成语| 古诗大全| 教学资源| 作文| 扒知识| 扒知识繁体

黄继武 简历 – 名人简历

发布日期:2020-11-18 11:25:38

黄继武

工学博士,1962年10月出生于广东揭阳,毕业于西安电子科技大学。中山大学信息科学与技术学院教授,广东省信息安全技术重点实验室主任。国家杰出青年科学基金、政府特殊津贴获得者获得者(2003),深圳大学信息工程学院特聘教授、博士生导师。研究兴趣为多媒体取证与安全、多媒体信号处理。2015年当选国际电气与电子工程师协会2016年度IEEEFellow(会士)。

人物经历

教育背景

1982年毕业于西安电子科技大学电子工程学院电子对抗专业,获得工学学士学位。

1987年毕业于清华大学通信与电子系统专业,获得工学硕士学位。

1998年毕业于 中国科学院自动化研究所模式识别与智能系统专业,获得工学博士学位。

工作经历

调入深圳大学前,为中山大学信息科学与技术学院教授、博士生导师,兼教育部重点实验室主任和广东省重点实验室主任。

2015年当选国际电气与电子工程师协会2016年度IEEE Fellow(会士)。

曾主持过国家自然科学基金重点项目、国家973课题等多项研究项目。在本领域发表学术论文200多篇。曾获得教育部自然科学一等奖2项(排名第一、第二各1项)。目前为IEEE Trans. on Information Forensics and Security等国际著名期刊副编辑(AE)、广东省“网络与信息安全”省部产学研创新联盟理事长。

学术兼职

IEEE Trans.on Information Forensics and Security等国际刊物副编辑(associateeditor)、IEEE 信号处理学会(SPS)信息取证与安全技术委员会(IFS TC)成员、IEEE 电路与系统学会(CASS)多媒体系统与应用技术委员会(MSA TC)成员(2002~)、信息安全国家重点实验室学术委员会委员、Asia-Pacific Signal and Information ProcessingAssociation (APSIPA)BoG(Board of Governors)成员

研究兴趣及课程

数字水印与信息隐藏、多媒体信号处理与通信、多媒体信息安全

主讲课程:

多媒体信号处理、图像信息处理

研究生招生:

硕士: 通信与信息系统、 信号与信息处理、多媒体信息安全

博士:计算机软件与理论、通信与信息系统

科研项目

1) NSFC-广东联合基金重点项目“网络媒体内容服务安全理论与关键技术”,(2012.1-2015.12)(U1135001).

2) 国家自然科学基金重点项目“数字媒体内容安全关键技术及评测方法的研究” (2007.1-2010.12)(60633030)

3) 国家973计划项目“网络媒体智能处理的理论与方法”(2011CB302200)课题4“网络可视媒体安全”( 2011CB302204)(2010.1-2014.8)

4) 国家973计划项目“可视媒体智能处理的理论与方法”(2006CB303100)课题4“基于内容的可视媒体安全”(2006CB303104)(2006.9-2010.8)。

获奖

稳健数字水印方法。教育部提名国家科学技术奖自然科学一等奖(第一)。

Best Student Paper Award, IWDW2008 (Rui Yang, Xiangui Kang, Jiwu Huang. Robust Audio Watermarking Based On Log-polar Frequency Index. IWDW2008), 2008.(第三)。

专利

有18个授权专利和其他20项专利申请

部分期刊论文

Ligang Zheng, Guoping Qiu, Yanqiang Lei and Jiwu Huang. Near-duplicate Image Detection in a Visually Salient Riemannian Space. . 7(5): 1578 u2013 1593, 2012.

Yanqiang Lei, Weiqi Luo, Yuangen Wang, Jiwu Huang. Video Sequence Matching Based on the Invariance of Color Correlation. IEEE Trans. on Circuits and Systems for Video Technology. 22(9): 1332-1343, 2012

Chuntao Wang, Jiangqun Ni, Jiwu Huang. An Informed Watermarking Scheme Using Hidden Markov Model in the Wavelet Domain. IEEE Trans. on Information Forensics & Security. 7(3):853-867, 2012.

