Fei Peng
Titel
Zitiert von
Zitiert von
Jahr
A competition on generalized software-based face presentation attack detection in mobile scenarios
Z Boulkenafet, J Komulainen, Z Akhtar, A Benlamoudi, D Samai, ...
2017 IEEE International Joint Conference on Biometrics (IJCB), 688-696, 2017
932017
Robust coverless image steganography based on DCT and LDA topic classification
X Zhang, F Peng, M Long
IEEE Transactions on Multimedia 20 (12), 3223-3238, 2018
842018
An ROI privacy protection scheme for H. 264 video based on FMO and chaos
F Peng, X Zhu, M Long
IEEE transactions on information forensics and security 8 (10), 1688-1699, 2013
782013
A box-counting method with adaptable box height for measuring the fractal feature of images
M Long, F Peng
Radioengineering 22 (1), 208-213, 2013
562013
A reversible watermarking scheme for two-dimensional CAD engineering graphics based on improved difference expansion
F Peng, Y Lei, M Long, X Sun
Computer-Aided Design 43 (8), 1018-1024, 2011
562011
Discrimination of natural images and computer generated graphics based on multi-fractal and regression analysis
F Peng, D Zhou, M Long, X Sun
AEU-International Journal of Electronics and Communications 71, 72-81, 2017
542017
A complete passive blind image copy-move forensics scheme based on compound statistics features
F Peng, Y Nie, M Long
Forensic science international 212 (1-3), e21-e25, 2011
542011
Separable reversible data hiding and encryption for HEVC video
M Long, F Peng, H Li
Journal of Real-Time Image Processing 14 (1), 171-182, 2018
482018
Face spoofing detection based on color texture Markov feature and support vector machine recursive feature elimination
LB Zhang, F Peng, L Qin, M Long
Journal of Visual Communication and Image Representation 51, 56-69, 2018
412018
A semi-fragile watermarking algorithm for authenticating 2D CAD engineering graphics based on log-polar transformation
F Peng, RS Guo, CT Li, M Long
Computer-Aided Design 42 (12), 1207-1216, 2010
412010
A semi-fragile watermarking algorithm for authenticating 2D CAD engineering graphics based on log-polar transformation
F Peng, RS Guo, CT Li, M Long
Computer-Aided Design 42 (12), 1207-1216, 2010
412010
One-way Hash function construction based on two-dimensional hyper-chaotic mappings
F Peng, SS Qiu, M Long
Acta Physica Sinica 54 (10), 4562-4568, 2005
362005
Simple and accurate analysis of BER performance for DCSK chaotic communication
M Long, Y Chen, F Peng
IEEE communications letters 15 (11), 1175-1177, 2011
352011
Face presentation attack detection using guided scale texture
F Peng, L Qin, M Long
Multimedia Tools and Applications 77 (7), 8883-8909, 2018
342018
A selective encryption scheme for protecting H. 264/AVC video in multimedia social network
F Peng, X Gong, M Long, X Sun
Multimedia Tools and Applications 76 (3), 3235-3253, 2017
282017
High-fidelity reversible data hiding based on geodesic path and pairwise prediction-error expansion
B Ou, X Li, J Wang, F Peng
Neurocomputing 226, 23-34, 2017
272017
Fd-gan: Face de-morphing generative adversarial network for restoring accomplice’s facial image
F Peng, LB Zhang, M Long
IEEE Access 7, 75122-75131, 2019
262019
A reversible watermarking for authenticating 2D CAD engineering graphics based on iterative embedding and virtual coordinates
F Peng, Q Long, ZX Lin, M Long
Multimedia Tools and Applications 78 (19), 26885-26905, 2019
252019
Reversible data hiding in encrypted 2D vector graphics based on reversible mapping model for real numbers
F Peng, ZX Lin, X Zhang, M Long
IEEE Transactions on Information Forensics and Security 14 (9), 2400-2411, 2019
242019
Face morphing detection using Fourier spectrum of sensor pattern noise
LB Zhang, F Peng, M Long
2018 IEEE International Conference on Multimedia and Expo (ICME), 1-6, 2018
232018
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20