首页 > 专家库
夏志华

领域:新一代信息技术产业 学校:南京信息工程大学职称:教授

加密图像处理、数字取证、人工智能安全;...

具体了解该专家信息,请致电:027-87555799 邮箱 haizhi@uipplus.com

教育背景

工作经历

项目课题经历

) 韩国BK21+项目“云计算环境中的密文图像检索方法研究”,2016.09-2017.08 2) 国家自然科学基金面上项目“云计算环境中的密文图像检索方法研究”,2017.01-2020.12 3) 国家自然科学基金面上项目“基于多阶依赖与重构的图像隐藏信息检查方法研究”,2012.01-2015.12 4) 江苏省自然科学基金面上项目“基于深度学习的仿制指纹检测方法研究”,BK20181407, 2018.09-2021.08 5) 国家气象行业专项子课题“复杂环境下气象观察数据安全存储关键技术研究”,2012.01-2015.12 6) 江苏省网络监控工程中心开放课题“数字图像被动取证方法研究”,2012.01-2012.12

论文、成果、著作等

1] Zhihua Xia, Leqi Jiang, Dandan Liu, Lihua Lu, and Byeungwoo Jeon, BOEW: A Content-based Image Retrieval Scheme using Bag-of-Encrypted-Words in Cloud Computing, IEEE Transactions on Services Computing, 2019, DOI: 10.1109/TSC.2019.2927215 [2] Chengsheng Yuan, Zhihua Xia*, Xingming Sun, Q. M. Jonathan Wu, Deep Residual Network with Adaptive Learning Framework for Fingerprint Liveness Detection, IEEE Transactions on Cognitive and Developmental Systems, 2019, DOI: 10.1109/TCDS.2019.2920364 [3] Zhihua Xia, Leqi Jiang, Xiaohe Ma, Wenyuan Yang, Puzhao Ji, Naixue Xiong. A Privacy-Preserving Outsourcing Scheme for Image Local Binary Pattern in Secure Industrial Internet of Things, IEEE Transactions on Industrial Informatics, 2019, 10.1109/TII.2019.2913217 (SCI, Online) [4] Zhihua Xia, Chengsheng Yuan, Rui Lv, Xingming Sun, Neal N. Xiong, Yun-Qing Shi. A Novel Weber Local Binary Descriptor for Fingerprint Liveness Detection, IEEE Transactions on Systems, Man, and Cybernetics: Systems, 10.1109/TSMC.2018.2874281, 2019 (SCI, Online) [5] Lizhi Xiong, Zhihua Xia, Xianyi Chen, and Hiuk Jae Shim, Secure multimedia distribution in cloud computing using re-encryption and fingerprinting, Multimedia Tools and Applications, 2019, 10.1007/s11042-018-6981-6 [6] Chengsheng Yuan, Zhihua Xia*, Leqi Jiang, Yi Cao, Q. M. Jonathan Wu, and Xingming Sun, Fingerprint Liveness Detection Using an Improved CNN With Image Scale Equalization, IEEE Access, 2019, 7: 26953-26966, DOI: 10.1109/ACCESS.2019.2901235 [7] Zhihua Xia, Lihua Lu, Tong Qiu, H J Shim, Xianyi Chen, and Byeungwoo Jeon. A Privacy-Preserving Image Retrieval Based on AC-coefficients and Color Histograms in Cloud Environment, CMC-COMPUTERS MATERIALS & CONTINUA .58(1):27-43, 2019. (SCI,) 2018 [8] Zhihua Xia, Yi Zhu, Xingming Sun, Zhan Qin, and Kui Ren, Towards Privacy-preserving Content-based Image Retrieval in Cloud Computing. IEEE Transactions on Cloud Computing, 6(1): 276-286, 2018. (SCI, ESI highly cited paper) [9] Zhihua Xia, Tianjia Shi, Neal N. Xiong, Xingming Sun, Byeungwoo Jeon. A privacy-preserving handwritten signature verification method using combinational features and secure KNN. IEEE ACCESS, 6(1): 46695-46705, DOI: 10.1109/ACCESS.2018.2866411 (SCI) [10] Zhihua Xia, Xiaohe Ma, Zixuan Shen, Xingming Sun, Neal N. Xiong, and Byeungwoo Jeon. Secure Image LBP Feature Extraction in Cloud-based Smart Campus. IEEE ACCESS, 6(1): 30392-30401, 2018, DOI: 10.1109/ACCESS.2018.2845456 (SCI) [11] Xuan Li, Zhihua Xia*, A Distribution Outsourcing Scheme Based on Partial Image Encryption, Journal of Internet Technology, 19(3): 807-814 , 2018, DOI: 10.3966/160792642018051903016 (SCI) [12] Zhihua Xia, Rui Lv, and Xingming Sun, Rotation-invariant Weber pattern and Gabor feature for fingerprint liveness detection. Multimedia Tools and Applications, 77(14): 18187–182002, 2018, DOI: https://doi.org/10.1007/s1104 (SCI). [13] Lizhi Xiong, Danping Dong, Xianyi Chen, Zhihua Xia, High-Capacity Reversible Data Hiding for Encrypted Multimedia Data with Somewhat Homomorphic Encryption, IEEE ACCESS, 