人物經歷
2007年開始在深圳大學計算機與軟體學院擔任教師,2023年晉升為教授。
2005/10 - 2006/11,美國新澤西理工學院擔任訪問學者一年,合作導師:施雲慶教授,IEEE Life Fellow.
2002/09 - 2007/07,中山大學,計算機科學系,博士,導師:黃繼武教授
研究方向
多媒體取證、多媒體安全、深度學習、機器學習、信息隱藏、圖像/音頻/視頻信號處理、模式識別。
科研項目
國家自然科學基金面上項目,“基於張量分解框架的深度學習信息隱藏對抗研究”,(61772349)2018.01-2021.12,(主持);
國家自然科學基金聯合基金項目重點支持項目,“社交網路虛假媒體內容檢測關鍵技術的研究”,(U19B2022),254萬,2020.01-2023.12,(排名第二);
國家自然科學基金面上項目,“基於張量分解框架的深度學習信息隱藏對抗研究”,(61772349)2018.01-2021.12,(主持)
國家自然科學基金——通用技術基礎研究聯合基金重點項目,“基於大數據的信息隱藏與對抗技術”,(U1636202)2017.1-2020.12,(排名第四);
國家自然科學基金青年基金,“大尺度分散式深度學習框架在隱寫分析上的套用”,(61402295) 2015.01-2017.12,(主持);
廣東省深圳市基礎研究項目,“基於大尺度分散式深度學習框架的隱寫分析研究”,(JCYJ20140418182819173) 2014.09-2016.09,(主持);
國家自然科學基金青年基金“特徵向量變化可控的安全隱寫研究”,(61103174) 2012.01-2014.12,(排名第二);
發表論文
期刊論文
胡林輝,陳保營,譚舜泉*,李斌,基於Convnext-Upernet的圖像篡改檢測定位模型,計算機學報,已錄用,計算領域高質量科技期刊T1,CCF A類中文科技期刊
X.Mo, S. Tan*, W. Tang, B. Li and J.Huang, “ReLOAD: Using Reinforcement Learning to Optimize Asymmetric Distortionfor Additive Steganography.” IEEETransactions on Information Forensics and Security 18 (2023): 1524-1538(CCF A類期刊/中科院SCI一區/TOP期刊)
K. Wei, W. Luo, S.Tan, and J. Huang. “Universal Deep Network for Steganalysis of Color ImageBased on Channel Representation.” IEEETransactions on Information Forensics and Security 17 (2022): 3022-3036(CCF A類期刊/中科院SCI一區/TOP期刊)
G.Li, B. Li, S. Tan, and G. Qiu, “Learningdeep co-occurrence features”, IEEETransactions on Circuits and Systems for Video Technology, 2022,33(4):1610-1623(中科院SCI一區/TOP期刊)
H.Chen, Y. Lin, B. Li, and S. Tan. “LearningFeatures of Intra-consistency and Inter-diversity: Keys towards Generalizable DeepfakeDetection.” IEEE Transactions onCircuits and Systems for Video Technology, 2022, 33(3) :1468-1480(中科院SCI一區/TOP期刊)
X.Qin, B. Li, S. Tan, W. Tang, and J.Huang. Gradually Enhanced Adversarial Perturbations on Color Pixel Vectors forImage Steganography [J]. IEEE Transactions on Circuits and Systemsfor Video Technology, 2022, 32(8):5110-5123 (中科院SCI一區/TOP期刊)
L.Zhuo, S. Tan*, B. Li, J. Huang. Self-adversarialTraining Incorporating Forgery Attention for Image Forgery Localization [J]. IEEE Transactions on InformationForensics and Security, 2022, 17: 819-834 (CCF A類期刊/中科院SCI一區/TOP期刊)
P.Zhuang, H. Li, S. Tan, B. Li, J.Huang. Image Tampering Localization Using a Dense Fully Convolutional Network [J]. IEEE Transactions on InformationForensics and Security, 2021, 16: 2986-2999 (CCF A類期刊/中科院SCI一區/TOP期刊)
X.Mo, S. Tan*, B. Li, J. Huang. MCTSteg:A Monte Carlo Tree Search-based Reinforcement Learning Framework for UniversalNon-additive Steganography [J]. IEEETransactions on Information Forensics and Security, 2021, 16:4306-4320 (CCF A類期刊/中科院SCI一區/TOP期刊)
Q.Li, S. Chen, S. Tan*, B. Li, J.Huang. One-Class Double Compression Detection of Advanced Videos Based onSimple Gaussian Distribution Model [J].IEEE Transactions on Circuits and Systems for Video Technology, 2021, 32(4):2496-2500(中科院SCI一區/TOP期刊)
