Journal Articles

1.                  F. Liu, L.M. Cheng, “Wave atom-based Perecptual Image Hashing Against Content-Preserving and Content Altering Attacks”, Transactions on Data Hiding and Multimedia Security, pp. 21-37, 2015, DOI:10.1007/978-3-662-46739-8_2

2.                  H.Y. Leung, L.M. Cheng, F Liu, Q.K. Fu  Adaptive Reversible Data Hiding based on Block Median Preservation and Modification of Prediction ErrorsJournal of Systems and Software, Vol. 86, Iss. 8, Aug 2013, pp 2204-2219. DOI: 10.1016/j.jss.2013.04.020. [COMPUTER SCIENCE, THEORY & METHODS 30/100 , IF= 1.135, Q2]

3.                  H.Y. Leung, L.M. Cheng and F Liu, “Robust Digital Image Watermarking Scheme using Wave Atoms with Multiple Description Coding” EURASIP Journal on Advances in Signal Processing, 2012, 2012:245, DOI: 10.1186/1687-6180-2012-245. [ENGINEERING, ELECTRICAL & ELECTRONIC ranking 132/245, IF=0.885, Q3]

4.                  F. Liu, L.M. Cheng, H.Y. Leung, Q.K. Fu, “Wave Atom Transform Generated Strong Image Hashing Scheme”, Optics Commuincations, Vol. 285, Issue 24, pp. 5008-5018, Nov. 2012. [OPTICS ranking 35/77, IF = 1.486, Q2]

5.                  F. Liu, Q.K. Fu,, L.M. Cheng  “Wave Atoms Based Multipurpose Scheme via Perceptual Image  Hashing and Watermarking”, Applied Optics, Vol. 51, Issue 27, pp. 6561-6570 (2012) [OPTICS ranking 25/77, IF = 1.748, Q2]

6.                  H. Y. Leung, L. M. Cheng, X.Y. Li “A FPGA implementation of facial feature extraction”, Journal of Real-Time Image Processing, 2012, doi: 10.1007/s11554-012-0263-8 [IMAGING SCIENCE & PHOTOGRAPHIC TECHNOLOGY ranking 9/21, IF = 1.02, Q2]

7.                  F. Liu, H.Y. Leung, L.M. Cheng, L M and X. Ji , "Content-based image hashing using wave atoms", Chinese Physics B, 21(4), 2012, p 040204, doi: 10.1088/1674-1056/21/4/040204. [PHYSICS, MULTIDISCIPLINARY  ranking 29/84, IF=1.376, Q2]

8.                  H. Y. Leung and L. M. Cheng, “Robust Watermarking Scheme Using Wave Atoms,” EURASIP Journal on Advances in Signal Processing, vol. 2011, Article ID 184817, 9 pages, 2011. doi:10.1155/2011/184817 [ENGINEERING, ELECTRICAL & ELECTRONIC ranking 132/245, IF=0.885, Q3]

9.                  HY Leung, LM Cheng, LL Cheng, "Robust Watermarking Schemes  using Selective Curvelet Coefficients based on HVS Model", International Journal of Wavelets Multiresolution and Information Processing, Vol. 8, No. 6 (2010) 941–959, Nov. 2010. [MATHEMATICS, INTERDISCIPLINARY APPLICATIONS ranking 34/80, IF=1.168, Q2]

10.              H.Y. Leung, L.M. Cheng and L.L. Cheng, “A Non-Blind Curvelet Based Watermarking Algorithm”, Current Development in Theory and Application of Wavelets, Vol. 4, Issue 2, p. 89-108, Aug 2010.

11.              Hongya Zhao, KL Chan, LM Cheng, Hong Yan, "A Probabilistic Relaxation Labeling Framework for Reducing the Noise Effect in Geometric Biclustering of Gene Expression Data", Pattern Recognition, Vol. 42, Issue 11, pp 2578-2588, Nov. 2009. [COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE, ranking 21/102 Q1, IF=2.554]

12.              L.M. Cheng, L.L. Cheng, YK Liu,  Fault-Tolerant Protocol for Load Balancing System“, Journal of Harbin Institute of Technology, Vol 41, Sup. 1, pp 22-26, Jul 2009

13.              L.M. Cheng, L.L. Cheng, YK Liu, “A Practical Off the Shelf Fault Tolerant System”, Journal of Harbin Institute of Technology, Vol 41, Sup. 1, pp. 76-79, Jul 2009.

14.              HY Leung, LM Cheng, LL Cheng, "A Robust Watermarking Scheme  using Selective Curvelet Coefficients", International Journal of Wavelets, Multiresolution and Information Processing, Vol 7, Issue 2, pp 163-181, March 2009. [MATHEMATICS, INTERDISCIPLINARY APPLICATIONS ranking 34/80, IF=1.168, Q2]

15.              C Zhang, LL Cheng, Z Qiu, LM Cheng,  Multipurpose Watermarking based on Multiscale Curvelet Transform”, IEEE Transactions on Information Forensics and Security, Vol 3, Issue 4, pp 611-619, November  2008. [COMPUTER SCIENCE, THEORY & METHODS, ranking 19/99, IF=1.34, Q1]

16.              A Razaq, W.T. Luk, K.M. Shum, L.M. Cheng, K.N. Yung, Air Interface Protocols Second Generation RFID, IEEE Security & Privacy, Vol 6, Iss 4, pp. 21-27, Jul/Aug 2008. [COMPUTER SCIENCE, SOFTWARE ENGINEERING, ranking 47/93, IF=1.172, Q3]

