default search action
Anthony Tung Shuen Ho
Person information
- affiliation: University of Surrey, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j28]Ling Du, Zhen Chen, Anthony T. S. Ho:
Binary multi-view perceptual hashing for image authentication. Multim. Tools Appl. 80(15): 22927-22949 (2021) - [j27]Ebroul Izquierdo, Krishna Chandramouli, Anthony T. S. Ho, Hyoung Joong Kim:
Large-scale multimedia signal processing for security and digital forensics [SI 1163]. Multim. Tools Appl. 80(15): 23313-23317 (2021) - [j26]Xiaochao Wang, Kun Hu, Jianping Hu, Ling Du, Anthony T. S. Ho, Hong Qin:
Correction to: Robust and blind image watermarking via circular embedding and bidimensional empirical mode decomposition. Vis. Comput. 37(4): 859 (2021) - [e6]Debasis Giri, Anthony T. S. Ho, S. Ponnusamy, Nai-Wei Lo:
Proceedings of the Fifth International Conference on Mathematics and Computing - ICMC 2019, Bhubaneswar, India, February 6-9, 2019. Advances in Intelligent Systems and Computing 1170, Springer 2021, ISBN 978-981-15-5410-0 [contents] - 2020
- [j25]Muktar Yahuza, Mohd Yamani Idna Bin Idris, Ainuddin Wahid Bin Abdul Wahab, Anthony T. S. Ho, Suleman Khan, Siti Nurmaya Binti Musa, Azni Zarina Binti Taha:
Systematic Review on Security and Privacy Requirements in Edge Computing: State of the Art and Future Research Opportunities. IEEE Access 8: 76541-76567 (2020) - [j24]Ling Du, Zehong He, Yijing Wang, Xiaochao Wang, Anthony T. S. Ho:
An Image Hashing Algorithm for Authentication with Multi-Attack Reference Generation and Adaptive Thresholding. Algorithms 13(9): 227 (2020) - [j23]Ling Du, Anthony T. S. Ho, Runmin Cong:
Perceptual hashing for image authentication: A survey. Signal Process. Image Commun. 81 (2020) - [j22]Xiaochao Wang, Kun Hu, Jianping Hu, Ling Du, Anthony T. S. Ho, Hong Qin:
Robust and blind image watermarking via circular embedding and bidimensional empirical mode decomposition. Vis. Comput. 36(10): 2201-2214 (2020) - [c50]Hui Wang, Anthony T. S. Ho, Shujun Li:
OR-Benchmark: An Open and Reconfigurable Digital Watermarking Benchmarking Framework. DETIPS/DeSECSys/MPS/SPOSE@ESORICS 2020: 243-260
2010 – 2019
- 2019
- [j21]Lingying Chen, Guanghui Zhao, Junwei Zhou, Anthony T. S. Ho, Lee-Ming Cheng:
Face template protection using deep LDPC codes learning. IET Biom. 8(3): 190-197 (2019) - [j20]Junwei Zhou, Yincheng Fu, Yanchao Yang, Anthony T. S. Ho:
Distributed video coding using interval overlapped arithmetic coding. Signal Process. Image Commun. 76: 118-124 (2019) - [c49]Ling Du, Yijing Wang, Anthony T. S. Ho:
Multi-attack Reference Hashing Generation for Image Authentication. IWDW 2019: 407-420 - [c48]Liuying Sun, Anthony T. S. Ho, Zhe Xia, Jiageng Chen, Mingwu Zhang:
Development of an Early Warning System for Network Intrusion Detection Using Benford's Law Features. SocialSec 2019: 57-73 - 2018
- [j19]Mehdi Hussain, Ainuddin Wahid Abdul Wahab, Mohd Yamani Idna Bin Idris, Anthony T. S. Ho, Ki-Hyun Jung:
Image steganography in spatial domain: A survey. Signal Process. Image Commun. 65: 46-66 (2018) - [c47]Yafei Li, Jiageng Chen, Anthony T. S. Ho:
Chatting Application Monitoring on Android System and its Detection based on the Correlation Test. APSIPA 2018: 1556-1563 - [c46]Shujun Li, Anthony T. S. Ho, Zichi Wang, Xinpeng Zhang:
Lost in the Digital Wild: Hiding Information in Digital Activities. MPS@CCS 2018: 27-37 - [i3]Shujun Li, Anthony T. S. Ho, Zichi Wang, Xinpeng Zhang:
