删除或更新信息,请邮件至freekaoyan#163.com(#换成@)

上海大学通信与信息工程学院研究生导师简介-张新鹏

上海大学 免费考研网/2013-04-21



张新鹏博士、教授、博导

办公室:
上海大学延长校区行健楼1120室

通信地址:
上海市延长路149号上海大学通信与信息工程学院

邮政编码:
200072

电话:
021-56331435

电子邮件:
xzhang@shu.edu.cn

EnglishVersion
个人主页:
http://scie.shu.edu.cn/Portals/264/zhangxp.htm
【教育经历】
2004年毕业于上海大学通信与信息工程学院,获工学博士学位
2001年于上海大学通信与信息工程学院获工学硕士学位
1995年毕业于吉林大学数学系,获理学学士学位

【工作经历】
2011~2012,德国Konstanz大学,Humboldt资深研究员
2010~2011,美国纽约州立大学Binghamton分校,访问学者
2008~,上海大学通信与信息工程学院,教授
2006~2008,上海大学通信与信息工程学院,副教授
2004~2006,上海大学通信与信息工程学院,讲师
1997~1998,大连LG产电有限公司,项目经理
1995~1996,吉林大学高等教育研究所,助理编辑

【研究领域】
多媒体信息安全、信息隐藏、数字取证、加密域信号处理、图像处理

【学术兼职】
中国电子学会通信学分会多媒体安全专家委员会,专家委员
国家质检总局防伪技术专家
上海市计算机学会信息安全专业委员会,副主任委员
InternationalJournalofInformationandComputerScience,Memberoftheeditorialboard
InternationalJournalofMultimediaIntelligenceandSecurity,Memberoftheeditorialboard
ConferencePapersinSignalProcessing,Memberoftheeditorialboard
IntelligentAutomationandSoftComputing,AssociateEditor
NetworkingandElectronicCommerceJournal,AssociateEditor

【科研项目】
2012~2014,高度安全的数字隐写研究,教育部博士点基金(博导类),主持
2011~2013,广义隐写编码与多载体安全隐写研究,国家自然科学基金,主持
2010~2012,数字图像内容的真伪鉴定研究,上海市科委国际合作项目,主持
2010~2012,数字图像中的新型安全隐写,上海市科技启明星跟踪计划,主持
2010~2011,新型数字隐写编码研究,教育部科研重点项目,主持
2009~2011,数字图像真实性的被动取证研究,国家自然科学基金,主持
2009~2011,数字隐写中的新型编码研究,上海市教委科研创新重点项目,主持
2007~2009,数字图像反隐写关键技术,国家高技术研究发展计划(863计划),主持
2006~2008,数字图像中的隐写分析与反隐写综合措施研究,上海市青年科技启明星计划,主持
2006~2008,具有统计隐蔽性和抗干扰性的安全密写研究,国家自然科学基金,主持
2004~2007,抗统计分析的数字图像密写研究,上海市科委基础研究重点项目,主持
2004~2006,具有多重免疫性的安全数字水印协议与算法研究,上海市教委青年基金,主持

【授课情况】
信息论与编码(本科生)
数字图像处理(本科生)
通信与信息新技术进展(研究生)

【近期论文】
InternationalJournalPapers:
1.X.Zhang,G.Feng,Y.Ren,andZ.Qian,ScalableCodingofEncryptedImages,IEEETrans.onImageProcessing,(toappear)
2.Y.Ren,S.Wang,andX.Zhang,PracticalParallelKey-InsulatedEncryptionwithMultipleHelperKeys,ComputersandMathematicswithApplications,(toappear)
3.Y.Ren,S.Wang,andX.Zhang,FullySecureExpressiveCiphertext-PolicyAttribute-BasedEncryptionwithoutRandomOracles,Information,(toappear)
4.X.Zhang,SeparableReversibleDataHidinginEncryptedImage,IEEETrans.onInformationForensics&Security,7(2),pp.526-532,2012.
5.X.ZhangandS.Wang,EfficientDataHidingwithHistogram-PreservingProperty,TelecommunicationSystems,49(2),pp.179-185,2012.
6.H.Yao,S.Wang,Y.Zhao,andX.Zhang,DetectingImageForgeryUsingPerspectiveConstraints,IEEESignalProcessingLetters,19(3),pp.123-126,2012.
7.C.Qin,S.Wang,andX.Zhang,Simultaneousinpaintingforimagestructureandtextureusinganisotropicheattransfermodel,MultimediaToolsandApplications,56(3),pp.469-483,2012.
8.Z.Qian,andX.Zhang,LosslessDataHidinginJPEGBitstream,JournalofSystemsandSoftware,85(2),pp.309-313,2012.
9.G.Feng,Z.Qian,andX.Zhang,Spectrum-EstimationBasedLosslessInformationRecoveryforSparseArrayPatterns,TelecommunicationSystems,49(2),pp.163-169,2012.
10.X.Zhang,Z.Qian,Y.Ren,andG.Feng,WatermarkingwithFlexibleSelf-RecoveryQualityBasedonCompressiveSensingandCompositiveReconstruction,IEEETrans.onInformationForensics&Security,6(4),pp.1223-1232,2011.
11.X.Zhang,S.Wang,Z.Qian,andG.Feng,ReferenceSharingMechanismforWatermarkSelf-Embedding,IEEETrans.onImageProcessing,20(2),pp.485-495,2011.
12.X.Zhang,LossyCompressionandIterativeReconstructionforEncryptedImage,IEEETrans.onInformationForensics&Security,6(1),pp.53-58,2011.
13.X.Zhang,ReversibleDataHidinginEncryptedImage,IEEESignalProcessingLetters,18(4),pp.255-258,2011.
14.X.Zhang,S.Wang,andG.Feng,ReversibleVisibleWatermarkingwithLosslessDataEmbeddingBasedonDifferenceValueShift,IntelligentAutomationandSoftComputing,17(2),pp.233-243,2011.
15.X.Zhang,S.Wang,Z.Qian,andG.Feng,Self-EmbeddingWatermarkwithFlexibleRestorationQuality,MultimediaToolsandApplications,54(2),pp.385-395,2011.
16.Q.Wu,S.Wang,andX.Zhang,Log-PolarBasedSchemeforRevealingDuplicatedRegionsinDigitalImages,IEEESignalProcessingLetters,18(10),pp.559-562,2011.
17.Y.Ren,S.Wang,andX.Zhang,ImprovedHierarchicalIdentity-BasedParallelKey-InsulatedEncryption,JournalofInternetTechnology,12(4),pp.647-658,2011.
18.C.Qin,F.Cao,andX.Zhang,EfficientImageInpaintingUsingAdaptiveEdge-PreservingPropagation,TheImagingScienceJournal,59(4),pp.211-218,2011.
19.Z.Qian,G.Feng,X.Zhang,andS.Wang,ImageSelf-EmbeddingwithHigh-QualityRestorationCapability,DigitalSignalProcessing,21(2),pp.278-286,2011.
20.Z.Tang,S.Wang,X.Zhang,W.Wei,andY.Zhao,LexicographicalframeworkforimagehashingwithimplementationbasedonDCTandNMF,MultimediaToolsandApplications,52(2-3),pp.325-345,2011.
21.Z.Tang,S.Wang,X.Zhang,andW.Wei,StructuralFeatureBasedImageHashingandSimilarityMetricforTamperingDetection,FundamentaInformaticae,106(1),pp.75-91,2011.
22.X.Zhang,EfficientDataHidingwithPlus-MinusOneorTwo,IEEESignalProcessingLetters,17(7),pp.635-638,2010.
23.X.Zhang,S.Wang,Z.Qian,andG.Feng,ReversibleFragileWatermarkingforLocatingTamperedBlocksinJPEGImages,SignalProcessing,90(12),pp.3026-3036,2010.
24.S.Wang,S.Huang,X.Zhang,andW.Wu,Hologram-BasedWatermarkingCapableofSurvivingPrint-ScanProcess,AppliedOptics,49(7),pp.1170-1178,2010.
25.W.Zhang,X.Zhang,andS.Wang,Near-OptimalCodesforInformationEmbeddinginGray-ScaleSignals,IEEETrans.onInformationTheory,56(3),pp.1262-1270,2010.
26.H.J.Kim,C.Kim,Y.Choi,S.Wang,X.Zhang,ImprovedModificationDirectionMethods,ComputersandMathematicswithApplications,60(2),pp.319-325,2010.
27.W.Wei,S.Wang,X.Zhang,andZ.Tang,EstimationofImageRotationAngleUsingInterpolation-RelatedSpectralSignatureswithApplicationtoBlindDetectionofImageForgery,IEEETrans.onInformationForensics&Security,5(3),pp.507-517,2010.
28.Z.Qian,X.Zhang,G.Feng,andY.Ren,ColorFilterArrayInterpolationBasedSelfRecoverywithAnti-croppingCapability,InternationalJournalofMultimediaIntelligenceandSecurity,1(2),pp.191-203,2010.
29.C.Qin,Q.Mao,andX.Zhang,ImageWatermarkingSchemeWithUnequalProtectionCapabilityBasedonErrorCorrectingCodes,JournalofMultimedia,5(5),pp.427-433,2010.
30.Y.Ren,D.Gu,S.Wang,andX.Zhang,NewFuzzyIdentityBasedEncryptionSchemeintheStandardModel,Informatica,21(3),pp.393-407,2010.
31.Y.Ren,D.Gu,S.Wang,andX.Zhang,HierarchicalIdentity-BasedProxyRe-encryptionwithoutRandomOracles,InternationalJournalofFoundationsofComputerScience,21(6),pp.1049-1063,2010.
32.X.ZhangandS.Wang,FragileWatermarkingSchemeUsingaHierarchicalMechanism,SignalProcessing,89(4),pp.675-679,2009.
33.X.Zhang,S.WangandW.Zhang,SteganographyCombiningDataDecompositionMechanismandStego-codingMethod,Informatica,33(1),pp.41–48,2009.
34.X.ZhangandS.Wang,FragileWatermarkingwithError-FreeRestorationCapability,IEEETrans.onMultimedia,10(8),pp.1490-1499,2008.
35.X.Zhang,S.Wang,andZ.Zhou,MultibitAssignmentSteganographyinPaletteImages,IEEESignalProcessingLetters,15,pp.553-556,2008.
36.Z.Tang,S.Wang,X.Zhang,W.Wei,andS.Su,RobustImageHashingforTamperDetectionUsingNon-NegativeMatrixFactorization,JournalofUbiquitousConvergenceandTechnology,2(1),pp.18-26,2008.
37.X.Zhang,W.Zhang,andS.Wang,IntegratedEncodingwithHighEfficiencyforDigitalSteganography,ElectronicsLetters,43(22),pp.1191-1192,2007.
38.W.Zhang,X.Zhang,andS.Wang,ADoubleLayered“Plus-MinusOne”DataEmbeddingScheme,IEEESignalProcessingLetters,14(11),pp.848-851,2007.
39.X.ZhangandS.Wang,StatisticalFragileWatermarkingCapableofLocatingIndividualTamperedPixels,IEEESignalProcessingLetters,14(10),pp.727-730,2007.
40.W.Zhang,S.Wang,andX.Zhang,ImprovingEmbeddingEfficiencyofCoveringCodesforApplicationsinSteganography,IEEECommunicationsLetters,11(8),pp.680-682,2007.
41.X.Zhang,W.ZhangandS.Wang,EfficientDouble-LayeredSteganographicEmbedding,ElectronicsLetters,43(8),pp.482-483,2007.
42.X.ZhangandS.Wang,WatermarkingSchemeCapableofResistingSensitivityAttack,IEEESignalProcessingLetters,14(2),pp.125-128,2007.
43.X.ZhangandS.Wang,ImageRestorationUsingTruncatedSVDFilterBankBasedonanEnergyCriterion,IEEProceedings-Vision,Image&SignalProcessing,153(6),pp.825-836,2006.
44.X.ZhangandS.Wang,EfficientSteganographicEmbeddingbyExploitingModificationDirection,IEEECommunicationsLetters,10(11),pp.781-783,2006.
45.X.ZhangandS.Wang,DynamicalRunningCodinginDigitalSteganography,IEEESignalProcessingLetters,13(3),pp.165-168,2006.
46.X.ZhangandS.Wang,Stego-EncodingwithErrorCorrectionCapability,IEICETransactionsonFundamentalsofElectronics,CommunicationsandComputerSciences,E88-A(12),pp.3663-3667,2005.
47.X.ZhangandS.Wang,SteganographyUsingMultiple-BaseNotationalSystemandHumanVisionSensitivity,IEEESignalProcessingLetters,12(1),pp.67-70,2005.
48.X.ZhangandS.Wang,InvertibilityAttackagainstWatermarkingBasedonForgedAlgorithmandaCountermeasure,PatternRecognitionLetters,25(8),pp.967-973,2004.
49.X.ZhangandS.Wang,VulnerabilityofPixel-ValueDifferencingSteganographytoHistogramAnalysisandModificationforEnhancedSecurity,PatternRecognitionLetters,25(3),pp.331-339,2004.
50.X.ZhangandS.Wang,WatermarkingSchemeCapableofResistingAttacksBasedonAvailabilityofInserter,SignalProcessing,82(11),pp.1801-1804,2002.
51.S.WangandX.Zhang,LeastSquareConvolutionMaskforImageRestoration,JournaloftheImagingSocietyofJapan,41(4),pp.392-397,2002.
52.S.Wang,X.Zhang,andT.Ma,ImageWatermarkingUsingDitherModulationinDual-TransformDomain,JournaloftheImagingSocietyofJapan,41(4),pp.398-402,2002.

InternationalConferencePapers:
1.X.Zhang,Z.Qian,F.Li,G.Feng,andY.Ren,EfficientDataHidingwithHighPayload,Proceedingsofthe3rdInternationalConferenceonMultimediaInformationNetworking&Security(MINES2011),Nov4-6,2011,pp.318-321,Shanghai,China.
2.Y.Ren,S.Wang,X.Zhang,andZ.Qian,FullySecureCiphertext-PolicyAttribute-BasedEncryptionwithConstantSizeCiphertext,Proceedingsofthe3rdInternationalConferenceonMultimediaInformationNetworking&Security(MINES2011),Nov4-6,2011,pp.380-384,Shanghai,China.
3.X.Zhang,Y.Ren,G.Feng,andZ.Qian,CompressingEncryptedImageUsingCompressiveSensing,Proceedingsofthe7thInternationalConferenceonIntelligentInformationHidingandMultimediaSignalProcessing(IIHMSP2011),Oct.14-16,2011,pp.222-225,Dalian,China.
4.H.Mao,G.Feng,X.Zhang,andH.Yao,ARobustandFastVideoFingerprintingBasedon3D-DCTandLSH,Proceedingsofthe2011InternationalConferenceonMultimediaTechnology(ICMT2011),July26-28,2011,pp.108-111,Hangzhou,China.
5.F.Li,L.Shi,X.Zhang,andY.Chen,DataEmbeddingwithMulti-aryTreeCoding,Proceedingsofthe2011InternationalConferenceonMultimediaTechnology(ICMT2011),July26-28,2011,pp.267-270,Hangzhou,China.
6.L.Shi,F.Li,Y.Chen,andX.Zhang,SteganographicEmbeddinginJPEGImageswithVisualCriterion,Proceedingsofthe2011InternationalConferenceonMultimediaTechnology(ICMT2011),July26-28,2011,pp.743-746,Hangzhou,China.
7.H.Liu,G.Liao,X.Zhang,Z.Xu,VisuallyOptimizedHigh-QualityJPEGSteganography,Proceedingsofthe2ndInternationalConferenceonImageAnalysisandSignalProcessing(IASP2010),Xiamen,China,April12-14,2010,pp.77-81.
8.Y.Ren,S.Wang,X.Zhang,andZ.Qian,Identity-BasedParallelKey-InsulatedEncryptionwithMultipleLong-TermKeys,Proceedingsof2010InternationalColloquiumonComputing,Communication,Control,andManagement(CCCM2010),IEEETechnologyManagementCouncil,Yangzhou,China,Aug.2010,pp.376-379.
9.K.Xu,X.Zhang,andS.Wang,VoEBasedSteganalysisonLSBMatchinginRawImages,Proceedingsofthe2ndInternationalConferenceonMultimediaandComputationalIntelligence(ICMCI2010),Wuhan,China,Sept.29-30,2010,pp.492-495.
10.Y.Ren,S.Wang,X.Zhang,andZ.Qian,FullySecureAnonymousIdentity-BasedEncryptionunderSimpleAssumptions,Proceedingsofthe2010InternationalConferenceonMultimediaInformationNetworkingandSecurity(MINES2010),Nanjing,China,Nov.4–6,2010,pp.428-432.
11.C.Qin,J.-H.Li,W.-B.Lee,andX.Zhang,SecureImageDeliverySchemeUsingPoissonEditing,Proceedingsofthe2010InternationalConferenceonMultimediaInformationNetworkingandSecurity(MINES2010),Nanjing,China,Nov.4–6,2010,pp.902-906.
12.Z.Fang,S.Wang,andX.Zhang,ImageSplicingDetectionUsingColorEdgeInconsistency,Proceedingsofthe2010InternationalConferenceonMultimediaInformationNetworkingandSecurity(MINES2010),Nanjing,China,Nov.4–6,2010,pp.923-926.
13.Q.Wu,S.Wang,andX.Zhang,DetectionofImageRegion-DuplicationwithRotationandScalingTolerance,Proceedingsofthe2ndInternationalConferenceonComputationalCollectiveIntelligence(ICCCI2010),LectureNotesinComputerScience,6421,Springer-Verlag,Kaohsiung,Taiwan,Nov.10-12,2010,pp.100-108.
14.G.Liao,andX.Zhang,AReversibleDataHidingforJPEGImages,Proceedingsofthe2010InternationalConferenceonElectricalEngineeringandAutomaticControl(ICEEAC2010),Zibo,China,Nov.26-28,2010,pp.448-451.
15.H.Yao,S.WangandX.Zhang,DetectPiecewiseLinearContrastEnhancementandEstimateParametersusingSpectralAnalysisofImageHistogram,Proceedingsof2009IETInternationalCommunicationConferenceonWirelessMobile&Computing,Shanghai,China,December2009,pp.94-97.
16.S.Li,A.C.Kot,X.Zhang,DataHidinginImagesBasedonTolerableErrorRange,Proceedingsofthe7thInternationalConferenceonInformation,CommunicationsandSignalProcessing(ICICS2009),Macau,China,December2009,pp.1-5.
17.X.Zhang,W.Zhang,andS.Wang,SteganographywithHistogram-PreservingandDistortion-ConstrainingProperties,ProceedingsoftheFirstInternationalConferenceonMultimediaInformationNetworking&Security(MINES2009),Wuhan,China,Nov18-20,2009,pp.30-34.
18.Z.Fang,S.Wang,andX.Zhang,ImageSplicingDetectionUsingCameraCharacteristicInconsistency,ProceedingsoftheFirstInternationalConferenceonMultimediaInformationNetworking&Security(MINES2009),Wuhan,China,Nov18-20,2009,pp.20-24.
19.C.Qin,Q.Mao,andX.Zhang,ImageWatermarkingWithUnequalErrorProtectionCapability,ProceedingsoftheFirstInternationalConferenceonMultimediaInformationNetworking&Security(MINES2009),Wuhan,China,Nov18-20,2009,pp.81-84.
20.Z.Qian,X.Zhang,andS.Wang,MatrixSelectioninHighPayloadEmbedding,ProceedingsoftheFifthInternationalConferenceonIntelligentInformationHidingandMultimediaSignalProcessing(IIHMSP2009),Kyoto,Japan,Sep.12-14,2009,pp.328-331.
21.X.Zhang,S.Wang,andG.Feng,FragileWatermarkingSchemewithExtensiveContentRestorationCapability,Proceedingofthe8thInternationalWorkshoponDigitalWatermark(IWDW2009),Guildford,UK,August24-26,2009,pp.268-278,LectureNotesinComputerScience,5703,pp.268-278.
22.Z.Tang,S.Wang,X.Zhang,andW.Wei,PerceptualSimilarityMetricResilienttoRotationforApplicationinRobustImageHashing,Proceedingsofthe3rdInternationalConferenceonMultimediaandUbiquitousEngineering(MUE2009),Qingdao,China,June4-6,2009,pp.183-188.
23.X.Zhang,S.Wang,andW.Zhang,EfficientSteganographyBasedonaDataDecompositionMechanism,ProceedingsoftheInternationalWorkshoponMultimediaSecurityinCommunication(MUSIC'08),Hangzhou,China,August28,2008.
24.C.Qin,S.Wang,andX.Zhang,ImageEditingwithoutColorInconsistencyUsingModifiedPoissonEquation,ProceedingsoftheFourthInternationalConferenceonIntelligentInformationHidingandMultimediaSignalProcessing(IIHMSP2008),Harbin,China,August15-17,2008,pp.397-401.
25.W.Zhang,X.Zhang,andS.Wang,TwiceGridColoringsinSteganography,ProceedingsoftheFourthInternationalConferenceonIntelligentInformationHidingandMultimediaSignalProcessing(IIHMSP2008),Harbin,China,August15-17,2008,pp.1301-1304.
26.Q.Li,S.Wang,andX.Zhang,HierarchicalIdentificationofVisuallySalientImageRegions,ProceedingsofInternationalConferenceonAudio,LanguageandImageProcessing(ICALIP2008),Shanghai,China,July2008,pp.1709-1712.
27.C.-C.Chang,X.Zhang,andS.Wang,GeneralizedRunningCodingforEfficientDataHiding,ProceedingsofInternationalConferenceonAudio,LanguageandImageProcessing(ICALIP2008),Shanghai,China,July2008,pp.490-494.
28.W.Zhang,X.Zhang,andS.Wang,MaximizingSteganographicEmbeddingEfficiencybyCombiningHammingCodesandWetPaperCodes,Proceedingsofthe10thInformationHidingWorkshop(IH2008),SantaBarbara,USA,May2008,pp.61-73.
29.C.Qin,C.Liu,S.Wang,andX.Zhang,SimultaneousInpaintingofImageStructureandTexturewithPDE,Proceedingsofthe6thInternationalConferenceonImagingScienceandHardcopy(ICISH’08),Zhanjiang,China,Jan.2008,pp.40-42.
30.S.Wang,andX.Zhang,AttacksonPerceptualImageHashing,Proceedingsof2ndInternationalConferenceonUbiquitousInformationTechnologiesandApplications,Bali,Indonesia,Dec.2007,pp.199-203.
31.C.-C.Wang,C.-C.Chang,X.Zhang,andJ.-K.Jan,SenaryHuffmanCompression-AReversibleDataHidingSchemeforBinaryImages,ProceedingsofInternationalWorkshoponMultimediaContentAnalysisandMining(MCAM’07),LectureNotesinComputerScience,4577,Weihai,China,June2007,pp.351-360.
32.C.Qin,W.-B.Lee,X.Zhang,andS.Wang,CopyrightManagementUsingProgressiveImageDelivery,VisibleWatermarkingandRobustFingerprinting,9thInt.Conf.Control,Automation,RoboticsandVision(ICARCV2006),Singapore,Dec.2006,pp.1766-1769.
33.C.Chen,S.Wang,andX.Zhang,InformationHidinginTextUsingTypesettingToolswithStego-Encoding,FirstInternationalConferenceonInnovativeComputing,InformationandControl(ICICIC'06)-VolumeI,Beijing,China,Aug.2006,pp.459-462.
34.X.ZhangandS.Wang,InformationCapacityofQuantizationSteganographyinthePresenceofActiveAttack,Proceedingsofthe12thInternationalMulti-MediaModellingConference(MMM2006),Beijing,China,Jan.2006,pp.385-388.
35.X.ZhangandS.Wang,WatermarkingProtocolCompatiblewithSecretAlgorithmsforResistingInvertibilityAttack,Knowledge-BasedIntelligentInformationandEngineeringSystems,LectureNotesinArtificialIntelligence,3682,Melbourne,Australia,Sep.2005,pp.1134-1144.
36.X.ZhangandS.Wang,AnalysisofParityAssignmentSteganographyinPaletteImages,Knowledge-BasedIntelligentInformationandEngineeringSystems,LectureNotesinArtificialIntelligence,3683,Melbourne,Australia,Sep.2005,pp.1025-1031.
37.X.ZhangandS.Wang,ANewWatermarkingSchemeagainstInserter-BasedAttacksSuitableforDigitalMediawithModerateSize,ProceedingsoftheThirdInternationalConferenceonInformationSecurity,Shanghai,China,Nov.2004,pp.247-248.
38.X.Zhang,S.Wang,andK.Zhang,SteganographywithLeastHistogramAbnormality,ComputerNetworkSecurity,LectureNotesinComputerScience,2776,St.Petersburg,Russia,Sep.2003,pp.395-406.
39.X.Zhang,S.Wang,andK.Zhang,Multi-bitWatermarkingSchemeBasedonAdditionofOrthogonalSequences,ComputerNetworkSecurity,LectureNotesinComputerScience,2776,St.Petersburg,Russia,Sep.2003,pp.407-418.
40.S.Wang,X.Zhang,andK.Zhang,DataHidinginDigitalAudiobyFrequencyDomainDithering,ComputerNetworkSecurity,LectureNotesinComputerScience,2776,St.Petersburg,Russia,Sep.2003,pp.383-394.
41.K.Zhang,S.Wang,andX.Zhang,DetectionandRemovalofHiddenDatainImagesEmbeddedwithQuantizationIndexModulation,ComputerNetworkSecurity,LectureNotesinComputerScience,2776,St.Petersburg,Russia,Sep.2003,pp.360-370.
42.X.ZhangandS.Wang,ANovelDeconvolutionApproachtoImageRestoration,SecondInternationalConferenceonImageandGraphics,ProceedingsofSPIE,4875,Hefei,China,Aug.2002,pp.103-110.
43.K.Zhang,S.Wang,andX.Zhang,ANewMetricforQualityAssessmentofDigitalImagesBasedonWeighted-MeanSquareError,SecondInternationalConferenceonImageandGraphics,ProceedingsofSPIE,4875,Hefei,China,Aug.2002,pp.491-497.
44.S.WangandX.Zhang,LeastSquareConvolutionMaskforImageRestoration,inProceedingsofInternationalCongressofImageScience2002(ICIS’02),Tokyo,Japan,May2002,pp.688-689.
45.X.Zhang,K.Zhang,andS.Wang,WatermarkingwithIdentifiabilityofEmbeddingOrder,ProceedingsofInternationalCongressofImageScience2002(ICIS’02),Tokyo,Japan,May2002,pp.608-609.
46.X.Zhang,K.Zhang,andS.Wang,MultispectralImageWatermarkingBasedonKLT,ImageCompressionandEncryptionTechnologies,ProceedingsofSPIE,4551,Wuhan,China,Oct.2001,pp.107-114.

