Patents by Inventor Qing Shi

Qing Shi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7706566
    Abstract: A system and method are disclosed which may include subjecting an original, pixel domain image to an Integer Wavelet Transform (IWT) to obtain a matrix of IWT coefficients; selecting a plurality of the IWT coefficients for incorporation of information therein; and setting signs for the plurality of selected IWT coefficients according to bit values of a plurality of respective data bits. The system and method can also include subjecting a marked pixel domain image to an Integer Wavelet Transform to obtain a matrix of wavelet coefficients; selecting a plurality of the coefficients from the matrix that contain embedded information; and for each selected coefficient, extracting the data bit embedded in the coefficient, a bit value of the extracted data bit determined based on a sign of the coefficient.
    Type: Grant
    Filed: February 28, 2005
    Date of Patent: April 27, 2010
    Assignee: New Jersey Institute of Technology
    Inventors: Yun-Qing Shi, Guorong Xuan
  • Publication number: 20100098287
    Abstract: Methods for reversible data hiding are disclosed herein. These methods may be applied to images for reversible image data hiding. In one embodiment, a method for reversible data hiding comprises identifying carrier data having a plurality of components and establishing prediction-errors for each of the components of the carrier data. A first threshold and a second threshold are established. The prediction-errors of the components are evaluated against the first threshold to identify components for possible hiding. The components identified for possible hiding are evaluated against the second threshold to identify components for hiding. To-be embedded data is embedded into the carrier data identified for hiding to create marked data. The marked data is evaluated for overflow or underflow. If overflow or underflow is detected, histogram modification is performed. Marked data is then established.
    Type: Application
    Filed: October 17, 2008
    Publication date: April 22, 2010
    Inventors: Guorong Xuan, Yun-Qing Shi
  • Publication number: 20100091981
    Abstract: Techniques described herein are generally related to steganalysis of suspect media. Steganalysis techniques may include receiving instances of suspect media as input for steganalytic processing. A first set of quantized blocks of data elements may be identified within the media, with this first set of blocks being eligible to be embedded with steganographic data. A second set of quantized blocks of data elements may be identified within the media, with this second set of blocks being ineligible to be embedded with steganographic data. The steganalysis techniques may requantize the first and second blocks. In turn, these techniques may compare statistics resulting from requantizing the first block with statistics resulting from requantizing the second block. The steganalysis techniques may then assess whether the first block of data elements is embedded with steganographic features based on how the statistics of the second blocks compare with the statistics of the first blocks.
    Type: Application
    Filed: April 13, 2009
    Publication date: April 15, 2010
    Inventors: Yun-Qing Shi, Bin Li
  • Publication number: 20090263011
    Abstract: Techniques are generally described to determine whether a JPEG image has undergone two compressions. Probabilities can be computed for the first digits of quantized DCT (discrete cosine transform) coefficients from a set of AC (alternate current) modes to detect or determine whether the JPEG image has undergone two compressions. The set of AC modes may include a predetermined number of distinguishable AC modes where a distinguishable AC mode may be an AC mode in which a second quantization step (QS2) is not an integer multiple of the first quantization step (QS1). Classifiers may be created during a training process, and later may be used to assist in determining whether a suspect JPEG image has undergone two compressions. When the classifiers support a multi-classification system, described detection techniques may also be arranged to determine a primary quality factor for the double compressed JPEG image.
    Type: Application
    Filed: April 10, 2009
    Publication date: October 22, 2009
    Inventors: Yun-Qing Shi, Bin Li
  • Publication number: 20090257490
    Abstract: Implementations of the detection of double MPEG compression using digit based statistics are disclosed.
    Type: Application
    Filed: April 10, 2009
    Publication date: October 15, 2009
    Inventors: Wen Chen, Yun-Qing Shi
  • Publication number: 20090257656
    Abstract: Techniques are generally described for detecting double JPEG compression in images. Example detection techniques of double JPEG compression may include receiving JPEG images for analysis and extracting 2-dimensional (2-D) arrays of JPEG coefficients from the images. 2-D difference arrays may be generated from the array of JPEG coefficients, with the entries in the difference array reflecting relative changes in values of pairs of entries in the array of JPEG coefficients. The detection techniques also model the difference arrays using random processes, and evaluate whether the random processes reveal statistical artifacts in the JPEG images. These statistical artifacts result from double JPEG impression performed on the JPEG images.
    Type: Application
    Filed: April 13, 2009
    Publication date: October 15, 2009
    Inventors: Yun-Qing Shi, ChunHua Chen
  • Publication number: 20090196500
    Abstract: A method of hiding data comprising creating a histogram of an attribute of a first data set. The histogram includes occurrences of the attribute. Two adjacent occurrences are selected where a count of one of the two adjacent occurrences is zero. A second data set is embedded in data of the first data set associated with the selected adjacent occurrences.
