bat365在线唯一官网登录

英文站|

师资队伍
当前位置:    首页 > 师资队伍 > 全体教师 > 教授(研究员) >    正文
王宏霞

日期:2019-11-13                   来源:                   作者:               关注:

专业 网络空间安全 研究方向 多媒体信息安全、信息隐藏、数字水印、数字取证、智能信息处理
Email hxwang@scu.edu.cn 电话

王宏霞

专业:网络空间安全

研究方向:多媒体信息安全、信息隐藏、数字水印、数字取证、智能信息处理

Email:hxwang@scu.edu.cn

个人简介

bat365在线唯一官网登录教授、博士生导师。2002年在电子科技大学获工学博士学位。2002-2004年在上海交通大学信息与通信工程流动站从事博士后研究,并被评为副教授,2013-2014年在美国北肯塔基大学计算机科学系访问研究,2004-2018年在西南交通大学信息科学与技术学院工作,任教授。2018年9月作为引进人才加入bat365在线唯一官网登录。四川省有突出贡献的优秀专家(2018),四川省学术和技术带头人后备人选(2009),四川省杰出青年学科带头人(2007)。

主要研究领域包括多媒体信息安全、信息隐藏、数字水印、数字取证、智能信息处理等。在IEEE TIFS / TDSC / TMM / TCSVT / TNNLS / TFS、中国科学、软件学报等国内外重要学术期刊,以及ACM MM / IH&MMSec、IEEE ICME / ICASSP / WIFS / APSIPA、IWDW等重要国际会议上发表研究论文200余篇,获授权国家发明专利20余项。作为主编编著《认证理论及应用》(清华大学出版社)和《信息隐藏理论与实践》(XX工业出版社),作为副主编编著《信息论与编码理论》(武汉大学出版社)。先后主持国家自然科学基金5项,以及教育部博士点基金(博导类)、四川省重点研发项目、四川省青年科技基金等省部级科研项目和企业产学研项目18项,并作为主研人参加了多项国家自然科学基金及国家863计划项目的研究工作。研究成果获省部级科技奖励2项、国际会议最佳论文奖3项,部分研究成果已在国家重要部门、电商和电信得到有效应用。担任IWDW 2019国际会议大会主席,以及ICME、APSIPA等多个国际会议的分会场主席或领域主席。中国电子科技集团网络空间安全技术重点实验室第一届学术委员会委员,中国电子学会通信学分会多媒体信息安全专家委员会委员、CCF高级会员,CSIG高级会员、IEEE/ACM会员。

先后主讲“信息内容安全”、“人工智能与多媒体安全”、“多媒体信息安全”、“信息隐藏技术”、“认证理论与技术”、“电子商务安全”、“专业英语翻译”等研究生和本科生课程,已指导毕业115位研究生并获得博/硕士学位(20位博士毕业生、95位硕士毕业生),其中1人获四川省优秀博士学位论文,8人获校级优秀博/硕士学位论文。毕业研究生工作在华为、阿里巴巴、腾讯、字节跳动、科大讯飞、海康威视、美国高通等大型IT企业、研究所和银行,以及贵州大学、上海大学、华侨大学、南京邮电大学、南丹麦大学、莫纳什大学马来西亚分校等国内外高校。

主要研究领域

信息保密与信息隐藏:将敏感信息或文件隐藏在一副图像、一段音乐或视频中,起到信息保密的作用。输入密码,还可从含密图像、音乐或视频中完整提取出原始敏感信息或文件。这种信息保密方法与传统加密方法不同,可使秘密信息或文件“彻底消失”,从而察觉不到秘密信息的存在性。

版权保护、防伪溯源与数字水印:一些正规商家辛辛苦苦拍摄的商品图片和视频,却被山寨店铺轻松利用并进行宣传,这不仅会对图像和视频的原创者带来损失,也会对消费者误导。非授权、AI生成或篡改的非法图片和视频在社交网络传播和扩散,会对个人和社会造成不良影响,破坏正常的社会秩序,因此需要追究其责任。解决这些问题的一种重要技术就是在图片和视频中添加鲁棒水印进行版权保护和溯源,且不影响其视觉质量和使用价值。

人工智能(AI)与数字取证:眼见一定为实、耳听一定为真吗?答案是“No!”。大模型时代的到来,使得图像、音视频等多媒体信息的生成、编辑和篡改愈发容易,因此伪造或AIGC图片、声音、视频难以辨认。通过结合机器学习、深度学习、大模型等人工智能方法,可实现对质疑的多媒体信息鉴别真伪,以AI攻AI,使AI向善向美。

