Description: W:\public_html\chow.gifK.P. Chow

M.A., Ph.D.(UC Santa Barbara)

ASSOCIATE PROFESSOR

ASSOCIATE DIRECTOR, CENTER FOR INFORMATION SECURITY AND CRYPTOGRPHY


Dr. Chow began his academic career in this department upon completion of his doctoral degree in the United States. His first contribution was on establishing HARNET, the first academic and research network for tertiary institutions in Hong Kong (with Raymond Lo and Dr. Ng). His earlier research works were in expert systems development and Chinese computing. In those years, Dr. Chow has used expert systems techniques successfully in implementing a staff roster rostering system for a local airline (with Dr. Lucas Hui), a refuse collection vehicle scheduling system for Regional Services Department (with D. Hung and C.T. Hung), and an air conditioning plant diagnostic system. In the years 1994-1997, Dr. Chow, together with Dr. D. Cheung, Prof. Chin, Dr. T.W. Lam, Dr. W.W. Tsang and a team of software engineers developed the search engine for Hong Kong Telecom's 108 Telephone Directory Enquiry System using state of the art technology in main memory database and distributed computing. Since 1997, Dr. Chow is the Associate Director of Center for Information Security and Cryptography, Department of Computer Science and Information Systems, the University of Hong Kong, and is the Project Manager of the Strong Cryptographic Infrastructure for Electronic Commerce project.

In the recent years, Dr. Chow' research interests have migrated to digital forensics and computer security, and is the leader of the Computer Forensics Research Group (CFRG). Dr. Chow was the chief designer of the bilingual computer forensic tool Digital Evidence Search Kit (DESK).  Starting from 2005, Dr. Chow has been working on the Internet piracy monitoring system Lineament I, and Internet auction site monitoring system Lineament II.  Both Lineament I and Lineament II were adopted by HKSAR Customs and Excise Department in 2007 and 2011 respectively.  Two of his research team’s papers got the best paper awards in one of the reputable digital forensics research conference in USA in years 2008 and 2011.  One of his team’s research papers “The Rules of Time on NTFS File System” had been submitted to Courts of Hong Kong several times as a supporting document for the expert reports.

Dr. Chow has been a member of the Program Committee of the international computer forensic workshop SADFE. He was the conference chairman of the Sixth IFIP WG 11.9 International Conference on Digital Forensics held in January in Hong Kong. From 2010, Dr. Chow is the Chairman of the Information Security and Forensics Society (ISFS), and a committee member of the IT Division, Hong Kong Institution of Engineers.

Dr. Chow is the Programme Director for the MSc in Computer Science and the Associate Programme Director for the MSc in E-Commerce and Internet Computing Programme. He is the instructor for the courses “e-Crime” and “e-Discovery and Digital Forensics”.  In both courses, he is responsible for the technical issues of digital investigation and computer forensics.  Dr. Chow has provided consultancy and training to local organizations including Hong Kong Telecom, Hong Kong Airport Services Limited, Hewlett Packard and MPFA in the areas distributed computing, Internet technology and software quality assurance. In the past few years, Dr. Chow been invited to be a computer forensic expert to assist the Court and the HK law enforcement agencies, and to give advice to counsels on understanding and interpreting digital evidence for both criminal and civil proceedings in Hong Kong.  In criminal proceedings, Dr. Chow had analyzed cases that include child pornography, software copyright, email analysis and Internet fraud.  For civil litigations, Dr. Chow had analyzed cases that include activities log temporal analysis and internal investigation involving insider theft.

 

Selected Publications on Computer Forensics:

  1. Hou S., Uehara T., Yiu S.M., Hui C.K. and Chow K.P., Privacy Preserving Multiple Keyword Search for Confidential Investigation of Remote Forensics, 2011 Third International Conference on Multimedia Information Networking and Security (MINES 2011), Shanghai, China, 4-6 November, 2011.
  2. Hou S., Uehara T., Yiu S.M., Hui C.K. and Chow K.P., Privacy Preserving Confidential Forensic Investigation for Shared or Remote Servers, 2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Dalian, China, 14-16 October 2011. China.
  3. Frank Y.W. Law, P. Chan, S.M. Yiu, K.P. Chow, Michael Y.K. Kwan, Hayson Tse, Pierre K.Y. Lai, Protecting Digital Data Privacy in Computer Forensic Examination, in Proceedings of the sixth International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2011), Oakland, California, USA, 2011. (Best Paper Award)
  4. J. Fang, Z. Jiang, S.M. Yiu, K.P. Chow, L. Hui, L. Chen and X. Niu, A Dual Cube Hashing Scheme for Solving LPP Integrity Problem, in Proceedings of the sixth International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2011), Oakland, California, USA, 2011.
  5. M. Kwan, R.E. Overill, K.P. Chow, H. Tse, F. Law & P. Lai, Sensitivity Analysis of Digital Forensic Reasoning in Bayesian Network Models, Proc.7th Annual IFIP WG 11.9 International Conference on Digital Forensics, Orlano, Florida, USA, 2011, Advances in Digital Forensics VII, (to appear).
  6. F. Law, K.P. Chow, P. Lai, H. Tse and K. Tse, Digital Child Pornography, in Technology for Facilitating Humanity and Combating Social Deviations: Interdisciplinary Perpectives by M.V. Martin, M. A. Garcia-Ruiz and A. Edwards (Eds), IGI Global, 2010.
  7. 钟琳,黎家盈,邹锦沛,许榕生,基于多视图分析的复杂网络犯罪现场重构,《电信科学》第11A期(计算机取证技术专辑), 2010.
  8. R.E. Overill, J.A.M. Silomon, Y.K. Kwan, K.P. Chow, Y.W. Law, P. Lai, Sensitivity Analysis of a Bayesian Network for Reasoning about Digital Forensic Evidence, Proc.4th International Workshop on Forensics for Future Generation Communication environments (F2GC-10), Cebu, Philippines, 11-13 August 2010.
  9. R.E. Overill, J.A.M. Silomon, K.P. Chow, A Complexity Based Model for Quantifying Forensic Evidential Probabilities, third International Workshop on Digital Forensics (WSDF 2010), Feb 15 – 18, 2010, Krakow, Poland.
  10. M. Kwan, R.E. Overill, K.P. Chow, J.A.M. Silomon,H. Tse, F. Law & P. Lai, Evaluation of Evidence in Internet Auction Fraud Investigations, Proc.6th Annual IFIP WG 11.9 International Conference on Digital Forensics, Hong Kong, 3-6 January 2010, Advances in Digital Forensics VI, Ch.7, pp.95-106, Springer (2010).
  11. F. Law, P.F. Chan, S.M. Yiu, B. Tang, P. Lai, K.P. Chow, R. Ieong, M. Kwan, W.K. Hon & L. Hui, Identifying Static and Dynamic Volatile Memory Data from Multiple Dumps for Live Forensics, Sixth IFIP WG 11.9 International Conference on Digital Forensics, Hong Kong, January 3-6, 2010.
  12. R. Ieong, P. Lai, K.P. Chow, M. Kwan & F. Law, Is it an Initial Seeder? Derived Rules that Indicate a Seeder is within the Slow-Rising Period, Sixth IFIP WG 11.9 International Conference on Digital Forensics, Hong Kong, January 3-6, 2010.
  13. F.F.K. Li, H. Chan, K.P. Chow and P Lai, Analysis of Green Dam Youth-Escort from a Forensics Prospective, Sixth Annual IFIP WG 11.9 International Conference on Digital Forensics, Hong Kong, January 3-6, 2010.
  14. F. Xu, K.P. Chow, J. He and W. Xu, Privacy Reference Monitor – A Computer Model for Law Compliant Privacy Protection, 2009 IEEE International Conference on Parallel and Distributed Systems, Shenzhen, China, 2009.
  15. K. Tse,  K.P. Chow,  F. Law,  R. Ieong,  M. Kwan,  H. Tse & P. Lai, Analyzing Digital Camera Storage Media, The 2009 International Workshop on Forensics for Future Generation Communication environments (F2GC-09), Dec 10 - 12, 2009, in Jeju Island, Korea.
