Research article Special Issues

Removing barriers to women entrepreneurs’ engagement in decentralized sustainable energy solutions for the poor

  •  Rapidly falling renewable technology costs and new business models mean that decentralized energy solutions hold great promise to accelerate universal sustainable energy access. Across developing countries, women are typically the primary household energy managers. Close to their customers, women entrepreneurs have the potential to lower customer acquisition and servicing costs and drive these new decentralized solutions. However, they remain under-represented in the industry.
    This paper attempts to understand the root causes of this gender gap. It formulates the research hypothesis that market transformation policies intended to reduce investment risks to accelerate energy access may not benefit men and women entrepreneurs equally because of the existing structural barriers that women face. To test this hypothesis, the paper conducts a gender sensitive investment barrier and risk analysis, overlaid onto an existing gender neutral taxonomy of investment barriers and risks for decentralized sustainable energy solutions.
    A key finding is that for women entrepreneurs, existing structural impediments to gender equality translate into additional investment barriers as well as increased likelihood of occurrence and severity of the financial impact of generic investment risks. The paper offers an illustrative theory of change to facilitate a dialogue on the specific interventions needed to address these gender differentiated risks locally. It concludes that market transformation efforts for universal sustainable energy access must include targeted policy measures to ensure equal benefits to men and women entrepreneurs, and optimize the use of public resources to catalyze private investment and reduce poverty.

    Citation: Yannick Glemarec, Fiona Bayat-Renoux, Oliver Waissbein. Removing barriers to women entrepreneurs’ engagement in decentralized sustainable energy solutions for the poor[J]. AIMS Energy, 2016, 4(1): 136-172. doi: 10.3934/energy.2016.1.136

    Related Papers:

    [1] Chuanda Cai, Changgen Peng, Jin Niu, Weijie Tan, Hanlin Tang . Low distortion reversible database watermarking based on hybrid intelligent algorithm. Mathematical Biosciences and Engineering, 2023, 20(12): 21315-21336. doi: 10.3934/mbe.2023943
    [2] Hongyan Xu . Digital media zero watermark copyright protection algorithm based on embedded intelligent edge computing detection. Mathematical Biosciences and Engineering, 2021, 18(5): 6771-6789. doi: 10.3934/mbe.2021336
    [3] Qichao Ying, Jingzhi Lin, Zhenxing Qian, Haisheng Xu, Xinpeng Zhang . Robust digital watermarking for color images in combined DFT and DT-CWT domains. Mathematical Biosciences and Engineering, 2019, 16(5): 4788-4801. doi: 10.3934/mbe.2019241
    [4] Shanqing Zhang, Xiaoyun Guo, Xianghua Xu, Li Li, Chin-Chen Chang . A video watermark algorithm based on tensor decomposition. Mathematical Biosciences and Engineering, 2019, 16(5): 3435-3449. doi: 10.3934/mbe.2019172
    [5] Wenfa Qi, Wei Guo, Tong Zhang, Yuxin Liu, Zongming Guo, Xifeng Fang . Robust authentication for paper-based text documents based on text watermarking technology. Mathematical Biosciences and Engineering, 2019, 16(4): 2233-2249. doi: 10.3934/mbe.2019110
    [6] Yan Li, Junwei Wang, Shuangkui Ge, Xiangyang Luo, Bo Wang . A reversible database watermarking method with low distortion. Mathematical Biosciences and Engineering, 2019, 16(5): 4053-4068. doi: 10.3934/mbe.2019200
    [7] Qiuling Wu, Dandan Huang, Jiangchun Wei, Wenhui Chen . Adaptive and blind audio watermarking algorithm based on dither modulation and butterfly optimization algorithm. Mathematical Biosciences and Engineering, 2023, 20(6): 11482-11501. doi: 10.3934/mbe.2023509
    [8] Kaimeng Chen, Chin-Chen Chang . High-capacity reversible data hiding in encrypted images based on two-phase histogram shifting. Mathematical Biosciences and Engineering, 2019, 16(5): 3947-3964. doi: 10.3934/mbe.2019195
    [9] Haoyu Lu, Daofu Gong, Fenlin Liu, Hui Liu, Jinghua Qu . A batch copyright scheme for digital image based on deep neural network. Mathematical Biosciences and Engineering, 2019, 16(5): 6121-6133. doi: 10.3934/mbe.2019306
    [10] Guodong Ye, Huishan Wu, Kaixin Jiao, Duan Mei . Asymmetric image encryption scheme based on the Quantum logistic map and cyclic modulo diffusion. Mathematical Biosciences and Engineering, 2021, 18(5): 5427-5448. doi: 10.3934/mbe.2021275
  •  Rapidly falling renewable technology costs and new business models mean that decentralized energy solutions hold great promise to accelerate universal sustainable energy access. Across developing countries, women are typically the primary household energy managers. Close to their customers, women entrepreneurs have the potential to lower customer acquisition and servicing costs and drive these new decentralized solutions. However, they remain under-represented in the industry.
    This paper attempts to understand the root causes of this gender gap. It formulates the research hypothesis that market transformation policies intended to reduce investment risks to accelerate energy access may not benefit men and women entrepreneurs equally because of the existing structural barriers that women face. To test this hypothesis, the paper conducts a gender sensitive investment barrier and risk analysis, overlaid onto an existing gender neutral taxonomy of investment barriers and risks for decentralized sustainable energy solutions.
    A key finding is that for women entrepreneurs, existing structural impediments to gender equality translate into additional investment barriers as well as increased likelihood of occurrence and severity of the financial impact of generic investment risks. The paper offers an illustrative theory of change to facilitate a dialogue on the specific interventions needed to address these gender differentiated risks locally. It concludes that market transformation efforts for universal sustainable energy access must include targeted policy measures to ensure equal benefits to men and women entrepreneurs, and optimize the use of public resources to catalyze private investment and reduce poverty.


