|
Prof. Yulin Wang Wuhan University, China
Yulin Wang is a full professor in the School of Computer Science, Wuhan University, China. His research interests include image and video processing, digital rights management, information security, intelligent system, e-commerce, IoT, code clone and so on. He got his PhD degree from University of London, UK. He got his master and bachelor degree from Huazhong University of Science and Technology(HUST)and Xi-Dian University respectively, both in China. Before joining the Wuhan University, he has worked in Hi-tech IT industry, including HUAWEI© and national research institute, for more than ten years. He has involved more than 15 national and international research projects. In recently 10 years, Prof. Wang has published 1 book, and 50+ journal and conference papers, including in IEEE TIP. He holds 10 authorized patents.
Prof. Wang served as EiC of 2 international journals and reviewer of top IEEE and ACM journals. He also served as reviewer of Innovative talents projects and national research funds, including National High Technology Research and Development Program of China. Prof. Wang was the external PhD advisor of Dublin City University, Ireland during 2008-2010.
In recently 10 years, Prof. Wang served as chairman of more than 10 international conferences, and keynote speakers in more than 20 international conferences. Besides UK, he visited US, France,Italy, Portugal,Croatia, Australia, Germany, korea, Ireland,Singapore, Malaysia, Japan, and Hong Kong. In addition, Prof. Wang has been appointed as the deputy director of Hubei provincial science and technology commission (CAPD) since 2014.
Title: Image Authentication and Tamper Localization
Abstract: Image authentication can be used in many fields, including e-government, e-commerce, national security, news pictures, court evidence, medical image, engineering design, and so on. Since some content-preserving manipulations, such as JPEG compression, contrast enhancement, and brightness adjustment, are often acceptable—or even desired—in practical application, an authentication method needs to be able to distinguish them from malicious tampering, such as removal, addition, and modification of objects. Therefore, the traditional hash-based authentication is not suitable for the application. As for the semi-fragile watermarking technique, it meets the requirements of the above application at the expense of severely damaging image fidelity. In this talk, we propose a hybrid authentication technique based on what we call fragile hash value. The hash value is derived from the relative difference between each pair of the selected DCT coefficient in a central block and its counterpart which is estimated by the DC values of the center block and its adjacent blocks. In order to achieve blind authentication, we hide the hash value in the specified boundary of the image. The technique can blindly detect and localize malicious tampering, while maintaining reasonable tolerance to conventional content-preserving manipulations. Finally, we point out the direction using deep leaning technique for image authentication.
|