A/Prof Wong Kok Sheik

Associate Head (Research)
School of IT

+603 5514 6090
Room 2-4-17

Personal statement

Kok Sheik is an Associate Professor attached to the School of Information Technology at Monash University Malaysia. He received the B.S. and M.S. degrees in both Computer Science and Mathematics from Utah State University, USA, in 2002 and 2005, respectively. In 2009, he received the Doctor of Engineering degree from Shinshu University, Japan, under the scholarship of Monbukagakusho. He was with Multimedia University from 2009 to 2010, and University of Malaya from 2010 to 2016. His research interests include multimedia signal processing, data hiding, multimedia perceptual encryption, joint encryption and data-hiding method, as well as their applications. He is a senior member of IEEE and a member of APSIPA.

In 2015, his student’s thesis received the Best Ph.D thesis award from the IEEE Signal Processing Society, Malaysia Section. Dr. Wong served as an associate editor for the Malaysian Journal of Computer Science from 2013 to 2017. Currently, he serves as an associate editor of the Journal of Information Security and Applications (JISA) and IIEEJ Transactions on Image Electronics and Visual Computing.

Academic degrees

  • Doctor of Philosophy in Engineering, Shinshu University, 2009
  • Master in Computer Sciences, Utah State University, USA, 2005
  • Master in Mathematics, Utah State University, USA, 2004
  • Degree in Computer Science and Mathematics, Utah State University, USA, 2002

Professional affiliations

Member of International Professional Bodies

  • IEEE Computer Society

Member of National Professional Bodies

  • Malaysian Image Analysis and Machine Intelligence Association

Research Interests

My research aims at the design, analysis, and delivery of the underlying mechanisms in realizing security features in multimedia content. The multimedia contents include audio, image and video, focusing on compressed contents compliant to certain ISO standards. Both interpretations of data hiding are considered, where the first interpretation refers to the actual action of inserting data into a content (commonly known as watermarking), while the second interpretation masks the perceptual meaning / semantic of the content (commonly known as cryptography). In a 5-year high impact research project, my team was working on the unification of watermarking and encryption, which produced various publication, PhD / MSc students, a few patents (filed) as well as forging many collaborative networks with local and international partners. Recently, I started to venture into information recovery in visual content, smart grid, as well as signal processing in the encrypted domain. My career goals including building up a team of competent researchers in the field of multimedia signal processing and lifting the technical level of our local / regional research community.

Research Projects

Recovery of missing coefficients - fundamentals to applications

In many compression standards including JPEG and MPEG families, a lossy compressed content underwent a processing pipeline with 3 main stages, namely, transformation, quantization, and entropy coding. Each of these stages is already well researched in the multimedia content coding community. This project departs from the traditional processing pipeline, where selected coefficients are first removed to reduce storage space during encoding, and the removed coefficients are recovered through prediction during decoding. Specifically, the missing coefficients are modelled to satisfy certain constrains including range of pixel values and small variance value. Potential solutions are then found by method of linear programming. The proposed framework will be further refined to realize the following applications: (a) data insertion, (b) selective encryption, and (c) joint encryption and data insertion. The outcome of this project will directly impact the volume, security, and of data communicated across networks, which can then contribute in reducing cyber-crimes such fraud, fake news, identity theft, and content forgery while promoting privacy.

Innovative High Dynamic Range Imaging - from Information Hiding to Its Applications

This project aims to enhance the current state-of-the-art encoding standard to achieve some security features such as tamper detection and privacy protection as well as adaption of bitstream to different display devices with different capabilities. It embarks on the following objectives:

  1. To design a new unified information hiding technique for high dynamic range image
  2. To develop hierarchical quality coding scheme applicable for all dynamic range displays
  3. To design reversible mapping scheme from low to high dynamic ranges and vice versa.


