Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Peiqi Chai is active.

Publication


Featured researches published by Peiqi Chai.


information hiding | 2005

Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions

Guorong Xuan; Yun Q. Shi; Jianjiong Gao; Dekun Zou; Chengyun Yang; Zhenping Zhang; Peiqi Chai; Chunhua Chen; Wen Chen

In this paper, a steganalysis scheme based on multiple features formed by statistical moments of wavelet characteristic functions is proposed. Our theoretical analysis has pointed out that the defined n-th statistical moment of a wavelet characteristic function is related to the n-th derivative of the corresponding wavelet histogram, and hence is sensitive to data embedding. The selection of the first three moments of the characteristic functions of wavelet subbands of the three-level Haar wavelet decomposition as well as the test image has resulted in total 39 features for steganalysis. The effectiveness of the proposed system has been demonstrated by extensive experimental investigation. The detection rate for Cox et al.s non-blind spread spectrum (SS) data hiding method, Piva et al.s blind SS method, Huang and Shis 8×8 block SS method, a generic LSB method (as embedding capacity being 0.3 bpp), and a generic QIM method (as embedding capacity being 0.1 bpp) are all above 90% over all of the 1096 images in the CorelDraw image database using the Bayes classifier. Furthermore, when these five typical data hiding methods are jointly considered for steganalysis, i.e., when the proposed steganalysis scheme is first trained sequentially for each of these five methods, and is then tested blindly for stego-images generated by all of these methods, the success classification rate is 86%, thus pointing out a new promising approach to general blind steganalysis. The detection results of steganalysis on Jsteg, Outguess and F5 have further demonstrated the effectiveness of the proposed steganalysis scheme.


international conference on multimedia and expo | 2005

Image steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, and neural network

Yun Q. Shi; Guorong Xuan; Dekun Zou; Jianjiong Gao; Chengyun Yang; Zhenping Zhang; Peiqi Chai; Wen Chen; Chunhua Chen

In this paper, a general blind image steganalysis system is proposed, in which the statistical moments of characteristic functions of the prediction-error image, the test image, and their wavelet subbands are selected as features. Artificial neural network is utilized as the classifier. The performance of the proposed steganalysis system is significantly superior to the prior arts.


international conference on multimedia and expo | 2005

Lossless Data Hiding Using Integer Wavelet Transform and Threshold Embedding Technique

Guorong Xua; Yun Q. Shi; Chengyun Yang; Yizhan Zheng; Dekun Zou; Peiqi Chai

This paper presents a new lossless data hiding method for digital images using integer wavelet transform and threshold embedding technique. Data are embedded into the least significant bit-plane (LSB) of high frequency CDF (2, 2) integer wavelet coefficients whose magnitudes are smaller than a certain predefined threshold. Histogram modification is applied as a preprocessing to prevent overflow/underflow. Experimental results show that this scheme outperforms the prior arts in terms of a larger payload (at the same PSNR) or a higher PSNR (at the same payload)


international conference on information technology coding and computing | 2005

Effective steganalysis based on statistical moments of wavelet characteristic function

Yun Q. Shi; Guorong Xuan; Chengyun Yang; Jianjiong Gao; Zhenping Zhang; Peiqi Chai; Dekun Zou; Chunhua Chen; Wen Chen

In this paper, an effective steganalysis based on statistical moments of wavelet characteristic function is proposed. It decomposes the test image using two-level Haar wavelet transform into nine subbands (here the image itself is considered as the LL/sub 0/ subband). For each subband, the characteristic function is calculated. The first and second statistical moments of the characteristic functions from all the subbands are selected to form an 18-dimensional feature vector for steganalysis. The Bayes classifier is utilized in classification. All of the 1096 images from the CorelDraw image database are used in our extensive experimental work. With randomly selected 100 images for training and the remaining 996 images for testing, the proposed steganalysis system can steadily achieve a correct classification rate of 79% for the non-blind Spread Spectrum watermarking algorithm proposed by Cox et ai, 88% for the blind Spread Spectrum watermarking algorithm proposed by Piva et ai, and 91% for a generic LSB embedding method, thus indicating significant advancement in steganalysis.


international workshop on digital watermarking | 2006

Lossless data hiding using histogram shifting method based on integer wavelets

Guorong Xuan; Qiuming Yao; Chengyun Yang; Jianjiong Gao; Peiqi Chai; Yun Q. Shi; Zhicheng Ni

This paper proposes a histogram shifting method for image lossless data hiding in integer wavelet transform domain. This algorithm hides data into wavelet coefficients of high frequency subbands. It shifts a part of the histogram of high frequency wavelet subbands and thus embeds data by using the created histogram zero-point. This shifting process may be sequentially carried out if necessary. Histogram modification technique is applied to prevent overflow and underflow. The performance of this proposed technique in terms of the data embedding payload versus the visual quality of marked images is compared with that of the existing lossless data hiding methods implemented in the spatial domain, integer cosine transform domain, and integer wavelet transform domain. The experimental results have demonstrated the superiority of the proposed method over the existing methods. That is, the proposed method has a larger embedding payload in the same visual quality (measured by PSNR (peak signal noise ratio)) or has a higher PSNR in the same payload.


Transactions on Data Hiding and Multimedia Security | 2009

Optimum Histogram Pair Based Image Lossless Data Embedding

Guorong Xuan; Yun Q. Shi; Peiqi Chai; Jianzhong Teng; Zhicheng Ni; Xuefeng Tong

This paper presents an optimum histogram pair based image reversible data hiding scheme using integer wavelet transform and adaptive histogram modification. This new scheme is characterized by (1) the selection of best threshold T , which leads to the highest PSNR of marked image for a given payload; (2) the adaptive histogram modification, which aims at avoiding underflow and/or overflow, is carried out only when it is necessary, and treats the left side and right side of histogram individually, seeking a minimum amount of histogram modification; and (3) the selection of most suitable embedding region, which attempts to further improve the PSNR of marked image in particular when the payload is low. Consequently, to our best knowledge, it can achieve the highest visual quality of marked image for a given payload as compared with the prior arts of image reversible data hiding. The experimental results have been presented to confirm the claimed superior performance.


international conference on image analysis and recognition | 2007

Reversible data hiding for JPEG images based on histogram pairs

Guorong Xuan; Yun Q. Shi; Zhicheng Ni; Peiqi Chai; Xia Cui; Xuefeng Tong

This paper proposes a lossless data hiding technique for JPEG images based on histogram pairs. It embeds data into the JPEG quantized 8x8 block DCT coefficients and can achieve good performance in terms of PSNR versus payload through manipulating histogram pairs with optimum threshold and optimum region of the JPEG DCT coefficients. It can obtain higher payload than the prior arts. In addition, the increase of JPEG file size after data embedding remains unnoticeable. These have been verified by our extensive experiments.


international workshop on digital watermarking | 2006

Steganalysis using high-dimensional features derived from co-occurrence matrix and class-wise non-principal components analysis (CNPCA)

Guorong Xuan; Yun Q. Shi; Cong Huang; Dongdong Fu; Xiuming Zhu; Peiqi Chai; Jianjiong Gao

This paper presents a novel steganalysis scheme with high-dimensional feature vectors derived from co-occurrence matrix in either spatial domain or JPEG coefficient domain, which is sensitive to data embedding process. The class-wise non-principal components analysis (CNPCA) is proposed to solve the problem of the classification in the high-dimensional feature vector space. The experimental results have demonstrated that the proposed scheme outperforms the existing steganalysis techniques in attacking the commonly used steganographic schemes applied to spatial domain (Spread-Spectrum, LSB, QIM) or JPEG domain (OutGuess, F5, Model-Based).


international conference on pattern recognition | 2006

Feature Selection based on the Bhattacharyya Distance

Guorong Xuan; Xiuming Zhu; Peiqi Chai; Zhenping Zhang; Yun Q. Shi; Dongdong Fu

This paper presents a Bhattacharyya distance based feature selection method, which utilizes a recursive algorithm to obtain the optimal dimension reduction matrix in terms of the minimum upper bound of classification error under normal distribution for multi-class classification problem. In our scheme, PCA is incorporated as a pre-processing to reduce the intractably heavy computation burden of the recursive algorithm. The superior experimental results on the handwritten-digit recognition with the MNIST database and the steganalysis applications have demonstrated the effectiveness of our proposed method.


international conference on pattern recognition | 2008

Reversible binary image data hiding by run-length histogram modification

Guorong Xuan; Yun Q. Shi; Peiqi Chai; Xuefeng Tong; Jianzhong Teng; Jue Li

A novel reversible binary image data hiding scheme using run-length (RL) histogram modification is presented in this paper. The binary image is scanned from left to right and from top to bottom to form a sequence of alternative black RL and white RL. Combining one black RL and its immediate next white RL, we form one RL couple, thus generating a sequence of RL couples. The length of each couple is fixed during data embedding in order not to fail the reversibility. Two procedures are adopted to achieve reversibility: (1) only involve those RL couples in data embedding in which the length of couple is not shorter than threshold T1; (2) increase white RL of isolated white pixels from one to two. Another parameter T indicates where to embed data in black RL histogram. Adjusting T1 and T may result in optimum performance of pure embedding rate versus visual quality of marked image. The proposed scheme works for text, graphics, and their mixture, both halftone and nonhalftone binary images. Experimental works have shown its superior performs over the prior-arts.

Collaboration


Dive into the Peiqi Chai's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Yun Q. Shi

New Jersey Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Dekun Zou

New Jersey Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Dongdong Fu

New Jersey Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge