Yang Pengpeng

Yang Pengpeng
  • PhD
  • Beijing Key Laboratory of Advanced Information Science and Network Technology at Beijing Jiaotong University

About

28
Publications
9,531
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
475
Citations
Current institution
Beijing Jiaotong University
Current position
  • Beijing Key Laboratory of Advanced Information Science and Network Technology

Publications

Publications (28)
Article
The rapid development of digital cameras and smart-phones makes it easy for people to record the information displayed in the media and obtain high-quality recaptured images, which would pose a serious threat to copyright protection, identity authentication, and public social security. Therefore, detecting recaptured images is an urgent problem in...
Article
Full-text available
The promulgation of the outline of the 14th Five-Year Plan for National Economic and Social Development of the People’s Republic of China and the Long-Range Objectives Through the Year 2035 has clarified the focus of work and put forward new requirements for the training of electronic and information science professionals. The teaching methods and...
Article
Full-text available
Authentication of users through their biometric identity has continuously shown ever-increasing importance in our daily lives. However, since biometric data is permanently associated with the users, any loss of this data would be disastrous because it is irrevocable and irreplaceable, unlike traditional passwords and tokens. Therefore, cancelable t...
Article
Due to the development of facial manipulation technologies, the generated deepfake videos cause a severe trust crisis in society. Existing methods prove that effective extraction of the artifacts introduced during the forgery process is essential for deepfake detection. However, since the features extracted by supervised binary classification conta...
Article
Full-text available
Contrast enhancement forensics techniques have always been of great interest for the image forensics community, as they can be an effective tool for recovering image history and identifying tampered images. Although several contrast enhancement forensic algorithms have been proposed, their accuracy and robustness against some kinds of processing ar...
Article
Full-text available
As one of the most popular digital image manipulations, contrast enhancement (CE) is frequently applied to improve the visual quality of the forged images and conceal traces of forgery, therefore it can provide evidence of tampering when verifying the authenticity of digital images. Contrast enhancement forensics techniques have always drawn signif...
Article
Full-text available
In the multimedia forensics community, anti-forensics of contrast enhancement (CE) in digital images is an important topic to understand the vulnerability of the corresponding CE forensic method. Some traditional CE anti-forensic methods have demonstrated their effective forging ability to erase forensic fingerprints of the contrast-enhanced image...
Preprint
Most video forensic techniques look for traces within the data stream that are, however, mostly ineffective when dealing with strongly compressed or low resolution videos. Recent research highlighted that useful forensic traces are also left in the video container structure, thus offering the opportunity to understand the life-cycle of a video file...
Preprint
From 2010 to 2017, the ImageNet Large Scale Visual Recognition Challenge (ILSVRC) competition has witnessed many successful classical convolutional neural networks (CNN) for image classification, such as AlexNet, VGGNet, GoogleNet, ResNet, DensetNet, XceptionNet and so on. Inspired by the excellent performance of CNNs, numerous of forensics CNNs ha...
Article
Most video forensic techniques look for traces within the data stream that are, however, mostly ineffective when dealing with strongly compressed or low resolution videos. Recent research highlighted that useful forensic traces are also left in the video container structure, thus offering the opportunity to understand the life-cycle of a video file...
Article
Full-text available
Image source forensics is widely considered as one of the most effective ways to verify in a blind way digital image authenticity and integrity. In the last few years, many researchers have applied data-driven approaches to this task, inspired by the excellent performance obtained by those techniques on computer vision problems. In this survey, we...
Preprint
Full-text available
Contrast enhancement (CE) forensics has always been of concern to image forensics community. It can provide an effective tool for recovering image history and identifying tampered images. Although several CE forensic algorithms have been proposed, their robustness against some processing is still unsatisfactory, such as JPEG compression and anti-fo...
Preprint
From 2010 to 2017, the ImageNet Large Scale Visual Recognition Challenge (ILSVRC) competition has witnessed many successful conventional convolutional neural networks (CNN) architectures for image classification, such as AlexNet, VGGNet, GoogleNet, ResNet, DensetNet, XceptionNet, and so on. Inspired by the excellent performance of CNNs, numerous of...
Chapter
Full-text available
Recapture is often used to hide the traces left by some operations such as JPEG compression, copy-move, etc. However, various detectors have been proposed to detect recaptured images. To counter these techniques, in this paper, we propose a method that can translate recaptured images to fake “original images” to fool both human and machines. Our me...
Article
Full-text available
Digital source identification is one of the most important problems in the field of multimedia forensics. While Standard Dynamic Range (SDR) images are commonly analyzed, High Dynamic Range (HDR) images are a less common research subject, which leaves space for further analysis. In this paper, we present a novel database of HDR and SDR images captu...
Conference Paper
Full-text available
Recapture is often used to hide the traces left by some operations such as JPEG compression, copy-move, etc. However, various detectors have been proposed to detect recaptured images. To counter these techniques, in this paper, we propose a method that can translate recaptured images to fake \original images" to fool both human and machines. Our me...
Preprint
Full-text available
In the field of digital image processing, JPEG image compression technique has been widely applied. And numerous image processing software suppose this. It is likely for the images undergoing double JPEG compression to be tampered. Therefore, double JPEG compression detection schemes can provide an important clue for image forgery detection. In thi...
Article
Full-text available
Recently, image forensics community has paied attention to the research on the design of effective algorithms based on deep learning technology and facts proved that combining the domain knowledge of image forensics and deep learning would achieve more robust and better performance than the traditional schemes. Instead of improving it, in this pape...
Preprint
Recently, image forensics community has paied attention to the research on the design of effective algorithms based on deep learning technology and facts proved that combining the domain knowledge of image forensics and deep learning would achieve more robust and better performance than the traditional schemes. Instead of improving it, in this pape...
Article
Full-text available
Contrast enhancement (CE) forensics has always been ofconcern to image forensics community. It can provide aneffective tool for recovering image history and identifyingtampered images. Although several CE forensic algorithmshave been proposed, their robustness against some processingis still unsatisfactory, such as JPEG compression and anti-forensi...
Conference Paper
Full-text available
The recaptured images forensics has drawn much attention in forensics community. The technology can provide some evidences for copyright protection and protect the face spoofing system to a certain degree. In this paper, we propose an algorithm to detect the images recaptured from LCD screen. On the one hand, the quality of the recaptured images wo...
Article
Full-text available
Source camera identification is still a hard task in forensics community, especially for the case of the query images with small size. In this paper, we propose a solution to identify the source camera of the small-size images: content-adaptive fusion residual networks. According to the differences of the image contents, firstly, the images are div...
Preprint
Source camera identification is still a hard task in forensics community, especially for the case of the small query image size. In this paper, we propose a solution to identify the source camera of the small-size images: content-adaptive fusion network. In order to learn better feature representation from the input data, content-adaptive convoluti...
Conference Paper
Full-text available
Recapture image forensics has drawn much attention in public security forensics. Although some algorithms have been proposed to deal with it, there is still great challenge for small-size images. In this paper, we propose a generalized model for small-size recapture image forensics based on Laplacian Convolutional Neural Networks. Different from ot...

Network

Cited By