基本信息
曹纭 男 博导 中国科学院信息工程研究所
电子邮件: caoyun@iie.ac.cn
通信地址: 北京市海淀区树村路19号1-E
邮政编码: 100084
电子邮件: caoyun@iie.ac.cn
通信地址: 北京市海淀区树村路19号1-E
邮政编码: 100084
研究领域
信息安全;多媒体内容安全;多媒体取证;信息隐藏
招生信息
招生专业
083900-网络空间安全
招生方向
多媒体理论与技术
教育背景
2006-09--2012-07 中国科学院研究生院 工学博士2002-09--2006-07 清华大学 工学学士
工作经历
工作简历
2014-10~现在, 中国科学院信息工程研究所, 副研究员2012-07~2014-10,中国科学院信息工程研究所, 助理研究员
社会兼职
2021-02-01-今,Journal of Electronic Imaging, AE
2020-11-07-今,中国图象图形学会数字媒体取证与安全专委会, 委员
2015-03-26-今,中国电子学会通信学分会通信与信息安全专委会, 委员
2020-11-07-今,中国图象图形学会数字媒体取证与安全专委会, 委员
2015-03-26-今,中国电子学会通信学分会通信与信息安全专委会, 委员
教授课程
多媒体生成及其信息挖掘数字图像真实性鉴别信息隐藏
专利与奖励
奖励信息
(1) 朱李月华优秀教师奖, 院级, 2021(2) 中国科学院院长优秀奖, 院级, 2012
专利成果
( 1 ) 一种基于块间去耦合的视频信息隐藏方法和装置, 专利授权, 2020, 第 1 作者, 专利号: CN108965887B( 2 ) 一种检测基于DCT系数隐写的视频隐写分析方法, 专利授权, 2019, 第 2 作者, 专利号: CN107197297B( 3 ) 基于帧间预测模式回复特性检测的视频隐写分析方法、装置、设备和计算机可读存储介质, 专利授权, 2019, 第 2 作者, 专利号: CN107682703B( 4 ) 视频隐写分析方法、装置、设备及计算机可读存储介质, 专利授权, 2019, 第 2 作者, 专利号: CN107613303B( 5 ) 一种与压缩编码过程紧耦合的H.264视频信息隐藏方法, 专利授权, 2019, 第 1 作者, 专利号: CN106101714B( 6 ) 基于新型嵌入代价的运动向量域视频隐写方法, 专利授权, 2019, 第 2 作者, 专利号: CN105979269B( 7 ) 基于帧内预测模式校准的视频隐写分析方法, 专利授权, 2019, 第 2 作者, 专利号: CN106375768B( 8 ) 基于运动向量率失真性能估计的视频隐写分析方法, 专利授权, 2019, 第 2 作者, 专利号: CN105915916B( 9 ) 一种基于运动向量轨迹的快速物体分割和追踪方法, 专利授权, 2019, 第 2 作者, 专利号: CN105931274B( 10 ) 一种改进的基于运动向量回复的视频隐写分析方法, 发明专利, 2015, 第 2 作者, 专利号: CN104853186A( 11 ) 基于运动向量局部最优性保持的视频隐写方法, 发明专利, 2015, 第 2 作者, 专利号: CN104853215A( 12 ) 一种内容自适应的视频隐写分析方法, 发明专利, 2015, 第 2 作者, 专利号: CN104837011A( 13 ) 基于宏块划分方式扰动的视频隐写方法, 发明专利, 2014, 第 2 作者, 专利号: CN104010193A
出版信息
发表论文
[1] 刘文力, 赵险峰, 曹纭, 李金川. 基于时空域伪造痕迹融合的视频修补定位方法. 信息安全学报[J]. 2023, [2] 侯贵阳, 赵险峰, 曹纭, 何晓磊. 基于复杂纹理区域伪造痕迹的GAN生成图像检测方法. 信息安全学报[J]. 2023, [3] Li, Gen, Zhao, Xianfeng, Cao, Yun. Forensic Symmetry for DeepFakes. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[J]. 2023, 18: 1095-1110, http://dx.doi.org/10.1109/TIFS.2023.3235579.[4] 李金川, 赵险峰, 曹纭. Generalizable Deep Video Inpainting Detection Based on Constrained Convolutional Neural Networks. International Workshops on Digital Forensics and Watermarking (IWDW)null. 2023, [5] Tan, Jingxuan, Liao, Xin, Liu, Jiate, Cao, Yun, Jiang, Hongbo. Channel Attention Image Steganography With Generative Adversarial Networks. IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING[J]. 2022, 9(2): 888-903, http://dx.doi.org/10.1109/TNSE.2021.3139671.[6] 张怡暄, 赵险峰, 曹纭. 数字图像篡改盲检测综述. 信息安全学报[J]. 2022, 7(3): 56-90, [7] 廖鑫, 唐志强, 曹纭. 基于生成对抗网络的空域彩色图像隐写失真函数设计方法. 软件学报[J]. 2022, 33(9): 3470-3484, [8] 李根, 赵险峰, 曹纭. FMFCC-V: An Asian Large-Scale Challenging Dataset for DeepFake Detection. ACM IH&MMSecnull. 2022, [9] Zhang, Zeyu, Cao, Yun, Zhao, Xianfeng. A Multi-level Feature Enhancement Network for Image Splicing Localization. Proc. IWDW 2021null. 2022, https://link.springer.com/chapter/10.1007/978-3-030-95398-0_1.[10] 包晗, 符皓程, 曹纭, 赵险峰, 汤朋. 基于多级时空域3D卷积的换脸视频检测方法. 信息安全学报[J]. 2022, 7(5): 29-38, [11] Cao, Yun, Zhang, Hong, Zhao, Xianfeng, He, Xiaolei. Steganalysis of H.264/AVC Videos Exploiting Subtractive Prediction Error Blocks. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[J]. 2021, 16: 3326-3338, [12] Li, Gen, Cao, Yun, Zhao, Xianfeng. Exploiting Facial Symmetry to Expose Deepfakes. 2021 IEEE International Conference on Image Processing (ICIP)null. 2021, [13] Liao, Xin, Peng, Jing, Cao, Yun. GIFMarking: The robust watermarking for animated GIF based deep learning*. JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION[J]. 2021, 79: [14] 张怡暄, 李根, 曹纭, 赵险峰. 基于帧间差异的人脸篡改视频检测方法. 信息安全学报[J]. 2020, 5(2): 49-72, [15] Yu Wang, Xianfeng Zhao, Yun Cao. Detecting the fingerprint of video data hiding tool OpenPuff. FORENSIC SCIENCE INTERNATIONAL: REPORTS[J]. 2020, 2: http://dx.doi.org/10.1016/j.fsir.2020.100088.[16] Wang, Yu, Cao, Yun, Zhao, Xianfeng. Minimizing Embedding Impact for H.264 Steganography by Progressive Trellis Coding. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[J]. 2020, 16: 333-345, [17] Wang, Yu, Cao, Yun, Zhao, Xianfeng. CEC: Cluster Embedding Coding for H.264 Steganography. IEEE SIGNAL PROCESSING LETTERS[J]. 2020, 27: 955-959, [18] Liu, Yaqi, Zhu, Xiaobin, Zhao, Xianfeng, Cao, Yun. Adversarial Learning for Constrained Image Splicing Detection and Localization Based on Atrous Convolution. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[J]. 2019, 14(10): 2551-2566, [19] Cao, Yun, Wang, Yu, Zhao, Xianfeng, Zhu, Meineng, Xu, Zhoujun, ACM. Cover Block Decoupling for Content-Adaptive H.264 Steganography. PROCEEDINGS OF THE 6TH ACM WORKSHOP ON INFORMATION HIDING AND MULTIMEDIA SECURITY (IH&MMSEC'18)[J]. 2018, 23-30, [20] 管萌萌, 曹纭, 张怡暄, 赵险峰. 基于自适应奇异值调制的抗转码视频隐写算法. 信息安全学报[J]. 2018, 3(6): 42-54, [21] Wang, Yu, Cao, Yun, Zhao, Xianfeng, Xu, Zhoujun, Zhu, Meineng. Maintaining Rate-Distortion Optimization for IPM-Based Video Steganography by Constructing Isolated Channels in HEVC. PROCEEDINGS OF THE 6TH ACM WORKSHOP ON INFORMATION HIDING AND MULTIMEDIA SECURITY (IH&MMSEC'18)[J]. 2018, 97-107, [22] 吴学谦, 曹纭, 赵险峰, 刘长军. 