姓名:倪江群
职称:教授,博士生导师
联系方式:
深圳市光明区公常路66号中山大学网络空间安全学院工学园2栋908室
Email:issjqni@mail.sysu.edu.cn
简历
倪江群1998年6月在香港大学电机与电子工程学系获博士学位,1998年10月至2000年10月在中山大学和广东省电信科学技术研究院博士后工作站工作。 2000年至今在中山大学网络空间安全学院工作,曾担任电子与通信工程系主任,目前为中山大学特岗教授、博士生导师。倪江群博士的研究方向为多媒体信号处理和通信、多媒体信息安全(包括数字水印、隐写与隐写分析、多媒体数字取证等)、机器学习与模式识别、数字电视关键技术、嵌入式系统和应用。他主持了包括国家自然科学基金重点项目、国家自然科学基金面上项目、广东省自然科学基金重点项目、科技部重点研发计划项目、科技部重大国际合作项目和国家115基金在内的多项国家和省部级重要科技项目,近5年在本领域重要国际期刊和会议发表学术论文50篇+,其中IEEE会刊和CCF A类顶会论文20篇+。他曾参与著名华裔科学家丁肇中教授领导的大型国际科技合作项目“阿尔法磁谱仪(AMS-02)”,并主持其中硅微条轨迹探测器热控系统(TTCS)的电子控制系统,中山大学参与研制的热控制系统是国内大学参加AMS-02项目中唯一在太空运行的装置。倪江群博士目前担任中国图象图形学会常务理事、广东省图像图形学会理事长。
迄今发表论文:超165篇,总被引:10853次,H-index:42
教育和工作经历
1. 香港大学电机与电子工程学系,博士
2. 中山大学广东省电信科学技术研究院,博士后研究员
3.中山大学信息科学与技术学院,电子与通信工程系主任,教授/博士生导师
4. 中山大学计算机学院,教授/博士生导师
5. 中山大学网络空间安全学院,教授/博士生导师
学术兼职
1. 中国图象图形学会常务理事
2. 广东省图象图形学会理事长
3. 中国通信学会多媒体安全专家委员会成员
4. 本领域知名国际会议IEEE WIFS和IWDW技术程序委员会(TPC)成员
主持的重要科研项目
- 阿尔法磁谱仪(AMS)轨迹探测器热控制系统的研制(TTCS)— 电子子系统,2003年国际科技合作重点项目计划,广东省人民政府科技专项和科技部国际科技合作重点项目计划(2003DF000050)
说明:本项目属于丁肇中教授领导的大型国际合作项目“阿尔法磁谱仪计划”的一部分,AMS-TTCS的其他国际参与者包括美国麻省理工学院(MIT)、瑞士日内瓦大学、荷兰航空航天局(NLR)。TTCS系统将随整个AMS-02磁谱仪一起在国际空间站上工作,是磁谱仪热控制系统的一部分。中山大学参与研制的热控制系统(TTCS)是国内大学参加AMS-02项目中唯一在太空运行的装置。
可视媒体内容可信鉴伪与取证分析,国家自然科学联合基金重点项目(U23B2022)
跨介质媒体桥关键技术及应用,国家自然科学联合基金重点项目(U22A2030)
可信、可解释和可进化的智能计算理论和方法研究,广东省基础与应用基础研究重大项目(2023B0303000010,参与项目)
基于深度学习的数字图像溯源分析与取证,国家自然科学联合基金重点项目(U1936212)
适应多种数字媒体的安全隐写及其对抗关键技术研究,国家自然科学联合基金重点项目(U1736215)
基于模型的JPEG图像隐写新方法研究,国家自然科学基金(61772573)
数字图像被动取证中若干关键技术的研究,国家自然科学基金(61379156)
基于通用解码的抗几何攻击水印方法及相关安全性问题研究,国家自然科学基金(60970145)
基于模型的鲁棒和安全水印新方法研究,国家自然科学基金(60773200)
数字图像被动取证关键技术研究,广东省自然科学基金重点项目(S2012020011114)
数字图像盲取证关键技术研究,教育部博士点基金(20120171110037)
基于模型的鲁棒和安全水印关键技术研究,广东省自然科学基金(7003722)
奖励
1. 2015年广东省科技进步二等奖
项目名:基于主动式两相流体回路的航天大型科学实验精密热控系统
2. 2021年广东省科技进步二等奖
项目名:可靠多模态感知与数据融合的云安全关键技术研发及应用
近期发表的主要论著目录
国际重要期刊和CCF A类会议
Towards Generalizable Deepfake Detection via Forgery-aware Audio-Visual Adaptation: A Variational Bayesian Approach, IEEE Trans. on Information Forensics and Security, accepted for publication, Nov., 2025.
