Anthony Tung Shuen Ho

According to our database1, Anthony Tung Shuen Ho authored at least 72 papers between 1998 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2020
Perceptual hashing for image authentication: A survey.
Sig. Proc.: Image Comm., 2020

2019
Distributed video coding using interval overlapped arithmetic coding.
Sig. Proc.: Image Comm., 2019

Face template protection using deep LDPC codes learning.
IET Biometrics, 2019

Development of an Early Warning System for Network Intrusion Detection Using Benford's Law Features.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2019

2018
Image steganography in spatial domain: A survey.
Sig. Proc.: Image Comm., 2018

Lost in the Digital Wild: Hiding Information in Digital Activities.
Proceedings of the 2nd International Workshop on Multimedia Privacy and Security, 2018

Chatting Application Monitoring on Android System and its Detection based on the Correlation Test.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018

2017
A data hiding scheme using parity-bit pixel value differencing and improved rightmost digit replacement.
Sig. Proc.: Image Comm., 2017

Emotion recognition from scrambled facial images via many graph embedding.
Pattern Recognition, 2017

Advanced Information Technology Convergence 2017.
J. Electrical and Computer Engineering, 2017

Using Benford's law to detect anomalies in electroencephalogram: An application to detecting alzheimer's disease.
Proceedings of the IEEE Conference on Computational Intelligence in Bioinformatics and Computational Biology, 2017

Detection and classification of malicious patterns in network traffic using Benford's law.
Proceedings of the 2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2017

2016
Advanced Information Technology Convergence.
J. Electrical and Computer Engineering, 2016

"Flow Size Difference" Can Make a Difference: Detecting Malicious TCP Network Flows Based on Benford's Law.
CoRR, 2016

Using Benford's Law Divergence and Neural Networks for Classification and Source Identification of Biometric Images.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

2015
Guest Editorial: Machine Learning for Signal Processing.
Signal Processing Systems, 2015

Detection of Face Spoofing Using Visual Dynamics.
IEEE Trans. Information Forensics and Security, 2015

OR-Benchmark: An Open and Reconfigurable Digital Watermarking Benchmarking Framework.
CoRR, 2015

Data forensic techniques using Benford's law and Zipf's law for keystroke dynamics.
Proceedings of the 3rd International Workshop on Biometrics and Forensics, 2015

2014
Advances in Multimedia Content Analysis and Signal Processing.
Signal Processing Systems, 2014

A novel image restoration scheme based on structured side information and its application to image watermarking.
Sig. Proc.: Image Comm., 2014

Do biometric images follow Benford's law?
Proceedings of the 2nd International Workshop on Biometrics and Forensics, 2014

Enhanced perceptual image authentication with tamper localization and self-restoration.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2014

Anti-forensic resistant likelihood ratio computation: A case study using fingerprint biometrics.
Proceedings of the 22nd European Signal Processing Conference, 2014

2013
On the intertwining of information hiding and multimedia security: a personal perspective.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2013

2011
Image Authentication Using Active Watermarking and Passive Forensics Techniques.
Proceedings of the Multimedia Analysis, Processing and Communications, 2011

A Novel Fast Self-restoration Semi-fragile Watermarking Algorithm for Image Content Authentication Resistant to JPEG Compression.
Proceedings of the Digital Forensics and Watermarking - 10th International Workshop, 2011

Image Forensics of High Dynamic Range Imaging.
Proceedings of the Digital Forensics and Watermarking - 10th International Workshop, 2011

Image forensic of glare feature for improving image retrieval using Benford's Law.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2011), 2011

A Cauchy distribution based video watermark detection for H.264/AVC in DCT domain.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2011), 2011

2010
An Introduction to Robust Transform Based Image Watermarking Techniques.
Proceedings of the Intelligent Multimedia Analysis for Security Applications, 2010

Semi-Fragile Image Watermarking, Authentication and Localization Techniques for Law Enforcement Applications.
Proceedings of the Handbook of Research on Computational Forensics, 2010

Guest Editorial.
Journal of Multimedia, 2010

Image Forensics Using Generalised Benford's Law for Improving Image Authentication Detection Rates in Semi-Fragile Watermarking.
IJDCF, 2010

On the Importance of One-time Key Pairs in Buyer-seller Watermarking Protocols.
Proceedings of the SECRYPT 2010, 2010

A Novel Multi-size Block Benford's Law Scheme for Printer Identification.
Proceedings of the Advances in Multimedia Information Processing - PCM 2010, 2010

Accurate detection of out-of-control variations from digital camera devices.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2010), May 30, 2010

2009
A Novel Least Distortion Linear Gain Model for Halftone Image Watermarking Incorporating Perceptual Quality Metrics.
Trans. Data Hiding and Multimedia Security, 2009

Localization and text sequence restoration using noise pixels in binary document image watermarking.
J. Electronic Imaging, 2009

High Capacity Data Hiding in Binary Document Images.
Proceedings of the Digital Watermarking, 8th International Workshop, 2009

2008
Fragile Watermarking Based on Encoding of the Zeroes of the z-Transform.
IEEE Trans. Information Forensics and Security, 2008

Using a formal analysis technique to identify an unbinding attack on a buyer-seller watermarking protocol.
Proceedings of the 10th workshop on Multimedia & Security, 2008

Formal Analysis of Two Buyer-Seller Watermarking Protocols.
Proceedings of the Digital Watermarking, 7th International Workshop, 2008

2007
Robust Video Watermarking of H.264/AVC.
IEEE Trans. on Circuits and Systems, 2007

A new semi-fragile image watermarking with robust tampering restoration using irregular sampling.
Sig. Proc.: Image Comm., 2007

Secure authentication watermarking for localization against the Holliman-Memon attack.
Multimedia Syst., 2007

Least Distortion Halftone Image Data Hiding Watermarking by Optimizing an Iterative Linear Gain Control Model.
Proceedings of the Digital Watermarking, 6th International Workshop, 2007

Authenticating Binary Text Documents Using a Localising OMAC Watermark Robust to Printing and Scanning.
Proceedings of the Digital Watermarking, 6th International Workshop, 2007

A Novel Semi-Fragile Image Watermarking, Authentication and Self-Restoration Technique Using the Slant Transform.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

Improving Video Steganalysis Using Temporal Correlation.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

2006
A New Multi-set Modulation Technique for Increasing Hiding Capacity of Binary Watermark for Print and Scan Processes.
Proceedings of the Digital Watermarking, 5th International Workshop, 2006

Image Authentication and Restoration Using Irregular Sampling for Traffic Enforcement Applications.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

Efficient Video Authentication for H.264/AVC.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

2005
Efficient RobustWatermarking of Compressed 2-D Grayscale Patterns for H.264/AVC.
Proceedings of the IEEE 7th Workshop on Multimedia Signal Processing, 2005

Secure Tamper Localization in Binary Document Image Authentication.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

A semi-fragile pinned sine transform watermarking system for content authentication of satellite images.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2005

Through-wall radar image reconstruction based on time-domain transient signals in the presence of noise.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2005

Improving classification accuracy in through-wall radar imaging using hybrid prony~s and singular value decomposition method.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2005

Restoration in Secure Text Document Image Authentication Using Erasable Watermarks.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

2004
Image Content Authentication Using Pinned Sine Transform.
EURASIP J. Adv. Sig. Proc., 2004

Slant transform watermarking for textured images.
Proceedings of the 2004 International Symposium on Circuits and Systems, 2004

Perception based binary image watermarking.
Proceedings of the 2004 International Symposium on Circuits and Systems, 2004

A Hybrid Watermarking Scheme for H.264/AVC Video.
Proceedings of the 17th International Conference on Pattern Recognition, 2004

A robust spread-spectrum watermarking method using two-level quantization.
Proceedings of the 2004 International Conference on Image Processing, 2004

Authentication of biomedical images based on zero location watermarking.
Proceedings of the 8th International Conference on Control, 2004

Imperceptible data embedding in sharply-contrasted binary images.
Proceedings of the 8th International Conference on Control, 2004

2003
Slant transform watermarking for digital images.
Proceedings of the Visual Communications and Image Processing 2003, 2003

Robust digital image-in-image watermarking algorithm using the fast Hadamard transform.
Proceedings of the 2003 International Symposium on Circuits and Systems, 2003

2002
Digital image-in-image watermarking for copyright protection of satellite images using the fast Hadamard transform.
Proceedings of the IEEE International Geoscience and Remote Sensing Symposium, 2002

2000
Using a novel multiresolution hybrid matching method to improve stereo matching accuracy of satellite images.
Proceedings of the Visual Communications and Image Processing 2000, 2000

CIMO - Component Integration MOdel.
Proceedings of the 7th Asia-Pacific Software Engineering Conference (APSEC 2000), 2000

1998
A novel technique for measuring the pulsewidth of nanosecond laser pulses.
IEEE Trans. Instrumentation and Measurement, 1998


  Loading...