基本信息

董晶  女    中国科学院自动化研究所
电子邮件: jdong@nlpr.ia.ac.cn
通信地址: 中关村东路95号智能化大厦1504
邮政编码: 100190

研究领域

模式识别与图像处理、多媒体取证与安全、大数据、人工智能

招生信息

招收对象:希望招收有自驱力,语言表达能力良好、愿意从事科研事业的学生。课题组的硕士博士都是按照研究方向统一培养培养,培养目标包括三个方面:

i)具有优良的做人做事习惯,认真负责、积极向上、刻苦努力;

ii) 能够较为独立的完成科研任务,并撰写高质量的科研论文;

iii) 不仅能够做有趣的研究更要做有用的技术,让研究成果在重要的产业实践中发挥作用,优先考虑动手能力强的同学(国际国内相关竞赛获奖经验者优先)。

研究领域:计算机视觉、多媒体取证与安全、计算机图形学、人工智能。联系我之前,至少简单浏览一下我们课题组主页近几年的论文,一方面方便了解我们在做什么,另一方面方便后续面试中有更好的表现。

招生专业
081203-计算机应用技术
招生方向
人工智能,大数据,模式识别,信息安全,数字取证

教育背景

2005-09--2010-07   中科院自动化研究所   博士研究生
2001-09--2005-06   中南大学   学士学位

工作经历

   
工作简历
2014-11~现在, 中科院自动化研究所, 副研究员
2010-07~2014-10,中科院自动化研究所, 助理研究员
社会兼职
2018-05-29-2018-12-30,IEEE 亚太区, 执委;女工程师协调员
2016-12-31-今,中国图象图形学学会视觉大数据专委会, 委员
2016-12-31-今,中国图象图形学学会多媒体取证与安全专委会, 副秘书长;委员
2016-12-31-今,中国社会经济系统分析研究会智能社会与智能经济系统分析专委会, 专家
2016-09-01-2017-12-31,中国图象图形学学会, 副秘书长
2016-01-01-2017-12-31,IEEE MGA Vtools委员会, 委员
2015-12-31-今,中国人工智能学会模式识别专委会, 委员
2014-01-30-今,中国人工智能学会, 理事、副秘书长
2013-01-01-今,中国计算机学会计算机视觉专业委员会, 委员
2010-12-31-2012-12-30,IEEE 亚太区, 执委;信息通讯协调员
2010-07-01-2017-12-31,IEEE北京分会, 执委,学生活动委员会主席,女工程师委员会主席

专利与奖励

   
专利成果
[1] 王伟, 董晶, 彭勃, 李东泽, 马天翔. 一种基于操控解耦身份表示的人脸匿名方法. CN: CN113033511B, 2021-08-10.

[2] 谭铁牛, 董晶, 王伟, 郝杰东. 基于目标体图像的目标体检索方法、系统及装置. CN: CN108874889B, 2021-01-12.

[3] 谭铁牛, 董晶, 王伟, 彭勃. 基于视频的非接触式脉搏实时估计方法及设备. CN: CN109247923B, 2020-12-15.

[4] 董晶, 王伟, 彭勃, 卞明运. 基于多尺度深度特征融合的人脸深度篡改图像的检测方法. CN: CN111539942A, 2020-08-14.

[5] 董晶, 王伟, 彭勃, 轩心升, 王建文. 用于检测多类型深度网络生成图像的方法、系统、装置. CN: CN110942034A, 2020-03-31.

[6] 谭铁牛, 董晶, 王伟, 彭勃. 基于透视失真特性的人脸图像鉴伪方法、存储、处理设备. CN: CN107292269B, 2020-02-28.

[7] 谭铁牛, 董晶, 王伟, 叶奎, 徐金东. 图像篡改检测方法及装置. CN: CN107133951B, 2020-02-28.

[8] 谭铁牛, 董晶, 王伟, 彭勃. 图像篡改取证方法及装置. CN: CN107025647B, 2020-02-28.

[9] 董晶, 王伟, 彭勃, 轩心升, 王建文. 计算机生成图像的检测方法、系统、装置. CN: CN110428006A, 2019-11-08.

[10] 谭铁牛, 董晶, 王伟, 许锡锴. 一种基于局部学习的信息隐藏检测方法. 中国: CN104899606B, 2018-06-19.

[11] 谭铁牛, 董晶, 王伟, 彭勃. 一种基于光照方向不一致性的图像拼接检测方法. 中国: CN105678308A, 2016-06-15.

[12] 谭铁牛, 董晶, 王伟, 钱银龙. 基于深度学习的图像隐写检测方法. 中国: CN104778702A, 2015-07-15.

[13] 谭铁牛, 董晶, 王伟. 一种基于DCT系数的图像篡改定位方法. 中国: CN103679626A, 2014-03-26.

[14] 谭铁牛, 董晶, 许锡锴. 基于视频像素时空相关性的通用视频隐写分析方法. 中国: CN103281473A, 2013-09-04.

