Jiantao ZHOU
周建濤 Associate Professor |

Academic Qualifications

- PhD in Electronic and Computer Engineering, Hong Kong University of Science and Technology, Hong Kong (2005-2009)
- Fulbright Junior Scholar in Electrical and Computer Engineering, University of Illinois at Urbana-Champaign, USA (2007-2008)
- Master in Radio Engineering, Southeast University, China (2002-2005)
- Bachelor in Electronics Engineering, Dalian University of Technology, China (1998-2002)

Working Experience

- Associate Professor, Department of Computer and Information Science, University of Macau, Macau (2017.8-)
- Assistant Professor, Department of Computer and Information Science, University of Macau, Macau (2012.10-2017.8)
- Post-Doc Fellow, Department of Electrical and Computer Engineering, McMaster University, Canada (2010.6-2011.8)
- Post-Doc Fellow, Department of Electronic and Computer Engineering, Hong Kong University of Science and Technology, Hong Kong (2009.7-2010.6, 2011.8-2012.8)

Award and Honor

- Co-author of Best Student Paper Award of IEEE International Conference on Multimedia and Expo (ICME), 2016
- 1000Plan Professorship for Young Talents (第五批中组部青年千人, 2013)
- HKTIIT Post-graduate Excellence Scholarship, 2008.
- Co-author of Best Paper Award of Pacific-Rim Conference on Multimedia, 2007
- Fulbright Hong Kong Junior Scholarship, 2007.
- Best Master Thesis Award of Jiangsu Province, 2006.

Teaching

B.Sc. Courses

- Programming Language (CISB354)
- Program Design for Engineers (EMEB111)
- Special Topics in Computer and Information Science (CISB459)

Research

Research Interests

- Multimedia security and forensics
- Multimedia coding and processing
- Multimedia communications

Funded Research Projects:

**Multi-Year Research Grant, University of Macau, PI,**“Privacy-preserving Image Services Outsourced to the Cloud”, MYRG2016-00137-FST, Jan. 2017– Dec. 2019. (Total:**675K MO****P**)**Macau Science and Technology Development Fund (FDCT), PI,**“Investigation of passive techniques for digital image Forgery detection”, FDCT/046/2014/A1, Jan. 2015-Jan. 2018. UM matching grant: MRG007/ZJT/2015/FST. (Total:**1.412M MOP**)**Multi-Year Research Grant, University of Macau, PI,**“Robustness Investigation of Multimedia Forensic Techniques”, MYRG2015-00056-FST, April. 2015 – March. 2018. (Total:**672K MOP**)**Natural Science Foundation of China, PI,**“加密域图像高性能压缩技术研究”, 61402547, Jan. 2015 - Dec. 2017. (Total:**260K RMB**)**Natural Science Foundation of China, Co-PI,**““不可分”二维变换的优化设计及其在视频编码和加密中的应用”, 61370148, Jan. 2014 - Dec. 2016. (Total:**790K RMB**)**Multi-Year Research Grant, University of Macau, PI,**“Investigation of Advanced Technologies for Multimedia Signal Processing over Encrypted Domain”, MYRG2014-00031-FST, April. 2014 – March. 2017. (Total:**500K MOP**)**Macau Science and Technology Development Fund (FDCT), PI,**“High-fidelity image and video compression technology for resource-constrained mobile devices”, FDCT/009/2013/A1, Oct. 2013-Oct. 2016. UM matching grant: MRG021/ZJT/2013/FST. (Total:**2.409M MOP**)**Start-up Research Grant, University of Macau, PI,**“Rate-Distortion Optimized Reversible Image Watermarking”, SRG023-FST13-ZJT, Jan. 2013 – Jan. 2014. (Total:**100K MOP**)

