Exponentiation with Single Server, IEEE Transactions on Cloud Computing, 9(1): 145-154, 2021.
-
G. Feng, Y. Lan, X. Zhang, and Z. Qian. Dynamic adjustment of hidden node parameters for extreme learning machine, IEEE Transactions on Cybernetics, 45(2): 279-288, 2015
-
S. Wang, Z. Qian, L. Wang, et al, Recognition of layered structure using phase-frequency characteristics of reflected sound waves, 20th International Congress on Sound and Vibration 2013, ICSV 2013, 1633-1637, Bangkok, Thailand, July, 2013.
-
G. Feng, Z. Qian, and X. Zhang, Evolutionary selection extreme learning machine optimization for regression, Soft Computing, 16: 1485-1491, 2012.
-
G. Feng, Z. Qian and X. Zhang, Spectrum-estimation based lossless information recovery for sparse array patterns, Telecommunication Systems, 49(2): 163-169, 2012.
-
冯乐, 朱仁杰, 吴汉舟, 张新鹏, 钱振兴, 神经网络水印综述, 应用科学学报, 39(6), 881-892, 2021
2) Steganography
-
Z. You, Y. Qichao, Z. Qian, S. Li, X. Zhang, Image Generation Network for Covert Transmission in Online Social Network, MM '22: Proceedings of the 29th ACM International Conference on Multimedia, 2022
-
Q. Ying, H. Zhou, X. Zeng, H. Xu, Z. Qian, and X. Zhang, Hiding Images into Images with Real-world Robustness, IEEE ICIP 2022
-
P. Wei, S. Li, X. Zhang, G. Luo, Z. Qian, Q. Zhou, Generative Steganography Network, MM '22: Proceedings of the 29th ACM International Conference on Multimedia, 2022
-
P. Wei, G. Luo, Q. Song, X. Zhang, Z. Qian, and S. Li, Generative Steganographic Flow, IEEE International Conference on Multimedia and Expo (ICME) 2022, Taipei, Taiwan, 18-22 July, 2022
-
Z. Wang, G. Feng, Z. Qian, X. Zhang, JPEG Steganography with Content Similarity Evaluation, IEEE Transactions on Cybernetics, accepted.
-
G. Luo, P. Wei, S. Zhu, X. Zhang, Z. Qian, and Sheng Li, Image Steganalysis with Convolutional Vision Transformer, 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP 2022), 22-27 May 2022, Singapore, accepted.
-
N. Zhong, Z. Qian, Z. Wang, X. Zhang, and X. Li, Batch Steganography via Generative Network, IEEE Transactions on Circuits and Systems for Video Technology, 31(1): 88-97, 2021.
-
Z. Zhu, S. Li, Z. Qian, and X. Zhang, Destroying Robust Steganography in Online Social Networks, Information Sciences, 581: 605-619, 2021
-
G. Feng, X. Zhang, Y. Ren, Z. Qian, and S. Li, Diversity-based Cascade Filters for JPEG Steganalysis, IEEE Transactions on Circuits and Systems for Video Technology, 30(2): 376-386, 2020
-
黄承,钱振兴,张新鹏.一种新型的基于图像哈希的无载体隐写方案[J].北京理工大学学报(自然科学版),2020,40(12):1302~1306,1313.
-
Y. Ren, X. Zhang, G. Feng, Z. Qian, and F. Li, How to Extract Image Features based on Co-occurrence Matrix Securely and Efficiently in Cloud Computing, IEEE Transactions on Cloud Computing, 8(1): 207-219, 2020.
-
Z. Wang, X. Zhang, and Z. Qian, Practical Cover Selection for Steganography, IEEE Signal Processing Letters, 27, 71-75, 2020
-
T. Qiao, X. Luo, T. Wu, M. Xu, and Z. Qian, Adaptive Steganalysis Based on Statistical Model of Quantized DCT Coefficients for JPEG Images, IEEE Transactions on Dependable and Secure Computing, doi: 10.1109/TDSC.2019.2962672
-
N. Zhong, Z. Qian, Z. Wang, and X. Zhang, Steganography in Stylized Images, Journal of Electronic Imaging, 28(3): 033005, 2019.
-
L. Shi, Z. Wang, Z. Qian, N. Huang, P. Puteaux and X. Zhang, Distortion Function for Emoji Image Steganography, Computers, Materials & Continua, 59(3): 943-953, 2019.
-
Z. Wang, Z. Qian, X. Zhang, M. Yang, and D. Ye, On Improving Distortion Functions for JPEG Steganography, IEEE Access, 6(1): 74917-74930, 2018.
-
H. Zhou, K. Chen, W. Zhang, Z. Qian, and N. Yu, Targeted Attack and Security Enhancement on Texture Synthesis Based Steganography, Journal of Visual Communication and Image Representation, 54: 100-107, 2018.
-
Z. Qian, K. K. R. Choo, R. Cogranne, X. Zhang, Multimedia Security: Novel Steganography and Privacy Preserving, Security and Communication Networks, 2018
-
Z. Qian, H. Zhou, W. Zhang, and X. Zhang, Robust steganography using texture synthesis, in: Proceeding of the Twelfth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Nov., 21–23, 2016, Kaohsiung, Taiwan, vol. 1, pp. 25–33, Springer, 2017.
-
潘琳, 钱振兴, 张新鹏, 基于构造纹理图像的数字隐写,应用科学学报, 34(5): 625-632, 2016.
-
张新鹏, 钱振兴, 李晟, 信息隐藏研究展望, 应用科学学报, 34(5): 475-489, 2016.
-
程义民,钱振兴, 王以孝, 田源. 基于数位信息的信息隐藏方法, 电子与信息学报, 27(8): 1304-1309, 2005.
3) Reversible Data Hiding
-
Y. Qiu, Q. Ying, Y. Yang, H. Zeng, S. Li, and Z. Qian, High-Capacity Framework for Reversible Data Hiding in Encrypted Image Using Pixel Prediction and Entropy Encoding, IEEE Transactions on Circuits and Systems for Video Technology, doi: 10.1109/TCSVT.2022.3163905
-
Y. Qiu, Z. Qian, H. He, H. Tian, and X. Zhang, Optimized Lossless Data Hiding in JPEG Bitstream and Relay Transfer Based Extension, IEEE Transactions on Circuits and Systems for Video Technology, 31(4): 1380-1394, 2021
-
邱应强, 蔡灿辉, 曾焕强, 冯桂, 林晓丹, 钱振兴, 可自纠错的联合式加密图像可逆数据隐藏算法, 西安电子科技大学学报, 48(1): 107-116, 2021
-
Y. Qiu, Z. Qian, H. Zeng, X. Lin, and X. Zhang, Reversible Data Hiding in Encrypted Images Using Adaptive Reversible Integer Transformation, Signal Processing, 167, 107288, 1-10, 2020.
-
Z. Qian, H. Xu, X. Luo, and X. Zhang, New framework of reversible data hiding in encrypted JPEG bitstreams, IEEE Transactions on Circuits and Systems for Video Technology, 29(2): 351-362, 2019.
-
H. Ge, Y. Chen, Z. Qian, and J. Wang, A High Capacity Multi-Level Approach for Reversible Data Hiding in Encrypted Images, IEEE Transactions on Circuits and Systems for Video Technology, 29(8), 2285-2295, 2019.
-
Y. Qiu, H. Wang, Z. Wang, Z. Qian, G. Feng, and X. Zhang, Reversible Contrast Mapping based Reversible Data Hiding in Encrypted Images, IEEE International Workshop on Information Forensics and Security (WIFS 2018), Hong Kong, Dec. 11-13, 2018.
-
Y. Puyang, Z. Yin, and Z. Qian, Reversible Data Hiding in Encrypted Images with Two-MSB Prediction, IEEE International Workshop on Information Forensics and Security (WIFS 2018), Hong Kong, Dec. 11-13, 2018.
-
Z. Qian, H. Zhou, X. Zhang, and W. Zhang, Separable reversible data hiding in encrypted JPEG bitstreams, IEEE Transactions on Dependable and Secure Computing, 15(6): 1055-1067, 2018.
-
Y. Qiu, H. He, Z. Qian, S. Li, and X. Zhang, Lossless Data Hiding in JPEG Bitstream Using Alternative Embedding, Journal of Visual Communication and Image Representation, 52: 86-91, 2018.
-
Z. Qian, and X. Zhang, Reversible data hiding in encrypted image with distributed source encoding, IEEE Transactions on Circuits and Systems for Video Technology, 26(4): 636-646, 2016.
-
Z. Qian, X. Zhang, and G. Feng, Reversible data hiding in encrypted images based on progressive recovery, IEEE Signal Processing Letters, 23(11): 1672-1676, 2016.
-
Z. Qian, S. Dai, F. Jiang, and X. Zhang, Improved joint reversible data hiding in encrypted images, Journal of Visual Communication and Image Representation, 40: 732-738, 2016.
-
Y. Qiu, Z. Qian, and L. Yu, Adaptive Reversible data hiding by extending the generalized integer transformation, IEEE Signal Processing Letters, 23(1): 130-134, 2016.
-
X. Zhang, Z. Wang, J. Yu, and Z. Qian, Reversible visible watermark embedded in encrypted domain, IEEE China Summit and International Conference on Signal and Information Processing, ChinaSIP 2015, 826-830, 2015.
-
Z. Qian, X. Zhang, and S. Wang, Reversible data hiding in encrypted JPEG bitstream, IEEE Transactions on Multimedia, 16(5): 1486-1491, 2014.
-
X. Zhang, Z. Qian, G. Feng, and Y. Ren, Efficient reversible data hiding in encrypted images, Journal of Visual Communication and Image Representation, 25: 322-328, 2014.
-
Z. Qian, and X. Zhang, Lossless data hiding in JPEG bitstream, Journal of Systems and Software, 85(2): 309-313, 2012.
-
G. Feng, Z. Qian, and N. Dai, Reversible watermarking via extreme learning machine prediction, Neurocomputing, 82: 62-68, 2012.
-
冯国瑞, 钱振兴, 戴宁街. 最小均方预测高容量无损水印方案, 光电子•激光, 22(6): 911-915, 2011.
4) Digital Watermarking
-
Q. Ying, X. Hu, X. Zhang, Z. Qian, and X. Zhang, RWN: Robust Watermarking Network for Image Cropping Localization, IEEE ICIP 2022
-
X. Li, C. Qin, Z. Wang, Z. Qian, and X. Zhang, Unified Performance Evaluation Method for Perceptual Image Hashing, IEEE Transactions on Information Forensics & Security, 17, 1404–1419, 21 March, 2022
-
B. Deng, S. Li, Z. Qian, An SVD-Based Screen-Shooting Resilient Watermarking Scheme, Multimedia Tools and Applications, accepted.
-
Q Ying, Z Qian, H Zhou, X Zhang, H Xu, S Li, From Image to Imuge: Immunized Image Generation, MM '21: Proceedings of the 29th ACM International Conference on Multimedia, October 2021, pp 3565–3573
-
王翌妃, 周杨铭, 钱振兴, 李晟, 张新鹏, 鲁棒视频水印研究进展, 中国图象图形学报, 2021 录用
-
W. Huan, S. Li, Z. Qian, and X. Zhang, Exploring Stable Coefficients on Joint Sub-bands for Robust Video Watermarking in DT CWT Domain, IEEE Transactions on Circuits and Systems for Video Technology, doi: 10.1109/TCSVT.2021.3092004
-
J. He, Q. Ying, Z. Qian, G. Feng, and X. Zhang, Semi-Structured Data Protection Scheme Based on Robust Watermarking, EURASIP Journal on Image and Video Processing, 12(2020): 1-10, 2020
-
F. Cao, T. Wu, C. Qin, Z. Qian, and X. Zhang, New Paradigm for Self-embedding Image Watermarking with Poisson Equation, H. Wang et al. (Eds.): IWDW 2019, LNCS 12022, pp. 184–191, 2020.
-
Q. Ying, J. Lin, Z. Qian, H. Xu, and X. Zhang, Robust Digital Watermarking for Color Images in Combined DFT and DT-CWT Domains, Mathematical Biosciences and Engineering, 16(5): 4788–4801, 2019.
-
S. Li, X. Zhang, Z. Qian, G. Feng, and Y. Ren, Key based Artificial Fingerprint Generation for Privacy Protection, IEEE Transactions on Dependable and Secure Computing, 2018, DOI: 10.1109/TDSC.2018.2812192
-
辛昕, 钱振兴, 张新鹏, 代舒, 基于安全水印的三方交易系统, 应用科学学报, 33(6): 575-684, 2015.
-
Z. Qian, G. Feng, X. Zhang, and S. Wang, Image self-embedding with high-quality restoration capability, Digital Signal Processing, 21(2): 278-286, 2011.
-
X. Zhang, Z. Qian, Y. Ren, and G. Feng, Watermarking with flexible self-recovery quality based on compressive sensing and compositive reconstruction, IEEE Transactions on Information Forensics & Security, 6(4): 1223-1232, 2011.
-
X. Zhang, S. Wang, Z. Qian, and G. Feng, Reference sharing mechanism for watermark self-embedding, IEEE Transactions on Image Processing, 20(2): 485-495, 2011.
-
Z. Qian, and G. Feng, Inpainting assisted self recovery with decreased embedding data, IEEE Signal Processing Letters, 17(11): 929-932, 2010.
-
X. Zhang, S. Wang, Z. Qian, and G. Feng, Reversible fragile watermarking for locating tampered blocks in JPEG images, Signal Processing, 90(12): 3026-3036, 2010.
-
钱振兴, 程义民, 王以孝, 田源. 一种图像自嵌入方法, 电子学报, 34(7): 1347-1350, 2006.
5) Multimedia Forensics
-
B. Zhang, S. Li, G. Feng, Z. Qian, and X. Zhang, Patch Diffusion: A General Module for Face Manipulation Detection, the Thirty-Sixth AAAI Conference on Artificial Intelligence (AAAI-22), Vancouver, Canada, Feb. 22, 2022
-
S. Li, X. Zhu, G. Feng, X. Zhang, Z. Qian, Diffusing the liveness cues for face anti-spoofing, MM '21: Proceedings of the 29th ACM International Conference on Multimedia, October 2021, pp 1636–1644
-
C. Qin, Z. Qian, X. Li, and J. Wang, Artificial Intelligence Oriented Information Hiding and Multimedia Forensics, IETE Technical Review, 38(1): 1-4, 2021.
-
L. Dou, Z. Qian, Z. Wang, and G. Feng, Reversible Privacy Protection with the Capability of Anti-forensics, Security and Communication Networks, 2021, 1-12
-
L. Dou, Z. Qian, C. Qin, G. Feng, and X. Zhang, Anti-Forensics of Diffusion-Based Image Inpainting, Journal of Electronic Imaging, 29(4), 043026 (1-15), 2020.
-
Z. Qian, and X. Zhang, Improved anti-forensics of JPEG compression, Journal of Systems & Software, 91: 100-108, 2014.
-
乔通, 钱振兴, 张新鹏, 王文文. 基于局部能量方差特性的数字图像取证, 模式识别与人工智能, 25(2): 280-284, 2012.
6) Ciphertext Processing
-
C. Qin, J. Hu, F Li, Z. Qian, and X. Zhang, JPEG Image Encryption with Adaptive DC Coefficient Prediction and RS Pair Permutation, IEEE Transactions on Multimedia, 2022, doi: 10.1109/TMM.2022.3148591
-
秦川,郭梦琦,李欣然,钱振兴,张新鹏,一种加密域鲁棒图像哈希算法,软件学报,2021录用
-
Z. Qian, X. Zhang and Y. Ren, JPEG encryption for image rescaling in the encrypted domain, Journal of Visual Communication and Image Representation, 26: 9–13, 2015.
-
X. Zhang, Y. Ren, L. Shen, Z. Qian, and G. Feng. Compressing encrypted images with auxiliary information, IEEE Transactions on Multimedia, 16(5): 1327-1336, 2014.
-
任艳丽, 张新鹏, 钱振兴, 素数阶群中基于身份的匿名加密方案, 北京邮电大学学报, 36(5), 96-98, 2013.
-
X Zhang, G Feng, Y Ren, and Z Qian, Scalable coding of encrypted images, IEEE Transactions on Image Processing, 21 (6): 3108-3114, 2012.