Min Wu   –   Research Overview

Research Interests

  • Information Security and Forensics

  • Signal and Data Science

  • Visual Computing, Multimedia Signal Processing and Communications

  • Applications of pattern recognitions, learning, and signal processing in biomedicine/healthcare and IoT.

Recent Highlights

Physiological Forensics | Fair/Secure Machine Learning | Media Forensics | More ML & Data Science

[Physiological Forensics and Smart Health] Can we track your heart rate without wearing or touching any sensors, even while you run on a treadmill? How about tracking your breathing? Can we track your ECG continuously without annoying stickers or keep holding onto sensors? Check out our research on physiological forensics exploring micro signals from video and other sensing modalities and visit this site to learn more:

  • M. Chen, Q. Zhu, Q. Wang, and M. Wu: “Modulation Model of the Photoplethysmography Signal for Vital Sign Extraction,” IEEE Journal of Biomedical and Health Informatics (J-BHI), published online Aug. 2020 for early access, PMID 32750983, vol. 25, no. 4, pp. 969-977, April 2021.

  • Q. Zhu, C-W. Wong, C-H. Fu, and M. Wu, “Fitness Heart Rate Measurement Using Face Videos,” Proc. of IEEE Int. Conf. on Image Processing (ICIP 2017), Beijing, China, Sept. 2017. [Video+Presentation]

  • Q. Zhu, M. Chen, C.-W. Wong, and M. Wu: “Adaptive Multi-Trace Carving for Robust Frequency Tracking in Forensic Applications,” IEEE Trans. on Info. Forensics and Security, vol. 15, pp. 1174 – 1189, 2020.

  • X. Tian, Q. Zhu, Y. Li, and M. Wu: “Cross-domain Joint Dictionary Learning for ECG Inference from PPG,” accepted for publication by the IEEE Internet of Things Journal, Dec. 2022, to appear 2023. DOI: 10.1109/JIOT.2022.3231862.

  • Q. Zhu, X. Tian, C.-W. Wong, and M. Wu: “Learning Your Heart Actions from Pulse: ECG Waveform Reconstruction From PPG,” IEEE Internet of Things Journal, vol. 8, no. 23, pp. 16734-16748, Dec. 2021. [ DOI link ]

  • F. Zhang, C. Wu, B. Wang, M. Wu, D. Bugos, H. Zhang, K.J. Liu: “SMARS: Sleep Monitoring via Ambient Radio Signal,” IEEE Trans. on Mobile Computing, published online Sept. 2019 for early access, vol. 20, no. 1, pp. 217-231, Jan. 2021.

  • X. Tian, C-W. Wong, S.M. Ranadive, and M. Wu: “A Multi-Channel Ratio-of-Ratios Method for Noncontact Hand Video-Based SpO2 Monitoring Using Smartphone Cameras,” IEEE Journal of Selected Topics in Signal Processing, Special Issue on Signal Analysis for Detection and Monitoring of Contagious Diseases, vol. 16, no. 2, pp. 197-207, Feb. 2022. [ DOI link ]

  • Z. Lazri, Q. Zhu, M. Chen, M. Wu, and Q. Wang: “Detecting Essential Landmarks Directly in Thermal Images for Remote Body Temperature and Respiratory Rate Measurement with a Two-Phase System,” IEEE Access, vol. 10, pp. 39080-39094, March 2022. [ https:doi.org10.1109ACCESS.2022.3161968> DOI link ]

[Fairness and Security of Machine Learning] The fast advancement of machine learning technologies prompts an increasing need of investigating issues of security and fairness. Check out our work in these areas as well as various applications of deep learning:

  • M. Chen and M. Wu: “Towards Threshold Invariant Fair Classification,” International Conference on Uncertainty in Artificial Intelligence (UAI 2020), Aug. 2020. [27.6% acceptance rate]

  • M. Chen, A. Shahverdi, S. Anderson, S.Y. Park, J. Zhang, D. Dachman-Soled, K. Lauter, and M. Wu: “Transparency Tools for Fairness in AI (Luskin),” Research in Mathematics and Public Policy, Springer AWM Series, vol. 23, pp. 47-80, Aug. 2020. [DOI link].

  • M. Chen and M. Wu: “Protect Your Deep Neural Networks from Piracy,” IEEE International Workshop on Information Forensics and Security (WIFS), Hong Kong, China, Dec. 2018.

[Media Forensics] When was a video captured? Where? Was the sound track captured together with the visual? Or added on later? Check out our work exploring environmental fingerprint from power grid and many other types of micro signals:

  • M. Wu: “Visualizing Micro Signals,” Plenary talk at the IEEE Int. Conf. on Image Processing (ICIP 2018), Athens, Greece, Oct. 2018. Video and slides are at the IEEE Signal Processing Resource Center.

  • C-W. Wong and M. Wu: “Counterfeit Detection Based on Unclonable Feature of Paper Using Mobile Camera,” IEEE Trans. on Info. Forensics and Security, vol. 12, no. 8, pp. 1885-1899, August 2017.

  • R. Garg, A.L. Varna and M. Wu, “ 'Seeing’ ENF: Natural Time Stamp for Digital Video via Optical Sensing and Signal Processing,” ACM Multimedia 2011, Best Student Paper Award. acceptance. An updated and expanded version will appear in IEEE Trans. on Info. Forensics & Security in 2013 (DOI: 10.1109/TIFS.2013.2272217).

  • W-H. Chuang, R. Garg, and M. Wu, "How Secure are Power Network Signature Based Time Stamps?” ACM CCS, Oct. 2012. [19% acceptance] An updated and expanded version will appear in IEEE Trans. on Info. Forensics & Security.

  • A. Hajj-Ahmad, R. Garg, and M. Wu: “ENF-Based Region-of-Recording Identification for Media Signals,” IEEE Trans. on Info. Forensics and Security, vol. 10, no. 6, pp. 1125-1136, June 2015.

  • J. Choi, C.W. Wong, A. Hajj-Ahmad, M. Wu, Y. Ren: “Invisible Geolocation Signature Extraction from a Single Image,” IEEE Trans. on Info. Forensics and Security, vol. 17, pp. 2598-2613, 2022. DOI: 10.1109/TIFS.2022.3185775.

  • M. Stamm, M. Wu, and K.J.R. Liu, “Information Forensics: An Overview of the First Decade,” invited paper for the inaugural issue, IEEE Access, vol. 1, 2013.

  • A. Swaminathan, M. Wu, and K.J.R. Liu: “Non-intrusive Component Forensics of Visual Sensors Using Output Images,” IEEE Trans. on Info. Forensics and Security, vol. 2, no. 1, pp. 91-106, March 2007.

  • A. Swaminathan, M. Wu, and K.J.R. Liu: “Digital Image Forensics via Intrinsic Fingerprints,” IEEE Trans. on Info. Forensics and Security, vol. 3, no. 1, pp.101-117, March 2008.

  • H. Gou, A. Swaminathan, and M. Wu: “Intrinsic Sensor Noise Features for Forensic Analysis on Scanners and Scanned Images,” IEEE Trans. on Info. Forensics and Security, vol. 4, no. 3, pp. 476-491, September 2009.

[Other Work Related to Machine Learning and Signal & Data Science]

  • F. Wang, K. Zheng, L. Lu, J. Xiao, M. Wu, and S. Miao: “Automatic Vertebra Localization and Identification in CT by Spine Rectification and Anatomically-constrained Optimization,” Proc. of IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR’21). [27% acceptance rate]

  • M. Chen, X. Liao, and M. Wu: “PulseEdit: Editing Physiological Signal in Facial Videos for Privacy Protection,” IEEE Trans. on Info. Forensics and Security, vol. 17, pp. 457-471, 2022, DOI 10.1109/TIFS.2022.3142993.

  • A.L. Varna and M. Wu: “Modeling and Analysis of Correlated Binary Fingerprints for Content Identification,” IEEE Trans. on Info. Forensics and Security, vol. 6, no. 3, pp. 1146-1159, September 2011.

  • A. Kazemipour, M. Wu, and B. Babadi: "Robust Estimation of Self-Exciting Generalized Linear Models with Application to Neuronal Modeling,” IEEE Trans. on Signal Processing, vol. 65, no. 14, pp. 3733-3748, July 2017.

  • A. Kazemipour, J. Liu, P. Kanold, M. Wu, B. Babadi, “Fast and Stable Signal Deconvolution for Compressible State-Space Models,” IEEE Trans. on Biomedical Engineering, online publication April 2017, hard copy at vol. 65, no. 1, pp.74-86, January 2018.

Earlier Work

Data Hiding | Security/Privacy Protection | Media Communications

[Data Hiding and Embedded Fingerprinting]

  • M. Wu, W. Trappe, Z. Wang, and K.J.R. Liu: “Collusion Resistant Fingerprinting for Multimedia”, IEEE Signal Processing Magazine, Special Issue on Digital Rights Management, vol. 21, no. 2, pp.15-27, March 2004.

  • W. Trappe, M. Wu, Z. Wang, and K.J.R. Liu: “Anti-collusion Fingerprinting for Multimedia”, IEEE Trans. on Signal Processing, Special issue on Signal Processing for Data Hiding in Digital Media and Secure Content Delivery, vol. 51, no. 4, pp.1069-1087, April 2003. 2005 IEEE Signal Processing Society Best Paper Award

  • H. Gou and M. Wu: “Data Hiding in Curves with Applications to Fingerprinting Maps,” IEEE Trans. on Signal Proc., Special Issue on Secure Media, vol. 53, no. 10, pp. 3988-4005, Oct. 2005.

  • S. He and M. Wu: “Joint Coding and Embedding Techniques for Multimedia Fingerprinting,” IEEE Trans. on Info. Forensics and Security, vol. 1, no. 2, pp. 231-247, June 2006.

  • M. Wu and B. Liu: “Data Hiding in Binary Image for Authentication and Annotation”, IEEE Trans. on Multimedia, vol. 6, no. 4, pp.528-538, August 2004.

  • M. Wu and B. Liu: “Data Hiding in Image and Video: Part-I – Fundamental Issues and Solutions” and “Part-II – Designs and Applications” (also with H. Yu), IEEE Trans. on Image Proc., vol.12, no.6, June 2003.

  • A. Swaminathan, Y. Mao, M. Wu, and Krishnan Kailas: “Data Hiding in Compiled Program Binaries for Enhancing Computer System Performance,” 7th International Information Hiding Workshop (IHW), Barcelona, Spain, and Lecture Notes in Computer Science (LNCS), vol. 3727, pp.357-371, June 2005. rate 31%

[Security and Privacy Protection]

  • W. Lu, A.L. Varna, and M. Wu: “Confidentiality-Preserving Image Search: A Comparative Study between Homomorphic Encryption and Distance-Preserving Randomization,” IEEE Access, vol. 2, pp. 125-141, 2014.

  • A. Swaminathan, Y. Mao, G-M. Su, H. Gou, A.L. Varna, S. He, M. Wu, and D. Oard, “Confidentiality-Preserving Rank-Ordered Search,” 3rd ACM International Workshop on Storage Security and Survivability (StorageSS 2007), pp. 7-12, Alexandria, VA, Oct. 2007.

  • R. Garg, A.L. Varna, and M. Wu: “An Efficient Gradient Descent Approach for Secure Localization in Resource Constrained Wireless Sensor Networks,” IEEE Trans. on Info. Forensics and Security, vol. 7, no. 2, pp. 717-730, April 2012.

  • Y. Mao and M. Wu: “Tracing Malicious Relay Nodes in Cooperative Wireless Communications,” IEEE Trans. on Info. Forensics and Security, vol. 2, no. 2, pp. 198-212, June 2007.

  • Y. Mao and M. Wu: “Coordinated Sensor Deployment for Improving Secure Communications and Sensing Coverage,” Proc. of ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN’2005), Alexandria, VA, pp.117-128, Nov. 2005. rate 33%

  • Y. Mao and M. Wu: “A Joint Signal Processing and Cryptographic Approach to Multimedia Encryption”, IEEE Trans. on Image Processing, vol. 15, no. 7, pp. 2061-2075, July 2006.

  • Y. Mao, Y. Sun, M. Wu, and K.J.R. Liu: “JET: Dynamic Join-Exit-Tree Amortization and Scheduling for Contributory Key Agreement”, ACM/IEEE Trans. on Networking, vol. 14, no. 5, pp. 1128-1140, Oct. 2006. Earlier conf. version appeared in INFOCOM 2004.

[Media Communications and Resource Allocation]

M. Chen, Y-F. Zheng^, and M. Wu: “Classification-Based Spatial Error Concealment for Visual Communications,” EURASIP Journal on Applied Signal Processing, Special Issue on Video Analysis and Coding for Robust Transmission, 2006.

G-M. Su and M. Wu: “Efficient Bandwidth Resource Allocation for Low-Delay Multiuser Video Streaming,” IEEE Trans. on Circuits and Systems for Video Technologies, vol. 15, no. 9, pp. 1124-1137, Sept. 2005.

G-M. Su, Z. Han, M. Wu, and K.J.R. Liu, “Multiuser Cross-Layer Resource Allocation for Video Transmission over Wireless Networks,” IEEE Network Magazine, Special Issue on Multimedia over Broadband Wireless Networks, vol. 20, no. 2, pp.21-27, March 2006.

G-M. Su, Z. Han, M. Wu, and K.J.R. Liu, “A Scalable Multiuser Framework for Video Over OFDM Networks: Fairness and Efficiency”, IEEE Trans. on Circuits and Systems for Video Technologies, vol. 16, no. 10, pp.1217-1231, Oct. 2006.

Z. Han, G-M. Su, A. Kwasinski, M. Wu and K.J.R. Liu: “Distortion Management of Real-time MPEG-4 FGS Video Over Downlink Multi-code CDMA Networks”, IEEE Trans. on Wireless Communications, vol. 5, no. 11, pp.3056-3067, Nov. 2006.

M. Chen, G-M. Su, and M. Wu: “Dynamic Resource Allocation for Robust Distributed Multi-Point Video Conferencing,” IEEE Trans. on Multimedia, vol. 10, no. 5, pp. 910-925, August 2008.


Acknowledgement

I have served as PI/Co-PI of research funding totaling about $8 million. Sincere thanks for the valuable support from government agencies (NSF, AFOSR, ONR, other DoD offices, NIST, State of Maryland, etc.) and industry partners!


(v.202301)