Jian Li, Hongmei Liu, Jiwu Huang, Yun Q. shi. Reference Index-Based H.264 Video Watermarking Scheme. ACM Trans. on Multimedia Computing, Communications, and Applications. Volume 8, Issue 2S, Article No. 33, p1-22, September 2012

Rui Yang, Zhenhua Qu, Jiwu Huang. Exposing MP3 Audio Forgeries Using Frame Offsets. ACM Trans. on Multimedia Computing, Communications, and Applications. Volume 8, Issue 2S, Article No. 33, p. 1-20, September 2012

Zhongwei He, Wei Lu, Wei Sun, Jiwu Huang. Digital image splicing detection based on Markov features in DCT and DWT domain. Pattern Recognition, 45(12): 4292-4299, 2012

Haotian Wu and Jiwu Huang. Reversible Image Watermarking on Prediction Errors by Efficient Histogram Modification. Signal Processing. Volume 92, Issue 12, Pages 3000-3009, 2012.

Fangjun Huang, Jiwu Huang, Yun Q. Shi. New Channel Selection Rule for JPEG Steganography. IEEE Trans. on Information Forensics & Security. 7(4):1181-1191, 2012.

Jian Cao and Jiwu Huang. Controllable Secure Watermarking Technique for Tradeoff Between Robustness and Security. IEEE Trans. on Information Forensics & Security. 7(1): 821 u2013 826, 2012.

Xiangui Kang, Yinxiang Li, Zhenhua Qu and Jiwu Huang. Enhancing Source Camera Identification Performance with a Camera Reference Phase Sensor Pattern Noise. IEEE Trans. on Information Forensics & Security. 7(2): 393-402, 2012.

Guopu Zhu, Sam Kwong, Jiwu Huang, and Jianquan Yang. Random Gray Code and Its Performance Analysis for Image Hashing. . 91 (2011) 2178u20132193.

Yanqing Lei, Yunagen Wang, Jiwu Huang. Robust Image Hash in Radon Transform Domain for Authentication. . 26 (2011) 280u2013288

Xiangui Kang, Member, IEEE, Rui Yang, Student Member, IEEE, and Jiwu Huang. Geometric Invariant Audio Watermarking Based on an LCM Feature. , 13(2): 181-190, April, 2011.

Weiqi Luo, Jiwu Huang. Security Analysis on Spatial ±1 Steganography for JPEG Decompressed Images. , 18(1): 39-42, 2011.

Fangjun Huang, Weiqi Luo, Jiwu Huang. Steganalysis of JPEG steganography with complementary embedding strategy. , 5(1):10-18. 2011

Weiqi Luo, Jiwu Huang. A More Secure Steganography Based on Adaptive Pixel-Value Differencing Scheme. . Volume 52, Issue 2, Page 407-430, 2011

Hongmei Liu, Xinzhi Yao, Jiwu Huang: Minority codes with improved embedding   efficiency for large payloads. . 52(2-3): 431-443 (2011)

Fangjun Huang, Jiwu Huang, Yun Q.Shi. Detecting Double JPEG Compression with the Same Quantization Matrix. , 5(4): 838-856.

Weiqi Luo, Yuangen Wang, Jiwu Huang. Detection of Quantization Artifacts and Its Applications to Transform Encoder Identification. , 5(4): 810-815, 2010

Fangjun Huang, Jiwu Huang, Yun Q. Shi. An Experimental Study on the Security Performance of YASS. , 5(3): 374-380

Weiqi Luo, Jiwu Huang. JPEG Error Analysis and Its Applications to Digital Image Forensics. , 5(3): 480-491

Weiqi Luo, Fangjun Huang, Jiwu Huang. Edge Adaptive Image Steganography Based on LSB Matching Revisited. , 5(2):201-214, 2010.

Xiangui Kang, Jiwu Huang, Wenjun Zeng. Efficient General Print-Scanning Resilient Data Hiding Based on Uniform Log-polar Mapping. , 5(1):1-12, 2010.

Guopu Zhu, Jiwu Huang, Sam Kwong, Jianquan Yang. Fragility Analysis of Adaptive Quantization Based Image Hashing. , 5(1):133-147, 2010.

