|
|
|
欢迎来到姚恒的主页!
| 工作经历 |
2024至今 上海理工大学 教授 |
| |
2018 - 2024 上海理工大学 副教授 |
| |
2012 - 2018 上海理工大学 讲师 |
| 教育经历 |
2008 - 2012: |
上海大学 信号与信息处理 博士研究生 |
| |
2005 - 2008: |
上海师范大学 通信与信息系统 硕士研究生 |
| |
2000 - 2004: |
合肥工业大学 通信工程 本科 |
| 研究兴趣 |
(1) 数字图像取证 (深度伪造检测、图像篡改定位) |
| |
(2) 信息隐藏 (鲁棒可逆水印、可逆信息隐藏) |
| |
(3) 感知图像哈希 |
| 期刊编委 |
(1) EURASIP Journal on Image and Video Processing |
| |
(2) Frontiers in Imaging |
截至2025年3月已在国际知名期刊发表SCI检索论文70余篇,其中第一或通信作者SCI检索论文40篇。
课题组每年计划招收1名博士研究生(仪器科学与技术专业)和4-5名硕士研究生(信息与通信工程、计算机科学与技术专业),欢迎编程能力强、具有良好英文阅读和写作能力、数学功底扎实、具有刻苦钻研精神的毕业生报考研究生。
同时也欢迎对多媒体信息安全和图像处理课题感兴趣的本科生加入课题组。 |
主持科研项目: |
| 1. 面向社交网络场景的单幅舆情图像篡改定位问题研究,国家自然科学基金面上项目(基金号:62172281) 2022-2025 主持 |
| 2. 基于高阶统计分析和局部同质性约束的图像噪声不一致性取证研究, 国家自然科学基金青年项目(基金号:61702332)2018-2020 主持 |
| 3. 伪造媒体的主被动取证和溯源研究,2025年度智能警务四川省重点实验室开放课题(基金号:ZNJW2025KFMS007), 2025-2027 主持 |
| 4. 人工智能生成图像鉴别和版权保护问题研究,2024年度“人机结合”数字出版智能编校联合实验室招标课题(基金号:SAYB2402) 2024-2025 主持 |
| 5. 非合作博弈模型下的鲁棒可逆信息隐藏问题研究, 深圳市媒体信息内容安全重点实验室开放课题(基金号:ML-2022-03)2022-2023 主持 |
| 6. 基于成像机理分析的数字多媒体真实性取证研究,广西多源信息挖掘与安全重点实验室开放基金(基金号:MIMS16-03)2017-2018 主持 |
| 7.基于相机成像机理分析的照片真实性鉴定技术研究,上海理工大学光电学院教师创新能力建设项目 2014-2015 主持 |
| 8. 数字图像真实性鉴定技术研究,上海高校青年教师培养资助计划 2014-2015 主持 |
NEWS !!!
我们的论文"Dual-Color Space Hierarchical Classification Network for Image Sharing Chain Detection" 已经被IEEE Transactions on Instrumentation & Measurement正式录用
|
| 发表论文: |
| A 国际期刊论文 |
A.1 第一作者论文 |
| [A1-18] |
H. Yao*, Z. Li, C. Qin,Transmission removal from a single osn-shared glass mixture image, Applied Sciences, vol. 13, no. 23, art. no. 12779, 2023. |
| [A1-17] |
H. Yao*, T. Liu, G. Li, C. Qin, Screen-shot and demoiréd image identification based on DenseNet and deepViT, Expert Systems with Applications, vol. 240, art. no. 122580, 2024. [CCF C] |
| [A1-16] |
H. Yao, B. Ma, M. Zou, D. Xu*, J. Yao*, No-reference noisy image quality assessment incorporating features of entropy, gradient, and kurtosis, Frontiers of Information Technology & Electronic Engineering, vol. 22, no. 12, pp. 1565-1582, 2021. [CCF C] |
| [A1-15] |
H. Yao, F. Mao, C. Qin*, Z. Tang, Dual-JPEG-image reversible data hiding, Information Sciences, vol. 563, pp. 130-149, 2021. [CCF B] |
| [A1-14] |
H. Yao, M. Zou, C. Qin*, X. Zhang, Signal-dependent noise estimation for a real-camera model via weight and shape constraints, IEEE Transactions on Multimedia, vol. 24, pp. 640-654, 2022. [CCF B] |
| [A1-13] |
H. Yao, H. Wei, T. Qiao, C. Qin*, JPEG quantization step estimation with coefficient histogram and spectrum analyses, Journal of Visual Communication and Image Representation, vol. 69, art. no. 102795, 2020. [CCF C] |
| [A1-12] |
H. Yao, F. Mao, T. Tang*, C. Qin, High-fidelity dual-image reversible data hiding via prediction-error shift, Signal Processing, vol. 170, art. no. 107447, 2020. [CCF C] |
| [A1-11] |
H. Yao, H. Wei, C. Qin*, X. Zhang, An improved first quantization matrix estimation for nonaligned double compressed JPEG images, Signal Processing 170 (2020) 107430. [CCF C] |
| [A1-10] |
H. Yao, H. Wei, C. Qin*, Z. Tang, A real-time reversible image authentication method using uniform embedding strategy, Journal of Real-Time Image Processing 17(1) (2020) 41-54. |
| [A1-09] |
H. Yao, X. Liu, Z. Tang, C. Qin*, Y. Tian, Adaptive image camouflage using human visual system model, Multimedia Tools and Applications 78(7) (2019) 8311-8334. [CCF C] |
| [A1-08] |
H. Yao, X. Liu, Z. Tang, Y.C. Hu, C. Qin*, An improved image camouflage technique using color difference channel transformation and optimal prediction-error expansion, IEEE Access 6 (2018) 40569-40584. |
| [A1-07] |
H. Yao, C. Qin, Z. Tang*, X. Zhang, A general framework for shiftable position-based dual-image reversible data hiding, EURASIP Journal on Image and Video Processing (2018) 41. [ pdf] [ Matlab codecs] |
| [A1-06] |
H. Yao*, F. Cao, Z. Tang, J. Wang, T. Qiao, Expose noise level inconsistency incorporating the inhomogeneity scoring strategy, Multimedia Tools and Applications 77(14) (2018) 18139-18161. [CCF C] |
| [A1-05] |
H. Yao*, S. Wang, X. Zhang, C. Qin, J. Wang, Detecting Image Splicing Based on Noise Level Inconsistency, Multimedia Tools and Applications 76 (10) (2017) 12457-12479. [CCF C][pdf] [Matlab codecs] |
| [A1-04] |
H. Yao, S. Song, C. Qin, Z. Tang*, X. Liu, Detection of double-compressed H.264/AVC video incorporating the features of the string of data bits and skip macroblocks, Symmetry 9(12) (2017) 313. (SCI - indexed, 2016 Impact Factor: 1.457) [pdf] |
| [A1-03] |
H. Yao*, C. Qin, Z. Tang, Y. Tian, Guided filtering based color image reversible data hiding, Journal of Visual Communication and Image Representation 43 (2017) 152-163. [CCF C][pdf] [Matlab codecs] |
| [A1-02] |
H. Yao*, C. Qin, Z. Tang, Y. Tian, Improved dual-image reversible data hiding method using the selection strategy of shiftable pixels' coordinates with minimum distortion, Signal Processing 135 (2017) 26-35. [CCF C] [ pdf] [ Matlab codecs] |
| [A1-01] |
H. Yao, S. Wang*, Y. Zhao, X. Zhang, Detecting Image Forgery Using Perspective Constraints, IEEE Signal Processing Letters 19 (3) (2012) 123-126. [CCF C] [pdf] |
| A.2 通讯作者论文 |
| [A2-22] |
H. Wang, H. Yao*, C. Qin, X. Zhang, When robust reversible watermarking meets cropping attacks, IEEE Transactions on Circuits and Systems for Video Technology,vol. 34, no. 12, pp. 13282-13296, 2024. |
| [A2-21] |
X. Shen, H. Yao*, S. Tan, C. Qin, Hiding face into background: a proactive countermeasure against malicious face swapping, IEEE Transactions on Industrial Informatic, vol. 20, no. 8, pp. 10613-10623, 2024. |
| [A2-20] |
Z. Bian, H. Yao*, Y. Le, C. Qin, Two-dimensional histogram-based reversible contrast enhancement using bi-histogram equalization, Displays, vol. 81, art. no. 102580, 2024. |
| [A2-19] |
Z. Bian, H. Yao*, Y. Le, C. Qin, Quality guided reversible data hiding with contrast enhancement, Journal of King Saud University - Computer and Information Sciences, vol. 35, no. 10, art. no. 101808, 2023. |
| [A2-18] |
T. Liu, H. Yao*, X. Li, C. Qin, Robust perceptual image hashing for screen-shooting attack, IEEE Transactions on Consumer Electronics, vol. 70, no. 1, pp. 4367-4378, 2024. |
| [A2-17] |
W. Tang, H. Yao*, Y. Le, C. Qin, Reversible data hiding for JPEG images based on block difference model and Laplacian distribution estimation, Signal Processing, vol. 212, art. no. 109130, 2023. [CCF C] |
| [A2-16] |
X. Shen, H. Yao*, S. Tan, C. Qin, VHNet: a video hiding network with robustness to video coding, Journal of Information Security and Applications, vol. 75, art. no. 103515, 2023. [CCF C] |
| [A2-15] |
G. Li, H. Yao*, Y. Le, C. Qin, Recaptured screen image identification based on vision transformer, Journal of Visual Communication and Image Representation, vol. 90, art. no. 103692, 2023. [CCF C] |
| [A2-14] |
M. Yu, H. Yao*, C. Qin, X. Zhang, Reversible data hiding in palette images, IEEE Transactions on Circuits and Systems for Video Technology, vol. 33, no. 2, pp. 648-660, 2023. [CCF B] |
| [A2-13] |
Z. Li, H. Yao*, R. Shi, T. Qiao, C. Qin, Transmission removal from a single glass scene and its application in photographer identification, Applied Sciences, vol. 12, no. 23, art. no. 12484, 2022. |
| [A2-12] |
M. Yu, H. Yao*, C. Qin, X. Zhang, A comprehensive analysis method for reversible data hiding in stream-cipher-encrypted images, IEEE Transactions on Circuits and Systems for Video Technology, vol. 32, no. 10, pp. 7241-7254, 2022. [CCF B] |
| [A2-11] |
M. Yu, H. Yao*, C. Qin, Reversible data hiding in encrypted images without additional information transmission, Signal Processing: Image Communications, vol. 105, art. no. 116696, 2022. [CCF C] |
| [A2-10] |
W. Zhan, H. Yao*, Reversible data hiding for JPEG images with a cascaded structure, IET Image Processing, vol. 16, no. 5, pp. 1486-1499, 2022. [CCF C] |
| [A2-09] |
C. Qin, C. Jiang, Q. Mo, H. Yao*, C.C. Chang, Reversible data hiding in encrypted image via secret sharing based on GF(p) and GF(28), IEEE Transactions on Circuits and Systems for Video Technology, vol. 32, no. 4, pp. 1928-1941, 2022. [CCF B] |
| [A2-08] |
Y. Le, H. Zhang, W. Shi, H. Yao*, RSS-based indoor positioning algorithm using advanced clustering and kernel ridge regression, Frontiers of Information Technology & Electronic Engineering, vol. 22, no. 6, pp. 827–838, 2021. |
| [A2-07] |
Z. Zhang, H. Yao*, Z. Xiang, F. Cao, Self-embedding watermarking algorithm under high tampering rates, IETE Technical Review 38(1) (2021) 17-25. |
| [A2-06] |
E. Liu, H. Yao*, Y. Hu, F. Cao, Perceptual color image hashing based on quaternionic local ranking binary pattern, IETE Technical Review 38(1) (2021) 158-171. |
| [A2-05] |
M. Yu, Y. Liu, H. Sun, H. Yao*, T. Qiao, Adaptive and separable multiary reversible data hiding in encryption domain, EURASIP Journal on Image and Video Processing (2020) 16. |
| [A2-04] |
B. Ma, J. Yao, Y. Le, C. Qin, H. Yao*, Efficient image noise estimation based on skewness invariance and adaptive noise injection, IET Image processing 14(7) (2020) 1393–1401. [CCF C] |
| [A2-03] |
C. Qin, Y. Hu, H. Yao*, X. Duan, L. Gao, Perceptual image hashing based on Weber local binary pattern and color angle representation, IEEE Access 7 (2019) 45460-45471. |
| [A2-02] |
Q. Zhou, H. Yao*, F. Cao, Y.C. Hu, Efficient image compression based on side match vector quantization and digital inpainting, Journal of Real-Time Image Processing 16 (3) (2019) 799-810.
|
| [A2-01] |
M. Yuan, H. Yao*, C. Qin, Y. Tian, A dynamic hand gesture recognition system incorporating orientation-based linear extrapolation predictor and velocity-assisted longest common subsequence algorithm, KSII Transactions on Internet and Information Systems11 (9) (2017) 4491-4509. [pdf]
|
| A.3 其他参与论文 |
| [A3-30] |
M. Chen, D. Guo, H. Yao, C. Qin*, FAADW: Feature attention mechanism based attack for deep robust watermarking, IEEE MultiMedia, pp. 1-9. DOI: 10.1109/MMUL.2024.3498856 |
| [A3-29] |
Z. Dai, C. Gu*, H. Yao, J. Yi, F. Xu, DiffKPD: A Robust Key Point Detection Algorithm with a Diffusion Process for Automatic Pin Welding, IEEE Sensors Journal, vol. 25, no. 6, pp. 10444-10453, 2025. |
| [A3-28] |
L. Huang, F. Li, H. Yao, C. Qin*, X. Zhang, Soft integrity authentication for neural network models, Expert Systems with Applications, vol. 267, art. no. 126172, 2025. |
| [A3-27] |
F. Cao, S. Yao, Y. Zhou, H. Yao, C. Qin*, Perceptual authentication hashing for digital images based on multi-domain feature fusion, Signal Processing, vol. 223, art. no. 109576, 2024. |
| [A3-26] |
D. Guo, X. Zhu, F. Li, H. Yao, C. Qin*, DoBMark: A double-branch network for screen-shooting resilient image watermarking, Expert Systems with Applications, vol. 246, art. no. 123159, 2024. |
| [A3-25] |
Y. Le*, J. Ou, Y. Chen, H. Yao, Online joint localization without user interactions, Scientific Reports, vol. 13, art. no. 22351, 2023. |
| [A3-24] |
F. Cao, T. Wang, D. Guo, H. Yao, J. Li*, C. Qin, Universal screen-shooting robust image watermarking with channel-attention in DCT domain, Expert Systems with Applications, vol. 238, Part F, art. no. 122062, 2024. [CCF C] |
| [A3-23] |
G. Zhao, F. Li, H. Yao, Chuan Qin*, TASTNet: An end-to-end deep fingerprinting net with two-dimensional attention mechanism and spatio-temporal weighted fusion for video content authentication, Journal of Visual Communication and Image Representation, vol. 96, art. no. 103913, 2023.[CCF C] |
| [A3-22] |
G. Zhao, C. Qin*, H. Yao, Y. Han, DNN self-embedding watermarking: Towards tampering detection and parameter recovery for deep neural network,Pattern Recognition Letters, vol. 164, pp. 16-22, 2022. [CCF C] |
| [A3-21] |
L. Huang, Z. Xiang, J. Li*, H. Yao, C. Qin, New framework of self-embedding fragile watermarking based on reference sharing mechanism, Security and Communication Networks, vol. 2022, art. no. 2699802, 2022. [CCF C] |
| [A3-20] |
F. Cao, Y. Fu, H. Yao, M. Zou, J. Li*, C. Qin, Separable reversible data hiding in encrypted VQ-encoded images, Security and Communication Networks, vol. 2022, art. no. 1227926, 2022. [CCF C] |
| [A3-19] |
C. Xiong, E. Liu, X. Li, H. Yao, L. Zhang, C. Qin*, Perceptual image hashing based on multitask neural network, Security and Communication Networks, vol. 2021, art. no. 8297244, 2021. [CCF C] |
| [A3-18] |
X. Li, C. Qin, H. Yao, J. Li*, Perceptual hashing for color images, Journal of Electronic Imaging, vol. 30, no. 6, art. no. 063023, 2021. |
| [A3-17] |
Y. Le*, S. Jin, H. Zhang, W. Shi, H. Yao, Fingerprinting Indoor Positioning Method Based on Kernel Ridge Regression with Feature Reduction, Wireless Communications and Mobile Computing (2021) 6631585. [CCF C] |
| [A3-16] |
Z. Tang*, H. Zhang, S. Lu, H. Yao, X. Zhang, Robust image hashing with compressed sensing and ordinal measures, EURASIP Journal on Image and Video Processing (2020) 21. |
| [A3-15] |
Z. Tang*, H. Nie, C. Pun, H. Yao, C. Yu, X. Zhang, Color image reversible data hiding with double-layer embedding, IEEE Access 8 (2020) 6915-6926. |
| [A3-14] |
Z. Tang, M. Yu, H. Yao, H. Zhang, C. Yu, X. Zhang, Robust image hashing with singular values of quaternion SVD, The Computer Journal, vol. 64, no. 11, pp. 1656-1671, 2021. [CCF B] |
| [A3-13] |
Z. Tang*, L. Chen, H. Yao, X. Zhang, C. Yu, Video hashing with DCT and NMF, The Computer Journal 63(7) (2020) 1017-1030. [CCF B] |
| [A3-12] |
Y. Tian*, H. Yao, Z. Li, Plant-wide process monitoring by using weighted copula–correlation based multiblock principal component analysis approach and online-horizon Bayesian method, ISA Transactions 96 (2020) 24-36.
