网络空间安全学院

英文站|

师资队伍
当前位置:    首页 > 师资队伍 > 全体教师 > 教授(研究员) >    正文
王宏霞

日期:2019-11-13                   来源:                   作者:               关注:

专业 网络空间安全 研究方向 多媒体信息安全、信息隐藏、数字水印、数字取证、智能信息处理
Email hxwang@scu.edu.cn 电话

王宏霞

专业:网络空间安全

研究方向:多媒体信息安全、信息隐藏、数字水印、数字取证、智能信息处理

Email:hxwang@scu.edu.cn

个人简介

四川大学网络空间安全学院教授、博士生导师。2002年在电子科技大学获工学博士学位。2002-2004年在上海交通大学信息与通信工程流动站从事博士后研究,2013-2014年在美国北肯塔基大学计算机科学系访问研究,2004-2018年在西南交通大学信息科学与技术学院工作,任教授。2018年9月作为引进人才加入四川大学网络空间安全学院。四川省有突出贡献的优秀专家(2018),四川省学术和技术带头人后备人选(2009),四川省杰出青年学科带头人(2007)。

主要研究领域包括多媒体信息安全、信息隐藏、数字水印、数字取证、智能信息处理等。在IEEE TIFS / TDSC / TMM / TCSVT / TNNLS / TFS、中国科学、软件学报、自动化学报等国内外重要学术期刊,以及ACM MM / IH&MMSec、IEEE ICME / ICASSP / WIFS /APSIPA、IWDW等重要国际会议上发表研究论文200余篇,获授权国家发明专利20余项。作为主编编著《认证理论及应用》(清华大学出版社)和《信息隐藏理论与实践》(XX工业出版社),作为副主编编著《信息论与编码理论》(武汉大学出版社)。先后主持国家自然科学基金5项,以及教育部博士点基金(博导类)、四川省重点研发项目、四川省青年科技基金等省部级科研项目和企业产学研项目16项,并作为主研人参加了多项国家自然科学基金及国家863计划项目的研究工作。研究成果获省部级科技奖励2项、国际会议最佳论文奖3项,部分研究成果已在国家重要部门、电商和电信得到有效应用。担任IWDW 2019国际会议大会主席,以及ICME、APSIPA等多个国际会议的分会场主席或领域主席。中国电子科技集团网络空间安全技术重点实验室第一届学术委员会委员,中国电子学会通信学分会多媒体信息安全专家委员会委员、CCF高级会员,CSIG高级会员、IEEE/ACM会员。

先后主讲“信息内容安全”、“多媒体信息安全”、“人工智能与多媒体安全”、“Cybersecurity of the Internet of Things”、“信息隐藏技术”、“认证理论与技术”、“电子商务安全”、“专业英语翻译”等研究生和本科生课程,已指导毕业100余位研究生并获得博/硕士学位,其中1人获四川省优秀博士学位论文,8人获校级优秀博/硕士学位论文。毕业研究生工作在华为、阿里巴巴、腾讯、字节跳动、科大讯飞、海康威视、30所、54所、农业银行等大型IT企业、研究所和银行,以及贵州大学、上海大学、华侨大学、南京邮电大学、南丹麦大学、莫纳什大学马来西亚分校等国内外高校。

主要研究领域

信息保密与信息隐藏:将敏感信息或文件隐藏在一副图像、一段音乐或视频中,起到信息保密的作用。输入密码,还可从含密图像、音乐或视频中完整提取出原始敏感信息或文件。这种信息保密方法与传统加密方法不同,可使秘密信息或文件“彻底消失”,从而察觉不到秘密信息的存在性。

版权保护与数字水印:一些正规商家辛辛苦苦拍摄的商品图片和视频,却被山寨店铺轻松利用并进行宣传,这不仅会对图像和视频的原创者带来损失,也会对消费者误导。有些影视作品刚上映甚至还未上映,网上就已经有下载的盗版资源。解决这些问题的一种重要技术就是在视频中添加鲁棒水印进行版权保护,且不影响视频的视觉质量和使用价值。

人工智能与数字取证:眼见一定为实、耳听一定为真吗?答案是“No!”。当今强大的多媒体编辑软件使得图像、声音、视频等多媒体信息的编辑、篡改、传播变得相当容易,因此伪造的虚假图片、声音、视频难以辨认。通过结合机器学习、深度学习等人工智能方法,可实现对质疑的多媒体信息取证,以辨别真伪。

鲁棒哈希与生物认证:防欺骗性高的身份信息可以是生物指纹、声纹、人脸等生物特征,这些生物特征具有一定的感知冗余。感知哈希具有鲁棒性、抗碰撞性、紧凑性和安全性等特点,通过生成这些生物特征的鲁棒哈希,可达到基于生物特征身份认证的目的。

主持的主要科研项目

1.国家自然科学基金-面上,面向分享平台的自适应鲁棒视频水印研究,62272331,2023.1-2026.12

2.国家自然科学基金-面上,基于人工免疫系统的信息隐藏研究,6197226,2020.1-2023.12

3.国家自然科学基金-联合,保持码率的高容量压缩域视频信息隐藏研究,U1536110,2016.1-2018.12

4.国家自然科学基金-面上,数字语音真实性的主动取证及其安全性研究,61170226,2012.1-2015.12

5.国家自然科学基金-青年,基于内容的自适应音频水印研究,60702025,2008.1-2010.12

6.四川省科技计划(重点研发项目),社交网络虚假媒体内容智能检测技术研究,2022YFG0320,2022.1-2023.12

7.河南省网络空间态势感知重点实验室开放课题(重点项目),载体源失配条件下自适应隐写的智能检测技术研究,HNTS2022003,2022.5-2024.4

8.企业产学研项目,鲁棒性视频水印技术研究,21H0093,2021.1-2021.12

9.企业产学研项目,文档与图像水印技术研究,22H0517,2022.6-2023.5

10.企业产学研项目,原生溯源研究,21H0793,2021.6-2021.12

11.企业产学研项目,音频篡改发现研究,21H0792,2021.6-2021.12

12.教育部博士点基金(博导类),混沌脆弱水印技术研究,20070613024,2008.1-2010.12

13.四川省青年科技基金(四川省杰出青年学科带头人资助计划),基于人类心理声学模型的压缩域音频水印研究,07ZQ026-004,2007.6-2011.6

14.成都市科技计划,压缩域视频信息隐藏技术研究,12DXYB214JH-002,2013.1-2014.12

15.中国博士后科学基金,混沌信息隐藏技术在图像认证中的应用研究,2003033304,2003.6-2004.6

近几年代表性论文

1.M. He,H. Wang, F. Zhang, S. Abdullahi, L. Yang, “Robust blind video watermarking against geometric deformations and online video sharing platform processing,” IEEE Transactions on Dependable and Secure Computing, 20(6): 4702-4718, 2023 (CCF A类期刊)

2.Y. Chen, Z. Salcic,H. Wang, K.-K. R. Choo, X. Zhang, “NACA: A joint distortion-based non-additive cost assignment method for video steganography,” IEEE Transactions on Dependable and Secure Computing, 20(3): 2360-2374, 2023 (CCF A类期刊)

3.R. Zhang,H. Wang, M. Du, H. Liu, Y. Zhou, Q. Zeng, “UMMAFormer: A universal multimodal-adaptive transformer framework for temporal forgery localization,” Proceedings of the 31st ACM International Conference on Multimedia (ACM MM), Ottawa, Canada,pp. 8749-8759,2023 (CCF A类国际会议)

4.S. Abdullahi, K. Lv, S. Sun,H. Wang, “Cancelable fingerprint template construction using vector permutation and shift-ordering,” IEEE Transactions on Dependable and Secure Computing, 20(5): 3828-3844, 2023 (CCF A类期刊)

5.Y. Chen,H. Wang, K.-K. R. Choo, P. He, Z. Salcic, D. Kaafar, X. Zhang, “DDCA: A distortion drift-based cost assignment method for adaptive video steganography in the transform domain,” IEEE Transactions on Dependable and Secure Computing, 19(4): 2405-2420, 2022 (CCF A类期刊)

6.Y. Chen,H. Wang, H. Wu, Z. Wu, T. Li, A. Malik, “Adaptive video data hiding through cost assignment and STCs,” IEEE Transactions Dependable and Secure Computing, 18(3): 1320-1335, 2021 (CCF A类期刊)

7.S. Abdullahi,H. Wang, T. Li, “Fractal coding-based robust and alignment-free fingerprint image hashing,” IEEE Transactions on Information Forensics and Security, 15: 2587-2601, 2020 (CCF A类期刊)

8.K. Wang, H. Zhao,H. Wang, “Video steganalysis against motion vector based steganography by adding or subtracting one motion vector value,” IEEE Transactions on Information Forensics and Security, 9(5): 741-751, 2014(CCF A类期刊)

9.W. Li,H. Wang, Y. Chen, S. Abdullahi, J. Luo, “Constructing immunized stego-image for secure steganography via artificial immune system,” IEEE Transactions on Multimedia, DOI 10.1109/TMM.2023.3234812, 2023 (CCF B类期刊,JCR一区)

10.M. He,H. Wang, F. Zhang, Y. Xiang, “Exploring accurate invariants on polar harmonic Fourier moments in polar coordinates for robust image watermarking,” IEEE Transactions on Multimedia, DOI10.1109/TMM.2023.3333659, 2023 (CCF B类期刊,JCR一区)

11.W. Li,H. Wang, Y. Chen, “From cover to immucover: adversarial steganography via immunized cover construction,” IEEE Transactions on Fuzzy Systems, DOI 10.1109/TFUZZ.2023.3321740, 2023 (CCF B类期刊,JCR一区)

12.P. He, H. Li,H. Wang, S. Wang, X. Jiang, R. Zhang, “Frame-wise detection of double HEVC compression by learning deep spatio-temporal representations in compression domain,” IEEE Transactions on Multimedia, 23(9): 3192-3192, 2021 (CCF B类期刊,JCR一区)

13.R. Zhang,H. Wang, Ju H. Park, et al., “Fuzzy secure control for nonlinear N-D parabolic PDE-ODE coupled systems under stochastic deception attacks,” IEEE Transactions on Fuzzy Systems, 30 (8): 3347-3359, 2022 (CCF B类期刊,JCR一区)

14.R. Zhang,H. Wang, Ju H. Park, et al., “Event-triggered impulsive fault-tolerant control for memristor-based RDNNs with actuator faults,” IEEE Transactions on Neural Networks and Learning Systems, 34(6): 2993-3004, 2023 (CCF B类期刊,JCR一区)

15.R. Zhang,H. Wang, Ju H. Park, et al., “Mode-dependent adaptive event-triggered control for stabilization of Markovian memristor-based reaction-diffusion neural networks,” IEEE Transactions on Neural Networks and Learning Systems, 34(8): 3939-3951, 2023 (CCF B类期刊,JCR一区)

16.R. Zhang,H. Wang, Ju H. Park, et al., “Quasisynchronization of reaction-diffusion neural networks under deception attacks,” IEEE Transactions on Systems, Man, and Cybernetics: Systems, 52 (12): 7833-7844, 2022 (CCF B类期刊,JCR一区)

17.H. Wu, Y.-Q Shi,H. Wang, et al., “Separable reversible data hiding for encrypted palette images with color partitioning and flipping verification,” IEEE Transactions on Circuits and Systems for Video Technology, 27(8): 1620-1631, 2017(CCF B类期刊,JCR一区)

18.P. He, H. Li, B. Li,H. Wang, L. Liu, “Exposing fake bitrate videos using hybrid deep-learning network from recompression error,” IEEE Transactions on Circuits and Systems for Video Technology, 30 (11): 4034-4049, 2020 (CCF B类期刊,JCR一区)

19.S. Abdullahi, S. Sun, B. Wang, N. Wei,H. Wang, “Biometric template attacks and recent protection mechanisms: A survey,” Information fusion, 103: 102144, 2024 (JCR一区)

20.Y. Chen,H. Wang, W. Li, J. Luo, “Cost reassignment for improving security of adaptive steganography using an artificial immune system,” IEEE Signal Processing Letters, 29: 1564-1568, 2022 (JCR二区)

21.X. Wu,H. Wang, “Asymmetric contrastive learning for audio fingerprinting,” IEEE Signal Processing Letters, 29: 1873-1877, 2022 (JCR二区)

22.M. Hu,H. Wang, “Image steganalysis against adversarial steganography by combining confidence and pixel artifacts,” IEEE Signal Processing Letters, 30: 987-991, 2023(JCR二区)

23.M. Zhang,H. Wang, et al., “Exposing unseen GAN-generated image using unsupervised domain adaptation,” Knowledge-Based Systems, 257: 1-14, 2022 (JCR一区)

24.Y. Li,H. Wang, M. Barni, “A survey of deep neural network watermarking techniques,” Neurocomputing, 461: 171-193, 2021 (JCR二区)

25.J. Li,H. Wang, P. He, S. Abdullahi, B. Li, “Long-term variable Q transform: A novel time-frequency transform algorithm for synthetic speech detection,” Digital Signal Processing, 120: 1-11, 2022 (JCR二区)

26.J. Zhang,H. Wang, P. He, “Dual-branch multi-scale densely connected network for image splicing detection and localization,” Signal Processing: Image Communication, 119: 1-13, 2023 (JCR二区)

27.S. Abdullahi, S. Sun,H. Wang, et al., “The reversibility of cancelable biometric templates based on iterative perturbation stochastic approximation strategy,” Pattern Recognition Letters, 172: 221-229, 2023(JCR二区)

28.A. Malik,H. Wang, et al.,“Reversible data hiding in homomorphically encrypted image using interpolation technique,” Journal of Information Security and Applications, 48: 102374, 2019(JCR二区)

29.M. Zhang,H. Wang, P. He, A. Malik, H. Liu, “Improving GAN-generated image detection generalization using unsupervised domain adaptation,” IEEE International Conference on Multimedia and Expo (ICME), Taipei, Taiwan, 2022 (CCF B类国际会议)

