Følg
Fei Peng
Fei Peng
Guangzhou University
Verificeret mail på gzhu.edu.cn
Titel
Citeret af
Citeret af
År
Robust coverless image steganography based on DCT and LDA topic classification
X Zhang, F Peng, M Long
IEEE Transactions on Multimedia 20 (12), 3223-3238, 2018
2302018
A competition on generalized software-based face presentation attack detection in mobile scenarios
Z Boulkenafet, J Komulainen, Z Akhtar, A Benlamoudi, D Samai, ...
2017 IEEE international joint conference on biometrics (IJCB), 688-696, 2017
1612017
An ROI privacy protection scheme for H. 264 video based on FMO and chaos
F Peng, X Zhu, M Long
IEEE transactions on information forensics and security 8 (10), 1688-1699, 2013
972013
Separable reversible data hiding and encryption for HEVC video
M Long, F Peng, H Li
Journal of Real-Time Image Processing 14, 171-182, 2018
922018
Face spoofing detection based on color texture Markov feature and support vector machine recursive feature elimination
LB Zhang, F Peng, L Qin, M Long
Journal of Visual Communication and Image Representation 51, 56-69, 2018
892018
FD-GAN: Face de-morphing generative adversarial network for restoring accomplice’s facial image
F Peng, LB Zhang, M Long
IEEE Access 7, 75122-75131, 2019
852019
Discrimination of natural images and computer generated graphics based on multi-fractal and regression analysis
F Peng, D Zhou, M Long, X Sun
AEU-International Journal of Electronics and Communications 71, 72-81, 2017
852017
A box-counting method with adaptable box height for measuring the fractal feature of images
M Long, F Peng
Radioengineering 22 (1), 208-213, 2013
852013
Face presentation attack detection using guided scale texture
F Peng, L Qin, M Long
Multimedia Tools and Applications 77, 8883-8909, 2018
742018
Face morphing detection using Fourier spectrum of sensor pattern noise
LB Zhang, F Peng, M Long
2018 IEEE international conference on multimedia and expo (ICME), 1-6, 2018
722018
A complete passive blind image copy-move forensics scheme based on compound statistics features
F Peng, Y Nie, M Long
Forensic science international 212 (1-3), e21-e25, 2011
692011
A reversible watermarking scheme for two-dimensional CAD engineering graphics based on improved difference expansion
F Peng, Y Lei, M Long, X Sun
Computer-Aided Design 43 (8), 1018-1024, 2011
682011
Reversible data hiding in encrypted 2D vector graphics based on reversible mapping model for real numbers
F Peng, ZX Lin, X Zhang, M Long
IEEE transactions on information forensics and security 14 (9), 2400-2411, 2019
612019
A tunable selective encryption scheme for H. 265/HEVC based on chroma IPM and coefficient scrambling
F Peng, X Zhang, ZX Lin, M Long
IEEE Transactions on Circuits and Systems for Video Technology 30 (8), 2765-2780, 2019
572019
Identifying natural images and computer generated graphics based on binary similarity measures of PRNU
M Long, F Peng, Y Zhu
Multimedia Tools and Applications 78 (1), 489-506, 2019
542019
A robust coverless steganography based on generative adversarial networks and gradient descent approximation
F Peng, G Chen, M Long
IEEE Transactions on Circuits and Systems for video technology 32 (9), 5817-5829, 2022
492022
A selective encryption scheme for protecting H. 264/AVC video in multimedia social network
F Peng, X Gong, M Long, X Sun
Multimedia Tools and Applications 76, 3235-3253, 2017
482017
A semi-fragile watermarking algorithm for authenticating 2D CAD engineering graphics based on log-polar transformation
F Peng, RS Guo, CT Li, M Long
Computer-Aided Design 42 (12), 1207-1216, 2010
472010
Simple and accurate analysis of BER performance for DCSK chaotic communication
M Long, Y Chen, F Peng
IEEE communications letters 15 (11), 1175-1177, 2011
462011
High-fidelity reversible data hiding based on geodesic path and pairwise prediction-error expansion
B Ou, X Li, J Wang, F Peng
Neurocomputing 226, 23-34, 2017
412017
Systemet kan ikke foretage handlingen nu. Prøv igen senere.
Artikler 1–20