6(1): 60635-60644, 2018, 10.1109/ACCESS.2018.2876036 (SCI) 2017 [14] Zhihua Xia, Rui Lv, Yafeng Zhu, Peng Ji, Huiyu Sun, and Yun-Qing Shi, Fingerprint liveness detection using gradient-based texture features. Signal, Image and Video Processing, 2017, 11(2): 381–388. (SCI) [15] Zhihua Xia, Neal N Xiong, Athanasios V Vasilakos, and Xingming Sun, EPCBIR: An efficient and privacy-preserving content-based image retrieval scheme in cloud computing. Information Sciences, 2017, 387: 195-204. (SCI) [16] Zhihua Xia, Xuan Li, Coverless Information Hiding Method Based on LSB of the Character's Unicode, Journal of Internet Technology, 18(6): 1353-1360, Nov. 2017. (SCI) [17] Bin Yang, Xingming Sun, Honglei Guo, Zhihua Xia, and Xianyi Chen, A copy-move forgery detection method based on CMFD-SIFT. Multimedia Tools and Applications, 2017: 1-19. (SCI) [18] JiLiang Zhang, WeiZheng Wang, XingWei Wang, and Zhihua Xia, Enhancing Security of FPGA-Based Embedded Systems with Combinational Logic Binding. Journal of Computer Science and Technology, 2017, 32(2): 329-339. (SCI) [19] Jianxiao Liu and Zhihua Xia*, An Approach of Web Service Organization using Bayesian Network Learning. Journal of Web Engineering, 2017, 16(3-4): 252-276. (SCI) [20] Chengsheng Yuan, Zhihua Xia, and Xingming Sun, Coverless image steganography based on SIFT and BOF. Journal of Internet Technology, 2017, 18(2): 435-442. (SCI, ESI highly cited paper) [21] Dandan Liu, Jian Shen, Zhihua Xia*, and Xingming Sun, A Content-Based Image Retrieval Scheme Using an Encrypted Difference Histogram in Cloud Computing. Information, 2017, 8(3): 96. (EI) 2016 [22] Zhihua Xia, Xinhui Wang, Liangao Zhang, Zhan Qin, Xingming Sun, and Kui Ren, A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Transactions on Information Forensics and Security, 2016, 11(11): 2594-2608. (SCI一区区,CCF A类, ESI highly Cited Paper, hot paper in 2018) [23] Zhihua Xia, Xinhui Wang, Xingming Sun, and Qin Wang, A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data. IEEE Transactions on Parallel and Distributed Systems, 2016, 27(2): 340-352. (SCI二区,CCF A类, ESI highly Cited Paper, hot paper in 2016) [24] Zhihua Xia, Xinhui Wang, Xingming Sun, Quansheng Liu, and Naixue Xiong, Steganalysis of LSB matching using differences between nonadjacent pixels. Multimedia Tools and Applications, 2016, 75(4): 1947-1962. (ESI highly Cited Paper, hot paper in 2016) [25] Zhihua Xia, Liangao Zhang, and Dandan Liu, Attribute-based access control scheme with efficient revocation in cloud computing. China Communications, 2016, 13(7): 92-99. (SCI) [26] Zhihua Xia, Chengsheng Yuan, Xingming Sun, Decai Sun, and Rui Lv, Combining wavelet transform and LBP related features for fingerprint liveness detection. IAENG International Journal of Computer Science, 2016, 43(3): 290-298. (EI) [27] Zhihua Xia, Li Chen, Xingming Sun, and Jianxiao Liu, A Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Semantic Extension. International Journal of Multimedia and Ubiquitous Engineering, 2016, 11(8): 107-120. (EI) [28] Ji-Liang Zhang, Qiang Wu, Yi-Peng Ding, Yong-Qiang Lv, Qiang Zhou, Zhi-Hua Xia, Xing-Ming Sun, and Xing-Wei Wang, Techniques for Design and Implementation of an FPGA-Specific Physical Unclonable Function. Journal of Computer Science and Technology, 2016, 31(1): 124-136. (SCI) [29] Tianjiao Shi, Xingming Sun, Zhihua Xia, Leiyue Chen, and Jianxiao Liu, Fall Detection Algorithm Based on Triaxial Accelerometer and Magnetometer. Engineering Letters, 2016, 24(2): 65-70. (EI) [30] Chengsheng Yuan, Zhihua Xia, Xingming Sun, Decai Sun, and Rui Lv, Fingerprint liveness detection using multiscale difference co-occurrence matrix. Optical Engineering, 2016, 55(6): 063111-063111. (SCI) [31] Xianyi Chen, Guangyong Gao, Dandan Liu, and Zhihua Xia, Steganalysis of LSB matching using characteristic function moment of pixel differences. China Communications, 2016, 13(7): 66-73. (SCI) 2015 [32] Liang-Ao Zhang, Xingming Sun, Zhihua Xia, and Qiuju Ji, ABE based Access Control with Authenticated Dynamic Policy Updating in Clouds. International Journal of Security and Its Applications, 2015, 9(8): 95-110. (EI) [33] Yi Zhu, Xingming Sun, Zhihua Xia, Naixue Xiong, Steven Altamirano, Jesús Zanelli, Juan M Gutiérrez Cárdenas, Daniela Bringas, Meng Liu, and Xuan Wang, Secure Similarity Search over Encrypted Cloud Images. International Journal of Security and Its Applications, 2015, 9(8): 1-14. (EI) 2014 [34] Zhihua Xia, Xinhui Wang, Xingming Sun, and Baowei Wang, Steganalysis of least significant bit matching using multi‐order differences. Security and Communication Networks, 2014, 7(8): 1283-1291. (SCI, ESI highly Cited Paper) [35] Zhihua Xia, Xinhui Wang, Xingming Sun, Yafeng Zhu, Peng Ji, and Jin Wang, Batch Auditing for Multiclient Data in Multicloud Storage. Advanced Science and Technology Letters, 50: 67-73, 2014. [36] Zhihua Xia, Xinhui Wang, Xingming Sun, Yafeng Zhu, Peng Ji, and Jin Wang, Bacthing Auditing of Data in Multicloud Storage. International Journal of Database Theory and Application, 2014, 7(6): 139-150. (EI) [37] Zhihua Xia, Yanling Zhu, Xingming Sun, and Lihong Chen, Secure semantic expansion based search over encrypted cloud data supporting similarity ranking. Journal of Cloud Computing, 2014, 3(1): 1-11. [38] Li Chen, Xingming Sun, Zhihua Xia, and Qi Liu, An Efficient and Privacy-Preserving Semantic Multi-Keyword Ranked Search over Encrypted Cloud Data. International Journal of Security and Its Applications, 2014, 8(2): 323-332. (EI) [39] Xingming Sun, Li Chen, Zhihua Xia, and Yi Zhu, Cooperative Provable Data Possession with Stateless Verification in Multicloud Storage. Journal of Computational Information Systems, 2014, 10(8): 1-9. (EI) [40] Xingming Sun, Yanling Zhu, Zhihua Xia, and Lihong Chen, Privacy preserving keyword based Semantic Search over Encrypted cloud data. International journal of Security and its Applications, 2014, 8(2). (EI) [41] Xingming Sun, Xinhui Wang, Zhihua Xia, Zhangjie Fu, and Tao Li, Dynamic Multi-Keyword Top-k Ranked Search over Encrypted Cloud Data. International Journal of Security & Its Applications, 2014, 8(1): 319-332. (EI) 2013 [42] Zhihua Xia, Shufang Wang, Xingming Sun, and Baowei Wang, Steganalysis of least significant bit matching based on image histogram and correlation. Journal of Electronic Imaging, 2013, 22(3): 033008-033008. (SCI) [43] Zhihua Xia, Li Chen, Xingming Sun, and Jin Wang, An Efficient and Privacy-Preserving Semantic Multi-Keyword Ranked Search over Encrypted Cloud Data. Advanced Science and Technology Letters, 2013, 31: 284. [44] Zhihua Xia, Yi Zhu, Xingming Sun, and Jin Wang, A similarity search scheme over encrypted cloud images based on secure transformation. International Journal of Future Generation Communication and Networking, 2013, 6(6): 71-80. (EI) [45] Zhihua Xia, Shufang Wang, Xingming Sun, and Jin Wang, Print-scan resilient watermarking for the Chinese text image. Int. J. Grid Distrib. Comput, 2013, 6(6): 51-62. (EI) [46] Lincong Yang and Zhihua Xia, Steganalytic method based on spatial LSB matching. Journal of Central South University (Science and Technology), 2013, 2: 027. [47] Zhangjie Fu, Xingming Sun, Zhihua Xia, Lu Zhou, and Jiangang Shu, Multi-keyword ranked search supporting synonym query over encrypted data in cloud computing. in 2013 IEEE 32nd International Performance Computing and Communications Conference (IPCCC). IEEE, 2013: 1-8. [48] Xingming Sun, Shufang Wang, Zhihua Xia, and Xinhui Wang, Skeleton-based Chinese Text Image Watermark Algorithm Robust to Printing and Scanning. Information Technology Journal, 2013, 12(11): 2130-2137. [49] Xingming Sun, Yanling Zhu, Zhihua Xia, Jin Wang, and Lihong Chen, Secure Keyword-based Ranked Semantic Search over Encrypted Cloud Data. Proceedings of the Advanced Science and Technology Letters (MulGraB 2013), 2013, 31: 271-283. [50] Zhili Zhou, Xingming Sun, Cheng Chang, Zhihua Xia, and Zhangjie Fu, An Affine-SIFT Based Approach for Near-Duplicate Video Detection with Voting Scheme. Advances in Information Sciences and Service Sciences, 2013, 5(5): 1219. 2012 [51] Jinwei Wang, Xingming Sun, Yuhui Zheng, Jin Han, and Zhihua Xia, Hybrid Additive Multi-watermarking Decoder. in 2012 Fourth International Conference on Multimedia Information Networking and Security. IEEE, 2012: 666-669. 2011 [52] Zhihua Xia, Lincong Yang, Xingming Sun, Wei Liang, Decai Sun, and Zhiqiang Ruan, A learning-based steganalytic method against LSB matching steganography. Radioengineering, 2011, 20(1): 102-109. (SCI) [53] Haijun Luo, Xingming Sun, Hengfu Yang, and Zhihua Xia, A robust image watermarking based on image restoration using SIFT. Radioengineering, 2011, 20(2): 525-532. (SCI) [54] Qinglong Tian, Ronghui Wu, Zhihua Xia, Zhili Zhou, and Yan Jiang, Steganalysis of LSB matching for Images with High Noise. International Journal of Digital Content Technology & its Applications, 2011, 5(12). [55] Wei Liang, Xingming Sun, Zhihua Xia, Decai Sun, and Jing Long, A chaotic IP watermarking in physical layout level based on FPGA. Radioengineering, 2011, 20(1): 118-125. (SCI) 2010 [56] Zhihua Xia, Xingming Sun, Wei Liang, Jiaohua Qin, and Feng Li, JPEG image steganalysis using joint discrete cosine transform domain features. Journal of Electronic Imaging, 2010, 19(2): 023006-023006-13. (SCI) [57] Xiangrong Xiao, Xingming Sun, Fan Li, Baowei Wang, Zhihua Xia, and Wei Liang, Watermarking-based intellectual property protection for sensor streaming data. International Journal of Computer Applications in Technology, 2010, 39(4): 213-223. 2009 [58] Zhihua Xia, Xingming Sun, Jiaohua Qin, and Changming Niu, Feature selection for image steganalysis using hybrid genetic algorithm. Inform. Technol. J, 2009, 8(811-820). [59] Jiaohua Qin, Xingming Sun, Xuyu Xiang, and Zhihua Xia, Steganalysis based on difference statistics for LSB matching steganography. Information Technology Journal, 2009, 8: 1281-1286. [60] Changming Niu, Xingming Sun, Jiaohua Qin, and Zhihua Xia, Steganalysis of two least significant bits embedding based on least square method. in 2009 ISECS International Colloquium on Computing, Communication, Control, and Management. IEEE, 2009: 124-127.

专利、著作版权等

一种基于字符细化的抗打印扫描中文文本图像水印方法(发明专利) 20131071967.7(申请号) 中国 2013.12.24(受理时间) 1/3 一种用于人造指纹检测的特征提取方法(发明专利) 201410637987.8(申请号) 中国 2014.11.13(受理时间) 1/3 抗打印扫描的文本图像取证软件(软件著作权) 2013SR073365(软件等级号) 中国 2013.07.25 1/2 基于潜在语义的加密数据检索软件(软件著作权) 2014SR066731(软件登记号) 中国 2014.05.26 1/2 局域网图像检索系统(软件著作权) 2015SR023102(软件登记号) 中国 2014.09.27 1/2 基于C/S架构的加密云数据完整性验证保护系统(软件著作权) 2015SR249358 (软件登记号) 中国 2015.12.08 1/2
声明:本站专家信息来源于各高校官网。