倪江群

倪江群,男,博士,中山大學數據科學與計算機學院教授。

基本介紹

  • 中文名:倪江群
  • 職業:教師
  • 畢業院校:香港大學
  • 學位/學歷:博士
  • 職稱:教授
研究領域,人物經歷,教育經歷,工作經歷,所屬榮譽,科研項目,學術兼職,教授課程,代表性論著,

研究領域

機器學習與模式識別,多媒體信息安全:包括信息隱藏、隱寫分析和信息取證,多媒體信息處理和多媒體通信,基於圖像的3D建模和渲染,數位電視系統,現代電信網路、3G/4G無線通信系統與網路,嵌入式系統及套用

人物經歷

教育經歷

1998.6 香港大學電機與電子工程系博士。

工作經歷

1998.10 — 2000.10 中山大學和廣東省電信科學技術研究院聯合博士後工作站
中山大學信息科學與技術學院教授,博士生導師,電子與通信工程系主任
中山大學數據科學與計算機學院,特崗教授,博士生導師

所屬榮譽

2015年廣東省科學技術二等獎(項目名:基於主動式兩相流體迴路的航天大型科學實驗精密熱控系統)

科研項目

1. 阿爾法磁譜儀(AMS)軌跡探測器熱控制系統的研製(TTCS)—電子子系統,2003年國際科技合作重點項目計畫,廣東省人民政府科技專項和科技部國際科技合作重點項目計畫(2003DF000050)
說明:本項目屬於丁肇中教授領導的大型國際合作項目“阿爾法磁譜儀計畫”的一部分,AMS-TTCS的其他國際參與者包括美國麻省理工學院(MIT)、瑞士日內瓦大學、荷蘭航空航天局(NLR)。TTCS系統將隨整個AMS-02磁譜儀一起在國際空間站上工作,是磁譜儀熱控制系統的一部分。中山大學參與研製的熱控制系統(TTCS)是國內大學參加AMS-02項目中唯一在太空運行的裝置。
2. 適應多種數字媒體的安全隱寫及其對抗關鍵技術研究,國家自然科學聯合基金重點項目(U1736215)
3. 基於模型的JPEG圖像隱寫新方法研究,國家自然科學基金(61772573)
4. 數字圖像被動取證中若干關鍵技術的研究,國家自然科學基金(61379156)
5. 基於通用解碼的抗幾何攻擊水印方法及相關安全性問題研究,國家自然科學基金(60970145)
6. 數字圖像被動取證關鍵技術研究,廣東省自然科學基金重點項目(S2012020011114)
7. 數字圖像盲取證關鍵技術研究,教育部博士點基金(20120171110037)
8. 基於模型的魯棒和安全水印新方法研究,國家自然科學基金(60773200)
9. 基於模型的魯棒和安全水印關鍵技術研究,廣東省自然科學基金(7003722)

學術兼職

中國圖象圖形學會理事
廣東省圖象圖形學會理事長
中國電子學會多媒體安全專家委員會專家委員
IEEE 電路與系統學會廣州分會副主席
多媒體安全和取證國際會議IEEE WIFS 和 IWDW TPC成員

教授課程

本科生課程
數字圖像處理
機器學習與數據挖掘
資訊理論基礎
無線通信原理
現代通信新技術專題
研究生課程
現代通信原理
現代數字圖像處理與機器視覺

代表性論著

國際重要期刊
29. Multiple Histograms Based Reversible Data Hiding: Framework and Realization, IEEE Trans. on Circuit and System for Video Technology, in press, Apr., 2019. (SCI)
28. A New Distortion Function Design for JPEG Steganography Using Generalized Uniform Embedding Strategy, IEEE Trans. on Circuit and System for Video Technology, Vol.18, No.12, Dec. 2018. (SCI)
27. Efficient JPEG Steganography Using Domain Transformation of Embedding Entropy, IEEE Signal Processing Letters, Vol.25,No.6, pp: 773-777, 2018. (SCI)
26. Efficient Compression of Encrypted Binary Images using the Markov Random Field, IEEE Trans. on Information Forensics and Security, Vol.13, No.5, pp: 1271-1285, May, 2018. (SCI)
25. Deep Learning Hierarchical Representations for Image Steganalysis, IEEE Trans. on Information Forensics and Security, Vol. 12, No. 11, pp: 2545-2557, Nov., 2017. (SCI)
24. High-Fidelity Reversible Data Hiding Using Directionally-Enclosed Prediction, IEEE Signal Processing Letters, Vol. 24, No.5, pp:574-578, May, 2017.
23. Blind Forensics of Successive Geometric Transformations in Digital Images Using Spectral Method: Theory and Applications, IEEE Trans. on Image Processing, Vol. 26, No. 6, pp: 2811-2824, June, 2017.(SCI)
22. Rate and Distortion Optimization for Reversible Data Hiding Using Multiple Histogram Shifting, IEEE Trans. on Cybernetics, Vol.47, Issue 2, pp:315-326, Feb., 2017.(SCI)
21. Using Statistical Image Model for JPEG Steganography: Uniform Embedding Revisited, IEEE Trans. on Information Forensics and Security, Vol.10, No. 12, pp: 2669-2680, Dec., 2015.(SCI)
20. AMS Collaboration, Electron and Positron Fluxes in Promary Cosmic Rays Measured with the Alpha Magnetic Spectrometer on the International Space Station, Phys Rev Letts, 2014(113): 121102. (SCI)
19. AMS Collaboration, High Statistics Measurement of the Positron Fraction in the Primary Cosmix rays of 0.5-500 GeV with the Alpha Magnetic Spectrometer on the International Space Station, Phys Rev Letts, 2014(113): 121101. (SCI)
18. Effective Estimation of Image Rotation Angle Using Spectral Method, IEEE Signal Processing Letters, Vol.21, No.7, pp: 890-894, July, 2014.(SCI)
17. Uniform Embedding for Efficient JPEG Steganography, IEEE Trans. on Information Forensics and Security, Vol.9, No.5, pp: 814-825, May, 2014.(SCI)
16. Blind Detection of Median Filtering in Digital Images: A Difference Domain Based Approach, IEEE Trans. on Image Processing, Vol.22, No.12, pp: 4699-4710, Dec., 2013. (SCI)
15. An Informed Watermarking Scheme Using Hidden Markov Model in the Wavelet Domain, IEEE Trans. on Information Forensics and Security, Vol.7, No.3, pp: 853-867, June, 2012.(SCI)
14. On the Hardware/Software Design and Implementation of a High Definition Multiview Video Surveillance Systems, IEEE Journal on Emerging and Selected Topics in Circuits and Systems, Vol.3, No.2, pp: 248-262, 2013. (SCI)
13. Robust Digital Image Stabilization Using the Kalman Filter, IEEE Trans. on Consumer Electronics, Vol.55, No.1, pp: 6-14, Feb., 2009.(SCI)
12. Multiple histograms based reversible data hiding by using FCM clustering, Signal Processing 159 (2019),pp:192-203.
11. Model Based Image Steganography with an Asymmetric Embedding Scheme, SPIE Journal of Electronic Imaging, 27(4)043023,July, 2018. (SCI)
10. Reversible Data Hiding with Contrast Enhancement Using Adaptive Histogram Shifting and Pixel Value Ordering, Signal Processing: Image Communication, 46 (2016) 1-16. (SCI)
9. An Encryption-Then-Compression Algorithm Using Rate-Distortion Optimization, Signal Processing: Image Communication, Vol.39, pp:141-150, 2015. (SCI)