Selected Publications

Journal Papers

- Y. M. Li,
**J. T. Zhou**, and A. Cheng, “SIFT Keypoint Removal via Directed Graph Construction for Color Images”, To appear in, Nov. 2017.*IEEE Trans. on Inf. Forensics and Security (T-IFS)* - Y. S. Zhang,
**J. T. Zhou**, Y. Xiang, Y. Zhang, F. Chen, S. N. Pang, and X. F. Liao, “Computation Outsourcing Meets Lossy Channel: Secure Sparse Robustness Decoding Service in Multi-Clouds,” To appear in, 2017.*IEEE Trans. on Big Data (T-BD)* - Y. F. Zheng, H. L. Cui, C. Wang, and
**J. T. Zhou**, “Privacy-Preserving Image Denoising from External Cloud Databases”,, vol. 12, no. 6, pp. 1285-1298, 2017.*IEEE Trans. on Inf. Forensics and Security (T-IFS)* - L. Dong,
**J. T. Zhou**, and Y. Y. Tang, “Noise Level Estimation for Natural Images Based on Scale-Invariant Kurtosis and Piecewise Stationarity”,, vol. 26, no. 2, pp. 1017-1039, 2017.*IEEE Trans. on Image***Process.**(T-IP) - X. M. Liu, D. M. Zhai,
**J. T. Zhou**, S. Q. Wang, D. B. Zhao, and H.J. Gao, “Sparsity-based Image Error Concealment via Adaptive Dual Dictionary Learning and Regularization”,*IEEE*, vol. 26, no. 2, pp. 782-796, 2017.*Trans. on Image***Process.**(T-IP) - X. W. Zheng, Y. Y. Tang, J. J. Pan, and
**J. T. Zhou**, “Adaptive Multiscale Decomposition of Graph Signals”,, vol. 23, no. 10, pp. 1389-1393, 2016.*IEEE Signal Processing Letters (SPL)* - A. M. Zheng, Y. Yuan,
**J. T. Zhou**, Y. F. Guo, H. T. Yang, and O. C. Au, “Adaptive block coding order for Intra prediction in HEVC”,vol. 26, no. 11, pp. 2152-2158, 2016.*IEEE Trans. on Circuits and Syst. for Video Technology (T-CSVT)*, - Y. S. Zhang,
**J. T. Zhou**, F. Chen, Y. Zhang, D. Xiao, B. Chen, and X. Liao, “A Block compressible Sensing Based Scalable Encryption Framework for Protecting Significant Image Regions”,*Int. J. of Bifurcation and Chaos*(*IJBC*), vol. 26, no. 11, pp. 1650191, 2016. - Y. Zhang, K.W Wong, Y.S. Zhang, and
**J. T. Zhou**, "Bi-level protected compressive sampling,", vol. 18, no. 9, pp. 1720-1732, 2016.*IEEE Trans. on Multimedia (T-MM)* - J. H. Wang, L. J. Chen,
**J. T. Zhou**, W. K. Ng, R. Schober, and and C. M. Zhao, “Distributed User-Centric Scheduling for Visible Light Communication Networks”,*Optics Express*, vol. 24, no. 4, pp. 15570-15589, 2016. - Y.S. Zhang,
**J. T. Zhou**, F. Chen, Y. Zhang, K.W Wong, X. He, and D. Xiao, "Embedding Cryptographic Features in Compressive Sensing,"*Neurocomputing*, vol. 40, no. 12, pp. 472-480, 2016. - Y.S. Zhang, Y. Zhang,
**J. T. Zhou**, L.C. Liu, F. Chen, and X. He, "A Review of Compressive Sensing in Information Security Field",, vol. 4, pp. 2507–2519, 2016.*IEEE Access* - Y. M. Li,
**J. T. Zhou**, A. Cheng, X. M. Liu, and Y. Y. Tang, “SIFT Keypoint Removal and Injection via Convex Relaxation”,*IEEE Trans. on Inf. Forensics and Security (T-IFS)**,*vol. 11, no. 8, pp. 1722-1735, 2016. - X. M. Liu, D. M. Zhai,
**J. T. Zhou**, D. B. Zhao, and W. Gao, “Compressive Sampling based Image Coding for Resource-deficient Visual Communication”,vol. 25, no. 6, pp. 2844-2855, 2016.*IEEE Trans. on Image*,**Process.**(T-IP) **J. T. Zhou**, W. W. Sun, L. Dong, X. M. Liu, O. C. Au, and Y. Y. Tang, “Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulation”,vol. 26, no. 3, pp. 441-452, 2016. [codes]*IEEE Trans. on Circuits and Syst. for Video Technology (T-CSVT)*,- X. M. Liu, X. L. Wu,
**J. T. Zhou**, and D. B. Zhao, “Data-driven soft decoding of compressed images in dual transform-pixel domain”,vol. 25, no. 4, pp. 1649-1659, 2016.*IEEE Trans. on Image*(T-IP),*Processing*. - Z. P. Gao, G. T. Zhai, and
**J. T. Zhou**, “Factorization Algorithms for Temporal Psychovisual Modulation Display”,vol. 18, no. 4, pp. 614-626, 2016.*IEEE Trans. on Multimedia (T-MM),* - Y. F. Guo, O. C. Au,
**J. T. Zhou**, K. T. Tang and X. P. Fan, “Halftone image watermarking via optimization”,*Sig. Proc.: Image Comm*, vol. 41, pp. 85-100, 2016. - Y. S. Zhang, D. Xiao, K. W. Wong,
**J. T. Zhou**, S. Bai, and M.T. Su, “Perturbation meets key-based interval splitting arithmetic coding: security enhancement and chaos generalization”,*Security and Comm. Networks*,vol. 9, no. 1, pp.43-53, 2016. - Y. S. Zhang, K. W. Wong, Y. Zhang, W.Y. Wen,
**J. T. Zhou**, and X. He, “Robust coding of encrypted images via structural matrix”,*Sig. Proc.: Image Comm*, vol. 39, pp. 202-211, 2015. - Y. M. Li and
**J. T. Zhou**, “Anti-Forensics of Lossy Predictive Image Compression”,, vol. 22, no. 12, pp. 2219-2223, 2015.