Dongming Peng, PhD

  • 820 Citations
  • 16 h-Index
20002018

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

2018

Fidelity-preserving coefficient truncation method for wavelet-based compressors for biomedical IoT applications

Santos, J., Peng, D., Hempel, M. & Sharif, H., Jan 25 2018, 2017, 11th International Conference on Signal Processing and Communication Systems, ICSPCS 2017 - Proceedings. Wysocki, B. J. & Wysocki, T. A. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 1-8 8 p. (2017, 11th International Conference on Signal Processing and Communication Systems, ICSPCS 2017 - Proceedings; vol. 2018-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Joint Steganography-Source-Channel Coding for Wireless Physiological Signal Transmission

Sahu, N., Peng, D. & Sharif, H., Jul 27 2018, 2018 IEEE International Conference on Communications, ICC 2018 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 8422937. (IEEE International Conference on Communications; vol. 2018-May).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Towards a Physiologically-Aware Architecture for Transmission of Biomedical Signals in BASNs/IoT

Santos, J., Peng, D., Hempel, M. & Sharif, H., Jul 27 2018, 2018 IEEE International Conference on Communications, ICC 2018 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 8422796. (IEEE International Conference on Communications; vol. 2018-May).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2017

Feature-based diagnostic distortion measure for unsupervised self-guided biomedical signal compressors

Santos, J., Peng, D., Hempel, M. & Sharif, H., Nov 20 2017, 2017 IEEE 13th International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2017. IEEE Computer Society, 8115801. (International Conference on Wireless and Mobile Computing, Networking and Communications; vol. 2017-October).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Unequal steganography with unequal error protection for wireless physiological signal transmission

Sahu, N., Peng, D. & Sharif, H., Jul 28 2017, 2017 IEEE International Conference on Communications, ICC 2017. Debbah, M., Gesbert, D. & Mellouk, A. (eds.). Institute of Electrical and Electronics Engineers Inc., 7996377. (IEEE International Conference on Communications).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations
2016

A resource-efficient approach to steganography in mobile systems

Dahal, P., Peng, D., Yang, Y. & Sharif, H., Sep 26 2016, 2016 International Wireless Communications and Mobile Computing Conference, IWCMC 2016. Institute of Electrical and Electronics Engineers Inc., p. 150-157 8 p. 7577049. (2016 International Wireless Communications and Mobile Computing Conference, IWCMC 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

DST approach to enhance audio quality on lost audio packet steganography

Qi, Q., Peng, D. & Sharif, H., Dec 1 2016, In : Eurasip Journal on Information Security. 2016, 1, 20.

Research output: Contribution to journalArticle

2 Scopus citations

Generic attack against robust steganography based on spring transform and geometrization

Qi, Q., Sharp, A., Peng, D., Yang, Y. & Sharif, H., Nov 10 2016, In : Security and Communication Networks. 9, 16, p. 3880-3892 13 p.

Research output: Contribution to journalArticle

1 Scopus citations

Image processing pipeline model integrating steganographic algorithms for mobile cameras

Dahal, P., Peng, D. & Sharif, H., May 30 2016, WTMC 2016 - Proceedings of the 2016 ACM International Workshop on Traffic Measurements for Cybersecurity, Co-located with Asia CCS 2016. Association for Computing Machinery, Inc, p. 50-57 8 p. (WTMC 2016 - Proceedings of the 2016 ACM International Workshop on Traffic Measurements for Cybersecurity, Co-located with Asia CCS 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Real-time audio steganography attack based on automatic objective quality feedback

Qi, Q., Sharp, A., Peng, D. & Sharif, H., May 25 2016, In : Security and Communication Networks. 9, 8, p. 737-746 10 p.

Research output: Contribution to journalArticle

1 Scopus citations
2014

Frequency domain discrete spring transform: A novel frequency domain steganographic attack

Sharp, A., Qi, Q., Yang, Y., Peng, D. & Sharif, H., Oct 14 2014, 2014 9th International Symposium on Communication Systems, Networks and Digital Signal Processing, CSNDSP 2014. Institute of Electrical and Electronics Engineers Inc., p. 972-976 5 p. 6923970. (2014 9th International Symposium on Communication Systems, Networks and Digital Signal Processing, CSNDSP 2014).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Performance analysis of a novel low-complexity high-precision timing synchronization method for wireless sensor networks

Ma, T., Xu, Z., Hempel, M., Peng, D. & Sharif, H., Sep 1 2014, In : IEEE Transactions on Wireless Communications. 13, 9, p. 4758-4765 8 p., 6837509.

Research output: Contribution to journalArticle

8 Scopus citations

Steganography attack based on Discrete Spring Transform and image geometrization

Qi, Q., Sharp, A., Yang, Y., Peng, D. & Sharif, H., Sep 22 2014, IWCMC 2014 - 10th International Wireless Communications and Mobile Computing Conference. Institute of Electrical and Electronics Engineers Inc., p. 554-558 5 p. 6906416. (IWCMC 2014 - 10th International Wireless Communications and Mobile Computing Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations
2013

Adaptive Threshold Displacement algorithm for removing hidden information from digital images

Rezaei, F., Hempel, M., Ma, T., Shrestha, P. L., Peng, D. & Sharif, H., 2013, 2013 IEEE Global Communications Conference, GLOBECOM 2013. Institute of Electrical and Electronics Engineers Inc., p. 635-640 6 p. 6831143. (GLOBECOM - IEEE Global Telecommunications Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

An active audio steganography attacking method using discrete spring transform

Qi, Q., Sharp, A., Peng, D., Yang, Y. & Sharif, H., 2013, 2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications, PIMRC 2013. p. 3456-3460 5 p. 6666746. (IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

Analysis and evaluation of covert channels over LTE advanced

Rezaei, F., Hempel, M., Peng, D., Qian, Y. & Sharif, H., 2013, 2013 IEEE Wireless Communications and Networking Conference, WCNC 2013. p. 1903-1908 6 p. 6554855. (IEEE Wireless Communications and Networking Conference, WCNC).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

20 Scopus citations

An anti-steganographic approach for removing secret information in digital audio data hidden by spread spectrum methods

Rezaei, F., Ma, T., Hempel, M., Peng, D. & Sharif, H., 2013, 2013 IEEE International Conference on Communications, ICC 2013. Institute of Electrical and Electronics Engineers Inc., p. 2117-2122 6 p. 6654839. (IEEE International Conference on Communications).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Scopus citations

A novel active warden steganographic attack for next-generation steganography

Sharp, A., Qi, Q., Yang, Y., Peng, D. & Sharif, H., 2013, 2013 9th International Wireless Communications and Mobile Computing Conference, IWCMC 2013. p. 1138-1143 6 p. 6583717. (2013 9th International Wireless Communications and Mobile Computing Conference, IWCMC 2013).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Scopus citations

A survey of energy-efficient compression and communication techniques for multimedia in resource constrained systems

Ma, T., Hempel, M., Peng, D. & Sharif, H., 2013, In : IEEE Communications Surveys and Tutorials. 15, 3, p. 963-972 10 p., 6226793.

Research output: Contribution to journalReview article

73 Scopus citations

A video steganography attack using multi-dimensional discrete spring transform

Sharp, A., Qi, Q., Yang, Y., Peng, D. & Sharif, H., 2013, IEEE ICSIPA 2013 - IEEE International Conference on Signal and Image Processing Applications. IEEE Computer Society, p. 182-186 5 p. 6708000. (IEEE ICSIPA 2013 - IEEE International Conference on Signal and Image Processing Applications).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

Disrupting and preventing late-packet covert communication using sequence number tracking

Rezaei, F., Hempel, M., Peng, D. & Sharif, H., 2013, Proceedings - 2013 IEEE Military Communications Conference, MILCOM 2013. p. 599-604 6 p. 6735688. (Proceedings - IEEE Military Communications Conference MILCOM).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Scopus citations
2012

A quality-preserving hidden information removal approach for digital images

Rezaei, F., Hempel, M., Shrestha, P. L., Ma, T., Peng, D. & Sharif, H., 2012, 2012 IEEE International Conference on Communications, ICC 2012. p. 1021-1025 5 p. 6364070. (IEEE International Conference on Communications).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Scopus citations

Assurance of energy efficiency and data security for ECG transmission in BASNs

Ma, T., Shrestha, P. L., Hempel, M., Peng, D., Sharif, H. & Chen, H. H., Apr 2012, In : IEEE Transactions on Biomedical Engineering. 59, 4, p. 1041-1048 8 p.

Research output: Contribution to journalArticle

38 Scopus citations

Using cross-layer techniques for ECG transmissions in body area sensor networks

Ma, T., Hempel, M., Peng, D., Sharif, H., Rezaei, F., Shrestha, P. L. & Chen, H. H., 2012, Using Cross-Layer Techniques for Communication Systems. IGI Global, p. 120-137 18 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

1 Scopus citations

Watermark removal using pseudorandom desynchronization by selective pixel elimination

Shrestha, P. L., Hempel, M., Ma, T., Peng, D. & Sharif, H., 2012, 2012 IEEE International Conference on Communications, ICC 2012. p. 1016-1020 5 p. 6364032. (IEEE International Conference on Communications).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations
2011

A general attack method for steganography removal using pseudo-CFA re-interpolation

Shrestha, P. L., Hempel, M., Ma, T., Peng, D. & Sharif, H., 2011, 2011 International Conference for Internet Technology and Secured Transactions, ICITST 2011. p. 454-459 6 p. 6148481. (2011 International Conference for Internet Technology and Secured Transactions, ICITST 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

A new energy-efficient pre-diagnosing ECG transmission technique for BASN

Ma, T., Hempel, M., Peng, D., Rezaei, F., Shrestha, P. L. & Sharif, H., 2011, Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies, ISABEL'11. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Low-complexity image coder/decoder with an approaching-entropy quad-tree search code for embedded computing platforms

Ma, T., Shrestha, P., Hempel, M., Peng, D. & Sharif, H., 2011, ICIP 2011: 2011 18th IEEE International Conference on Image Processing. p. 297-300 4 p. 6116287. (Proceedings - International Conference on Image Processing, ICIP).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

Secure stochastic ECG signals based on gaussian mixture model for e-healthcare systems

Wang, W., Wang, H., Hempel, M., Peng, D., Sharif, H. & Chen, H. H., Dec 2011, In : IEEE Systems Journal. 5, 4, p. 564-573 10 p., 6035952.

Research output: Contribution to journalArticle

32 Scopus citations
2010

A multimedia quality-driven network resource management architecture for wireless sensor networks with stream authentication

Wang, W., Peng, D., Wang, H., Sharif, H. & Chen, H. H., Aug 2010, In : IEEE Transactions on Multimedia. 12, 5, p. 439-447 9 p., 5466247.

Research output: Contribution to journalArticle

20 Scopus citations

A novel cooperative image transmission scheme in wireless sensor networks

Ma, T., Hempel, M., Hua, K., Peng, D. & Sharif, H., 2010, 2010 IEEE 35th Conference on Local Computer Networks, LCN 2010. p. 240-243 4 p. 5735711. (Proceedings - Conference on Local Computer Networks, LCN).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Scopus citations

A stochastic biometric authentication scheme using uniformed GMM in wireless body area sensor networks

Wang, W., Hua, K., Hempel, M., Peng, D., Sharif, H. & Chen, H. H., 2010, 2010 IEEE 21st International Symposium on Personal Indoor and Mobile Radio Communications, PIMRC 2010. p. 1620-1624 5 p. 5671940. (IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Scopus citations

Digital video authentication with motion vector watermarking

Sharp, A. T., Devaney, J., Steiner, A. E. & Peng, D., 2010, 4th International Conference on Signal Processing and Communication Systems, ICSPCS'2010 - Proceedings. 5709757. (4th International Conference on Signal Processing and Communication Systems, ICSPCS'2010 - Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

Index-based selective audio encryption for wireless multimedia sensor networks

Wang, H., Hempel, M., Peng, D., Wang, W., Sharif, H. & Chen, H. H., Apr 2010, In : IEEE Transactions on Multimedia. 12, 3, p. 215-223 9 p., 5398918.

Research output: Contribution to journalArticle

40 Scopus citations

On energy efficient encryption for video streaming in wireless sensor networks

Wang, W., Hempel, M., Peng, D., Wang, H., Sharif, H. & Chen, H. H., Aug 2010, In : IEEE Transactions on Multimedia. 12, 5, p. 417-426 10 p., 5466233.

Research output: Contribution to journalArticle

38 Scopus citations

On unified intra/inter coding and signature/hash authentication diversity for efficient and secure wireless video transmission

Wang, W., Hempel, M., Peng, D., Sharif, H., Wang, H. & Chen, H. H., 2010, 2010 IEEE Global Telecommunications Conference, GLOBECOM 2010. 5683213. (GLOBECOM - IEEE Global Telecommunications Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

Rate-switching unequal error protection for wireless electrocardiogram (ECG) transmission

Ma, T., Hempel, M., Peng, D. & Sharif, H., 2010, 2010 IEEE Military Communications Conference, MILCOM 2010. p. 1181-1186 6 p. 5680106. (Proceedings - IEEE Military Communications Conference MILCOM).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Scopus citations

Resource-aware secure ECG healthcare monitoring through body sensor networks

Wang, H., Peng, D., Wang, W., Sharif, H., Chen, H. H. & Khoynezhad, A., Feb 2010, In : IEEE Wireless Communications. 17, 1, p. 12-19 8 p., 5416345.

Research output: Contribution to journalArticle

101 Scopus citations

Secure image transmissions in wireless multimedia sensor networks

Wang, W., Peng, D., Wang, H., Sharif, H. & Chen, H. H., Jan 1 2010, Handbook on Sensor Networks. World Scientific Publishing Co., p. 675-688 14 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

2009

An adaptive approach for image encryption and secure transmission over multirate wireless sensor networks

Wang, W., Peng, D., Wang, H. & Sharif, H., Mar 2009, In : Wireless Communications and Mobile Computing. 9, 3, p. 383-393 11 p.

Research output: Contribution to journalArticle

19 Scopus citations

Cross-layer multirate interaction with distributed source coding in wireless sensor networks

Wang, W., Peng, D., Wang, H., Sharif, H. & Chen, H. H., Feb 2009, In : IEEE Transactions on Wireless Communications. 8, 2, p. 787-795 9 p., 4786440.

Research output: Contribution to journalArticle

34 Scopus citations

Image transmissions with security enhancement based on region and path diversity in wireless sensor networks

Wang, H., Peng, D., Wang, W., Sharif, H. & Chen, H. H., Feb 2009, In : IEEE Transactions on Wireless Communications. 8, 2, p. 757-765 9 p., 4786437.

Research output: Contribution to journalArticle

20 Scopus citations

Matching stream authentication and resource allocation to multimedia codec dependency with position-value partitioning in wireless multimedia sensor networks

Wang, W., Peng, D., Wang, H., Sharif, H. & Chen, H. H., 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference. 5425472. (GLOBECOM - IEEE Global Telecommunications Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations
2008

Artificial immune system based image pattern recognition in energy efficient wireless multimedia sensor networks

Wang, H., Peng, D., Wang, W., Sharif, H., Wegiel, J., Nguyen, D., Bowne, R. & Backhaus, C., 2008, 2008 IEEE Military Communications Conference, MILCOM 2008 - Assuring Mission Success. 4753651. (Proceedings - IEEE Military Communications Conference MILCOM).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Scopus citations

Cross-layer routing optimization in multirate wireless sensor networks for distributed source coding based applications

Wang, H., Peng, D., Wang, W., Sharif, H. & Chen, H. H., Oct 2008, In : IEEE Transactions on Wireless Communications. 7, 10, p. 3999-4009 11 p., 4657344.

Research output: Contribution to journalArticle

28 Scopus citations

Energy-aware adaptive watermarking for real-time image delivery in wireless sensor networks

Wang, H., Peng, D., Wang, W., Sharif, H. & Chen, H. H., 2008, ICC 2008 - IEEE International Conference on Communications, Proceedings. p. 1479-1483 5 p. 4533322. (IEEE International Conference on Communications).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

20 Scopus citations

Energy-constrained distortion reduction optimization for wavelet-based coded image transmission in wireless sensor networks

Wang, W., Peng, D., Wang, H., Sharif, H. & Chen, H. H., Oct 2008, In : IEEE Transactions on Multimedia. 10, 6, p. 1169-1180 12 p., 4637882.

Research output: Contribution to journalArticle

59 Scopus citations

Energy-distortion-authentication optimized resource allocation for secure wireless image streaming

Wang, W., Peng, D., Wang, H., Sharif, H. & Chen, H. H., 2008, WCNC 2008 - IEEE Wireless Communications and Networking Conference, Conference Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 2810-2815 6 p. 4489523. (IEEE Wireless Communications and Networking Conference, WCNC).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Scopus citations

Position based unequal error protection for image transmission with energy constraint over multirate XPD MIMO sensor networks

Wang, W., Peng, D., Wang, H., Yang, Y., Sharif, H. & Chen, H. H., 2008, 2008 IEEE Global Telecommunications Conference, GLOBECOM 2008. p. 4730-4734 5 p. 4698681. (GLOBECOM - IEEE Global Telecommunications Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations
2007

A bayesian multilevel modeling approach for data query in wireless sensor networks

Wang, H., Fang, H., Espy, K. A., Peng, D. & Sharif, H., 2007, Computational Science - ICCS 2007 - 7th International Conference, Proceedings. PART 3 ed. Springer Verlag, p. 859-866 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4489 LNCS, no. PART 3).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
1 Scopus citations