  16. F. Law, P. Lai, K.P. Chow, R. Ieong & M. Kwan, Memory Acquisition: A 2-Take Approach, The 2009 International Workshop on Forensics for Future Generation Communication environments (F2GC-09), Dec 10 - 12, 2009, in Jeju Island, Korea.
  17. Frank Y.W. Law, K.P. Chow, Pierre K.Y. Lai & Hayson K.S. Tse, A Host-based Approach to BotNet Investigation, 1st International Conference on Digital Forensics and Cyber Crime, Albany, NY, Sept 30 – Oct 2, 2009.
  18. R. Ieong, P. Lai, K.P. Chow, M. Kwan, F. Law, H. Tse & K. Tse, Forensic Investigation of Peer-to-Peer Networks, Handbook of Research on Computational Forensics, Digital Crime and Investigation: Methods and Solution, IGI Global, United Kingdom
  19. M. Kwan, K.P. Chow, F. Lai, F. Law and K. Tse, A Digital Forensics View of the Yahoo! Case, Fifth Annual IFIP WG 11.9 International Conference on Digital Forensics, Orlando, Florida, USA, January 25-28, 2009. pp. 241 – 254.
  20. R.E. Overill, M. Kwan, K.P. Chow, P. Lai and F. Law, A Cost-Effective Digial Forensic Investigation Model,, Fifth Annual IFIP WG 11.9 International Conference on Digital Forensics, Orlando, Florida, USA, January 25-28, 2009. pp. 231 – 240.
  21. R. Ieong, P. Lai, K.P. Chow, F. Law, M. Kwan and K. Tse, A Heuristic Approach for Investigating the P2P Foxy Network,, Fifth Annual IFIP WG 11.9 International Conference on Digital Forensics, Orlando, Florida, USA, January 25-28, 2009.
  22. K. P. Chow, R. Ieong, M. Kwan, P. Lai, F. Law, H. Tse, K. Tse, Security Analysis of Foxy Peer-to-Peer File Sharing Tool, HKU Technical Report TR-2008-09, 2009.
  23. Frank Y.W. Law, Pierre K.Y. Lai, Zoe L. Jiang, Ricci S.C. Ieong, Michael Y.K. Kwan, K.P. Chow, Lucas C.K. Hui, S.M. Yiu, C.F. Chong, Protecting Digital Legal Professional Privilege (LPP) Data, in Proceedings of the third International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2008), Oakland, California, USA, May 18-22, 2008. Best Paper Award.
  24. Michael Y.K. Kwan, K.P. Chow, Frank Y.W. Law, Pierre K.Y. Lai, Reasoning About Evidence using Bayesian Networks, Fourth Annual IFIP WG 11.9 International Conference on Digital Forensics, Kyoto, Japan, January 27 - 30, 2008.
  25. Frank Y.W. Law, K.P. Chow, Michael Y.K. Kwan and Pierre K.Y. Lai, Consistency Issue on Live Systems Forensics, The 2007 International Workshop on Forensics for Future Generation Communication environments (F2GC-07), Jeju Island, Korea, 6 – 8 December 2007. pp. 136-140
  26. Zoe L. Jiang, Lucas C.K. Hui, K.P. Chow, S.M. Yiu and Pierre K.Y. Lai, Improving Disk Sector Integrity Using 3-dimension Hashing Scheme, The 2007 International Workshop on Forensics for Future Generation Communication environments (F2GC-07), Jeju Island, Korea, December 6 – 8, 2007, pp. 141-145.
  27. K.P. Chow, K.Y. Cheng, L.Y. Man, Pierre K.Y. Lai, Lucas C.K. Hui, C.F. Chong, K.H. Pun, W.W. Tsang, H.W. Chan, S.M. Yiu, BTM – An Automated Rule-based BT Monitoring System for Piracy Detection, in Proceedings of the Second International Conference on Internet Monitoring and Protection ( ICIMP 2007).
  28. K.P. Chow, Frank Y.W. Law, Michael Y.K. Kwan, Pierre K.Y. Lai, The Rules of Time on NTFS File System, in Proceedings of the Second International Workshop on Systematic Approaches to Digital Forensic Engineering ( SADFE 2007 ), Seattle, Washington, USA, April 10-12, 2007. IEEE Computer Society Press.
  29. Hui C.K., Chow K.P. and Yiu S.M., Tools and Technology for Computer Forensics: Research and Development in Hong Kong , Proceedings of The 3rd Information Security Practice and Experience Conference ( ISPEC 2007 ). Hong Kong, China, Springer Berlin / Heidelberg, 2007, 4464/2007: 11-19.
  30. K.P. Chow, C. Leung and F. Law, Customization and Validation Study of SPADA, 2006.
  31. K.P. Chow, C.F. Chong, K.Y. Lai, L.C.K. Hui, K.H. Pun, W.W. Tsang, H.W. Chan, Digital Evidence Search Kit, in Proceedings of the First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2005), Taipei, Taiwan, November 7-10, 2005. IEEE Computer Society Press.

 

Publications on Cryptography:

  1. Meiqin WANGXiaoyun WANGKam Pui CHOWLucas Chi Kwong HUI, New Differential Cryptanalytic Results for Reduced-Round CAST-128, IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences,  Vol.E93-A  No.12  pp.2744-2754, 2010.
  2. Z.C. Li, C.F. Chong, L.C.K. Hui, S.M. Yiu, K.P. Chow, W.W. Tsang, H.W. Chan and K.H. Pun, An Attack on Libert et al.’s ID-Based Undeniable Signature Scheme., International Journal of Network Security, to appear.
  3. E.Y.K. Chan, H.W. Chan, K.M. Chan, P.S. Chan, S.T. Chanson, M.H. Cheung, C.F. Chong, K.P. Chow, A.K.T. Hui, L.C.K. Hui, S.K. Ip, C.K. Lam, W.C. Lau, K.H. Pun, Y.F. Tsang, W.W. Tsang, C.W. Tso, D.Y. Yeung, K.Y. Yu, S.M. Yiu and W. Ju, Intrusion Detection Routers: Design, Implementation and Evaluation Using an Experimental Testbed, The IEEE Journal on Selected Areas in Communications High-speed Network Security, 2006.
  4. P.K.Y. Lai, S.M. Yiu, K.P. Chow, C.F. Chong, L.C.K. Hui, An Efficient Bloom Filter Based Solution for Multiparty Private Matching, The 2006 International Confernce on Security & Management, 2006.
  5. Sherman S.M. Chow, Lucas C.K. Hui, S.M. Yiu, and K.P. Chow, Forward-Secure Multisignature and Blind Signature Schemes, Applied Mathematics and Computation, 168:895-908, 2005.
  6. Sherman S.M. Chow, Lucas C.K. Hui, S.M. Yiu, and K.P. Chow, Practical Electronic Lotteries with Offline TTP, to appear in Journal of Computer Communications, special issue for Internet Communications Security, 2005.
  7. W.W. Tsang, L. Hui, K.P. Chow, C.F. Chong and C.W. Tso, Tuning the collision test for power, Conferences in Research and Practice in Information Series, Vol. 26, No. 1, pp. 23-30, 2004.
  8. K.H. Pun, L. Hui, K.P. Chow, W.W. Tsang, C.F. Chong, H.W. Chan, Review of the Electronic Transactions Ordinance: Can the Personal Identification Number Replace the Digital Signature?, Hong Kong Law Journal, Vol. 32, Part 2, pp. 241-257, 2002.
  9. L.C.K Hui, X. Wang, K.P. Chow, W.W. Tsang, C.F. Chong, H.W. Chan "The Differential Analysis of Reduced Skipjack Variants from the First Round", in Proceedings of the ChinaCrypt2002 Conference, pp.77-87, Shandong, PRC, Aug 2002.
  10. Z.C. Li, L. Hui, K.P. Chow, W.W. Tsang, C.F. Chong, H.W. Chan, Security of Wang et al.'s group-oriented threshold signature schemes with traceable signers, Information Processing Letter, Vo. 80, No. 6, 295-298, December 2001.
  11. Z.C. Li, L. Hui, K.P. Chow, W.W. Tsang, C.F. Chong, H.W. Chan, Security of Tseng-Jan's group signature schemes, Information Processing Letter, Vo. 75, No. 5, 187-189.
  12. Z.C. Li, L. Hui, K.P. Chow, W.W. Tsang, C.F. Chong, H.W. Chan, Cryptanalysis of Harn digital multisignature scheme with distinguished signing authorities, Electronic Letters, Feb. 2000.
  13. X. Wang, L. Hui, K.P. Chow, W.W. Tsang, C.F. Chong, H.W. Chan, Secure and Practical Tree-structure Signature Schemes Based on Discrete Logarithms, Proceeding of the International Workshop on Practice and Theory in Public Key Cryptography (PKC2000), 2000, Melbourne, Australia.
  14. L. Hui, K.P. Chow, W.W. Tsang, C.F. Chong, H.W. Chan, V. Chan, K.M. Chan, M. Lee, D. Hung, C.T. Hung, P. Hong, P. Yeung, Strong Cryptographic Library - Implementation and Applications, Proceeding of 9th Hong Kong Computer Society Data Base Conference, May 1999.
  15. K.W. Tse and K.P. Chow, Message Encryption in a X.400 Message Handling System, IEEE TENCON'90 Engineering Conf., Hong Kong, 1990.