Lost in the Digital Wild: Hiding Information in Digital Activities. CoRR abs/1809.02888 (2018) - 2017
- [j18]Jucheng Yang, Anthony T. S. Ho, Hui Cheng, Sook Yoon, Lu Liu:
Advanced Information Technology Convergence 2017. J. Electr. Comput. Eng. 2017: 3736075:1-3736075:2 (2017) - [j17]Richard Jiang, Anthony T. S. Ho, Ismahane Cheheb, Noor Al-Máadeed, Somaya Al-Máadeed, Ahmed Bouridane:
Emotion recognition from scrambled facial images via many graph embedding. Pattern Recognit. 67: 245-251 (2017) - [j16]Mehdi Hussain, Ainuddin Wahid Abdul Wahab, Anthony T. S. Ho, Noman Javed, Ki-Hyun Jung:
A data hiding scheme using parity-bit pixel value differencing and improved rightmost digit replacement. Signal Process. Image Commun. 50: 44-57 (2017) - [c45]Liuying Sun, Anthony T. S. Ho, Zhe Xia, Jiageng Chen, Xuzhe Huang, Yidan Zhang:
Detection and classification of malicious patterns in network traffic using Benford's law. APSIPA 2017: 864-872 - [c44]Santosh Tirunagari, Daniel Abásolo, Aamo Iorliam, Anthony T. S. Ho, Norman Poh:
Using Benford's law to detect anomalies in electroencephalogram: An application to detecting alzheimer's disease. CIBCB 2017: 1-6 - 2016
- [j15]Jucheng Yang, Hui Cheng, Sook Yoon, Anthony T. S. Ho, Weiming Zeng:
Advanced Information Technology Convergence. J. Electr. Comput. Eng. 2016: 2901835:1-2901835:2 (2016) - [c43]Aamo Iorliam, Anthony T. S. Ho, Adrian Waller, Xi Zhao:
Using Benford's Law Divergence and Neural Networks for Classification and Source Identification of Biometric Images. IWDW 2016: 88-105 - [i2]Aamo Iorliam, Santosh Tirunagari, Anthony T. S. Ho, Shujun Li, Adrian Waller, Norman Poh:
"Flow Size Difference" Can Make a Difference: Detecting Malicious TCP Network Flows Based on Benford's Law. CoRR abs/1609.04214 (2016) - 2015
- [j14]Santosh Tirunagari, Norman Poh, David Windridge, Aamo Iorliam, Nik Suki, Anthony T. S. Ho:
Detection of Face Spoofing Using Visual Dynamics. IEEE Trans. Inf. Forensics Secur. 10(4): 762-777 (2015) - [j13]Saeid Sanei, Paris Smaragdis, Anthony T. S. Ho, Asoke K. Nandi, Jan Larsen:
Guest Editorial: Machine Learning for Signal Processing. J. Signal Process. Syst. 79(2): 113-116 (2015) - [c42]Aamo Iorliam, Anthony T. S. Ho, Norman Poh, Santosh Tirunagari, Patrick Bours:
Data forensic techniques using Benford's law and Zipf's law for keystroke dynamics. IWBF 2015: 1-6 - [e5]Oleg B. Makarevich, Ron Poet, Atilla Elçi, Manoj Singh Gaur, Mehmet A. Orgun, Ludmila K. Babenko, Md. Sadek Ferdous, Anthony T. S. Ho, Vijay Laxmi, Josef Pieprzyk:
Proceedings of the 8th International Conference on Security of Information and Networks, SIN 2015, Sochi, Russian Federation, September 8-10, 2015. ACM 2015, ISBN 978-1-4503-3453-2 [contents] - [i1]Hui Wang, Anthony T. S. Ho, Shujun Li:
OR-Benchmark: An Open and Reconfigurable Digital Watermarking Benchmarking Framework. CoRR abs/1506.00243 (2015) - 2014
- [j12]Hui Wang, Anthony T. S. Ho, Shujun Li:
A novel image restoration scheme based on structured side information and its application to image watermarking. Signal Process. Image Commun. 29(7): 773-787 (2014) - [j11]Dong Xu, Weisi Lin, Anthony T. S. Ho:
Advances in Multimedia Content Analysis and Signal Processing. J. Signal Process. Syst. 74(1): 1-3 (2014) - [c41]Norman Poh, Nik Suki, Aamo Iorliam, Anthony T. S. Ho:
Anti-forensic resistant likelihood ratio computation: A case study using fingerprint biometrics. EUSIPCO 2014: 1377-1381 - [c40]Fang Liu, Hui Wang, Lee-Ming Cheng, Anthony T. S. Ho, Shujun Li:
Enhanced perceptual image authentication with tamper localization and self-restoration. ICME 2014: 1-6 - [c39]Aamo Iorliam, Anthony T. S. Ho, Norman Poh, Yun Q. Shi:
Do biometric images follow Benford's law? IWBF 2014: 1-6 - 2013
- [c38]Anthony T. S. Ho:
On the intertwining of information hiding and multimedia security: a personal perspective. IH&MMSec 2013: 191-192 - 2012
- [e4]Weisi Lin, Dong Xu, Anthony T. S. Ho, Jianxin Wu, Ying He, Jianfei Cai, Mohan S. Kankanhalli, Ming-Ting Sun:
Advances in Multimedia Information Processing - PCM 2012 - 13th Pacific-Rim Conference on Multimedia, Singapore, December 4-6, 2012. Proceedings. Lecture Notes in Computer Science 7674, Springer 2012, ISBN 978-3-642-34777-1 [contents] - 2011
- [c37]Abdollah Homayounfar, Anthony T. S. Ho, Naida Zhu, George Head, Phil Palmer:
Multi-vehicle convoy analysis based on ANPR data. ICDP 2011: 1-5 - [c36]Ghulam Qadir, Xi Zhao, Anthony T. S. Ho, Matthew Casey:
Image forensic of glare feature for improving image retrieval using Benford's Law. ISCAS 2011: 2661-2664 - [c35]Lina Chen, Gaobo Yang, Anthony Tung Shuen Ho:
A Cauchy distribution based video watermark detection for H.264/AVC in DCT domain. ISCAS 2011: 2665-2668 - [c34]Hui Wang, Anthony T. S. Ho, Xi Zhao:
A Novel Fast Self-restoration Semi-fragile Watermarking Algorithm for Image Content Authentication Resistant to JPEG Compression. IWDW 2011: 72-85 - [c33]Philip Bateman, Anthony T. S. Ho, Johann A. Briffa:
Image Forensics of High Dynamic Range Imaging. IWDW 2011: 336-348 - [p3]Xi Zhao, Philip Bateman, Anthony T. S. Ho:
Image Authentication Using Active Watermarking and Passive Forensics Techniques. Multimedia Analysis, Processing and Communications 2011: 139-183 - 2010
- [j10]Xi Zhao, Anthony Tung Shuen Ho, Yun Q. Shi:
Image Forensics Using Generalised Benford's Law for Improving Image Authentication Detection Rates in Semi-Fragile Watermarking. Int. J. Digit. Crime Forensics 2(2): 1-20 (2010) - [j9]Ebroul Izquierdo, Anthony T. S. Ho, Hyoung Joong Kim, Qianni Zhang:
Guest Editorial. J. Multim. 5(2): 93-94 (2010) - [c32]Philip Bateman, Anthony T. S. Ho, Alan Woodward:
Accurate detection of out-of-control variations from digital camera devices. ISCAS 2010: 3056-3059 - [c31]Weina Jiang, Anthony T. S. Ho, Helen Treharne, Yun Q. Shi:
A Novel Multi-size Block Benford's Law Scheme for Printer Identification. PCM (1) 2010: 643-652 - [c30]David M. Williams, Helen Treharne, Anthony T. S. Ho:
On the Importance of One-time Key Pairs in Buyer-seller Watermarking Protocols. SECRYPT 2010: 441-446 - [p2]Xi Zhao, Anthony T. S. Ho:
Semi-Fragile Image Watermarking, Authentication and Localization Techniques for Law Enforcement Applications. Handbook of Research on Computational Forensics, Digital Crime, and Investigation 2010: 176-203 - [p1]Xi Zhao, Anthony T. S. Ho:
An Introduction to Robust Transform Based Image Watermarking Techniques. Intelligent Multimedia Analysis for Security Applications 2010: 337-364
2000 – 2009
- 2009
- [j8]Niladri B. Puhan, Anthony T. S. Ho, Farook Sattar:
Localization and text sequence restoration using noise pixels in binary document image watermarking. J. Electronic Imaging 18(2): 023012 (2009) - [j7]Weina Jiang, Anthony T. S. Ho, Helen Treharne:
A Novel Least Distortion Linear Gain Model for Halftone Image Watermarking Incorporating Perceptual Quality Metrics. Trans. Data Hiding Multim. Secur. 4: 65-83 (2009) - [c29]Xi Zhao, Anthony T. S. Ho, Yun Q. Shi:
Image forensics using generalised Benford's Law for accurate detection of unknown JPEG compression in watermarked images. DPS 2009: 1-8 - [c28]Niladri B. Puhan, Anthony Tung Shuen Ho, Farook Sattar:
High Capacity Data Hiding in Binary Document Images. IWDW 2009: 149-161 - [e3]Hyoung-Joong Kim, Stefan Katzenbeisser, Anthony Tung Shuen Ho:
Digital Watermarking, 7th International Workshop, IWDW 2008, Busan, Korea, November 10-12, 2008. Selected Papers. Lecture Notes in Computer Science 5450, Springer 2009, ISBN 978-3-642-04437-3 [contents] - [e2]Anthony T. S. Ho, Yun Q. Shi, H. J. Kim, Mauro Barni:
Digital Watermarking, 8th International Workshop, IWDW 2009, Guildford, UK, August 24-26, 2009. Proceedings. Lecture Notes in Computer Science 5703, Springer 2009, ISBN 978-3-642-03687-3 [contents] - 2008
- [j6]Anthony Tung Shuen Ho, Xunzhan Zhu, Jun Shen, Pina Marziliano:
Fragile Watermarking Based on Encoding of the Zeroes of the z-Transform. IEEE Trans. Inf. Forensics Secur. 3(3): 567-569 (2008) - [c27]David M. Williams, Helen Treharne, Anthony T. S. Ho, Adrian Waller:
Formal Analysis of Two Buyer-Seller Watermarking Protocols. IWDW 2008: 278-292 - [c26]David M. Williams, Helen Treharne, Anthony T. S. Ho, Chris Culnane:
Using a formal analysis technique to identify an unbinding attack on a buyer-seller watermarking protocol. MM&Sec 2008: 205-214 - 2007
- [j5]Niladri B. Puhan, Anthony T. S. Ho:
Secure authentication watermarking for localization against the Holliman-Memon attack. Multim. Syst. 12(6): 521-532 (2007) - [j4]Xunzhan Zhu, Anthony T. S. Ho, Pina Marziliano:
A new semi-fragile image watermarking with robust tampering restoration using irregular sampling. Signal Process. Image Commun. 22(5): 515-528 (2007) - [j3]Jing Zhang, Anthony T. S. Ho, Gang Qiu, Pina Marziliano:
Robust Video Watermarking of H.264/AVC. IEEE Trans. Circuits Syst. II Express Briefs 54-II(2): 205-209 (2007) - [c25]Anthony T. S. Ho, Xunzhan Zhu, Lilian H. Tang:
Digital Watermarking Authentication and Restoration for Chinese Calligraphy Images. DSP 2007: 483-486 - [c24]Xi Zhao, Anthony T. S. Ho, Helen Treharne, Vinod Pankajakshan, Chris Culnane, Weina Jiang:
A Novel Semi-Fragile Image Watermarking, Authentication and Self-Restoration Technique Using the Slant Transform. IIH-MSP 2007: 283-286 - [c23]Vinod Pankajakshan, Anthony T. S. Ho:
Improving Video Steganalysis Using Temporal Correlation. IIH-MSP 2007: 287-290 - [c22]Chris Culnane, Helen Treharne, Anthony T. S. Ho:
Authenticating Binary Text Documents Using a Localising OMAC Watermark Robust to Printing and Scanning. IWDW 2007: 173-187 - [c21]Weina Jiang, Anthony T. S. Ho, Helen Treharne:
Least Distortion Halftone Image Data Hiding Watermarking by Optimizing an Iterative Linear Gain Control Model. IWDW 2007: 423-439 - [e1]Bin-Yih Liao, Jeng-Shyang Pan, Lakhmi C. Jain, Mark Liao, Hideki Noda, Anthony T. S. Ho:
3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), Kaohsiung, Taiwan, 26-28 November 2007, Proceedings. IEEE Computer Society 2007, ISBN 978-0-7695-2994-3 [contents] - 2006
- [c20]Jing Zhang, Anthony T. S. Ho:
Efficient Video Authentication for H.264/AVC. ICICIC (3) 2006: 46-49 - [c19]Xunzhan Zhu, Anthony T. S. Ho, Pina Marziliano:
Image Authentication and Restoration Using Irregular Sampling for Traffic Enforcement Applications. ICICIC (3) 2006: 62-65 - [c18]Chris Culnane, Helen Treharne, Anthony T. S. Ho:
A New Multi-set Modulation Technique for Increasing Hiding Capacity of Binary Watermark for Print and Scan Processes. IWDW 2006: 96-110 - 2005
- [c17]Niladri B. Puhan, Anthony T. S. Ho:
Restoration in Secure Text Document Image Authentication Using Erasable Watermarks. CIS (2) 2005: 661-668 - [c16]Anthony T. S. Ho, Xunzhan Zhu, W. M. Woon:
A semi-fragile pinned sine transform watermarking system for content authentication of satellite images. IGARSS 2005: 4 - [c15]Anthony T. S. Ho, W. H. Tham, Kay Soon Low:
Improving classification accuracy in through-wall radar imaging using hybrid prony~s and singular value decomposition method. IGARSS 2005: 4267-4270 - [c14]Anthony T. S. Ho, W. H. Tham, Kay Soon Low:
Through-wall radar image reconstruction based on time-domain transient signals in the presence of noise. IGARSS 2005: 4271-4274 - [c13]Niladri B. Puhan, Anthony T. S. Ho:
Secure Tamper Localization in Binary Document Image Authentication. KES (4) 2005: 263-271 - [c12]Jing Zhang, Anthony Tung Shuen Ho:
Efficient RobustWatermarking of Compressed 2-D Grayscale Patterns for H.264/AVC. MMSP 2005: 1-4 - 2004
- [j2]Anthony T. S. Ho, Xunzhan Zhu, Yong Liang Guan:
Image Content Authentication Using Pinned Sine Transform. EURASIP J. Adv. Signal Process. 2004(14): 2174-2184 (2004) - [c11]Anthony T. S. Ho, Niladri B. Puhan, Anamitra Makur, Pina Marziliano, Yong Liang Guan:
Imperceptible data embedding in sharply-contrasted binary images. ICARCV 2004: 958-963 - [c10]Anthony T. S. Ho, Xunzhan Zhu, Jun Shen:
Authentication of biomedical images based on zero location watermarking. ICARCV 2004: 973-976 - [c9]Anthony T. S. Ho, Feng Shu:
A robust spread-spectrum watermarking method using two-level quantization. ICIP 2004: 725-728 - [c8]Gang Qiu, Pina Marziliano, Anthony T. S. Ho, Dajun He, Qibin Sun:
A Hybrid Watermarking Scheme for H.264/AVC Video. ICPR (4) 2004: 865-869 - [c7]Anthony T. S. Ho, Niladri B. Puhan, Pina Marziliano, Anamitra Makur, Yong Liang Guan:
Perception based binary image watermarking. ISCAS (2) 2004: 37-40 - [c6]Anthony T. S. Ho, Xunzhan Zhu, Yong Liang Guan, Pina Marziliano:
Slant transform watermarking for textured images. ISCAS (5) 2004: 700-703 - 2003
- [c5]Anthony Tung Shuen Ho, Jun Shen, A. K. K. Chow, Jerry Woon:
Robust digital image-in-image watermarking algorithm using the fast Hadamard transform. ISCAS (3) 2003: 826-829 - [c4]Anthony T. S. Ho, Xunzhan Zhu, Jun Shen:
Slant transform watermarking for digital images. VCIP 2003: 1912-1920 - 2002
- [c3]Anthony Tung Shuen Ho, Jun Shen, Soon Hie Tan, A. C. Kot:
Digital image-in-image watermarking for copyright protection of satellite images using the fast Hadamard transform. IGARSS 2002: 3311-3313 - 2000
- [c2]Yan Xia, Anthony Tung Shuen Ho, YuCheng Zhang:
CIMO - Component Integration MOdel. APSEC 2000: 344-348 - [c1]Yanwen Ji, Anthony T. S. Ho, Tao Yu:
Using a novel multiresolution hybrid matching method to improve stereo matching accuracy of satellite images. VCIP 2000: 1024-1030
1990 – 1999
- 1998
- [j1]Siu-Chung Tam, Wah-Peng Neo, Hock-Chuan Chua, Anthony T. S. Ho, Sing Lee:
A novel technique for measuring the pulsewidth of nanosecond laser pulses. IEEE Trans. Instrum. Meas. 47(4): 997-1000 (1998)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-05 20:58 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint