Segui
Fei Peng
Fei Peng
Guangzhou University
Email verificata su gzhu.edu.cn
Titolo
Citata da
Citata da
Anno
Robust coverless image steganography based on DCT and LDA topic classification
X Zhang, F Peng, M Long
IEEE Transactions on Multimedia 20 (12), 3223-3238, 2018
2312018
A competition on generalized software-based face presentation attack detection in mobile scenarios
Z Boulkenafet, J Komulainen, Z Akhtar, A Benlamoudi, D Samai, ...
2017 IEEE international joint conference on biometrics (IJCB), 688-696, 2017
1612017
An ROI privacy protection scheme for H. 264 video based on FMO and chaos
F Peng, X Zhu, M Long
IEEE transactions on information forensics and security 8 (10), 1688-1699, 2013
982013
Separable reversible data hiding and encryption for HEVC video
M Long, F Peng, H Li
Journal of Real-Time Image Processing 14, 171-182, 2018
932018
Face spoofing detection based on color texture Markov feature and support vector machine recursive feature elimination
LB Zhang, F Peng, L Qin, M Long
Journal of Visual Communication and Image Representation 51, 56-69, 2018
892018
A box-counting method with adaptable box height for measuring the fractal feature of images
M Long, F Peng
Radioengineering 22 (1), 208-213, 2013
872013
FD-GAN: Face de-morphing generative adversarial network for restoring accomplice’s facial image
F Peng, LB Zhang, M Long
IEEE Access 7, 75122-75131, 2019
862019
Discrimination of natural images and computer generated graphics based on multi-fractal and regression analysis
F Peng, D Zhou, M Long, X Sun
AEU-International Journal of Electronics and Communications 71, 72-81, 2017
862017
Face presentation attack detection using guided scale texture
F Peng, L Qin, M Long
Multimedia Tools and Applications 77, 8883-8909, 2018
752018
Face morphing detection using Fourier spectrum of sensor pattern noise
LB Zhang, F Peng, M Long
2018 IEEE international conference on multimedia and expo (ICME), 1-6, 2018
722018
A complete passive blind image copy-move forensics scheme based on compound statistics features
F Peng, Y Nie, M Long
Forensic science international 212 (1-3), e21-e25, 2011
702011
A reversible watermarking scheme for two-dimensional CAD engineering graphics based on improved difference expansion
F Peng, Y Lei, M Long, X Sun
Computer-Aided Design 43 (8), 1018-1024, 2011
682011
Reversible data hiding in encrypted 2D vector graphics based on reversible mapping model for real numbers
F Peng, ZX Lin, X Zhang, M Long
IEEE transactions on information forensics and security 14 (9), 2400-2411, 2019
612019
A tunable selective encryption scheme for H. 265/HEVC based on chroma IPM and coefficient scrambling
F Peng, X Zhang, ZX Lin, M Long
IEEE Transactions on Circuits and Systems for Video Technology 30 (8), 2765-2780, 2019
582019
Identifying natural images and computer generated graphics based on binary similarity measures of PRNU
M Long, F Peng, Y Zhu
Multimedia Tools and Applications 78 (1), 489-506, 2019
542019
A robust coverless steganography based on generative adversarial networks and gradient descent approximation
F Peng, G Chen, M Long
IEEE Transactions on Circuits and Systems for video technology 32 (9), 5817-5829, 2022
482022
A selective encryption scheme for protecting H. 264/AVC video in multimedia social network
F Peng, X Gong, M Long, X Sun
Multimedia Tools and Applications 76, 3235-3253, 2017
482017
Simple and accurate analysis of BER performance for DCSK chaotic communication
M Long, Y Chen, F Peng
IEEE communications letters 15 (11), 1175-1177, 2011
462011
A semi-fragile watermarking algorithm for authenticating 2D CAD engineering graphics based on log-polar transformation
F Peng, RS Guo, CT Li, M Long
Computer-Aided Design 42 (12), 1207-1216, 2010
462010
Separable robust reversible watermarking in encrypted 2D vector graphics
F Peng, WY Jiang, Y Qi, ZX Lin, M Long
IEEE Transactions on Circuits and Systems for Video Technology 30 (8), 2391-2405, 2020
392020
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20