8. Median Filtering Detection by Linear and Nonlinear Descriptor, Multimedia Tools and Applications, Vol.75, No.4, pp: 2327-2346, Feb., 2016. (SCI)
7. An Efficient Reversible Data Hiding Scheme Using Prediction and Optimal Side Information Selection, Journal of Visual Communication and Image Representation, Vol.25, No.6, pp: 1425-1431, Aug., 2014 . (SCI)
6. Counteracting Geometrical Attacks on Robust Image Watermarking by Constructing a Deformable Pyramid Transform, EURASIP Journal on Advances in Signal Processing, 2013: 119. (SCI)
5. Improved Histogram Shifting Technique for Low Payload Embedding by Using a Rate-distortion Model and Optimal Side Information Selection, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E95-D, No.10, pp.2552-2555, Oct., 2012.(SCI)
4. Region Duplication Detection Based on Harris Corner Points and Step Sector Statistics, Journal of Visual Communication and Image Representation, Vol.24, No.3, pp.244-254, 2013. (SCI)
3. Hybrid Matrix Coding and Error-Correction Coding Scheme for Reversible Data Hiding in Binary VQ Index Codestream, International Journal of Innovative Computing, Information and Control, Vol.6, No.6, pp.2521-2530, June, 2013. (SCI)
2. Content-Adaptive Robust Image Watermarking with Posterior HMM-based Detector, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E91-A, No.08, Aug. 2008.(SCI)
1. Model-Based Multirate Kalman Filtering Approach for Optimal Two-Dimensional Signal Reconstruction from Noisy Subband Systems, Optical Engineering, The Journal of SPIE, Aug., 1998. (SCI)
本領域頂級國際會議
8. Efficient HS Based Reversible Data Hiding Using Multi-feature Complexity Measure and Optimized Histogram, Proc. of ACM IH&MMSec 2016.
7. A Deep Learning Approach to Detection of Splicing and Copy-Move Forgeries in Images, Proc. of WIFS 2016.
6. An Efficient JPEG Steganographic Scheme Using Uniform Embedding, Proc. of WIFS 2012, pp.169-174.
5. Blind Median Filtering Detection Using Statistics in Difference Domain, Proc. of Information Hiding 2012, Springer, 2012.
4. Security Analysis of ISS Watermarking Using Natural Scene Statistics, Proc. of Information Hiding 2010, Springer, 2010.
3. Spread Spectrum Watermarking for Achieving a Trade-off Between Security and Robustness, Proc. of Information Hiding 2010, Springer, 2010.
2. Watermarking Security Incorporating Natural Scene Statistics, Proc. of Information Hiding 2008, LNCS 5284, pp.132-146, Springer, 2008.
1. Robust and High Capacity Image Watermarking Based on Jointly Coding and Embedding Optimization, Proc. of Information Hiding 2007, LNCS4567, Springer, 2007.
國內一級學報
11. 多特徵融合的低景深圖像前景提取算法,ACTA AUTOMATICA SINACA, Vol.39, No.6, June, 2013. (一級學報,EI)
10. 一種分層判決結構的H.264/AVC快速幀間模式選擇方法,電子學報, 第41卷,第11期,pp:2199-2206, 2013.(一級學報,SCI,EI)
9. 一種基於直方圖平移的高性能可逆水印算法, ACTA AUTOMATICA SINACA, Vol.38, No.1, 2012. (一級學報,EI)
8. 基於可變形多尺度變換的幾何不變魯棒圖像水印算法, ACTA AUTOMATICA SINACA, Vol.37, No.11, 2011. (一級學報,EI)
7. Security Analysis on Add-SS Watermarking with GSM, ACTA AUTOMATICA SINACA, Vol.35, No.7, July, 2009, pp:841-850.(一級學報,EI)
6. 一種改進的多用途KAEDF半色調圖像水印算法,通信學報, 第29卷,第10期, 2008年10月,pp: 30-36. (一級學報,EI)
5. CAN通信協定及其硬體實現,通信學報, 第29卷,第5期, 2008年5月, pp:107-113. (一級學報,EI)
4. 基於內容自適應的最佳化DWT-HMM穩健圖像水印算法, 通信學報, 第28卷, 第2期, 2007年2月. (一級學報,EI)
3. An Adaptive Image Watermarking Algorithm Based on HMM in Wavelet Domain, ACTA AUTOMATICA SINACA, Vol.31, No.5, September, 2005, pp:705-712.(一級學報,EI)
2. 基於小波域HMM模型的穩健多比特圖像水印算法, 軟體學報, 第16卷,第7期, 2005年7月, pp:1323-1331.(一級學報,EI)
1. 分層多描述視頻編碼及其在差錯網路環境下的仿真研究, 通信學報, 第26卷, 第7期, 2005年7月, pp:129-135. (一級學報,EI)

相關詞條

熱門詞條

聯絡我們