Robust coverless image steganography based on DCT and LDA topic classification X Zhang, F Peng, M Long IEEE Transactions on Multimedia 20 (12), 3223-3238, 2018 | 231 | 2018 |
A competition on generalized software-based face presentation attack detection in mobile scenarios Z Boulkenafet, J Komulainen, Z Akhtar, A Benlamoudi, D Samai, ... 2017 IEEE international joint conference on biometrics (IJCB), 688-696, 2017 | 161 | 2017 |
An ROI privacy protection scheme for H. 264 video based on FMO and chaos F Peng, X Zhu, M Long IEEE transactions on information forensics and security 8 (10), 1688-1699, 2013 | 98 | 2013 |
Separable reversible data hiding and encryption for HEVC video M Long, F Peng, H Li Journal of Real-Time Image Processing 14, 171-182, 2018 | 93 | 2018 |
Face spoofing detection based on color texture Markov feature and support vector machine recursive feature elimination LB Zhang, F Peng, L Qin, M Long Journal of Visual Communication and Image Representation 51, 56-69, 2018 | 89 | 2018 |
A box-counting method with adaptable box height for measuring the fractal feature of images M Long, F Peng Radioengineering 22 (1), 208-213, 2013 | 87 | 2013 |
FD-GAN: Face de-morphing generative adversarial network for restoring accomplice’s facial image F Peng, LB Zhang, M Long IEEE Access 7, 75122-75131, 2019 | 86 | 2019 |
Discrimination of natural images and computer generated graphics based on multi-fractal and regression analysis F Peng, D Zhou, M Long, X Sun AEU-International Journal of Electronics and Communications 71, 72-81, 2017 | 86 | 2017 |
Face presentation attack detection using guided scale texture F Peng, L Qin, M Long Multimedia Tools and Applications 77, 8883-8909, 2018 | 75 | 2018 |
Face morphing detection using Fourier spectrum of sensor pattern noise LB Zhang, F Peng, M Long 2018 IEEE international conference on multimedia and expo (ICME), 1-6, 2018 | 72 | 2018 |
A complete passive blind image copy-move forensics scheme based on compound statistics features F Peng, Y Nie, M Long Forensic science international 212 (1-3), e21-e25, 2011 | 70 | 2011 |
A reversible watermarking scheme for two-dimensional CAD engineering graphics based on improved difference expansion F Peng, Y Lei, M Long, X Sun Computer-Aided Design 43 (8), 1018-1024, 2011 | 68 | 2011 |
Reversible data hiding in encrypted 2D vector graphics based on reversible mapping model for real numbers F Peng, ZX Lin, X Zhang, M Long IEEE transactions on information forensics and security 14 (9), 2400-2411, 2019 | 61 | 2019 |
A tunable selective encryption scheme for H. 265/HEVC based on chroma IPM and coefficient scrambling F Peng, X Zhang, ZX Lin, M Long IEEE Transactions on Circuits and Systems for Video Technology 30 (8), 2765-2780, 2019 | 58 | 2019 |
Identifying natural images and computer generated graphics based on binary similarity measures of PRNU M Long, F Peng, Y Zhu Multimedia Tools and Applications 78 (1), 489-506, 2019 | 54 | 2019 |
A robust coverless steganography based on generative adversarial networks and gradient descent approximation F Peng, G Chen, M Long IEEE Transactions on Circuits and Systems for video technology 32 (9), 5817-5829, 2022 | 48 | 2022 |
A selective encryption scheme for protecting H. 264/AVC video in multimedia social network F Peng, X Gong, M Long, X Sun Multimedia Tools and Applications 76, 3235-3253, 2017 | 48 | 2017 |
Simple and accurate analysis of BER performance for DCSK chaotic communication M Long, Y Chen, F Peng IEEE communications letters 15 (11), 1175-1177, 2011 | 46 | 2011 |
A semi-fragile watermarking algorithm for authenticating 2D CAD engineering graphics based on log-polar transformation F Peng, RS Guo, CT Li, M Long Computer-Aided Design 42 (12), 1207-1216, 2010 | 46 | 2010 |
Separable robust reversible watermarking in encrypted 2D vector graphics F Peng, WY Jiang, Y Qi, ZX Lin, M Long IEEE Transactions on Circuits and Systems for Video Technology 30 (8), 2391-2405, 2020 | 39 | 2020 |