鲁棒哈希与生物认证:防欺骗性高的身份信息可以是生物指纹、声纹、人脸等生物特征,这些生物特征具有一定的感知冗余。感知哈希具有鲁棒性、抗碰撞性、紧凑性和安全性等特点,通过生成这些生物特征的鲁棒哈希,可达到基于生物特征身份认证的目的。

主持的主要科研项目

1.国家自然科学基金-面上,面向分享平台的自适应鲁棒视频水印研究,62272331,2023.1-2026.12

2.国家自然科学基金-面上,基于人工免疫系统的信息隐藏研究,61972269,2020.1-2023.12

3.国家自然科学基金-联合,保持码率的高容量压缩域视频信息隐藏研究,U1536110,2016.1-2018.12

4.国家自然科学基金-面上,数字语音真实性的主动取证及其安全性研究,61170226,2012.1-2015.12

5.国家自然科学基金-青年,基于内容的自适应音频水印研究,60702025,2008.1-2010.12

6.四川省科技计划(重点研发项目),社交网络虚假媒体内容智能检测技术研究,2022YFG0320,2022.1-2023.12

7.河南省网络空间态势感知重点实验室开放课题(重点项目),载体源失配条件下自适应隐写的智能检测技术研究,HNTS2022003,2022.5-2024.4

8.企业产学研项目,数字内容溯源水印技术研究,24H0831,2024.6-2026.12

9.企业产学研项目,鲁棒性视频水印技术研究,21H0093,2021.1-2021.12

10.企业产学研项目,文档与图像水印技术研究,22H0517,2022.6-2023.5

11.企业产学研项目,原生溯源研究,21H0793,2021.6-2021.12

12.企业产学研项目,音频篡改发现研究,21H0792,2021.6-2021.12

13.教育部博士点基金(博导类),混沌脆弱水印技术研究,20070613024,2008.1-2010.12

14.四川省青年科技基金(四川省杰出青年学科带头人资助计划),基于人类心理声学模型的压缩域音频水印研究,07ZQ026-004,2007.6-2011.6

15.成都市科技计划,压缩域视频信息隐藏技术研究,12DXYB214JH-002,2013.1-2014.12

16. 中国博士后科学基金,混沌信息隐藏技术在图像认证中的应用研究,2003033304,2003.6-2004.6

近几年代表性论文

1.Y. Chen,H. Wang, W. Li, W. Li, “A steganography immunoprocessing framework against CNN-based and handcrafted steganalysis,” IEEE Transactions on Information Forensics and Security, 19: 6055-6069, 2024 (CCF A类期刊)

2.Y. Chen,H. Wang, W. Li, “Constructing immune-cover for improving holistic security of spatial adaptive steganography,” IEEE Transactions on Information Forensics and Security, DOI 10.1109/TDSC.2024.3376815, 2024 (CCF A类期刊)

3.M. He,H. Wang, F. Zhang, S. Abdullahi, L. Yang, “Robust blind video watermarking against geometric deformations and online video sharing platform processing,” IEEE Transactions on Dependable and Secure Computing, 20(6): 4702-4718, 2023 (CCF A类期刊)

4.Y. Chen, Z. Salcic,H. Wang, K.-K. R. Choo, X. Zhang, “NACA: A joint distortion-based non-additive cost assignment method for video steganography,” IEEE Transactions on Dependable and Secure Computing, 20(3): 2360-2374, 2023 (CCF A类期刊)

5.R. Zhang,H. Wang, M. Du, H. Liu, Y. Zhou, Q. Zeng, “UMMAFormer: A universal multimodal-adaptive transformer framework for temporal forgery localization,” Proceedings of the 31st ACM International Conference on Multimedia (ACM MM), Ottawa, Canada,pp. 8749-8759,2023 (CCF A类国际会议)

6.S. Abdullahi, K. Lv, S. Sun,H. Wang, “Cancelable fingerprint template construction using vector permutation and shift-ordering,” IEEE Transactions on Dependable and Secure Computing, 20(5): 3828-3844, 2023 (CCF A类期刊)

7.Y. Chen,H. Wang, K.-K. R. Choo, P. He, Z. Salcic, D. Kaafar, X. Zhang, “DDCA: A distortion drift-based cost assignment method for adaptive video steganography in the transform domain,” IEEE Transactions on Dependable and Secure Computing, 19(4): 2405-2420, 2022 (CCF A类期刊)

8.Y. Chen,H. Wang, H. Wu, Z. Wu, T. Li, A. Malik, “Adaptive video data hiding through cost assignment and STCs,” IEEE Transactions Dependable and Secure Computing, 18(3): 1320-1335, 2021 (CCF A类期刊)