|
| [A3-11] |
Y. Tian*, T. Hu, X. Peng, W. Du, H. Yao, Decentralized monitoring for large-scale process using copula-correlation analysis and Bayesian inference-based multiblock principal component analysis, Journal of Chemometrics 33(8) (2019) e3158. |
| [A3-10] |
Y. Fu, P. Kong, H. Yao, Z. Tang, C. Qin*, Effective reversible data hiding in encrypted image with adaptive encoding strategy, Information Sciences 494 (2019) 21-36. [CCF B] |
| [A3-09] |
Q. Mo, H. Yao, F. Cao, Z. Chang, C. Qin*, Reversible data hiding in encrypted image based on block classification permutation, Computers, Materials & Continua 59 (1) (2019) 119-133. |
| [A3-08] |
Z. Tang*, Z. Huang, H. Yao, X. Zhang, L. Chen, C. Yu, Perceptual image hashing with weighted DWT features for reduced-reference image quality assessment, The Computer Journal 61(11) (2018) 1695–1709. [CCF B]
|
| [A3-07] |
W. Zhang, P. Kong, H. Yao, Y.C. Hu, F. Cao*, Real-time reversible data hiding in encrypted images based on hybrid embedding mechanism, Journal of Real-Time Image Processing 16 (3) (2019) 697-708. |
| [A3-06] |
Z. Xiang, Y. Hu, H. Yao, C. Qin*, Adaptive and dynamic multi-grouping scheme for absolute moment block truncation coding, Multimedia Tools and Applications 78(7) (2019) 7895-7909. [CCF C]
|
| [A3-05] |
C. Qin*, Z. He, H. Yao, F. Cao, L. Gao, Visible watermark removal scheme based on reversible data hiding and image inpainting, Signal Processing: Image Communication 60 (2018) 160-172. [CCF C]
|
| [A3-04] |
F. Cao*, B. An*, H. Yao, Z. Tang, Local complexity based adaptive embedding mechanism for reversible data hiding in digital images, Multimedia Tools and Applications 78(7) (2019) 7911-7926. [CCF C]
|
| [A3-03] |
Z. Tang*, S. Xu, H. Yao, C. Qin, X. Zhang, Reversible data hiding with differential compression in encrypted image, Multimedia Tools and Applications 78(8) (2019) 9691-9715. [CCF C] |
| [A3-02] |
Z. Tang*, M. Ling, H. Yao, Z. Qian, X. Zhang, J. Zhang, S. Xu, Robust image hashing via random Gabor filtering and DWT, Computers, Materials and Continua 55 (2) (2018) 331-344. |
| [A3-01] |
Y. Zhao, S. Wang*, X. Zhang, H. Yao, Robust Hashing for Image Authentication Using Zernike Moments and Local Features, IEEE Transactions on Information Forensics and Security 8 (1) (2013) 55-63.[CCF A] [pdf] |
| |
|
|
| B 国际会议论文 |
| [B-08] |
C. Qin, S. Gao, C. Jiang, H. Yao, C.C. Chang*, Reversible Data Hiding in Encrypted Images Based on Chinese Remainder Theorem and Secret Sharing Mechanism, Proceedings of 2021 3rd International Conference on Big-data Service and Intelligent Computation, pp. 23-32, 2021. |
| [B-07] |
Y. Fu, D. Peng, H. Yao, C. Qin*, A novel reversible data hiding scheme for encrypted VQ-compressed image, In: Sun X., Pan Z., Bertino E. (eds) Artificial Intelligence and Security. ICAIS 2019. Lecture Notes in Computer Science, vol 11634, pp. 150-160, 2019. |
| [B-06] |
W. Zhang, Q. Zhou, Z. Tang, H. Yao, C. Qin*, A reversible data hiding scheme in encrypted image with LSB compression and MSB replacement. In: Yang CN., Peng SL., Jain L. (eds) Security with Intelligent Computing and Big-data Services. SICBS 2018. Advances in Intelligent Systems and Computing, vol 895, pp. 868-878, 2018. |
| [B-05] |
H. Wei, H. Yao*, C. Qin, Z. Tang, Automatic Forgery Localization via Artifacts Analysis of JPEG and Resampling. In: Yang CN., Peng SL., Jain L. (eds) Security with Intelligent Computing and Big-data Services. SICBS 2018. Advances in Intelligent Systems and Computing, vol 895. Springer. |
[B-04] |
S. Song, H. Yao*, C. Qin and Y. Tian, A Forgery Video Detection Algorithm for Resolution Promotion Manipulations Using Frequency Spectrum Analysis, the Fifth International Conference on Network, Communication and Computing (ICNCC 2016), Kyoto, Japan 2016.12.17-2016.12.21. [ pdf]
|
[B-03] |
H. Yao*, A Novel Image Noise Level Function Estimation Approach using Camera Response Function Constraint, MATEC Web of Conferences 42:06004. [ pdf]
|
[B-02] |
H. Yao*, T. Qiao, Z. Tang, et al. Detecting Copy-Move Forgery using Non-Negative Matrix Factorization, Proceedings of the 3rd International Conference on Multimedia Information Networking and Security (MINES 2011), November 2011, pp. 591-594, Shanghai, China.
|
[B-01] |
H. Yao*, S. Wang and X. Zhang, Detect Piecewise Linear Contrast Enhancement and Estimate Parameters using Spectral Analysis of Image Histogram, Proceedings of 2009 IET International Communication Conference on Wireless Mobile & Computing, December 2009, pp. 94-97, Shanghai, China.
|
| |
|
| C 中文期刊论文 |
| [C-15] |
乔通, 陈彧星, 谢世闯, 姚恒, 罗向阳*,多色彩通道特征融合的GAN合成图像检测方法,电子学报, vol. 52, no. 3, pp. 924-936, 2024. |
| [C-14] |
王闻娟,姚恒*, 基于直方图间隙特征的伽马校正参数估计, 应用科学学报, vol. 42, no. 2, pp. 290-301, 2024. |
| [C-13] |
秦川*, 董腾林, 姚恒, 基于风格迁移纹理合成与识别的构造式信息隐藏,软件学报, vol. 34, no. 12, pp. 5773-5786,2023. |
| [C-12] |
宋忠豪,姚恒*, 基于三阶差分预滤波和循环谱分析的JPEG图像旋转角度估计, 应用科学学报, vol. 40, no. 5, pp. 820-827, 2022. |
| [C-11] |
董腾林,李欣然,姚恒,秦川*,基于图像分类的鲁棒无载体信息隐藏, 应用科学学报, vol. 39, no. 6, pp. 893-905, 2021. |
| [C-10] |
秦川*,王萌,司广文,姚恒,基于绝句生成的构造式信息隐藏算法, 计算机学报, vo. 44, no. 4, pp. 773-785, 2021. |
| [C-09] |
司广文, 秦川*,姚恒, 韩彦芳, 张志超,基于纹理特征分类与合成的鲁棒无载体信息隐藏, 应用科学学报, vol. 38, no. 3, pp. 441-454, 2020. |
| [C-08] |
孙佳忆,曹芳*,唐振军,姚恒,秦川,基于图像拼接的可信图像修补方法,上海理工大学学报,40(2), 2018, pp.150-157. |
| [C-07] |
刘小凯,姚恒*,秦川,基于图像块分类阈值优化的改进可逆图像伪装,应用科学学报, 36(2), 2018, pp. 237-246. |
| [C-06] |
姚恒,袁敏,秦川,田颖,改进线性外推法预估器的手势跟踪,应用科学学报,35(1), 2017, pp. 81-89. |
| [C-05] |
袁敏,姚恒,刘牮,结合三帧差分和肤色椭圆模型的动态手势分割,光电工程,43(6), 2017, pp. 51-56. |
| [C-04] |
姚恒,直扩超宽带信号在移动通信系统中的干扰功率分析,电讯技术,52(10),2012, pp.1696-1701. |
| [C-03] |
姚恒, 陈颖, 赵琰, 陈岳军, 乔通,稳健性图像复制-粘贴篡改被动认证,电视技术,36(9), 2012, pp. 14-18. |
| [C-02] |
姚恒,魏为民,唐振军,重采样图像的盲检测技术,计算机工程与应用, 46(30), 2010, pp. 166-168. |
| [C-01] |
王沛,姚恒,李莉,结合图像空间域和小波域特性的自适应盲水印算法, 光学精密工程, 14(6), 2006, pp.1057-1062 |
| |
|
| |
注: *:通讯作者 |
教授课程: |
|
| 本科生课程: |
1. 模拟电子技术(课程代码12002060)2013 - 2018 |
| |
2. 模拟电路(英)(课程代码12002620)2015 - 2018 |
| |
3. 多媒体通信A (课程代码12003350) 2019 - |
| |
4. 模拟电子技术(课程代码12002500)2019 - 2021 |
| |
5 多媒体技术A(课程代码12003560)2021, 2023 |
| |
6 机器学习与大数据(课程代码12004510)2025 - |
| 研究生课程: |
1. 单片机应用系统设计与仿真 (课程代码12010001) 2017 - 2018 |
| |
2. 模式分类与人工智能 (课程代码 12010065) 2019 |
| |
3. 数字图像处理 (课程代码 12000233) 2021 - |
| 课题组成员: |
| 姓名 |
职称/入学年份 |
研究方向 |
| 姚恒 |
教授 |
数字图像取证、信息隐藏、AI安全 |
| 陈典泽 |
21级硕士研究生 |
图像重采样操作检测和估计 |
| 卫佳衡 |
22级硕士研究生 |
社交网络传播链鉴别 |
| 王浩东 |
22级硕士研究生 |
鲁棒可逆水印 |
| 董海卿 |
22级硕士研究生 |
加密域可逆信息隐藏 |
| 朱嘉磊 |
23级硕士研究生 |
AIGC图像检测 |
| 刘志坚 |
23级硕士研究生 |
图像篡改定位检测 |
| 司徒晓彤 |
23级硕士研究生 |
多模态感知哈希 |
| 高岩 |
24级硕士研究生 |
AIGC虚假人脸检测 |
| 李佳锐 |
24级硕士研究生 |
唇形替换视频被动检测 |
| 贺越洋 |
24级硕士研究生 |
DeepFake主动防御 |
| 张可欣 |
22级本科生 |
对比度增强可逆信息隐藏、音乐信号分离 |
| 杨鑫 |
22级本科生 |
可逆对抗样本 |
| |
|
|
| 已毕业成员: |
| 姓名 |
入学年份 |
毕业去向 |
取得成果 |
| 魏宏斌 |
17级硕士研究生 |
江苏省昆山市住建局公务员 |
SCI 二区1篇、三区1篇、研究生数学建模二等奖 |
| 邹勔 |
18级硕士研究生 |
香港城市大学深造 |
SCI 一区1篇、研究生数学建模一等奖 |
| 毛凡禹 |
18级硕士研究生 |
ARM中国 |
研究生国家奖学金、SCI 一区1篇、二区1篇、研究生数学建模一等奖 |
| 马奔 |
18级硕士研究生 |
国家电网山东省电力公司 |
研究生国家奖学金、SCI 三区2篇、研究生数学建模一等奖 |
| 湛悟月 |
19级硕士研究生 |
英特尔 |
SCI四区1篇、研究生数学建模二等奖 |
| 宋忠豪 |
19级硕士研究生 |
上汽通用 |
研究生数学建模二等奖 |
| 俞明吉 |
20级硕士研究生 |
SAP思爱普 |
研究生国家奖学金、SCI一区2篇、二区1篇 |
| 李桂豪 |
20级硕士研究生 |
Credo中国 |
SCI三区1篇、研究生数学建模三等奖 |
| 王闻娟 |
20级硕士研究生 |
上海电信 |
研究生数学建模二等奖 |
| 李震 |
20级硕士研究生 |
上海边检公务员 |
SCI四区2篇、研究生数学建模二等奖 |
| 汤威 |
21级硕士研究生 |
北京交通大学深造 |
研究生国家奖学金、SCI二区1篇 |
| 沈晓峰 |
21级硕士研究生 |
上海中谷物流股份有限公司 |
SCI一区1篇、二区1篇 |
| 刘童 |
21级硕士研究生 |
|
SC二区1篇 |
| 卞紫炫 |
21级硕士研究生 |
合肥合燃华润燃气有限公司 |
SC二区2篇 |
| |
|
|
|
|
|
| |
|