[15] 谭铁牛, 董晶, 王伟. 基于图像色度的彩色数字图像篡改检测方法. 中国: CN102959588A, 2013-03-06.

[16] 谭铁牛, 董晶, 王再冉. 水印的嵌入和提取方法. 中国: CN102890814A, 2013-01-23.

[17] 谭铁牛, 董晶, 关晴骁. 基于对称邻域信息的盲隐写分析方法. 中国: CN102722858A, 2012.10.10.

出版信息

   
发表论文
[1] He, Ziwen, Wang, Wei, Dong, Jing, Tan, Tieniu. Transferable Sparse Adversarial Attack. IEEE/CVF Conference on Computer Vision and Pattern Recognitionnull. 2022, https://openaccess.thecvf.com/content/CVPR2022/html/He_Transferable_Sparse_Adversarial_Attack_CVPR_2022_paper.html.
[2] Binghao Zhao, Tianxiang Ma, Bo Peng, 董晶. DesignerGAN: Sketch Your Own Photo. ICPR2022[J]. 2022, [3] Tianxiang Ma, Dongze Li, Wei Wang, 董晶. AdaDeId: Adjust Your Identity Attribute Freely. ICPR2022[J]. 2022, [4] Ziwen He, Wei Wang, 董晶, Tieniu Tan. Revisiting ensemble adversarial attack. Signal Processing: Image Communication (2022)[J]. 2022, [5] 卞明运, 彭勃, 王伟, 董晶. 基于空洞卷积的低质量人脸深度伪造图片检测. 现代电子技术. 2021, 44(6): 133-138, http://lib.cqvip.com/Qikan/Article/Detail?id=7104082456.
[6] Li, Dongze, Wang, Wei, Fan, Hongxing, Dong, Jing. Exploring Adversarial Fake Images on Face Manifold. IEEE/CVF Conference on Computer Vision and Pattern Recognitionnull. 2021, https://openaccess.thecvf.com/content/CVPR2021/html/Li_Exploring_Adversarial_Fake_Images_on_Face_Manifold_CVPR_2021_paper.html.
[7] Zhang, XiaoYu, Zhang, Yaru, Shi, Haichao, Dong, Jing. SAPS: Self-Attentive Pathway Search for weakly-supervised action localization with-action. Computer Vision and Image Understanding (CVIU)[J]. 2021, 210: [8] Ma, Tianxiang, Peng, Bo, Wang, Wei, Dong, Jing. MUST-GAN: Multi-level Statistics Transfer for Self-driven Person Image Generation. IEEE/CVF Conference on Computer Vision and Pattern Recognitionnull. 2021, https://openaccess.thecvf.com/content/CVPR2021/html/Ma_MUST-GAN_Multi-Level_Statistics_Transfer_for_Self-Driven_Person_Image_Generation_CVPR_2021_paper.html.
[9] 王伟, 董晶, 何子文, 孙哲南. 视觉对抗样本生成技术概述. 信息安全学报[J]. 2020, 5(2): 39-48, http://lib.cqvip.com/Qikan/Article/Detail?id=7101732839.
[10] Zeng, Zhigao, Guan, Lianghua, Zhu, Wenqiu, Dong, Jing, Li, Jun. Face Recognition Based on SVM Optimized by the Improved Bacterial Foraging Optimization Algorithm. INTERNATIONAL JOURNAL OF PATTERN RECOGNITION AND ARTIFICIAL INTELLIGENCE[J]. 2019, 33(7): https://www.webofscience.com/wos/woscc/full-record/WOS:000470871900013.
[11] Dong Jing. New Graph-Theoretic Approach to Social Steganography. Proc. IS&T, Electronic Imaging, Media Watermarking, Security, and Forensics. 2019, [12] Qin, Chuan, Zhou, Qing, Cao, Fang, Dong, Jing, Zhang, Xinpeng. Flexible Lossy Compression for Selective Encrypted Image With Image Inpainting. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY[J]. 2019, 29(11): 3341-3355, [13] Li, Hailiang, Guan, Qingxiao, Wang, Haidong, Dong, Jing. Deep-MATEM: TEM query image based cross-modal retrieval for material science literature. MULTIMEDIA TOOLS AND APPLICATIONS[J]. 2018, 77(23): 30269-30290, http://ir.ia.ac.cn/handle/173211/22827.
[14] Hao Jiedong, Dong Jing, Wang Wei, Tan Tieniu, IEEE. DeepFirearm: Learning Discriminative Feature Representation for Fine-grained Firearm Retrieval. 2018 24TH INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION (ICPR)null. 2018, 3335-3340, [15] Qin, Chuan, Ji, Ping, Chang, ChinChen, Dong, Jing, Sun, Xingming. Non-uniform Watermark Sharing Based on Optimal Iterative BTC for Image Tampering Recovery. IEEE MULTIMEDIA[J]. 2018, 25(3): 36-48, http://ir.ia.ac.cn/handle/173211/25649.
[16] Qin, Chuan, He, Zhihong, Luo, Xiangyang, Dong, Jing. Reversible data hiding in encrypted image with separable capability and high embedding capacity. INFORMATION SCIENCES[J]. 2018, 465: 285-304, http://ir.ia.ac.cn/handle/173211/25760.
[17] Ye, Kui, Dong, Jing, Wang, Wei, Peng, Bo, Tan, Tieniu, IEEE. Feature Pyramid Deep Matching and Localization Network for Image Forensics. 2018 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC)null. 2018, 1796-1802, [18] Wu, Hanzhou, Wang, Wei, Dong, Jing, Chen, Yanli, Wang, Hongxia. Reversible Embedding to Covers Full of Boundaries. CLOUD COMPUTING AND SECURITY, PT IVnull. 2018, 11066: 404-415, [19] Wu Hanzhou, Wang Wei, Dong Jing, Wang Hongxia, IEEE. Ensemble Reversible Data Hiding. 2018 24TH INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION (ICPR)null. 2018, 2676-2681, [20] Peng, Bo, Wang, Wei, Dong, Jing, Tan, Tieniu. Image Forensics Based on Planar Contact Constraints of 3D Objects. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[J]. 2018, 13(2): 377-392, https://www.webofscience.com/wos/woscc/full-record/WOS:000417894200010.
[21] Qin, Chuan, He, Zhihong, Luo, Xiangyang, Dong, Jing. Reversible data hiding in encrypted image with separable capability and high embedding capacity. INFORMATION SCIENCES[J]. 2018, 465: 285-304, http://ir.ia.ac.cn/handle/173211/25760.
[22] Qian, Yinlong, Dong, Jing, Wang, Wei, Tan, Tieniu. Feature learning for steganalysis using convolutional neural networks. MULTIMEDIA TOOLS AND APPLICATIONS[J]. 2018, 77(15): 19633-19657, http://dx.doi.org/10.1007/s11042-017-5326-1.
[23] 董晶, 钱银龙, 王伟. 图像隐写分析研究新进展. 图像与信号处理. 2017, 6(3): 131-138, http://lib.cqvip.com/Qikan/Article/Detail?id=HS724422017003001.
[24] Chaoyou Fu, Xiang Wu, Jing Dong, 赫然. Global Perception Feedback Convolutional Neural Networks. 2017, http://ir.ia.ac.cn/handle/173211/21096.
[25] Ri Yonggwon, Dong Jing, Wang Wei, Tan Tieniu, Yang J, Hu Q, Cheng MM, Wang L, Liu Q, Bai X, Meng D. High Capacity Reversible Data Hiding with Contrast Enhancement. COMPUTER VISION, PT IInull. 2017, 772: 284-294, [26] Hao Jiedong, Tan Tieniu, Dong Jing, Wang Wei. MFC: A Multi-scale Fully Convolutional Approach for Visual Instance Retrieval. 2017, http://ir.ia.ac.cn/handle/173211/20992.
[27] Peng, Bo, Wang, Wei, Dong, Jing, Tan, Tieniu, IEEE. Position Determines Perspective: Investigating Perspective Distortion for Image Forensics of Faces. 2017 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION WORKSHOPS (CVPRW)null. 2017, 1813-1821, [28] Ri Yonggwon, Tan Tieniu, Wang Wei, Dong Jing. High Capacity Reversible Data Hiding with Contrast Enhancement. COMPUTER VISION, PT IInull. 2017, 772: 284-294, [29] Hao, Jiedong, Wang, Wei, Dong, Jing, Tan, Tieniu, IEEE. MFC: A MULTI-SCALE FULLY CONVOLUTIONAL APPROACH FOR VISUAL INSTANCE RETRIEVAL. 2017 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA & EXPO WORKSHOPS (ICMEW)null. 2017, [30] Dong Jing, Wang Wei, Tan Tieniu, Ri Yonggwon. Adaptive Histogram Shifting Based Reversible Data Hiding. 2017, http://ir.ia.ac.cn/handle/173211/15407.
[31] Peng, Bo, Wang, Wei, Dong, Jing, Tan, Tieniu. Optimized 3D Lighting Environment Estimation for Image Forgery Detection. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[J]. 2017, 12(2): 479-494, https://www.webofscience.com/wos/woscc/full-record/WOS:000389350600018.
[32] Qin, Chuan, Ji, Ping, Zhang, Xinpeng, Dong, Jing, Wang, Jinwei. Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy. SIGNAL PROCESSING[J]. 2017, 138: 280-293, http://www.corc.org.cn/handle/1471x/2190744.
[33] Dong Jing, Ye Kui, Tan Tieniu, Xu Jindong, Wang Wei. Image Forgery Detection Based on Semantic Image Understanding. COMPUTER VISION, PT Inull. 2017, 771: 472-481, [34] Ye Kui, Sun Xiaobo, Xu Jindong, Dong Jing, Tan Tieniu, Yang J, Hu Q, Cheng MM, Wang L, Liu Q, Bai X, Meng D. Influence Evaluation for Image Tampering Using Saliency Mechanism. COMPUTER VISION, PT Inull. 2017, 771: 518-527, [35] Dong Jing, Shi Haichao, Zhang Xiaoyu, Qian Yinlong, Wang Wei. SSGAN: Secure Steganography Based on Generative Adversarial Networks. 2017, http://arxiv.org/abs/1707.01613.
[36] Ye Kui, Dong Jing, Wang Wei, Xu Jindong, Tan Tieniu, Yang J, Hu Q, Cheng MM, Wang L, Liu Q, Bai X, Meng D. Image Forgery Detection Based on Semantic Image Understanding. COMPUTER VISION, PT Inull. 2017, 771: 472-481, [37] Wang Wei, Peng Bo, Dong Jing, Tan Tieniu, Wei Wang. Improved 3D Lighting Environment Estimation for Image Forgery Detection. Proceedings of IEEE International Workshop on Information Forensics and Securitynull. 2016, 1-6, http://ir.ia.ac.cn/handle/173211/12303.
[38] Wang Wei, Wang Zairan, Dong Jing. Quantization based watermarking methods against valumetric distortions. International Journal of Automation and Computing[J]. 2016, 1-14, [39] Peng Bo, Wang Wei, Dong Jing, Tieniu Tan, Wei Wang. Automatic Detection of 3D Lighting Inconsistencies Via a Facial Landmark Based Morphable Model. Proceedings of 2016 IEEE International Conference on Image Processingnull. 2016, 3932-3936, http://ir.ia.ac.cn/handle/173211/12302.
[40] Qian Yinlong, Dong Jing, Wang Wei, Tan Tieniu. Learning and transferring representations for image steganalysis using convolutional neural network. Proceedings of 2016 IEEE International Conference on Image Processingnull. 2016, http://ir.ia.ac.cn/handle/173211/12306.
[41] Peng Bo, Wang Wei, Dong Jing, Tan Tieniu, IEEE. AUTOMATIC DETECTION OF 3D LIGHTING INCONSISTENCIES VIA A FACIAL LANDMARK BASED MORPHABLE MODEL. 2016 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP)null. 2016, 3932-3936, [42] Xu Xikai, Dong Jing, Wang Wei, Tan Tieniu, Liang Q, Mu J, Wang W, Zhang B. An Adaptive Ensemble Classifier for Steganalysis Based on Dynamic Weighted Fusion. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, SIGNAL PROCESSING, AND SYSTEMSnull. 2016, 386: 639-647, [43] Qin, Chuan, Chen, Xueqin, Dong, Jing, Zhang, Xinpeng. Perceptual image hashing with selective sampling for salient structure features. DISPLAYS[J]. 2016, 45: 26-37, http://www.corc.org.cn/handle/1471x/2230318.
[44] Qian Yinlong, Dong Jing, Wang Wei, Tan Tieniu, IEEE. LEARNING AND TRANSFERRING REPRESENTATIONS FOR IMAGE STEGANALYSIS USING CONVOLUTIONAL NEURAL NETWORK. 2016 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP)null. 2016, 2752-2756, [45] Qian Yinlong, Dong Jing, Wang Wei, Tan Tieniu. Deep Learning for Steganalysis via Convolutional Neural Networks. Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics 2015null. 2015, http://ir.ia.ac.cn/handle/173211/12305.
[46] Qian Yinlong, Dong Jing, Wang Wei, Tan Tieniu, Alattar AM, Memon ND, Heitzenrater CD. Deep learning for steganalysis via convolutional neural networks. MEDIA WATERMARKING, SECURITY, AND FORENSICS 2015null. 2015, 9409: [47] Xu Xikai, Dong Jing, Wang Wei, Tan Tieniu, IEEE. LOCAL CORRELATION PATTERN FOR IMAGE STEGANALYSIS. 2015 IEEE CHINA SUMMIT & INTERNATIONAL CONFERENCE ON SIGNAL AND INFORMATION PROCESSINGnull. 2015, 468-472, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000380436500096.
[48] Xu Xikai, Dong Jing, Wang Wei, Tan Tieniu, IEEE. ROBUST STEGANALYSIS BASED ON TRAINING SET CONSTRUCTION AND ENSEMBLE CLASSIFIERS WEIGHTING. 2015 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP)null. 2015, 1498-1502, [49] Peng Bo, Wang Wei, Dong Jing, Tan Tieniu, Wei Wang. Detection of computer generated faces in videos based on pulse signal. Proceedings of IEEE China Summit & International Conference on Signal and Information Processingnull. 2015, 841-845, http://ir.ia.ac.cn/handle/173211/12304.
[50] Wang Zairan, Dong Jing, Wang Wei, Tan Tieniu. Effects of Fragile and Semi-fragile Watermarking on Iris Recognition System. Digital-Forensics and Watermarkingnull. 2015, http://ir.ia.ac.cn/handle/173211/12311.
[51] Xikai Xu, Jing Dong, Wei Wang, Tieniu Tan. Robust steganalysis based on training set construction and ensemble classifiers weighting. ICIP2015null. 2015, http://ir.ia.ac.cn/handle/173211/10549.
[52] Wang Wei, Qian Yinlong, Dong Jing, Tan Tieniu. Learning Representations for Steganalysis from Regularized CNN Model with Auxiliary Tasks. Proceedings of International Conference on Communications, Signal Processing, and Systemsnull. 2015, http://ir.ia.ac.cn/handle/173211/12307.
[53] Wang Zairan, Dong Jing, Wang Wei, Tan Tieniu, Shi YQ, Kim HJ, PerezGonzalez F, Yang CN. Effects of Fragile and Semi-fragile Watermarking on Iris Recognition System. DIGITAL-FORENSICS AND WATERMARKING, IWDW 2014null. 2015, 9023: 174-186, [54] Peng Bo, Wang Wei, Dong Jing, Tan Tieniu, IEEE. Improved 3D Lighting Environment Estimation for Image Forgery Detection. 2015 IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS)null. 2015, [55] Xu Xikai, Dong Jing, Wang Wei, Tan Tieniu. Local correlation pattern for image steganalysis. Proceedings of IEEE China Summit and International Conference on Signal and Information Processingnull. 2015, http://ir.ia.ac.cn/handle/173211/12312.
[56] Wang Zairan, Dong Jing, Wang Wei, Tan Tieniu. Improved Robust Watermarking Based on Rational Dither Modulation. Chinese Conference on Image and Graphics Technologiesnull. 2014, http://ir.ia.ac.cn/handle/173211/12309.
[57] Wang, Wei, Dong, Jing, Tan, Tieniu. Exploring DCT Coefficient Quantization Effects for Local Tampering Detection. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[J]. 2014, 9(10): 1653-1666, https://www.webofscience.com/wos/woscc/full-record/WOS:000342383700004.
[58] Dong Jing. Effects of Fragile and Semi-Fragile Watermarking on Iris Recognition Systems. Int. Workshop Digit. Watermarking (IWDW2014). 2014, [59] Wang Zairan, Dong Jing, Wang Wei, Tan Tieniu. An effective watermarking method against valumetric distortions. Proceedings of 2014 IEEE International Conference on Image Processing4null. 2014, http://ir.ia.ac.cn/handle/173211/12314.
[60] Jing Dong, Qingxiao Guan, Tieniu Tan. Two Notes from Experimental Study on Image Steganalysis. Proc. International Conference on Intelligence Computingnull. 2013, 411-420, http://ir.ia.ac.cn/handle/173211/13816.
[61] Xikai Xu, Jing Dong, Wei Wang, Tieniu Tan, Wang Wei, Tan Tieniu, Xu Xikai. Video steganalysis based on the constraints of motion vectors. ICIP2013null. 2013, http://ir.ia.ac.cn/handle/173211/10548.
[62] Xu, Xikai, Dong, Jing, Wang, Wei, Tan, Tieniu, IEEE. VIDEO STEGANALYSIS BASED ON THE CONSTRAINTS OF MOTION VECTORS. 2013 20TH IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP 2013)null. 2013, 4422-4426, [63] Dong Jing, Wang Wei, Tan Tieniu. CASIA Image Tampering Detection Evaluation Database. Proceedings of 2013 IEEE China Summit and International Conference on Signal and Information Processingnull. 2013, http://ir.ia.ac.cn/handle/173211/12318.
[64] Xu, Xikai, Dong, Jing, Wang, Wei, Tan, Tieniu, IEEE. VIDEO STEGANALYSIS BASED ON THE CONSTRAINTS OF MOTION VECTORS. 2013 20TH IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP 2013)null. 2013, 4422-4426, [65] Dong Jing, Wang Wei, Tan Tieniu. CASIA Image Tampering Detection Evaluation Database. Proceedings of 2013 IEEE China Summit and International Conference on Signal and Information Processingnull. 2013, http://ir.ia.ac.cn/handle/173211/12318.
[66] Xu Xikai, Dong Jing, Tan Tieniu, IEEE. UNIVERSAL SPATIAL FEATURE SET FOR VIDEO STEGANALYSIS. 2012 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP 2012)null. 2012, 245-248, [67] Xu, Xikai, Dong, Jing, Tan, Tieniu. UNIVERSAL SPATIAL FEATURE SET FOR VIDEO STEGANALYSIS. International Conference on Image Processing (ICIP)null. 2012, 245-248, http://www.irgrid.ac.cn/handle/1471x/974959.
[68] Xu Xikai, Dong Jing, Tan Tieniu, IEEE. UNIVERSAL SPATIAL FEATURE SET FOR VIDEO STEGANALYSIS. 2012 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP 2012)null. 2012, 245-248, [69] Xu, Xikai, Dong, Jing, Tan, Tieniu. UNIVERSAL SPATIAL FEATURE SET FOR VIDEO STEGANALYSIS. International Conference on Image Processing (ICIP)null. 2012, 245-248, http://www.irgrid.ac.cn/handle/1471x/974959.
[70] Dong Jing, Tan Tieniu. An effective image steganalysis method based on neighborhood information of pixels. International Conference on Image Processing (ICIP)null. 2011, 2721-2724, http://ir.ia.ac.cn/handle/173211/5356.
[71] Dong Jing, Tan Tieniu. Blind quantitative steganalysis based on feature fusion and gradient boosting. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)null. 2011, 266-279, http://ir.ia.ac.cn/handle/173211/5358.
[72] Wang Wei, Dong Jing, Tan Tieniu, Kim HJ, Shi YQ, Barni M. Tampered Region Localization of Digital Color Images Based on JPEG Compression Noise. DIGITAL WATERMARKINGnull. 2011, 6526: 120-133, [73] Tan Tieniu, Wang Wei, Dong Jing. Exploring DCT coefficient quantization effect for image tampering localization. IEEE International Workshop on Information Forensics and Security (WIFS)null. 2011, http://ir.ia.ac.cn/handle/173211/5366.
[74] Dong Jing, Tan Tieniu. An effective image steganalysis method based on neighborhood information of pixels. International Conference on Image Processing (ICIP)null. 2011, 2721-2724, http://ir.ia.ac.cn/handle/173211/5356.
[75] Dong Jing, Tan Tieniu. Blind quantitative steganalysis based on feature fusion and gradient boosting. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)null. 2011, 266-279, http://ir.ia.ac.cn/handle/173211/5358.
[76] Wang Wei, Dong Jing, Tan Tieniu, Kim HJ, Shi YQ, Barni M. Tampered Region Localization of Digital Color Images Based on JPEG Compression Noise. DIGITAL WATERMARKINGnull. 2011, 6526: 120-133, [77] Tan Tieniu, Wang Wei, Dong Jing. Exploring DCT coefficient quantization effect for image tampering localization. IEEE International Workshop on Information Forensics and Security (WIFS)null. 2011, http://ir.ia.ac.cn/handle/173211/5366.
[78] Dong Jing, Tan Tieniu. New developments in color image tampering detection. IEEE International Symposium on Circuits and Systems: Nano-Bio Circuit Fabrics and Systems(ISCAS)null. 2010, 3064-3067, http://ir.ia.ac.cn/handle/173211/5372.
[79] 董晶. 基于模式分析的图像隐秘取证及篡改认证研究. 2010, [80] Sutthiwan Patchara, Shi YunQing, Dong Jing, Tan Tieniu, Ng TianTsong, IEEE. New Developments in Color Image Tampering Detection. 2010 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMSnull. 2010, 3064-3067, [81] Wang Wei, Tan Tieniu, Dong Jing. Image tampering detection based on stationary distribution of markov chain. Proceedings of 2010 IEEE International Conference on Image Processingnull. 2010, http://ir.ia.ac.cn/handle/173211/12319.
[82] Tan Tieniu, Dong Jing. Evaluation of feature sets for steganalysis of JPEG image. IEEE Youth Conference on Information, Computing and Telecommunication (YC-ICT)null. 2010, 359-362, http://ir.ia.ac.cn/handle/173211/5365.
[83] Wang Wei, Dong Jing, Tan Tieniu, IEEE. IMAGE TAMPERING DETECTION BASED ON STATIONARY DISTRIBUTION OF MARKOV CHAIN. 2010 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSINGnull. 2010, 2101-2104, [84] Dong Jing, Tan Tieniu. New developments in color image tampering detection. IEEE International Symposium on Circuits and Systems: Nano-Bio Circuit Fabrics and Systems(ISCAS)null. 2010, 3064-3067, http://ir.ia.ac.cn/handle/173211/5372.
[85] 董晶. 基于模式分析的图像隐秘取证及篡改认证研究. 2010, [86] Sutthiwan Patchara, Shi YunQing, Dong Jing, Tan Tieniu, Ng TianTsong, IEEE. New Developments in Color Image Tampering Detection. 2010 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMSnull. 2010, 3064-3067, [87] Wang Wei, Tan Tieniu, Dong Jing. Image tampering detection based on stationary distribution of markov chain. Proceedings of 2010 IEEE International Conference on Image Processingnull. 2010, http://ir.ia.ac.cn/handle/173211/12319.
[88] Tan Tieniu, Dong Jing. Evaluation of feature sets for steganalysis of JPEG image. IEEE Youth Conference on Information, Computing and Telecommunication (YC-ICT)null. 2010, 359-362, http://ir.ia.ac.cn/handle/173211/5365.
[89] Wang Wei, Dong Jing, Tan Tieniu, IEEE. IMAGE TAMPERING DETECTION BASED ON STATIONARY DISTRIBUTION OF MARKOV CHAIN. 2010 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSINGnull. 2010, 2101-2104, [90] Dong Jing, Wang Wei, Tan Tieniu, Shi Yun Q, Kim HJ, Katzenbeisser S, Ho ATS. Run-Length and Edge Statistics Based Approach for Image Splicing Detection. DIGITAL WATERMARKINGnull. 2009, 5450: 76-+, [91] Dong Jing, Wang Jei, Tan Tieniu, Ho ATS, Shi YQ, Kim HJ, Barni M. Multi-class Blind Steganalysis Based on Image Run-Length Analysis. DIGITAL WATERMARKINGnull. 2009, 5703: 199-210, http://ir.ia.ac.cn/handle/173211/12320.
[92] Wang, Wei, Dong, Jing, Tan, Tieniu, IEEE. EFFECTIVE IMAGE SPLICING DETECTION BASED ON IMAGE CHROMA. 2009 16TH IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1-6null. 2009, 1257-1260, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000280464300313.
[93] Wang Wei, Dong Jing, Tan Tieniu, Ho ATS, Shi YQ, Kim HJ, Barni M. A Survey of Passive Image Tampering Detection. DIGITAL WATERMARKINGnull. 2009, 5703: 308-322, [94] Wang Wei, Dong Jing, Tan Tieniu. Effective image splicing detection based on image chroma. Proceedings of 2009 IEEE International Conference on Image Processingnull. 2009, http://ir.ia.ac.cn/handle/173211/12308.
[95] Dong Jing, Wang Wei, Tan Tieniu, Shi Yun Q, Kim HJ, Katzenbeisser S, Ho ATS. Run-Length and Edge Statistics Based Approach for Image Splicing Detection. DIGITAL WATERMARKINGnull. 2009, 5450: 76-+, [96] Dong Jing, Wang Jei, Tan Tieniu, Ho ATS, Shi YQ, Kim HJ, Barni M. Multi-class Blind Steganalysis Based on Image Run-Length Analysis. DIGITAL WATERMARKINGnull. 2009, 5703: 199-210, http://ir.ia.ac.cn/handle/173211/12320.
[97] Wang, Wei, Dong, Jing, Tan, Tieniu, IEEE. EFFECTIVE IMAGE SPLICING DETECTION BASED ON IMAGE CHROMA. 2009 16TH IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1-6null. 2009, 1257-1260, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000280464300313.
[98] Wang Wei, Dong Jing, Tan Tieniu, Ho ATS, Shi YQ, Kim HJ, Barni M. A Survey of Passive Image Tampering Detection. DIGITAL WATERMARKINGnull. 2009, 5703: 308-322, [99] Wang Wei, Dong Jing, Tan Tieniu. Effective image splicing detection based on image chroma. Proceedings of 2009 IEEE International Conference on Image Processingnull. 2009, http://ir.ia.ac.cn/handle/173211/12308.
[100] Jing Dong, Tieniu Tan. Effects of Watermarking on Iris Recognition Performance. Proc. the International Conference on Control, Automation, Robotics and Visionnull. 2008, 1156-1161, http://ir.ia.ac.cn/handle/173211/13854.
[101] Dong Jing, Chen Xiaochuan, Guo Lei, Tan Tieniu, Shi YQ, Kim HJ, Katzenbeisser S. Fusion Based Blind Image Steganalysis by Boosting Feature Selection. DIGITAL WATERMARKING, PROCEEDINGSnull. 2008, 5041: 87-98, [102] Dong Jing, Tan Tieniu, IEEE. BLIND IMAGE STEGANALYSIS BASED ON RUN-LENGTH HISTOGRAM ANALYSIS. 2008 15TH IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1-5null. 2008, 2064-2067, [103] Jing Dong, Tieniu Tan. Security enhancement of biometrics, cryptography and data hiding by their combinations. Proc. 5th International Conference on Visual Intformation Engineeringnull. 2008, 239-244, http://ir.ia.ac.cn/handle/173211/13853.
[104] Jing Dong, Tieniu Tan. Blind Image Steganalysis Based on Run-length Histogram Analysis. Proc. IEEE International Conference on Image Processingnull. 2008, 2064- 2067, http://ir.ia.ac.cn/handle/173211/13844.
[105] Jing Dong, Tan Tieniu, IEEE. Effects of Watermarking on Iris Recognition Performance. 2008 10TH INTERNATIONAL CONFERENCE ON CONTROL AUTOMATION ROBOTICS & VISION: ICARV 2008, VOLS 1-4null. 2008, 1156-1161, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000266716600203.
[106] Jing Dong, Tieniu Tan. Effects of Watermarking on Iris Recognition Performance. Proc. the International Conference on Control, Automation, Robotics and Visionnull. 2008, 1156-1161, http://ir.ia.ac.cn/handle/173211/13854.
[107] Dong Jing, Chen Xiaochuan, Guo Lei, Tan Tieniu, Shi YQ, Kim HJ, Katzenbeisser S. Fusion Based Blind Image Steganalysis by Boosting Feature Selection. DIGITAL WATERMARKING, PROCEEDINGSnull. 2008, 5041: 87-98, [108] Dong Jing, Tan Tieniu, IEEE. BLIND IMAGE STEGANALYSIS BASED ON RUN-LENGTH HISTOGRAM ANALYSIS. 2008 15TH IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1-5null. 2008, 2064-2067, [109] Jing Dong, Tieniu Tan. Security enhancement of biometrics, cryptography and data hiding by their combinations. Proc. 5th International Conference on Visual Intformation Engineeringnull. 2008, 239-244, http://ir.ia.ac.cn/handle/173211/13853.
[110] Jing Dong, Tieniu Tan. Blind Image Steganalysis Based on Run-length Histogram Analysis. Proc. IEEE International Conference on Image Processingnull. 2008, 2064- 2067, http://ir.ia.ac.cn/handle/173211/13844.
[111] Jing Dong, Tan Tieniu, IEEE. Effects of Watermarking on Iris Recognition Performance. 2008 10TH INTERNATIONAL CONFERENCE ON CONTROL AUTOMATION ROBOTICS & VISION: ICARV 2008, VOLS 1-4null. 2008, 1156-1161, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000266716600203.
[112] Jing Dong, Xiaochuan Chen, Lei Guo, Tieniu Tan. Fusion Based Blind Image Steganalysis by Boosting Feature Selection. Proc. International Workshop of Digital Watermarkingnull. 2007, 86-97, http://ir.ia.ac.cn/handle/173211/13875.
[113] Jing Dong, Xiaochuan Chen, Lei Guo, Tieniu Tan. Fusion Based Blind Image Steganalysis by Boosting Feature Selection. Proc. International Workshop of Digital Watermarkingnull. 2007, 86-97, http://ir.ia.ac.cn/handle/173211/13875.

科研活动

   
科研项目
( 1 ) 中国科学院青年创新促进会, 主持, 部委级, 2017-01--2020-12
( 2 ) 基于深度对抗学习的隐蔽通信新方法研究, 主持, 国家级, 2018-01--2021-12
( 3 ) 基于迁移学习的隐写分析新方法研究, 主持, 国家级, 2016-01--2018-12
( 4 ) 基于深度学习的隐写分析新方法研究, 主持, 国家级, 2014-01--2016-12
( 5 ) 应对大数据分析的情景融合个性化隐写理论与方法, 主持, 国家级, 2017-01--2020-12
( 6 ) 群体视觉大数据的透彻感知关键技术, 主持, 国家级, 2016-07--2020-06
( 7 ) 人工智能与机器人教育, 主持, 院级, 2016-03--2019-12
( 8 ) 数字版权服务关键支撑技术研究, 主持, 国家级, 2012-01--2014-12
( 9 ) 基于图像分析的隐写分析方法, 主持, 国家级, 2014-04--2015-04
( 10 ) 文档格式分析研究, 主持, 国家级, 2013-06--2014-06
( 11 ) 基于图像空域隐写分析新方法研究, 主持, 国家级, 2012-04--2013-04
( 12 ) 基于视频隐写分析新方法研究, 主持, 国家级, 2011-04--2012-04
( 13 ) 低嵌入率下的图像信息隐藏检测新方法研究, 主持, 市地级, 2016-01--2017-12
( 14 ) 图像操作历史的智能检测研究, 主持, 市地级, 2014-01--2015-12
( 15 ) 基于分布式信息源编码的加密域图像可逆信息隐藏模型及方法研究, 主持, 市地级, 2016-01--2017-12
( 16 ) 高强度噪声隐藏下的目标识别及其应用研究, 主持, 市地级, 2017-01--2018-12
( 17 ) IBM学院奖科研基金, 主持, 院级, 2017-01--2018-01
( 18 ) 面向数字安全的海量多媒体理解与推荐, 主持, 市地级, 2011-08--2012-08
( 19 ) 面向公共安全的社会感知数据处理, 参与, 国家级, 2012-01--2016-12
参与会议
(1)科研发展之路   国际电气电子工程师协会马来西亚分会全球精英论坛   2017-09-17
(2)介绍IEEE亚太区女工程师委员会的相关活动计划   赴悉尼参加国际电气电子工程师协会2017年度全球分会代表大会并赴麦考瑞大学交流访问   2017-08-10
(3)隐写及隐写分析进展报告   2016智能信息隐藏及多媒体信号处理研讨会   2016-11-20
(4)AUTOMATIC DETECTION OF 3D LIGHTING INCONSISTENCIES VIA A FACIAL LANDMARK BASED MORPHABLE MODEL   2016年图像处理国际会议   2016-09-24
(5)Robust Steganalysis Based on Training Set Construction and Ensemble Classifiers Weighting   2015年图像处理国际会议   2015-09-26