倪蓉蓉
博士、教授
博士、教授
办公电话:010-51683695 | 电子邮件: rrni@bjtu.edu.cn |
通讯地址:北京交通大学信息所 | 邮编:100044 |
1998.6 获北京交通大学学士学位,2005.3 获北京交通大学信号与信息处理博士学位。
1.2013.11-至今,北京交通大学,计算机学院,教授
2.2018.12-2019.12,加拿大英属哥伦比亚大学,电子工程系,访问学者
3.2012.7-2013.8,美国犹他州立大学,计算机系,访问学者
4.2008.12-2013.10,北京交通大学,计算机学院,副教授
5.2005.3-2008.11,北京交通大学,计算机学院,讲师
研究兴趣:多媒体内容分析与检测,图像与视频处理,模式识别,深度学习
团队主页:Mepro.bjtu.edu.cn
所属团队是科技部重点领域创新团队和教育部创新团队。
2022年度招收以下专业研究生:信息与通信工程、控制科学与工程、新一代电子信息技术、人工智能、网络空间安全。
本科生课程:数字图像处理、多媒体技术
研究生课程:信息隐藏与数字水印
近期工作主要包括:数字图像取证、图像源及视频取证、数字水印技术及应用。(展板)
Recent Journal Papers:
1. Xin Li, Rongrong Ni, Pengpeng Yang, Zhiqiang Fu and Yao Zhao, “Artifacts-Disentangled Adversarial Learning for Deepfake Detection”, IEEE Transactions on Circuits and Systems for Video Technology, 2022, doi: 10.1109/TCSVT.2022.3217950.
2. Haichao Yao, Rongrong Ni, Hadi Amirpour, Christian Timmerer, Yao Zhao, “Detection of Video Transcoding From AVC to HEVC Based on Deep Representations of Decoded Frames and PU Maps”,IEEE Transactions on Multimedia, 2022, doi: 10.1109/TMM.2022.3185890.
3. Yang Yu, Rongrong Ni, Wenjie Li, Yao Zhao, “Detection of AI-Manipulated Fake Faces via Mining Generalized Features”, ACM Transactions on Multimedia Computing, Communications, and Applications. 2022, 18(4): 1-23.
4. Wenjie Li, Xiaolong Li, Rongrong Ni, Yao Zhao, “Quantization step estimation for JPEG image forensics”, IEEE Transactions on Circuits and Systems for Video Technology, vol. 32, no.7, July 2022.
5. Yakun Niu, Xiaolong Li, Yao Zhao, Rongrong Ni, “Detection of Double JPEG Compression with the Same Quantization Matrix Via Convergence Analysis”, IEEE Transactions on Circuits and Systems for Video Technology, vol. 32, no. 5, pp. 3279-3290, 2022.
6. Yakun Niu, Benedetta Tondi, Yao Zhao, Rongrong Ni, Mauro Barni, “Image Splicing Detection, Localization and Attribution Via JPEG Primary Quantization Matrix Estimation and Clustering”, IEEE Transactions on Information Forensics and Security. vol. 16, pp. 5397-5412, 2021.
7. Zhipeng Chen, Benedetta Tondi, Xiaolong Li, Rongrong Ni, Yao Zhao, Mauro Barni, “Secure Detection of Image Manipulation by means of Random Feature Selection”, IEEE Transactions on Information Forensics and Security, vol.9 no.14, pp. 2454-2469, 2019.
8. Pengpeng Yang, Daniele Baracchi, Massimo Iuliani, Dasara Shullani, Rongrong Ni, Yao Zhao, and Alessandro Piva, “Efficient video integrity analysis through container characterization”, IEEE Journal of Selected Topics in Signal Processing, Volume: 14, Issue: 5, Aug. 2020, pp.947-954
9. Gang Cao, Yao Zhao, Rongrong Ni, Xuelong Li, “Contrast Enhancement Based Forensics in Digital Images”, IEEE Transactions on Information Forensics and Security, vol.9, no.3, March 2014, pp.515-525.
10. Huawei Tian, Yao Zhao, Rongrong Ni, Lunming Qin,and Xuelong Li, “LDFT-based Watermarking Resilient to Local Desynchronization Attacks”, IEEE Transactions on Cybernetics, Vol. 43, No. 6, Dec. 2013, pp.2190-2201.
11. Bo Ou, Xiaolong Li, Yao Zhao, Rongrong Ni, Yun-Qing Shi, “Pairwise prediction-error expansion for efficient reversible data hiding”, IEEE Transactions on Image Processing, Vol. 22, No. 12, Dec. 2013, pp.5010-5021.
12. Huawei Tian, Yuming Fang, Yao Zhao, Weisi Lin, Rongrong Ni, Zhefeng Zhu, “Salient Region Detection by Fusing Bottom-up and Top-down Features Extracted from a Single Image”, IEEE Transactions on Image Processing, Vol.23, No. 10, 2014, pp. 4389-4398.
13. Yang Yu, Haichao Yao, Rongrong Ni, Yao Zhao, “Detection of Fake High Definition for HEVC Videos Based on Prediction Mode Feature”, Signal Processing, vol.166, Jan. 2020, pp. 5789-5806.
14. Yu Sun, Rongrong Ni, Yao Zhao, “ET: Edge-enhanced Transformer for Image Splicing Detection”, IEEE Signal Processing Letters, vol.29, May 2022, pp. 1232 – 1236.
15. Pengpeng Yang, Rongrong Ni, Yao Zhao, Wei Zhao, “Source camera identification based on content-adaptive fusion residual networks”, Pattern Recognition Letters. Volume 119, 1 March 2019, Pages 195-204.
16. Haichao Yao, Rongrong Ni, Yao Zhao, “Double compression detection for H.264 videos with adaptive GOP structure”, Multimedia Tools and Applications, Volume 79, Issue 9, 2020, pp. 5789-5806.
17. Haorui Wu, Xiaolong Li, Yao Zhao, Rongrong Ni, “Improved PPVO-based High-fidelity Reversible Data Hiding”, Signal Processing, vol.167, Feb. 2020.
18. Haichao Yao, Rongrong Ni, Yao Zhao, “An approach to detect video frame deletion under anti-forensics”, Journal of Real-Time Image Processing, Volume 16, Issue 3, June 2019, pp. 751–764
19. Wenjie Li, Rongrong Ni, Xiaolong Li, Yao Zhao, “Robust median filtering detection based on the difference of frequency residuals”, Multimedia Tools and Applications, Volume 78, Issue 7, Apr. 2019, pp. 8363–8381.
20. Yakun Niu, Xiaolong Li, Yao Zhao, Rongrong Ni. "An Enhanced Approach for Detecting Double JPEG Compression with the Same Quantization Matrix", Signal Processing: Image Communication. vol.76, 2019, pp.89–96.
21. Haorui Wu, Xiaolong Li, Yao Zhao, Rongrong Ni,“Improved Reversible Data Hiding Based on PVO and Adaptive Pairwise Embedding,” Journal of Real-Time Image Processing, vol.16. no.3. pp.685-695.2019.
22. Mengyao Xiao, Xiaolong. Li, Yangyang. Wang, Yao. Zhao, and Rongrong. Ni, “Reversible Data Hiding Based on Pairwise Embedding and Optimal Expansion Path”, Signal Processing, vol.158, pp.210–218, May 2019.
23. Hongshen Tang; Rongrong Ni; Yao Zhao; Xiaolong Li, “Median Filtering Detection of small-Size Image based on CNN”, Journal of Visual Communication and Image Representation, vol. 51, 2018, pp. 162–168.
24. Omar Al Shaya, Pengpeng Yang, Rongrong Ni, Yao Zhao, and Alessandro Piva, “A New Dataset for Source Identification of High Dynamic Range Images”, Sensors, 18(11), 3801, 2018, pp1-17.
25. Yu Sun, Rongrong Ni, Yao Zhao, “Nonoverlapping Blocks Based Copy-Move Forgery Detection”, Security And Communication Networks, 2018, pp.1-11.
26. Wei Zhao, Pengpeng Yang, Rongrong Ni, Yao Zhao, Haorui Wu, “Security Consideration for Deep Learning-Based Image Forensics”, IEICE Transactions on Information and Systems, Vol.E101-D, No.12, pp.3263-3266, 2018.
27. Pengpeng Yang, Rongrong Ni, Yao Zhao, “A Survey of Deep Learning-based Source Image Forensics”, Journal of Imaging, 2020, 6(3): 9.
28. Yangyang Wang, Rongrong Ni, Yao Zhao, Min Xian, “Watermark Embedding for Direct Binary Searched Halftone Images by Adopting Visual Cryptography”, Computers Materials & Continua, 55(2):255-265.2018.
29. Yakun Niu, Yao Zhao, Rongrong Ni, “Robust median filtering detection based on local difference descriptor”, Signal Processing: Image Communication. Vol.53, 2017, pp. 65-72.
30. Zhipeng Chen, Yao Zhao, Rongrong Ni, “Detection of operation chain: JPEG-Resampling-JPEG”, Signal Processing: Image Communication. Vol. 57, 2017, pp. 8-20.
31. 白珊山, 倪蓉蓉, 赵耀. 基于双通道卷积神经网络的视频目标移除取证算法. 信号处理, 2020,36(9): 1415-1421
32. 胡浩慧,倪蓉蓉,赵耀. 图像内容感知缩放的检测方法研究. 软件学报,29(4):1002-1016, 2018.
1. 基于反馈混沌系统和邻域辅助的图像认证方法,申请人:倪蓉蓉、阮秋琦,授权日期:2009.2.11
2. 基于交织水印和生物特征的文件认证方法,申请人:倪蓉蓉、王艳霞、阮秋琦,授权日期:2010.8.11
3. 利用不规则区域分割的数字图像认证与恢复方法及系统,申请人:倪蓉蓉、杨柳、赵耀、阮秋琦,授权日期:2013.1.23
4. 一种基于稳定圆形区域的抗几何攻击鲁棒水印方法,申请人:赵耀、田华伟、倪蓉蓉,授权日期:2010.2.17
5. 一种基于预测和压扩技术的高容量可逆水印方法,申请人:赵耀、翁韶伟、潘正祥、倪蓉蓉,授权日期:2010.9.29
6. 一种抗多种几何攻击的鲁棒水印方法,申请人:赵耀、田华伟、倪蓉蓉、秦伦明,授权日期:2012.5.30
7. 一种基于底层特征融合的图像视觉显著性计算方法,申请人:赵耀、田华伟、倪蓉蓉、秦伦明,授权日期:2016.3.7
8. 利用最高有效位的加密域可逆数字水印实现方法,申请人:倪蓉蓉、赵耀、刘瑞,授权日期:2017.11.6
9. 在三维网格模型中嵌入可见水印的方法,申请人:倪蓉蓉、赵耀、安新辰,授权日期:2019.04.04
10. 基于全稠密连接网络的空域图像隐写分析方法,申请人:赵耀、倪蓉蓉、吴艳红,授权日期:2020.12.08
11. 基于莫尔效应的半色调复印脆弱水印技术,申请人:倪蓉蓉,赵耀,王阳阳,授权日期:2020.12.25
12. 抵抗打印和重拍的盲数字图像水印方法,申请人:倪蓉蓉、赵耀、张萌萌,授权日期:2021.03.16
2016 教育部自然科学奖二等奖
2015 北京交通大学优秀教师
2014 北京市科学技术奖二等奖
2010 握奇奖教金
2009 詹天佑专项奖
2008 北京市科技新星
2008 教育部自然科学二等奖
入选IEEE信号处理学会Information Forensics and Security 的TC Member。担任ACM MM Area Chair。
中国计算机学会计算机视觉专委、中国图象图形学学会数字媒体取证与安全专委、中国图象图形学学会交通视频专委、中国图象图形学学会机器视觉专委。
主持了科技部重点研发计划课题、多项国家自然科学基金课题、多项北京市科委课题等。曾获得CCF-腾讯犀牛鸟科研基金。
担任科技部重点研发计划的视频评审专家,国家自然科学基金、北京自然科学基金、澳门科技基金、国家留学基金、教育部学位评估工作等的通信评审。
担任三十多个国内外重要的期刊和会议的审稿工作。