Name
Affiliation
Papers
MIN LONG
Changsha Univ Sci & Technol, Dept Comp & Commun Engn, Changsha, Hunan, Peoples R China
58
Collaborators
Citations 
PageRank 
63
179
23.63
Referers 
Referees 
References 
441
1005
523
Search Limit
1001000
Title
Citations
PageRank
Year
A Semi-Fragile Reversible Watermarking for Authenticating 2D Engineering Graphics Based on Improved Region Nesting50.412021
A Separable Reversible Data Hiding Scheme for Encrypted Images Based on Tromino Scrambling and Adaptive Pixel Value Ordering10.352020
A Coverless Image Information Hiding Algorithm Based On Fractal Theory00.342020
Reversible data hiding based on RSBEMD coding and adaptive multi-segment left and right histogram shifting00.342020
A Facial Privacy Protection Framework Based on Component Difference and Template Morphing00.342020
A Tunable Selective Encryption Scheme for H.265/HEVC Based on Chroma IPM and Coefficient Scrambling30.392020
CGR-GAN: CG facial image regeneration for anti-forensics based on generative adversarial network20.392020
Face presentation attack detection based on chromatic co-occurrence of local binary pattern and ensemble learning00.342020
Separable Robust Reversible Watermarking in Encrypted 2D Vector Graphics30.382020
Dynamic Provable Data Possession of Multiple Copies in Cloud Storage Based on Full-Node of AVL Tree10.342019
A reversible visible watermarking for 2D CAD engineering graphics based on graphics fusion.00.342019
FD-GAN: Face De-Morphing Generative Adversarial Network for Restoring Accomplice's Facial Image.00.342019
A reversible watermarking for authenticating 2D CAD engineering graphics based on iterative embedding and virtual coordinates10.352019
Reversible Data Hiding in Encrypted 2D Vector Graphics Based on Reversible Mapping Model for Real Numbers50.522019
Identifying natural images and computer generated graphics based on binary similarity measures of PRNU.20.372019
3-D Printed Object Authentication Based on Printing Noise and Digital Signature10.362019
Performance analysis of energy harvesting communications using multiple time slots00.342019
Source identification of 3D printed objects based on inherent equipment distortion.00.342019
Face Morphing Detection Using Fourier Spectrum of Sensor Pattern Noise.10.352018
Separable reversible data hiding and encryption for HEVC video.80.482018
Robust Coverless Image Steganography Based on DCT and LDA Topic Classification.70.452018
FD-GAN: Face-demorphing generative adversarial network for restoring accomplice's facial image.10.352018
A Perceptual Encryption Scheme For Hevc Video With Lossless Compression00.342018
Face presentation attack detection using guided scale texture.70.422018
Face spoofing detection based on color texture Markov feature and support vector machine recursive feature elimination.60.422018
A Format-Compliant Encryption for Secure HEVC Video Sharing in Multimedia Social Network00.342018
Outage performance of double-relay cooperative transmission network with energy harvesting.00.342018
CCoLBP: Chromatic Co-Occurrence of Local Binary Pattern for Face Presentation Attack Detection00.342018
A Formula Adaptive Pixel Pair Matching Steganography Algorithm.10.352018
Print-Scan Resilient Binary Map Watermarking Based on DCT and Scrambling00.342018
FIPIP: A novel fine-grained parallel partition based intra-frame prediction on heterogeneous many-core systems.10.362018
A Low-Distortion Reversible Watermarking for 2D Engineering Graphics Based on Region Nesting.20.372018
A Lossless Watermarking for 3D STL Model Based on Entity Rearrangement and Bit Mapping.00.342017
A Reversible Watermarking for 2D Vector Map Based on Triple Differences Expansion and Reversible Contrast Mapping.00.342017
Print-Scan Resilient Binary Map Watermarking Based On Extended Additive Noise Model And Scrambling00.342017
A selective encryption scheme for protecting H.264/AVC video in multimedia social network.70.472017
Identifying source camera using guided image estimation and block weighted average.40.442017
A reversible watermarking for authenticating 2D vector graphics based on bionic spider web.90.472017
Integrity Verification For Multiple Data Copies In Cloud Storage Based On Spatiotemporal Chaos20.412017
Content-Independent Face Presentation Attack Detection with Directional Local Binary Pattern.00.342017
Identification of Natural Images and Computer Generated Graphics Based on Multiple LBPs in Multicolor Spaces.00.342017
POSTER: Non-intrusive Face Spoofing Detection Based on Guided Filtering and Image Quality Analysis.00.342016
A novel parallelized motion estimation algorithm for GPU based video encoding10.392016
Fine-grained CUDA-based Parallel Intra Prediction for H.264/AVC30.402014
Reversible watermarking for 2D CAD engineering graphics based on improved histogram shifting90.502014
Identifying photographic images and photorealistic computer graphics using multifractal spectrum features of PRNU30.412014
An Effective Selective Encryption Scheme for H.264 Video based on Chaotic Qi System00.342013
Collision Analysis and Improvement of a Parallel Hash Function based on Chaotic Maps with Changeable Parameters10.352013
Analysis of collaborative spectrum sensing without dedicated sensing period00.342013
An ROI Privacy Protection Scheme for H.264 Video Based on FMO and Chaos150.722013
  • 1
  • 2