Chi Man PUN潘治文
Associate Professor
Department of Computer and Information Science

Academic Qualifications | Working Experience | Teaching | Research | Patents | Selected Publications | Professional Affiliations | Contact Details


Academic Qualification

  • Ph.D. in Computer Science and Engineering, The Chinese University of Hong Kong, Hong Kong (2002)
  • M.Sc. in Software Engineering, University of Macau, Macau (1998)
  • B.Sc. in Software Engineering, University of Macau, Macau (1995)

Working Experience

  • 2014 – 2019        Head, Department of Computer and Information Science, University of Macau, Macau
  • 2008 –                  Present Associate Professor, Department of Computer and Information Science, University of Macau, Macau
  • 2002 – 2008        Assistant Professor, Department of Computer and Information Science, University of Macau, Macau

Teaching

B.Sc. Courses

1. CISC3011 Digital Image Processing
2. CISC3024 Pattern Recognition
3. CISC3027 Special Topics in Computer and Information Science

M.Sc. Courses

1. CISC7016 Advanced Topics in Computer Science II
2. CISC7018 Advances in Pattern Recognition
3. CISC7108 Advanced Computer Graphics and Multimedia

Ph.D. Course

1. CISC8001 Advanced Topics in Computer Science

Principal Thesis Supervision:

PhD: 10 Graduates, MSc: 8 Graduates


Research

Research Interests

  • Information Security, Forensic and Privacy for Multimedia and Machine Learning;
  • Image Processing and Pattern Recognition;

Recent Research Projects with External Grants

  1. Research on Information Security and Privacy in Machine Learning, funded by the Macau Science and Technology Fund, FDCT/0019/2019/A, Principal Investigator, 2019-2021, on-going.
  2. Efficient Searching Methods for Multimedia Tampering Detection, funded by the Macau Science and Technology Fund, FDCT 041/2017/A1, Principal Investigator, 2017-2020, on-going.
  3. Feature Based Approaches for Multimedia Security and Watermarking, funded by the Macau Science and Technology Fund, FDCT 093/2014/A2, Principal Investigator, 2015-2018, completed.
  4. Research and Application in Object Tracking and Recognition, funded by the Macau Science and Technology Fund, FDCT 008/2013/A1, Principal Investigator, 2013-2016, completed.
  5. Robust and Geometric Invariant Digital Image Watermarking, funded by the Macau Science and Technology Fund, FDCT 034/2010/A2, Principal Investigator, 2011-2014, completed.

Patents

  1. C.-M. Pun, and C. Lin, “A Real-time Detector for Parked Vehicles Based on Hybrid Background Modeling,” US Patent, Granted, US010261574, April 16, 2019.
  2. C.-M. Pun, K.-C. Choi and C. L. Philip Chen“Reversible Audio Data Hiding,” US Patent, Granted, US9396733, July 19, 2016.
  3. C.-M. Pun, and C.-P. Yan, “Image Alignment based Multi-Region Matching for Object-level Tampering Detection,” US Patent, Filed no. 62/484,115, 17 April 2017.