*IEEE Signal Processing Letters (SPL)* - X. M. Liu, X. W. Gao, D. B. Zhao,
**J. T. Zhou**, G. T. Zhai, and W. Gao, “Model-based low bit-rate video coding for resource-deficient wireless visual communication”,*Neurocomputing*, vol. 162, pp. 180-190, 2015. - J. H. Wang, Y. M. Huang,
**J. T. Zhou**, and L. Sun, “On imperfect pricing in globally constrained noncooperative games for cognitive radio networks”,*Signal Processing*, vol. 117, pp. 96-101, 2015. **J. T. Zhou**, O. C. Au, G. T. Zhai, Y. Y. Tang, and X. M. Liu, “Scalable Compression of Stream Cipher Encrypted Images through Context-Adaptive Sampling”,*IEEE Trans. on Inf. Forensics and Security (T-IFS)**,*vol. 9, no.11, pp. 1857-1868, 2014**J. T. Zhou**, X. M. Liu, O. C. Au, and Y. Y. Tang, “Designing an Efficient Image Encryption-then-Compression System via Prediction Error Clustering and Random Permutation”,*IEEE Trans. on Inf. Forensics and Security (T-IFS)**,*vol. 9, no. 2, pp. 39-50, 2014.**(***Top 10 most frequently downloaded articles in Feb. and March 2014***)**[codes]- X.M. Liu, D.B. Zhao,
**J. T. Zhou**, W. Gao and H.F. Sun, "Image Interpolation via Graph-based Bayesian Label Propagation,''*IEEE Trans. on Image Process.*Vol. 23, No. 3, pp. 1084-1096, March 2014.*(T-IP)*, **J. T. Zhou**and X. Wu, “L_{2}restoration of L_{∞}-decoded images via soft-decision estimation”,, vol. 21, no. 12, pp. 4797-4807, 2012.*IEEE Trans. on Image Processing (T-IP)***J. T. Zhou**and O. C. Au, “Determining the Capacity Parameters in PEE-based Reversible Watermarking,”, vol. 19, no. 5, pp. 287-290, 2012.*IEEE Signal Processing Letters (SPL)***J. T. Zhou**and O. C. Au, “On the Security of Chaotic Convolutional Coder”,, vol. 58, no.3, pp. 595-606, March 2011.*IEEE Trans. on Circuits and Systems-I (T-CASI)*- K. Wang, W. J. Pei,
**J. T. Zhou**, Y. F. Zhang, and S. Y. Zhou, “Security of chaos-based secure communications in a large community”,*Acta Phys. Sin.*, vol. 60, no. 7, 070503. **J. T. Zhou**and O. C. Au, “Error Recovery of Variable Length Codes over BSC with Arbitrary Crossover Probability”,, vol. 58, pp. 1654-1666, 2010.*IEEE Trans. on Comm.(T-COM)***J. T. Zhou**and O. C. Au, “Adaptive Chosen-ciphertext Attack on Secure Arithmetic Coding”,, vol. 57, pp. 1825-1838, May 2009.*IEEE Trans. on Signal Proc. (T-SP)***J. T. Zhou**and O. C. Au, “Comments on "A Novel Compression and Encryption Scheme Using Variable Model Arithmetic Coding and Coupled Chaotic System"”,, vol. 55, pp. 3368-3369, Nov. 2008.*IEEE Trans. on Circuits and Systems-I (T-CASI)***J. T. Zhou**and O. C. Au, “Security Analysis of Multimedia Encryption Schemes Based on Multiple Huffman Table”,, vol. 14, pp. 201-204, 2007.*IEEE Signal Proc. Letters (SPL)***J. T. Zhou**, W. J. Pei, K. Wang, J. Huang, and Z. Y. He, “Secure Communication Scheme Based on Asymptotic Model of Deterministic Randomness”,*Physics Letters A*, vol. 358, pp. 283-288, 2006.**J. T. Zhou,**Q. Z. Xu, W. J. Pei, Z. Y. He, and H. H. Szu, “Step to Improve Neural Cryptography against Flipping Attacks”,*Int. J. of Neural Systems*, vol. 14, no. 6, pp. 393-405, 2004.- X.P. Fan, O.C. Au, N.M. Cheung, Y. Chen and
**J. T. Zhou**, “Successive Refinement based Wyner-Ziv Video Compression”，*Signal Processing: Image Communications*, vol. 25, no. 1, pp. 47-63, January 2010. - X. P. Fan, O. C. Au, Y. Chen,
**J. T. Zhou**, and M. Y. Ma, “Wyner-Ziv Based bidirectional decodable video coding”,*Journal of Visual Communication and Image Representation*, vol. 20, no. 6, pp. 365–376, August 2009. - H. H. Szu, C. Hsu, M. K. Hsu and
**J. T. Zhou**, “Intelligent Network Computing Augmented by Chaotic Neural Networks, Blind Sources Separation, Digital Watermarks”,*International Journal of Information Acquisition*, vol. 1, no. 4, pp 295–320, April 2005.

Conference Papers

*Y. C. Chen, G. T. Zhai, and***J. T. Zhou**, “Global Quality of Assessment and Optimization for the Backward-compatible Stereoscopic Display System,” In Proceedings of*IEEE International Conference on Image Processing (ICIP-17)*, 2017.*L. Dong and***J. T. Zhou**, “Efficient Image Sensor Noise Estimation via Iterative Re-weighted Least Squares”, In*Proceedings of IEEE International Conference on Multimedia and Expo (ICME-17)*, 2017.*W. Sun, G. T. Zhai, X. K. Min, Y. T. Liu, S. W. Ma, J. Liu,*In**J. T. Zhou**, and X. M. Liu “Dynamic Backlight Scaling Considering Ambient Luminance for Mobile Energy Saving,”*Proceedings of IEEE International Conference on Multimedia and Expo (ICME-17)*, 2017.- W. W. Sun,
**J. T. Zhou**, R. Lyu, and S. Y. Zhu, “Processing-Aware Privacy-Preserving Photo Sharing over Online Social Networks”, In*Proceedings of ACM Multimedia (ACM MM-16), 2016.* *L. Dong and***J. T. Zhou**, “Noise-Robust SLIC Superpixel for Natural Images”, In*Proceedings of IEEE International Conference on Cloud Computing and Big Data (CCBD-2016), 2016.**Y. M. Li and***J. T. Zhou**, “Image Copy-Move Forgery Detection Using Hierarchical Feature Point Matching”, In*Proceedings of APSIPA Annual Summit and Conference (ASC-2016), 2016.**Z. H. Che, G. T. Zhai, and K. Gu, and Y. C. Zhu, and***J. T. Zhou**, “Perceptually meaningful quadtree decomposition using dual-homogeneous criteria”, In*Proceedings of IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB-2016), 2016.**X. K. Min, G. T. Zhai, K. Gu, Y. M. Fang, X. K. Yang, X. L. Wu,*In**J. T. Zhou**, and X. M. Liu, “Blind Quality Assessment of Compressed Images via Pseudo Structural Similarity”,*Proceedings of IEEE International Conference on Multimedia and Expo (ICME-16)*, 2016 (Best Student Paper).- X.W. Zheng, Y. Y. Tang,
, and P. Wang, “Maximal Level Estimation and Unbalance Reduction for Graph Signal Downsampling”, In**J. T. Zhou***Proceedings of IEEE International Conference on Pattern Recognition (ICPR-16), 2016.* - S. Y. Zhu, L. Y. Zeng, B. Zeng, and
**J. T. Zhou**, “Constrained Quantization Based Transform Domain Down-Conversion for Image Compression”, In*Proceedings of IEEE International Symposium on Circuits and Systems (ISCAS-16), 2016.* - M. Liu, K. Gu, G. T. Zhai,
**J. T. Zhou**, W.S. Lin, “Quality Assessment of Contrast-Altered Images”, In*Proceedings of IEEE International Symposium on Circuits and Systems (ISCAS-16), 2016.* - L. Dong and
**J. T. Zhou**, “Estimating Noise Level for Natural Images Based on Scale-Invariant Kurtosis and Piecewise Stationarity”, In*P**roceedings of IEEE International Conference on Image Processing (ICIP-16),**2016.* - J. Duan,
**J. T. Zhou**, and Y. M. Li, “Secure and Verifiable Outsourcing of Nonnegative Matrix Factorization (NMF)”, In*Proceedings of ACM Workshop on Information Hiding and Multimedia Security (IH&MMSec-16), 2016.* - X. W. Zheng, Y. Y. Tang, and
**J. T. Zhou**, “Improving Unbalanced Downsampling via Maximum Spanning Trees for Graph Signals”, In*P**roceedings**of IEEE International Conference**on Systems, Man, and Cybernetics (SMC-16)*, 2016. - Y. S. Zhang,
**J. T. Zhou**, Y. Zhang, F. Chen, and X.Y. Lei, "Support-Set-Assured Parallel Outsourcing of Sparse Reconstruction Service for Compressive Sensing in Multi-Clouds", In*Proceedings of**International Workshop on Social Computing and Security*(*SocialSec-15*), 2015. - Y. Y. Li,
**J. T. Zhou**, and Y. M. Li, “Ciphertext-Only Attack on an Image Homomorphic Encryption Scheme with Small Ciphertext Expansion”, In*Proceedings of ACM Multimedia (ACM MM-15), 2015. [codes]* - X. M. Liu, X. L. Wu, and
**J. T. Zhou**, “Data-driven Sparsity-based Restoration of JPEG-compressed Images in Dual Transform-Pixel Domain”, In*Proceedings of IEEE Conference on Computer Vision and Pattern Recognition (*CVPR-15), 2015. - A. Cheng, Y. M. Li, and
**J. T. Zhou**, “SIFT Keypoint Removal via Convex Relaxation”, In*Proceedings of IEEE International Conference on Multimedia and Expo (ICME-15)*, 2015 (top 15% paper). - Y. Y. Li,
**J. T. Zhou**, Y. M. Li, and O. C. Au, “Reducing the Ciphertext Expansion in Image Homomorphic Encryption via Linear Interpolation Technique”, In*Proceedings of IEEE Global Conference on Signal and Information Processing (GlobalSIP-15), 2015.* - Z. P. Gao, G. T. Zhai, X. Gu, and
**J. T. Zhou**, “Adapting Hierarchical ALS Algorithms for Temporal Psychovisual Modulation”, In*Proceedings of IEEE International Symposium on Circuits and Systems (ISCAS-15), 2015.* - K. Gu, G. T. Zhai, S. Wang, M. Liu,
**J. T. Zhou**, and W. S. Lin, “A general histogram modification framework for efficient contrast enhancement”, In*Proceedings of IEEE International Symposium on Circuits and Systems (ISCAS-15), 2015.* - X. W. Zheng, Y. Y. Tang,
**J. T. Zhou**, L. N. Yang, H. L. Yuan, Y. L. Wang, C. L. Li, “Redundant graph Fourier transform”, In*Proceedings of IEEE International Conference on Cybernetics (CYBCONF-15)*, 2015. - Z. P. Gao, G. T. Zhai,
**J. T. Zhou**, X. K. Min, and C. J. Hu, “Information Security Display via Uncrowded Window”, In*Proceedings of IEEE Visual Communications and Image Processing (VCIP-14), 2014.* **J. T. Zhou**and O. C. Au, “Scalable coding of stream cipher encrypted images via adaptive sampling, ” In*P**roceedings of IEEE International Conference on Image Processing (ICIP-14),**2014.*- Y. M. Li and
**J. T. Zhou**, “Sparsity-driven reconstruction of L_{∞}-decoded images,” In*P**roceedings of IEEE International Conference on Image Processing (ICIP-14),**2014.* - L. Dong and
**J. T. Zhou**, “Estimation of Capacity Parameters for Dynamic Histogram Shifting (DHS)-based Reversible Image Watermarking, ” In*Proceedings of IEEE International Conference on Multimedia and Expo (ICME-14)*, 2014. - W. Dai, O. C. Au, W. J. Zhu, P. F. Wan, W. Hu, and
**J. T. Zhou**, “SSIM-based rate-distortion optimization in H.264,” In*Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP-14)*, 2014. **J. T. Zhou,**X. M. Liu and O. C. Au, “On the Design of An Efficient Encryption-then-Compression System,” In*Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP-13)*, 2013.- D. M. Zhai, X. M. Liu,
**J. T. Zhou**, D.B. Zhao, and W. Gao, “Spatial Error Concealment via model based coupled sparse representation, ” In*Proceedings of IEEE International Conference on Multimedia and Expo (ICME-13)*, 2013. **J. T. Zhou**and O. C. Au, “On the Determination of Capacity Parameters in PEE-based Reversible Image Watermarking,” In*Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP-12)*, 2012**J. T. Zhou**and X. L. Wu, “Context Modeling and Correction of Quantization Errors in Prediction Loop,” In*Proceedings of Data Compression Conference (DCC-12)*, 2012.**J. T. Zhou**and X. L. Wu, “L2 Restoration of L∞-decoded Images with Context Modeling,” In*Proceedings of IEEE International Conference on Image Processing (ICIP-11)*, pp. 1989-1992, 2011.**J. T. Zhou**and O. C. Au, “Security Evaluation of a Perceptual Image Hashing Scheme Based on Virtual Watermark Detection,” In*Proceedings of IEEE International Conference on Multimedia and Expo (ICME-11)*, pp. 1-6, July, 2011.- X. L. Wu,
**J. T. Zhou**, and Heng Wang, “High-ﬁdelity Image Compression for High-throughput and Energy-eﬃcient Cameras,” In*Proceedings of Data Compression Conference (DCC-11)*, pp. 433–442, March 2011. **J. T. Zhou**and O. C. Au, “Cryptanalysis of Chaotic Convolutional Coder,” In*Proceedings of IEEE International Symposium on Circuits and Systems (ISCAS-10)*, pp.145–148, May 2010.**J. T. Zhou**and O. C. Au, “Security and Eﬃciency Analysis of Progressive Audio Scrambling in Compressed Domain,” In*Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP-10),*pp. 1802–1805, March 2010.- John S. Ho, Oscar C. Au,
**J. T. Zhou**, and Yuanfang Guo, “Inter-channel Demo-saicking Traces for Digital Image Forensics,” In*Proceedings of IEEE International Conference on Multimedia and Expo (ICME-10)*, pp. 1475–1480, July 2010. - X. P. Fan, O. C. Au, and
**J. T. Zhou**, “Backward error concealment of redundantly coded video,” In*Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP-10)*, July 2010. **J. T. Zhou**and O. C. Au, “Secure Exp-Golomb Coding using Stream Cipher,” In*Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP-09)*, pp. 1457–1460, April 2009.- X. P. Fan, O. C. Au, M. Y. Ma, L. Hou,
**J. T. Zhou**and N. M. Cheung, “Transcoding based Robust Streaming of Compressed Video,” In*Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP-09)*, pp.909–912, April 2009. - X. P. Fan, O. C. Au, M. Y. Ma, L. Hou,
**J. T. Zhou**and N. M. Cheung, “On Improving the Robustness of Compressed Video by Slepian-Wolf based Lossless Transcoding,” In*Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP-09)*, pp. 884–887, May 2009. - L. Hou, O. C. Au, X. P. Fan and
**J. T. Zhou**, “Maximum-likelihood versus maximum a posteriori based local illumination and color correction algorithm for multi-view video,” In*Proceedings of IEEE Workshop on Multimedia Signal Processing (MMSP-09)*, 2009. **J. T. Zhou**and O. C. Au, “Joint Security and Performance Enhancement for Secure Arithmetic Coding,” In*Proceedings of IEEE International Conference on Image Processing (ICIP-08)*, pp. 3120–3123, October 2008.**J. T. Zhou**and O. C. Au, “Secure Lempel-Ziv-Welch (LZW) Algorithm with Random Dictionary Insertion and Permutation,” In*Proceedings of IEEE Inter-national Conference on Multimedia and Expo (ICME-08)*, pp. 245–248, June 2008.**J. T. Zhou**and O. C. Au, “Error Recovery of Variable Length Codes over BSC with Arbitrary Crossover Probability,” In*Proceedings of IEEE International Symposium on Information Theory (ISIT-08)*, pp. 1188–1192, June 2008.- Xiaopeng Fan, Oscar C. Au,
**J. T. Zhou**, MengyaoMa and Liwei Guo, “Improved Reversible Wyner-Ziv Video Coding,” In*Proceedings of IEEE International Conference on Multimedia and Expo (ICME-08)*, pp. 809–812, June 2008. - Xiaopeng Fan, Oscar C. Au, Yan Chen,
**J. T. Zhou**and Mengyao Ma, “Bidirectionally Decodable Wyner-Ziv Video Coding,” In*Proceedings of IEEE International Symposium on Circuits and Systems (ISCAS-08)*, pp. 1404–1407, May 2008. **J. T. Zhou**and O. C. Au, “Cryptanalysis of Secure Arithmetic Coding,” In*Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP-08)*, pp. 1769–1772, April 2008.**J. T. Zhou**and O. C. Au, “On a Conjecture on Error Recovery for Variable Length Codes,” In*Proceedings of IEEE Information Theory Workshop (ITW-07)*, pp. 529–534, September 2007.**J. T. Zhou**, X. P. Fan, Z. Q. Liang and O. C. Au, “Exact Symbol Error Rate for Variable Length Codes over Binary Symmetric Channel,” In*Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP-07)*, pp.641–644, April 2007.- Z. Q. Liang,
**J. T. Zhou**, Liwei Guo, Mengyao Ma and O. C. Au, “A Novel Multiple Description Approach to Predictive Video Coding,” In*Proceedings of Pacific-Rim Conference on Multimedia (PCM-07)*, pp. 603–612, December 2007. - Z. Q. Liang,
**J. T. Zhou**, L. W. Guo, M. Y. Ma and O. C. Au, “Joint Decoding of Multiple Video Streams,” In*Proceedings of IEEE International Conference on Multimedia and Expo (ICME-07)*, 2007. - X. P. Fan, O. C. Au, Y. Chen,
**J. T. Zhou**, and P. H. W. Wong, “Wyner-Ziv Successive Refinement of Video and Rate Distortion Analysis,” In*Proceedings of IEEE International Conference on Multimedia and Expo (ICME-07)*, 2007. **J. T. Zhou**, Z. Q. Liang, Y. Chen and O. C. Au, “On the Security of Multimedia Encryption Schemes Based on Multiple Huﬀman Table (MHT),” In*Proceedings of IEEE International Conference on Multimedia and Expo (ICME-06)*, pp. 2185–2188, July 2006.- Y. Chen, O. C. Au,
**J. T. Zhou**and C. W. Ho, “Adaptive Switching Between Directional Interpolation and Region Matching For Spatial Error Concealment Based on DCT Coeﬃcients,” In*Proceedings of IEEE International Conference on Multimedia and Expo (ICME-06)*, pp. 805–808, July 2006. - X. P. Fan, O. C. Au, Y. Chen and
**J. T. Zhou**, “Heegard-Berger Video Coding Using LMMSE Estimator,”*Lecture Notes in Computer Science (LNCS)*, vol. 4261, no. 1, pp. 122–130, October 2006. - Y. Chen, O. C. Au, C. W. Ho and
**J. T. Zhou**, “Spatio-Temporal Boundary Matching Algorithm for Temporal Error Concealment,” In*Proceedings of IEEE International Symposium on Circuits and Systems (ISCAS-06)*, pp. 686–689, May 2006. - Y. Chen, O. C. Au,
**J. T. Zhou**, H. M. Wong, and C. W. Ho “Priority-driven extended boundary matching algorithm for temporal error concealment,” In*Proceedings of IEEE Picture Coding Symposium (PCS-06),*2006. - Z. Q. Liang,
**J. T. Zhou**, O. C. Au and L. W. Guo, “Content-adaptive Temporal Search Range Control Based on Frame Buﬀer Utilization,” In*Proceedings of IEEE International Workshop on Multimedia Signal Processing (MMSP-06)*, pp. 399–402, October, 2006. **J. T. Zhou**, Q. Z. Xu, W. J. Pei, Z. Y. He and H. H. Szu, “A Novel Neural Cryptography Scheme Against Flipping Attack,” In*Proceedings of the 14th National Conference on Neural Networks and Signal Processing (ICNNSP-04)*, pp. 1654–1657, 2004.- F. Zhu and
**J. T. Zhou**, “An Implementation of Access Control in Public Wireless Local Area Network,” In*Proceedings of IEEE International Conference on Neural Networks and Signal Processing (ICNNSP-03)*, pp. 1654–1657, 2003. - J. Y. Yuan,
**J. T. Zhou**and W. J. Pei, “An Application of Network AddressTranslation on Gateway,” In*Proceedings of IEEE International Conference on Neural Networks and Signal Processing (ICNNSP-03)*, pp. 1658–1661, 2003.

Patents

**J. T. Zhou**, W. W. Sun, and L. Dong, “Method for reversible image data hiding”, US Patent,**Granted**, US9639912 B2, May 2017.- Oscar C. Au and
**J. T. Zhou**, “Efficient encoding processes and apparatus”, US Patent,**Granted**, No. 8,457,304 B2 , June 2013. - Oscar C. Au and
**J. T. Zhou**, “Method and System for Encoding Multimedia Content based on Secure Coding Schemes using Stream Cipher”, US Patent,**Granted**, No. 8,189,776, May 2012. - Oscar C. Au and
**J. T. Zhou**, “System and Method for Encoding Data based on a Compression Technique with Security Features”, US Patent,**Granted**, No. 7,868,788, Jan. 2011. - 区子廉，
**周建涛**，“基于具有安全特性的压缩技术来编码数据的系统和方法”，中国发明专利，授权号：ZL 200910203696.7，2013年7月。 **周建涛**，区子廉，“基于流密码的安全编码方案的多媒体内容编码方法和系统”，中国发明专利，授权号：ZL200910176001.0，2014年7月

Professional Affiliations

- Member of IEEE

Contact Details

Faculty of Science and Technology

University of Macau, E11

Avenida da Universidade, Taipa,

Macau, China

Room: E11-4089

Telephone: (853) 8822-4495

Fax: (853) 8822-2426

Email: jtzhou