姓名: 黄方军
学校: 中山大学
学院: 信息科学与技术学院
职称:  

<div class> <p> <br/>   姓名:黄方军  性别:男  职称:副教授  <br/>   学院:信息科学与技术学院  最后学历:博士<br/>   主要研究方向:多媒体信息安全、多媒体信息处理</p> <p>   <br/>   现在中山大学信息科学与技术学院从事教学和科研工作。于南京理工大学获得学士学位,华中科技大学获得硕士和博士学位。2009年获国家留学基金资助在美国新泽西理工学院电子与计算机工程系从事博士后研究。</p> <p> <br/>   研究领域为多媒体信息安全。近年来,已在Springer出版社出版与图像隐写安全相关的图书章节一部,在本领域国际顶级期刊IEEE Trans.Information Forensics and Security以及其它权威期刊IET Information Security、Science in China Series F: Information Sciences等发表学术论文多篇。主持国家自然科学基金面上项目、教育部博士点基金及多项应用课题的研究。</p> <p>  </p> <p> 教学工作:<br/> </strong><br/> 1)高级语言程序设计(C++)<br/> 2)数据结构(C++版)<br/> 3)微机原理<br/> 4)Matlab语言<br/> 5)过程控制<br/> <br/> 近年来主持科研项目:<br/> <br/> </strong>1)国家自然科学基金面上项目(61173147),2012.1-2015.12<br/> 2)高校基本科研业务费中山大学青年教师培育项目(12lgpy31),2012.1-2014.12<br/> 3) 信息安全国家重点实验室开放基金(04-06-4),2011.1-2012.12<br/> 4) 教育部博士点新教师基金(20070558054),2008.1-2010.12<br/> 5)中山大学青年教师科研启动基金,2007.1-2008.12<br/> 另主持横向课题多项,已结题<br/> <br/> 近期主要论文如下:<br/> <br/> </strong>Book chapter:</p> <p> Fangjun Huang, Bin Li, Y. Q. Shi, Jiwu Huang, Guorong Xuan, “Image Steganalysis”, Intelligent Multimedia Analysis for Security Applications, (Ed. Husrev Taha Sencar), Chapter 3, Mar. 2010, Springer Publisher.</p> <p> Journal papers:</p> <p> [1]Fangjun Huang, Jiwu Huang, Yun Q. Shi, "New Channel Selection Rule for JPEG Steganography", IEEE Trans. Information Forensics and Security, 2012, 7(4). 1181-1191. (SCI)</p> <p> [2]Fangjun Huang, Jiwu Huang, Yun Q. Shi, "Detecting double JPEG compression with the same quantization matrix", IEEE Trans. Information Forensics and Security, 2010, 5(4): 478-486. (SCI)</p> <p> [3]Fangjun Huang,Jiwu Huang, Yun Q. Shi, "An experimental study on the security performance of YASS", IEEE Trans. Information Forensics and Security, 2010, 5(3): 374-380. (SCI)</p> <p> [4]Weiqi Luo, Fangjun Huang,Jiwu Huang, "Edge Adaptive Image Steganography Based on LSB Matching Revisited", IEEE Trans. Information Forensics and Security, 2010, 5(2): 201-214. (SCI)</p> <p> [5]Fangjun Huang, Weiqi Luo, Jiwu Huang, “Steganalysis of JPEG steganography with complementary embedding strategy”, IET Information Security, 2011, 5(1): 10-18. (SCI)</p> <p> [6]Fangjun Huang, Jiwu Huang, Yun Q. Shi“Frequency Selective JPEG Steganography”, Science in China Series F: Information Sciences, to appear. (SCI)</p> <p> [7] Fangjun Huang, Jiwu Huang, “Calibration based universal JPEG steganalysis”, Science in China Series F: Information Sciences, 2009, 52(2): 260-268. (SCI)</p> <p> [8]WeiqiLuo, Fangjun Huang, JiwuHuang, “A more secure steganography based on adaptive pixel-value differencing scheme”, Multimed Tools Applications, Published online: Jan. 9, 2010. (SCI)</p> <p> [9]Fangjun Huang and Z.-H Guan, “Cryptosystem using chaotic keys”, Chaos, Solitons and Fractals, 2005, 23(3): 851-855. (SCI)</p> <p> [10]Fangjun Huang and Z.-H Guan, “A modified method of a class of recently presented cryptosystems”, Chaos, Solitons and Fractals, 2005, 23(5): 1893-1899. (SCI)</p> <p> [11]Fangjun Huang and Z.-H Guan, “A hybrid SVD-DCT watermarking method based on LPSNR”, Pattern Recognition Letters, 2004, 25(15): 1769-1775. (SCI)</p> <p> [12]Z.-H Guan and Fangjun Huang, “A General Chaos Based Key Stream Generator”, Circuits, Systems and Signal Processing, 2005, 24(5): 549-555. (SCI)</p> <p> [13]Z.-H Guan, Fangjun Huang and Wenjie Guan, “Chaos-based image encryption algorithm”, Physics Letters A, 2005, 346: 153-157. (SCI)</p> <p>  </p> <p> <br/> Conference Papers<br/> [1]Fangjun Huang, Yun Q. Shi, Jiwu Huang, “New JPEG steganographic scheme with high security performance”, Proc.9th International Workshop on Digital Watermarking, October 1–3, 2010, Korea University, Seoul, Republic of Korea.</p> <p> [2]Fangjun Huang, Yun Q. Shi, Jiwu Huang, “A study on security performance of YASS”, Proc. IEEE Int. Conf. on Image Processing, October 12–15, 2008, San Diego, California, U.S.A. (EI)</p> <p> [3]Fangjun Huang, Bin Li, Jiwu Huang, “Universal JPEG Steganalysis based on microscopic and macroscopic calibration”, Proc. IEEE Int. Conf. on Image Processing, October 12–15, 2008, San Diego, California, U.S.A. (EI)</p> <p> [4] Fangjun Huang, Bin Li, Jiwu Huang, “Attack LSB matching steganography by counting alteration rate of the number of neighbourhood gray levels”, Proc. IEEE Int. Conf. on Image Processing, September 16-19, 2007, San Antonio, Texas, U.S.A. (EI)</p> <p> [5] Bin Li, Fangjun Huang, Jiwu Huang, “Steganalysis of LSB Greedy Embedding Algorithm for JPEG Images Using Coefficient Symmetry”, Proc. IEEE Int. Conf. on Image Processing, September 16-19, 2007, San Antonio, Texas, U.S.A. (EI)</p> <p> [6]Bin Li, Fangjun Huang, Shunquan Tan, Jiwu Huang and Yun Q. Shi, “Effect of coding pattern on compress domain based universal JPEG steganalysis”,6th International workshop on digital watermarking, December 3-5, 2007, Guangzhou, China. (EI)</p> <p> 联系方式:</strong>广州大学城中山大学实验中心B502。</p> <p> 邮箱:huangfj@mail.sysu.edu.cn</p> </div>


  • 暂时还没有收录黄方军老师的课程列表,我们将尽快添加。
    • 暂时还没有收录黄方军老师的论文,我们将尽快添加。
    • 暂时还没有收录黄方军老师参与的论文,我们将尽快添加。

    关于黄方军老师的相关提示:以上内容并非是黄方军老师的最新情况,请以黄方军老师的官方公布信息为准。

    反馈/投稿/合作/咨询:13562564(QQ)    邮箱:13562564@qq.com