Unit Taught

FIT5144 - Research strategies and skills

FIT5143 - IT research methods

FIT2093 - Introduction to cyber security

FIT2014 - Theory of Computation

FIT2100 - Operating Systems

FIT6021 - Advanced research methods

Local grants

  • Recovery of missing coefficients - fundamentals to applications, Wong Kok Sheik, 2018 - 2020,  Ministry of Education, RM62,500
  • Innovative High Dynamic Range Imaging - from Information Hiding to Its ApplicationsWong Kok Sheik, June 2017 - Nov. 2019, Ministry of Science, Technology, and Innovations, RM146,000
  • Discovery of Unconventional Basis Vectors for Image/video CodingWong Kok Sheik, April 2018 - Dec. 2018, Eng-IT Collaborative Grant Scheme (Monash internal grant), RM18,000

International grants

  • IDENTITY - Multimedia Forensics and People IdentificationWong Kok Sheik, 2015 - 2019, Horizon 2020 - European Union funding for Research & Innovation, €2,000,000
  • Real Time Scalable Software Video Encoding and Its Applications Through Hi-Performance Computing, Wong Kok Sheik, 2014 - 2016, COMSTECH-TWAS Joint Research Grants Programme, USD10,000

Current supervision


Mahamat Moussa Abbas Ali 
Predicting Motivations of Actions in Computer Vision by implementing Physics & Psychology Theories
2018 - Present
Monash University Malaysia

Dong Xingbo 
How Secure Biometric Recognition Could Be Done?
2018 - Present
Monash University Malaysia

Chia Kai Lin 
calable coding for HDR image
2017 - Present
Monash University Malaysia

Yip Sook Chin (external supervision) 
Anomaly Detection Frameworks for Identifying Energy Theft and Meter Irregularities in Smart Grids
2015 - Present
Monash University Malaysia

Ali Moltajaei Farid 
Novel Approaches to Tracking Swarms of Robots
2016 - Present
Monash University Malaysia

Tesfahun Melese Yilma 
Health Information Seeking and Searching Behaviors among College Students: A Case from Two Developing Countries
2016 - Present
Monash University Malaysia

Pang Lie Lin (external supervision) 
Information hiding in Scalable Video Coding
2015 - Present
Monash University Malaysia


Masaya Moriyama (external supervision) 
Background / foreground separation in compressed video domain
2015 - Present
Monash University Malaysia

Dilshani Hansika Mallikarachchi 
Data Hiding in a Flying Ad-hoc Network (FANET)
2018 - Present
Monash University Malaysia

Completed supervision


Dr. Lim Wen Harn 
Bringing Order To User-Generated Content On The Web: Estimating User Expertise And Information Quality
Monash University Malaysia

Dr. Liong Sze Teng 
A Study on Micro-Expression Recognition using Facial Strain
University of Malaya

Dr. Minemura Kazuki 
Sketch – An Investigation into Feature Extraction in Compressed Domain
University of Malaya

Dr. Tew Yiqi 
Video authentication in HEVC compressed domain
University of Malaya

Dr. Vishnu Monn Baskaran 
Performance Enhancements for Ultra-high definition Multipoint Video Communication Systems
Multimedia University

Dr. Somayeh Sadeghi 
A keypoint based copy-move forgery detection and localization in digital images
University of Malaya

Dr. Ong Sim Ying 
A study on data insertion and scrambling for unified scalable information hiding
University of Malaya

Dr. Mustafa S. Abdul Karim 
A Study on Data Embedding in Universal Domain
University of Malaya


Zahra Moayed 
Tagging Multiple Messages Using Data Hiding
University of Malaya

Reza Moradi Rad 
Unification of Data Embedding and Scrambling in Image
University of Malaya

April Pyone Maung Maung 
Reversible Data Hiding in Video Container Format
University of Malaya

Mohammad Mogharen Askarin 
Reduced Contact Lifting and Transplantation Attack of Latent Fingerprint
University of Malaya

Local Award/Recognition/Exhibition/Stewardship

  • National Teaching Aid Competition - Sarawak Convention Bureau, 2012

International Award/Recognition/Exhibition/Stewardship

  • IEEE CES Service Award - IEEE Consumer Electronics Society, 2016
  • Best Paper Award  - Organizing committee of ICCE-TW 2016, 2016
  • IEEE CES Service Award - IEEE Consumer Electronics Society, 2015
  • Certificate of Appreciation - The Institute of Image Electronics Engineers of Japan, 2012
  • Best Paper Award (signal processing track) - Organizing committee of ISPACS, 2011

Selected Journal Publications

  • Yiqi Tew, KokSheik Wong, Raphael Phan, King Ngi Ngan, “Separable Authentication in Encrypted HEVC Video,” Multimedia Tools and Applications, Accepted on 3 Jan 2018. (DOI: 10.1007/s11042-018-5611-7)
  • Simying Ong, Shujun Li, KokSheik Wong and KuanYew Tan, “Fast Recovery of Unknown Coefficients in DCT-Transformed Images,” Elsevier Journal of Visual Communication and Image Representation (Short Communications), Volume 58, October 2017, pp. 1 – 13
  • K. Ratnavelu, M. Kalpana, P. Balasubramaniam, KokSheik Wong, P. Raveendran, “Image encryption method based on chaotic fuzzy cellular neural networks,” Signal Processing, Volume 140, November 2017, pp. 87-96
  • Yiqi Tew, KokSheik Wong, Raphael Phan, King Ngi Ngan, “Multi-layer authentication method for HEVC video based on Embedded Statistics,” Elsevier Journal of Visual Communication and Image Representation, Volume 40, Part B, October 2016, pp. 502–515 (ISSN 1047-3203)
  • Kazuki Minemura, KokSheik Wong, Raphael Phan, Kiyoshi Tanaka, “A Novel Sketch Attack Framework for H.264/AVC Format- Compliant Encrypted Video,” IEEE Transactions on Circuit and System for Video, Accepted.
  • Adamu Muhammad Buhari, Huo-Chong Ling, Vishnu Monn Baskaran and KokSheik Wong, “Low Complexity Digital Video Watermarking for H.264/SVC Real-time Spatial Scalable Streaming,” , Signal Processing: Image Communications, Volume 47, September 2016, pp. 86–95.
  • Kazuki Minemura, KokSheik Wong, Xiaojun Qi, Kiyoshi Tanaka, “A Scrambling Framework for Block Transform Compressed Images,” Multimedia Tools and Applications, Accepted.
  • Reza Moradi Rad, KokSheik Wong, and Jing-Ming Guo, “Reversible Data Hiding by Adaptive Group Modification on Histogram of Prediction Errors,” Signal Processing, Volume 125, August 2016, pp. 315-328.
  • Osamah Ibrahiem Abdullaziza, Vik Tor Goh, Huo-Chong Ling, and KokSheik Wong, “AIPISteg: An Active IP Identification Based Steganographic Method,” Journal of Network and Computer Applications, Elsevier, Volume 63, March 2016, pp. 150-158.
  • Jing-Ming Guo, Guo-Hung Lai, KokSheik Wong, and Shih-Hung Chou, “Progressive Halftone Watermarking using Multi-layer Lookup Strategy,” IEEE Transactions on Image Processing, Vol. 24, No. 7, July 2015, pp. 2009-2024.
  • Simying Ong, KokSheik Wong and Kiyoshi Tanaka, “Scrambling-Embedding for JPEG Compressed Image,” Signal Processing, Volume 109, April 2015, pp. 56-68.
  • Mustafa S. Abdul Karim and KokSheik Wong, “Data Embedding in Random Domain,” Signal Processing, Volume 108, March 2015, pp. 56-68.
  • Mustafa S. Abdul Karim and KokSheik Wong, “Data Fusion in Universal Domain using Dual Semantic Code,” Information Sciences, November 2014, Vol. 283, pp. 123 – 141.
  • Reza Moradi Rad, KokSheik Wong, Jing Ming Guo, “A Unified Data Embedding and Scrambling Method, ” IEEE Transactions on Image Processing, Volume 23, Issue 4, April 2014, pp. 1463 – 1475.
  • Tew Yiqi and KokSheik Wong, “An Overview of Information Hiding in Compressed Video,” IEEE Transaction on Circuit and System for Video Technology, Volume 24, Issue 2, Feb. 2014, pp. 305 – 319.
  • Mustafa S. Abdul Karim and KokSheik Wong, “Universal Data Embedding in Encrypted Domain,” Signal Processing, Volume 94, January 2014, pp. 174-182.
  • KokSheik Wong, Kiyoshi Tanaka, Kouchi Takagi, and Yasuki Nakajima, "Complete Video Quality Preserving Data Hiding," IEEE Transaction on Circuit, System, and Video Technology, vol. 19, no. 10, October, 2009, pp.1499-1512.
  • KokSheik Wong, Xiaojun Qi, and Kiyoshi Tanaka, “A DCT-Based Mod4 Steganographic Method,” Signal Processing, Elsevier, Vol.87, No.6, 2007, pp.1251-1263.