Anthony T. S. Ho

Anthony T. S. Ho
University of Surrey · Department of Computer Science

BSc MSc PhD DIC

About

204
Publications
33,349
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,498
Citations
Citations since 2016
29 Research Items
1484 Citations
2016201720182019202020212022050100150200250300
2016201720182019202020212022050100150200250300
2016201720182019202020212022050100150200250300
2016201720182019202020212022050100150200250300
Introduction
Professor Anthony TS Ho joined the Department of Computing, University of Surrey in January 2006. He was Head of Department of Computer Science from 2010 to 2015. He is also a Tianjin Distinguished Professor, Visiting Professor of Tianjin University of Science and Technology and Wuhan University of Technology, China. Recently, he was also appointed as Visiting Professor by the University of Malaya, Malaysia. Professor Ho serves on a number of editorial boards including as Editor-in-Chief of the International Journal of Information Security and Applications and Area Editor of Signal Processing: Image Communication, both published by Elsevier. He is an Associate Editor of the IEEE Transactions on Information Forensics and Security and EURASIP Journal of Image and Video Processing.
Additional affiliations
August 2010 - July 2015
University of Surrey
Position
  • Head of Department
January 2006 - present
University of Surrey
Position
  • Chair Professor of Multimedia Security
July 1994 - December 2005
Nanyang Technological University
Position
  • Associate Professor/Senior Lecturer
Education
October 1980 - August 1983
King's College London
Field of study
  • Digital Image Processing
October 1979 - September 1980
Imperial College London
Field of study
  • Applied Optics
September 1976 - August 1979
Northumbria University
Field of study
  • Physical Electronics

Publications

Publications (204)
Article
Full-text available
Instant messaging applications (apps) have played a vital role in online interaction, especially under COVID-19 lockdown protocols. Apps with security provisions are able to provide confidentiality through end-to-end encryption. Ill-intentioned individuals and groups use these security services to their advantage by using the apps for criminal, ill...
Article
Full-text available
This paper presents a novel Binary Multi-View Perceptual Hashing (BMVPH) scheme for image authentication, which provides compact and efficient representations and can easily scale to large data. We apply virtual prior attacks (e.g. additive noise, blurring, compression, logo-insert etc.) on original images to generate simulated distorted copies. Th...
Article
Full-text available
The publication of this article unfortunately contained mistakes. The affiliation and the biography of Ling Du were not correct. The corrected affiliation and bibliography is given below.
Book
This book features selected papers from the 5th International Conference on Mathematics and Computing (ICMC 2019), organized by the School of Computer Engineering, Kalinga Institute of Industrial Technology Bhubaneswar, India, on February 6 – 9, 2019. Covering recent advances in the field of mathematics, statistics and scientific computing, the boo...
Chapter
Benchmarking digital watermarking algorithms is not an easy task because different applications of digital watermarking often have very different sets of requirements and trade-offs between conflicting requirements. While there have been some general-purpose digital watermarking benchmarking systems available, they normally do not support complicat...
Article
Full-text available
In this paper, a robust and blind image watermarking algorithm via circular embedding and bidimensional empirical mode decomposition (BEMD) is developed. First, the watermark image is scrambled by Arnold transform to increase the security of the algorithm. Second, the Hilbert curve is adopted to reduce the scrambled 2D watermark image to one-dimens...
Article
Full-text available
Image hashing-based authentication methods have been widely studied with continuous advancements owing to the speed and memory efficiency. However, reference hash generation and threshold setting, which are used for similarity measures between original images and corresponding distorted version, are important but less considered by most of existing...
Preprint
Full-text available
Severe outbreaks of infectious disease occur throughout the world with some reaching the level of international pandemic: Coronavirus (COVID-19) is the most recent to do so. As such pandemics cause extensive loss of lives, hamper industrial operations, and cause economic losses in both developing and developed countries, it is critical to establish...
Article
Full-text available
Edge computing is a promising paradigm that enhances the capabilities of cloud computing. In order to continue patronizing the computing services, it is essential to conserve a good atmosphere free from all kinds of security and privacy breaches. The security and privacy issues associated with the edge computing environment have narrowed the overal...
Chapter
Perceptual hashing for image authentication has been intensively investigated owing to the speed and memory efficiency. How to determine the reference hashing code, which is used for similarity measures between the distorted hashes and reference hashes, is important but less considered for image hashing design. In this paper, we present a Multi-Att...
Article
Perceptual hashing is used for multimedia content identification and authentication through perception digests based on the understanding of multimedia content. This paper presents a literature review of image hashing for image authentication in the last decade. The objective of this paper is to provide a comprehensive survey and to highlight the p...
Chapter
In order to ensure a high level of security in computer networks, it is important to prevent malicious behaviours from the intruders. However, high volumes of network traffic make it difficult for intrusion detection systems (IDSs) to separate abnormal network traffic from the normal ones. To alleviate this problem, a window-based feature extractio...
Article
Distributed video coding (DVC)is a flexible and novel video coding mode that is different from traditional video compression methods, which can shift the complex task such as motion estimation from encoder to decoder. Nowadays, most of the DVC architectures adopt channel coding such as low-density parity-check codes. It is found that arithmetic cod...
Article
Full-text available
There is a noticeable tendency to apply deep convolutional neural network (CNN) in facial identification, since it is able to boost performance in face recognition and verification. However, due to the users have unique facial, exposure of face template to adversaries can severely compromise system security and users' privacy. Here, the authors pro...
Preprint
Full-text available
This paper presents a new general framework of information hiding, in which the hidden information is embedded into a collection of activities conducted by selected human and computer entities (e.g., a number of online accounts of one or more online social networks) in a selected digital world. Different from other traditional schemes, where the hi...
Article
Full-text available
This paper presents a literature review of image steganography techniques in the spatial domain for last 5 years. The research community has already done lots of noteworthy research in image steganography. Even though it is interesting to highlight that the existing embedding techniques may not be perfect, the objective of this paper is to provide...
Article
Full-text available
Detection of packages or storage containers relies heavily on the use of radio frequency identification (RFID) tagging, though such technology provides no means to determine the quantity of items within them. This paper presents a comprehensive study of ultra wideband (UWB) detection in the reactive near field as a low cost, low power way of detect...
Conference Paper
It is obvious that tampering of raw biometric samples is becoming an important security concern. The Benford’s law, which is also called the first digit law has been reported in the forensic literature to be very effective in detecting forged or tampered data. In this paper, the divergence values of Benford’s law are used as input features for a Ne...
Article
Facial expression verification has been extensively exploited due to its wide application in affective computing, robotic vision, man-machine interaction and medical diagnosis. With the recent development of Internet-of-Things (IoT), there is a need of mobile-targeted facial expression verification, where face scrambling has been proposed for priva...
Article
Full-text available
The fundamental objectives of image steganographic algorithm are to simultaneously achieve high payload, good visual imperceptibility, and security. This paper proposes a new data hiding method that increases visual quality and payload, as well as maintains steganographic security. The proposed scheme consists of two novel methods of parity-bit pix...
Article
Full-text available
Statistical characteristics of network traffic have attracted a significant amount of research for automated network intrusion detection, some of which looked at applications of natural statistical laws such as Zipf's law, Benford's law and the Pareto distribution. In this paper, we present the application of Benford's law to a new network flow met...
Chapter
One of the main goals of digital forensics is to produce digital evidence admissible to the court, which requires that the digital forensic process or techniques used are not flawed in such a way that the evidence or intelligence generated can be questioned. This chapter provides a comprehensive review of important international, regional and natio...
Chapter
This chapter looks at the operational side of digital forensics of multimedia data and devices in real-world digital forensics laboratories, especially those run by law enforcement. It provides insights about the operational aspect of digital forensic services and practices on multimedia data and devices. The chapter describes how multimedia data a...
Article
Full-text available
Benchmarking digital watermarking algorithms is not an easy task because different applications of digital watermarking often have very different sets of requirements and trade-offs between conflicting requirements. While there have been some general-purpose digital watermarking benchmarking systems available, they normally do not support complicat...
Article
Full-text available
The selection and application of biometrics traits for authentication and identification have recently attracted a significant amount of research interest. In this paper we investigate the use of keystroke data to distinguish between humans using keystroke biometric systems and non-humans for auditing application. Recently, Benford's Law and Zipf's...
Article
Full-text available
Signal processing including analysis, understanding, detection, estimation, and modelling of the events and trends, the way they evolve, and the abnormalities and anomalies affecting them have attracted many researchers around the globe. Signal processing theory originates from mathematical foundation with astonishing applications which help inform...
Article
Full-text available
Rendering a face recognition system robust is vital in order to safeguard it against spoof attacks carried out using printed pictures of a victim (also known as print attack) or a replayed video of the person (replay attack). A key property in distinguishing a live, valid access from printed media or replayed videos is by exploiting the information...