Toward Real-world Text Image Forgery Localization: Structured and Interpretable Data Synthesis, NeurIPS 2025, Dec., 2025.(CCF A,机器学习顶会)
JPEG-RAE: Reversible Adversarial Example for Privacy and Copyright Protection of JPEG Images, ACM MM 2025, July, 2025.(CCF A,多媒体顶会)
Forgery-aware and Edge-guided Diffusion Model for General and Robust Image Forgery Localization, IEEE Trans. on Multimedia, accepted for publication, Apr., 2025.
Reinforced Multi-teacher Knowledge Distillation for Efficient General Image Forgery Detection and Localization, Oral, AAAI 2025, Mar., 2025. (CCF A,人工智能顶会)
A Practical Distortion Simulator for Screen-Shooting Resilient Image Watermarking in Consumer Electronic Applications, IEEE Trans. on Consumer Electronics, accepted for publication, Mar., 2025.
DDCM: Cracking Anonymized Facial Images Using Denoising Diffusion Cryptanalytic Model, IEEE Trans. on Consumer Electronics, accepted for publication, Jan.2025.
HiFiMSFA: Robust and High-Fidelity Image Watermarking using Attention Augmented Deep Network, IEEE Signal Processing Letters, Vol.32, pp:781-785, Feb., 2025.
DWW: Robust Deep Wavelet-domain Watermarking with Enhanced Frequency Mask, IEEE Signal Processing Letters, Vol. 31, pp. 3074-3078, 2024.
DIP: Diffusion Learning of Inconsistency Pattern for General DeepFake Detection, IEEE Trans. on Multimedia, in press, June, 2024.
FRADE: Forgery-aware Audio-distilled Multimodal Learning for DeepFake Detection, ACM MM 2024, Oct., 2024.(CCF A,多媒体顶会)
Model-Based Non-Independent Distortion Cost Design for Effective JEPG Steganography, ACM MM 2024, Oct., 2024.(CCF A,多媒体顶会)
Lite Localization Network and DUE-Based Watermarking for Color Image Copyright Protection, IEEE Trans. on Circuits and Systems for Video Technology, Vol.34, No.10, pp.9311-9325, Oct., 2024.
Fake It till You Make It: Curricular Dynamic Forgery Augmentations towards General Deepfake Detection, TheEuropean Conference on Computer Vision (ECCV) 2024. (计算机视觉顶会)
Efficient Audio Steganography using Generalized Audio Intrinsic Energy with Micro-Amplitude Modification Suppression, IEEE Trans. on Information Forensics and Security, in press, June, 2024.
Domain-invariant and Patch-discriminative Feature Learning for General Deepfake Detection, ACM Transactions on Multimedia Computing, Communications and Applications, in press, April, 2024.
DiffForensics: Leveraging Diffusion Prior to Image Forgery Detection and Localization, TheIEEE / CVF Computer Vision and Pattern Recognition Conference 2024, June, 2024. (CCF A,计算机视觉顶会)
StegaStyleGAN: Towards Generic and Practical Generative Image Steganography, AAAI 2024, Feb., 2024. (CCF A,人工智能顶会)
Backdoor Two-Stream Video Models on Federated Learning, ACM Trans. on Multimedia Computing, Communications and Applications, in press, Dec., 2023.