Selected Publications

Journals

  1. X. Cun and C.-M. Pun, “Improving the Harmony of the Composite Image by Spatial-Separated Attention Module,” IEEE Transactions on Image Processing (TIP), In Press, 2020. (JCR Q1, CCF A)
  2. J.-C. Xie and C.-M. Pun, “Deep and Ordinal Ensemble Learning for Human Age Estimation From Facial Images,” IEEE Transactions on Information Forensics and Security (TIFS), 15(1), pp. 2361 – 2374, 2020. (JCR Q1, CCF A)
  3. J.-L. Zhong and C.-M. Pun, “An End-to-End Dense-InceptionNet for Image Copy-Move Forgery Detection,” IEEE Transactions on Information Forensics and Security (TIFS), 15(1), pp. 2134 – 2146, 2020. (JCR Q1, CCF A)
  4. C. Shi and C.-M. Pun, “Multiscale Superpixel-based Hyperspectral Image Classification Using Recurrent Neural Networks with Stacked Autoencoders,” IEEE Transactions on Multimedia (TMM), 22(2), pp. 487 – 501, 2020. (JCR Q1, CCF B)
  5. G. Zhong and C.-M. Pun, “Nonnegative self-representation with a fixed rank constraint for subspace clustering,” Information Sciences, 518(5), pp. 127-141, 2020. (JCR Q1, CCF B)
  6. Y. Xiao, C.-M. Pun and B. Liu, “Crafting adversarial example with adaptive root mean square gradient on deep neural networks,” Neurocomputing, In Press, 2020. (JCR Q1)
  7. B. Liu and C.-M. Pun, “Locating splicing forgery by adaptive-SVD noise estimation and vicinity noise descriptor,” Neurocomputing, In Press, 2020. (JCR Q1)
  8. G. Zhong and C.-M. Pun, “Subspace clustering by simultaneously feature selection and similarity learning,” Knowledge-Based Systems, In Press, 2020. (JCR Q1)
  9. Z. Tang, H. Nie, C.-M. Pun, H. Yao, C. Yu and X. Zhang, “Color Image Reversible Data Hiding With Double-Layer Embedding,” IEEE Access, 8(1), pp. 6915 – 6926, 2020. (JCR Q1)
  10. F. Xu, H. Li, C.-M. Pun, H. Hu, Y. Li, Y. Song and H. Gao, “A new global best guided artificial bee colony algorithm with application in robot path planning,” Applied Soft Computing, 88(3), pp. 1-31, 2020. (JCR Q1)
  11. J.-L. Zhong and C.-M. Pun, “Two-pass hashing feature representation and searching method for copy-move forgery detection,” Information Sciences, 512(2), pp. 675-692, 2020. (JCR Q1, CCF B)
  12. J.-C. Xie and C.-M. Pun, “Chronological Age Estimation under the Guidance of Age-related Facial Attributes,” IEEE Transactions on Information Forensics and Security (TIFS), 14(9), pp.2500 – 2511, 2019. (JCR Q1, CCF A)
  13. F. Xu, C.M Pun, H. Li, Y. Zhang, Y. Song, H. Gao, “Training Feed-Forward Artificial Neural Networks with a Modified Artificial Bee Colony Algorithm,” Neurocomputing, In Press, 2019. (JCR Q1)
  14. C. Shi and C.-M. Pun, “Adaptive multi-scale deep neural networks with perceptual loss for panchromatic and multispectral images classification,” Information Sciences, 490, pp. 1-17, 2019. (JCR Q1, CCF B)
  15. R. Lu, H. Hu, M. Xi,  H. Gao, and C.-M. Pun, “An improved artificial bee colony algorithm with fast strategy, and its application,” Computers & Electrical Engineering, 78(9), pp. 79-88, 2019.(JCR Q2)
  16. Z.-L. Liu and C.-M. Pun, “Reversible image reconstruction for reversible data hiding in encrypted images,” Signal Processing, 161, pp. 50-62, 2019. (JCR Q1)
  17. J.-L. Zhong and C.-M. Pun, “Copy-move forgery detection using adaptive keypoint filtering and iterative region merging,” Multimedia Tools and Applications, 78(18), pp. 26313–26339, 2019. (JCR Q2)
  18. X. Cun, F. Xu, C.-M. Pun and H. Gao, “Depth Assisted Full Resolution Network for Single Image-based View Synthesis,” IEEE Computer Graphics and Applications, 39(2), pp. 52-64, 2019. (JCR Q2)
  19. C.-M. Pun and J.-L. Chung, “A two-stage localization for copy-move forgery detection,” Information Sciences, 463, pp. 33-55, 2018. (JCR Q1, CCF B)
  20. Z.-L. Liu and C.-M. Pun, “Reversible data-hiding in encrypted images by redundant space transfer,” Information Sciences, 433, pp. 188-203, 2018. (JCR Q1, CCF B)
  21. H. Gao, Y. Shi, C.-M. Pun and S. Kwong, “An Improved Artificial Bee Colony Algorithm with its Application to Metallographic Image Segmentation,” IEEE Transactions on Industrial Informatics (TII), pp. 1-13, 2018. (JCR, Q1)
  22. H. Hu, C.-M. Pun, Y. Liu, X. Lai, Z. Yang and H. Gao, “An artificial bee algorithm with a leading group and its application into image registration,” Multimedia Tools and Applications, pp. 1-27, 2019. (JCR Q2)
  23. J. Xie, C.-M. Pun, Z. Pan, H. Gao, and B. Wang, “Automatic Medical Image Registration Based on an Integrated Method Combining Feature and Area Information,” Neural Processing Letters, 49(1), pp. 263-284, 2019. (JCR Q2)
  24. C. Shi and C.-M. Pun, “Superpixel-based 3D deep neural networks for hyperspectral image classification. Pattern Recognition, 74, pp. 600-616, 2018. (JCR Q1, CCF B)
  25. G. Huang and C.-M. Pun, “On-line video multi-object segmentation based on skeleton model and occlusion detection,” Multimedia Tools and Applications, 77(23), pp. 31313–31329, 2018. (JCR Q2)
  26. D. Wu, C.-M. Pun, B. Xu, H. Gao and Z. Wu, “Vehicle power train optimization using multi-objective bird swarm algorithm,” Multimedia Tools and Applications, pp. 1-12, 2018. (JCR Q2)
  27. H. Gao, H. Li, Y. Liu, H. Lu, H. Kim and C.-M. Pun, “High-quality-guided artificial bee colony algorithm for designing loudspeaker,” Neural Computing and Applications, pp. 1-8, 2018. (JCR Q1)
  28. Z. Fu, C.-M. Pun and H. Gao, “Endmember extraction of hyperspectral remote sensing images based on an improved discrete artificial bee colony algorithm and genetic algorithm,” Mobile networks & applications, pp. 1-9, 2018. (JCR Q2)
  29. B. Liu and C.-M. Pun, “Locating splicing forgery by fully convolutional networks and conditional random field,” Signal Processing: Image Communication, 66(8), pp. 103-112, 2018. (JCR Q2)
  30. C. Shi and C.-M. Pun, “Multi-scale hierarchical recurrent neural networks for hyperspectral image classification,” Neurocomputing, 294, pp. 82-93, 2018. (JCR Q1)
  31. X. Cun, C.-M. Pun and H. Gao, “Applying stochastic second-order entropy images to multi-modal image registration,” Signal Processing: Image Communication, 65, pp. 201-209, 2018. (JCR Q2)
  32. H. Gao, Z. Fu, C.-M. Pun, H. Hu and R. Lan, “A multi-level thresholding image segmentation based on an improved artificial bee colony algorithm,” Computers & Electrical Engineering, 70(8), pp. 931-938, 2018. (JCR Q2)
  33. X.-L. Bi and C.-M. Pun, “Fast Copy-Move Forgery Detection Using Local Bidirectional Coherency Error Refinement,” Pattern Recognition, 81, pp. 161-175, 2018. (JCR Q1, CCF B)
  34. X.-L. Bi, C.-M. Pun and X.-C. Yuan, “Multi-Scale Feature Extraction and Adaptive Matching for Copy-Move Forgery Detection,” Multimedia Tools and Applications, 77(1), pp. 363–385, 2018. (JCR Q2)    
  35. C.-M. Pun, C.-P. Yan and X.-C. Yuan, “Robust image hashing using progressive feature selection for tampering detection,” Multimedia Tools and Applications, 77(10), pp. 11609–11633, 2018. (JCR Q2)
  36. P. Qin and C.-M. Pun, “Object tracking using distribution fields with correlation coefficients,” Multimedia Tools and Applications, 77(7), pp. 8979–9002, 2018. (JCR Q2)
  37. J. Du, C. M. Vong, C.-M. Pun, P. K.Wong and W. F. Ip, “Post-boosting of classification boundary for imbalanced data using geometric mean,” Neural Networks, 96, pp. 101-114, 2017. (JCR Q1, CCF B)
  38. X.-L. Bi and C.-M. Pun, “Fast Reflective Offset-Guided Searching Method for Copy-Move Forgery Detection,” Information Sciences, 418. pp. 531-545, 2017. (JCR Q1, CCF B)
  39. C. Shi and C.-M. Pun, “3D multi-resolution wavelet convolutional neural networks for hyperspectral image classification,” Information Sciences, 420, pp. 49-65, 2017. (JCR Q1, CCF B)
  40. C.-P. Yan and C.-M. Pun, “Multi-Scale Difference Map Fusion for Tamper Localization Using Binary Ranking Hashing,” IEEE Transactions on Information Forensics and Security (TIFS), 12(9), pp. 2144 – 2158, 2017. (JCR Q1, CCF A)