 

Publications on Video Analytics:

  1. He X., Yuk S.C., Luo T., Chow K.P., Wong K.K.Y. and Chung H.Y., Human Face Tracking System with Multiple Non-overlapping Cameras, The 3rd International Conference on Data Mining and Intelligent Information Technnology (ICMIA 2011), Macau, China, 24-26 October 2011. Macau, China.
  2. He X., Luo T., Yuk S.C., Chow K.P., Wong K.K.Y. and Chung H.Y., Motion Estimation Method for Blurred Videos and Application of Deblurring with Spatially Varying Blur Kernels, International Conference on Computer Sciences and Convergence Informaiton Technology (ICCIT 2010), Seoul, Korea, 30 November - 2 December 2010. South Korea.
  3. X.C. He, S.C. Yuk, K.P. Chow, K.-Y. K. Wong, R. H. Y. Chung, Super-resolution of faces using texture map-ping on a Generic 3D Model, Fifth International Conference on Image and Graphics, Xian, China, 2009.
  4. X.C. He, S.C. Yuk, K.P. Chow, K.-Y. K. Wong, R. H. Y. Chung, Automatic 3D face texture mapping framework from single image, the First International Conference on Internet Multimedia Computing and Service, Kunming, China, 2009.
  5. X.C. He, S.C. Yuk, K.P. Chow, K.-Y. K. Wong, R. H. Y. Chung, A 3D face reconstruction approach in enhancing the robustness and accuracy of face recognition, Shanghai and Hong Kong Symposium on Science & Technology, 2009.
  6. Yuk S.C., Wong K.K.Y., Chung H.Y., Chow K.P., Chin F.Y.L. and Tsang K.S.H., Object-Based Surveillance Video Retrieval System With Real-Time Indexing Methodology, International Conference on Image Analysis and Recognition. Montreal, Canada, 2007, 626-637.
  7. He X., Yung N.H.C., Chow K.P., Chin F.Y.L., Chung H.Y., Wong K.K.Y. and Tsang K.S.H., Watershed Segmentation with Boundary Curvature Ratio Based Merging Criterion, 9th IASTED International Conference on Signal and Image Processing. Honolulu, Hawaii, USA, 2007.
  1. Chung H.Y., Wong K.K.Y., Chin F.Y.L., Chow K.P. and Yuk S.C., Generalized Motion and Edge Adaptive Interpolation De-interlacing Algorithm, WSEAS Transactions on Computers. 2006, 5(11): 2544-2551.
  2. K-Y.K. Wong, F.Y.L. Chin, R.H.Y. Chung, K.P. Chow and S.C. Yuk, Motion and Edge Adaptive Interpolation De-Interlacing Algorithm, 10th WSEAS Int. Conf. on Computers, Greece, 2006.
  3. R.H.Y. Chung, F.Y.L. Chin, K-Y.K. Wong, K.P. Chow, T. Lui and H.S.K. Fung, Efficient Block-Based Motion Segmentation Method Using Motion Vector Consistency, Proc. IAPR Conference on Machine Vision Applications (MVA2005), Tsukuba Science City, Japan, May 2005.

 

 

Publications on HARNET:

  1. K.P. Chow, W.M. Lo and N. Ng, HARNET - Hong Kong Academic and Research Network, 1987 International Academic Network Workshop., New Jersey, 1987.

Publications on Expert Systems Development:

  1. B. Cheung, K.P. Chow, L.C.K. Hui and Yong, M.K., Railway track possessing assignment using constraint satisfaction, Engineering Applications of Artificial Intelligence, Vol. 12, 1999.
  2. K.P. Chow and M. Perrett, Airport Counter Allocation using Constraint Logic Programming, Third International Conference on Constraint Technology, London, 1997.
  3. K.P. Chow and L.C.K. Hui, Knowledge-based System for Rostering, Expert Systems with Applications, Vol. 6, No. 3, 1993.
  4. H.F. Hung and K.P. Chow, Vehicle Routing of Heterogeneous Fleet, ICSC, 1992.
  5. K.P. Chow, K. Chiu and S.S. Lo, Diagnosis System for a Gas Turbine Air Conditioning Plant, in Operational Expert Systems in the Far East, J.K. Lee (ed.), Pergamon Press Inc., 1991.

Publications on Telephone Directory Enquiry System:

  1. C.F. Chong, K.P. Chow, T.W. Lam, Very Fast Telephone Directory Search using Large Memory Resident Data Structures, Proc. of the IASTED Conference on Software Engineering, Las Vegas, 1998.
  2. K.P. Chow, T.W. Lam, and K.H. Lee, The Hong Kong Telephone Enquiry System, Proc. of 1996 Asia-Pacific Software Engineering Conf., Korea (Dec. 1996), 268-275.
  3. C.F. Chong, K.P. Chow and W.W. Tsang, Rapid recovery of very large memory resident data objects, Department of Computer Science and Information Systems Technical Report TR-96-03, 1996.

 

 


Last updated : January 20, 2003