Robust Image Steganography against General Scaling Attacks, ACM MM 2023, July, 2023. (CCF A,多媒体顶会)
A Novel Deep Video Watermarking Framework with Enhanced Robustness to H.264/AVC Compression, ACM MM 2023, July, 2023. (CCF A,多媒体顶会)
Towards JPEG-Resistant Image Forgery Detection and Localization Via Self-Supervised Domain Adaptation, IEEE Trans. on Pattern Analysis and Machine Intelligence, in press, Sep., 2022.
A Novel Encryption-Then-Lossy-Compression Scheme of Color Images Using Customized Residual Dense Spatial Network, IEEE Trans. on Multimedia, Vol.25, pp:4026-4040, Apr., 2022.
Efficient JPEG Batch Steganography Using Intrinsic Energy of Image Contents, IEEE Trans. on Information Forensics and Security, Vol.16, pp: 4544-4558, Aug., 2021.
Self-supervised Domain Adaption for Forgery Localization of JPEG Compressed Images, IEEE ICCV 2021, Oral,Oct., 2021. (CCF A,计算机视觉顶会)
New Design Paradigm of Distortion Cost Function for Efficient JPEG Steganography, Signal Processing, 190(2021), Sep., 2021.
Dual-Domain Generative Adversarial Network for Digital Image Operation Anti-Forensics, IEEE Trans. on Circuits and Systems forVideo Technology, Vol.32, No.3, pp:1701-1706, Mar., 2022.
Multi-semantic CRF-based Attention Model for Image Forgery Detection and Localization, Signal Processing, 183(2021), Feb., 2021.
Image Steganography with Symmetric Embedding using Gaussian Markov Random Field Model, IEEE Trans. on Circuits and Systems for Video Technology, Vol. 31, No.3, pp:1001-1015, 2021.
Multiple Histograms Based Reversible Data Hiding: Framework and Realization, IEEE Trans. on Circuit and System for Video Technology, Vol.30, No.8, pp:2313-2328, Aug., 2020.
A New Distortion Function Design for JPEG Steganography Using Generalized Uniform Embedding Strategy, IEEE Trans. on Circuit and System for Video Technology, Vol.18, No.12, Dec. 2018.
Efficient JPEG Steganography Using Domain Transformation of Embedding Entropy, IEEE Signal Processing Letters, Vol.25, No.6, pp: 773-777, 2018.
Efficient Compression of Encrypted Binary Images using the Markov Random Field, IEEE Trans. on Information Forensics and Security, Vol.13, No.5, pp: 1271-1285, May, 2018.
Deep Learning Hierarchical Representations for Image Steganalysis, IEEE Trans. on Information Forensics and Security, Vol. 12, No. 11, pp: 2545-2557, Nov., 2017.
High-Fidelity Reversible Data Hiding Using Directionally-Enclosed Prediction, IEEE Signal Processing Letters, Vol. 24, No.5, pp:574-578, May, 2017.
Blind Forensics of Successive Geometric Transformations in Digital Images Using Spectral Method: Theory and Applications, IEEE Trans. on Image Processing, Vol. 26, No. 6, pp: 2811-2824, June, 2017.
Rate and Distortion Optimization for Reversible Data Hiding Using Multiple Histogram Shifting, IEEE Trans. on Cybernetics, Vol.47, Issue 2, pp:315-326, Feb., 2017.
Using Statistical Image Model for JPEG Steganography: Uniform Embedding Revisited, IEEE Trans. on Information Forensics and Security, Vol.10, No. 12, pp: 2669-2680, Dec., 2015.
AMS Collaboration, Electron and Positron Fluxes in Promary Cosmic Rays Measured with the Alpha Magnetic Spectrometer on the International Space Station, Phys Rev Letts, 2014(113): 121102.
AMS Collaboration, High Statistics Measurement of the Positron Fraction in the Primary Cosmix rays of 0.5-500 GeV with the Alpha Magnetic Spectrometer on the International Space Station, Phys Rev Letts, 2014(113): 121101.
Effective Estimation of Image Rotation Angle Using Spectral Method, IEEE Signal Processing Letters, Vol.21, No.7, pp: 890-894, July, 2014.
Uniform Embedding for Efficient JPEG Steganography, IEEE Trans. on Information Forensics and Security, Vol.9, No.5, pp: 814-825, May, 2014.
An Informed Watermarking Scheme Using Hidden Markov Model in the Wavelet Domain, IEEE Trans. on Information Forensics and Security, Vol.7, No.3, pp.853-867, June, 2012.
On the Hardware/Software Design and Implementation of a High Definition Multiview Video Surveillance Systems, IEEE Journal on Emerging and Selected Topics in Circuits and Systems, Vol.3, No.2, pp: 248-262, 2013.
Blind Detection of Median Filtering in Digital Images: A Difference Domain Based Approach, IEEE Trans. on Image Processing, Vol.22, No.12, pp: 4699-4710, Dec., 2013.
Robust Digital Image Stabilization Using Kalman Filter, IEEE Trans. on Consumer Electronics, vol.55, no.1, Feb., 2009, pp:6-14.
Reversible Data Hiding with Contrast Enhancement Using Adaptive Histogram Shifting and Pixel Value Ordering, Signal Processing: Image Communication, 46 (2016) 1-16.
An Encryption-Then-Compression Algorithm Using Rate-Distortion Optimization, Signal Processing: Image Communication, Vol.39, pp:141-150, 2015.
Median Filtering Detection by Linear and Nonlinear Descriptor, Multimedia Tools and Applications, Vol.75, No.4, pp: 2327-2346, Feb., 2016.
An Efficient Reversible Data Hiding Scheme Using Prediction and Optimal Side Information Selection, Journal of Visual Communication and Image Representation, Vol.25, No.6, pp: 1425-1431, Aug., 2014.
Counteracting Geometrical Attacks on Robust Image Watermarking by Constructing a Deformable Pyramid Transform, EURASIP Journal on Advances in Signal Processing, 2013: 119.
Region Duplication Detection Based on Harris Corner Points and Step Sector Statistics, Journal of Visual Communication and Image Representation, Vol.24, No.3, pp.244-254, 2013.
Improved Histogram Shifting Technique for Low Payload Embedding by Using a Rate-distortion Model and Optimal Side Information Selection, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E95-D, No.10, pp.2552-2555, Oct., 2012.
Region Duplication Detection Based on Harris Corner Points and Step Sector Statistics, Journal of Visual Communication and Image Representation, Vol.24, No.3, pp.244-254, 2013.
Content-adaptive Robust Image Watermarking with Posterior HMM-based Detector, IEICE Trans. on Fundamentals of Electronics, Communications and Computer Sciences, vol.E91-A, no.08, pp: 1953-1960, Aug., 2008.
Model-Based Multirate Kalman Filtering Approach for Optimal Two-Dimensional Signal Reconstruction from Noisy Subband Systems, Optical Engineering, The Journal of SPIE, Aug., 1998.
国内一级学报
多特征融合的低景深图像前景提取算法, ACTA AUTOMATICA SINACA, Vol.39, No.6, June, 2013.
一种分层判决结构的H.264/AVC快速帧间模式选择方法,电子学报,第41卷,第11期,pp:2199-2206,2013.
一种基于直方图平移的高性能可逆水印算法, ACTA AUTOMATICA SINACA, Vol.38, No.1, 2012.
基于可变形多尺度变换的几何不变鲁棒图像水印算法, ACTA AUTOMATICA SINACA, Vol.37, No.11, 2011.
基于GSM模型的扩频水印安全性分析, ACTA AUTOMATICA SINACA, Vol.35, No.7, July, 2009, pp:841-850.
一种改进的多用途KAEDF半色调图像水印算法, 通信学报, 第29卷, 第10期, pp: 30-36, 2008年10月.
基于内容自适应的优化DWT-HMM稳健图像水印算法, 通信学报, 第28卷, 第2期, 2007年2月.
An Adaptive Image Watermarking Algorithm Based on HMM in Wavelet Domain, ACTA AUTOMATICA SINACA, vol.31, no.5, pp: 705-712, Sep., 2005.
基于小波域HMM模型的稳健多比特图像水印算法, 软件学报, 第16卷, 第7期, pp:1323-1331, 2005年7月.
依托单位
中山大学网络空间安全学院
广东省信息安全技术重点实验室


