Fei Peng
Orcid: 0000-0001-8053-4587Affiliations:
- Guangzhou University, Guangzhou, Guangdong, China
According to our database1,
Fei Peng
authored at least 104 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Trans. Mob. Comput., August, 2024
Detection of Adversarial Facial Accessory Presentation Attacks Using Local Face Differential.
ACM Trans. Multim. Comput. Commun. Appl., July, 2024
IEEE Trans. Biom. Behav. Identity Sci., July, 2024
ACM Comput. Surv., July, 2024
Separable Reversible Data Hiding for Encrypted 3D Mesh Models Based on Octree Subdivision and Multi-MSB Prediction.
IEEE Trans. Multim., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IET Image Process., 2024
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024
Proceedings of the IEEE International Conference on Acoustics, 2024
2023
Semi-Fragile Reversible Watermarking for 3D Models Using Spherical Crown Volume Division.
IEEE Trans. Circuits Syst. Video Technol., November, 2023
Dynamic Residual Distillation Network for Face Anti-Spoofing With Feature Attention Learning.
IEEE Trans. Biom. Behav. Identity Sci., October, 2023
A Low Distortion and Steganalysis-resistant Reversible Data Hiding for 2D Engineering Graphics.
ACM Trans. Multim. Comput. Commun. Appl., 2023
A Semi-Fragile Reversible Watermarking for Authenticating 3D Models Based on Virtual Polygon Projection and Double Modulation Strategy.
IEEE Trans. Multim., 2023
A Reversible Watermarking for 2D Engineering Graphics Based on Difference Expansion With Adaptive Interval Partitioning.
IEEE Trans. Dependable Secur. Comput., 2023
Proceedings of the Digital Forensics and Watermarking - 22nd International Workshop, 2023
Research and Implementation of EXFAT File System Reconstruction Algorithm Based on Cluster Size Assumption and Computational Verification.
Proceedings of the Artificial Intelligence Security and Privacy, 2023
2022
Vulnerabilities of Unattended Face Verification Systems to Facial Components-based Presentation Attacks: An Empirical Study.
ACM Trans. Priv. Secur., 2022
IEEE Trans. Inf. Forensics Secur., 2022
BDC-GAN: Bidirectional Conversion Between Computer-Generated and Natural Facial Images for Anti-Forensics.
IEEE Trans. Circuits Syst. Video Technol., 2022
A Semi-Fragile Reversible Watermarking for Authenticating 3D Models in Dual Domains Based on Variable Direction Double Modulation.
IEEE Trans. Circuits Syst. Video Technol., 2022
A Robust Coverless Steganography Based on Generative Adversarial Networks and Gradient Descent Approximation.
IEEE Trans. Circuits Syst. Video Technol., 2022
Signal Process. Image Commun., 2022
Presentation attack detection based on two-stream vision transformers with self-attention fusion.
J. Vis. Commun. Image Represent., 2022
Proceedings of the Machine Learning for Cyber Security - 4th International Conference, 2022
Face Presentation Attack Detection Based on Texture Gradient Enhancement and Multi-scale Fusion.
Proceedings of the Machine Learning for Cyber Security - 4th International Conference, 2022
Face Morphing Detection Based on a Two-Stream Network with Channel Attention and Residual of Multiple Color Spaces.
Proceedings of the Machine Learning for Cyber Security - 4th International Conference, 2022
2021
A Semi-Fragile Reversible Watermarking for Authenticating 2D Engineering Graphics Based on Improved Region Nesting.
IEEE Trans. Circuits Syst. Video Technol., 2021
A General Region Nesting-Based Semi-Fragile Reversible Watermarking for Authenticating 3D Mesh Models.
IEEE Trans. Circuits Syst. Video Technol., 2021
Low Visual Distortion and Robust Morphing Attacks Based on Partial Face Image Manipulation.
IEEE Trans. Biom. Behav. Identity Sci., 2021
Identifying natural images and computer-generated graphics based on convolutional neural network.
Int. J. Auton. Adapt. Commun. Syst., 2021
MSA-CNN: Face Morphing Detection via a Multiple Scales Attention Convolutional Neural Network.
Proceedings of the Digital Forensics and Watermarking - 20th International Workshop, 2021
2020
CGR-GAN: CG Facial Image Regeneration for Antiforensics Based on Generative Adversarial Network.
IEEE Trans. Multim., 2020
A Tunable Selective Encryption Scheme for H.265/HEVC Based on Chroma IPM and Coefficient Scrambling.
IEEE Trans. Circuits Syst. Video Technol., 2020
IEEE Trans. Circuits Syst. Video Technol., 2020
Reversible data hiding based on RSBEMD coding and adaptive multi-segment left and right histogram shifting.
Signal Process. Image Commun., 2020
A separable reversible data hiding scheme for encrypted images based on Tromino scrambling and adaptive pixel value ordering.
Signal Process., 2020
Face presentation attack detection based on chromatic co-occurrence of local binary pattern and ensemble learning.
J. Vis. Commun. Image Represent., 2020
Int. J. Bifurc. Chaos, 2020
Proceedings of the Digital Forensics and Watermarking - 19th International Workshop, 2020
A Facial Privacy Protection Framework Based on Component Difference and Template Morphing.
Proceedings of the 29th International Conference on Computer Communications and Networks, 2020
2019
IEEE Trans. Reliab., 2019
Reversible Data Hiding in Encrypted 2D Vector Graphics Based on Reversible Mapping Model for Real Numbers.
IEEE Trans. Inf. Forensics Secur., 2019
A reversible visible watermarking for 2D CAD engineering graphics based on graphics fusion.
Signal Process. Image Commun., 2019
A reversible watermarking for authenticating 2D CAD engineering graphics based on iterative embedding and virtual coordinates.
Multim. Tools Appl., 2019
Identifying natural images and computer generated graphics based on binary similarity measures of PRNU.
Multim. Tools Appl., 2019
Dynamic Provable Data Possession of Multiple Copies in Cloud Storage Based on Full-Node of AVL Tree.
Int. J. Digit. Crime Forensics, 2019
Comput. Secur., 2019
FD-GAN: Face De-Morphing Generative Adversarial Network for Restoring Accomplice's Facial Image.
IEEE Access, 2019
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019
2018
IEEE Trans. Multim., 2018
A Low-Distortion Reversible Watermarking for 2D Engineering Graphics Based on Region Nesting.
IEEE Trans. Inf. Forensics Secur., 2018
Multim. Tools Appl., 2018
Face spoofing detection based on color texture Markov feature and support vector machine recursive feature elimination.
J. Vis. Commun. Image Represent., 2018
J. Real Time Image Process., 2018
Int. J. Digit. Crime Forensics, 2018
A Format-Compliant Encryption for Secure HEVC Video Sharing in Multimedia Social Network.
Int. J. Digit. Crime Forensics, 2018
Int. J. Digit. Crime Forensics, 2018
Mosaic secret-fragment-visible data hiding for secure image transmission based on two-step energy matching.
Digit. Signal Process., 2018
FD-GAN: Face-demorphing generative adversarial network for restoring accomplice's facial image.
CoRR, 2018
Proceedings of the 2018 IEEE International Conference on Multimedia and Expo, 2018
CCoLBP: Chromatic Co-Occurrence of Local Binary Pattern for Face Presentation Attack Detection.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018
2017
A reversible watermarking for authenticating 2D vector graphics based on bionic spider web.
Signal Process. Image Commun., 2017
A selective encryption scheme for protecting H.264/AVC video in multimedia social network.
Multim. Tools Appl., 2017
J. Vis. Commun. Image Represent., 2017
High-fidelity reversible data hiding based on geodesic path and pairwise prediction-error expansion.
Neurocomputing, 2017
A Lossless Watermarking for 3D STL Model Based on Entity Rearrangement and Bit Mapping.
Int. J. Digit. Crime Forensics, 2017
Integrity Verification for Multiple Data Copies in Cloud Storage Based on Spatiotemporal Chaos.
Int. J. Bifurc. Chaos, 2017
A Reversible Watermarking for 2D Vector Map Based on Triple Differences Expansion and Reversible Contrast Mapping.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017
Identification of Natural Images and Computer Generated Graphics Based on Multiple LBPs in Multicolor Spaces.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017
Print-Scan Resilient Binary Map Watermarking Based on Extended Additive Noise Model and Scrambling.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017
Proceedings of the Cloud Computing and Security - Third International Conference, 2017
A competition on generalized software-based face presentation attack detection in mobile scenarios.
Proceedings of the 2017 IEEE International Joint Conference on Biometrics, 2017
Content-Independent Face Presentation Attack Detection with Directional Local Binary Pattern.
Proceedings of the Biometric Recognition - 12th Chinese Conference, 2017
2016
Multim. Tools Appl., 2016
POSTER: Non-intrusive Face Spoofing Detection Based on Guided Filtering and Image Quality Analysis.
Proceedings of the Security and Privacy in Communication Networks, 2016
Source Camera Identification Based on Guided Image Estimation and Block Weighted Average.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016
2015
A Semi-Fragile Reversible Watermarking for 2D CAD Engineering Graphics with Accurate Tampering Localization.
Int. J. Digit. Crime Forensics, 2015
An adaptive PEE-based reversible data hiding scheme exploiting referential prediction-errors.
Proceedings of the 2015 IEEE International Conference on Multimedia and Expo, 2015
Identification of Natural Images and Computer Generated Graphics Using Multi-fractal Differences of PRNU.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
2014
Discriminating natural images and computer generated graphics based on the impact of CFA interpolation on the correlation of PRNU.
Digit. Investig., 2014
Reversible watermarking for 2D CAD engineering graphics based on improved histogram shifting.
Comput. Aided Des., 2014
Identifying photographic images and photorealistic computer graphics using multifractal spectrum features of PRNU.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2014
2013
IEEE Trans. Inf. Forensics Secur., 2013
A reversible watermark scheme for 2D vector map based on reversible contrast mapping.
Secur. Commun. Networks, 2013
Int. J. Digit. Crime Forensics, 2013
2012
Signal Process., 2012
Identification of Natural Images and Computer Generated Graphics Based on Hybrid Features.
Int. J. Digit. Crime Forensics, 2012
IET Commun., 2012
Proceedings of the Digital Forensics and Watermaking - 11th International Workshop, 2012
2011
A Steganalysis Method for 2D Engineering Graphics Based on the Statistic of Geometric Features.
Int. J. Digit. Crime Forensics, 2011
IEEE Commun. Lett., 2011
A reversible watermarking scheme for two-dimensional CAD engineering graphics based on improved difference expansion.
Comput. Aided Des., 2011
Proceedings of the 2011 IEEE International Conference on Multimedia and Expo, 2011
2010
A semi-fragile watermarking algorithm for authenticating 2D CAD engineering graphics based on log-polar transformation.
Comput. Aided Des., 2010
Proceedings of the Advances in Multimedia Information Processing - PCM 2010, 2010
2009
A Semi-fragile Watermarking Algorithm for Authenticating 2D Engineering Graphics Based on Log-Polar Transformation.
Proceedings of the Information Security and Digital Forensics, 2009
A reversible watermarking scheme for 2D engineering graphics based on improved quantisation index modulation.
Proceedings of the 3rd International Conference on Imaging for Crime Detection and Prevention, 2009
2008
Proceedings of The International Symposium on Electronic Commerce and Security, 2008
A Capacity Variable Watermarking Algorithm for 2D Engineering Graphic Based on Complex Number System.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
A Multiple Encryption Algorithm for 2D Engineering Graphic Based on Fourier Descriptors and Chaos Scrambling.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
A Strength Variable Encryption Algorithm for 2D Engineering Graphic Based on Discrete Cosine Descriptors and Chaos Scrambling.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
Proceedings of the 9th International Conference for Young Computer Scientists, 2008