複製鏈接
請複製以下鏈接發送給好友

黃繼武

(深圳大學信息工程學院特聘教授、博士生導師)

鎖定
黃繼武,工學博士。深圳大學信息工程學院特聘教授博士生導師、廣東省“網絡與信息安全”省部產學研創新聯盟理事長。入選廣東省傑出人才。分別畢業於西安電子科技大學(學士)、清華大學(碩士)、中國科學院自動化所(博士)。曾主持完成包括2項國家973項目課題、4項國家自然科學基金重點項目在內的科研課題。在本領域發表論文300多篇,引用20000多次(google scholar),個人H-index 75;申請發明專利近60項,獲授權40多項;獲國家自然科學二等獎(排名第二,2015)、教育部自然科學一等獎(排名第一,2004)、中國計算機學會自然科學一等獎(排名第一,2019)。曾擔任國際期刊 IEEE Trans. on Information Forensics and Security 副編輯(Associate Editor),IEEE Signal Processing Letters高級副編輯(Senior AE)。IEEE 信息取證與安全2013年度學術會議(IEEE WIFS'2013)大會共同主席、IEEE 信息取證與安全2018年度學術會議(IEEE WIFS'2013)程序委員會共同主席。研究興趣為多媒體內容分析與取證、信息隱藏、多媒體安全、模式識別與機器學習、多媒體信號處理。國家傑出青年科學基金獲得者、IEEE Fellow。 [1] 
中文名
黃繼武
出生地
廣東揭陽
出生日期
1962年10月
畢業院校
西安電子科技大學
清華大學
中國科學院自動化研究所
性    別

黃繼武教育背景

1982年畢業於西安電子科技大學電子對抗專業,獲得工學學士學位。
1987年畢業於清華大學通信與電子系統專業,獲得工學碩士學位
1998年畢業於中國科學院自動化研究所模式識別與智能系統專業,獲得工學博士學位。

黃繼武工作經歷

1982-1985在桂林電子工業學院任助教,
1987-1989在桂林電子工業學院任講師,
1989-1999在汕頭大學任講師、副教授、教授。
2000.1-2013.12年在中山大學任教,為中山大學信息科學與技術學院教授,兼教育部“信息xx”重點實驗室主任(首任)和廣東省“信息安全技術”重點實驗室主任(首任)。
2014年1月至今在深圳大學任教授,曾兼任廣東省“智能信息處理”重點實驗室主任(首任)。 [3] 
2015年當選國際電氣與電子工程師協會2016年度IEEE Fellow(會士) [2] 
2017年入選廣東省特支計劃傑出人才

黃繼武學術兼職

IEEE Trans.on Information Forensics and Security等國際刊物副編輯(associateeditor)、IEEE 信號處理學會(SPS)信息取證與安全技術委員會(IFS TC)成員、IEEE 電路與系統學會(CASS)多媒體系統與應用技術委員會(MSA TC)成員(2002~)、信息安全國家重點實驗室學術委員會委員、Asia-Pacific Signal and Information ProcessingAssociation (APSIPA)BoG(Board of Governors)成員

黃繼武研究興趣

多媒體取證與安全、信息隱藏、模式識別

黃繼武科研項目

曾主持過國家自然科學基金重點項目、國家973課題等研究項目。

黃繼武獲獎

1)可視媒體幾何計算的理論與方法。國家自然科學二等獎(排名第二),2015; [4] 
(2)穩健數字水印方法。教育部提名國家科學技術獎自然科學一等獎(排名第一),2004;
3)信息隱藏理論與方法。中國計算機學會自然科學一等獎(排名第一),2019. [5] 