针对Seam-carving图像篡改的内容自适应检测方法. 信息安全学报[J]. 2018, 3(6): 92-102, http://lib.cqvip.com/Qikan/Article/Detail?id=6100040015.[23] Liu, Yaqi, Guan, Qingxiao, Zhao, Xianfeng, Cao, Yun. Image Forgery Localization based on Multi-Scale Convolutional Neural Networks. PROCEEDINGS OF THE 6TH ACM WORKSHOP ON INFORMATION HIDING AND MULTIMEDIA SECURITY (IH&MMSEC'18)[J]. 2018, 85-90, http://dx.doi.org/10.1145/3206004.3206010.[24] Zhang, Hong, Cao, Yun, Zhao, Xianfeng. A Steganalytic Approach to Detect Motion Vector Modification Using Near-Perfect Estimation for Local Optimality. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[J]. 2017, 12(2): 465-478, [25] Wang Yu, Cao Yun, Zhao Xianfeng, Zhou Linna. A Prediction Mode-Based Information Hiding Approach for H.264/AVC Videos Minimizing the Impacts on Rate-Distortion Optimization. PROC. IWDW 2017[J]. 2017, 10431: 163-176, [26] Wang, peipei, Cao, Yun, Zhao, Xianfeng, Zhu, Meineng. A Steganalytic Algorithm to Detect DCT-based Data Hiding Methods for H.264/AVC Videos. Proc. ACM IH & MMSec 2017[J]. 2017, [27] You Weike, Cao Yun, Zhao Xianfeng, Kraetzer C, Shi YQ, Dittmann J, Kim HJ. Information Hiding Using CAVLC: Misconceptions and a Detection Strategy. DIGITAL FORENSICS AND WATERMARKINGnull. 2017, 10431: 187-201, [28] Wang, Peipei, Cao, Yun, Zhao, Xianfeng. Segmentation Based Video Steganalysis to Detect Motion Vector Modification. SECURITY AND COMMUNICATION NETWORKS[J]. 2017, https://doaj.org/article/4d2e2fcbf2fe4c35adfef6efc657f28e.[29] Zhu Jie, Guan Qingxiao, Zhao Xianfeng, Cao Yun, Chen Gong. A Steganalytic Scheme Based on Classifier Selection Using Joint Image Characteristics. INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS[J]. 2017, 9(4): 1-14, [30] Zhang, Hong, Cao, Yun, Zhao, Xianfeng, Yu, Haibo, Liu, Changjun. Data Hiding in H. 264/AVC Video Files Using the Coded Block Pattern. International Workshop on Digital-Forensics and Watermarking (IWDW'16)null. 2017, 588-600, [31] Wang, Peipei, Zhang, Hong, Cao, Yun, Zhao, Xianfeng. A Novel Embedding Distortion for Motion Vector-Based Steganography Considering Motion Characteristic, Local Optimality and Statistical Distribution. ACM Information Hiding and Multimedia Security Workshop (IH&MMSec'16)null. 2016, 127-137, [32] Yanbin Zhao, Hong Zhang, Yun Cao, Peipei Wang, Xianfeng Zhao. Video Steganalysis Based on Intra Prediction Mode Calibration. International Workshop on Digital-Forensics and Watermarking (IWDW'15)null. 2016, 119-133, [33] Wang, Yu, Cao, Yun, Zhao, Xianfeng. Video Steganalysis Based on Centralized Error Detection in Spatial Domain. Proceeding of the 12th International Conference on Information Security and Cryptology[J]. 2016, [34] Zhang, Hong, Cao, Yun, Zhao, Xianfeng. Motion Vector-Based Video Steganography with Preserved Local Optimality. MULTIMEDIA TOOLS AND APPLICATIONS[J]. 2015, 75(21): 13503-13519, https://www.webofscience.com/wos/woscc/full-record/WOS:000386776800028.[35] Cao, Yun, Zhang, Hong, Zhao, Xianfeng, Yu, Haibo. Video Steganography Based on Optimized Motion Estimation Perturbation. ACM Information Hiding and Multimedia Security Workshop (IH&MMSec'15)null. 2015, 25-31, [36] Wang Peipei, Cao Yun, Zhao Xianfeng, Yu Haibo. AN ADAPTIVE DETECTING STRATEGY AGAINST MOTION VECTOR-BASED STEGANOGRAPHY. 2015 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA & EXPO (ICME)[J]. 2015, [37] Cao, Yun, Zhang, Hong, Zhao, Xianfeng, Yu, Haibo. Covert Communication by Compressed Videos Exploiting the Uncertainty of Motion Estimation. IEEE COMMUNICATIONS LETTERS[J]. 2014, 19(2): 203-206, https://www.webofscience.com/wos/woscc/full-record/WOS:000349537500023.[38] Hong Zhang, Yun Cao, Xianfeng Zhao, Weiming Zhang, Nenghai Yu. Video Steganography with Perturbed Macroblock Partition. ACM Information Hiding and Multimedia Security Workshop (IH&MMSec'14)null. 2014, 115-122, [39] Cao, Yun, Zhao, Xianfeng, Feng, Dengguo. Video Steganalysis Exploiting Motion Vector Reversion-Based Features. IEEE SIGNAL PROCESSING LETTERS[J]. 2012, 19(1): 35-38, http://dx.doi.org/10.1109/LSP.2011.2176116.[40] Cao, Yun, Zhao, Xianfeng, Feng, Dengguo, Sheng, Rennong. Video steganography with perturbed macroblock partition. Proc. ACM IH & MMSec 2011[J]. 2011,
发表著作
(1) 视频隐写与隐写分析, 科学出版社, 2021-05, 第 3 作者
科研活动
科研项目
( 1 ) 视音频和文档XX分析关键技术, 负责人, 中国科学院计划, 2015-01--2015-12( 2 ) 利用视频压缩特性的XX关键技术研究, 负责人, 国家任务, 2014-01--2016-12( 3 ) 视频XXXXX关键技术研究, 负责人, 国家任务, 2016-06--2017-07( 4 ) 视频XXXXX关键技术研究, 负责人, 国家任务, 2017-11--2018-10( 5 ) 面向社交网络的视频XXXX技术研究, 负责人, 研究所自选, 2017-09--2018-08( 6 ) 符合预测编码特性的视频XX通信理论及应用研究, 负责人, 国家任务, 2019-01--2022-12( 7 ) 深度伪造识别研究, 负责人, 国家任务, 2019-10--2021-10( 8 ) 模型泛化性提升技术, 负责人, 国家任务, 2020-07--2023-06( 9 ) 面向XX人物的XXXX识别技术, 负责人, 国家任务, 2022-09--2024-09
指导学生
已指导学生
管萌萌 硕士研究生 085211-计算机技术
解沛 硕士研究生 085211-计算机技术
汤朋 硕士研究生 085212-软件工程
侯贵洋 硕士研究生 083900-网络空间安全
李金川 硕士研究生 085211-计算机技术
现指导学生
刘文力 硕士研究生 083900-网络空间安全
陈凯 硕士研究生 085400-电子信息
孙伟栋 硕士研究生 085400-电子信息