Conference Paper
Full-text available
The selection and application of biometrics traits for authentication and identification have recently attracted a significant amount of research interest. In this paper we investigate the use of keystroke data to distinguish between humans using keystroke biometric systems and non-humans for auditing application. Recently, Benford’s Law and Zipf’s...
Article
One of the major utilities of biometrics in the context of crime scene investigation is to identify people. However, in the most sophisticated cases, criminals may introduce the biometric samples of innocent individuals in order to evade their own identities as well as to incriminate the innocent individuals. To date, even a minute suspect of an an...
Article
Full-text available
This paper presents a new image restoration method based on a linear optimization model which restores part of the image from structured side information (SSI). The SSI can be transmitted to the receiver or embedded into the image itself by digital watermarking technique. In this paper we focus on a special type of SSI for digital watermarking wher...
Conference Paper
Full-text available
In this paper, an enhanced perceptual image authentication approach is proposed with extra ability of tamper localization and image self-restoration by combining perceptual hashing and digital watermarking technologies. Compared with other perceptual hashing schemes, this proposed approach could locate the maliciously tampered regions and further r...
Article
Full-text available
A novel dual-polarized patch antenna for ultra-wideband (UWB) applications is presented. The antenna consists of a square patch and four capacitively coupled feeds to enhance the impedance bandwidth. Each feed is formed by a vertical isosceles trapezoidal patch and a horizontal isosceles triangular patch. The four feeds are connected to the microst...
Conference Paper
Tampering of biometric samples is becoming an important security concern. Tampering can take place at the sensor level (spoofing), and through the backend, e.g., replacing the template with another sample. One example of backend attack is manipulating the original biometric image, i.e. contaminating the template. We study one particular aspect of t...
Article
Full-text available
Collaborative image tagging systems, such as Flickr, are very attractive for supporting keyword-based image retrieval, but some user-provided tags of collaboratively-tagged social images might be imprecise. Some people may use general or high-level words ...
Conference Paper
This paper focuses on a preliminary study to determine the quantity of eggs in a fridge using ultra wideband (UWB) impulse responses in the near field. First of all this paper investigates the detectable positions of an egg when placed 1 cm above a UWB antenna array element. Secondly, one egg with six possible configurations on an array are constru...
Article
Full-text available
To mitigate potential interferences with coexisting wireless systems operating over 3.3-3.6 GHz, 5.15-5.35 GHz, or 5.725-5.825 GHz bands, four novel band-notched antennas suitable for ultra-wideband (UWB) applications are proposed. These include UWB antennas with a single wide notched band, a single narrow notched band, dual notched bands, and trip...
Conference Paper
Over the past decade or so, the tremendous growth and proliferation of multimedia content has led to the important need to protect and verify the content integrity, particularly if the data are to be used for law enforcement, media, legal and financial applications. This has resulted in the research and applications of information hiding, and multi...
Article
AbstractA compact‐size asymmetrical linearly tapered slot antenna required for portable ultra‐wideband (UWB) imaging systems is presented. The total antenna size is reduced compared with the conventional linearly tapered slot antenna by using a triangular slot on the left‐hand side of the tapered‐shaped radiator, whereas introducing a corrugated pa...
Conference Paper
This paper presents a new design of dual-polarized ultra-wideband (UWB) directional antenna. The antenna consists of four identical conventional UWB monopole antennas. It is excited by signals with equal amplitudes and 180° phase difference. A reflector is applied to achieve directional radiation patterns and improve the antenna gain. Simulated res...
Conference Paper
In order to avoid the interferences from systems operating over 5-6 GHz, a novel design of compact-size wideband notched antenna is presented in this paper for ultra-wideband (UWB) applications. The reference antenna consists of a half circle shaped ground plane and a half circle shaped radiator with a half elliptical cut. A wide notched band is ac...
Article
A compact dual-polarized tapered slot antenna is proposed for ultra-wideband (UWB) through-wall imaging applications. The dual-polarized antenna is obtained by shifting one single-polarized element orthogonally into the other one. The miniaturization of the antenna is realized by employing a folded balun comprising a folded slot on the right side o...
Article
This study proposed a novel quarter-wavelength band-rejected element for band-notched antennas. It consists of a metal via and a rectangular strip connected to the radiating patch. In order to validate the design, a dual band-notched elliptically tapered slot antenna for ultra-wideband (UWB) applications is designed using the loaded strips. This an...