黃繼武研究成果

黃繼武專利

有18個授權專利和其他20項專利申請

黃繼武期刊論文

[1]Ligang Zheng, Guoping Qiu, Yanqiang Lei and Jiwu Huang. Near-duplicate Image Detection in a Visually Salient Riemannian Space. IEEE Trans. on Information Forensics & Security. 7(5): 1578 – 1593, 2012.
[2]Yanqiang Lei, Weiqi Luo, Yuangen Wang, Jiwu Huang. Video Sequence Matching Based on the Invariance of Color Correlation. IEEE Trans. on Circuits and Systems for Video Technology. 22(9): 1332-1343, 2012
[3]Chuntao Wang, Jiangqun Ni, Jiwu Huang. An Informed Watermarking Scheme Using Hidden Markov Model in the Wavelet Domain. IEEE Trans. on Information Forensics & Security. 7(3):853-867, 2012.
[4]Jian Li, Hongmei Liu, Jiwu Huang, Yun Q. shi. Reference Index-Based H.264 Video Watermarking Scheme. ACM Trans. on Multimedia Computing, Communications, and Applications. Volume 8, Issue 2S, Article No. 33, p1-22, September 2012
[5]Rui Yang, Zhenhua Qu, Jiwu Huang. Exposing MP3 Audio Forgeries Using Frame Offsets. ACM Trans. on Multimedia Computing, Communications, and Applications. Volume 8, Issue 2S, Article No. 33, p. 1-20, September 2012
[6]Zhongwei He, Wei Lu, Wei Sun, Jiwu Huang. Digital image splicing detection based on Markov features in DCT and DWT domain. Pattern Recognition, 45(12): 4292-4299, 2012
[7]Haotian Wu and Jiwu Huang. Reversible Image Watermarking on Prediction Errors by Efficient Histogram Modification. Signal Processing. Volume 92, Issue 12, Pages 3000-3009, 2012.
[8]Fangjun Huang, Jiwu Huang, Yun Q. Shi. New Channel Selection Rule for JPEG Steganography. IEEE Trans. on Information Forensics & Security. 7(4):1181-1191, 2012.
[9]Jian Cao and Jiwu Huang. Controllable Secure Watermarking Technique for Tradeoff Between Robustness and Security. IEEE Trans. on Information Forensics & Security. 7(1): 821 – 826, 2012.
[10]Xiangui Kang, Yinxiang Li, Zhenhua Qu and Jiwu Huang. Enhancing Source Camera Identification Performance with a Camera Reference Phase Sensor Pattern Noise. IEEE Trans. on Information Forensics & Security. 7(2): 393-402, 2012.
[11]Guopu Zhu, Sam Kwong, Jiwu Huang, and Jianquan Yang. Random Gray Code and Its Performance Analysis for Image Hashing. Signal Processing. 91 (2011) 2178–2193.
[12]Yanqing Lei, Yunagen Wang, Jiwu Huang. Robust Image Hash in Radon Transform Domain for Authentication.Signal Processing: Image Communication. 26 (2011) 280–288
[13]Xiangui Kang, Member, IEEE, Rui Yang, Student Member, IEEE, and Jiwu Huang. Geometric Invariant Audio Watermarking Based on an LCM Feature. IEEE Trans. on Multimedia, 13(2): 181-190, April, 2011.
[14]Weiqi Luo, Jiwu Huang. Security Analysis on Spatial ±1 Steganography for JPEG Decompressed Images. IEEE Signal Processing Letters, 18(1): 39-42, 2011.
[15]Fangjun Huang, Weiqi Luo, Jiwu Huang. Steganalysis of JPEG steganography with complementary embedding strategy. IET Information Security, 5(1):10-18. 2011
[16]Weiqi Luo, Jiwu Huang. A More Secure Steganography Based on Adaptive Pixel-Value Differencing Scheme. Multimedia Tools and Applications. Volume 52, Issue 2, Page 407-430, 2011
[17]Hongmei Liu, Xinzhi Yao, Jiwu Huang: Minority codes with improved embedding
efficiency for large payloads. Multimedia Tools Applications. 52(2-3): 431-443 (2011)
[18]Fangjun Huang, Jiwu Huang, Yun Q.Shi. Detecting Double JPEG Compression with the Same Quantization Matrix.IEEE Trans. on Information Forensics & Security, 5(4): 838-856.
[19]Weiqi Luo, Yuangen Wang, Jiwu Huang. Detection of Quantization Artifacts and Its Applications to Transform Encoder Identification. IEEE Trans. on Information Forensics & Security, 5(4): 810-815, 2010