中文期刊论文:
1.张新鹏,刘焕,张颖春,王朔中,融合方向编码和湿纸编码的高效信息隐藏,上海大学学报,16(1),pp.1-4,2010.
2.郁志鸣、王朔中、张新鹏、刘婷婷,结合对比特性与局部清晰特性的图像显著区域检测,应用科学学报,28(1),pp.24-31,2010.
3.秦川、王朔中、张新鹏,基于各向异性热传导模型的自适应图像修复,仪器仪表学报,31(6),pp.1303-1309,2010.
4.秦运龙、孙广玲、王朔中、张新鹏,根据GOP异常进行视频序列剪辑篡改的盲检测,电子学报,38(7),pp.1597-1602,2010.
5.王朔中、张新鹏、张卫明,以数字图像为载体的隐写分析研究进展,计算机学报,32(7),pp.1247-1263,2009.
6.张卫明、王朔中、张新鹏,基于嵌入影响变化率的灰度图像LSB匹配检测方法,计算机研究与发展,46(Suppl.1),pp.188-191,2009.
7.秦运龙、孙广玲、张新鹏,利用运动矢量进行视频篡改检测,计算机研究与发展,46(Suppl.1),pp.227-233,2009.
8.秦川、王朔中、张新鹏,针对Poisson方程图像编辑的篡改检测,计算机研究与发展,46(Suppl.1),pp.234-238,2009.
9.唐振军、王朔中、魏为民、张新鹏,利用分块相似系数构造感知图像Hash,计算机研究与发展,46(Suppl.1),pp.311-317,2009.
10.孙文颙、刘婷婷、张新鹏、王朔中,彩色图像通用隐写分析的多类统计特征,中国图象图形学报,13(10),pp.1914-1917,2008.
11.李茜、王朔中、金秋明、张新鹏,兼顾视觉质量和载体图像无损重建的可见水印,中国图象图形学报,13(10),pp.1947-1950,2008.
12.金秋明、王朔中、李茜、张新鹏,基于角点检测的稳健图像摘要,中国图象图形学报,13(8),pp.1454-1458,2008.
13.李晟、张新鹏,利用JPEG压缩特性的合成图像检测,应用科学学报,26(3),pp.281-287,2008.
14.孙文颙、张新鹏、王朔中,基于直方图差异的模型隐写分析,上海大学学报,14(2),pp.111-115,2008.
15.张卫明、张新鹏、王朔中,适用于灰度级信号的数据嵌入方法,南京理工大学学报,32(2),pp.209-213,2008.
16.张新鹏、王朔中,基于稀疏表示的密写编码,电子学报,35(10),pp.1892-1896,2007.
17.张新鹏、王朔中、周振宇,对于抗敏感性攻击水印的强化攻击,东南大学学报,37(Sup.1),pp.53-57,2007.
18.唐振军、魏为民、张新鹏、王朔中,用于图像检索的稳健Hash,东南大学学报,37(Sup.1),pp.105-108,2007.
19.李晟、张新鹏、王朔中,基于可容忍失真的数字图像隐写,中国图象图形学报,12(2),pp.212-217,2007.
20.刘春庆、梁光岚、王朔中、张新鹏,应用二值图像信息隐藏技术实现彩色图像中的安全隐写,应用科学学报,25(4),pp.342-347,2007.
21.秦川、王朔中、张新鹏,一种基于视觉特性的图像摘要算法,中国图象图形学报,11(11),pp.1678-1681,2006.
22.张新鹏、王朔中、陈超,不需权威第三方的非对称指纹方案,哈尔滨工业大学学报,38(增刊),pp.727-730,2006.
23.陈超、王朔中、张新鹏,应用TeX控制功能和图像检测的文本密写,应用科学学报,24(2),pp.115-119,2006.
24.张新鹏、王朔中,JPEG图像中的安全密写方案,电子与信息学报,27(11),pp.1813-1817,2005.
25.周振宇、张新鹏、王朔中,抗随机几何攻击的音频水印方案,中国图象图形学报,10(11),pp.1466-1470,2005.
26.张新鹏、王朔中,基于像素交换的无损信息隐藏,光电子·激光,16(8),pp.956-960,2005.
27.张新鹏、王朔中,对空域BPCS密写的统计分析,计算机辅助设计与图形学学报,17(7),pp.1625-1629,2005.
28.刘伟、王朔中、张新鹏,抗MP3编码的音频水印频域嵌入方案,应用科学学报,23(4),pp.341-344,2005.
29.张新鹏、王朔中,对OPA密写的检测和增强安全性的调色板图像密写方案,电子学报,32(10),pp.1702-1705,2004.
30.张新鹏、王朔中,抗可逆性攻击和嵌入器攻击的安全水印系统,中山大学学报(自然科学版),43(增刊2),pp.10-13,2004.
31.刘伟、王朔中、张新鹏,一种基于部分MP3编码原理的音频水印,中山大学学报(自然科学版),43(增刊2),pp.26-28,2004.
32.贾骏、王朔中、张新鹏,码分复用数字音频水印嵌入方案,上海交通大学学报,38(12),pp.2073-2077,2004.
33.胡烨雯、张新鹏、王朔中,一种可估计最低位平面嵌入信息量的密写分析方法,上海交通大学学报,38(增刊),pp.122-124,2004.
34.贾骏、王朔中、张新鹏,一种基于人耳听觉特性的数字音频水印方案,西安电子科技大学学报,31(4),pp.652–656,2004.
35.张新鹏、王朔中、张开文,基于统计特性的LSB密写分析,应用科学学报,22(1),pp.16-19,2004.
36.张新鹏、王朔中、张开文,基于视觉特性的多比特量化水印方案,光电子·激光,14(11),pp.1179-1182,2003.
37.张新鹏、王朔中,JPEG图象中的无损信息隐藏,中国图象图形学报,8(特刊),pp.563–566,2003.
38.张新鹏、王朔中、张开文,抗统计分析的LSB密写方案,中国图象图形学报,8(9),pp.1055-1060,2003.
39.张开文、张新鹏、王朔中,图像及音频信号中隐蔽嵌入信息存在性的统计检验,电子与信息学报,25(7):871–877,2003.
40.张新鹏、王朔中、张开文,迭加与量化两种水印嵌入方案的比较及量化参数优化,光电子·激光,14(8),pp.858-861,2003.

