2021 International Conference on Electronic Information Engineering and Computer Technology(EIECT 2021)
Countdown
Prof. Yulin Wang

王玉林-116x180.jpg

Prof. Yulin Wang

Wuhan University

Reasearch Area: image and video processing, digital rights management, information security,intelligent system, e-commerce, loT, code clone

Yulin Wang is a full professor in the School of Computer Science, Wuhan University, China. His research interests include image and video processing, digital rights management, information security, intelligent system, e-commerce, IoT, code clone and so on.

He got his PhD degree from University of London, UK. He got his master and bachelor degree from Huazhong University of Science and TechnologyHUSTand Xi-Dian University respectively, both in China.

Prof. Wang served as EiC of 2 international journals and reviewer of top IEEE and ACM journals. He also served as reviewer of Innovative talents projects and national  research funds, including National High Technology Research and Development Program of China. Prof. Wang was the external PhD advisor of Dublin City University, Ireland during 2008-2010.

In recently 10 years, Prof. Wang served as chairman of more than 10 international conferences, and keynote speakers in more than 20 international conferences. Besides UK, he visited US, France,Italy, Portugal,Croatia, Australia, Germany, korea, Ireland,Singapore, Malaysia, Japan, and Hong Kong. In addition, Prof. Wang has been appointed as the deputy director of Hubei provincial science and technology commission (CAPD) since 2014.

Keynote Speech Topic:

 Image Authentication and Tamper Localization

Abstract:

Image authentication can be used in many fields, including e-government, e-commerce, national security, news pictures, court evidence, medical image, engineering design, and so on. Since some content-preserving manipulations, such as JPEG compression, contrast enhancement, and brightness adjustment, are often acceptable—or even desired—in practical application, an authentication method needs to be able to distinguish them from malicious tampering, such as removal, addition, and modification of objects. Therefore, the traditional hash-based authentication is not suitable for the application. As for the semi-fragile watermarking technique, it meets the requirements of the above application at the expense of severely damaging image fidelity. In this talk, we propose a hybrid authentication technique based on what we call fragile hash value. The technique can blindly detect and localize malicious tampering, while maintaining reasonable tolerance to conventional content-preserving manipulations. The hash value is derived from the relative difference between each pair of the selected DCT coefficient in a central block and its counterpart which is estimated by the DC values of the center block and its adjacent blocks. In order to maintain the relative difference relationship when the image undergoes legitimate processing, we make a pre-compensation for the coefficients. Finally, we point out the direction using deep leaning technique for image authentication.