[20]Fangjun Huang, Jiwu Huang, Yun Q. Shi. An Experimental Study on the Security Performance of YASS. IEEE Trans. on Information Forensics & Security, 5(3): 374-380
[21]Weiqi Luo, Jiwu Huang. JPEG Error Analysis and Its Applications to Digital Image Forensics. IEEE Trans. on Information Forensics & Security, 5(3): 480-491
[22]Weiqi Luo, Fangjun Huang, Jiwu Huang. Edge Adaptive Image Steganography Based on LSB Matching Revisited. IEEE Trans. on Information Forensics & Security, 5(2):201-214, 2010.
[23]Xiangui Kang, Jiwu Huang, Wenjun Zeng. Efficient General Print-Scanning Resilient Data Hiding Based on Uniform Log-polar Mapping. IEEE Trans. on Information Forensics & Security, 5(1):1-12, 2010.
[24]Guopu Zhu, Jiwu Huang, Sam Kwong, Jianquan Yang. Fragility Analysis of Adaptive Quantization Based Image Hashing. IEEE Trans. on Information Forensics & Security, 5(1):133-147, 2010.
[25]Yong Wang, Shaoquan Wu, and Jiwu Huang. Audio Watermarking Scheme Robust against Desynchronization Based on the Dyadic Wavelet Transform, EURASIP Journal on Advances in Signal Processing, Volume 2010 (2010), Article ID 232616, 17 pages
[26]Hongmei Liu, Xinzhi Yao and Jiwu Huang. “Semi-Fragile Zernike Moment-Based Image Watermarking for Authentication” EURASIP Journal on Advances in Signal Processing, Volume 2010 (2010), Article ID 341856, 17 pages
[27]Yong Wang, Jiwu Huang. Robust AVS Audio Watermarking. Science China: Information Sciences. 53(3): 607-618. 2010
[28]Guopu Zhu, Jiwu Huang, Sam Kwong, Jianquan Yang. A Study on the Randomness Measure of Image. IEEE Trans. on Information Forensics & Security, 4(4):928-932, 2009
[29]Bin Li, Jiwu Huang, Yun Q. Shi. Steganalysis of YASS. IEEE Trans. on Information Forensics & Security, 4(3): 369-382, 2009.
[30]Xiangui Kang, Jiwu Huang, Wenjun Zeng. Improving Robustness of Quantization-Based Image watermarking via Adaptive Receiver. IEEE Trans. on Multimedia, vol.10, no.6, pp. 953-959, Oct. 2008.
[31]Shijun Xiang, Hyoung-Joong Kim, Jiwu Huang. Invariant Image Watermarking Based on the Statistical Features in the Low-Frequency Domain. IEEE Trans. on Circuits and Systems for Video Technology, 18(6): 777-790, 2008.
[32]Shijun Xiang, HJ Kim and Jiwu Huang “Audio Watermarking Robust to Time-Scale Modification and MP3 Compression” Signal Processing, vol. 88, pp. 2372-2388. 2008.
[33]Bin Li, Yanmei Fang and Jiwu Huang.Steganalysis of Multiple-Base Notational System Steganography. IEEE Signal Processing Letter, vol.15, pp.493-496.2008
[34]Shijun Xiang, Jiwu Huang. Histogram-Based Audio Watermarking against Time-Scale Modifications and Cropping Attacks. IEEE Trans. on Multimedia. 9(7): 1357-1372, 2007.
[35]Ning Bi; Qiyu Sun; Daren Huang; Zhihua Yang; Jiwu Huang. Robust Image Watermarking Based on Multiband Wavelets and Empirical Mode Decomposition. IEEE Trans. on Image Processing. 2007, 16(8):1956-1966.
[36]Yongjian Hu, Sam Kwong, Jiwu Huang. A new method of reversible visible watermarking. IEEE Trans. on Circuits and Systems for Video Technology. 16(1): 129-133, 2006.
[37]Shaoquan Wu, Jiwu Huang, Daren Huang, Yun Q. Shi, Efficiently Self-Synchronized Audio Watermarking for Assured Audio Data Transmission. IEEE Trans. on Broadcasting. 2005, 51(1): 69-76.
[38]Xiangui Kang, Jiwu Huang, Yun Q. Shi, Yan Lin. A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression. IEEE Trans. on Circuits and Systems for Video Technology. 2003, 13(8): 776-786.
[39]Jiwu Huang, Yun Q. Shi. Reliable Information Bit Hiding. IEEE Trans. on Circuits and Systems for Video Technology. 2002, 12(10): 916-920.
[40]Jiwu Huang, Yun Q. Shi, Yi Shi, Embedding image watermarks in DC components, IEEE Trans. on Circuits and Systems for Video Technology. 2000, 10(6), pp. 974-979.

