Publications

Patents

1. L. Phillips, M. Bernard, T.D. Kieu, “Fingerprint classification system and method using regular expression machines,” US Patent 9,971,929, issued May 15, 2018. https://patents.google.com/patent/US9971929B2

International Journal Papers

2. K. Manohar, T.D. Kieu, “A Strategy for the Linear Time Implementation of the SMVQ Algorithm,” IETE Technical Review, Vol. 39, No. 2, Jun. 2022, pp. 270-275. (SCI, IF: 2.200) Accepted: 21 Oct. 2020, Published online: 12 Nov. 2020 [England]

3. K. Manohar, T.D. Kieu, “A Counter-Embedding IPVO Based Reversible Data Hiding Technique,” Multimedia Tools and Applications, Vol. 80, No. 4, Feb. 2021, pp. 5873-5900. (SCI, IF: 2.313) [Netherlands]

4. N. Zhuang, G.J. Qi, T.D. Kieu, K.A. Hua, “Rethinking the Combined and Individual Orders of Derivative of States for Differential Recurrent Neural Networks: Deep Differential Recurrent Neural Networks,” ACM Transactions on Multimedia Computing Communications and Applications (TOMM), Vol. 15, No. 3, Sep. 2019, pp. 83:1-83:21. (SCI, IF: 2.019) [USA]

5. K. Manohar, T.D. Kieu, “A Centroid Based Vector Quantization Reversible Data Hiding Technique,” Multimedia Tools and Applications, Vol. 78, No. 18, Sep. 2019, pp. 25273-25298. (SCI, IF: 2.101) [Netherlands]

6. N. Zhuang, T.D. Kieu, J. Ye, K.A. Hua, “Convolutional Nonlinear Differential Recurrent Neural Networks for Crowd Scene Understanding,” International Journal of Semantic Computing (IJSC) [World Scientific] Vol. 12, No. 4, Dec. 2018, pp. 481-500.

7. K. Manohar, T.D. Kieu, “An SMVQ-based Reversible Data Hiding Technique Exploiting Side Match Distortion,” Multimedia Tools and Applications, Vol. 77, No. 10, May 2018, pp. 11727-11750. (SCI, IF: 1.530) [Netherlands]

8. T.D. Kieu, A. Rudder, “A Reversible Steganographic Scheme for VQ Indices Based on Joint Neighboring and Predictive Coding,” Multimedia Tools and Applications, Vol. 75, No. 21, Nov. 2016, pp. 13705-13731. (SCI, IF: 1.530) [Netherlands]

9. A. Rudder, T.D. Kieu, “A Lossless Data Hiding Scheme for VQ Indexes Based on Joint Neighboring Coding,” KSII Transactions on Internet and Information Systems, Vol. 9, No. 8, Aug. 2015, pp. 2984-3004. (SCIE, IF: 0.561) [South Korea]

10. T.D. Kieu, S. Ramroach, “A Reversible Steganographic Scheme for VQ Indices Based on Joint Neighboring Coding,” Expert Systems with Applications, Vol. 42, No. 2, Feb. 2015, pp. 713-722. (SCI, IF: 2.981) [USA]

11. T.D. Kieu, A. Rudder, W. Goodridge, “A Reversible Steganographic Scheme for VQ Indices Based on Locally Adaptive Coding,” Journal of Visual Communication and Image Representation, Vol. 25, No. 6, Aug. 2014, pp. 1378-1386. (SCI, IF: 1.218) [USA]

12. T.D. Kieu, C.C. Chang, “Reversible Watermarking Schemes Based on Expansion Embedding Using Pixel Partition Strategies,” Imaging Science Journal, Vol. 60, No. 2, Apr. 2012, pp. 112-124. (SCI, IF: 0.506) [England]

13. T.D. Kieu, C.C. Chang, “A Reversible Watermarking Scheme with High Payload and Good Visual Quality for Watermarked Images,” International Journal of Innovative Computing, Information and Control (IJICIC), Vol. 7, No. 11, Nov. 2011, pp. 6203-6218. (SCI, IF: 1.664) [Japan]

14. T.D. Kieu, C.C. Chang, “A Steganographic Scheme by Fully Exploiting Modification Directions,” Expert Systems with Applications, Vol. 38, No. 8, Aug. 2011, pp. 10648-10657. (SCI, IF: 2.203) [USA]

15. C.C. Chang, T.D. Kieu, “A Reversible Data Hiding Scheme Using Complementary Embedding Strategy,” Information Sciences,  Vol. 180, No. 16, Aug. 2010, pp. 3045-3058. (SCI, IF: 2.833) [USA]

16. C.C. Chang, Y.H. Chen, T.D. Kieu, “A Watermarking Technique Using Synonym Substitution for Integrity Protection of XML Documents,” ICIC Express Letters, Vol. 4, No. 1, Feb. 2010, pp. 89-94. (EI) [Japan]

17. Z.H. Wang, T.D. Kieu, C.C. Chang, M.C. Li, “A Novel Information Concealing Method Based on Exploiting Modification Direction,” Journal of Information Hiding and Multimedia Signal Processing, Vol. 1, No. 1, Jan. 2010, pp. 1-9. (EI) [Taiwan]

18. T.D. Kieu, C.C. Chang, “An Image Authentication Based on Discrete Fourier Transform,” Fundamenta Informaticae,  Vol. 97, No. 4, Dec. 2009, pp. 369-379. (SCI, IF: 0.615) [Poland, European Association]

19. T.D. Kieu, C.C. Chang, “A High Stego-image Quality Steganographic Scheme with Reversibility and High Payload Using Multiple Embedding Strategy,” Journal of Systems and Software, Vol. 82, No. 10, Oct. 2009, pp. 1743-1752. (SCI, IF: 1.340) [USA]

20. C.C. Chang, T.D. Kieu, W.C. Wu, “A Lossless Data Embedding Technique by Joint Neighboring Coding,” Pattern Recognition, Vol. 42, No. 7, Jul. 2009, pp. 1597-1603. (SCI, IF: 2.554) [England]

21. T.D. Kieu, Z.H. Wang, C.C. Chang, M.C. Li, “A Sudoku Based Wet Paper Hiding Scheme,” International Journal of Smart Home, Vol. 3, No. 2, Apr. 2009, pp. 1-12. (EI) [Korea]

22. C.C. Chang, T.D. Kieu, Y.C. Chou, “Reversible Information Hiding for VQ Indices Based on Locally Adaptive Coding,” Journal of Visual Communication and Image Representation, Vol. 20, No. 1, Jan. 2009, pp. 57-64. (SCI, IF: 1.326) [USA]

23. C.C. Chang, Y.C. Chou, T.D. Kieu, “High Capacity Data Hiding for Grayscale Images,” Fundamenta Informaticae, Vol. 86, No. 4, Jul. 2008, pp. 435-446. (SCI, IF: 0.715) [Poland, European Association]

24. C.C. Chang, T.D. Kieu, Y.C. Chou, “Reversible Data Embedding for Color Images,” Journal of Digital Information Management, Vol. 6, No. 2, Apr. 2008, pp. 143-150. (EI) [India]

International Conference Papers

25. K. Manohar, T.D. Kieu, “A Linear Time Side Match Vector Quantization Implementation,” Proceedings of 2020 7th International Conference on Signal Processing and Integrated Networks (SPIN), Delhi, India, Feb. 2020, pp. 494-497.

26. C.C. Chang, Y.C. Chou, T.D. Kieu, “Embedding Data and Sharing Original Image in Two Stego Images Using Sudoku,” Proceedings of 2010 the IET International Conference on Frontier Computing – Theory, Technologies and Applications (IET FC 2010), Taichung, Taiwan, Aug. 2010, pp. 163-168. ISBN: 978-1-84919-208-8.

27. Z.H. Wang, T.D. Kieu, C.C. Chang, M.C. Li, “Emoticon-based Text Steganography in Chat,” Proceedings of 2009 Asia-Pacific Conference on Computational Intelligence and Industrial Applications (PACIIA 2009), Wuhan, China, Nov. 2009, Vol. 2, pp. 457-460.

28. T.D. Kieu, Z.H. Wang, C.C. Chang, M.C. Li, “Sharing Secrets and Reversibly Reconstructing the Cover Image Using Two Meaningful Shadows,” Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP09), Kyoto, Japan, Sep. 2009, pp. 324-327.

29. C.C. Chang, T.D. Kieu, Z.H. Wang, M.C. Li, “A Steganographic Scheme for Reversible Information Hiding with Good Visual Quality Suitable for Small Embedded Data,” Proceedings of 2009 ISECS International Colloquium on Computing, Communication, Control, and Management (CCCM 2009),  Sanya, China, Aug. 2009, Vol. 1, pp. 507-511.

30. C.C. Chang, T.D. Kieu, Z.H. Wang, M.C. Li, “An Image Authentication Scheme Using Magic Square,” Proceedings of the Second IEEE International Conference on Computer Science and Information Technology 2009 (ICCSIT 2009), Beijing, China, Aug. 2009, Vol. 2, pp. 1-4.

31. C.C. Chang, Y.C. Chou, T.D. Kieu, “Information Hiding in Dual Images with Reversibility,” Proceedings of the Third International Conference on Multimedia and Ubiquitous Engineering (MUE 2009), Qingdao, China, Jun. 2009, pp. 145-152.

32. C.C. Chang, T.D. Kieu, Y.C. Chou, “A High Payload Steganographic Scheme Based on (7, 4) Hamming Code for Digital Images,” Proceedings of International Symposium on Electronic Commerce and Security (ISECS 2008), Guangzhou, China, Aug. 2008, pp. 16-21.

33. C.C. Chang, Y.C. Chou, T.D. Kieu, “An Information Hiding Scheme Using Sudoku,” Proceedings of the Third International Conference on Innovative Computing, Information and Control (ICICIC2008), Dalian, China, Jun. 2008, pp. 17-1-17-5.

34. C.C. Chang, T.D. Kieu, Y.C. Chou, “Using Nearest Covering Codes to Embed Secret Information in Grayscale Images,” Proceedings of the Second International Conference on Ubiquitous Information Management and Communication (ICUIMC 2008), Suwon, Korea, Jan. 2008, pp. 315-320.

35. C.C. Chang, T.D. Kieu, “Reversible Data Embedding for Vector Quantization Indices,” Proceedings of the Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP07), Kaohsiung, Taiwan, Nov. 2007, Vol. 1, pp. 481-484.

36. C.C. Chang, T.D. Kieu, “Secret Sharing and Information Hiding by Shadow Images,” Proceedings of the Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP07), Kaohsiung, Taiwan, Nov. 2007, Vol. 2, pp. 457-460.

37. C.C. Chang, T.D. Kieu, Y.C. Chou, “Reversible Data Hiding Scheme Using Two Steganographic Images,” Proceedings of IEEE TENCON 2007, Taipei, Taiwan, Oct. 2007, pp. 1-4.

About Dr. Kieu

I am Dr. Duc The Kieu, a Senior Tenured Lecturer (Associate Professor equivalent) in Computer Science, U.W.I., St. Augustine
This entry was posted in Uncategorized. Bookmark the permalink.

Leave a comment