17.              H. Zhao, KL Chan, LM Cheng, H Yan, “Multivariate hierarchical Bayesian model for differential gene expression analysis in microarray experiments”, BMC Bioinformatics, 9, Suppl 1, art. no. S9, Feb 2008. [MATHEMATICAL & COMPUTATIONAL BIOLOGY, ranking 4/29, Q1, BIOTECHNOLOGY & APPLIED MICROBIOLOGY, 28/138, IF=3.428,  Q1]

18.              K.W. Wong, Edward C.W. Lee, L.M. Cheng, and Xiaofeng Liao ,“Fast Elliptic Scalar Multiplication Using New Double-base Chain and Point Halving,  Applied Mathematics And Computation, vol. 183, no. 2, pp. 1000-1007, 15 December 2006. [MATHEMATICS, APPLIED, ranking 61/202, IP=1.124, Q2]

19.              KC Leung, SL Li, LM Cheng, CK Chan, "A Symmetric Probabilistic Encryption Scheme Based On CHNN Without Data Expansion", Neural Processing Letters, pp 93-105, Volume 24, Number 2, October, 2006 [COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE, ranking 70/102, IP=1.079, Q3]

20.              SL Li, KC Leung, LM Cheng, CK Chan, “A novel Image Hiding Scheme Based on Block Difference”, Pattern Recognition, Volume 39, Issue 6 , June 2006, p.p. 1168-1176. [COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE, ranking 21/102 Q1]

21.              Y. K. Liu, L. M. Cheng and L.L. Cheng,  "Load Distributing Algorithm using Fuzzy Neural Network", WSEAS Transactions on Communications, vol. 5, no. 3, March 2006, p.p. 527-234.

22.              C.K. Chan, L.M. Cheng, “Hiding Data in Images by Simple LSB Substitution”, Pattern Recognition 37 (2004) pp. 469-474. [COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE, ranking 21/102 Q1]

23.              KC Leung, LM Cheng, SS Fong, CK Chan, "Cryptanalysis of a Modified Remote User Authentication Scheme Using Smart Cards", IEEE Trans. On Consumer Electronics, pp. 1243-1245, Nov 2003. [TELECOMMUNICATIONS, 34/76 Q2]

24.              K.S.Ng, L.M. Cheng, “Image compression system using data reordering technique” Electronics Letters, Vol. 39, Iss 14,  pp 1046-1047, July 2003. [ENGINEERING, ELECTRICAL & ELECTRONIC 124/245, Q3]

25.              J.Y. Chen, K.W. Wong, L.M. Cheng, J.W. Shuai “A Secure Communication Scheme Based on the Phase Synchronization of Chaotic Systems”, CHAOS 13 (2), pp508-514 Jun 2003. [MATHEMATICS, APPLIED, 20/202, Q1]

26.              L.M. Cheng, L.L. Cheng, Wei Sun, “On Commutativity of Duality Operator and Propagation Operator of Linear Codes Generated From Algebraic Curves”, IEEE Trans. on Information Theory, Vol 49, No. 1, pp. 258-261, Jan 2003. [ COMPUTER SCIENCE, INFORMATION SYSTEMS 17/116, Q1]

27.              Chi- Kwong Chan and L.M. Cheng, “Correlation properties of an improved summation generator with 2-bit memory”, Signal processing Vol 82, pp 907-909, June 2002. [ENGINEERING, ELECTRICAL & ELECTRONIC 107/247, Q2]

28.              Chi-Kwong Chan and L.M. Cheng, “Cryptanalysis of a Timestamp-Based Password Authentication Scheme” Computers & Security, Vol 21, No. 1, pp 74-76, Feb.  2002. [COMPUTER SCIENCE, INFORMATION SYSTEMS, 48/116, Q2]

29.              Chi-Kwong Chan and L.M. Cheng, “Security of Lin’s Image Watermarking System”, Journal of Systems and Software  2002, Vol 62, pp 211-21, June 2002. [COMPUTER SCIENCE, SOFTWARE ENGINEERING, 38/93, Q2]

30.              Chi-Kwong Chan and L.M. Cheng, “Improved hiding data in images by optimal moderately-significant replacement”, Electronics Letters, Vol 37, No. 16, pp. 1017-1018, Aug 2001. [ENGINEERING, ELECTRICAL & ELECTRONIC 124/245, Q3]

31.              Chi-Kwong Chan and L.M. Cheng, "The convergence properties of a clipped Hopfield network and its application in the design of keystream generator", IEEE Transactions on Neural Networks, Vol. 12, No. 2, pp. 340-348, March 2001. [COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE 16/105, Q1]

32.              Chi- Kwong Chan and L.M. Cheng, “Remarks on Wang-Chang's Password Authentication Scheme”, Electronics Letters, Vol. 37 No. 1, pp22-23, 2001. [ENGINEERING, ELECTRICAL & ELECTRONIC 124/245, Q3]

33.              Chi- Kwong Chan and L.M. Cheng, “Cryptanalysis of a Remote Password Authentication Scheme”, International Journal of Computer Mathematics, vol. 78(3), pp 323-326, 2001. [MATHEMATICS, APPLIED 168/202, Q4]

34.              Chi-Kwong Chan and L.M. Cheng, "Cryptanalysis of a remote user authentication scheme using smart cards", IEEE Transactions on Consumer Electronics, Vol. 46, No. 4, pp. 992-993, November 2000. [TELECOMMUNICATIONS, 34/76 Q2]

35.              Chi- Kwong Chan and L.M. Cheng, "An attack on the Hwang-Chang-Hwang Watermarking Scheme", IEEE Trans. On Consumer Electronics, Vol 46, No. 1, Feb 2000, pp 40-43. [TELECOMMUNICATIONS, 34/76 Q2]

36.              K.S. Ng, L.M. Cheng, L.L. Cheng, M.K. Wong, " Adaptive Watermarking by Using Pixel Position Shift Technique", IEEE Trans. On Consumer Electronics, Vol 45, No. 4, Nov 1999, pp 1057-1064. [TELECOMMUNICATIONS, 34/76 Q2]

37.              K.S. Ng, L.M. Cheng, "Data re-ordering technique for lossless LZW continuous-tone image compression ", Electronics Letters, Vol. 35, No. 20, pp 1716-1717, Oct 1999. [ENGINEERING, ELECTRICAL & ELECTRONIC 124/245, Q3]

38.              F. Luo, M. Cao, KW Wong, LM Cheng. "Optoelectronic Recirculating Implementation of Crossover Interconnection Network Based on CMOS/SEED Smart Pixel Technology", Optics Communications, vol 168 , Sep. 1999, pp 65-73.

39.              K.S. Ng, L.M. Cheng, "Lossless Image Compression by using Gradient Adjusted Prediction and Burrows-Wheeler Transformation", IEEE Trans. On Consumer Electronics, vol 45, No. 2, May 1999, pp.380-386. [TELECOMMUNICATIONS, 34/76 Q2]

40.              K.S. Ng. L.M. Cheng, "Sub-block Interchange for Lossless Image Compression", IEEE Trans. On Consumer Electronics, Vol 45, No. 1, Feb 1999, pp 236-242. [TELECOMMUNICATIONS, 34/76 Q2]

41.              D. Guo, L. M. Cheng, L. L. Cheng,"A New Symmetric Probabilistic Encryption Scheme Based on Chaotic Attractors of Neural networks", Applied Intelligence, Volume 10, No. 1, Jan 1999, pp. 71-84. [COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE 71/102, Q3]

42.              F. Luo, K.W. Wong, L.M. Cheng, "Recirculating implementation of the optical segmental Banyan network", Optics Communications 152, pp. 403-411, 1998. [Optics 25/70, Q2]

43.              Chi- Kwong Chan and L.M. Cheng, "Design of keystream generator," Electronics Letters, vol. 34, no. 12, pp. 1206-1207, June, 1998. [ENGINEERING, ELECTRICAL & ELECTRONIC 124/245, Q3]

44.              Chi- Kwong Chan and L.M. Cheng, "Configurable Nonlinear Filter Generator", Electronics Letters,  Vol 34, No. 4, pp. 349, 1998. [ENGINEERING, ELECTRICAL & ELECTRONIC 124/245, Q3]

45.              K.K. Wong, T.H. Lee, K.S. Ng, C.H. Tse, L.M. Cheng, "Adaptive Watermark Image", IEEE Trans. On Consumer Electronics, Vol. 43, pp 1003-1009, Nov., 1997.  [TELECOMMUNICATIONS, 34/76 Q2]

46.              J.W. Shuai, K.W. Wong, L.M. Cheng, "Synchronization of Spatiotemporal Chaos with positive Conditional Lyapunov Exponents", Physical Review E, Vol. 56, pp 2272-2275, Aug 1997 [PHYSICS, MATHEMATICAL 5/47, Q1]

47.              D. Guo, Z. Chen, R. Liu, B. Wu, L.M. Cheng, L.L. Cheng, "Critical Capacity of Hopfield Neural Network with Optimal Storage", Chinese Journal of Computer, Vol 20., No.1 , 1997, pp77-81.

48.              K.W. Wong, L.M. Cheng, "Optical Omega Network :A Compact Implementation Technique ", Applied Optics., Vol. 34, No. 29, pp 6648-6651, Oct 1995. [Optics 24/70, Q2]

49.              K.W. Wong, L.M. Cheng, "Optical modified signed digit addition based on binary logical operations", in Optics & Laser Technology, Vol. 26, No 4, 1994, pp 213 - 217. [Optics 34/70, Q2]

50.              K.W Wong, L.M. Cheng, "Space Variant Optical Logic Operations based on Operation-dependent Encoding Method", Applied Optics, Vol 33, No 11, April 1994, pp 2134-39 [Optics 24/70, Q2]

51.              C.M Choy, L.M. Cheng, "High Efficiency Cosine Approximated Binary Gabor Zone Plate", Applied Optics, Vol 33, No 5, Feb 1994, pp 794-799. [Optics 24/70, Q2]

52.              K.W. Wong, W.C. Yip, L.M. Cheng, "Recording Complex Hologram on Photores ist by Using Ion Implantation Method", Applied Optics, Vol 32, No 26, pp 4955-4959, Sep 1993 [Optics 24/70, Q2]

53.              K.W Wong, M.C Poon, L.M. Cheng, "Design of Digital Optical Processors Using both Intensity and Polarization Schemes", Applied Optics, Vol 31, No 17, pp 3225-3232, June 1992. [Optics 24/70, Q2]

54.              K.W.Wong, L.M. Cheng, "Optical Cosine Transform Using Microlens Array and Phase Conjugate Mirror", Japanese Journal of Applied Physics, Vol 31, May 1992, No. 5B, pp 1672-1676 [PHYSICS, APPLIED 57/105, Q3]

55.              K.W. Wong and L.M. Cheng, "A New Theta Modulation Multiplexing Scheme for CGH", Optics and Laser Technology, Vol. 24, No. 2, pp 89-92, April 1992. [Optics 34/70, Q2]

56.              L.M. Cheng, A.S.Ho, R.E. Burge, "An adaptive asteroid zonal filter for digital image compression", Computer graphic, vision and image processing,34, pp 292-301, 1986.

57.              A.T.S.Ho, L.M. Cheng, R.E. Burge, "An adaptive asteroid zonal filter for digital image processing", Acta Polytechnica Scandinavia – Applied P hy sics Series, Vol. 149, pp86-90, June 1985.

58.              L.M. Cheng and R.E. Burge "Weak phase, weak amplitude object determination in STEM using quadrant detectors: results of computer simulation", Optik, 68, no 3, pp 229-246, 1984. [Optics 61/70, Q4]

59.              L.M. Cheng and A. Michette, "Three dimensional imaging in scanning soft x-ray microcopy", Journal De Physique (Paris) 1984, No. 45 (NC2),  pp 97-100, 1984.

60.              L M Cheng, A.T.S.Ho, R.E. Burge, "The use of a priori knowledge in image reconstruction", J Opt Soc Am., pp 386-391, April 1984. [Optics 19/70, Q2]

 

Conference Proceedings

1.                  J.Wang, L.M. Cheng, “A Dynamic Scalable Cryptosystem Based-on Reduced Key Size ECC”, 10th International Conference of Digital Telecommunications, Barcelona, Spain, pp 17-11, April 2015, ISSN:2308-3964.

2.                  F. Liu, H. Wang,  L.M. Cheng; A.T.S. Ho, Shujun Li , "Enhanced Perceptual Image Authentication with Tamper Localization and Self-restorations", IEEE International Conference on Multimedia & Expo 2014, 14 Jul 2014 - 18 Jul 2014, Chengdu, China

3.                  F. Liu, L.M. Cheng, “Perceptual; Image Hiding via Wave Atom Transform”, 10th International Workshop on Digital Forensics and Watermarking, Oct 23-26 2011, New Jersey, USA, pp 468-478, 2011 [Best Student Paper Award]

4.                  Q.K. Fu, L.M. Cheng, F. Liu, “Terahertz Time domain Spectroscopy Analysis with Wave Atoms Transform”, Asia Pacific Signal and Information Processing Association Annual Summit and Conference 2011, Oct 18-21 2011, Xian China, pp. 1101-1106.

5.                  F. Liu, L.M. Cheng, “A Novel Image Hashing Scheme based on Wave Atoms”, Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Oct 14-16, Dalian, China, pp 125-128, 2011.

6.                  HY Leung, LM Cheng, "Robust Blind Watermarking Scheme using Wave Atoms," IWDW 2010, Seoul, Korea, Oct 2010.

7.                  LM Cheng, LL Cheng, “A Forensic Chip for Secure Digital Video Recording”, ISCAS 2010, Paris, pp 3068-3071, May 2010.

8.                  HY Leung, LM Cheng, LL Cheng, “Digital Watermarking Schemes using Multi-resolution Curvelet and HVS Model”, 8th International Workshop on Digital Watermarking, Guildford, UK, Aug 2009, LNCS5703 (Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 4-13 .

9.                  H. Zhao, K.L. Chan, L.M. Cheng, H. Yan, “Mining functional biclusters of DNA microarray gene expression data”, Systems, Man and Cybernetics, 2008. SMC 2008. IEEE International Conference on, pp 1737-1742, 12/10/2008 - 15/10/2008, Singapore

10.              Yi Xiao, LM Cheng, LL Cheng, “A Watermarking energy estimating model in wavelet domain”, 2nd International Conference on Anti-counterfeiting, Security and Identification, ASID 2008, Guiyang, China,pp 1-4.

11.              C Zhang, Z Qiu, L L Cheng, , L M Cheng”, Analysis Based on Generalized Vector Quantization for Information Hiding” ”IIHMSP2008, Harbin, China, Aug 2008, pp 1316-1320.

12.              H.Y. Leung, L.M. Cheng, L.L. Cheng, “A Robust Watermarking Scheme using Selective Curvelet Coefficients”, IIHMSP2008, Harbin, China, Aug 2008, pp 465-468.

13.              Yi Xiao, LM Cheng, LL Cheng, “A Robust Image Watermarking Scheme Based on A Novel HVS Model in Curvelet Domain” IIHMSP2008, Harbin, China, Aug 2008, pp 343-346.

14.              C Zhang, LL Cheng, Z Qiu, LM Cheng,  Multipurpose Watermarking based on  Curvelet Transform”, ISCAS, Washington, USA, May 2008, pp 2957-2960

15.              H.Y. Leung, L.M. Cheng, L.L. Cheng, and C.K. Chan, “Hardware Realization of Steganographic Techniques”, The Third International Conference on

Intelligent Information Hiding and Multimedia Signal Processing, November 26-28, 2007, Kaohsiung City, Taiwan

16.              Y.K. Sek, L.M. Cheng, L.L. Cheng, and C.K. Chan, “A Novel Lossy Image Hiding Scheme Based on Block Difference”, The Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing, November 26-28, 2007, Kaohsiung City, Taiwan

17.              H. Zhao, K.L. Chan, L.M. Cheng, H. Yan, “Multivariate hierarchical Bayesian model for differential gene expression analysis in microarray experiments”, 6th International Conference on Bioinformatics (InCoB2007),  p S9, 27/8/2007 - 30/8/2007, Hong Kong.

18.              A. Razaq.; W.T. Luk; L.M.Cheng, ”Privacy and Security Problems in RFID” , 2007 IEEE International Workshop on Anti-counterfeiting, Security, Identification, 16-18 April 2007, pp.:402 - 405

19.              Suk-Ling Li , Kai-Chi Leung, L.M. Cheng, and Chi-Kwong Chan, Data Hiding in Images by Adaptive LSB Substitution Based on the Pixel-Value Differencing, ICICIC-2006, Beijing, China Aug 2006, pp. 58-61

20.              Suk-Ling Li , Kai-Chi Leung, L.M. Cheng, and Chi-Kwong Chan, Performance Evaluation of a Steganographic Method for Digital Images Using Side Match, ICICIC-2006, Beijing, China Aug 2006, pp. 54-57

21.              Y. K. Liu, L. M. Cheng and L.L. Cheng, “ Web Server Load balancing using Fuzzy Neural Network”, Proceedings of  the IASTED International Conference on Networks and Communication Systems NCS 2006, Mar 29-31, 2006, Chiang Mai Thailand, pp 402-406.

22.              Y. K. Liu, L. M. Cheng and L.L. Cheng, Aviation Management System with Neural Network Load-Balancing Algorithm“, SEATI 2006 Conference, IEE, Hong Kong, 8-9 March 2006,   pp. 211-217

23.              Y. K. Liu, L. M. Cheng and L.L. Cheng, Fault-Tolerant Framework for Load Balancing System”, Proceedings of the 5th WSEAS Int. Conf. on Software Engineering, Parallel and Distributed Systems, Madrid, Spain, February 15-17, 2006 pp151-155.

24.              Y. K. Liu, L. M. Cheng and L.L. Cheng, Enhanced Dynamic Web Page Allocation using Fuzzy Neural Network ”, Proceedings of the 5th WSEAS Int. Conf. on Artificial Intelligence, Knowledge Engineering and Data Bases, Madrid, Spain, February 15-17, 2006, pp183-188.

25.              S. L. Li, K. C. Leung, L. M. Cheng, and C. K. Chan, “Data hiding in images by dynamic-length LSB substitution based on pixel-value differencing,” The 5th Central European Conference on Cryptography (MoraviaCrypt 2005), Brno, Czech Republic, 15-17 June, 2005.

26.              K. C. Leung, S. L. Li, L. M. Cheng, and C. K. Chan, “A modified probabilistic symmetric encryption scheme based on chaotic systems,” The 5th Central European Conference on Cryptography (MoraviaCrypt 2005), Brno, Czech Republic, 15-17 June, 2005.

27.              CK Chan, LM Cheng, KC Leung, SL Li, “Image Hiding Based on Block Difference”, ICARV04, Kuming, China, Dec 2004, pp.968-972

28.              L.M. Cheng , L.L. Cheng, C.K. Chan, K.W. Ng, “Digital Watermarking based on Frequency Random Position Insertion”, ICARV04, Kuming, China, Dec 2004, pp 977-980

29.              LM Cheng, LL Cheng “Design and Implement a Contactless Smart Card Antenna”, IASTED International Conference on ANTENNAS, RADAR, AND WAVE PROPAGATIO, July 2004, Canada, pp. 63-68

30.              KK Lee, KT Ng, CW Tan, YC Chan, LM Cheng, “Fabrication of Smart Card using UV Curable Anisotropic Conductive Adhesive (ACA) Part I: Optimization of the curing condition, 2004 International Conference on the Business of Electronic Product Reliability and Liability, April 2004, Shanghai, China, pp. 134-139

31.              CW Tan, YM Siu,  KK Lee, YC Chan, LM Cheng, “Fabrication of Smart Card using UV Curable Anisotropic Conductive Adhesive (ACA) Part II: Reliability Performance of the ACA Joints, 2004 International Conference on the Business of Electronic Product Reliability and Liability, April 2004, Shanghai, China, pp. 140-144

32.              CK Chan, LM Cheng, TO Ngan, "Image Hiding Based on Block Similarity", IASTED Int. Conference on Signal and Image Processing (SIP2002) Kauai, Hawaii, USA Aug 2002, pp 525-529

33.              Choi-Kuen Chan, C.K. Chan, L.M. Cheng,” Software Generation of Random Number by using  Neural Network”,  5th ICANNGA, International Conference on Artificial Neural Networks and Genetic Algorithms Proceedings, Pragus, Czech Republic, April 2001, pp. 209-211, 2001

34.              Choi-Kuen Chan, Chi-Kwong Chan, Lee-Ming Cheng, Encryption System Based on Neutral Network”, Proceedings of the IFIP TC6/TC11 International Conference on Communications and Multimedia Security Issues, Vol. 192 , May 21-22, 2001, Darmstadt, Germany, pp. 14.

35.              Choi-Kuen Chan, C.K. Chan, L.M. Cheng,” Random Sequence Generation Using Clipped Hopfield Neural Network”,  WSES International Conference on Neural Networks and Applications, Advances in Neural Networks and Applications, pp. 253-255, 2001.

36.              Choi-Kuen Chan, L.M. Cheng ,”A Secured Globally Access Control System Using Smart Card”, ISCE Hong Kong, Dec 2000, pp 190-193, 2000.

37.              Choi-Kuen Chan, L.M. Cheng, "A Secured Globally Access Control System for
E-Commerce", Workshop on Software Agent and its Applications, SAA2000, Ibusuki-city, Japan, Nov 2000, pp 95-98, 2000.

38.              W.P. Choi, L.M. Cheng, "Modelling the Crypto-processor from design to synthesis", Cryptographic Hardware & Embedded Systems, First International Workshop, Worchester Polytechnic Institute, Worcester, USA, Aug 1999, in Lecture notes in Computer Science, Vol. 1717, pp 25-36, Springer

39.              K. S. Ng and L. M. Cheng, "Selective Block Assignment Approach for Watermarked Image", SPIE Electronic Imaging 99, San Jose USA, pp.14-20, March, 1999

40.              FG Guo, KW Wong, LM Cheng, "Optoelectronic re-circulating Construction of the Crossover and the Banyan Network", Proc. of APCC/ICCS'98, Singapore, pp 748-752, Nov. 23-27, 1998

41.              C. H. Wong, L. M. Cheng and K. S. Ng, "A fast decoding algorithm of dictionary-based text compression system", Proceedings of 11th International Conference Computer applications in industry and engineering, Nevada, USA, Nov. 1998.

42.              Chi-Kwong Chan and L.M. Cheng, "The CHNN nonlinear combination generator", 5th IEEE International Conference on Electronics, Circuits and Systems, vol. 2, Dec. 1998, pp. 257-260

43.              LM Cheng, "Smart Card Technology in Electronic Commerce", Proceedings of Symposium on "Electronic Money Transfer 97", IEE Hong Kong, Nov 1997, pp18 –25.

44.              Chi-Kwong Chan and L.M. Cheng, "Pseudorandom Generator based on Clipped Hopfield Network", ISCAS 1998

45.              FG Guo, KW Wong, LM Cheng, "An optoelectronic re-circulating Omega Network based on CMOS/SEED switching node arrays", Proc. of Int. Conference on LASERS'97, pp 627-631, New Orleans, Dec, 1997.

46.              K. S. Ng and L. M. Cheng, "Artificial Neural Network for Discrete Cosine Transform and Image Compression", ICDAR'97, ULM Germany, pp.675-678, 1997

47.              K. S. NG, L. M. Cheng and C. H. Wong, "Dynamic Word Based Text Compression", ICDAR'97, ULM Germany, pp.412-416, 1997

48.              K. S. NG and L. M. CHENG, "Word Based Multiple Dictionary Scheme for Text Compression with Application to 2D Bar Code",  Proc. IEEE Data Compression Conference, pp.457, 1997

49.              CW Hui, LM Cheng, "Thinning by motion of structuring element for 3D inspection", Proc. SPIE, Automatic Inspection and Novel Instrumentation, Jun 1997, Singapore, pp 90-98

50.              A.W.H. Lee, WF Tse, LM Cheng, LL Cheng, "Texture Image Segmentation Using Structured ANN",  Proc. SPIE, Automatic Inspection and Novel Instrumentation, Jun 1997, Singapore, pp 58-65

51.              W.P. Choi, L.M. Cheng, "A Proposal of an Algorithm for DES Applications in IC Card", ECOS97  May 97, UK

52.              D. Guo, L.M. Cheng, L.L. Cheng, Z. Chen, R. Liu, B. Wu, "Chaotic Classified Properties and Application in Cryptography of HNN under Overstorage", Progress in Neural Network Processing, Sept 1996, Hong Kong, pp 502-507

53.              D. Guo, L.M.Cheng, L.L. Cheng, Z. Chen, R. Liu, B. Wu, "Artificial Retinal Neural Network for Pattern Recognition", SPIE Conf. Proceeding No. 2664, pp. 153-162,1996

54.              J. Lu, L.M. Cheng, Wei Gang, S.C.Chan, "ECG Compression with Lapped Orthogonal Transform Coding", IEEE Region 10 Engineering & Physics in Medicine Conference, Nov 1995, New Zealand, pp 195.

55.              J. Lu, S.C.Chan, LM Cheng, "Cardiac Arrhythmia Analysis Using Wavelet Transform", Sixth International Conference on Signal Processing, Waltham, USA Oct 1995, PP 271-275.

56.              K.W. Wong, T. Ngai, L.M. Cheng, "A Compact Implementation of Optical Omega Network", Technical Digest CLEO/Pacific Rim 95, Japan, July 1995, pp.291.

57.              C.M. Choy, L.M. Cheng, "Implementation of Optical Perfect Shuffle with Cosine Approximated Binary Gabor Zone plate", Technical Digest CLEO/Pacific Rim 95, Japan, July 1995, pp.64.

58.              X. Zhang, C.M. Choy, L.M. Cheng, "Fabrication of Zone Plate Hologram using Field Associated Etching Technique", Technical Digest CLEO/Pacific Rim 95, Japan, July 1995, pp.12.

59.              M.C. Chu, Cheng and L.M.Cheng (in Chinese), "Magnetic Card Protection System" 2nd Academic Conference of Young Scientist, CAST, Beijing, July 1995, Information and Space Science, pp 340-344

60.              C.M. Choy, L.M.Cheng, "Low noise optical interconnection using cosine approximated binary Gabor Zone Plate", IOOC'95, Jun 1995 Hong Kong, pp 2-180.

61.              M.C. Chu, L.L. Cheng and L.M. Cheng, "A Novel Magnetic Card Protection System", ECOS'95 Conference, Brighton, UK, May 1995, Pub. No. 408, pp 207-211.

62.              N.Y, Ko, A.W.H. Lee, L.M. Cheng, "Texture Classification Using Structured ANN", Intelligence Engineering Systems through AN Network Vol. 4, (Artificial Neural Network in Engineering Proceeding) Nov 1994, St Louise, USA, pp 394-402

63.              D. Young, A. Lee, L.M. Cheng, "Hardware Realization of ANN with application to Information Coding" Proc International Conf. of Neural Network, Florida, USA, June 1994, pp 3982-85, vol. 6.

64.              D. Young, L.M. Cheng, "Using Dynamic Expansion & Contraction Approach to generate a feedfordward network" Proc International Conf. of Neural Network, Florida, USA, June 1994, pp 1546-49, vol. 3.

65.              A.W.H. Lee, L.M. Cheng, "Using ANN for the calculation of IFS Codes" Proc International Conf. of Neural Network, Florida, USA, June 1994, pp 4038-43, vol. 6.

66.              A.W.H. Lee, L.M. Cheng, "Using ANN for High Speed Iterated Function System Image Compression" ISSIPINN'94 Conference proceeding, IEEE Pub. no. 94TH0638-7,pp 172-175, Hong Kong

67.              D. Young, L.M. Cheng, "Autonomous hidden node determination using dynamic expansion & contraction method" ISSIPINN'94 Conference proceeding,  IEEE Pub. No. 94TH0638-7,pp 421-424, Hong Kong

68.              K.Y. Wu, R. M. M. Chen, L.M. Cheng, A.S. Fong, "A VHDL Approach to System Design for Multiprocessor Circuit Simulation", Proc. TENCON 93, Beijing, pp 1182-5, Vol 2.

69.              A. S. Fong, K.Y. Wu, R. M. M. Chen, L.M. Cheng, "A Heterogeneous Multiprocessing Computer System with Shared Memory", Proc.  TENCON 93, Beijing, China, vol 1, pp 225-8.

70.              L.M. Cheng, F. Lam, A. S. Fong , M. M. Chen, "Portable Controlling Software Package for Parallel Fault-tolerant Computer System", Proc. TENCON'93, Beijing, pp 177-80.

71.              D. Young, L.M. Cheng, "Low Cost ANN System based on TDM Approach", 36th Mid-West Symposium on CAS, Detroit, USA, Aug. 93, pg 1185-1188.

72.              L.M. Po, C.K. Chan, L.M. Cheng, W.H. Lau, "Improved Block Truncation Coding Using Fast Optimal 1-bit Quantizer Design", 1992 Int. Conf. on Communication Technology, Beijing, China, Vol. 1, Sep., 1992, pp 02.09/1-4.

73.              L.M. Cheng and H.L. Liu, "Moment Invariance Calculation Using Structured Neural Network", ICSC'92 Conf. Proceeding, pp 120-124, Hong Kong.

74.              L.M. Cheng, H.L. Mak and L.L. Cheng, "Structured Backpropagation Network", IJCNN Conf. Proc., IEEE Cat. No. 91CH3065-0 Vol 2, pp 1641-1646.

75.              K.W. Wong and L.M. Cheng, "Optical Cosine Transform Using Lenslet" Technical Digest, MOC'91, Yokohama, Japan, Oct 91, pp148-151.

76.              K.W. Wong and L.M. Cheng, "Optical Cosine Transform Using Phase Conjugation Technique", IEE Third International Conference on Holographic Systems, Components and Application', Edinburgh  Sep. 1991, IEE Conf. Pub. No. 342, pp 113-117

77.              C.K. Chan, L.M. Po and L.M. Cheng, "Adaptive Subspace Image Vector Quantization and its Relationship with Transform Coding Using VQ", IEE Sixth International Conference on 'Digital Signal Processing in  Communication', Loughborough Sep. 1991, IEE Pub. No. 340, pp 48-51.

78.              L.M.Cheng. and  L.L. Cheng, "A State and Network Approach for Reliability Assessment of Small Volume Products", in Proc. of Intern. Conf. Circuits and Systems, Shenzhen (China) Jun 1991, IEEE 91TH0387-1, Vol. 1, pp. 212-215, (1991).

79.              L.M.Cheng. and  L.L. Cheng, "The Use of Digital Wave Network for System Performance Analysis", in Proc. of Intern. Conf. Circuits and Systems, Shenzhen (China) Jun 1991, IEEE 91TH0387-1, Vol. 1, pp.208-211, (1991).

80.              L.M. Cheng, "The Use of Digital Wave Network in Solving EMC Problems", in Proceeding of AMSE Chengdu (China) Conference in Signal and Systems, Oct 1990, pp. 291, 1990.