Article
A miniaturized elliptically tapered slot antenna fed by a novel balun is proposed for directional ultrawideband (UWB) applications. The feeding configuration consists of a stepped microstrip line and a folded slotline connected with a circular slot. An arc-shaped parasitic strip is printed inside the circular slot. This design achieves the minimiza...
Conference Paper
A novel semi-fragile algorithm using the wavelet-based contourlet transform (WBCT) is proposed in the paper. In the WBCT domain, the original image is first decomposed into a low-pass subband and several directional subbands. The watermark is embedded into the directional subbands. The embedding technique is based on the modulated parent-children e...
Conference Paper
In order to avoid the interferences from coexisting systems operating in 3.3-3.6 GHz, 5.15-5.35 GHz, and 5.725-5.825 GHz, an asymmetric triple band-notched antenna suitable for ultra-wideband (UWB) applications is proposed. The printed aperture antenna consists of a circular radiator on one side and a rectangular ground plane with a circular slot o...
Conference Paper
Today, the misuse of digital data especially images and videos become crucial with the existence of sophisticated high-tech equipment and it is available at relatively low cost. Illegal recording of movie in cinema has caused losses of millions of dollars a year. Law enforcement agencies are keen to find ways to counter illegal video recording. Cur...
Conference Paper
In this paper we propose SULFA (Surrey University Library for Forensic Analysis) for the benchmarking of video forensic techniques. This new video library has been designed and built for the purpose of video forensics specifically related to camera identification and integrity verification. As far as we know, no such library or similar currently ex...
Conference Paper
A new compact size linearly tapered slot antenna for ultra-wideband (UWB) imaging system is proposed. Compared with the traditional tapered slot antenna which is symmetric on both sides, half of the conventional linearly tapered slot is etched on the radiator to reduce the physical size of the structure. Corrugations are applied on the radiator for...
Article
Full-text available
A novel planar ultra-wideband (UWB) antenna with dual band-notched characteristics is proposed. The antenna is fabricated on a printed circuit board (PCB), having a circular monopole and arc-shaped parasitic strips on one side and a ground plane with a slot aperture on the other side. Two narrow bands at 5.15-5.35 GHz and 5.725-5.825 GHz are notche...
Book
This book constitutes the proceedings of the 13th Pacific Rim Conference on Multimedia, held in Singapore during December 4-6, 2012. The 59 revised full papers presented were carefully reviewed and selected from 106 submissions for the main conference and are accompanied by 23 presentations of 4 special sessions. The papers are organized in topical...
Chapter
Identification of the source that has generated a digital content is considered one of the main open issues in multimedia forensics community. The extraction of photo-response non-uniformity (PRNU) noise has been so far indicated as a mean to identify sensor fingerprint. Such a fingerprint can be estimated from multiple images taken by the same cam...
Chapter
A digitally developed image is a viewable image (TIFF/JPG) produced by a camera’s sensor data (raw image) using computer software tools. Such images might use different colour space, demosaicing algorithms or by different post processing parameter settings which are not the one coded in the source camera. In this regard, the most reliable method of...
Chapter
In the past few years, semi-fragile watermarking has become increasingly important to verify the content of images and localise the tampered areas, while tolerating some non-malicious manipulations. In the literature, the majority of semi-fragile algorithms have applied a predetermined threshold to tolerate errors caused by JPEG compression. Howeve...
Chapter
This paper addresses the security of a specific class of common watermarking methods based on Dither modulation-quantisation index modulation (DM-QIM) and focusing on watermark-only attacks (WOA). The vulnerabilities of and probable attacks on lattice structure based watermark embedding methods have been presented in the literature. DM-QIM is one o...
Chapter
Perceptual Watermarking should take full advantage of the results from human visual system (HVS) studies. Just noticeable distortion (JND), which refers to the maximum distortion that the HVS does not perceive, gives a way to model the HVS accurately. An effective Spatio-Temporal JND model guided video watermarking scheme in DCT domain is proposed...
Chapter
In this paper, the authors splice together an image which has been split up on a piece of paper by using duplication detection. The nearest pieces are connected using edge searching and matching and the pieces that have graphics or textures are matched using the edge shape and intersection between the two near pieces. Thus, the initial step is to m...
Chapter
Cloud computing has been heralded as a new era in the evolution of information and communications technologies. ICT giants have invested heavily in developing technologies and mega server facilities, which allow end users to access web-based software applications and store their data off-site. Businesses using cloud computing services will benefit...