  41. Q. Guo, W. Feng, C. Zhou, C.-M. Pun and B. Wu, “Structure-Regularized Compressive Tracking with Online Data-Driven Sampling,” IEEE Transactions on Image Processing (TIP), 26 (12), pp. 5692-5705, 2017. (JCR Q1, CCF A)
  42. C.-M. Pun, C.-P. Yan and X.-C. Yuan, “Image Alignment based Multi-Region Matching for Object-level Tampering Detection,” IEEE Transactions on Information Forensics and Security (TIFS), 12(2), pp. 377-391 2017. (JCR Q1, CCF A)
  43. L. Liu, L. Chen, CL Philip Chen, YY Tang and C.-M. Pun, “Weighted Joint Sparse Representation for Removing Mixed Noise in Image,” IEEE Transactions on Cybernetics (TCyber), 47(3), pp. 600 – 611, 2017.  (JCR Q1, CCF B)
  44. C. Lin, C.-M. Pun and G. Huang, “Highly non-rigid video object tracking using segment-based object candidates,” Multimedia Tools and Applications, 76(7), pp. 9565–9586, 2017. (JCR Q2)
  45. C. Lin, C.-M. Pun, C.-M. Vong and D. Adjeroh, “Efficient shape classification using region descriptors,” Multimedia Tools and Applications, 76(1), pp. 83–102, 2017. (JCR Q2)
  46. G. Huang, C.-M. Pun, and C. Lin, “Unsupervised video co-segmentation based on superpixel co-saliency and region merging,” Multimedia Tools and Applications, 76(10), pp. 12941–12964, 2017. (JCR Q2)
  47. C.-P. Yan, C.-M. Pun and X.-C. Yuan, “Quaternion-based Image Hashing for Adaptive Tampering Localization,” IEEE Transactions on Information Forensics and Security (TIFS), 11(12), pp.2664-2677, 2016. (JCR Q1, CCF A)
  48. H. Gao, C.-M. Pun and S. Kwong, “An efficient image segmentation method based on a hybrid particle swarm algorithm with learning strategy,” Information Sciences, vol. 369, pp. 500-521, 2016. (JCR Q1, CCF B)
  49. Y. Shi, C.-M. Pun, H. Hu, H. Gao, “An Improved Artificial Bee Colony and Its Application,” Knowledge-Based Systems, vol. 107, pp.14-31, 2016. (JCR Q1)
  50. C.-M. Pun and G. Huang, “On-line video object segmentation using illumination-invariant color-texture feature extraction and marker prediction,” Journal of Visual Communication and Image Representation, vol. 41, pp. 391–405, 2016. (JCR Q2)
  51. K.-C. Choi and C.-M. Pun, “Robust lossless digital watermarking using integer transform with Bit plane manipulation,” Multimedia Tools and Applications, 75(11), pp. 6621–6645, 2016. (JCR Q2)
  52. C.-M. Pun and C. Lin, “A real-time detector for parked vehicles based on hybrid background modeling,” Journal of Visual Communication and Image Representation, vol. 39, pp. 82-92, 2016. (JCR Q2)
  53. X.-L. Bi, C.-M. Pun and X.-C. Yuan, “Multi-Level Dense Descriptor and Hierarchical Feature Matching for Copy–Move Forgery Detection,” Information Sciences, vol. 345, pp. 226-242, 2016. (JCR Q1, CCF B)
  54. C.-M. Pun, B. Liu and X.-C. Yuan, “Multi-scale noise estimation for image splicing forgery detection,” Journal of Visual Communication and Image Representation, vol. 38, pp. 195-206, 2016.  (JCR Q2)
  55. G. Huang, C.-M. Pun, C. Lin, and Y. Zhou, “Non-rigid Visual Object Tracking Using User-Defined Marker and Gaussian Kernel,” Multimedia Tools and Applications, 75(10), pp 5473-5492, 2016.  (JCR Q2)
  56. C.-P. Yan, C.-M. Pun and X.-C. Yuan, “Multi-scale image hashing using adaptive local feature extraction for robust tampering detection,” Signal Processing, vol. 121, pp. 1-16, 2016. (JCR Q1)
  57. C.-M. Pun, X.-C. Yuan and X.-L. Bi, “Image Forgery Detection Using Adaptive Over-Segmentation and Feature Points Matching,” IEEE Transactions on Information Forensics and Security (TIFS), 10(8), pp.1705-1716, 2015. (JCR Q1, CCF A)
  58. X.-C. Yuan, C.-M. Pun and C. L. Philip Chen, “Robust Mel-Frequency Cepstral Coefficients Feature Detection and Dual-Tree Complex Wavelet Transform for Digital Audio Watermarking,” Information Sciences, vol. 298, pp. 159-179, 2015.  (JCR Q1, CCF B)
  59. Z. Hua, Y. Zhou, C.-M. Pun and C. L. Philip Chen, “2D Sine Logistic Modulation Map for Image Encryption,” Information Sciences, vol. 297, pp. 80-94, 2015.  (JCR Q1, CCF B)
  60. C.-M. Pun and X.-C. Yuan, “Histogram modification based image watermarking resistant to geometric distortions,” Multimedia Tools and Applications, 74(18), pp 7821-7842, 2015. (JCR Q2)  
  61. Y. Zhou, Z. Hua, C.-M. Pun and C. L. Philip Chen, “Cascade Chaotic System with Applications,” IEEE Transactions on Cybernetics, 45(9), pp.2001-2012, 2015. (JCR Q1, CCF B)
  62. C.-M. Vong, K.-I. Tai, C.-M. Pun and P.-K. Wong, “Fast and Accurate Face Detection by Sparse Bayesian Extreme Learning Machine,” Neural Computing and Applications, 26(5), pp 1149-1156, 2015. (JCR Q1)
  63. K.-C. Choi, C.-M. Pun and C. L. Philip Chen, “Application of a Generalized Difference Expansion Based Reversible Audio Data Hiding Algorithm,” Multimedia Tools and Applications, 74(6), pp 1961-1982, 2015. (JCR Q2)  
  64. C.-M. Pun and K.-C. Choi, “Generalized integer transform based reversible watermarking algorithm using efficient location map encoding and adaptive thresholding,” Computing, 96(10), pp.951-973, 2014. (JCR Q2)
  65. X.-C. Yuan, and C.-M. Pun, “Feature extraction and local Zernike moments based geometric invariant watermarking,” Multimedia Tools and Applications, 72(1), pp 777-799, 2014.  (JCR Q2)
  66. H.-M. Zhu and C.-M. Pun, “An Adaptive Superpixel Based Hand Gesture Tracking and Recognition System,” The Scientific World Journal, vol. 2014, Article ID 849069, 12 pages, 2014.  (JCR Q2)
  67. B. Liu, C.-M. Pun and X.-C. Yuan, “Digital Image Forgery Detection Using JPEG Features and Local Noise Discrepancies,” The Scientific World Journal, vol. 2014, Article ID 230425, 12 pages, 2014. (JCR Q2)
  68. C.-M. Pun and X.-C. Yuan, “Robust Segments Detector for De-Synchronization Resilient Audio Watermarking,” IEEE Transactions on Audio, Speech, and Language Processing (TASLP), 21(11), pp. 2412 – 2424, 2013.  (JCR Q2, CCF B)
  69. X.-C. Yuan, C.-M. Pun and C. L. Philip Chen, “Geometric invariant watermarking by local Zernike moments of binary image patches,” Signal Processing, 93(7), pp. 2087–2095, 2013.  (JCR Q1)
  70. W. Feng, Z.-Q. Liu, L. Wan, C.-M. Pun and J. Jiang, “A spectral-multiplicity-tolerant approach to robust graph matching,” Pattern Recognition, 46(10), pp. 2819–2829, 2013. (JCR Q1, CCF B)
  71. D. Liu, M.-C. Lee, C.-M. Pun and H. Liu, “Analysis of Wireless Localization in Nonline-of-Sight Conditions,” IEEE Transactions on Vehicular Technology (TVT), 62(4), pp. 1484 – 1492, 2013. (JCR Q1)  
  72. M. Cheng, B. Fang, C.-M. Pun and Y. Y. Tang, “Kernel-view based discriminant approach for embedded feature extraction in high-dimensional space,” Neurocomputing, 74(9), pp. 1478-1484, 2011.  (JCR Q1)
  73. S. Li, M.-C. Lee and C.-M. Pun, “Complex Zernike Moments Features for Shape-Based Image Retrieval,” IEEE Transactions on System, Man and Cybernetics (TSMC), 30(1), pp. 227-237, 2009.  (JCR Q1, CCF B)
  74. C.-M. Pun and M.-C. Lee, “Extraction of Shift Invariant Wavelet Features for Classification of Images with Different Sizes,” IEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI), vol. 26, no. 9, pp. 1228-1233, Sept. 2004.  (JCR Q1, CCF A)
  75.  C.-M. Pun and M.-C. Lee, “Log-Polar Wavelet Energy Signatures for Rotation and Scale Invariant Texture Classification,” IEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI), vol. 25, no. 5, pp. 590-603, May 2003.  (JCR Q1, CCF A)
  76. C.-M. Pun, “Rotation Invariant Texture Feature for Image Retrieval,” Computer Vision and Image Understanding, vol. 89, no. 1, pp. 24-43, Jan. 2003.  (JCR Q2)
  77. M.-C. Lee and C.-M. Pun, “Rotation and Scale Invariant Wavelet Feature for Content-Based Texture Image Retrieval,” Journal of American Society for Information Science and Technology, vol. 54, no. 1, pp. 68-80, Jan. 2003.  (JCR Q1, CCF B)

Conferences

  1. G. Zhong and C.-M. Pun, “A Unified Framework for Multi-view Spectral Clustering,” Proceedings of the 36th IEEE International Conference on Data Engineering (ICDE), Accepted, 2020. (CCF A)
  2. X. Cun, C.-M. Pun and C. Shi, “Towards Ghost-free Shadow Removal via Dual Hierarchical Aggregation Network and Shadow Matting GAN,” Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence (AAAI), Accepted, 2020. (CCF A)
  3. L. Huang and C.-M. Pun, “Audio Replay Spoof Attack Detection Using Segment-based Hybrid Feature and DenseNet-LSTM Network,” Proceedings of  the 44th IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2019. (CCF B)
  4. X. Xia, C.-M. Pun, D. Zhang, Y. Yang H. Lu, H. Gao and F. Xu, “A 6-DOF Telexistence Drone Controlled by a Head Mounted Display,” Proceedings of the IEEE Conference on Virtual Reality and 3D User Interfaces (VR), 2019. (CCF A)
  5. Y. Xiao, C.-M. Pun and J. Zhou, “Generating Adversarial Perturbation with Root Mean Square Gradient,” Proceedings of AAAI Workshops, 2019.
  6. Z. Jiang and C.-M. Pun, “Reversible Image Watermarking Using Prediction Value Computation with Gradient Analysis,” Proceedings of the 25th ACM Conference on Computer and Communications Security (CCS) Workshops, 2018.
  7. Zi-Long Liu and C.-M. Pun, “Chunk Encryption and Redundancy Matrix Representation for Reversible Data Hiding in Encrypted Images,” 23rd Nordic Conference on Secure IT Systems (NordSec), 2018.
  8. C.-P. Yan and C.-M. Pun, “Multi-scale difference map fusion for tamper localization using binary ranking hashing,” 10th IEEE International Workshop on Information Forensics and Security (WIFS), 2018.
  9. X. Cun and C.-M. Pun, “Image Splicing Localization via Semi-Global Network and Fully Connected Conditional Random Fields,Proceedings of European Conference on Computer Vision (ECCV) Workshops, 2018.
  10. B. Liu and C.-M. Pun, “Deep Fusion Network for Splicing Forgery Localization,” Proceedings of European Conference on Computer Vision (ECCV) Workshops, 2018.
  11. X. Cun, F. Xu, C.-M. Pun and H. Gao, “Depth Assisted Full Resolution Network for Single Image-Based View Synthesis,” Proceedings of ACM SIGGRAPH 2018, Posters, 2018. (CCF A)
  12. C. Shi and C.-M. Pun, “Perceptual Loss for Superpixel-Level Multispectral and Panchromatic Image Classification,” Proceedings of  the 43rd IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2018. (CCF B)
  13. C.-P. Yan and C.-M. Pun, “Segmentation-based Image Hash for Precise Tamper Localization,” Proceedings of the World Congress on Internet Security, 2017.
  14. C.-M. Pun, C.-P. Yan and X.-C. Yuan, “Image Alignment-Based Multi-Region Matching for Object-Level Tampering Detection,” 9th IEEE International Workshop on Information Forensics and Security (WIFS), 2017.
  15. C.-P. Yan, C.-M. Pun and X.-C. Yuan, “Quaternion-Based Image Hashing for Adaptive Tampering Localization,” 9th IEEE International Workshop on Information Forensics and Security (WIFS), 2017.
  16. Y. Qin, C.-M. Pun, H. Hu, H. Gao, “Logistic Quantum-behaved Particle Swarm Optimization Based MPPT for PV Systems,” Proceedings of the Seventh International Conference on Information Science and Technology (ICIST), 2017.
  17. I.T. Choi, C.C. Leong, K.W. Hong and C.-M. Pun, “Indoor Navigation by Image Recognition,” Proceedings of the 9th International Conference on Digital Image Processing, 2017.
  18. B. Liu and C.-M. Pun, “Multi-object Splicing Forgery Detection Using Noise Level Difference,” Proceedings of the IEEE Conference on Dependable and Secure Computing (DSC), 2017.
  19. G. Huang and C.-M. Pun, “Robust Video Co-Segmentation Based on Co-saliency of Superpixels,” Proceedings of the 14th International Conference Computer Graphics, Imaging and Visualization, 2017.
  20. K.-C. Choi and C.-M. Pun, “Adaptive Image Encryption for High Capacity Reversible Data Hiding,” Proceedings of the IEEE Conference on Dependable and Secure Computing (DSC), 2017.
  21. X.-L. Bi, C.-M. Pun and X.-C. Yuan, “Adaptive Polar based Filtering Method for Copy-Move Forgery Detection,” Proceedings of the 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2016.
  22. C. Lin and C.-M. Pun, “Robust Region Descriptors for Shape Classification,” Proceedings of the 13th International Conference Computer Graphics, Imaging and Visualization, 2016.
  23. K.-C. Choi and C.-M. Pun, “Difference Expansion Based Robust Reversible Watermarking with Region Filtering,” Proceedings of the 13th International Conference Computer Graphics, Imaging and Visualization, 2016.
  24. C.-P. Yan, C.-M. Pun and X.-C. Yuan, “Adaptive local feature based multi-scale image hashing for robust tampering detection,” Proceedings of the TENCON, 2015.
  25. G. Huang, C.-M. Pun and C. Lin, “Video Object Tracking Using Interactive Segmentation and Superpixel Based Gaussian Kernel,” Proceedings of the 12th International Conference Computer Graphics, Imaging and Visualization, 2015.
  26. X.-L. Bi, C.-M. Pun and X.-C. Yuan, “Over-Segmentation Based Image Forgery Detection,” Proceedings of the International Conference on Electronic Science and Automation Control (ESAC), 2015.
  27. X. Nie, W. Feng, L. Wan, H. Dai, C.-M. Pun, “Intrinsic Image Decomposition by Hierarchical L0 Sparsity,” Proceedings of the IEEE International Conference on Multimedia and Expo (ICME), 2014. (CCF B)
  28. S. Zhang, W. Feng, J. Zhang, C.-M. Pun, “Bag of Squares: A Reliable Model of Measuring Superpixel Similarity,” Proceedings of the IEEE International Conference on Multimedia and Expo (ICME), 2014. (CCF B)
  29. S. Yi, Y. Zhou, C.-M. Pun and C. L. Philip Chen, “A New Reversible Data Hiding Algorithm in the Encryption Domain,” 2014 IEEE International Conference on Systems, Man and Cybernetics (SMC), 2014.
  30. Z. Hua, Y. Zhou, C.-M. Pun and C. L. Philip Chen, “Image encryption using 2D logistic-sine chaotic map,” 2014 IEEE International Conference on Systems, Man and Cybernetics (SMC), 2014.
  31. Z. Hua, Y. Zhou, C.-M. Pun, and CLP Chen, “A new 1D parameter-control chaotic framework,” Proceedings of the IS&T/SPIE Electronic Imaging, 2014.
  32. S. Yi, Y. Zhou, C.-M. Pun, and CLP Chen, “A new collage steganographic algorithm using cartoon design,” Proceedings of the IS&T/SPIE Electronic Imaging, 2014.
  33. X.-C. Yuan and C.-M. Pun, “Feature Based Video Watermarking Resistant to Geometric Distortions,” Proceedings of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2013. (CCF C)
  34. Z. Tan, L. Wan, W. Feng, and C.-M. Pun, “Image Co-Saliency Detection By Propagating Superpixel Affinities,” Proceedings of the 38th IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), 2013. (CCF B)
  35. B. Liu and C.-M. Pun, “A SIFT and Local Features Based Integrated Method for Copy-Move Attack Detection in Digital Image,” Proceedings of the 2013 IEEE International Conference on Information and Automation, 2013.
  36.  H.-M. Zhu and C.-M. Pun, “Human Action Recognition with Skeletal Information from Depth Camera,” Proceedings of the 2013 IEEE International Conference on Information and Automation, 2013. 
  37. Ng, P., and C.-M. Pun, “ Skin Segmentation Based on Human Face Illumination Feature,” Proceedings of the 2012 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology, 2012
  38. H.-M. Zhu and C.-M. Pun,” Hand Gesture Recognition with Motion Tracking on Spatial-Temporal Filtering,” Proceedings of the ACM SIGGRAPH Conference on Virtual-Reality Continuum and its Applications to Industry (VRCAI), 2011.
  39. C.-M. Pun, X.-C. Yuan and Philip C. L. Chen, ” Geometric Invariant Digital Image Watermarking Scheme Based on Feature Points Detector and Histogram Distribution,” Proceedings of the 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2011. (CCF C)
  40. C.-M. Pun, J.-J. Jiang and Philip C. L. Chen, ” Adaptive Client-Side LUT-Based Digital Watermarking,” Proceedings of the 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2011. (CCF C)
  41. W.-L. Chan and C.-M. Pun,” Robust Character Recognition Using Connected-Component Extraction,” Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011.
  42. H.-C. Tsang, M.-C. Lee and C.-M. Pun, ” A robust anti-tamper protection scheme,” Proceedings of the 6th International Conference on Availability, Reliability and Security (ARES), 2011.
  43. C.-M. Pun and C. Lin, ” Geometric Invariant Shape Classification using Hidden Markov Model,” Proceedings of the International Conference on Digital Image Computing: Techniques and Applications (DICTA), 2010.
  44. H.-M. Zhu and C.-M. Pun,” Movement Tracking in Real-time Hand Gesture Recognition,” Proceedings of the 9th IEEE/ACIS International Conference on Computer and Information Science (ICIS), 2010.
  45. C.-M. Pun and N.-Y. An, “Image Segmentation Using an Improved Watershed Transform,” Proceedings of the International Conference on Image, Signal and Vision Computing, 2010.
  46. W.-Y. Ho and C.-M. Pun, “A Macao License Plate Recognition System Based on Edge and Projection Analysis,” Proceedings of the 8th IEEE International Conference on Industrial Informatics, 2010.
  47. I.-T. Lam and C.-M. Pun,” Embedding Biometric Watermark on Document Image using Discrete Wavelet Transform,” Proceedings of the IEEE International Conference on Information and Automation, 2009.
  48. W. Yao and C.-M. Pun,” Invariant Shape Representation by Radon and Wavelet Transforms for Complex Inner Shapes,” Proceedings of the IEEE International Conference on Information and Automation, 2009.
  49. W.-L. Yao and C.-M. Pun,” A Hybrid Macau License Plate Localization Scheme Based on Vertical Edge Analysis,” Proceedings of the International Conference of Machine Learning and Cybernetics, 2009.
  50. C.-M. Pun and X.-C. Yuan, “Robust Block and Gray-Level Histogram Based Watermarking Scheme ,” Proceedings of the 10th Pacific Rim Conference on Multimedia (PCM), 2009. (CCF C)
  51. C.-M. Pun and C.-F. Wong ,”Image Retrieval Using a Novel Color Quantization Approach,” Proceedings of the 9th International Conference on Signal Processing, 2008.
  52. C.-P. Tou, C.-M. Pun and D. Lin,”A Quantization Watermarking Scheme Based on Perceptual Invisibility,” Proceedings of the 9th International Conference on Signal Processing, 2008.
  53. C.-M. Pun and I.-K. Kong, “Digital Image Watermarking by Adaptive Quantization of Wavelet Packet Coefficients,” Proceedings of the 15th International Conference on Systems, Signals and Image Processing, 2008.
  54. I.-K. Kong and C.-M. Pun, “Digital Image Watermarking with Blind Detection for Copyright Verification,” Proceedings of the 2008 International Congress on Image and Signal Processing, 2008.
  55. C.-M. Pun , “Image Classification Using Wavelet Watermarking Representation,Proceedings of the Sixth International Conference of Machine Learning and Cybernetics, 2007.
  56. C.-M. Pun, “Invariant Content-Based Image Retrieval by Wavelet Energy Signatures,” Proceedings of the IEEE International Conference on Multimedia and Expo (ICME), 2003. (CCF B)
  57. C.-M. Pun, “Invariant Content-Based Image Retrieval by Wavelet Energy Signatures,” Proceedings of the 28th IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), 2003. (CCF B)
  58. C.-M. Pun and M.-C. Lee, “Rotation Invariant Texture Feature for Content-Based Image Retrieval,” Proceedings of the IEEE International Conference on Multimedia and Expo (ICME), 2002. (CCF B)
  59. M.-C. Lee and C.-M. Pun, “Classifying Rotated Textures Using Wavelet Packet Signatures,” Proceedings of the 25th IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), 2000. (CCF B)
  60. M.-C. Lee and C.-M. Pun, “Texture Classification Using Dominant Wavelet Packet Energy Features,” Proceedings of the Fourth IEEE Southwest Symposium on Image Analysis and Interpretation, 2000.

More publications here


Professional Affiliations

  • IEEE Senior Member
  • ACM Professional Member

Contact Details

Faculty of Science and Technology
University of Macau, E11
Avenida da Universidade, Taipa,
Macau, China

Room: E11-4091
Telephone: (853) 8822-4369
Fax: (853) 8822-2426
Email: cmpun