Jiantao ZHOU  周建濤
Associate Professor

Academic Qualifications | Working Experience | Award and Honor | Teaching | Research | Selected Publications | Patents | Professional Affiliations | Contact Details

Academic Qualifications
Working Experience
Award and Honor
Teaching

B.Sc. Courses

  1. Programming Language (CISB354)
  2. Program Design for Engineers (EMEB111)
  3. Special Topics in Computer and Information Science (CISB459)

Research

Research Interests

Funded Research Projects:

  1. Multi-Year Research Grant, University of Macau, PI, “Privacy-preserving Image Services Outsourced to the Cloud”, MYRG2016-00137-FST, Jan. 2017– Dec. 2019. (Total: 675K MOP)
  2. Macau Science and Technology Development Fund (FDCT), PI, “Investigation of passive techniques for digital image Forgery detection”, FDCT/046/2014/A1, Jan. 2015-Jan. 2018. UM matching grant: MRG007/ZJT/2015/FST. (Total: 1.412M MOP)
  3. Multi-Year Research Grant, University of Macau, PI, “Robustness Investigation of Multimedia Forensic Techniques”, MYRG2015-00056-FST, April. 2015 – March. 2018. (Total: 672K MOP)
  4. Natural Science Foundation of China, PI, “加密域图像高性能压缩技术研究”, 61402547, Jan. 2015 - Dec. 2017. (Total: 260K RMB)
  5. Natural Science Foundation of China, Co-PI, ““不可分”二维变换的优化设计及其在视频编码和加密中的应用”, 61370148, Jan. 2014 - Dec. 2016. (Total: 790K RMB)
  6. Multi-Year Research Grant, University of Macau, PI, “Investigation of Advanced Technologies for Multimedia Signal Processing over Encrypted Domain”, MYRG2014-00031-FST, April. 2014 – March. 2017. (Total: 500K MOP)
  7. Macau Science and Technology Development Fund (FDCT), PI, “High-fidelity image and video compression technology for resource-constrained mobile devices”, FDCT/009/2013/A1, Oct. 2013-Oct. 2016. UM matching grant: MRG021/ZJT/2013/FST. (Total: 2.409M MOP)
  8. Start-up Research Grant, University of Macau, PI, “Rate-Distortion Optimized Reversible Image Watermarking”, SRG023-FST13-ZJT, Jan. 2013 – Jan. 2014. (Total: 100K MOP)

Selected Publications

Journal Papers

  1. Y. M. Li, J. T. Zhou, and A. Cheng, “SIFT Keypoint Removal via Directed Graph Construction for Color Images”, To appear in IEEE Trans. on Inf. Forensics and Security (T-IFS), Nov. 2017.
  2. Y. S. Zhang, J. T. Zhou, Y. Xiang, Y. Zhang, F. Chen, S. N. Pang, and X. F. Liao, “Computation Outsourcing Meets Lossy Channel: Secure Sparse Robustness Decoding Service in Multi-Clouds,” To appear in IEEE Trans. on Big Data (T-BD), 2017.
  3. Y. F. Zheng, H. L. Cui, C. Wang, and J. T. Zhou, “Privacy-Preserving Image Denoising from External Cloud Databases”, IEEE Trans. on Inf. Forensics and Security (T-IFS), vol. 12, no. 6, pp. 1285-1298, 2017.
  4. L. Dong, J. T. Zhou, and Y. Y. Tang, “Noise Level Estimation for Natural Images Based on Scale-Invariant Kurtosis and Piecewise Stationarity”, IEEE Trans. on Image Process. (T-IP), vol. 26, no. 2, pp. 1017-1039, 2017. [codes]
  5. X. M. Liu, D. M. Zhai, J. T. Zhou, S. Q. Wang, D. B. Zhao, and H.J. Gao, “Sparsity-based Image Error Concealment via Adaptive Dual Dictionary Learning and Regularization”, IEEE Trans. on Image Process. (T-IP), vol. 26, no. 2, pp. 782-796, 2017.
  6. X. W. Zheng, Y. Y. Tang, J. J. Pan, and J. T. Zhou, “Adaptive Multiscale Decomposition of Graph Signals”, IEEE Signal Processing Letters (SPL), vol. 23, no. 10, pp. 1389-1393, 2016.
  7. A. M. Zheng, Y. Yuan, J. T. Zhou, Y. F. Guo, H. T. Yang, and O. C. Au, “Adaptive block coding order for Intra prediction in HEVC”, IEEE Trans. on Circuits and Syst. for Video Technology (T-CSVT), vol. 26, no. 11, pp. 2152-2158, 2016.
  8. Y. S. Zhang, J. T. Zhou, F. Chen, Y. Zhang, D. Xiao, B. Chen, and X. Liao, “A Block compressible Sensing Based Scalable Encryption Framework for Protecting Significant Image Regions”, Int. J. of Bifurcation and Chaos (IJBC), vol. 26, no. 11, pp. 1650191, 2016.
  9. Y. Zhang, K.W Wong, Y.S. Zhang, and J. T. Zhou, "Bi-level protected compressive sampling," IEEE Trans. on Multimedia (T-MM), vol. 18, no. 9, pp. 1720-1732, 2016.
  10. J. H. Wang, L. J. Chen, J. T. Zhou, W. K. Ng, R. Schober, and and C. M. Zhao, “Distributed User-Centric Scheduling for Visible Light Communication Networks”, Optics Express, vol. 24, no. 4, pp. 15570-15589, 2016.
  11. Y.S. Zhang, J. T. Zhou, F. Chen, Y. Zhang, K.W Wong, X. He, and D. Xiao, "Embedding Cryptographic Features in Compressive Sensing," Neurocomputing, vol. 40, no. 12, pp. 472-480, 2016.
  12. Y.S. Zhang, Y. Zhang, J. T. Zhou, L.C. Liu, F. Chen, and X. He, "A Review of Compressive Sensing in Information Security Field", IEEE Access, vol. 4, pp. 2507–2519, 2016.
  13. Y. M. Li, J. T. Zhou, A. Cheng, X. M. Liu, and Y. Y. Tang, “SIFT Keypoint Removal and Injection via Convex Relaxation”, IEEE Trans. on Inf. Forensics and Security (T-IFS), vol. 11, no. 8, pp. 1722-1735, 2016.
  14. X. M. Liu, D. M. Zhai, J. T. Zhou, D. B. Zhao, and W. Gao, “Compressive Sampling based Image Coding for Resource-deficient Visual Communication”, IEEE Trans. on Image Process. (T-IP), vol. 25, no. 6, pp. 2844-2855, 2016.
  15. J. T. Zhou, W. W. Sun, L. Dong, X. M. Liu, O. C. Au, and Y. Y. Tang, “Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulation”, IEEE Trans. on Circuits and Syst. for Video Technology (T-CSVT), vol. 26, no. 3, pp. 441-452, 2016. [codes]
  16. X. M. Liu, X. L. Wu, J. T. Zhou, and D. B. Zhao, “Data-driven soft decoding of compressed images in dual transform-pixel domain”, IEEE Trans. on Image Processing. (T-IP), vol. 25, no. 4, pp. 1649-1659, 2016.
  17. Z. P. Gao, G. T. Zhai, and J. T. Zhou, “Factorization Algorithms for Temporal Psychovisual Modulation Display”, IEEE Trans. on Multimedia (T-MM), vol. 18, no. 4, pp. 614-626, 2016.
  18. Y. F. Guo, O. C. Au, J. T. Zhou, K. T. Tang and X. P. Fan, “Halftone image watermarking via optimization”,Sig. Proc.: Image Comm, vol. 41, pp. 85-100, 2016.
  19. Y. S. Zhang, D. Xiao, K. W. Wong, J. T. Zhou, S. Bai, and M.T. Su, “Perturbation meets key-based interval splitting arithmetic coding: security enhancement and chaos generalization”, Security and Comm. Networks,vol. 9, no. 1, pp.43-53, 2016.
  20. Y. S. Zhang, K. W. Wong, Y. Zhang, W.Y. Wen, J. T. Zhou, and X. He, “Robust coding of encrypted images via structural matrix”,Sig. Proc.: Image Comm, vol. 39, pp. 202-211, 2015.
  21. Y. M. Li and J. T. Zhou, “Anti-Forensics of Lossy Predictive Image Compression”, IEEE Signal Processing Letters (SPL), vol. 22, no. 12, pp. 2219-2223, 2015.
  22. X. M. Liu, X. W. Gao, D. B. Zhao, J. T. Zhou, G. T. Zhai, and W. Gao, “Model-based low bit-rate video coding for resource-deficient wireless visual communication”, Neurocomputing, vol. 162, pp. 180-190, 2015.
  23. J. H. Wang, Y. M. Huang, J. T. Zhou, and L. Sun, “On imperfect pricing in globally constrained noncooperative games for cognitive radio networks”, Signal Processing, vol. 117, pp. 96-101, 2015.
  24. J. T. Zhou, O. C. Au, G. T. Zhai, Y. Y. Tang, and X. M. Liu, “Scalable Compression of Stream Cipher Encrypted Images through Context-Adaptive Sampling”, IEEE Trans. on Inf. Forensics and Security (T-IFS), vol. 9, no.11, pp. 1857-1868, 2014
  25. J. T. Zhou,  X. M. Liu, O. C. Au, and Y. Y. Tang, “Designing an Efficient Image Encryption-then-Compression System via Prediction Error Clustering and Random Permutation”, IEEE Trans. on Inf. Forensics and Security (T-IFS), vol. 9, no. 2, pp. 39-50, 2014. (Top 10 most frequently downloaded articles in Feb. and March 2014) [codes]
  26. X.M. Liu, D.B. Zhao, J. T. Zhou, W. Gao and H.F. Sun, "Image Interpolation via Graph-based Bayesian Label Propagation,'' IEEE Trans. on Image Process. (T-IP), Vol. 23, No. 3, pp. 1084-1096, March 2014.
  27. J. T. Zhou and X. Wu, “L2 restoration of L-decoded images via soft-decision estimation”, IEEE Trans. on Image Processing (T-IP), vol. 21, no. 12, pp. 4797-4807, 2012.
  28. J. T. Zhou and O. C. Au, “Determining the Capacity Parameters in PEE-based Reversible Watermarking,” IEEE Signal Processing Letters (SPL), vol. 19, no. 5, pp. 287-290, 2012.
  29. J. T. Zhou and O. C. Au, “On the Security of Chaotic Convolutional Coder”, IEEE Trans. on Circuits and Systems-I (T-CASI), vol. 58, no.3, pp. 595-606, March 2011.
  30. K. Wang, W. J. Pei, J. T. Zhou, Y. F. Zhang, and S. Y. Zhou, “Security of chaos-based secure communications in a large community”, Acta Phys. Sin., vol. 60, no. 7, 070503.
  31. J. T. Zhou and O. C. Au, “Error Recovery of Variable Length Codes over BSC with Arbitrary Crossover Probability”, IEEE Trans. on Comm.(T-COM), vol. 58, pp. 1654-1666, 2010.
  32. J. T. Zhou and O. C. Au, “Adaptive Chosen-ciphertext Attack on Secure Arithmetic Coding”, IEEE Trans. on Signal Proc. (T-SP), vol. 57, pp. 1825-1838, May 2009.
  33. J. T. Zhou and O. C. Au, “Comments on "A Novel Compression and Encryption Scheme Using Variable Model Arithmetic Coding and Coupled Chaotic System"”, IEEE Trans. on Circuits and Systems-I (T-CASI), vol. 55, pp. 3368-3369, Nov. 2008.
  34. J. T. Zhou and O. C. Au, “Security Analysis of Multimedia Encryption Schemes Based on Multiple Huffman Table”, IEEE Signal Proc. Letters (SPL), vol. 14, pp. 201-204, 2007.
  35. J. T. Zhou, W. J. Pei, K. Wang, J. Huang, and Z. Y. He, “Secure Communication Scheme Based on Asymptotic Model of Deterministic Randomness”, Physics Letters A, vol. 358, pp. 283-288, 2006.
  36. J. T. Zhou, Q. Z. Xu, W. J. Pei, Z. Y. He, and H. H. Szu, “Step to Improve Neural Cryptography against Flipping Attacks”, Int. J. of Neural Systems, vol. 14, no. 6, pp. 393-405, 2004.
  37. X.P. Fan, O.C. Au, N.M. Cheung, Y. Chen and J. T. Zhou, “Successive Refinement based Wyner-Ziv Video Compression”, Signal Processing: Image Communications, vol. 25, no. 1, pp. 47-63, January 2010.
  38. X. P. Fan, O. C. Au, Y. Chen, J. T. Zhou, and M. Y. Ma, “Wyner-Ziv Based bidirectional decodable video coding”, Journal of Visual Communication and Image Representation, vol. 20, no. 6, pp. 365–376, August 2009.
  39. H. H. Szu, C. Hsu, M. K. Hsu and J. T. Zhou, “Intelligent Network Computing Augmented by Chaotic Neural Networks, Blind Sources Separation, Digital Watermarks”, International Journal of Information Acquisition, vol. 1, no. 4, pp 295–320, April 2005.

Conference Papers

  1. Y. C. Chen, G. T. Zhai, and J. T. Zhou, “Global Quality of Assessment and Optimization for the Backward-compatible Stereoscopic Display System,” In Proceedings of IEEE International Conference on Image Processing (ICIP-17), 2017.
  2. L. Dong and J. T. Zhou, “Efficient Image Sensor Noise Estimation via Iterative Re-weighted Least Squares”, In Proceedings of IEEE International Conference on Multimedia and Expo (ICME-17), 2017.
  3. W. Sun, G. T. Zhai, X. K. Min, Y. T. Liu, S. W. Ma, J. Liu, J. T. Zhou, and X. M. Liu “Dynamic Backlight Scaling Considering Ambient Luminance for Mobile Energy Saving,” In Proceedings of IEEE International Conference on Multimedia and Expo (ICME-17), 2017.
  4. W. W. Sun, J. T. Zhou, R. Lyu, and S. Y. Zhu, “Processing-Aware Privacy-Preserving Photo Sharing over Online Social Networks”, In Proceedings of ACM Multimedia (ACM MM-16), 2016.
  5. L. Dong and J. T. Zhou, “Noise-Robust SLIC Superpixel for Natural Images”, In Proceedings of IEEE International Conference on Cloud Computing and Big Data (CCBD-2016), 2016.
  6. Y. M. Li and J. T. Zhou, “Image Copy-Move Forgery Detection Using Hierarchical Feature Point Matching”, In Proceedings of APSIPA Annual Summit and Conference (ASC-2016), 2016.
  7. Z. H. Che, G. T. Zhai, and K. Gu, and Y. C. Zhu, and J. T. Zhou, “Perceptually meaningful quadtree decomposition using dual-homogeneous criteria”, In Proceedings of IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB-2016), 2016.
  8. X. K. Min, G. T. Zhai, K. Gu, Y. M. Fang, X. K. Yang, X. L. Wu, J. T. Zhou, and X. M. Liu, “Blind Quality Assessment of Compressed Images via Pseudo Structural Similarity”, In Proceedings of IEEE International Conference on Multimedia and Expo (ICME-16), 2016 (Best Student Paper).
  9. X.W. Zheng, Y. Y. Tang, J. T. Zhou, and P. Wang, “Maximal Level Estimation and Unbalance Reduction for Graph Signal Downsampling”, In Proceedings of IEEE International Conference on Pattern Recognition (ICPR-16), 2016.
  10. S. Y. Zhu, L. Y. Zeng, B. Zeng, and J. T. Zhou, “Constrained Quantization Based Transform Domain Down-Conversion for Image Compression”, In Proceedings of IEEE International Symposium on Circuits and Systems (ISCAS-16), 2016.
  11. M. Liu, K. Gu, G. T. Zhai, J. T. Zhou, W.S. Lin, “Quality Assessment of Contrast-Altered Images”, In Proceedings of IEEE International Symposium on Circuits and Systems (ISCAS-16), 2016.
  12. L. Dong and J. T. Zhou, “Estimating Noise Level for Natural Images Based on Scale-Invariant Kurtosis and Piecewise Stationarity”, In Proceedings of IEEE International Conference on Image Processing (ICIP-16), 2016.
  13. J. Duan, J. T. Zhou, and Y. M. Li, “Secure and Verifiable Outsourcing of Nonnegative Matrix Factorization (NMF)”, In Proceedings of ACM Workshop on Information Hiding and Multimedia Security (IH&MMSec-16), 2016.
  14. X. W. Zheng, Y. Y. Tang, and J. T. Zhou, “Improving Unbalanced Downsampling via Maximum Spanning Trees for Graph Signals”, In Proceedings of IEEE International Conference on Systems, Man, and Cybernetics (SMC-16), 2016.
  15. Y. S. Zhang, J. T. Zhou, Y. Zhang, F. Chen, and X.Y. Lei, "Support-Set-Assured Parallel Outsourcing of Sparse Reconstruction Service for Compressive Sensing in Multi-Clouds", In Proceedings of International Workshop on Social Computing and Security (SocialSec-15), 2015.
  16. Y. Y. Li, J. T. Zhou, and Y. M. Li, “Ciphertext-Only Attack on an Image Homomorphic Encryption Scheme with Small Ciphertext Expansion”, In Proceedings of ACM Multimedia (ACM MM-15), 2015. [codes]
  17. X. M. Liu, X. L. Wu, and J. T. Zhou, “Data-driven Sparsity-based Restoration of JPEG-compressed Images in Dual Transform-Pixel Domain”, In Proceedings of IEEE Conference on Computer Vision and Pattern Recognition (CVPR-15), 2015.
  18. A. Cheng, Y. M. Li, and J. T. Zhou, “SIFT Keypoint Removal via Convex Relaxation”, In Proceedings of IEEE International Conference on Multimedia and Expo (ICME-15), 2015 (top 15% paper).
  19. Y. Y. Li, J. T. Zhou, Y. M. Li, and O. C. Au, “Reducing the Ciphertext Expansion in Image Homomorphic Encryption via Linear Interpolation Technique”, In Proceedings of IEEE Global Conference on Signal and Information Processing (GlobalSIP-15), 2015.
  20. Z. P. Gao, G. T. Zhai, X. Gu, and J. T. Zhou, “Adapting Hierarchical ALS Algorithms for Temporal Psychovisual Modulation”, In Proceedings of IEEE International Symposium on Circuits and Systems (ISCAS-15), 2015.
  21. K. Gu, G. T. Zhai, S. Wang, M. Liu, J. T. Zhou, and W. S. Lin, “A general histogram modification framework for efficient contrast enhancement”, In Proceedings of IEEE International Symposium on Circuits and Systems (ISCAS-15), 2015.
  22. X. W. Zheng, Y. Y. Tang, J. T. Zhou, L. N. Yang, H. L. Yuan, Y. L. Wang, C. L. Li, “Redundant graph Fourier transform”, In Proceedings of IEEE International Conference on Cybernetics (CYBCONF-15), 2015.
  23. Z. P. Gao, G. T. Zhai, J. T. Zhou, X. K. Min, and C. J. Hu, “Information Security Display via Uncrowded Window”, In Proceedings of IEEE  Visual Communications and Image Processing (VCIP-14), 2014.  
  24. J. T. Zhou and O. C. Au, “Scalable coding of stream cipher encrypted images via adaptive sampling, ” In Proceedings of IEEE International Conference on Image Processing (ICIP-14), 2014.
  25. Y. M. Li and J. T. Zhou, “Sparsity-driven reconstruction of L -decoded images,” In Proceedings of IEEE International Conference on Image Processing (ICIP-14), 2014.
  26. L. Dong and J. T. Zhou, “Estimation of Capacity Parameters for Dynamic Histogram Shifting (DHS)-based Reversible Image Watermarking, ” In Proceedings of IEEE International Conference on Multimedia and Expo (ICME-14), 2014.
  27. W. Dai, O. C. Au, W. J. Zhu, P. F. Wan, W. Hu, and J. T. Zhou, “SSIM-based rate-distortion optimization in H.264,” In Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP-14), 2014.
  28. J. T. Zhou, X. M. Liu and O. C. Au, “On the Design of An Efficient Encryption-then-Compression System,” In  Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP-13), 2013.
  29. D. M. Zhai, X. M. Liu, J. T. Zhou, D.B. Zhao, and W. Gao, “Spatial Error Concealment via model based coupled sparse representation, ” In Proceedings of IEEE International Conference on Multimedia and Expo (ICME-13), 2013.
  30. J. T. Zhou and O. C. Au, “On the Determination of Capacity Parameters in PEE-based Reversible Image Watermarking,” In Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP-12), 2012
  31. J. T. Zhou and X. L. Wu, “Context Modeling and Correction of Quantization Errors in Prediction Loop,” In Proceedings of Data Compression Conference (DCC-12), 2012.
  32. J. T. Zhou and X. L. Wu, “L2 Restoration of L∞-decoded Images with Context Modeling,” In Proceedings of IEEE International Conference on Image Processing (ICIP-11), pp. 1989-1992, 2011.
  33. J. T. Zhou and O. C. Au, “Security Evaluation of a Perceptual Image Hashing Scheme Based on Virtual Watermark Detection,” In Proceedings of IEEE International Conference on Multimedia and Expo (ICME-11), pp. 1-6, July, 2011.
  34. X. L. Wu, J. T. Zhou, and Heng Wang, “High-fidelity Image Compression for High-throughput and Energy-efficient Cameras,” In Proceedings of Data Compression Conference (DCC-11), pp. 433–442, March 2011.
  35. J. T. Zhou and O. C. Au, “Cryptanalysis of Chaotic Convolutional Coder,” In Proceedings of IEEE International Symposium on Circuits and Systems (ISCAS-10), pp.145–148, May 2010.
  36. J. T. Zhou and O. C. Au, “Security and Efficiency Analysis of Progressive Audio Scrambling in Compressed Domain,” In Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP-10), pp. 1802–1805, March 2010.
  37. John S. Ho, Oscar C. Au, J. T. Zhou, and Yuanfang Guo, “Inter-channel Demo-saicking Traces for Digital Image Forensics,” In Proceedings of IEEE International Conference on Multimedia and Expo (ICME-10), pp. 1475–1480, July 2010.
  38. X. P. Fan, O. C. Au, and J. T. Zhou, “Backward error concealment of redundantly coded video,” In Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP-10), July 2010.
  39. J. T. Zhou and O. C. Au, “Secure Exp-Golomb Coding using Stream Cipher,” In Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP-09), pp. 1457–1460, April 2009.
  40. X. P. Fan, O. C. Au, M. Y. Ma, L. Hou, J. T. Zhou and N. M. Cheung, “Transcoding based Robust Streaming of Compressed Video,” In Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP-09), pp.909–912, April 2009.
  41. X. P. Fan, O. C. Au, M. Y. Ma, L. Hou, J. T. Zhou and N. M. Cheung, “On Improving the Robustness of Compressed Video by Slepian-Wolf based Lossless Transcoding,” In Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP-09), pp. 884–887, May 2009.
  42. L. Hou, O. C. Au, X. P. Fan and J. T. Zhou, “Maximum-likelihood versus maximum a posteriori based local illumination and color correction algorithm for multi-view video,” In Proceedings of IEEE Workshop on Multimedia Signal Processing (MMSP-09), 2009.
  43. J. T. Zhou and O. C. Au, “Joint Security and Performance Enhancement for Secure Arithmetic Coding,” In Proceedings of IEEE International Conference on Image Processing (ICIP-08), pp. 3120–3123, October 2008.
  44. J. T. Zhou and O. C. Au, “Secure Lempel-Ziv-Welch (LZW) Algorithm with Random Dictionary Insertion and Permutation,” In Proceedings of IEEE Inter-national Conference on Multimedia and Expo (ICME-08), pp. 245–248, June 2008.
  45. J. T. Zhou and O. C. Au, “Error Recovery of Variable Length Codes over BSC with Arbitrary Crossover Probability,” In Proceedings of IEEE International Symposium on Information Theory (ISIT-08), pp. 1188–1192, June 2008.
  46. Xiaopeng Fan, Oscar C. Au, J. T. Zhou, MengyaoMa and Liwei Guo, “Improved Reversible Wyner-Ziv Video Coding,” In Proceedings of IEEE International Conference on Multimedia and Expo (ICME-08), pp. 809–812, June 2008.
  47. Xiaopeng Fan, Oscar C. Au, Yan Chen, J. T. Zhou and Mengyao Ma, “Bidirectionally Decodable Wyner-Ziv Video Coding,” In Proceedings of IEEE International Symposium on Circuits and Systems (ISCAS-08), pp. 1404–1407, May 2008.
  48. J. T. Zhou and O. C. Au, “Cryptanalysis of Secure Arithmetic Coding,” In Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP-08), pp. 1769–1772, April 2008.
  49. J. T. Zhou and O. C. Au, “On a Conjecture on Error Recovery for Variable Length Codes,” In Proceedings of IEEE Information Theory Workshop (ITW-07), pp. 529–534, September 2007.
  50. J. T. Zhou, X. P. Fan, Z. Q. Liang and O. C. Au, “Exact Symbol Error Rate for Variable Length Codes over Binary Symmetric Channel,” In Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP-07), pp.641–644, April 2007.
  51. Z. Q. Liang, J. T. Zhou, Liwei Guo, Mengyao Ma and O. C. Au, “A Novel Multiple Description Approach to Predictive Video Coding,” In Proceedings of Pacific-Rim Conference on Multimedia (PCM-07), pp. 603–612, December 2007.
  52. Z. Q. Liang, J. T. Zhou, L. W. Guo, M. Y. Ma and O. C. Au, “Joint Decoding of Multiple Video Streams,” In Proceedings of IEEE International Conference on Multimedia and Expo (ICME-07), 2007.
  53. X. P. Fan, O. C. Au, Y. Chen, J. T. Zhou, and P. H. W. Wong, “Wyner-Ziv Successive Refinement of Video and Rate Distortion Analysis,” In Proceedings of IEEE International Conference on Multimedia and Expo (ICME-07), 2007.
  54. J. T. Zhou, Z. Q. Liang, Y. Chen and O. C. Au, “On the Security of Multimedia Encryption Schemes Based on Multiple Huffman Table (MHT),” In Proceedings of IEEE International Conference on Multimedia and Expo (ICME-06), pp. 2185–2188, July 2006.
  55. Y. Chen, O. C. Au, J. T. Zhou and C. W. Ho, “Adaptive Switching Between Directional Interpolation and Region Matching For Spatial Error Concealment Based on DCT Coefficients,” In Proceedings of IEEE International Conference on Multimedia and Expo (ICME-06), pp. 805–808, July 2006.
  56. X. P. Fan, O. C. Au, Y. Chen and J. T. Zhou, “Heegard-Berger Video Coding Using LMMSE Estimator,” Lecture Notes in Computer Science (LNCS), vol. 4261, no. 1, pp. 122–130, October 2006.
  57. Y. Chen, O. C. Au, C. W. Ho and J. T. Zhou, “Spatio-Temporal Boundary Matching Algorithm for Temporal Error Concealment,” In Proceedings of IEEE International Symposium on Circuits and Systems (ISCAS-06), pp. 686–689, May 2006.
  58. Y. Chen, O. C. Au, J. T. Zhou, H. M. Wong, and C. W. Ho “Priority-driven extended boundary matching algorithm for temporal error concealment,” In Proceedings of IEEE Picture Coding Symposium (PCS-06), 2006.
  59. Z. Q. Liang, J. T. Zhou, O. C. Au and L. W. Guo, “Content-adaptive Temporal Search Range Control Based on Frame Buffer Utilization,” In Proceedings of IEEE International Workshop on Multimedia Signal Processing (MMSP-06), pp. 399–402, October, 2006.
  60. J. T. Zhou, Q. Z. Xu, W. J. Pei, Z. Y. He and H. H. Szu, “A Novel Neural Cryptography Scheme Against Flipping Attack,” In Proceedings of the 14th National Conference on Neural Networks and Signal Processing (ICNNSP-04), pp. 1654–1657, 2004.
  61. F. Zhu and J. T. Zhou, “An Implementation of Access Control in Public Wireless Local Area Network,” In Proceedings of IEEE International Conference on Neural Networks and Signal Processing (ICNNSP-03), pp. 1654–1657, 2003.
  62. J. Y. Yuan, J. T. Zhou and W. J. Pei, “An Application of Network AddressTranslation on Gateway,” In Proceedings of IEEE International Conference on Neural Networks and Signal Processing (ICNNSP-03), pp. 1658–1661, 2003.

Patents
  1. J. T. Zhou, W. W. Sun, and L. Dong, “Method for reversible image data hiding”, US Patent, Granted, US9639912 B2, May 2017.
  2. Oscar C. Au and J. T. Zhou, “Efficient encoding processes and apparatus”, US Patent, Granted, No. 8,457,304 B2 , June 2013.
  3. Oscar C. Au and J. T. Zhou, “Method and System for Encoding Multimedia Content based on Secure Coding Schemes using Stream Cipher”, US Patent, Granted, No. 8,189,776, May 2012.
  4. Oscar C. Au and J. T. Zhou, “System and Method for Encoding Data based on a Compression Technique with Security Features”, US Patent, Granted, No. 7,868,788, Jan. 2011.
  5. 区子廉,周建涛,“基于具有安全特性的压缩技术来编码数据的系统和方法”,中国发明专利,授权号:ZL 200910203696.7,2013年7月。
  6. 周建涛,区子廉,“基于流密码的安全编码方案的多媒体内容编码方法和系统”,中国发明专利,授权号:ZL200910176001.0,2014年7月

Professional Affiliations
Contact Details

Faculty of Science and Technology
University of Macau, E11
Avenida da Universidade, Taipa,
Macau, China

Room: E11-4089
Telephone: (853) 8822-4495
Fax: (853) 8822-2426
Email: jtzhou