9.S. Abdullahi,H. Wang, T. Li, “Fractal coding-based robust and alignment-free fingerprint image hashing,” IEEE Transactions on Information Forensics and Security, 15: 2587-2601, 2020 (CCF A类期刊)

10.K. Wang, H. Zhao,H. Wang, “Video steganalysis against motion vector based steganography by adding or subtracting one motion vector value,” IEEE Transactions on Information Forensics and Security, 9(5): 741-751, 2014(CCF A类期刊)

11.M. He,H. Wang, F. Zhang, Y. Xiang, “Exploring accurate invariants on polar harmonic Fourier moments in polar coordinates for robust image watermarking,” IEEE Transactions on Multimedia, 26: 5435-5449, 2024 (CCF B类期刊,中科院一区)

12.W. Li,H. Wang, Y. Chen, “From cover to immucover: adversarial steganography via immunized cover construction,” IEEE Transactions on Fuzzy Systems, 32(3): 1233-1247, 2024 (CCF B类期刊,中科院一区)

13.F. Zhang,H. Wang, M. He, J. Xia, “Robust blind symmetry-based watermarking in the frequency domain against social network processing and desynchronization attacks,” IEEE Transactions on Circuits and Systems for Video Technology, DOI 10.1109/TCSVT.2024.3395802, 2024 (CCF B类期刊,中科院一区)

14.W. Li,H. Wang, Y. Chen, S. Abdullahi, J. Luo, “Constructing immunized stego-image for secure steganography via artificial immune system,” IEEE Transactions on Multimedia, 25: 8320-8333, 2023 (CCF B类期刊,中科院一区)

15.P. He, H. Li,H. Wang, S. Wang, X. Jiang, R. Zhang, “Frame-wise detection of double HEVC compression by learning deep spatio-temporal representations in compression domain,” IEEE Transactions on Multimedia, 23(9): 3192-3192, 2021 (CCF B类期刊,中科院一区)

16.R. Zhang,H. Wang, Ju H. Park, et al., “Secure distributed control for consensus of multiple EL systems subject to DoS attacks,” IEEE Transactions on Systems, Man, and Cybernetics: Systems, 54 (6): 3879-3890, 2024 (CCF B类期刊,中科院一区)

17.R. Zhang,H. Wang, Ju H. Park, et al., “Fuzzy secure control for nonlinear N-D parabolic PDE-ODE coupled systems under stochastic deception attacks,” IEEE Transactions on Fuzzy Systems, 30 (8): 3347-3359, 2022 (CCF B类期刊,中科院一区)

18.R. Zhang,H. Wang, Ju H. Park, et al., “Event-triggered impulsive fault-tolerant control for memristor-based RDNNs with actuator faults,” IEEE Transactions on Neural Networks and Learning Systems, 34(6): 2993-3004, 2023 (CCF B类期刊,中科院一区)

19.R. Zhang,H. Wang, Ju H. Park, et al., “Mode-dependent adaptive event-triggered control for stabilization of Markovian memristor-based reaction-diffusion neural networks,” IEEE Transactions on Neural Networks and Learning Systems, 34(8): 3939-3951, 2023 (CCF B类期刊,中科院一区)

20.R. Zhang,H. Wang, Ju H. Park, et al., “Quasisynchronization of reaction-diffusion neural networks under deception attacks,” IEEE Transactions on Systems, Man, and Cybernetics: Systems, 52 (12): 7833-7844, 2022 (CCF B类期刊,中科院一区)

21.H. Wu, Y.-Q Shi,H. Wang, et al., “Separable reversible data hiding for encrypted palette images with color partitioning and flipping verification,” IEEE Transactions on Circuits and Systems for Video Technology, 27(8): 1620-1631, 2017(CCF B类期刊,中科院一区)

22.P. He, H. Li, B. Li,H. Wang, L. Liu, “Exposing fake bitrate videos using hybrid deep-learning network from recompression error,” IEEE Transactions on Circuits and Systems for Video Technology, 30 (11): 4034-4049, 2020 (CCF B类期刊,中科院一区)

23.Y. Zhou,H. Wang, Q. Zeng, R. Zhang, S. Meng, “A contribution-aware noise feature representation model for image manipulation localization,” Knowledge-Based Systems, 298: 1-11, 2024 (中科院一区)

24.Y. Zhou,H. Wang, Q. Zeng, R. Zhang, S. Meng, “Exploring weakly-supervised image manipulation localization with tampering Edge-based class activation map,” Expert Systems With Applications, 249: 1-12, 2024 (中科院一区)

25.Q. Zeng,H. Wang, Y. Zhou, R. Zhang, S. Meng, “Semi-supervised image manipulation localization with residual enhancement,” Expert Systems With Applications, 252: 1-13, 2024 (中科院一区)

26.M. Zhang,H. Wang, et al., “Exposing unseen GAN-generated image using unsupervised domain adaptation,” Knowledge-Based Systems, 257: 1-14, 2022 (中科院一区)

27.S. Abdullahi, S. Sun, B. Wang, N. Wei,H. Wang, “Biometric template attacks and recent protection mechanisms: A survey,” Information fusion, 103: 102144, 2024 (中科院一区)

28.Y. Xiang,H. Wang, L. Yang, M. He, F. Zhang, “SEDD: robust blind image watermarking with single encoder and dual decoders,” The Computer Journal, doi.org/10.1093/comjnl/bxae014, 2024 (CCF B类期刊)

29.H. Wang,H. Wang, F. Zhang, J. Xia, “Robust watermarking against camera shooting for Powerpoint presentation,” IEEE Signal Processing Letters, 31: 1264-1268, 2024 (JCR二区)

30.Y. Chen,H. Wang, W. Li, J. Luo, “Cost reassignment for improving security of adaptive steganography using an artificial immune system,” IEEE Signal Processing Letters, 29: 1564-1568, 2022 (JCR二区)

31.X. Wu,H. Wang, “Asymmetric contrastive learning for audio fingerprinting,” IEEE Signal Processing Letters, 29: 1873-1877, 2022 (JCR二区)

32.M. Hu,H. Wang, “Image steganalysis against adversarial steganography by combining confidence and pixel artifacts,” IEEE Signal Processing Letters, 30: 987-991, 2023(JCR二区)

33.Y. Li,H. Wang, M. Barni, “A survey of deep neural network watermarking techniques,” Neurocomputing, 461: 171-193, 2021 (JCR二区)

34.J. Li,H. Wang, P. He, S. Abdullahi, B. Li, “Long-term variable Q transform: A novel time-frequency transform algorithm for synthetic speech detection,” Digital Signal Processing, 120: 1-11, 2022 (JCR二区)

35.J. Zhang,H. Wang, P. He, “Dual-branch multi-scale densely connected network for image splicing detection and localization,” Signal Processing: Image Communication, 119: 1-13, 2023 (JCR二区)

36.S. Abdullahi, S. Sun,H. Wang, et al., “The reversibility of cancelable biometric templates based on iterative perturbation stochastic approximation strategy,” Pattern Recognition Letters, 172: 221-229, 2023(JCR二区)

37.A. Malik,H. Wang, et al.,“Reversible data hiding in homomorphically encrypted image using interpolation technique,” Journal of Information Security and Applications, 48: 102374, 2019(JCR二区)

38.F. Zhang,H. Wang, M. He, L. Yang, J. Li, “Adaptive video watermarking with perceptual guarantee and efficiency optimization,”IEEE International Conference on Acoustics, Speech, & Signal Processing (ICASSP),Seoul, South Korea, 2024(CCF B类国际会议)

39.F. Zhang,H. Wang, M. He, L. Yang, J. Li, “Exploring consistent spatio-temporal distortion and stable 3-D DCT coefficients for robust blind video watermarking,”IEEE International Conference on Acoustics, Speech, & Signal Processing (ICASSP),Seoul, South Korea, 2024(CCF B类国际会议)

40.H. Wang,H. Wang, X. Huang, Z. Shi, “Enhanced screen shooting resilient document watermarking,” IEEE International Conference on Acoustics, Speech, & Signal Processing (ICASSP),Seoul, South Korea, 2024(CCF B类国际会议)

41.M. Zhang,H. Wang, P. He, A. Malik, H. Liu, “Improving GAN-generated image detection generalization using unsupervised domain adaptation,” IEEE International Conference on Multimedia and Expo (ICME), Taipei, Taiwan, 2022 (CCF B类国际会议)

42.J. Xia,H. Wang, S. Abdullahi, H. Wang, F. Zhang, B. Luo, “Adaptive and robust Fourier-Mellin-based image watermarking for social networking platforms,”IEEE International Conference on Multimedia and Expo (ICME), Brisbane, Australia, pp. 2843-2848, 2023(CCF B类国际会议)

43.Q. Zeng,H. Wang, Y. Zhou, R. Zhang, S. Meng, “A parallel attention mechanism for image manipulation detection and localization,” IEEE International Conference on Acoustics, Speech, & Signal Processing (ICASSP),Rhodes Island, Greece,2023(CCF B类国际会议)

44.Y. Zhou,H. Wang, Q. Zeng, R. Zhang, S. Meng, “A discriminative multi-channel noise feature representation model for image manipulation localization,” IEEE International Conference on Acoustics, Speech, & Signal Processing (ICASSP),Rhodes Island, Greece,2023(CCF B类国际会议)

45.P. He, H. Li,H. Wang, “Detection of fake images via the ensemble of deep representations from multi color spaces,” IEEE International Conference on Image Processing (ICIP), 2019, pp. 2299-2303(CCF推荐国际会议)

46.Y. Liu,H. Wang, “Feature selection based on clonal selection algorithm for image steganalysis,” Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC), pp. 2441-2447, 2023

47.F. Zhang,H. Wang,L. Yang, M. He, “Robust blind video watermarking by constructing spread-spectrum matrix,” IEEE International Workshop on Information Forensics and Security (WIFS), Shanghai, China, 2022

48.Y. Li, L. Abady,H. Wang, M. Barni, “A feature-map-based large-payload DNN watermarking algorithm,” International Workshop on Digital-forensics and Watermarking (IWDW), LNCS 13180, Springer, pp. 135-148, 2022

49.L. Yang,H. Wang, Y. Zhang,et al.,“A robust DCT-based video watermarking scheme against recompression and synchronization attacks,” International Workshop on Digital-forensics and Watermarking (IWDW), LNCS 13180, Springer, pp. 149-162, 2022

50.H. Liu,H. Wang, M. Zhang, “Exposing Deepfake videos using facial decomposition-based domain generalization,” IEEE 24th International Workshop on Multimedia Signal Processing (MMSP), 2022

51.F. Zhang,H. Wang, M. He, J. Li, “Adaptive despread spectrum-based image watermarking for fast product tracking,” International Workshop on Digital-forensics and Watermarking (IWDW), LNCS 13825, Springer, pp. 174-189, 2023

52.H. Wang, J. Sang, “Speaker identity tracing using fingerprint data hiding against telecommunications fraud,” Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC), pp. 554-559, 2018

53.H. Wang, Z. Chen, et al., “Constructing immune cover for secure steganography based on an artificial immune system approach,” International Workshop on Digital-forensics and Watermarking (IWDW), LNCS 12617, Springer, pp. 53-67, 2021

54.H. Wang, W. Zhang, et al., “Remote authentication of speaker identity based on perceptual fingerprint hashing,” International Workshop on Secure Biometric Technologies (IWSBT), Seoul, Korea, pp. 54-62, 2016 (获最佳论文奖)

55.S. Abdullahi,H. Wang, A.Malik, “Fingerprint image hashing based on minutiae points and shape context,”International Journal of Digital Crime and Forensics, 10(4): 1-20, 2018 (获IWDCF 2017最佳论文奖)

56.Y. Chen,H. Wang, et al., “Defining cost function for robust embedding,”International Conference on Artificial Intelligence and Security(ICAIS), CCIS 1252, Springer, pp. 626-638, 2020 (获最佳论文奖)

57.袁超,王宏霞,何沛松,“基于注意力机制的高容量通用图像隐写模型, ”软件学报,35(3): 1502-1514, 2024

58.张玉林,王宏霞,“语义一致性引导的多任务拼接篡改检测算法, ”中国图象图形学报,28(3): 775-788, 2023

59.张卫明,王宏霞,李斌,任延珍,杨忠良,陈可江,李伟祥,张新鹏,俞能海,“多媒体隐写研究进展, ”中国图象图形学报,27(6): 1918-1943, 2022

60.章蕾,王宏霞,“用于失配隐写分析的对抗子领域自适应网络, ”网络与信息安全学报, 8(3): 76-86, 2022

61.张婧媛,王宏霞,何沛松,“基于Transformer的多任务图像拼接篡改检测算法, ”计算机科学, 50(1): 114-122, 2023

62. 韩松源,王宏霞,蒋子渝,“面向流动追踪的多层鲁棒Excel文档水印, ”计算机科学, 51(5): 374-381, 2024

教育和科研理念

  教育理念:每个学生都有闪光点,不拘一格育人才!

  教育文化:师生彼此成就,共同成长!

  科研文化:仰望浩瀚星空,探索科学奥秘,丰收硕果累累!

  师生关系最高境界:亦师亦友,互相欣赏!

  教育愿景:以最不竞争的方式,培养出最具竞争力的学生!

教师寄语

  我创造,我快乐!

  Let me try!

关闭