30.J. Xia,H. Wang, S. Abdullahi, H. Wang, F. Zhang, B. Luo, “Adaptive and robust Fourier-Mellin-based image watermarking for social networking platforms,”IEEE International Conference on Multimedia and Expo (IEEE ICME), Brisbane, Australia, pp. 2843-2848, 2023(CCF B类国际会议)

31.Q. Zeng,H. Wang, Y. Zhou, R. Zhang, S. Meng, “A parallel attention mechanism for image manipulation detection and localization,” IEEE International Conference on Acoustics, Speech, & Signal Processing (ICASSP),Rhodes Island, Greece,2023(CCF B类国际会议)

32.Y. Zhou,H. Wang, Q. Zeng, R. Zhang, S. Meng, “A discriminative multi-channel noise feature representation model for image manipulation localization,” IEEE International Conference on Acoustics, Speech, & Signal Processing (ICASSP),Rhodes Island, Greece,2023(CCF B类国际会议)

33.P. He, H. Li,H. Wang, “Detection of fake images via the ensemble of deep representations from multi color spaces,” IEEE International Conference on Image Processing (ICIP), 2019, pp. 2299-2303(CCF推荐国际会议)

34.Y. Liu,H. Wang, “Feature selection based on clonal selection algorithm for image steganalysis,” Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC), pp. 2441-2447, 2023

35.F. Zhang,H. Wang,L. Yang, M. He, “Robust blind video watermarking by constructing spread-spectrum matrix,” IEEE International Workshop on Information Forensics and Security (WIFS), Shanghai, China, 2022

36.Y. Li, L. Abady,H. Wang, M. Barni, “A feature-map-based large-payload DNN watermarking algorithm,” International Workshop on Digital-forensics and Watermarking (IWDW), LNCS 13180, Springer, pp. 135-148, 2022

37.L. Yang,H. Wang, Y. Zhang,et al.,“A robust DCT-based video watermarking scheme against recompression and synchronization attacks,” International Workshop on Digital-forensics and Watermarking (IWDW), LNCS 13180, Springer, pp. 149-162, 2022

38.H. Liu,H. Wang, M. Zhang, “Exposing Deepfake videos using facial decomposition-based domain generalization,” IEEE 24th International Workshop on Multimedia Signal Processing (MMSP), 2022

39.F. Zhang,H. Wang, M. He, J. Li, “Adaptive despread spectrum-based image watermarking for fast product tracking,” International Workshop on Digital-forensics and Watermarking (IWDW), LNCS 13825, Springer, pp. 174-189, 2023

40.H. Wang, J. Sang, “Speaker identity tracing using fingerprint data hiding against telecommunications fraud,” Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC), pp. 554-559, 2018

41.H. Wang, Z. Chen, et al., “Constructing immune cover for secure steganography based on an artificial immune system approach,” International Workshop on Digital-forensics and Watermarking (IWDW), LNCS 12617, Springer, pp. 53-67, 2021

42.H. Wang, W. Zhang, et al., “Remote authentication of speaker identity based on perceptual fingerprint hashing,” International Workshop on Secure Biometric Technologies (IWSBT), Seoul, Korea, pp. 54-62, 2016 (获最佳论文奖)

43.S. Abdullahi,H. Wang, A.Malik, “Fingerprint image hashing based on minutiae points and shape context,”International Journal of Digital Crime and Forensics, 10(4): 1-20, 2018 (获IWDCF 2017最佳论文奖)

44.Y. Chen,H. Wang, et al., “Defining cost function for robust embedding,”International Conference on Artificial Intelligence and Security(ICAIS), CCIS 1252, Springer, pp. 626-638, 2020 (获最佳论文奖)

45.袁超,王宏霞,何沛松,“基于注意力机制的高容量通用图像隐写模型, ”软件学报,doi: 10.13328/j.cnki.jos.006815, 2023

46.张玉林,王宏霞,“语义一致性引导的多任务拼接篡改检测算法, ”中国图象图形学报,28(3): 775-788, 2023

47.张卫明,王宏霞,李斌,任延珍,杨忠良,陈可江,李伟祥,张新鹏,俞能海,“多媒体隐写研究进展, ”中国图象图形学报,27(6): 1918-1943, 2022

48.章蕾,王宏霞,“用于失配隐写分析的对抗子领域自适应网络, ”网络与信息安全学报, 8(3): 76-86, 2022

49.张婧媛,王宏霞,何沛松,“基于Transformer的多任务图像拼接篡改检测算法, ”计算机科学, 50(1): 114-122, 2023

50.韩松源,王宏霞,蒋子渝,“面向流动追踪的多层鲁棒Excel文档水印, ”计算机科学, https://link.cnki.net/urlid/50.1075.TP.20230925.1057.032 2023

教师寄语

我创造,我快乐!

Let me try!

关闭