81.              L.M.Cheng. and  L.L. Cheng, "Performance Modelling of a Microprocessor based Paging System",in Proc. Intern. AMSE Conf. Signal and Systems,  Tirupati (India), AMSE Press., Vol. 3, pp. 59-70, (1990)

82.              L.M.Cheng. and  L.L. Cheng, "A Reliability Assessment Model for Small Volume Produced Safety Critical Systems" in Proc.Intern. AMSE Conf. Signals and Systems, Tirupati (India), AMSE Press., Vol. 3, pp. 47-58, (1990)

83.              L.M. Cheng, "Solving Problems During the Development of an Image Processing System", EMC 89 - Product Design for Electromagnetic Compatibility, ERA Report No 89-0001, ERA Seminar, Heathrow, London, Feb. 1989, pp 2.31-2.3.18.

84.              L.M. Cheng, A.M. Darling, M.L.Walker, M.A. Fiddy  and T.J. Hall, " Reconstruction from limited angle projection data",  Opt Soc Am Topical meeting on computer tomography and NMR imaging, Manitoba, Canada, August 1984.

85.              R.E. Burge, L.M. Cheng, G.D. Mountain and J.F.L. Ward, "Two dimensional complex functions as optional transparencies and some applications", Optics 80, Institute of Physics Conference, Manchester, UK, September 1980.

86.              R.E. Burge, G.D. Mountain, L.M. Cheng and J.F.L.Ward, "Image Processing in Scanning Microscope", Optics 80, Institute of Physics Conference, Manchester, UK September 1980.

 

Book & Chapter

1.                  HY Leung, L.M .Cheng, “Study of Digital Image Watermarking in Curvelt Domain – Application of Digital Watermarking in Frequency Domain”, VDM Verlag, ISBN 978-3-639-36303-6, April 2011.

2.                  K.C. Leung, L.M. Cheng, “Novel Design of Block Cipher Cryptosystem: Analysis, Design and Implementation”, VDM Verlag, ISBN: 978-3639186966, Aug 2009.

3.                  L.M. Cheng, CW So, LL Cheng, “An Improved Forward Secrecy Protocol for Next Generation EPCGlogal Tag”, in Development and Implementation of RFID Technology, I-Tech Education and Publishing KG, Editor Cristina Turcu , ISBN 978-3-902613-54-7, pp. 317-332, Jan. 2009

4.                  A.T.S.Ho, S. Rao, L.M. Cheng, Editors, SPIE Proceedings on Automatic Inspection and Novel Instrumentation (Vol 3185)  ISBN: 0-8194-2612-1, 178 pages Published 1997 (also sold under Amazon.com)

5.                  L.M. Cheng, L.L. Cheng, W.P. Choi, "Smart Card Technology", Business & Technology Information Quarterly, HKITC Publication Hong Kong, Dec. 1995, pp 22-27.  

6.                  L.M. Cheng and A. Carr, "Advanced Image Processing for Machine Vision",   NTIS, SPRINGFIELD, VA (USA) , 1987

 

Patents

1.                  LM Cheng, " Digital Chip and Method of Operation Thereof", USA Patent No. 8,938,157 B2, Jan 2015

2.                  L.M. Cheng, TO Ngan, KW Hau, “Crypto-engine for Cryptographic Processing of Data”, US Patent No 8,458,492, Jun 2013.

3.                  L.M. Cheng, TO Ngan, KW Hau, “Crypto-engine for Cryptographic Processing of Data”, US Patent No. 7,634,666, Dec 2009.

4.                  L.M. Cheng, C.K. Chan, C.H. Wei, “Wiegand Converter and Methods of Generating a Bi-directional Data”, Hong Kong Patent No. HK1091619, Dec 2009. 

5.                  L.M. Cheng, C.K. Chan, C.H. Wei, “Wiegand Converter and Methods of Generating a Bi-directional Data”, China Patent No. 200510084320.0, Sep 2009. 

6.                  L.M. Cheng, C.K. Chan,  Sequence Generator and Method of Generating A Pseudo Random Sequence”, China Patent No. ZL 031 22609.4, May 2009.

7.                  L.M. Cheng, C.K. Chan, C.H. Wei, “Wiegand Converter and Methods of Generating a Bi-directional Data”, US Patent No. 7,293,698, Nov 2007. 

8.                  L.M. Cheng, C.K. Chan,  “Sequence Generator and Method of Generating A Pseudo Random Sequence”, US Patent No. 7,142,675, Nov. 2006

9.                  L.M. Cheng, C.K. Chan, K.C.K.Chan, “A compact crypto-engine for random number and stream cipher generation”, US Patent No. 7,003,109, Feb. 2006

10.              L.M. Cheng, C.K. Chan, K.C.K.Chan, “A compact crypto-engine for random number and stream cipher generation”, China Patent No. ZL 02106138.6, Aug 2005

11.              L.M. Cheng, L.L.Cheng, M.C. Chu, "Magnetic Information Card", South Africa Patent No. 98/1255, Oct. 1998

12.              L.M. Cheng, L.L.Cheng, M.C. Chu, "Magnetic Card", China Patent  No. 95108048.2, Jan 1998.

13.              L.M. Cheng, L.L.Cheng, M.C. Chu, "Magnetic Cards" UK Patent No. GB 2290897B Jul 1998.

14.              L.M. Cheng, L.L.Cheng, M.C. Chu, "Magnetic Information Card", USA Patent No. 5,627,357, May 1997

 

 

Patent Applications

 

1.          LM Cheng, J. Wang " Multivariate Cryptography Based On Clipped Hopfield Neural Network", USA Patent Application No. 14/839,528, Aug 2015.

 

 

/Updated 28 Aug 2015