S. Tan, W. Wu, Z. Shao, Q. Li, B. Li, J. Huang. CALPA-NET: Channel-pruning-assisted Deep Residual Network forSteganalysis of Digital Images [J]. IEEE Transactions on InformationForensics and Security, 2021, 16: 131-146 (CCF A類期刊/中科院SCI一區/TOP期刊)
J. Zeng,S. Tan*, G. Liu, B. Li, J. Huang. WISERNet: Wider Separate-then-reunion Network for Steganalysis of Color Images [J].IEEE Transactions on Information Forensics and Security, 2019, 10(14): 2735-2748(CCF A類期刊/中科院SCI一區)
W. Tang, B. Li,S. Tan, M. Barni, J. Huang. CNN-based Adversarial Embedding for Image Steganography [J].IEEE Transactions on Information Forensics and Security, 2019, 14(8): 2074-2087(CCF A類期刊/中科院SCI一區)
J. Zeng,S. Tan*, B. Li, J. Huang. Large-scale JPEG Image Steganalysis using Hybrid Deep-learning Framework [J].IEEE Transactions on Information Forensics and Security, 2018, 13(5): 1242-1257.(CCF A類期刊/中科院SCI一區)
B. Li, Z. Li, S. Zhou,S. Tan, X. Zhang. New Steganalytic Features for Spatial Image Steganography based on Derivative Filters and Threshold LBP Operator [J].IEEE Transactions on Information Forensics and Security, 2018, 13(5): 1242-1257.(CCF A類期刊/中科院SCI一區)
B. Li, W. Wei, A. Ferreira,S. Tan. ReST-Net: Diverse Activation Modules and Parallel Subnets-Based CNN for Spatial Image Steganalysis [J].IEEE Signal Processing Letters, 2018, 25(5): 650-654.(CCF C類期刊/中科院SCI三區)
史曉裕, 李斌,譚舜泉. 深度學習空域隱寫分析的預處理層 [J].套用科學學報, 2018, 36(2):309-320.
S. Tan, H. Zhang, B. Li, J. Huang. Pixel-Decimation-Assisted Steganalysis of Synchronize-Embedding-Changes Steganography[J].IEEE Transactions on Information Forensics and Security, 2017, 12(7): 1658-1670.(CCF A類期刊/中科院SCI一區)
W. Tang,S. Tan*, B. Li, J. Huang. Automatic Steganographic Distortion Learning Using a Generative Adversarial Network [J].IEEE Signal Processing Letters, 2017, 24(10): 1547–1551.(CCF C類期刊/中科院SCI三區)
S. Chen,S. Tan*, B. Li, J. Huang. Automatic Detection of Object-based Forgery in Advanced Video [J].IEEE Transactions on Circuits and Systems for Video Technology. 2016, 26(11): 2138-2151.(CCF B類期刊/中科院SCI二區)
B. Li, T.-T. Ng, X. Li,S. Tan, J. Huang. Statistical Model of JPEG Noises and Its Application in Quantization Step Estimation [J].IEEE Transactions on Image Processing. 2015, 24(5): 1471–1484.(CCF A類期刊/中科院SCI二區)
B. Li, M. Wang, X. Li,S. Tan, J. Huang, A Strategy of Clustering Modification Directions in Spatial Image Steganography [J].IEEE Transactions on Information Forensics and Security. 2015, 10(9): 1905–1917.(CCF A類期刊/中科院SCI一區)
B. Li, T.-T. Ng, X. Li,S. Tan, J. Huang. Revealing the Trace of High-quality JPEG Compression through Quantization Noise Analysis [J].IEEE Transactions on Information Forensics and Security. 2015 10(3): 558-573.(CCF A類期刊/中科院SCI一區)
B. Li,S. Tan, M. Wang, J. Huang. Investigation on Cost Assignment in Spatial Image Steganography [J].IEEE Transactions on Information Forensics and Security. 2014 9(8): 1264–1277.(CCF A類期刊/中科院SCI一區)
S. Tan, B. Li. Targeted Steganalysis of Edge Adaptive Image Steganography Based on LSB Matching Revisited Using B-spline Fitting [J].IEEE Signal Processing Letters. 2012, 19(6): 336-339.(CCF C類期刊/中科院SCI三區)
會議論文
X. Mo, S. Tan*, B. Li, and J. Huang, “Poster: Query-efficient black-boxattack for image forgery localization via reinforcement learning”, ACM CCS 2023(poster), accepted. CCF A
G. Li, B. Li, C. Chen, S. Tan, and G. Qiu. “Learning General Gaussian Mixture Model withIntegral Cosine Similarity.” In Proc. the Thirty-First International JointConference on Artificial Intelligence (IJCAI-22), Vienna, Austria, July, 23-29,2022. pp. 3201-3207.
X. Qin, S. Tan, W. Tang, B.Li, and J. Huang, “Image Steganography Based on Iterative Adversarial Perturbationsonto a Synchronized Directions Sub-Image,” in Proc. ICASSP, Toronto, ON,Canada, Jun. 2021, pp. 2705–2709.
Q. Li, Z. Shao,S. Tan*, J. Zeng, and B. Li, “Non-structured Pruning for Deep-learning based Steganalytic Frameworks”, Asia-Pacific Signal and Information Processing Association Annual Summit and Conference 2019, Lanzhou, China, November, 18-21, 2019.
L. Zhuo,S. Tan*, J. Zeng, B. Li, “Fake Colorized Image Detection with Channel-wise Convolution based Deep-learning Framework”, Asia-Pacific Signal and Information Processing Association Annual Summit and Conference 2018, Honolulu, Hawaii, USA, November, 12-15, 2018.
H. Zhang, B. Li,S. Tan. “A New Steganographic Distortion Function with Explicit Considerations of Modification Interactions”, International Conference on Cloud Computing and Security, Haikou, China, June 8-10, 2018.
S. Zhou, W. Tang,S. Tan, B. Li. “Content-adaptive Steganalysis via Augmented Utilization of Selection-channel Information”, 17th International Workshop on Digital Forensics and Watermarking, Jeju, Korea, October 22-24, 2018.
H. Li, H. Chen, B. Li,S. Tan. “Can Forensic Detectors Identify GAN Generated Images?”, Asia-Pacific Signal and Information Processing Association Annual Summit and Conference 2018, Honolulu, Hawaii, USA, November, 12-15, 2018.
Y. Huang,S. Tan, B. Li, J. Huang. “VPCID-A VoIP Phone Call Identification Database”, 17th International Workshop on Digital Forensics and Watermarking, Jeju, Korea, October 22-24, 2018.
J. Zeng,S. Tan*, B. Li, “Pre-training via Fitting Deep Neural Network to Rich-model Features Extraction Procedure and Its Effect on Deep Learning for Steganalysis”, in Proc. Media Watermarking, Security, and Forensics, Part of IS&T International Symposium on Electronic Imaging (EI'2017), Burlingame, CA, Juanuary, 29-February, 2, 2017.
S. Tan, S. Chen, B. Li, “GOP Based Automatic Detection of Object-based Forgery in Advanced Video”, in Proc. Asia-Pacific Signal and Information Processing Association Annual Summit and Conference 2015, HongKong, China, December 16-19, 2015.
S. Tan, B. Li, “Stacked Convolutional Auto-Encoders for Steganalysis of Digital Images”, in Proc. Asia-Pacific Signal and Information Processing Association Annual Summit and Conference 2014, Siem Reap, Cambodia, December 9-12, 2014.
S. Tan, B. Li, “Targeted Steganalysis of Adaptive Pixel-value Differencing Steganography”, in Proc. 2012 IEEE International Conference on Image Processing. Orlando, Florida, USA, Oct. 2012.
S. Tan, “Steganalysis of LSB Matching Revisited for Consecutive Pixels using B-spline Functions”, Lecture Notes in Computer Science. v7128 LNCS, Digital Watermarking - 10th International Workshop, IWDW 2011, 2012, pp 112-126.
專利成果
發明專利, 譚舜泉,關雨呈,李斌,黃繼武,基於對抗網路的二值圖像隱寫方法(ZL 202011553884.5),2023.11,中國
發明專利, 譚舜泉,陳奕鄰,李斌,黃繼武,一種圖像安全取證模型生成方法、取證方法及電子設備(ZL202110043628.X),2023.08,中國
發明專利, 曾吉申,譚舜泉,莫顯博,李斌,黃繼武,一種基於深度學習的視頻取證方法(ZL201910082603.3),2023.07,中國
發明專利, 李振軍,陸芸婷,王昌偉,譚舜泉,基於區塊鏈的訊息加密傳輸方法、裝置、設備及介質(ZL202210315005.8),2023.05,中國
發明專利, 譚舜泉,吳威龍,邵子龍,李斌,黃繼武,一種圖像隱寫分析方法、智慧型終端及存儲介質(ZL201911387659.6),2023.05,中國
發明專利, 譚舜泉,卓龍,李斌,黃繼武, 基於圖像生成網路模型的圖像處理方法、系統及存儲介質(ZL201911400233.X),2023.05,中國
發明專利, 彭榮煊,莫顯博,譚舜泉,李斌,黃繼武,一種秘密圖像無密鑰提取方法及相關設備(ZL202210934604.8),2022.11,中國
發明專利, 譚舜泉,李秋實,陳盛達,李斌,黃繼武,一種視頻重壓縮檢測方法、終端設備及存儲介質(ZL202011619108.0),2022.07,中國
發明專利, 譚舜泉,李振軍,莫顯博,歐培,隱藏模型訓練及使用方法、裝置和計算機可讀存儲介質(ZL201810555366.3),2022.05,中國
發明專利, 譚舜泉,卓龍,李斌,黃繼武,一種圖象處理模型生成方法、智慧型終端及存儲介質(ZL201911424964.8),2022.05
發明專利, 譚舜泉,陳奕鄰,李秋實,李斌,黃繼武,一種基於Tucker分解的圖像隱寫分析方法及終端(ZL202110337203X),2021.07,中國
發明專利, 曾吉申,譚舜泉,李斌,黃繼武,一種基於深度學習模型的隱寫圖像檢測方法及系統(ZL201610923908.9),2020.01,中國
發明專利, 張浩傑,譚舜泉,李斌,黃繼武,一種基於頻域分析的圖像隱寫方法及系統(ZL201610653147X),2019.06,中國
發明專利, 陳盛達,黃繼武,譚舜泉,一種H264視頻內容篡改檢測方法(ZL201410395140.3),2018.04,中國
軟體著作權,譚舜泉,李來源,深圳大學,車牌場景取證最佳化軟體V1.0,2024SR0226973,原始取得,全部權利,2023-11-01
軟體著作權,譚舜泉,胡彥傑, 深圳大學,語義合理的大規模篡改圖像數據集自動生成軟體V1.0, 2022SR0180893, 原始取得, 全部權利, 2021-12-18