    Type: Application
    Filed: January 30, 2009
    Publication date: August 6, 2009
    Inventors: Yun-Qing Shi, GuoRong Xuan
  • Publication number: 20090154797
    Abstract: An apparatus and method for steganalysis that enhances the ability to detect distortion introduced by data hiding. In embodiments of the invention, a pixel grayscale value in an image is predicted by using its neighboring grayscale values of neighboring pixels. Further, a prediction-error image is produced by subtracting the image from its predicted image. The prediction-error image may is employed to remove at least some variations in image data other than those associated with data hiding an thus, at least partially offsets variations from image aspects other than data hiding.
    Type: Application
    Filed: February 23, 2009
    Publication date: June 18, 2009
    Applicant: New Jersey Institute of Technology
    Inventors: Yun-Qing Shi, Guorong Xuan
  • Patent number: 7496210
    Abstract: Briefly, embodiments of a method and system for steganalysis are disclosed.
    Type: Grant
    Filed: January 25, 2006
    Date of Patent: February 24, 2009
    Assignee: New Jersey Institute of Technology
    Inventors: Yun-Qing Shi, Guorong Xuan
  • Publication number: 20080293087
    Abstract: The present invention relates to isolated sulfonylurea receptor polynucleotides and polypeptides, as well as vectors and cells lines containing the polynucleotides and polypeptides. The present invention also relates to methods of using cell lines containing the polynucleotides and polypeptides to identify agents that are useful in ischemic preconditioning.
    Type: Application
    Filed: October 31, 2007
    Publication date: November 27, 2008
    Inventors: Jonathan C. Makielski, Nian-Qing Shi, Bin Ye
  • Patent number: 7457431
    Abstract: A method including identifying at least two subsets of pixels within a block of an image; forming a plurality of pixel groups from the at least two subsets of pixels, each pixel group having at least one pixel from a first of the at least two subsets and at least one pixel from a second of the at least two subsets; producing a plurality of difference values, each pixel group providing one of said difference values, each difference value being based on differences between pixel values of pixels within one of the pixel groups; and modifying pixel values of pixels in less than all of the at least two subsets, thereby embedding a bit value into the block.
    Type: Grant
    Filed: December 3, 2004
    Date of Patent: November 25, 2008
    Assignee: New Jersey Institute of Technology
    Inventors: Yun-Qing Shi, Zhicheng Ni, Nirwan Ansari
  • Publication number: 20080285793
    Abstract: Methods and apparatus are provided for subjecting an original, pixel domain image to an Integer Wavelet Transform (IWT) to obtain a matrix of wavelet coefficients; selecting at least one bit plane between a least significant bit plane and a most significant bit plane of the matrix of wavelet coefficients; compressing the at least one selected bit plane to produce free space in the at least one selected bit plane; embedding hidden data in the free space of the at least one compressed bit plane; and subjecting the at least one embedded bit plane to an Inverse IWT to produce a marked pixel domain image. Methods and apparatus are also provided for reversing this process.
    Type: Application
    Filed: April 7, 2008
    Publication date: November 20, 2008
    Applicant: New Jersey Institute of Technology
    Inventors: Yun Qing Shi, Guorong Xuan
  • Publication number: 20080221217
    Abstract: The present invention is directed to compounds of formula (I) or a pharmaceutically acceptable salt thereof; wherein A is (xx); X is selected from CH, CF and N, R5 is selected from H, C1-C6 alkyl, C1-C6 fluoroalkyl, and —OR12, R9 is selected from H and —C(O)NR1OR11, R12 is selected from H, C1-C6 alkyl and C3-C6 cycloalkyl for use as inhibitors of the DPP-IV enzyme in the treatment or prevention of conditions including Type II diabetes.
    Type: Application
    Filed: July 14, 2006
    Publication date: September 11, 2008
    Inventors: Larry Chris Blaszczak, Shon Roland Pulley, Michael Alan Robertson, Scott Martin Sheehan, Qing Shi, Brian Morgan Watson, Michael Robert Wiley
  • Publication number: 20080214616
    Abstract: The present invention is directed to compounds of formula (I) or a pharmaceutically acceptable salt thereof; wherein A is (1); X is selected from CH, CF and N; R5 is selected from H, C1-C6 fluoroalkyl, and —OR12; R9 is selected from H —NR13C(O)R14 and —C(O)NR10R11; R12 is selected from H, C1-C6 alkyl and C3-C6 cycloalkyl, for use as inhibitors of the DPP-IV enzyme in the treatment or prevention of conditions including Type II diabetes.
    Type: Application
    Filed: July 14, 2006
    Publication date: September 4, 2008
    Inventors: Larry Chris Blaszczak, Brian Michael Mathes, Shon Roland Pulley, Michael Alan Robertson, Scott Martin Sheehan, Qing Shi, Brian Morgan Watson, Michael Robert Wiley
  • Publication number: 20080207735
    Abstract: The present invention is directed to compounds of formula (I): or a pharmaceutically acceptable salt thereof; wherein A is (II); X is selected from CH, CF and N, R8 is selected from H, C1-C6 alkyl, aryl, heteroaryl, C1-C6 alkylaryl, C1-C6 alkylheteroaryl, C2-C6 alkyl-O—C1-C6 alkyl, C1-C6 haloalkyl, hydroxy C2-C6 alkyl, —C(O)R9 and —SO2R9, or R7 and R8 combine to form (III), (IV); W is selected from CR1O and CR15, R1O is selected from H, halo, —C(O)NR13R14, C1-C6 alkyl, aryl, heteroaryl, C1-C6 alkylaryl, C1-C6 alkylheteroaryl, C1-C6 alkyl-O—C1-C6 alkyl and hydroxy C1-C6 alkyl; Het is a N-linked 5-membered heteroaryl ring optionally substituted with 1-3 substituents selected from methoxy, Cl, F, CH3, CF3, aryl, heteroaryl, C1-C4 alkylaryl or C1-C4 alkylheteroaryl, for use as inhibitors of the DPP-IV enzyme in the treatment or prevention of conditions including Type II diabetes.
    Type: Application
    Filed: July 14, 2006
    Publication date: August 28, 2008
    Inventors: Larry Chris Blaszczak, Shon Roland Pulley, Michael Alan Robertson, Scott Martin Sheehan, Qing Shi, Michael Robert Wiley
  • Publication number: 20080199093
    Abstract: Embodiments of the invention are directed toward reversible/invertible and lossless, image data hiding that can imperceptibly hide data into digital images and can reconstruct the original image without any distortion after the hidden data have been extracted in various digital image formats including, but not limited to Joint Photographic Experts Group (JPEG). In particular, embodiments of the invention provide a lossless data hiding technique for JPEG images based on histogram pairs. that embeds data into the JPEG quantized 8×8 block DCT coefficients and achieves good performance in terms of peak signal-to-noise ratio (PSNR) versus payload through manipulating histogram pairs with optimum threshold and optimum region of the JPEG DCT coefficients. Furthermore, the invented technology is expected to be able to apply to the I-frame of Motion Picture Experts Group (MPEG) video for various applications including annotation, authentication, and forensics.
    Type: Application
    Filed: February 19, 2007
    Publication date: August 21, 2008
    Inventors: Yun-Qing Shi, Guorong Xuan
  • Patent number: 7415155
    Abstract: Methods and apparatus are provided for encoding a pixel domain image with hidden data by modifying the histogram of the pixel domain image to make space for such hidden data.
    Type: Grant
    Filed: April 12, 2004
    Date of Patent: August 19, 2008
    Assignee: New Jersey Institute of Technology
    Inventors: Yun-Qing Shi, Zhi-Cheng Ni, Nirwan Ansari
  • Publication number: 20080193031
    Abstract: Embodiments of the invention are directed toward methods for an effective blind, passive, splicing/tampering detection. The methods of the various embodiments of the invention use a natural image model to detect image splicing/tampering with a model that is based on statistical features extracted from a given test image and multiple 2-D arrays generated by applying the block discrete cosine transform (BDCT) with several different block-sizes to the test images. Experimental results have demonstrated that the new splicing detection scheme outperforms state-of-the-art methods by a significant margin when applied to the Columbia Image Splicing Detection Evaluation Dataset.
    Type: Application
    Filed: February 9, 2007
    Publication date: August 14, 2008
    Applicant: NEW JERSEY INSTITUTE OF TECHNOLOGY
    Inventors: Yun-Qing Shi, Chunhua Chen
  • Publication number: 20080175429
    Abstract: Embodiments of the invention are directed toward methods for steganalysis that improve the detection of steganography in texture images. The methods combine features extracted from the image spatial representation and from a block discrete cosine transform (BDCT) representation with multiple different block sizes (i.e., N×N) to improve detection of data hidden in texture images. Image data that is to undergo steganalysis can be provided to embodiments of the invention in at least one of spatial (pixel) and JPEG format. When JPEG format is provided, the image is first decompressed to spatial representation, from which the features are extracted when the block size is at least one 2×2, 4×4, and 16×16. When the block size is 8×8, the JPEG coefficients (JPEG quantized 8×8 BDCT coefficients) derived directly from the JPEG image are used to extract features. In addition, the method is also effective as a universal steganalyzer for both texture and smooth/non-texture images.
    Type: Application
    Filed: January 19, 2007
    Publication date: July 24, 2008
    Applicant: New Jersey Institute of Technology
    Inventors: Yun-Qing Shi, Chunhua Chen
  • Publication number: 20080175480
    Abstract: Computer graphics may be detected in digital images by extracting a first set of features from an input digital image, extracting a second set of features from a prediction-error image derived from the input digital image, and applying a classification algorithm to the first set of features and the second set of features to determine if the combined sets of features indicate that the input digital image corresponds to computer graphics.
    Type: Application
    Filed: January 18, 2007
    Publication date: July 24, 2008
    Applicant: NEW JERSEY INSTITUTE OF TECHNOLOGY
    Inventors: Yun-Qing Shi, Wen Chen