Fei Peng

Orcid: 0000-0001-8053-4587

Affiliations:
  • Guangzhou University, Guangzhou, Guangdong, China


According to our database1, Fei Peng authored at least 104 papers between 2008 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Locally Private Set-Valued Data Analyses: Distribution and Heavy Hitters Estimation.
IEEE Trans. Mob. Comput., August, 2024

Detection of Adversarial Facial Accessory Presentation Attacks Using Local Face Differential.
ACM Trans. Multim. Comput. Commun. Appl., July, 2024

Trans-FD: Transformer-Based Representation Interaction for Face De-Morphing.
IEEE Trans. Biom. Behav. Identity Sci., July, 2024

A Survey on Reversible Data Hiding for Uncompressed Images.
ACM Comput. Surv., July, 2024

Separable Reversible Data Hiding for Encrypted 3D Mesh Models Based on Octree Subdivision and Multi-MSB Prediction.
IEEE Trans. Multim., 2024

Face De-Morphing Based on Diffusion Autoencoders.
IEEE Trans. Inf. Forensics Secur., 2024

Category-Conditional Gradient Alignment for Domain Adaptive Face Anti-Spoofing.
IEEE Trans. Inf. Forensics Secur., 2024

ADFF: Adaptive de-morphing factor framework for restoring accomplice's facial image.
IET Image Process., 2024

Dig a Hole and Fill in Sand: Adversary and Hiding Decoupled Steganography.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

Causality-Inspired Single-Source Domain Generalization for Face Anti-Spoofing.
Proceedings of the IEEE International Conference on Acoustics, 2024

2023
Semi-Fragile Reversible Watermarking for 3D Models Using Spherical Crown Volume Division.
IEEE Trans. Circuits Syst. Video Technol., November, 2023

Dynamic Residual Distillation Network for Face Anti-Spoofing With Feature Attention Learning.
IEEE Trans. Biom. Behav. Identity Sci., October, 2023

A Low Distortion and Steganalysis-resistant Reversible Data Hiding for 2D Engineering Graphics.
ACM Trans. Multim. Comput. Commun. Appl., 2023

A Semi-Fragile Reversible Watermarking for Authenticating 3D Models Based on Virtual Polygon Projection and Double Modulation Strategy.
IEEE Trans. Multim., 2023

A Reversible Watermarking for 2D Engineering Graphics Based on Difference Expansion With Adaptive Interval Partitioning.
IEEE Trans. Dependable Secur. Comput., 2023

3DPS: 3D Printing Signature for Authentication Based on Equipment Distortion Model.
Proceedings of the Digital Forensics and Watermarking - 22nd International Workshop, 2023

Research and Implementation of EXFAT File System Reconstruction Algorithm Based on Cluster Size Assumption and Computational Verification.
Proceedings of the Artificial Intelligence Security and Privacy, 2023

2022
Vulnerabilities of Unattended Face Verification Systems to Facial Components-based Presentation Attacks: An Empirical Study.
ACM Trans. Priv. Secur., 2022

Face Morphing Attack Detection and Localization Based on Feature-Wise Supervision.
IEEE Trans. Inf. Forensics Secur., 2022

BDC-GAN: Bidirectional Conversion Between Computer-Generated and Natural Facial Images for Anti-Forensics.
IEEE Trans. Circuits Syst. Video Technol., 2022

A Semi-Fragile Reversible Watermarking for Authenticating 3D Models in Dual Domains Based on Variable Direction Double Modulation.
IEEE Trans. Circuits Syst. Video Technol., 2022

A Robust Coverless Steganography Based on Generative Adversarial Networks and Gradient Descent Approximation.
IEEE Trans. Circuits Syst. Video Technol., 2022

Face morphing attack detection and attacker identification based on a watchlist.
Signal Process. Image Commun., 2022

Presentation attack detection based on two-stream vision transformers with self-attention fusion.
J. Vis. Commun. Image Represent., 2022

F2DLNet: A Face Forgery Detection and Localization Network Based on SSIM Error Maps.
Proceedings of the Machine Learning for Cyber Security - 4th International Conference, 2022

Face Presentation Attack Detection Based on Texture Gradient Enhancement and Multi-scale Fusion.
Proceedings of the Machine Learning for Cyber Security - 4th International Conference, 2022

Face Morphing Detection Based on a Two-Stream Network with Channel Attention and Residual of Multiple Color Spaces.
Proceedings of the Machine Learning for Cyber Security - 4th International Conference, 2022

2021
A Semi-Fragile Reversible Watermarking for Authenticating 2D Engineering Graphics Based on Improved Region Nesting.
IEEE Trans. Circuits Syst. Video Technol., 2021

A General Region Nesting-Based Semi-Fragile Reversible Watermarking for Authenticating 3D Mesh Models.
IEEE Trans. Circuits Syst. Video Technol., 2021

Low Visual Distortion and Robust Morphing Attacks Based on Partial Face Image Manipulation.
IEEE Trans. Biom. Behav. Identity Sci., 2021

Identifying natural images and computer-generated graphics based on convolutional neural network.
Int. J. Auton. Adapt. Commun. Syst., 2021

MSA-CNN: Face Morphing Detection via a Multiple Scales Attention Convolutional Neural Network.
Proceedings of the Digital Forensics and Watermarking - 20th International Workshop, 2021

2020
CGR-GAN: CG Facial Image Regeneration for Antiforensics Based on Generative Adversarial Network.
IEEE Trans. Multim., 2020

A Tunable Selective Encryption Scheme for H.265/HEVC Based on Chroma IPM and Coefficient Scrambling.
IEEE Trans. Circuits Syst. Video Technol., 2020

Separable Robust Reversible Watermarking in Encrypted 2D Vector Graphics.
IEEE Trans. Circuits Syst. Video Technol., 2020

Reversible data hiding based on RSBEMD coding and adaptive multi-segment left and right histogram shifting.
Signal Process. Image Commun., 2020

A separable reversible data hiding scheme for encrypted images based on Tromino scrambling and adaptive pixel value ordering.
Signal Process., 2020

Face presentation attack detection based on chromatic co-occurrence of local binary pattern and ensemble learning.
J. Vis. Commun. Image Represent., 2020

A Coverless Image Information Hiding Algorithm Based on Fractal Theory.
Int. J. Bifurc. Chaos, 2020

Visible Reversible Watermarking for 3D Models Based on Mesh Subdivision.
Proceedings of the Digital Forensics and Watermarking - 19th International Workshop, 2020

A Facial Privacy Protection Framework Based on Component Difference and Template Morphing.
Proceedings of the 29th International Conference on Computer Communications and Networks, 2020

2019
3-D Printed Object Authentication Based on Printing Noise and Digital Signature.
IEEE Trans. Reliab., 2019

Reversible Data Hiding in Encrypted 2D Vector Graphics Based on Reversible Mapping Model for Real Numbers.
IEEE Trans. Inf. Forensics Secur., 2019

A reversible visible watermarking for 2D CAD engineering graphics based on graphics fusion.
Signal Process. Image Commun., 2019

A reversible watermarking for authenticating 2D CAD engineering graphics based on iterative embedding and virtual coordinates.
Multim. Tools Appl., 2019

Identifying natural images and computer generated graphics based on binary similarity measures of PRNU.
Multim. Tools Appl., 2019

Dynamic Provable Data Possession of Multiple Copies in Cloud Storage Based on Full-Node of AVL Tree.
Int. J. Digit. Crime Forensics, 2019

Source identification of 3D printed objects based on inherent equipment distortion.
Comput. Secur., 2019

FD-GAN: Face De-Morphing Generative Adversarial Network for Restoring Accomplice's Facial Image.
IEEE Access, 2019

A Face Privacy Protection Scheme Using CNN Based ROI Editing.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

2018
Robust Coverless Image Steganography Based on DCT and LDA Topic Classification.
IEEE Trans. Multim., 2018

A Low-Distortion Reversible Watermarking for 2D Engineering Graphics Based on Region Nesting.
IEEE Trans. Inf. Forensics Secur., 2018

Face presentation attack detection using guided scale texture.
Multim. Tools Appl., 2018

Face spoofing detection based on color texture Markov feature and support vector machine recursive feature elimination.
J. Vis. Commun. Image Represent., 2018

Separable reversible data hiding and encryption for HEVC video.
J. Real Time Image Process., 2018

Print-Scan Resilient Binary Map Watermarking Based on DCT and Scrambling.
Int. J. Digit. Crime Forensics, 2018

A Format-Compliant Encryption for Secure HEVC Video Sharing in Multimedia Social Network.
Int. J. Digit. Crime Forensics, 2018

A Perceptual Encryption Scheme for HEVC Video with Lossless Compression.
Int. J. Digit. Crime Forensics, 2018

Mosaic secret-fragment-visible data hiding for secure image transmission based on two-step energy matching.
Digit. Signal Process., 2018

FD-GAN: Face-demorphing generative adversarial network for restoring accomplice's facial image.
CoRR, 2018

Face Morphing Detection Using Fourier Spectrum of Sensor Pattern Noise.
Proceedings of the 2018 IEEE International Conference on Multimedia and Expo, 2018

CCoLBP: Chromatic Co-Occurrence of Local Binary Pattern for Face Presentation Attack Detection.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

2017
A reversible watermarking for authenticating 2D vector graphics based on bionic spider web.
Signal Process. Image Commun., 2017

A selective encryption scheme for protecting H.264/AVC video in multimedia social network.
Multim. Tools Appl., 2017

Identifying source camera using guided image estimation and block weighted average.
J. Vis. Commun. Image Represent., 2017

High-fidelity reversible data hiding based on geodesic path and pairwise prediction-error expansion.
Neurocomputing, 2017

A Lossless Watermarking for 3D STL Model Based on Entity Rearrangement and Bit Mapping.
Int. J. Digit. Crime Forensics, 2017

Integrity Verification for Multiple Data Copies in Cloud Storage Based on Spatiotemporal Chaos.
Int. J. Bifurc. Chaos, 2017

A Reversible Watermarking for 2D Vector Map Based on Triple Differences Expansion and Reversible Contrast Mapping.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Identification of Natural Images and Computer Generated Graphics Based on Multiple LBPs in Multicolor Spaces.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Print-Scan Resilient Binary Map Watermarking Based on Extended Additive Noise Model and Scrambling.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

A Perceptual Encryption Scheme for HEVC Video with Lossless Compression.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017


Content-Independent Face Presentation Attack Detection with Directional Local Binary Pattern.
Proceedings of the Biometric Recognition - 12th Chinese Conference, 2017

2016
Image tamper detection based on noise estimation and lacunarity texture.
Multim. Tools Appl., 2016

POSTER: Non-intrusive Face Spoofing Detection Based on Guided Filtering and Image Quality Analysis.
Proceedings of the Security and Privacy in Communication Networks, 2016

Source Camera Identification Based on Guided Image Estimation and Block Weighted Average.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

2015
A Semi-Fragile Reversible Watermarking for 2D CAD Engineering Graphics with Accurate Tampering Localization.
Int. J. Digit. Crime Forensics, 2015

An adaptive PEE-based reversible data hiding scheme exploiting referential prediction-errors.
Proceedings of the 2015 IEEE International Conference on Multimedia and Expo, 2015

Identification of Natural Images and Computer Generated Graphics Using Multi-fractal Differences of PRNU.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

2014
Improved PVO-based reversible data hiding.
Digit. Signal Process., 2014

Discriminating natural images and computer generated graphics based on the impact of CFA interpolation on the correlation of PRNU.
Digit. Investig., 2014

Reversible watermarking for 2D CAD engineering graphics based on improved histogram shifting.
Comput. Aided Des., 2014

Identifying photographic images and photorealistic computer graphics using multifractal spectrum features of PRNU.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2014

2013
An ROI Privacy Protection Scheme for H.264 Video Based on FMO and Chaos.
IEEE Trans. Inf. Forensics Secur., 2013

A reversible watermark scheme for 2D vector map based on reversible contrast mapping.
Secur. Commun. Networks, 2013

An Effective Selective Encryption Scheme for H.264 Video based on Chaotic Qi System.
Int. J. Digit. Crime Forensics, 2013

2012
Adaptive reversible data hiding scheme based on integer transform.
Signal Process., 2012

Identification of Natural Images and Computer Generated Graphics Based on Hybrid Features.
Int. J. Digit. Crime Forensics, 2012

Bit error rate improvement for chaos shift keying chaotic communication systems.
IET Commun., 2012

Calibration Based Reliable Detector for Detecting LSB Matching Steganography.
Proceedings of the Digital Forensics and Watermaking - 11th International Workshop, 2012

2011
A Steganalysis Method for 2D Engineering Graphics Based on the Statistic of Geometric Features.
Int. J. Digit. Crime Forensics, 2011

Simple and Accurate Analysis of BER Performance for DCSK Chaotic Communication.
IEEE Commun. Lett., 2011

A reversible watermarking scheme for two-dimensional CAD engineering graphics based on improved difference expansion.
Comput. Aided Des., 2011

Reversible image water marking based on prediction-error expansion and compensation.
Proceedings of the 2011 IEEE International Conference on Multimedia and Expo, 2011

2010
A semi-fragile watermarking algorithm for authenticating 2D CAD engineering graphics based on log-polar transformation.
Comput. Aided Des., 2010

Improved DE-Based Reversible Watermarking Using Sorting and Histogram Shifting.
Proceedings of the Advances in Multimedia Information Processing - PCM 2010, 2010

2009
A Semi-fragile Watermarking Algorithm for Authenticating 2D Engineering Graphics Based on Log-Polar Transformation.
Proceedings of the Information Security and Digital Forensics, 2009

A reversible watermarking scheme for 2D engineering graphics based on improved quantisation index modulation.
Proceedings of the 3rd International Conference on Imaging for Crime Detection and Prevention, 2009

2008
A Zero-Watermark Algorithm with Real-Mean for 2D Engineering Graphic.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008

A Capacity Variable Watermarking Algorithm for 2D Engineering Graphic Based on Complex Number System.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

A Multiple Encryption Algorithm for 2D Engineering Graphic Based on Fourier Descriptors and Chaos Scrambling.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

A Strength Variable Encryption Algorithm for 2D Engineering Graphic Based on Discrete Cosine Descriptors and Chaos Scrambling.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

An Encryption Algorithm for 2D Engineering Graphics' Content Based on Chaos Systems.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008


  Loading...