黃繼武會議論文

[1]Zhenhua Qu, Xiangui Kang, Jiwu Huang, Yinxiang Li. Forensic sensor pattern noise extraction from large image data set. 2013 IEEE Int. Conf. on Acoustics, Speech and Signal Processing, (accepted)
[2]Haojun Wu, Yong Wang, Jiwu Huang. Blind detection of electronic disguised voice. 2013 IEEE Int. Conf. on Acoustics, Speech and Signal Processing, (accepted)
[3]Haodong Li, Weiqi Luo, Jiwu Huang. Countering Anti-JPEG Compression Forensics. 2012 IEEE Int. Conf. on Image Processing, pp. 241-244.
[4]Peijia Zheng, Jiwu Huang. Walsh-Hadamard Transform in the Homomorphic Encrypted Domain and Its Application in Image Watermarking. Proc. of 14th Information Hiding Conference. LNCS 7692, pp. 240-254.
[5]Ligang Zheng, Guoping Qiu, Jiwu Huang. Efficient Coarse-To-Fine Near-Duplicate Image Detection in Riemannian Manifold. Proc. of IEEE Int. Conf. on Acoustics, Speech and Signal Processing, pp. 977-980, 2012.
[6]Da Luo, Weiqi Luo, Rui Yang, Jiwu Huang. Compression History Identification for Digital Audio Signal. Proc. of IEEE Int. Conf. on Acoustics, Speech and Signal Processing, pp. 1733-1736, 2012.
[7]Peijia Zheng, Jiwu Huang. Implementation of the Discrete Wavelet Transform and Multiresolution Analysis in the Encrypted Domain. ACM Multimedia 2011, pp. 413-422.
[8]Ligang Zheng, Guoping Qiu, Jiwu Huang. Salient Covariance For Near-duplicate Image And Video Detection. Proc. of IEEE Int. Conf. on Image Processing, pp. 2585-2588, 2011.
[9]Haotian Wu, Jiwu Huang. Secure JPEG steganography by LSB+ matching and multi-band embedding. Proc. of IEEE Int. Conf. on Image Processing, pp. 2793-2796, 2011.
[10]Yuan-Gen Wang, Yanqiang Lei, Jiwu Huang. An image copy detection scheme based on radon transform. Proc. of IEEE Int. Conf. on Image Processing, pp. 2893-2896, 2010
[11]Jian Cao , Jiwu Huang, Jiangqun Ni. Spread Spectrum Watermarking to Achieve a Trade-off Between Security and Robustness. Proc. of Int. Workshop on Information Hiding 2010
[12]Jian Cao , Jiwu Huang. Provably Secure Spread-spectrum Watermarking Schemes in the Known Message Attack. Proc. of Int. Workshop on Information Hiding 2010
[13]Rui Yang, Yun Q. Shi, Jiwu Huang. Detecting double compression of audio signal. Proc. IS&T/SPIE Electronic Imaging 2010: Media Forensics and Security XII, 2010.1
[14]Zhenhua Qu, Guoping Qiu, and Jiwu Huang. Detect Digital Image Splicing with Visual Cues. Proc. of 11th Int. Workshop on Information Hiding. LNCS 5806, pp. 247-261, 2009
[15]Xinzhi Yao, Hongmei Liu, Wei Rui, Jiwu Huang. Content-based authentication algorithm for binary images. Proc. of 2007 IEEE Int. Conf. on Image Processing, pp. 2893-2896, 2009
[16]Rui Yang, Yun Q. Shi ,Jiwu Huang. Defeating Fake-Quality MP3. Proc. of the 11th ACM Workshop on Multimedia and Security, pp. 117-124, 2009
[17]Yong Wang, Jiwu Huang. Robust AVS Audio Watermarking. Proc. of 8th Int Workshop on Digital Processing, LNCS 5703, pp. 29-38, 2009
[18]Zhenhua Qu, Weiqi Luo, Jiwu Huang, “A convolutive mixing model for shifted double jpeg compression with application to passive image authentication,” Proc. of IEEE Int. Conf. on Accoust, Speech and Signal Processing, 2008, 1661-1664.
[19]Fangjun Huang, Bin Li, Jiwu Huang. Universal JPEG steganalysis based on microscopic and macroscopic calibration. Proc. of 2008 IEEE Int. Conf. on Image Processing, pp. 2068-2071, 2008
[20]Fangjun Huang, Yun Q. Shi, Jiwu Huang. A study on security performance of YASS. Proc. of 2008 IEEE Int. Conf. on Image Processing, pp.2084-2087, 2008.
[21]Xiangui Kang, Xiong Zhong, Jiwu Huang, Wenjun Zeng. An efficient print-scanning resilient data hiding scheme based on a novel LPM. Proc. of 2008 IEEE Int. Conf. on Image Processing, pp. 2080-2083, 2008
[22]Weiqi Luo, Min Wu, Jiwu Huang. MPEG recompression detection based on block artifacts. Proc. of SPIE: Security, Forensics, Steganography, and Watermarking of Multimedia Contents X. Volume 6819, pp. 68190X-68190X-12, 2008.
[23]Bin Li, Jiwu Huang, Yun Q. Shi. Textural feature based universal steganalysis. Proc. of SPIE: Forensics, Steganography, and Watermarking of Multimedia Contents X. Volume 6819, pp. 681912-681912-12, 2008
[24]Bin Li, Yun Q. Shi, Jiwu Huang: Steganalysis of YASS. Proc. of the 10th ACM Workshop on Multimedia and Security, pp: 139-148, 2008
[25]Rui Yang, Zhenhua Qu, Jiwu Huang: Detecting digital audio forgeries by checking frame offsets. Proc. of the 10th ACM Workshop on Multimedia and Security,pp: 21-26, 2008
參考資料