Experience

• Research Scholar at the University of Central Florida, Department of Computer Science (Oct. 06, 2017 – Aug. 01, 2018)

• The University of the West Indies, St. Augustine, Tenured Senior Lecturer (Associate Professor equivalent), Department of Computing and Information Technology (8/2017 – Present)

• The University of the West Indies, St. Augustine, Lecturer (Assistant Professor equivalent), Department of Computing and Information Technology (9/2010 – 7/2017)

Posted in Uncategorized | Leave a comment

Supervision

Graduated Ph.D. Students

1. Andrew Rudder [5/2011-2014] (supervisor Dr. Duc Kieu, co-supervisor Dr. Wayne Goodridge)
Title: Reversible Data Hiding Techniques in the VQ-Compressed Domain
(Thesis was submitted in 6/2015, Oral defence was conducted on Oct. 19, 2016.)
Result: High Commendation. Date on Ph.D. degree: March 09, 2017
Advisory Committee Members: Dr. Margaret Bernard

2. Laurice Phillips [1/2014-2017] (supervisor Dr. Margaret Bernard, co-supervisor Dr. Duc Kieu)
Title: A Novel Approach to Fingerprint Classification Using Regular Expression Machine Learning
(Thesis was submitted in 01/2017, Oral defence was conducted on Jan. 22, 2018.)
Result: Pass. Date on Ph.D. degree: July 31, 2018
US Patent 9,971,929, issued May 15, 2018.
https://patents.google.com/patent/US9971929B2
Advisory Committee Members: Prof. Patrick Hosein, Dr. Michael Hosein

3. Kris Manohar [9/2013-9/2020] (supervisor Dr. Duc Kieu, Advisory Committee Members: Dr. Wayne Goodridge, Dr. Margaret Bernard)
Title: Reversible Data Hiding Techniques in the VQ-Compressed and Spatial Domains
(Thesis was submitted in 09/2020, Oral defence was conducted on Sep. 27, 2021.)
Result: Pass. Date on Ph.D. degree: mm dd, 2022

Current Ph.D. Students

.

Graduated M.Phil. Students

1. Koffka Khan [3/2012-2014] (supervisor Dr. Wayne Goodridge, co-supervisor Dr. Duc Kieu)
Title: A Multi-Criteria Ad Hoc On-Demand Multi-Path Distance Vector (M-Aomdv) Routing Protocol
(Thesis was submitted in 2014)
Result: Pass, Date on M.Phil. degree: 10/2014
Advisory Committee Members: Dr. Christopher Ward, Dr. Permanand Mohan

2. Sterling Ramroach [9/2012-2015] (supervisor Dr. Duc Kieu)
Title: The Study of Lossless Steganographic Techniques for VQ Indices
(Thesis was submitted in 6/2015)
Result: High Commendation, Date on M.Phil. degree: May 6, 2016
Advisory Committee Members: Dr. Wayne Goodridge, Dr. Margaret Bernard

Current M.Phil. Students

Posted in Uncategorized | Leave a comment

Publications

Patents

1. L. Phillips, M. Bernard, T.D. Kieu, “Fingerprint classification system and method using regular expression machines,” US Patent 9,971,929, issued May 15, 2018. https://patents.google.com/patent/US9971929B2

International Journal Papers

2. K. Manohar, T.D. Kieu, “A Strategy for the Linear Time Implementation of the SMVQ Algorithm,” IETE Technical Review, Vol. 39, No. 2, Jun. 2022, pp. 270-275. (SCI, IF: 2.200) Accepted: 21 Oct. 2020, Published online: 12 Nov. 2020 [England]

3. K. Manohar, T.D. Kieu, “A Counter-Embedding IPVO Based Reversible Data Hiding Technique,” Multimedia Tools and Applications, Vol. 80, No. 4, Feb. 2021, pp. 5873-5900. (SCI, IF: 2.313) [Netherlands]

4. N. Zhuang, G.J. Qi, T.D. Kieu, K.A. Hua, “Rethinking the Combined and Individual Orders of Derivative of States for Differential Recurrent Neural Networks: Deep Differential Recurrent Neural Networks,” ACM Transactions on Multimedia Computing Communications and Applications (TOMM), Vol. 15, No. 3, Sep. 2019, pp. 83:1-83:21. (SCI, IF: 2.019) [USA]

5. K. Manohar, T.D. Kieu, “A Centroid Based Vector Quantization Reversible Data Hiding Technique,” Multimedia Tools and Applications, Vol. 78, No. 18, Sep. 2019, pp. 25273-25298. (SCI, IF: 2.101) [Netherlands]

6. N. Zhuang, T.D. Kieu, J. Ye, K.A. Hua, “Convolutional Nonlinear Differential Recurrent Neural Networks for Crowd Scene Understanding,” International Journal of Semantic Computing (IJSC) [World Scientific] Vol. 12, No. 4, Dec. 2018, pp. 481-500.

7. K. Manohar, T.D. Kieu, “An SMVQ-based Reversible Data Hiding Technique Exploiting Side Match Distortion,” Multimedia Tools and Applications, Vol. 77, No. 10, May 2018, pp. 11727-11750. (SCI, IF: 1.530) [Netherlands]

8. T.D. Kieu, A. Rudder, “A Reversible Steganographic Scheme for VQ Indices Based on Joint Neighboring and Predictive Coding,” Multimedia Tools and Applications, Vol. 75, No. 21, Nov. 2016, pp. 13705-13731. (SCI, IF: 1.530) [Netherlands]

9. A. Rudder, T.D. Kieu, “A Lossless Data Hiding Scheme for VQ Indexes Based on Joint Neighboring Coding,” KSII Transactions on Internet and Information Systems, Vol. 9, No. 8, Aug. 2015, pp. 2984-3004. (SCIE, IF: 0.561) [South Korea]

10. T.D. Kieu, S. Ramroach, “A Reversible Steganographic Scheme for VQ Indices Based on Joint Neighboring Coding,” Expert Systems with Applications, Vol. 42, No. 2, Feb. 2015, pp. 713-722. (SCI, IF: 2.981) [USA]

11. T.D. Kieu, A. Rudder, W. Goodridge, “A Reversible Steganographic Scheme for VQ Indices Based on Locally Adaptive Coding,” Journal of Visual Communication and Image Representation, Vol. 25, No. 6, Aug. 2014, pp. 1378-1386. (SCI, IF: 1.218) [USA]

12. T.D. Kieu, C.C. Chang, “Reversible Watermarking Schemes Based on Expansion Embedding Using Pixel Partition Strategies,” Imaging Science Journal, Vol. 60, No. 2, Apr. 2012, pp. 112-124. (SCI, IF: 0.506) [England]

13. T.D. Kieu, C.C. Chang, “A Reversible Watermarking Scheme with High Payload and Good Visual Quality for Watermarked Images,” International Journal of Innovative Computing, Information and Control (IJICIC), Vol. 7, No. 11, Nov. 2011, pp. 6203-6218. (SCI, IF: 1.664) [Japan]

14. T.D. Kieu, C.C. Chang, “A Steganographic Scheme by Fully Exploiting Modification Directions,” Expert Systems with Applications, Vol. 38, No. 8, Aug. 2011, pp. 10648-10657. (SCI, IF: 2.203) [USA]

15. C.C. Chang, T.D. Kieu, “A Reversible Data Hiding Scheme Using Complementary Embedding Strategy,” Information Sciences,  Vol. 180, No. 16, Aug. 2010, pp. 3045-3058. (SCI, IF: 2.833) [USA]

16. C.C. Chang, Y.H. Chen, T.D. Kieu, “A Watermarking Technique Using Synonym Substitution for Integrity Protection of XML Documents,” ICIC Express Letters, Vol. 4, No. 1, Feb. 2010, pp. 89-94. (EI) [Japan]

17. Z.H. Wang, T.D. Kieu, C.C. Chang, M.C. Li, “A Novel Information Concealing Method Based on Exploiting Modification Direction,” Journal of Information Hiding and Multimedia Signal Processing, Vol. 1, No. 1, Jan. 2010, pp. 1-9. (EI) [Taiwan]

18. T.D. Kieu, C.C. Chang, “An Image Authentication Based on Discrete Fourier Transform,” Fundamenta Informaticae,  Vol. 97, No. 4, Dec. 2009, pp. 369-379. (SCI, IF: 0.615) [Poland, European Association]

19. T.D. Kieu, C.C. Chang, “A High Stego-image Quality Steganographic Scheme with Reversibility and High Payload Using Multiple Embedding Strategy,” Journal of Systems and Software, Vol. 82, No. 10, Oct. 2009, pp. 1743-1752. (SCI, IF: 1.340) [USA]

20. C.C. Chang, T.D. Kieu, W.C. Wu, “A Lossless Data Embedding Technique by Joint Neighboring Coding,” Pattern Recognition, Vol. 42, No. 7, Jul. 2009, pp. 1597-1603. (SCI, IF: 2.554) [England]

21. T.D. Kieu, Z.H. Wang, C.C. Chang, M.C. Li, “A Sudoku Based Wet Paper Hiding Scheme,” International Journal of Smart Home, Vol. 3, No. 2, Apr. 2009, pp. 1-12. (EI) [Korea]

22. C.C. Chang, T.D. Kieu, Y.C. Chou, “Reversible Information Hiding for VQ Indices Based on Locally Adaptive Coding,” Journal of Visual Communication and Image Representation, Vol. 20, No. 1, Jan. 2009, pp. 57-64. (SCI, IF: 1.326) [USA]

23. C.C. Chang, Y.C. Chou, T.D. Kieu, “High Capacity Data Hiding for Grayscale Images,” Fundamenta Informaticae, Vol. 86, No. 4, Jul. 2008, pp. 435-446. (SCI, IF: 0.715) [Poland, European Association]

24. C.C. Chang, T.D. Kieu, Y.C. Chou, “Reversible Data Embedding for Color Images,” Journal of Digital Information Management, Vol. 6, No. 2, Apr. 2008, pp. 143-150. (EI) [India]

International Conference Papers

25. K. Manohar, T.D. Kieu, “A Linear Time Side Match Vector Quantization Implementation,” Proceedings of 2020 7th International Conference on Signal Processing and Integrated Networks (SPIN), Delhi, India, Feb. 2020, pp. 494-497.

26. C.C. Chang, Y.C. Chou, T.D. Kieu, “Embedding Data and Sharing Original Image in Two Stego Images Using Sudoku,” Proceedings of 2010 the IET International Conference on Frontier Computing – Theory, Technologies and Applications (IET FC 2010), Taichung, Taiwan, Aug. 2010, pp. 163-168. ISBN: 978-1-84919-208-8.

27. Z.H. Wang, T.D. Kieu, C.C. Chang, M.C. Li, “Emoticon-based Text Steganography in Chat,” Proceedings of 2009 Asia-Pacific Conference on Computational Intelligence and Industrial Applications (PACIIA 2009), Wuhan, China, Nov. 2009, Vol. 2, pp. 457-460.

28. T.D. Kieu, Z.H. Wang, C.C. Chang, M.C. Li, “Sharing Secrets and Reversibly Reconstructing the Cover Image Using Two Meaningful Shadows,” Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP09), Kyoto, Japan, Sep. 2009, pp. 324-327.

29. C.C. Chang, T.D. Kieu, Z.H. Wang, M.C. Li, “A Steganographic Scheme for Reversible Information Hiding with Good Visual Quality Suitable for Small Embedded Data,” Proceedings of 2009 ISECS International Colloquium on Computing, Communication, Control, and Management (CCCM 2009),  Sanya, China, Aug. 2009, Vol. 1, pp. 507-511.

30. C.C. Chang, T.D. Kieu, Z.H. Wang, M.C. Li, “An Image Authentication Scheme Using Magic Square,” Proceedings of the Second IEEE International Conference on Computer Science and Information Technology 2009 (ICCSIT 2009), Beijing, China, Aug. 2009, Vol. 2, pp. 1-4.

31. C.C. Chang, Y.C. Chou, T.D. Kieu, “Information Hiding in Dual Images with Reversibility,” Proceedings of the Third International Conference on Multimedia and Ubiquitous Engineering (MUE 2009), Qingdao, China, Jun. 2009, pp. 145-152.

32. C.C. Chang, T.D. Kieu, Y.C. Chou, “A High Payload Steganographic Scheme Based on (7, 4) Hamming Code for Digital Images,” Proceedings of International Symposium on Electronic Commerce and Security (ISECS 2008), Guangzhou, China, Aug. 2008, pp. 16-21.

33. C.C. Chang, Y.C. Chou, T.D. Kieu, “An Information Hiding Scheme Using Sudoku,” Proceedings of the Third International Conference on Innovative Computing, Information and Control (ICICIC2008), Dalian, China, Jun. 2008, pp. 17-1-17-5.

34. C.C. Chang, T.D. Kieu, Y.C. Chou, “Using Nearest Covering Codes to Embed Secret Information in Grayscale Images,” Proceedings of the Second International Conference on Ubiquitous Information Management and Communication (ICUIMC 2008), Suwon, Korea, Jan. 2008, pp. 315-320.

35. C.C. Chang, T.D. Kieu, “Reversible Data Embedding for Vector Quantization Indices,” Proceedings of the Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP07), Kaohsiung, Taiwan, Nov. 2007, Vol. 1, pp. 481-484.

36. C.C. Chang, T.D. Kieu, “Secret Sharing and Information Hiding by Shadow Images,” Proceedings of the Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP07), Kaohsiung, Taiwan, Nov. 2007, Vol. 2, pp. 457-460.

37. C.C. Chang, T.D. Kieu, Y.C. Chou, “Reversible Data Hiding Scheme Using Two Steganographic Images,” Proceedings of IEEE TENCON 2007, Taipei, Taiwan, Oct. 2007, pp. 1-4.

Posted in Uncategorized | Leave a comment

International Activities

A. Reviewer of International Journals

1. Information Sciences (12/2008): http://ees.elsevier.com/ins

2. Journal of Systems and Software (08/2009): http://ees.elsevier.com/jss

3. IEEE Transactions on Information Forensics and Security (03/2011):
http://www.signalprocessingsociety.org/publications/periodicals/forensics/

4. The Computer Journal published by Oxford University Press (09/2013):
http://comjnl.oxfordjournals.org

5. Journal of Visual Communication and Image Representation (06/2014):
http://ees.elsevier.com/jvci/

6. Signal Processing (09/2014): http://ees.elsevier.com/sigpro/

7. IET Image Processing (10/2014): http://www.ietdl.org/IET-IPR

8. Multimedia Tools and Applications (11/2014):
http://www.springer.com/computer/information+systems+and+applications/journal/11042

9. Security and Communication Networks (04/2015):
http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1939-0122

10. KSII Transactions on Internet and Information Systems (TIIS): (05/2015): http://www.itiis.org

11. Signal Processing: Image Communication (03/2016): http://ees.elsevier.com/image

12. Digital Signal Processing (04/2016): http://ees.elsevier.com/dsp

13. International Journal of Pattern Recognition and Artificial Intelligence (05/2017): http://www.worldscientific.com/worldscinet/ijprai

14. IEEE Signal Processing Letters (06/2017):
http://www.signalprocessingsociety.org/publications/periodicals/letters

15. Displays (10/2017): https://www.journals.elsevier.com/displays/

16. IEEE Journal of Biomedical and Health Informatics (02/2018):  http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6221020

17. IET Information Security (04/2018): http://www.ietdl.org/IET-IFS

18. IET Electronics Letters (08/2018):
http://digital-library.theiet.org/content/journals/el

B. Editorial Board Member of International Journals

1. Journal of Convergence Information Technology (JCIT) (6/2009): http://www.aicit.org/jcit/

2. International Journal of Digital Content Technology and Its Applications (JDCTA) (6/2009): http://www.aicit.org/jdcta/

3. International Journal of Advancements in Computing Technology (IJACT) (6/2009): http://www.aicit.org/ijact/

4. International Journal of Engineering and Industries (IJEI) (9/2010): http://www.aicit.org/ijei/

C. International Committee Member of International Conferences

1. International Conference on Computer Sciences and Convergence Information Technology (ICCIT) (7/2009): http://www.aicit.org/iccit

2. International Conference on Interaction Sciences: Information Technology, Culture and Human (ICIS) (7/2009): http://www.aicit.org/icis

3. International Conference on New Trends in Information Science and Service Science (NISS) (6/2009): http://www.aicit.org/niss/

4. International Conference on Networked Computing (INC) (6/2009): http://www.aicit.org/inc/

5. 6th International Conference on Digital Content, Multimedia Technology and Its Applications (IDC2010) (6/2010) http://www.aicit.org/IDC/

6. 6th International Conference on Networked Computing and Advanced Information Management (NCM2010) (6/2010) http://www.aicit.org/ncm/

7. International Conference on Next Generation Information Technology (ICNIT2011) (1/2011) http://www.aicit.org/icnit/

8. 2011 International Conference on Mobile IT Convergence (ICMIC2011, Gumi, Korea) (4/2011): http://www.aicit.org/icmic/

D. Reviewer of International Conferences

1. 2011 4th IEEE International Conference on Computer Science and Information Technology (IEEE ICCSIT) (03, 2011) http://www.iccsit.org/

Posted in Uncategorized | Leave a comment

Honors and Awards

  1. Outstanding Academic Performance Honors for Ph.D. Student by President of Feng Chia University, Taiwan (6/2009)
  2. Feng Chia University’s full scholarship for Ph.D. degree in Taiwan, 9/2006-6/2009
  3. Asian Development Bank’s full scholarship for Master degree in Australia, 2002-2004
Posted in Uncategorized | Leave a comment