【学术著作】
王朔中,张新鹏,张开文,数字密写和密写分析——互联网时代的信息战技术,清华大学出版社,北京,2005年

【发明专利】
1.张新鹏,王朔中,王威娜,基于灰度调整的无损信息隐藏方法,ZL200410067794.X,授权时间:2007年5月
2.周振宇,梁光岚,张新鹏,王朔中,路兴,数字图像中最不重要位替换信息隐藏的快速检测方法,ZL200710038710.3,授权时间:2008年12月
3.陈轶,张新鹏,王朔中,魏为民,基于连“1”特性的JPEG图像再次编码检测方法,ZL200810201976.1,授权时间:2010年8月
4.魏为民,王朔中,张新鹏,唐振军,数字图像缩放因子的盲检测方法,ZL200810203981.4,授权时间:2011年11月
5.黄素娟,王朔中,张新鹏,吴蔚,抗照片打印-扫描攻击和硬拷贝剪切的全息图像水印方法,申请号:200910046528.4,申请时间:2009年1月
6.刘焕,张新鹏,廖贵龙,张颖春,王朔中,魏为民,基于像素分组策略的可逆数据隐藏方法,申请号:200910196507.8,申请时间:2009年9月
7.秦运龙,孙广玲,张新鹏,刘焕,王朔中,魏为民,一种基于压缩域的视频序列Copy-Move篡改检测方法,申请号:200910198209.2,申请时间:2009年11月
8.施柳,栗风永,张新鹏,钱振兴,王朔中,机密信息的游动编码隐藏方法,申请号:201110171393.9,申请日期:2011年6月

【获奖情况】
上海市新长征突击手,2009
YOCSEF上海IT新锐奖,2009
上海大学十佳杰出青年,2009
上海大学优秀青年教师,2006
上海市优秀博士学位论文,2005
上海市档案科技成果奖特等奖、国家档案局优秀科技成果奖三等奖,2004

【国际期刊审稿】
1.IEEETrans.ImageProcessing
2.IEEETrans.InformationForensicsandSecurity
3.IEEETrans.CircuitsandSystemsforVideoTechnology
4.IEEETrans.Systems,ManandCybernetics
5.IEEESignalProcessingLetters
6.IEEECommunicationsLetters
7.IEEESystemsJournal
8.IETInformationSecurity
9.IETImageProcessing
10.IEEProc.Vision,Image&SignalProcessing
11.OpticalEngineering
12.SignalProcessing
13.PatternRecognition
14.PatternRecognitionLetters
15.Computers&Security
16.JournalofSystemsandSoftware
17.ImageandVisionComputing
18.DigitalSignalProcessing
19.ImagingScienceJournal
20.MultimediaToolsandApplications
21.AnnalsofTelecommunications
22.Informatica
23.JournalofElectronicImaging
24.InternationalJournalofComputersandApplications
25.InternationalJournalonIntelligentAutomationandSoftComputing
26.InternationalJournalofMultimediaIntelligenceandSecurity
27.EURASIPJournalonInformationSecurity
28.EURASIPJournalonAdvancesinSignalProcessing
29.EuropeanTransactionsonTelecommunications
30.LNCSTrans.DataHidingandMultimediaSecurity
31.KSIITrans.InternetandInformationSystems
32.IETETechnicalReview

【国际学术会议TPCMember】
1.TheThirdInternationalConferenceonIntelligentInformationHidingandMultimediaSignalProcessing(IIHMSP2007),Kaohsiung,Taiwan
2.The5thInternationalConferenceonCommunications,CircuitsAndSystems(ICCCAS2007),Xi’an,China
3.TheFirstInternationalWorkshoponMultimedia,InformationPrivacyandIntelligentComputingSystems(MPIS2008),Yilan,Taiwan
4.The11thInternationalConferenceonCommunicationsTechnologies(ICCT2008),Hangzhou,China
5.TheInternationalWorkshoponRecentInnovationsandBreakthroughsinCryptography(RIBC2009),Fukuoka,Japan
6.TheFifthInternationalConferenceonIntelligentInformationHidingandMultimediaSignalProcessing(IIHMSP2009),Kyoto,Japan
7.TheFifthInternationalConferenceonInformationAssuranceandSecurity(IAS09),Xi’an,China
8.TheInternationalConferenceonMultimediaInformationNetworkingandSecurity(MINES2009),Wuhan,China
9.TheFourthInternationalConferenceonGeneticandEvolutionaryComputing(ICGEC2010),Shenzhen,China
10.TheSecondInternationalConferenceonMultimediaInformationNetworkingandSecurity(MINES2010),Nanjing,China
11.TheFTRA2010InternationalWorkshoponAdvancedFutureMultimediaServices(AFMS2010),Gwangju,Korea
12.TheIEEEInternationalConferenceonMultimediaandExpo(ICME2011),Barcelona,Spain
13.TheFifthInternationalConferenceonGeneticandEvolutionaryComputing(ICGEC2011),Kitakyushu,Japan
14.The10thInternationalWorkshoponDigital-forensicsandWatermarking(IWDW2011),AtlanticCity,NJ,USA
15.TheIEEEInternationalConferenceonMultimediaandExpo(ICME2012),Melbourne,Australia
16.The5thFTRAInternationalConferenceonHuman-CentricComputing(HumanCom2012),Gwangju,Korea
17.The2012FTRAInternationalWorkshoponAdvancedFutureMultimediaServices(AFMS2012),Jeju,Korea
18.The2012FTRAInternationalConferenceonAdvancedIT,engineeringandManagement(AIM2012),Seoul,Korea
19.The15thInternationalConferenceonNetwork-BasedInformationSystems(NBiS-2012),Melbourne,Australia
20.The15thInternationalTelecommunicationsNetworkStrategyandPlanningSymposium(NETWORKS2012),Rome,Italy
21.Globecom2012-CommunicationandInformationSystemSecuritySymposium(GC12CISS),Anaheim,California,USA
22.2012FTRAInternationalConferenceonAdvancedIT,engineeringandManagement(FTRAAIMSummer2012),Jeju,Korea
23.The11thInternationalWorkshoponDigital-forensicsandWatermarking(IWDW2012),Shanghai,China

【国际学术会议TPCChair】
1.TheThirdInternationalConferenceonMultimediaInformationNetworkingandSecurity(MINES2011),Shanghai,China
2.IEEKCSInternationalSymposiumonResearchinUbiquitousandMultimediaApplicationsSystems(UMAS2012),Gwangju,Korea
相关话题/导师 通信 信息