Yong Wang, Shaoquan Wu, and Jiwu Huang. Audio Watermarking Scheme Robust against Desynchronization Based on the Dyadic Wavelet Transform, , Volume 2010 (2010), Article ID 232616, 17 pages

Hongmei Liu, Xinzhi Yao and Jiwu Huang. “Semi-Fragile Zernike Moment-Based Image Watermarking for Authentication” , Volume 2010 (2010), Article ID 341856, 17 pages

Yong Wang, Jiwu Huang. Robust AVS Audio Watermarking. . 53(3): 607-618. 2010

Guopu Zhu, Jiwu Huang, Sam Kwong, Jianquan Yang. A Study on the Randomness Measure of Image. , 4(4):928-932, 2009

Bin Li, Jiwu Huang, Yun Q. Shi. Steganalysis of YASS. , 4(3): 369-382, 2009.

Xiangui Kang, Jiwu Huang, Wenjun Zeng. Improving Robustness of Quantization-Based Image watermarking via Adaptive Receiver. , vol.10, no.6, pp. 953-959, Oct. 2008.

Shijun Xiang, Hyoung-Joong Kim, Jiwu Huang. Invariant Image Watermarking Based on the Statistical Features in the Low-Frequency Domain. , 18(6): 777-790, 2008.

Shijun Xiang, HJ Kim and Jiwu Huang “Audio Watermarking Robust to Time-Scale Modification and MP3 Compression” , vol. 88, pp. 2372-2388. 2008.

Bin Li, Yanmei Fang and Jiwu Huang. Steganalysis of Multiple-Base Notational System Steganography. , vol.15, pp.493-496.2008

Shijun Xiang, Jiwu Huang. Histogram-Based Audio Watermarking against Time-Scale Modifications and Cropping Attacks. . 9(7): 1357-1372, 2007.

Ning Bi; Qiyu Sun; Daren Huang; Zhihua Yang; Jiwu Huang. Robust Image Watermarking Based on Multiband Wavelets and Empirical Mode Decomposition. . 2007, 16(8):1956-1966.

Yongjian Hu, Sam Kwong, Jiwu Huang. A new method of reversible visible watermarking. . 16(1): 129-133, 2006.

Shaoquan Wu, Jiwu Huang, Daren Huang, Yun Q. Shi, Efficiently Self-Synchronized Audio Watermarking for Assured Audio Data Transmission. . 2005, 51(1): 69-76.

Xiangui Kang, Jiwu Huang, Yun Q. Shi, Yan Lin. A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression. . 2003, 13(8): 776-786.

Jiwu Huang, Yun Q. Shi. Reliable Information Bit Hiding. . 2002, 12(10): 916-920.

Jiwu Huang, Yun Q. Shi, Yi Shi, Embedding image watermarks in DC components, . 2000, 10(6), pp. 974-979.

部分会议论文

Zhenhua Qu, Xiangui Kang, Jiwu Huang, Yinxiang Li. Forensic sensor pattern noise extraction from large image data set. 2013 IEEE Int. Conf. on Acoustics, Speech and Signal Processing, (accepted)

Haojun Wu, Yong Wang, Jiwu Huang. Blind detection of electronic disguised voice. 2013 IEEE Int. Conf. on Acoustics, Speech and Signal Processing, (accepted)

Haodong Li, Weiqi Luo, Jiwu Huang. Countering Anti-JPEG Compression Forensics. 2012 IEEE Int. Conf. on Image Processing, pp. 241-244.

Peijia Zheng, Jiwu Huang. Walsh-Hadamard Transform in the Homomorphic Encrypted Domain and Its Application in Image Watermarking. Proc. of 14th Information Hiding Conference. LNCS 7692, pp. 240-254.

Ligang Zheng, Guoping Qiu, Jiwu Huang. Efficient Coarse-To-Fine Near-Duplicate Image Detection in Riemannian Manifold. Proc. of IEEE Int. Conf. on Acoustics, Speech and Signal Processing, pp. 977-980, 2012.

Da Luo, Weiqi Luo, Rui Yang, Jiwu Huang. Compression History Identification for Digital Audio Signal. Proc. of IEEE Int. Conf. on Acoustics, Speech and Signal Processing, pp. 1733-1736, 2012.

Peijia Zheng, Jiwu Huang. Implementation of the Discrete Wavelet Transform and Multiresolution Analysis in the Encrypted Domain. ACM Multimedia 2011, pp. 413-422.

Ligang Zheng, Guoping Qiu, Jiwu Huang. Salient Covariance For Near-duplicate Image And Video Detection. Proc. of IEEE Int. Conf. on Image Processing, pp. 2585-2588, 2011.

Haotian Wu, Jiwu Huang. Secure JPEG steganography by LSB+ matching and multi-band embedding. Proc. of IEEE Int. Conf. on Image Processing, pp. 2793-2796, 2011.

Yuan-Gen Wang, Yanqiang Lei, Jiwu Huang. An image copy detection scheme based on radon transform. Proc. of IEEE Int. Conf. on Image Processing, pp. 2893-2896, 2010

Jian Cao , Jiwu Huang, Jiangqun Ni. Spread Spectrum Watermarking to Achieve a Trade-off Between Security and Robustness. Proc. of Int. Workshop on Information Hiding 2010

Jian Cao , Jiwu Huang. Provably Secure Spread-spectrum Watermarking Schemes in the Known Message Attack. Proc. of Int. Workshop on Information Hiding 2010

Rui Yang, Yun Q. Shi, Jiwu Huang. Detecting double compression of audio signal. Proc. IS&T/SPIE Electronic Imaging 2010: Media Forensics and Security XII, 2010.1

Zhenhua Qu, Guoping Qiu, and Jiwu Huang. Detect Digital Image Splicing with Visual Cues. Proc. of 11th Int. Workshop on Information Hiding. LNCS 5806, pp. 247-261, 2009

Xinzhi Yao, Hongmei Liu, Wei Rui, Jiwu Huang. Content-based authentication algorithm for binary images. Proc. of 2007 IEEE Int. Conf. on Image Processing, pp. 2893-2896, 2009

Rui Yang, Yun Q. Shi ,Jiwu Huang. Defeating Fake-Quality MP3. Proc. of the 11th ACM Workshop on Multimedia and Security, pp. 117-124, 2009

Yong Wang, Jiwu Huang. Robust AVS Audio Watermarking. Proc. of 8th Int Workshop on Digital Processing, LNCS 5703, pp. 29-38, 2009

Zhenhua Qu, Weiqi Luo, Jiwu Huang, “A convolutive mixing model for shifted double jpeg compression with application to passive image authentication,” Proc. of IEEE Int. Conf. on Accoust, Speech and Signal Processing, 2008, 1661-1664.

Fangjun Huang, Bin Li, Jiwu Huang. Universal JPEG steganalysis based on microscopic and macroscopic calibration. Proc. of 2008 IEEE Int. Conf. on Image Processing, pp. 2068-2071, 2008

Fangjun Huang, Yun Q. Shi, Jiwu Huang. A study on security performance of YASS. Proc. of 2008 IEEE Int. Conf. on Image Processing, pp.2084-2087, 2008.

Xiangui Kang, Xiong Zhong, Jiwu Huang, Wenjun Zeng. An efficient print-scanning resilient data hiding scheme based on a novel LPM. Proc. of 2008 IEEE Int. Conf. on Image Processing, pp. 2080-2083, 2008

Weiqi Luo, Min Wu, Jiwu Huang. MPEG recompression detection based on block artifacts. Proc. of SPIE: Security, Forensics, Steganography, and Watermarking of Multimedia Contents X. Volume 6819, pp. 68190X-68190X-12, 2008.

Bin Li, Jiwu Huang, Yun Q. Shi. Textural feature based universal steganalysis. Proc. of SPIE: Forensics, Steganography, and Watermarking of Multimedia Contents X. Volume 6819, pp. 681912-681912-12, 2008

Bin Li, Yun Q. Shi, Jiwu Huang: Steganalysis of YASS. Proc. of the 10th ACM Workshop on Multimedia and Security, pp: 139-148, 2008

Rui Yang, Zhenhua Qu, Jiwu Huang: Detecting digital audio forgeries by checking frame offsets. Proc. of the 10th ACM Workshop on Multimedia and Security, pp: 21-26, 2008

发表评论

您的电子邮箱地址不会被公开。 必填项已用*标注