Huo-Chong Ling

ORCID: 0000-0002-3173-0562
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Steganography and Watermarking Techniques
  • Chaos-based Image/Signal Encryption
  • Internet Traffic Analysis and Secure E-voting
  • Network Security and Intrusion Detection
  • Digital Media Forensic Detection
  • User Authentication and Security Systems
  • Advanced Malware Detection Techniques
  • Cryptography and Data Security
  • Digital Rights Management and Security
  • Privacy, Security, and Data Protection
  • Face and Expression Recognition
  • Video Coding and Compression Technologies
  • Face recognition and analysis
  • Emotion and Mood Recognition
  • Biometric Identification and Security
  • Advanced Data Compression Techniques
  • Time Series Analysis and Forecasting
  • Energy Harvesting in Wireless Networks
  • Artificial Intelligence in Healthcare and Education
  • Solar Thermal and Photovoltaic Systems
  • Cybercrime and Law Enforcement Studies
  • Explainable Artificial Intelligence (XAI)
  • Advanced Image Processing Techniques
  • Photovoltaic System Optimization Techniques
  • Cloud Data Security Solutions

Curtin University Sarawak
2016-2024

RMIT Vietnam
2023-2024

Multimedia University
2005-2019

Curtin University
2015

A monogenic signal is a two-dimensional analytical that provides the local information of magnitude, phase, and orientation. While it has been applied on field face expression recognition [1], [2], [3], there are no known usages for subtle facial micro-expressions. In this paper, we propose feature representation method which succinctly captures these three low-level components at multiple scales. Riesz wavelet transform employed to obtain multi-scale wavelets, formulated by quaternion...

10.1109/icdsp.2015.7252078 article EN 2015-07-01

Abstract Ensuring the cloud data security is a major concern for corporate subscribers and in some cases private users. Confidentiality of stored can be managed by encrypting at client side before outsourcing it to remote storage server. However, once encrypted, will limit server’s capability keyword search since encrypted server simply cannot make plaintext on data. But again we need functionality efficient retrieval To maintain user’s confidentiality, should able perform over additionally...

10.1186/s13673-015-0039-9 article EN cc-by Human-centric Computing and Information Sciences 2015-07-16

The unpleasant experience of long queue while waiting to check-in at hotel is a common problem faced by guests especially during holidays. As such, various self-service technologies (SSTs) were introduced over the years researchers with aim increase avenues checking-in guests. Self-check-in kiosk an invention that allows themselves using bar codes sent them in advance. Although are able reduce guests’ time, it cannot be used unlock rooms. This makes mobile device better medium for and access...

10.1177/1847979017720039 article EN cc-by International Journal of Engineering Business Management 2017-01-01

SVD-based watermarking algorithm is one of the most preferable algorithms for copyright protection due to its singular values (SVs) that have outstanding stability and represents intrinsic algebraic image properties. Hence, there a good trade-off between robustness imperceptibility. However, been tested against conventional attacks, such as manipulations, do not fully exploit adversary's knowledge. These are vulnerable false-positive problem, where an watermark can be detected in watermarked...

10.1109/access.2023.3279028 article EN cc-by IEEE Access 2023-01-01

Network steganography is an emerging research field, which exploits packet protocol headers, mechanism, payload, etc. to establish secret communication between two parties over a computer network. The detection of such hidden has not been part intrusion systems that are primarily used detect malicious activities as viruses and malwares. In this paper, we propose packet-length based steganographic techniques implement covert channel. We examine analyze the lengths normal traffic show our can...

10.1109/csudet.2013.6670985 article EN 2013-05-01

An elapsed facial emotion involves changes of contour due to the motions (such as contraction or stretch) muscles located at eyes, nose, lips and etc. Thus, important information such corners contours that are in various regions face crucial recognition expressions, even more apparent for micro-expressions. In this paper, we propose first known notion employing intrinsic two-dimensional (i2D) local structures represent these features micro-expression recognition. To retrieve i2D phase...

10.1109/icassp.2016.7471997 article EN 2016-03-01

A digital access control system allows users to a premise using an card. It is introduced as alternative the most common physical keys and mechanical locks increase level of convenience premise. However, intruder able gain if he/she possesses card or keys. Therefore, in this paper, we propose that utilizes near field communication (NFC) smartphone information hiding technique overcome disadvantage mentioned previously on existing systems. The first protection NFC reader tag initiate second...

10.1109/icos.2013.6735039 article EN 2013-12-01

Abstract This article presents a virtual machine placement technique aimed at minimizing power usage in heterogeneous cloud data centers. In this study, an innovative model for the of datacenter’s network is provided. The Enriched Discrete Butterfly Optimization method (EDBOA) used as meta-heuristic order to achieve effective mapping machines (VMs) onto physical (PMs). Reverse Order Filling Method (ROFM) was developed solution repair meet requirements BOA. It manipulate solutions identify...

10.1007/s10586-024-04389-4 article EN cc-by Cluster Computing 2024-04-12

BACKGROUND: Cardiovascular diseases are the most common cause of death worldwide and characterized by arrhythmia (i.e. irregular rhythm heartbeat). Arrhythmia occasionally happens under certain conditions, such as stress. Therefore, it is diff

10.3233/thc-150980 article EN Technology and Health Care 2015-06-17

We show that the two countermeasures proposed in a paper on security of ownership watermarking digital images based singular value decomposition by Loukhaoukha and Chouinard do not solve false-positive detection problem contrast to designers' claim therefore should be used for proof application.

10.1117/1.3534865 article EN Journal of Electronic Imaging 2011-01-01

The progression toward spatially scalable video coding (SVC) solutions for ubiquitous endpoint systems introduces challenges to sustain real-time frame rates in downsampling high-resolution videos into multiple layers. In addressing these challenges, we put forward a hardware accelerated algorithm on parallel computing platform. First, investigate the principal architecture of serial Joint-Scalable-Video-Model reference software identify performance limitations SVC. Then, multicore-based is...

10.1117/1.jei.24.1.013025 article EN Journal of Electronic Imaging 2015-02-09

This paper presents a low complexity human visual system based watermarking algorithm for H.264 spatial scalable coding. The proposed extracts textural feature from set of 7 high energy quantized coefficients in 4 × luma INTRA-predicted blocks all-slices and embeds watermark into the highly textured block which has at least one non-zero coefficient 6 selected locations. Experiments were conducted by embedding up to 8192 bits four-layer coded video. Results suggest that scheme produces...

10.1109/icce-tw.2016.7520710 article EN 2016-05-01
Coming Soon ...