Остановите войну!
for scientists:
default search action
Min Long
Publications
- 2024
- [j77]Min Long, Jun Zhou, Le-Bing Zhang, Fei Peng, Dengyong Zhang:
ADFF: Adaptive de-morphing factor framework for restoring accomplice's facial image. IET Image Process. 18(2): 470-480 (2024) - [j76]Min Long, Quantao Yao, Le-Bing Zhang, Fei Peng:
Face De-Morphing Based on Diffusion Autoencoders. IEEE Trans. Inf. Forensics Secur. 19: 3051-3063 (2024) - [j75]Gangyang Hou, Bo Ou, Min Long, Fei Peng:
Separable Reversible Data Hiding for Encrypted 3D Mesh Models Based on Octree Subdivision and Multi-MSB Prediction. IEEE Trans. Multim. 26: 2395-2407 (2024) - 2023
- [j72]Yan He, Fei Peng, Min Long:
Dynamic Residual Distillation Network for Face Anti-Spoofing With Feature Attention Learning. IEEE Trans. Biom. Behav. Identity Sci. 5(4): 579-592 (2023) - [j71]Fei Peng, Tongxin Liao, Min Long, Jin Li, Wensheng Zhang, Yicong Zhou:
Semi-Fragile Reversible Watermarking for 3D Models Using Spherical Crown Volume Division. IEEE Trans. Circuits Syst. Video Technol. 33(11): 6531-6543 (2023) - [j70]Fei Peng, Wenyan Jiang, Min Long, Keqin Li:
A Reversible Watermarking for 2D Engineering Graphics Based on Difference Expansion With Adaptive Interval Partitioning. IEEE Trans. Dependable Secur. Comput. 20(3): 1867-1881 (2023) - [j69]Fei Peng, Bo Long, Min Long:
A Semi-Fragile Reversible Watermarking for Authenticating 3D Models Based on Virtual Polygon Projection and Double Modulation Strategy. IEEE Trans. Multim. 25: 892-906 (2023) - [j68]Fei Peng, Wenyan Jiang, Min Long:
A Low Distortion and Steganalysis-resistant Reversible Data Hiding for 2D Engineering Graphics. ACM Trans. Multim. Comput. Commun. Appl. 19(2): 53:1-53:20 (2023) - 2022
- [j67]Fei Peng, Shao-hua Meng, Min Long:
Presentation attack detection based on two-stream vision transformers with self-attention fusion. J. Vis. Commun. Image Represent. 85: 103518 (2022) - [j66]Fei Peng, Le Qin, Min Long:
Face morphing attack detection and attacker identification based on a watchlist. Signal Process. Image Commun. 107: 116748 (2022) - [j65]Fei Peng, Guanfu Chen, Min Long:
A Robust Coverless Steganography Based on Generative Adversarial Networks and Gradient Descent Approximation. IEEE Trans. Circuits Syst. Video Technol. 32(9): 5817-5829 (2022) - [j64]Fei Peng, Liping Yin, Min Long:
BDC-GAN: Bidirectional Conversion Between Computer-Generated and Natural Facial Images for Anti-Forensics. IEEE Trans. Circuits Syst. Video Technol. 32(10): 6657-6670 (2022) - [j63]Fei Peng, Tongxin Liao, Min Long:
A Semi-Fragile Reversible Watermarking for Authenticating 3D Models in Dual Domains Based on Variable Direction Double Modulation. IEEE Trans. Circuits Syst. Video Technol. 32(12): 8394-8408 (2022) - [j62]Le Qin, Fei Peng, Min Long:
Face Morphing Attack Detection and Localization Based on Feature-Wise Supervision. IEEE Trans. Inf. Forensics Secur. 17: 3649-3662 (2022) - [j61]Le Qin, Fei Peng, Min Long, Raghavendra Ramachandra, Christoph Busch:
Vulnerabilities of Unattended Face Verification Systems to Facial Components-based Presentation Attacks: An Empirical Study. ACM Trans. Priv. Secur. 25(1): 4:1-4:28 (2022) - [c27]Fei Peng, Shao-hua Meng, Min Long:
Face Presentation Attack Detection Based on Texture Gradient Enhancement and Multi-scale Fusion. ML4CS (2) 2022: 283-298 - [c26]Fei Peng, Xin-lin Zhang, Min Long:
F2DLNet: A Face Forgery Detection and Localization Network Based on SSIM Error Maps. ML4CS (2) 2022: 355-369 - [c25]Min Long, Cheng-kun Jia, Fei Peng:
Face Morphing Detection Based on a Two-Stream Network with Channel Attention and Residual of Multiple Color Spaces. ML4CS (3) 2022: 439-454 - 2021
- [j58]Min Long, Sai Long, Fei Peng, Xiao-hua Hu:
Identifying natural images and computer-generated graphics based on convolutional neural network. Int. J. Auton. Adapt. Commun. Syst. 14(1/2): 151-162 (2021) - [j57]Le Qin, Fei Peng, Sushma Venkatesh, Raghavendra Ramachandra, Min Long, Christoph Busch:
Low Visual Distortion and Robust Morphing Attacks Based on Partial Face Image Manipulation. IEEE Trans. Biom. Behav. Identity Sci. 3(1): 72-88 (2021) - [j55]Fei Peng, Zi-Xing Lin, Xiang Zhang, Min Long:
A Semi-Fragile Reversible Watermarking for Authenticating 2D Engineering Graphics Based on Improved Region Nesting. IEEE Trans. Circuits Syst. Video Technol. 31(1): 411-424 (2021) - [j54]Fei Peng, Bo Long, Min Long:
A General Region Nesting-Based Semi-Fragile Reversible Watermarking for Authenticating 3D Mesh Models. IEEE Trans. Circuits Syst. Video Technol. 31(11): 4538-4553 (2021) - [c23]Le-Bing Zhang, Juan Cai, Fei Peng, Min Long:
MSA-CNN: Face Morphing Detection via a Multiple Scales Attention Convolutional Neural Network. IWDW 2021: 17-31 - 2020
- [j53]Xiang Zhang, Fei Peng, Zi-Xing Lin, Min Long:
A Coverless Image Information Hiding Algorithm Based on Fractal Theory. Int. J. Bifurc. Chaos 30(4): 2050062:1-2050062:20 (2020) - [j51]Fei Peng, Le Qin, Min Long:
Face presentation attack detection based on chromatic co-occurrence of local binary pattern and ensemble learning. J. Vis. Commun. Image Represent. 66: 102746 (2020) - [j49]Min Long, Yu Zhao, Xiang Zhang, Fei Peng:
A separable reversible data hiding scheme for encrypted images based on Tromino scrambling and adaptive pixel value ordering. Signal Process. 176: 107703 (2020) - [j48]Fei Peng, Yu Zhao, Xiang Zhang, Min Long, Weiqiang Pan:
Reversible data hiding based on RSBEMD coding and adaptive multi-segment left and right histogram shifting. Signal Process. Image Commun. 81 (2020) - [j47]Fei Peng, Wen-Yan Jiang, Ying Qi, Zi-Xing Lin, Min Long:
Separable Robust Reversible Watermarking in Encrypted 2D Vector Graphics. IEEE Trans. Circuits Syst. Video Technol. 30(8): 2391-2405 (2020) - [j46]Fei Peng, Xiang Zhang, Zi-Xing Lin, Min Long:
A Tunable Selective Encryption Scheme for H.265/HEVC Based on Chroma IPM and Coefficient Scrambling. IEEE Trans. Circuits Syst. Video Technol. 30(8): 2765-2780 (2020) - [j45]Fei Peng, Liping Yin, Le-Bing Zhang, Min Long:
CGR-GAN: CG Facial Image Regeneration for Antiforensics Based on Generative Adversarial Network. IEEE Trans. Multim. 22(10): 2511-2525 (2020) - [c22]Min Long, Sai Long, Guo-lou Ping, Fei Peng:
A Facial Privacy Protection Framework Based on Component Difference and Template Morphing. ICCCN 2020: 1-9 - [c21]Fei Peng, Wenjie Qian, Min Long:
Visible Reversible Watermarking for 3D Models Based on Mesh Subdivision. IWDW 2020: 136-149 - 2019
- [j44]Fei Peng, Le-Bing Zhang, Min Long:
FD-GAN: Face De-Morphing Generative Adversarial Network for Restoring Accomplice's Facial Image. IEEE Access 7: 75122-75131 (2019) - [j43]Fei Peng, Jing Yang, Zi-Xing Lin, Min Long:
Source identification of 3D printed objects based on inherent equipment distortion. Comput. Secur. 82: 173-183 (2019) - [j41]Min Long, You Li, Fei Peng:
Dynamic Provable Data Possession of Multiple Copies in Cloud Storage Based on Full-Node of AVL Tree. Int. J. Digit. Crime Forensics 11(1): 126-137 (2019) - [j39]Min Long, Fei Peng, Yin Zhu:
Identifying natural images and computer generated graphics based on binary similarity measures of PRNU. Multim. Tools Appl. 78(1): 489-506 (2019) - [j38]Fei Peng, Qin Long, Zi-Xing Lin, Min Long:
A reversible watermarking for authenticating 2D CAD engineering graphics based on iterative embedding and virtual coordinates. Multim. Tools Appl. 78(19): 26885-26905 (2019) - [j37]Fei Peng, Wang Ming, Xiang Zhang, Min Long:
A reversible visible watermarking for 2D CAD engineering graphics based on graphics fusion. Signal Process. Image Commun. 78: 426-436 (2019) - [j36]Fei Peng, Zi-Xing Lin, Xiang Zhang, Min Long:
Reversible Data Hiding in Encrypted 2D Vector Graphics Based on Reversible Mapping Model for Real Numbers. IEEE Trans. Inf. Forensics Secur. 14(9): 2400-2411 (2019) - [j35]Fei Peng, Jing Yang, Min Long:
3-D Printed Object Authentication Based on Printing Noise and Digital Signature. IEEE Trans. Reliab. 68(1): 342-353 (2019) - 2018
- [j32]Min Long, Fei Peng, Xiaoqing Gong:
A Format-Compliant Encryption for Secure HEVC Video Sharing in Multimedia Social Network. Int. J. Digit. Crime Forensics 10(2): 23-39 (2018) - [j31]Fei Peng, Shuai-ping Wang, Min Long:
Print-Scan Resilient Binary Map Watermarking Based on DCT and Scrambling. Int. J. Digit. Crime Forensics 10(4): 80-89 (2018) - [j30]Min Long, Fei Peng, Han-yun Li:
Separable reversible data hiding and encryption for HEVC video. J. Real Time Image Process. 14(1): 171-182 (2018) - [j29]Le-Bing Zhang, Fei Peng, Le Qin, Min Long:
Face spoofing detection based on color texture Markov feature and support vector machine recursive feature elimination. J. Vis. Commun. Image Represent. 51: 56-69 (2018) - [j28]Fei Peng, Le Qin, Min Long:
Face presentation attack detection using guided scale texture. Multim. Tools Appl. 77(7): 8883-8909 (2018) - [j26]Zi-Xing Lin, Fei Peng, Min Long:
A Low-Distortion Reversible Watermarking for 2D Engineering Graphics Based on Region Nesting. IEEE Trans. Inf. Forensics Secur. 13(9): 2372-2382 (2018) - [j25]Xiang Zhang, Fei Peng, Min Long:
Robust Coverless Image Steganography Based on DCT and LDA Topic Classification. IEEE Trans. Multim. 20(12): 3223-3238 (2018) - [c20]Fei Peng, Le Qin, Min Long:
CCoLBP: Chromatic Co-Occurrence of Local Binary Pattern for Face Presentation Attack Detection. ICCCN 2018: 1-9 - [c19]Le-Bing Zhang, Fei Peng, Min Long:
Face Morphing Detection Using Fourier Spectrum of Sensor Pattern Noise. ICME 2018: 1-6 - [i1]Fei Peng, Le-Bing Zhang, Min Long:
FD-GAN: Face-demorphing generative adversarial network for restoring accomplice's facial image. CoRR abs/1811.07665 (2018) - 2017
- [j24]Min Long, You Li, Fei Peng:
Integrity Verification for Multiple Data Copies in Cloud Storage Based on Spatiotemporal Chaos. Int. J. Bifurc. Chaos 27(4): 1750054:1-1750054:12 (2017) - [j23]Juan Chen, Fei Peng, Jie Li, Min Long:
A Lossless Watermarking for 3D STL Model Based on Entity Rearrangement and Bit Mapping. Int. J. Digit. Crime Forensics 9(2): 25-37 (2017) - [j22]Le-Bing Zhang, Fei Peng, Min Long:
Identifying source camera using guided image estimation and block weighted average. J. Vis. Commun. Image Represent. 48: 471-479 (2017) - [j21]Fei Peng, Xiaoqing Gong, Min Long, Xingming Sun:
A selective encryption scheme for protecting H.264/AVC video in multimedia social network. Multim. Tools Appl. 76(3): 3235-3253 (2017) - [j20]Zi-Xing Lin, Fei Peng, Min Long:
A reversible watermarking for authenticating 2D vector graphics based on bionic spider web. Signal Process. Image Commun. 57: 134-146 (2017) - [c18]Le Qin, Le-Bing Zhang, Fei Peng, Min Long:
Content-Independent Face Presentation Attack Detection with Directional Local Binary Pattern. CCBR 2017: 118-126 - [c17]Zinelabdine Boulkenafet, Jukka Komulainen, Zahid Akhtar, Azeddine Benlamoudi, Djamel Samai, Salah Eddine Bekhouche, Abdelkrim Ouafi, Fadi Dornaika, Abdelmalik Taleb-Ahmed, Le Qin, Fei Peng, L. B. Zhang, Min Long, Shruti Bhilare, Vivek Kanhangad, Artur Costa-Pazo, Esteban Vázquez-Fernández, Daniel Pérez-Cabo, J. J. Moreira-Perez, Daniel González-Jiménez, Amir Mohammadi, Sushil Bhattacharjee, Sébastien Marcel, Svetlana Volkova, Y. Tang, N. Abe, L. Li, X. Feng, Z. Xia, X. Jiang, S. Liu, Rui Shao, Pong C. Yuen, Waldir R. de Almeida, Fernanda A. Andaló, Rafael Padilha, Gabriel Bertocco, William Dias, Jacques Wainer, Ricardo da Silva Torres, Anderson Rocha, Marcus A. Angeloni, Guilherme Folego, Alan Godoy, Abdenour Hadid:
A competition on generalized software-based face presentation attack detection in mobile scenarios. IJCB 2017: 688-696 - [c16]Fei Peng, Shuai-ping Wang, Gang Luo, Min Long:
Print-Scan Resilient Binary Map Watermarking Based on Extended Additive Noise Model and Scrambling. ICCCS (1) 2017: 3-15 - [c15]Juan Chen, Fei Peng, Min Long:
A Perceptual Encryption Scheme for HEVC Video with Lossless Compression. ICCCS (2) 2017: 396-407 - [c14]Fei Peng, Zhen-Jie Yan, Min Long:
A Reversible Watermarking for 2D Vector Map Based on Triple Differences Expansion and Reversible Contrast Mapping. SpaCCS Workshops 2017: 147-158 - [c13]Fei Peng, Xiao-hua Hu, Min Long:
Identification of Natural Images and Computer Generated Graphics Based on Multiple LBPs in Multicolor Spaces. SpaCCS 2017: 368-380 - 2016
- [j19]Qiuwei Yang, Fei Peng, Jiao-Ting Li, Min Long:
Image tamper detection based on noise estimation and lacunarity texture. Multim. Tools Appl. 75(17): 10201-10211 (2016) - [c11]Le-Bing Zhang, Fei Peng, Min Long:
Source Camera Identification Based on Guided Image Estimation and Block Weighted Average. IWDW 2016: 106-118 - [c10]Fei Peng, Le Qin, Min Long:
POSTER: Non-intrusive Face Spoofing Detection Based on Guided Filtering and Image Quality Analysis. SecureComm 2016: 774-777 - 2015
- [j18]Min Long, Yan Liu, Fei Peng:
A Semi-Fragile Reversible Watermarking for 2D CAD Engineering Graphics with Accurate Tampering Localization. Int. J. Digit. Crime Forensics 7(3): 1-18 (2015) - [c8]Fei Peng, Yin Zhu, Min Long:
Identification of Natural Images and Computer Generated Graphics Using Multi-fractal Differences of PRNU. ICA3PP (2) 2015: 213-226 - 2014
- [j17]Fei Peng, Yan Liu, Min Long:
Reversible watermarking for 2D CAD engineering graphics based on improved histogram shifting. Comput. Aided Des. 49: 42-50 (2014) - [c7]Fei Peng, Jiaoling Shi, Min Long:
Identifying photographic images and photorealistic computer graphics using multifractal spectrum features of PRNU. ICME 2014: 1-6 - 2013
- [j11]Fei Peng, Xiao-wen Zhu, Min Long:
An Effective Selective Encryption Scheme for H.264 Video based on Chaotic Qi System. Int. J. Digit. Crime Forensics 5(2): 35-49 (2013) - [j9]Fei Peng, Chen Li, Min Long:
A reversible watermark scheme for 2D vector map based on reversible contrast mapping. Secur. Commun. Networks 6(9): 1117-1125 (2013) - [j8]Fei Peng, Xiao-wen Zhu, Min Long:
An ROI Privacy Protection Scheme for H.264 Video Based on FMO and Chaos. IEEE Trans. Inf. Forensics Secur. 8(10): 1688-1699 (2013) - 2012
- [j6]Min Long, Yunfei Chen, Fei Peng:
Bit error rate improvement for chaos shift keying chaotic communication systems. IET Commun. 6(16): 2639-2644 (2012) - [j5]Fei Peng, Juan Liu, Min Long:
Identification of Natural Images and Computer Generated Graphics Based on Hybrid Features. Int. J. Digit. Crime Forensics 4(1): 1-16 (2012) - 2011
- [j3]Fei Peng, Yu-Zhou Lei, Min Long, Xingming Sun:
A reversible watermarking scheme for two-dimensional CAD engineering graphics based on improved difference expansion. Comput. Aided Des. 43(8): 1018-1024 (2011) - [j2]Min Long, Yunfei Chen, Fei Peng:
Simple and Accurate Analysis of BER Performance for DCSK Chaotic Communication. IEEE Commun. Lett. 15(11): 1175-1177 (2011) - 2010
- [j1]Fei Peng, Re-Si Guo, Chang-Tsun Li, Min Long:
A semi-fragile watermarking algorithm for authenticating 2D CAD engineering graphics based on log-polar transformation. Comput. Aided Des. 42(12): 1207-1216 (2010) - 2009
- [c4]Fei Peng, Re-Si Guo, Chang-Tsun Li, Min Long:
A Semi-fragile Watermarking Algorithm for Authenticating 2D Engineering Graphics Based on Log-Polar Transformation. ISDF 2009: 11-18 - 2008
- [c3]Fei Peng, Tao Deng, Min Long:
A Strength Variable Encryption Algorithm for 2D Engineering Graphic Based on Discrete Cosine Descriptors and Chaos Scrambling. ICYCS 2008: 2809-2813
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-03-24 00:11 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint