Anthony Tung Shuen Ho

According to our database1, Anthony Tung Shuen Ho authored at least 80 papers between 1998 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
Correction to: Robust and blind image watermarking via circular embedding and bidimensional empirical mode decomposition.
Vis. Comput., 2021

2020
Robust and blind image watermarking via circular embedding and bidimensional empirical mode decomposition.
Vis. Comput., 2020

Perceptual hashing for image authentication: A survey.
Signal Process. Image Commun., 2020

An Image Hashing Algorithm for Authentication with Multi-Attack Reference Generation and Adaptive Thresholding.
Algorithms, 2020

Systematic Review on Security and Privacy Requirements in Edge Computing: State of the Art and Future Research Opportunities.
IEEE Access, 2020

OR-Benchmark: An Open and Reconfigurable Digital Watermarking Benchmarking Framework.
Proceedings of the Computer Security - ESORICS 2020 International Workshops, 2020

2019
Distributed video coding using interval overlapped arithmetic coding.
Signal Process. Image Commun., 2019

Face template protection using deep LDPC codes learning.
IET Biom., 2019

Development of an Early Warning System for Network Intrusion Detection Using Benford's Law Features.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2019

Multi-attack Reference Hashing Generation for Image Authentication.
Proceedings of the Digital Forensics and Watermarking - 18th International Workshop, 2019

2018
Image steganography in spatial domain: A survey.
Signal Process. Image Commun., 2018

Lost in the Digital Wild: Hiding Information in Digital Activities.
Proceedings of the 2nd International Workshop on Multimedia Privacy and Security, 2018

Chatting Application Monitoring on Android System and its Detection based on the Correlation Test.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018

2017
A data hiding scheme using parity-bit pixel value differencing and improved rightmost digit replacement.
Signal Process. Image Commun., 2017

Emotion recognition from scrambled facial images via many graph embedding.
Pattern Recognit., 2017

Advanced Information Technology Convergence 2017.
J. Electr. Comput. Eng., 2017

Using Benford's law to detect anomalies in electroencephalogram: An application to detecting alzheimer's disease.
Proceedings of the IEEE Conference on Computational Intelligence in Bioinformatics and Computational Biology, 2017

Detection and classification of malicious patterns in network traffic using Benford's law.
Proceedings of the 2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2017

2016
Advanced Information Technology Convergence.
J. Electr. Comput. Eng., 2016

"Flow Size Difference" Can Make a Difference: Detecting Malicious TCP Network Flows Based on Benford's Law.
CoRR, 2016

Using Benford's Law Divergence and Neural Networks for Classification and Source Identification of Biometric Images.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

2015
Guest Editorial: Machine Learning for Signal Processing.
J. Signal Process. Syst., 2015

Detection of Face Spoofing Using Visual Dynamics.
IEEE Trans. Inf. Forensics Secur., 2015

Data forensic techniques using Benford's law and Zipf's law for keystroke dynamics.
Proceedings of the 3rd International Workshop on Biometrics and Forensics, 2015

2014
Advances in Multimedia Content Analysis and Signal Processing.
J. Signal Process. Syst., 2014

A novel image restoration scheme based on structured side information and its application to image watermarking.
Signal Process. Image Commun., 2014

Do biometric images follow Benford's law?
Proceedings of the 2nd International Workshop on Biometrics and Forensics, 2014

Enhanced perceptual image authentication with tamper localization and self-restoration.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2014

Anti-forensic resistant likelihood ratio computation: A case study using fingerprint biometrics.
Proceedings of the 22nd European Signal Processing Conference, 2014

2013
On the intertwining of information hiding and multimedia security: a personal perspective.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2013

2011
Image Authentication Using Active Watermarking and Passive Forensics Techniques.
Proceedings of the Multimedia Analysis, Processing and Communications, 2011

A Novel Fast Self-restoration Semi-fragile Watermarking Algorithm for Image Content Authentication Resistant to JPEG Compression.
Proceedings of the Digital Forensics and Watermarking - 10th International Workshop, 2011

Image Forensics of High Dynamic Range Imaging.
Proceedings of the Digital Forensics and Watermarking - 10th International Workshop, 2011

Image forensic of glare feature for improving image retrieval using Benford's Law.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2011), 2011

A Cauchy distribution based video watermark detection for H.264/AVC in DCT domain.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2011), 2011

Multi-vehicle convoy analysis based on ANPR data.
Proceedings of the 4th International Conference on Imaging for Crime Detection and Prevention, 2011

2010
An Introduction to Robust Transform Based Image Watermarking Techniques.
Proceedings of the Intelligent Multimedia Analysis for Security Applications, 2010

Semi-Fragile Image Watermarking, Authentication and Localization Techniques for Law Enforcement Applications.
Proceedings of the Handbook of Research on Computational Forensics, 2010

Guest Editorial.
J. Multim., 2010

Image Forensics Using Generalised Benford's Law for Improving Image Authentication Detection Rates in Semi-Fragile Watermarking.
Int. J. Digit. Crime Forensics, 2010

On the Importance of One-time Key Pairs in Buyer-seller Watermarking Protocols.
Proceedings of the SECRYPT 2010, 2010

A Novel Multi-size Block Benford's Law Scheme for Printer Identification.
Proceedings of the Advances in Multimedia Information Processing - PCM 2010, 2010

Accurate detection of out-of-control variations from digital camera devices.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2010), May 30, 2010

2009
A Novel Least Distortion Linear Gain Model for Halftone Image Watermarking Incorporating Perceptual Quality Metrics.
Trans. Data Hiding Multim. Secur., 2009

Localization and text sequence restoration using noise pixels in binary document image watermarking.
J. Electronic Imaging, 2009

High Capacity Data Hiding in Binary Document Images.
Proceedings of the Digital Watermarking, 8th International Workshop, 2009

Image forensics using generalised Benford's Law for accurate detection of unknown JPEG compression in watermarked images.
Proceedings of the 16th International Conference on Digital Signal Processing, 2009

2008
Fragile Watermarking Based on Encoding of the Zeroes of the z-Transform.
IEEE Trans. Inf. Forensics Secur., 2008

Using a formal analysis technique to identify an unbinding attack on a buyer-seller watermarking protocol.
Proceedings of the 10th workshop on Multimedia & Security, 2008

Formal Analysis of Two Buyer-Seller Watermarking Protocols.
Proceedings of the Digital Watermarking, 7th International Workshop, 2008

2007
Robust Video Watermarking of H.264/AVC.
IEEE Trans. Circuits Syst. II Express Briefs, 2007

A new semi-fragile image watermarking with robust tampering restoration using irregular sampling.
Signal Process. Image Commun., 2007

Secure authentication watermarking for localization against the Holliman-Memon attack.
Multim. Syst., 2007

Least Distortion Halftone Image Data Hiding Watermarking by Optimizing an Iterative Linear Gain Control Model.
Proceedings of the Digital Watermarking, 6th International Workshop, 2007

Authenticating Binary Text Documents Using a Localising OMAC Watermark Robust to Printing and Scanning.
Proceedings of the Digital Watermarking, 6th International Workshop, 2007

A Novel Semi-Fragile Image Watermarking, Authentication and Self-Restoration Technique Using the Slant Transform.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

Improving Video Steganalysis Using Temporal Correlation.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

Digital Watermarking Authentication and Restoration for Chinese Calligraphy Images.
Proceedings of the 15th International Conference on Digital Signal Processing, 2007

2006
A New Multi-set Modulation Technique for Increasing Hiding Capacity of Binary Watermark for Print and Scan Processes.
Proceedings of the Digital Watermarking, 5th International Workshop, 2006

Image Authentication and Restoration Using Irregular Sampling for Traffic Enforcement Applications.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

Efficient Video Authentication for H.264/AVC.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

2005
Efficient RobustWatermarking of Compressed 2-D Grayscale Patterns for H.264/AVC.
Proceedings of the IEEE 7th Workshop on Multimedia Signal Processing, 2005

Secure Tamper Localization in Binary Document Image Authentication.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

A semi-fragile pinned sine transform watermarking system for content authentication of satellite images.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2005

Through-wall radar image reconstruction based on time-domain transient signals in the presence of noise.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2005

Improving classification accuracy in through-wall radar imaging using hybrid prony~s and singular value decomposition method.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2005

Restoration in Secure Text Document Image Authentication Using Erasable Watermarks.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

2004
Image Content Authentication Using Pinned Sine Transform.
EURASIP J. Adv. Signal Process., 2004

Slant transform watermarking for textured images.
Proceedings of the 2004 International Symposium on Circuits and Systems, 2004

Perception based binary image watermarking.
Proceedings of the 2004 International Symposium on Circuits and Systems, 2004

A Hybrid Watermarking Scheme for H.264/AVC Video.
Proceedings of the 17th International Conference on Pattern Recognition, 2004

A robust spread-spectrum watermarking method using two-level quantization.
Proceedings of the 2004 International Conference on Image Processing, 2004

Authentication of biomedical images based on zero location watermarking.
Proceedings of the 8th International Conference on Control, 2004

Imperceptible data embedding in sharply-contrasted binary images.
Proceedings of the 8th International Conference on Control, 2004

2003
Slant transform watermarking for digital images.
Proceedings of the Visual Communications and Image Processing 2003, 2003

Robust digital image-in-image watermarking algorithm using the fast Hadamard transform.
Proceedings of the 2003 International Symposium on Circuits and Systems, 2003

2002
Digital image-in-image watermarking for copyright protection of satellite images using the fast Hadamard transform.
Proceedings of the IEEE International Geoscience and Remote Sensing Symposium, 2002

2000
Using a novel multiresolution hybrid matching method to improve stereo matching accuracy of satellite images.
Proceedings of the Visual Communications and Image Processing 2000, 2000

CIMO - Component Integration MOdel.
Proceedings of the 7th Asia-Pacific Software Engineering Conference (APSEC 2000), 2000

1998
A novel technique for measuring the pulsewidth of nanosecond laser pulses.
IEEE Trans. Instrum. Meas., 1998


  Loading...