信息保密与信息隐藏:将敏感信息或文件隐藏在一副图像、一段音乐或视频中,起到信息保密的作用。输入密码,还可从含密图像、音乐或视频中完整提取出原始敏感信息或文件。这种信息保密方法与传统加密方法不同,可使秘密信息或文件“彻底消失”,从而察觉不到秘密信息的存在性。
版权保护与数字水印:一些正规商家辛辛苦苦拍摄的商品图片和视频,却被山寨店铺轻松利用并进行宣传,这不仅会对图像和视频的原创者带来损失,也会对消费者误导。有些影视作品刚上映甚至还未上映,网上就已经有下载的盗版资源。解决这些问题的一种重要技术就是在视频中添加鲁棒水印进行版权保护,且不影响视频的视觉质量和使用价值。
人工智能与数字取证:眼见一定为实、耳听一定为真吗?答案是“No!”。当今强大的多媒体编辑软件使得图像、声音、视频等多媒体信息的编辑、篡改、传播变得相当容易,因此伪造的虚假图片、声音、视频难以辨认。通过结合机器学习、深度学习等人工智能方法,可实现对质疑的多媒体信息取证,以辨别真伪。
鲁棒哈希与生物认证:防欺骗性高的身份信息可以是生物指纹、声纹、人脸等生物特征,这些生物特征具有一定的感知冗余。感知哈希具有鲁棒性、抗碰撞性、紧凑性和安全性等特点,通过生成这些生物特征的鲁棒哈希,可达到基于生物特征身份认证的目的。
主持的主要科研项目
1.国家自然科学基金-面上,面向分享平台的自适应鲁棒视频水印研究,62272331,2023.1-2026.12
2.国家自然科学基金-面上,基于人工免疫系统的信息隐藏研究,6197226,2020.1-2023.12
3.国家自然科学基金-联合,保持码率的高容量压缩域视频信息隐藏研究,U1536110,2016.1-2018.12
4.国家自然科学基金-面上,数字语音真实性的主动取证及其安全性研究,61170226,2012.1-2015.12
5.国家自然科学基金-青年,基于内容的自适应音频水印研究,60702025,2008.1-2010.12
6.四川省科技计划(重点研发项目),社交网络虚假媒体内容智能检测技术研究,2022YFG0320,2022.1-2023.12
7.河南省网络空间态势感知重点实验室开放课题(重点项目),载体源失配条件下自适应隐写的智能检测技术研究,HNTS2022003,2022.5-2024.4
8.企业产学研项目,鲁棒性视频水印技术研究,21H0093,2021.1-2021.12
9.企业产学研项目,文档与图像水印技术研究,22H0517,2022.6-2023.5
10.企业产学研项目,原生溯源研究,21H0793,2021.6-2021.12
11.企业产学研项目,音频篡改发现研究,21H0792,2021.6-2021.12
12.教育部博士点基金(博导类),混沌脆弱水印技术研究,20070613024,2008.1-2010.12
13.四川省青年科技基金(四川省杰出青年学科带头人资助计划),基于人类心理声学模型的压缩域音频水印研究,07ZQ026-004,2007.6-2011.6
14.成都市科技计划,压缩域视频信息隐藏技术研究,12DXYB214JH-002,2013.1-2014.12
15.中国博士后科学基金,混沌信息隐藏技术在图像认证中的应用研究,2003033304,2003.6-2004.6
近几年代表性论文
1.M. He,H. Wang, F. Zhang, S. Abdullahi, L. Yang, “Robust blind video watermarking against geometric deformations and online video sharing platform processing,” IEEE Transactions on Dependable and Secure Computing, 20(6): 4702-4718, 2023 (CCF A类期刊)
2.Y. Chen, Z. Salcic,H. Wang, K.-K. R. Choo, X. Zhang, “NACA: A joint distortion-based non-additive cost assignment method for video steganography,” IEEE Transactions on Dependable and Secure Computing, 20(3): 2360-2374, 2023 (CCF A类期刊)
3.R. Zhang,H. Wang, M. Du, H. Liu, Y. Zhou, Q. Zeng, “UMMAFormer: A universal multimodal-adaptive transformer framework for temporal forgery localization,” Proceedings of the 31st ACM International Conference on Multimedia (ACM MM), Ottawa, Canada,pp. 8749-8759,2023 (CCF A类国际会议)
4.S. Abdullahi, K. Lv, S. Sun,H. Wang, “Cancelable fingerprint template construction using vector permutation and shift-ordering,” IEEE Transactions on Dependable and Secure Computing, 20(5): 3828-3844, 2023 (CCF A类期刊)
5.Y. Chen,H. Wang, K.-K. R. Choo, P. He, Z. Salcic, D. Kaafar, X. Zhang, “DDCA: A distortion drift-based cost assignment method for adaptive video steganography in the transform domain,” IEEE Transactions on Dependable and Secure Computing, 19(4): 2405-2420, 2022 (CCF A类期刊)
6.Y. Chen,H. Wang, H. Wu, Z. Wu, T. Li, A. Malik, “Adaptive video data hiding through cost assignment and STCs,” IEEE Transactions Dependable and Secure Computing, 18(3): 1320-1335, 2021 (CCF A类期刊)
7.S. Abdullahi,H. Wang, T. Li, “Fractal coding-based robust and alignment-free fingerprint image hashing,” IEEE Transactions on Information Forensics and Security, 15: 2587-2601, 2020 (CCF A类期刊)
8.K. Wang, H. Zhao,H. Wang, “Video steganalysis against motion vector based steganography by adding or subtracting one motion vector value,” IEEE Transactions on Information Forensics and Security, 9(5): 741-751, 2014(CCF A类期刊)
9.W. Li,H. Wang, Y. Chen, S. Abdullahi, J. Luo, “Constructing immunized stego-image for secure steganography via artificial immune system,” IEEE Transactions on Multimedia, DOI 10.1109/TMM.2023.3234812, 2023 (CCF B类期刊,JCR一区)
10.M. He,H. Wang, F. Zhang, Y. Xiang, “Exploring accurate invariants on polar harmonic Fourier moments in polar coordinates for robust image watermarking,” IEEE Transactions on Multimedia, DOI10.1109/TMM.2023.3333659, 2023 (CCF B类期刊,JCR一区)
11.W. Li,H. Wang, Y. Chen, “From cover to immucover: adversarial steganography via immunized cover construction,” IEEE Transactions on Fuzzy Systems, DOI 10.1109/TFUZZ.2023.3321740, 2023 (CCF B类期刊,JCR一区)
12.P. He, H. Li,H. Wang, S. Wang, X. Jiang, R. Zhang, “Frame-wise detection of double HEVC compression by learning deep spatio-temporal representations in compression domain,” IEEE Transactions on Multimedia, 23(9): 3192-3192, 2021 (CCF B类期刊,JCR一区)
13.R. Zhang,H. Wang, Ju H. Park, et al., “Fuzzy secure control for nonlinear N-D parabolic PDE-ODE coupled systems under stochastic deception attacks,” IEEE Transactions on Fuzzy Systems, 30 (8): 3347-3359, 2022 (CCF B类期刊,JCR一区)
14.R. Zhang,H. Wang, Ju H. Park, et al., “Event-triggered impulsive fault-tolerant control for memristor-based RDNNs with actuator faults,” IEEE Transactions on Neural Networks and Learning Systems, 34(6): 2993-3004, 2023 (CCF B类期刊,JCR一区)
15.R. Zhang,H. Wang, Ju H. Park, et al., “Mode-dependent adaptive event-triggered control for stabilization of Markovian memristor-based reaction-diffusion neural networks,” IEEE Transactions on Neural Networks and Learning Systems, 34(8): 3939-3951, 2023 (CCF B类期刊,JCR一区)
16.R. Zhang,H. Wang, Ju H. Park, et al., “Quasisynchronization of reaction-diffusion neural networks under deception attacks,” IEEE Transactions on Systems, Man, and Cybernetics: Systems, 52 (12): 7833-7844, 2022 (CCF B类期刊,JCR一区)
17.H. Wu, Y.-Q Shi,H. Wang, et al., “Separable reversible data hiding for encrypted palette images with color partitioning and flipping verification,” IEEE Transactions on Circuits and Systems for Video Technology, 27(8): 1620-1631, 2017(CCF B类期刊,JCR一区)
18.P. He, H. Li, B. Li,H. Wang, L. Liu, “Exposing fake bitrate videos using hybrid deep-learning network from recompression error,” IEEE Transactions on Circuits and Systems for Video Technology, 30 (11): 4034-4049, 2020 (CCF B类期刊,JCR一区)
19.S. Abdullahi, S. Sun, B. Wang, N. Wei,H. Wang, “Biometric template attacks and recent protection mechanisms: A survey,” Information fusion, 103: 102144, 2024 (JCR一区)
20.Y. Chen,H. Wang, W. Li, J. Luo, “Cost reassignment for improving security of adaptive steganography using an artificial immune system,” IEEE Signal Processing Letters, 29: 1564-1568, 2022 (JCR二区)
21.X. Wu,H. Wang, “Asymmetric contrastive learning for audio fingerprinting,” IEEE Signal Processing Letters, 29: 1873-1877, 2022 (JCR二区)
22.M. Hu,H. Wang, “Image steganalysis against adversarial steganography by combining confidence and pixel artifacts,” IEEE Signal Processing Letters, 30: 987-991, 2023(JCR二区)
23.M. Zhang,H. Wang, et al., “Exposing unseen GAN-generated image using unsupervised domain adaptation,” Knowledge-Based Systems, 257: 1-14, 2022 (JCR一区)
24.Y. Li,H. Wang, M. Barni, “A survey of deep neural network watermarking techniques,” Neurocomputing, 461: 171-193, 2021 (JCR二区)
25.J. Li,H. Wang, P. He, S. Abdullahi, B. Li, “Long-term variable Q transform: A novel time-frequency transform algorithm for synthetic speech detection,” Digital Signal Processing, 120: 1-11, 2022 (JCR二区)
26.J. Zhang,H. Wang, P. He, “Dual-branch multi-scale densely connected network for image splicing detection and localization,” Signal Processing: Image Communication, 119: 1-13, 2023 (JCR二区)
27.S. Abdullahi, S. Sun,H. Wang, et al., “The reversibility of cancelable biometric templates based on iterative perturbation stochastic approximation strategy,” Pattern Recognition Letters, 172: 221-229, 2023(JCR二区)
28.A. Malik,H. Wang, et al.,“Reversible data hiding in homomorphically encrypted image using interpolation technique,” Journal of Information Security and Applications, 48: 102374, 2019(JCR二区)
29.M. Zhang,H. Wang, P. He, A. Malik, H. Liu, “Improving GAN-generated image detection generalization using unsupervised domain adaptation,” IEEE International Conference on Multimedia and Expo (ICME), Taipei, Taiwan, 2022 (CCF B类国际会议)
30.J. Xia,H. Wang, S. Abdullahi, H. Wang, F. Zhang, B. Luo, “Adaptive and robust Fourier-Mellin-based image watermarking for social networking platforms,”IEEE International Conference on Multimedia and Expo (IEEE ICME), Brisbane, Australia, pp. 2843-2848, 2023(CCF B类国际会议)
31.Q. Zeng,H. Wang, Y. Zhou, R. Zhang, S. Meng, “A parallel attention mechanism for image manipulation detection and localization,” IEEE International Conference on Acoustics, Speech, & Signal Processing (ICASSP),Rhodes Island, Greece,2023(CCF B类国际会议)
32.Y. Zhou,H. Wang, Q. Zeng, R. Zhang, S. Meng, “A discriminative multi-channel noise feature representation model for image manipulation localization,” IEEE International Conference on Acoustics, Speech, & Signal Processing (ICASSP),Rhodes Island, Greece,2023(CCF B类国际会议)
33.P. He, H. Li,H. Wang, “Detection of fake images via the ensemble of deep representations from multi color spaces,” IEEE International Conference on Image Processing (ICIP), 2019, pp. 2299-2303(CCF推荐国际会议)
34.Y. Liu,H. Wang, “Feature selection based on clonal selection algorithm for image steganalysis,” Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC), pp. 2441-2447, 2023
35.F. Zhang,H. Wang,L. Yang, M. He, “Robust blind video watermarking by constructing spread-spectrum matrix,” IEEE International Workshop on Information Forensics and Security (WIFS), Shanghai, China, 2022
36.Y. Li, L. Abady,H. Wang, M. Barni, “A feature-map-based large-payload DNN watermarking algorithm,” International Workshop on Digital-forensics and Watermarking (IWDW), LNCS 13180, Springer, pp. 135-148, 2022
37.L. Yang,H. Wang, Y. Zhang,et al.,“A robust DCT-based video watermarking scheme against recompression and synchronization attacks,” International Workshop on Digital-forensics and Watermarking (IWDW), LNCS 13180, Springer, pp. 149-162, 2022
38.H. Liu,H. Wang, M. Zhang, “Exposing Deepfake videos using facial decomposition-based domain generalization,” IEEE 24th International Workshop on Multimedia Signal Processing (MMSP), 2022
39.F. Zhang,H. Wang, M. He, J. Li, “Adaptive despread spectrum-based image watermarking for fast product tracking,” International Workshop on Digital-forensics and Watermarking (IWDW), LNCS 13825, Springer, pp. 174-189, 2023
40.H. Wang, J. Sang, “Speaker identity tracing using fingerprint data hiding against telecommunications fraud,” Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC), pp. 554-559, 2018
41.H. Wang, Z. Chen, et al., “Constructing immune cover for secure steganography based on an artificial immune system approach,” International Workshop on Digital-forensics and Watermarking (IWDW), LNCS 12617, Springer, pp. 53-67, 2021
42.H. Wang, W. Zhang, et al., “Remote authentication of speaker identity based on perceptual fingerprint hashing,” International Workshop on Secure Biometric Technologies (IWSBT), Seoul, Korea, pp. 54-62, 2016 (获最佳论文奖)
43.S. Abdullahi,H. Wang, A.Malik, “Fingerprint image hashing based on minutiae points and shape context,”International Journal of Digital Crime and Forensics, 10(4): 1-20, 2018 (获IWDCF 2017最佳论文奖)
44.Y. Chen,H. Wang, et al., “Defining cost function for robust embedding,”International Conference on Artificial Intelligence and Security(ICAIS), CCIS 1252, Springer, pp. 626-638, 2020 (获最佳论文奖)
45.袁超,王宏霞,何沛松,“基于注意力机制的高容量通用图像隐写模型, ”软件学报,doi: 10.13328/j.cnki.jos.006815, 2023
46.张玉林,王宏霞,“语义一致性引导的多任务拼接篡改检测算法, ”中国图象图形学报,28(3): 775-788, 2023
47.张卫明,王宏霞,李斌,任延珍,杨忠良,陈可江,李伟祥,张新鹏,俞能海,“多媒体隐写研究进展, ”中国图象图形学报,27(6): 1918-1943, 2022
48.章蕾,王宏霞,“用于失配隐写分析的对抗子领域自适应网络, ”网络与信息安全学报, 8(3): 76-86, 2022
49.张婧媛,王宏霞,何沛松,“基于Transformer的多任务图像拼接篡改检测算法, ”计算机科学, 50(1): 114-122, 2023
50.韩松源,王宏霞,蒋子渝,“面向流动追踪的多层鲁棒Excel文档水印, ”计算机科学, https://link.cnki.net/urlid/50.1075.TP.20230925.1057.032 2023
教师寄语