Follow
Fei Peng
Title
Cited by
Cited by
Year
Robust coverless image steganography based on DCT and LDA topic classification
X Zhang, F Peng, M Long
IEEE Transactions on Multimedia 20 (12), 3223-3238, 2018
1802018
A competition on generalized software-based face presentation attack detection in mobile scenarios
Z Boulkenafet, J Komulainen, Z Akhtar, A Benlamoudi, D Samai, ...
2017 IEEE International Joint Conference on Biometrics (IJCB), 688-696, 2017
1582017
An ROI privacy protection scheme for H. 264 video based on FMO and chaos
F Peng, X Zhu, M Long
IEEE transactions on information forensics and security 8 (10), 1688-1699, 2013
942013
Separable reversible data hiding and encryption for HEVC video
M Long, F Peng, H Li
Journal of Real-Time Image Processing 14, 171-182, 2018
882018
Discrimination of natural images and computer generated graphics based on multi-fractal and regression analysis
F Peng, D Zhou, M Long, X Sun
AEU-International Journal of Electronics and Communications 71, 72-81, 2017
842017
A box-counting method with adaptable box height for measuring the fractal feature of images
M Long, F Peng
Radioengineering 22 (1), 208-213, 2013
832013
Face spoofing detection based on color texture Markov feature and support vector machine recursive feature elimination
LB Zhang, F Peng, L Qin, M Long
Journal of Visual Communication and Image Representation 51, 56-69, 2018
802018
FD-GAN: Face de-morphing generative adversarial network for restoring accomplice’s facial image
F Peng, LB Zhang, M Long
IEEE Access 7, 75122-75131, 2019
712019
Face presentation attack detection using guided scale texture
F Peng, L Qin, M Long
Multimedia Tools and Applications 77, 8883-8909, 2018
682018
A complete passive blind image copy-move forensics scheme based on compound statistics features
F Peng, Y Nie, M Long
Forensic science international 212 (1-3), e21-e25, 2011
662011
A reversible watermarking scheme for two-dimensional CAD engineering graphics based on improved difference expansion
F Peng, Y Lei, M Long, X Sun
Computer-Aided Design 43 (8), 1018-1024, 2011
662011
Face morphing detection using Fourier spectrum of sensor pattern noise
LB Zhang, F Peng, M Long
2018 IEEE international conference on multimedia and expo (ICME), 1-6, 2018
632018
Reversible data hiding in encrypted 2D vector graphics based on reversible mapping model for real numbers
F Peng, ZX Lin, X Zhang, M Long
IEEE transactions on information forensics and security 14 (9), 2400-2411, 2019
572019
Identifying natural images and computer generated graphics based on binary similarity measures of PRNU
M Long, F Peng, Y Zhu
Multimedia Tools and Applications 78 (1), 489-506, 2019
522019
A tunable selective encryption scheme for H. 265/HEVC based on chroma IPM and coefficient scrambling
F Peng, X Zhang, ZX Lin, M Long
IEEE Transactions on Circuits and Systems for Video Technology 30 (8), 2765-2780, 2019
482019
A semi-fragile watermarking algorithm for authenticating 2D CAD engineering graphics based on log-polar transformation
F Peng, RS Guo, CT Li, M Long
Computer-Aided Design 42 (12), 1207-1216, 2010
462010
A semi-fragile watermarking algorithm for authenticating 2D CAD engineering graphics based on log-polar transformation
F Peng, RS Guo, CT Li, M Long
Computer-Aided Design 42 (12), 1207-1216, 2010
462010
Simple and accurate analysis of BER performance for DCSK chaotic communication
M Long, Y Chen, F Peng
IEEE Communications Letters 15 (11), 1175-1177, 2011
452011
A selective encryption scheme for protecting H. 264/AVC video in multimedia social network
F Peng, X Gong, M Long, X Sun
Multimedia Tools and Applications 76, 3235-3253, 2017
412017
One-way Hash function construction based on two-dimensional hyper-chaotic mappings
F Peng, SS Qiu, M Long
372005
The system can't perform the operation now. Try again later.
Articles 1–20