    Reversible image watermarking technology requires that the embedding of the watermark information into the original images should be conducted on the premise of ensuring the visual quality of the images; meanwhile the original images can be restored nondestructively after extracting the watermark. Compared with the digital image watermarking [1], reversible image watermarking has higher requirements on watermark embedding, which also makes it more widely studied and applied in military, medical, and other fields with high image authenticity and integrity. One of the fundamental goals of watermarking is to increase the embedding rate while reducing the certain visual quality of the image.

    Tian [2] proposed a reversible watermarking technology with high embedding rate, which used the difference expansion (DE) to embed watermark based on adjacent pixel pairs. This algorithm has attracted great attentions. Consequently, a number of improved embedding algorithms have been developed based on the DE.

    However, using the DE method, an overflow will be generated, which will degrade the watermarking embedding quality. Therefore, removing the overflow location map is greatly valuable to enhance the performance of the algorithms. A reversible watermarking algorithm that combined the DE and the reversible contrast map was proposed in [3]. In this algorithm, the contrast pixel pair was mainly used to embed a small amount of auxiliary information instead of the location map, and the embedding capacity was greatly enhanced. However, the deterioration in image quality was more serious. Wang et al. [4] proposed a reversible watermarking method based on difference histogram. It was more unique in terms of overflow processing, but it still needed to embed a compressed positioning map. A reversible image watermarking scheme based on the DE effectively tackled the issues of overflow and underflow encountered during embedding in [5]. A quadratic DE based reversible technique was developed by Zhang et al. [6] where the DE was applied twice to improve the security and embedding capacity while ensuring the quality. The location map was not generated, which further allowed hiding large watermark.

    The reversible image watermarking algorithm combining the DE with the least significant bit (LSB) was proposed in [7]. The algorithm realized greater embedding capacity while maintaining better imperceptibility. By combining histogram transform and prediction DE, Lin et al. [8] put forward a reversible watermarking technology, which effectively expanded the embedding capacity and achieved promising results.

    Muhammad et al. [9] introduced a reversible image watermarking algorithm based on Genetic Programming (GP). Firstly, the algorithm resolved the image pixels, then executed integer wavelet transform (IWT) on the adjusted image, and blocked the sub-band coefficients without overlapping. The GP algorithm was implemented to achieve the optimal load for coefficient compression, and subsequently, the LSB was utilized to embed the watermark into the compressed coefficients. The algorithm guaranteed that the image embedded with the watermark had better visibility and higher payload. A reversible image watermarking algorithm based on local prediction was put forward by Vinoth et al. [10]. This algorithm divided image into many blocks with no superposition. Pixels on the edge of the block were detected by Median Edge Detection predictor (MED), and other pixels were predicted by local prediction. It had better visual quality and lower embedding rate. Jia et al. [11] proposed a reversible data hiding algorithm to lessen an invalid pixel shift in histogram shift. Based on image texture, the algorithm reduced the invalid shift of pixels in the histogram shift. The algorithm had distinguished embedding capacity and visual quality.

    Literature [12] proposed an enhanced reduced DE based reversible image watermarking aiming to reduce the loss of image quality during embedding. Likewise, Yu et al. [13] also proposed a reversible watermarking algorithm based on multidimensional prediction error expansion, which can reduce the embedding distortion by discarding the embedding map that may produce high distortion. The algorithm was more suitable for images with smooth and simple textures. In addition, a reversible watermarking based on double-layer difference expansion was proposed in [14]. In this algorithm, smooth pixel pairs were preferred to embed watermark, and the distortion can be well controlled. However, the embedding rate was not high.

    Based on the analysis of the traditional DE watermarking, an improved large-capacity reversible image watermarking algorithm based on the DE is proposed in this paper, which can effectively improve the embedding capacity and reduce the image distortion. It provides an effective solution to avoiding pixel overflow.

    The reversible image watermarking studied mainly uses multi-scale decomposition, interpolation expansion, generalized difference expansion (GDE) and overflow processing to realize the embedding and extraction of watermarking algorithm.

    Compared to the adjacent pixel expansion algorithm presented by Tian [2], generalized difference expansion algorithm makes more fully use of the redundant information between adjacent pixels. It picks up a plurality of adjacent pixels for processing, and which can be used to embed more watermark information. This paper uses this method to embed information into the selected original image pixel blocks. Suppose X = (x0, x1, x2, x3, …, xn-1) is a set of pixel values, the direct transform of the generalized integer transform is:

    $ ˉx=n1i=0aixi/n1i=0aid1=x1x0d2=x2x0dn1=xn1x0
    $
    (1)

    For a group of pixel interpolations $ {d}_{1}, {d}_{2} $, …, $ {d}_{n-1}, $ Eq (2) can be used separately to hide 1 bit watermark information b:

    $ d_i^{\prime} = 2 \times {d_i} + b $ (2)

    where $ {d}_{i}^{\text{'}} $ is the pixel difference after embedding the watermark. It requires the watermark embedding process not to cause the overflow of image pixel values. The corresponding inverse transform is:

    $ x0=ˉxn1i=1di/n1i=0ai.x1=x0+d1x2=x0+d2xn1=x0+dn1
    $
    (3)

    A set of pixel values $ {\mathrm{X}}^{\text{'}} = ({x}_{0}^{\text{'}}, {x}_{1}^{\text{'}}, {x}_{2}^{\text{'}}, x3, \dots, {x}_{n-1}^{\text{'}}) $ is generated by the generalized difference expansion algorithm, in which the mean of the group pixels is:

    $ \text{ }{\overline{x}}^{\text{'}} = \lfloor {\displaystyle}\sum\limits_{i = 0}^{n-1}{a}_{i}{x}_{i}^{\text{'}}/{\displaystyle}\sum\limits_{i = 0}^{n-1}{a}_{i}\rfloor $ (4)

    After deduction and calculation, $ {\stackrel{-}{x}}^{\mathrm{\text{'}}}-\stackrel{-}{x} = 0 $. Visibly a group of pixels have the same group mean value after the generalized difference expansion transform. After using the generalized difference expansion algorithm to embed information into the pixel blocks, the mean value of the block pixels should be unchanged, and that is a fairly strict requirement.

    An image F is divided into multiple scales from a whole to parts, thus obtaining sub-image blocks Fi, j at different scales, where i = 1, 2, …, d is denoted as the segmentation scale; j = 1, … 4i-1 is denoted as the number of sub-blocks at each scale. Due to the limited size of the image, the segmentation scale is also limited.

    The segmentation method is displayed in Figure 1. From left to right there is segmentation from the 1st to the 3rd scales, respectively. The whole image is the sub-blocks F1, 1 obtained after being decomposed at the 1st scale, and then the whole image is divided into four sub-blocks F2, 1, F2, 2, F2, 3 and F2, 4; each sub-block is called a second scale sub-block, and then they are divided until they reach the maximum scale set.

    Figure 1.  Multi-scale segmentation of Lena image.

    As the traditional multi-scale decomposition also belongs to fixed-sized block decomposition method, this paper makes an improvement of the multi-scale decomposition.

    The improved image multi-scale decomposition is to divide a rectangular image into 4 equal-sized square blocks, and then determine whether or not these four square blocks meet the homogeneity criterion. If it is satisfied, the current block maintains unchanged; otherwise it continues to be decomposed into four square blocks, and determines whether or not they meet the criterion, until all the blocks meet the given criterion. The decomposition criterion can be expressed as:

    $ \left| {{p_i} - {p_{ave}}} \right| > ({g_l} - 1) \times \gamma $ (5)

    In Formula (5), $ {P}_{i} $ and $ {P}_{ave} $ are the gray value of any pixel and the average gray value of all pixels in a square block, respectively; $ {\mathit{g}}_{l} $ is the gray level of a pixel; $ \gamma $ is a decimal in the range of [0, 1]. The criterion is, when the guidelines when the absolute value of the difference between the gray value of either pixel and the average gray value of all pixels in the square block is greater than $ ({\mathit{g}}_{l}-1)\times \gamma $, the block needs to be further divided, as shown in Figures 2 and 3.

    Figure 2.  Original image.
    Figure 3.  The generated block map after modified multi-scale decomposition.

    As per the block division method, it divides images into unfixed sizes. Also from the perspective of the division results, the image blocks decomposed have pixels with high homogeneity, which are suitable for lossless watermark embedding. As specified in the algorithm, the minimum block size is 4$ \times $4.

    After multi-scale decomposition, the size of each image block is $ {2}^{2+n}\times {2}^{2+n} $, $ n\in \left\{\mathrm{0, 1}, 2\dots, 7\right\} $. The size information of each block can be converted into binary form. Each of the decomposed sub-blocks is coded by the sub-block size, as shown in Table 1.

    Table 1.  Scale coding of image block after multi-scale decomposition.
    Size / pixels code Size / pixels code
    4$ \times $4 000 64$ \times $64 100
    8$ \times $8 001 128$ \times $128 101
    16$ \times $16 010 256$ \times $256 110
    32$ \times $32 011 512$ \times $512 111

     | Show Table
    DownLoad: CSV

    After multi-scale decomposition, the image sub-blocks obtained are sorted (from top to bottom, from left to right), and the scale information of each sub-block is recorded sequentially as per the ordering result, thereby constituting the decomposition information q of the original image. Given there are a small number of large-sized blocks decomposed, Huffman encoding [15] can be used to further reduce the length of the image decomposition information, denoted as Huf (q).

    For security of the algorithm, the length and encode table of the parameter Huf (q) are sent to the recipient in form of a secret key.

    The GDE algorithm may produce an overflow after embedding watermark. The overflow processing will have a significant impact on the watermark embedding capacity. In this paper, the overflow points generated by embedding the watermark into the original image are labeled in a location map having the same image size. The generated location map is a binary image marked by 0 or 1 for each pixel. At the same time, for the overflow point, the original pixel value is replaced by the generated value by using the GDE. The difference between the generated value and the maximum pixel value of the image is taken into consideration by the inverse DE to calculate the new pixel value.

    The 2 × 2 image block contains 4 pixel values (a, b, c, d). After embedding the watermark through the GDE, it becomes 4 new pixel values (A, B, C, D). If the generated second pixel overflows, it will be overflowed to make its gray value within the range of 0–255 in order to complete the watermark embedding. The specific adjustment is carried out as follows:

    If the generated pixel value B is positive overflow, the transformed pixel value is $255 - \left| {B{\text{ - 255}}} \right|$.

    If the generated pixel value B is negative overflow, the transformed pixel value is $0{\text{ + }}\left| {B{\text{ - 0}}} \right|$.

    For instance, if the pixel value generated by the DE is 266, the new image pixel value will be 244. The transform is detailed as follows:

    $ 266 – 255 = 11 $
    $ 255 – 11 = 244 $

    The original image is divided into sub-blocks with a size of 2 × 2 pixels. As shown in Figure 4, if the pixel values in one of the sub-blocks are (244,254,250,248), the amount of the watermark embedded by the GDE is 3 bits. Suppose that the embedded watermark is (1, 1, 1), then, the pixel values of the generated image sub-block are (239,260,252,248) by using a generalized difference transform processing. As a result, the value of the second pixel in the image sub-block will overflow and the overflow processing is needed to better embed the watermark.

    Figure 4.  Overflow processing flow chart.

    Through performing inverse difference transform, the pixel values of the image sub-block are (239,250,252,248). After embedding the watermark information (1, 1, 1) into the transformed sub-block by using the generalized difference transform again, the pixel values of the new sub-block are (230,253,257,249). The sub-block overflows by using the GDE, and the pixel values of the generated sub-block are (230,253,253,249) by performing inverse transformation.

    After overflow processing, the watermark can be embedded into the generated overflow pixels by using the GDE. The overflow point generated by the last DE is expressed by using overflow location. Keeping certain visual quality, the overflow algorithm can carry out multiple times for watermark embedding.

    As mentioned in Section 1, the shortcomings in terms of embedding capacity and visual quality of the watermarked images in previous schemes is identified. At the same time, the existing algorithms do not deal with overflow very well. In order to solve the problems of bad imperceptibility and low embedding rate of the existing algorithms, a novel large-capacity reversible image watermarking based on the DE is proposed. The proposed scheme effectively controls the overflow of pixel values when embedding watermark with the DE, and uses multi-scale decomposition technology to remove the abrupt points in each image-block. After the information is embedded into the sub-block by the GDE, the average value of the pixels in each sub-block remains unchanged to extract the watermark information effectively. The scheme is made of two procedures: watermark embedding and watermark extraction.

    The embedding process of the reversible watermarking algorithm is shown in Figure 5, and the specific operation flow is described as follows:

    Figure 5.  Watermark embedding flow chart.

    STEP1: The watermark W' is obtained when the watermark W is scrambled by using Arnold transform [16]. The W' is converted into a one-dimensional binary sequence. To enhance robustness and security, the scrambling method is improved as follows:

    $ \text{ }\left(x'y'
    \right) = {\left(\begin{array}{c}\begin{array}{cc}1& 1\end{array}
    \\ 12
    \end{array}\right)}^{c}{\left(\begin{array}{c}\begin{array}{cc}2& 1\end{array}
    \\ 11
    \end{array}\right)}^{d}\left(xy
    \right)mod\text{ }M\;\; x{\text{'}}, y{\text{'}} \in \left\{ {0, 1, 2, \cdots , N - 1} \right\} $
    (6)

    where $\left({x, y} \right)$ is the coordinate of the original image pixel, $\left({x', y'} \right)$is the transformed coordinate, M refers to the size of the image matrix, and c and d are the randomly generated scrambled numbers.

    STEP2: The original image I ($M \times N$, M and N are all integer multiples of 4 is divided into non-overlapping image sub-blocks Ii, $i \in \left({0, \frac{{M \times N}}{{4 \times 4}}{\text{ - }}1} \right)$;

    STEP3: The smoothness value of each block Ii is calculated [18], then all sub-blocks are sorted in an ascending order with respect to their smoothness values, along with the establishment of a sort index table according to the sorting results. Finally, the blocks in front of the sequence are selected properly to embed the watermark in turn;

    STEP4: There may be abrupt points in the selected image sub-block Ii. In this regard, the multi-scale decomposition algorithm is applied to delete the image sub-blocks with abrupt points. The effective watermark information will not be embedded into these blocks. Finally, according to the number of the embedded watermarks, the pixel blocks in front of the sequence (image sub-blocks containing abrupt points have been removed) are selected to embed watermarks properly;

    STEP5: Considering the requirement of watermark embedding capacity, the pixel sub-blocks (assuming the first n blocks) in front of the sequence are selected to embed the watermark in turn. Note that, the algorithm removes the selected image sub-blocks with abrupt points (if there are m blocks). Therefore, the number of image blocks used for embedding watermark information is n-m. At the same time, the sorting sequence numbers of the image sub-blocks containing abrupt points are recorded for watermark extraction.

    STEP6: The watermark is embedded into any selected sub-block Ai $\left({0 \leqslant i \leqslant n} \right)$ by using the GDE (For the block size of 4$ \times $4 pixels, the 15-bit binary watermark can be embedded). When using the DE to embed watermark, the pixels beyond the range of the gray values will be marked in the binary location map having the same size as the original image. Specifically, if an overflow occurs, a value of 1 is marked at the corresponding location, and if no overflow occurs, a value of 0 is marked at the corresponding location, thereby generating an overflow location map.

    STEP7: For identifying the corresponding pixel points of overflows, a transform algorithm (Section 2) is adopted to avoid the pixel overflow. The pixel value transform is carried out for the identified pixels, so that the watermark can be embedded with the GDE again. The overflowed pixel value is beyond the range of the image gray values, and the absolute difference is calculated to make the pixel value within a reasonable range.

    If the pixel value generated by the DE is positive overflow, that is a, the transformed pixel value is $255 - \left| {a{\text{ - 255}}} \right|$.

    If the pixel value generated by the DE is negative overflow, that is b, the transformed pixel value is $0{\text{ + }}\left| {b{\text{ - 0}}} \right|$.

    The auxiliary information (the compressed overflow graph, embedding capacity and scrambling times c and d, etc.) is hidden into the complex texture blocks.

    STEP8: For the corresponding sub-blocks not used to embed the watermark in the original image I, those are the original sub-blocks with high texture complexities. Then, the last k sub-blocks are selected to realize the embedding of the auxiliary information by the difference quantization method and the selected k is saved for watermark extraction.

    STEP9: The auxiliary information is embedded into each pixel in each selected pixel sub-block by difference quantization.

    STEP9.1: Calculate the average pixel value of each original image pixel block corresponding to the last k sub-blocks in the sorting sequence as follows:

    $ \overline {avg} = \left\lfloor {\frac{{{x_1} + {x_2} + \cdot \cdot \cdot + {x_{m \times n}}}}{{m \times n}}} \right\rfloor $ (7)

    where m and n refer to the row and column of the divided sub-blocks, respectively. ${x_1}, {x_2}, \ldots {x_m}, {x_n}$ are the pixels contained in the sub-blocks.

    STEP9.2: The maximum pixel value and the minimum pixel value in each sub-block are obtained, and the auxiliary information is embedded using difference quantization. Each image sub-block can embed two bits of auxiliary information using difference quantization. In each sub-block, one bit of the auxiliary information is embedded by comparing the minimum pixel value and the average value, and then the next bit of the auxiliary information is embedded by comparing the maximum pixel value and the average value.

    1) Embed the auxiliary information by comparing the minimum pixel value and the average value.

    $ a' = \left\{ {a1((¯avga)%2=1,w=1)||((¯avga)%2=0,w=0)a((¯avga)%2=1,w=0)||((¯avga)%2=0,w=1)
    } \right. $
    (8)

    where, a represents the pixel value to be embedded; $\overline {avg} $ refers to the average value of the pixels in the sub-block where the embedded pixel is located; w represents the embedded binary watermark information, and % represents the operation of model.

    When embedding one bit of the auxiliary information by comparing the minimum pixel value and the average value, if ($ \left\lfloor {\overline {{\text{avg}}} - a} \right\rfloor)\% 2 = 1, w = 1 $) and ($ \left\lfloor {\overline {{\text{avg}}} - a} \right\rfloor)\% 2 = 0, w = 0 $) are established at the same time, the new minimum pixel value $ a' $ is equal to $ a - 1 $; if ($ \left\lfloor {\overline {{\text{avg}}} - a} \right\rfloor)\% 2 = 1, w = 0 $) and ($ \left\lfloor {\overline {{\text{avg}}} - a} \right\rfloor)\% 2 = 0, w = 1 $) are established at the same time, the new minimum pixel value $ a' $ is equal to a.

    2) Embed the auxiliary information by comparing the maximum pixel value and the average value.

    $ a' = \left\{ {a+1((¯avga)%2=1,w=1)||((¯avga)%2=0,w=0)a((¯avga)%2=1,w=0)||((¯avga)%2=0,w=1)
    } \right. $
    (9)

    When embedding one bit of the auxiliary information by comparing the maximum pixel value and the average value, if ($ \left\lfloor {\overline {{\text{avg}}} - a} \right\rfloor)\% 2 = 1, w = 1 $) and ($ \left\lfloor {\overline {{\text{avg}}} - a} \right\rfloor)\% 2 = 0, w = 0 $) are established at the same time, the new maximum pixel value $ a' $ is equal to $ a{\text{ + }}1 $; if ($ \left\lfloor {\overline {{\text{avg}}} - a} \right\rfloor)\% 2 = 1, w = 0 $) and ($ \left\lfloor {\overline {{\text{avg}}} - a} \right\rfloor)\% 2 = 0, w = 1 $) are established at the same time, the new maximum pixel value $ a' $ is equal to a.

    STEP10: The watermarked image ${I_i}$ is obtained by embedding the watermark information with the GDE and the differential quantization technology.

    Suppose that the watermark is embedded into any pixel pair < x, y > by the DE. If the embedded watermark is 1, the value of the new pixel pair < a, b > will be:

    $ a = \left\lfloor {\tfrac{{x + y}}{2}} \right\rfloor + \left\lfloor {\tfrac{{(x - y) \times 2 + 1 + 1}}{2}} \right\rfloor {\text{ = }}\left\lfloor {\tfrac{{x + y}}{2}} \right\rfloor + (x - y) + 1 $ (10)
    $ b = \left\lfloor {\tfrac{{x + y}}{2}} \right\rfloor - \left\lfloor {\tfrac{{(x - y) \times 2 + 1}}{2}} \right\rfloor {\text{ = }}\left\lfloor {\tfrac{{x + y}}{2}} \right\rfloor - (x - y) $ (11)

    Accordingly, $ a{\text{ - }}b{\text{ = 2}}x - 2y + 1 $

    Therefore, for all pixel pairs, if the one-bit embedded watermark value is 1, the difference between the new pixel pair is odd; otherwise, if the one-bit embedded watermark value is 0, the difference between the new pixel pair is even. Accordingly, when resorting the original image, if the difference between the generated pixel pair < a, b > is odd, the one-bit watermark value is 1, otherwise it is 0. Based on this, the watermark can be extracted in order.

    The watermark extraction flow is shown in Figure 6. The specific operation flow is detailed as follows:

    Figure 6.  The flow chart of watermark extraction and image recovery.

    STEP1: The watermarked image${I^{''}}$ (M $ \times $ N, M and N are all integer multiples of 4) is divided into non-overlapping image sub-blocks $I_i^{''}$, $i \in \left({0, \frac{{M \times N}}{{4 \times 4}}{\text{ - }}1} \right)$;

    STEP2: Calculate the smoothness value of each block$I_i^{''}$, then sort all sub-blocks in an ascending order with respect to their smoothness values and create the sort index table accordingly. Since the average value of the pixels in each sub-block remains unchanged after the information is embedded into the sub-block with the GDE, the smoothness value of the image block stays unchanged before and after the watermark is embedded, and the two sort orders are the same [18].

    STEP3: The posterior k sub-blocks in the sequence are selected to extract the auxiliary information by differential quantization.

    The auxiliary information is extracted by the difference quantization method. The order of extracting information is opposite to that of embedding information. Recall that one bit of the auxiliary information is first embedded with a minimum pixel value, and then the next bit of the auxiliary information is embedded with a maximum pixel value. Therefore, in order to keep the parity relation between the minimum value and the average value, as well as between the maximum value and the average value, before and after embedding the auxiliary information, the maximum pixel value is first used to extract one bit of the auxiliary information, and then the minimum pixel value is used to extract another bit of the auxiliary information as well.

    $ w = \left\{ {1(¯avga)%2=00(¯avga)%2=1
    } \right. $
    (12)

    where, a represents the pixel value used to extract the watermark, $\overline {avg} $ refers to the average value of the pixels in the sub-block where the embedded pixel is located, w represents the embedded binary watermark information, and % represents the operation of model.

    STEP4: According to the extracted auxiliary information, an inverse GDE is used to extract the watermark from the first n blocks that are well-ordered (remove the image sub-blocks containing the abrupt points). The watermark information W is recovered by Arnold inverse transform.

    STEP5: After extracting the watermark information, the recovered image ${I^{'''}}$ is combined with the corresponding sub-blocks containing the abrupt points to obtain the image I. The image I is then combined with the image obtained after extracting the auxiliary information to obtain the final image A.

    In this experiment, eight 8-bit standard gray images with the size of 512 × 512 pixels, including Lena, Barbara, Baboon, Pepper, Girl, Cameraman, Man and Couple were selected as the host images for watermark embedding (Figure 7) (all images were derived from http://sipi.suc.edu/database). A binary image with the size of 32 × 32 pixels was selected as the watermark image (Figure 8).

    Figure 7.  Experimental test images.
    Figure 8.  Watermark image.

    The integrity of the watermark embedding algorithm is generally measured by the NC (Normalized Correlation), whose analytical form is given in Eq (13):

    $ N\ C=\frac{\sum\limits_{i=0}^{L-1}{\sum\limits_{j=0}^{K-1}{I(i,\ j){I}'(i,\ j)}}}{\sum\limits_{i=0}^{L-1}{\sum\limits_{j=0}^{K-1}{{{\left[ I(i,\ j) \right]}^{2}}}}} $ (13)

    where, $I\left({i, j} \right)$ and ${{I}^{'}}\left({i, j} \right)$ respectively denote the pixel values at $\left({i, j} \right)$ in the original image and the carrier image of recovery after the watermark is extracted. L and K denote the numbers of rows and columns of the image respectively.

    The above Table 2 indicates the integrity assessment results of the watermarked images without attacks. It indicates that the NC values of these images are the same with the value of 1 when suffering from no attacks. In the case of no attacks, if the NC value is 1, the original image is completely restored. This shows that the carrier image restored by this algorithm has high visual quality.

    Table 2.  Integrity assessment of this algorithm without any attacks.
    Image (512 × 512 pixels) Lena Barbara Baboon Peppers Girl Cameraman Man Couple
    NC 1 1 1 1 1 1 1 1

     | Show Table
    DownLoad: CSV

    PSNR (Peak Signal to Noise Ratio) is currently one of the main indicators used to evaluate the visual quality of the reversible watermarking. The PSNR is formally formulated as shown in Eq (14):

    $ PSNR = 10{\text{log}}\left( {\frac{{{{255}^2}}}{{\frac{1}{{MN}}\mathop {\sum\limits_{i = 0}^{M - 1} {\sum\limits_{j = 0}^{N - 1} {{{\left[ {{{I}^{'}}\left( {i, j} \right) - I\left( {i, j} \right)} \right]}^2}} } }\nolimits_{}^{} }}} \right) $ (14)

    where $I\left({i, j} \right)$and ${{I}^{'}}\left({i, j} \right)$respectively denote the pixel values at position $\left({i, j} \right)$in the original image and the watermarked image. Here, M and N represent the numbers of rows and columns of the image respectively.

    The SSIM (structural similarity) is utilized to evaluate the quality of a stego image and the mathematical form of the SSIM is stated in Eq (15):

    $ SSIM(x, y\left| w \right.) = \frac{{(2{{\bar w}_x}{{\bar w}_y} + {C_1})(2{\sigma _{{w_x}{w_y}}} + {C_2})}}{{(\bar w_x^2 + \bar w_y^2 + {C_1})(\sigma _{{w_x}}^2 + \sigma _{{w_y}}^2 + {C_2})}} $ (15)

    where ${C_1}$and ${C_2}$are small constants, $\overline {{w_x}} $ is a mean value of the region${w_x}$, while $\overline {{w_y}} $ represents the average value of the region ${w_y}$.${\sigma ^2}_{{w_x}}$ is the variance of ${w_x}$, and ${{\sigma }_{{{w}_{x}}{{w}_{y}}}}$ is the covariance between the two regions. A higher value of the SSIM indicates a higher quality level for the stego image. The numeric value of the SSIM lies in the range of [0, 1]. In the evaluation of the reversible information hiding algorithm, the SSIM value of the hidden image is the value closest to 1.

    The values of the PSNR and SSIM are shown in Table 3 by using the algorithm proposed in this paper and those proposed in [17] and [10] after dividing sub-blocks with 4 × 4 pixels.

    Table 3.  Visual quality analysis of the proposed algorithm.
    Image name Proposed algorithm literature 17 literature 10
    PSNR SSIM PSNR SSIM PSNR SSIM
    Lena 54.63 0.989 46.72 0.982 52.18 0.984
    Baboon 52.36 0.987 48.37 0.985 51.37 0.988
    Barbara 53.51 0.993 47.54 0.983 51.93 0.986
    Peppers 53.14 0.991 46.81 0.981 51.73 0.987
    Girl 54.27 0.989 47.13 0.986 52.43 0.987
    Cameraman 53.69 0.991 46.92 0.982 51.52 0.985
    Man 52.73 0.988 47.98 0.984 51.49 0.987
    Couple 53.12 0.990 46.85 0.983 52.17 0.986

     | Show Table
    DownLoad: CSV

    After the watermark is embedded into the aforementioned eight images, the PSNR value of the proposed algorithm can reach as high as 54.63 dB, which is better than the algorithms in [17] and [10]. At the same time, compared with the algorithms in [17] and [10], the SSIM is also higher. As reflected from Table 3, it's not hard to see that this algorithm is better than those in [17] and [10] and achieves excellent SSIM and PSNR under the same payload capacity. It means that the proposed algorithm has better visual quality. The details are shown in Table 4.

    Table 4.  Visual effect of algorithm experiment.
    Image name Original images Watermarked images Original watermark Extracted watermark PSNR
    Lena 54.63
    Baboon 52.36
    Barbara 53.51
    Peppers 53.14
    Girl 54.27
    Cameraman 53.69
    Man 52.73
    Couple 53.12

     | Show Table
    DownLoad: CSV

    It can be witnessed from these watermarked images that the naked eye is unable to sense the presence of the watermark. The watermarked images possess good visual effects, and their corresponding PSNR values illustrate the proposed algorithm with good imperceptibility for various image types. The average PSNR value of the above eight images shown in Figure 7 after embedding the watermark is up to 53.43 dB.

    It can be seen from Tables 3 and 4, the proposed algorithm has good visual invisibility for different texture types of images. In order to estimate the maximum watermark embedding capacity, the watermark needs to be embedded into all sub-blocks (except for the block containing the abrupt points). In this paper, the algorithm can be embedded many times under the premise of guaranteeing a certain visual quality. Here, an example of one-time embedding is provided.

    As shown in Table 5, 10, 30, 70, 90 and 100% refer to the proportion of the watermark capacity to be embedded with regard to the maximum embedding capacity. The PSNR and SSIM are used to evaluate the visual quality of the watermarked images when embedding 10, 30, 70, 90 and 100% of the maximum embedding capacity. In Table 5, it is obvious that the proposed reversible watermarking technique outperforms the techniques in [17] and [18] with competitive SSIM and PSNR values in terms of payload capacity. The results show that the proposed technology not only guarantees the visual quality of the watermarked images, but also significantly improves the payload capacity.

    Table 5.  Performance comparison of watermarking algorithms.
    Image name Algorithms Embedding capacity (bit) SSIM PSNR
    10% 30% 70% 90% 100%
    Lena Literature 18 276,599 0.7331 54.37 42.92 36.83 32.91 31.95
    Literature 17 9767 0.9188 45.78 43.48 41.58 39.78 38.64
    Proposed 236,432 0.7935 48.65 45.24 38.91 37.05 36.34
    Baboon Literature 18 41,519 0.8232 51.25 42.43 34.94 33.48 31.02
    Literature 17 11,056 0.9047 45.86 43.84 41.95 40.56 39.76
    Proposed 224,512 0.8217 47.44 44.65 38.77 37.21 36.42
    Barbara Literature 18 392,740 0.6724 50.12 48.54 46.80 45.11 31.65
    Literature 17 13,232 0.8931 45.66 42.89 39.54 37.10 36.65
    Proposed 232,864 0.8011 47.33 44.14 38.47 37.28 36.17

    Peppers
    Literature 18 138,695 0.8154 52.62 42.98 35.12 33.58 31.53
    Literature 17 8562 0.9369 46.24 44.77 41.82 39.54 38.26
    Proposed 232,434 0.8115 48.13 44.35 38.54 36.79 35.84
    Girl Literature 18 293,674 0.7323 53.14 42.17 36.32 32.33 31.35
    Literature 17 14,876 0.9157 45.31 42.86 41.03 39.25 38.12
    Proposed 224,796 0.7938 48.09 44.71 38.20 36.51 35.96
    Cameraman Literature 18 179,643 0.8123 52.32 42.36 34.42 33.97 31.02
    Literature 17 12,392 0.9219 46.03 44.10 41.25 39.05 37.72
    Proposed 236,562 0.8112 47.67 43.82 38.09 36.29 35.33
    Man Literature 18 159,427 0.8032 51.47 41.49 33.35 32.99 30.42
    Literature 17 10,074 0.9182 45.91 43.85 41.07 38.79 37.41
    Proposed 224,862 0.8112 47.67 43.82 38.09 36.29 35.33
    Couple Literature 18 233,912 0.7638 52.38 42.67 34.84 33.37 31.22
    Literature 17 12,128 0.9298 46.11 44.23 41.54 39.25 37.83
    Proposed 235,956 0.8231 47.98 44.09 38.26 36.48 35.53

     | Show Table
    DownLoad: CSV

    Table 6 shows the experimental results of the calculated PSNR values, the SSIM values of the original image and the restored image after extracting the watermark, and the SSIM values of the original watermark and the extracted watermark by the three algorithms. It can be seen that the PSNR value of the watermarked image obtained by this algorithm is higher, especially much higher than that of the methods in [19]. Furthermore, the original image can be recovered after extracting the watermark, and the similarity between the extracted watermark and the original watermark is same. Compared with the methods in [1921], the proposed algorithm has improved significantly.

    Table 6.  Performance comparison of watermarking algorithms.
    Evaluating indicators Images   Algorithms
    Literature 19 Literature 20 Literature 21 Proposed
    PSNR (watermarked images) Lena 46.03 50.60 48.05 54.63
    Baboon 41.22 48.64 49.22 52.36
    Barbara 46.15 47.22 49.01 53.51
    Peppers 42.05 41.31 48.20 53.14
    Girl 45.71 49.63 48.41 54.27
    Cameraman 43.35 43.29 48.77 53.69
    Man 43.28 43.25 48.59 52.73
    Couple 42.11 41.25 48.08 53.12
    SSIM (original image and recovered image after extracting) Lena 1 0.9975 0.9945 1
    Baboon 0.9999 0.9995 0.9994 1
    Barbara 0.9999 0.9995 0.9982 1
    Peppers 0.9999 0.9954 0.9964 1
    Girl 1 0.9987 0.9954 1
    Cameraman 0.9999 0.9969 0.9968 1
    Man 0.9999 0.9973 0.9965 1
    Couple 0.9999 0.9964 0.9962 1
    SSIM (original watermark and extracted watermark) Lena 1 0.9905 0.9835 1
    Baboon 1 0.9738 0.9978 1
    Barbara 1 0.9676 0.9845 1
    Peppers 1 0.9655 0.9878 1
    Girl 1 0.9836 0.9803 1
    Cameraman 1 0.9752 0.9845 1
    Man 1 0.9749 0.9842 1
    Couple 1 0.9652 0.9875 1

     | Show Table
    DownLoad: CSV

    In this paper, 3 fixed embedding rates of 0.5, 1.0 and 1.2 bpp were selected for comparing the corresponding PSNRs, and the results are shown in Table 7. The "—" in Table 7 indicates that the corresponding experimental measurement cannot be carried out because of the characteristics of the image itself. It can be seen from Table 7, in the case of the same selected embedding rate, when the embedding rate is 0.5 bpp, the average PSNR of the proposed algorithm is 2.67 dB higher than that in [22], which is 1.93 dB higher than that in [23]. With the increase of the embedding rate, the average PSNR of the proposed algorithm is 2.6 dB higher than that in [22] when reaching 1.0 bpp, which is 1.6 dB higher than that in [23]. When the same embedding rate is 1.2 bpp, the average PSNR of the proposed algorithm is 2.5 dB higher than that in [22], which is 0.7 dB higher than that in literature [23]. The main reason for this difference is that the algorithm in [22] uses a reversible image watermarking based on the histogram shift interpolation technique. The algorithm obtains a better performance in the small embedding amount because of the more concentrated prediction error histogram. The host image exhibits a vast proportion of pixels in the lightest or darkest end. Due to the lack of a gray overflow control scheme, the auxiliary information for the host images cannot be completely saved, therefore leading to an embedding failure. In [23], the watermarks were mostly distributed in the local area with strong watermark embedding ability, and the watermarks were rarely distributed in the local area with weak watermark embedding ability. It inevitably produces distortion after iterative processing, thus affecting the image quality. Therefore, the proposed algorithm achieves a better image visual quality and is suitable for embedding high-capacity watermark information.

    Table 7.  PSNR value comparison under the same embedding rate (dB).
    Embedding rate Original images Lena Baboon Barbara Peppers Girl Cameraman Man Couple
    0.5 bpp Literature 22 42.5 33.9 42.8 -- -- -- -- --
    Literature 23 42.7 38.3 42.9 -- 41.5 41.1 40.9 --
    Proposed 41.5 40.9 41.8 41.4 41.4 41.2 41.1 41.4
    1.0 bpp Literature 22 33.2 -- 34.3 -- -- 33.7 -- --
    Literature 23 34.7 -- 35.2 -- 34.9 -- -- --
    Proposed 36.3 36.2 36.4 35.8 36.3 35.9 35.8 35.9
    1.2 bpp Literature 22 -- -- 30.9 -- -- -- -- --
    Literature 23 32.1 -- 32.8 -- 31.8 32.5 32.4 --
    Proposed 33.2 32.8 33.4 32.9 33.2 32.8 32.9 32.8

     | Show Table
    DownLoad: CSV

    This paper presents an improved large-capacity reversible image watermarking based on the DE. The algorithm can effectively improve the embedding rate and visual quality. The proposed scheme effectively controls the overflow of pixel values when embedding watermark with the DE, and uses multi-scale decomposition technology to remove the abrupt points in each image-block. On the one hand, when embedding watermark, the GDE has higher embedding amount than the DE. On the other hand, the overflow processing method proposed in this paper can improve the embedding capacity without locating the overflow pixels. There is no need to eliminate the overflow pixels which may be generated when using the GDE to embed the watermark. The GDE is used to embed the watermark directly without considering the overflow of pixels. Keeping certain visual quality, the overflow algorithm can carry out multiple times for watermark embedding. After extracting the embedded watermark, the algorithm can recover the original image without any loss. Compared with other algorithms, the main contribution of this proposed algorithm is to enhance the embedding rate while maintaining promising visual quality. The simulation results showed that the effective watermark capacity embedded in this algorithm was superior to other algorithms under the premise of maintaining good visual quality.

    This work is supported by the National Statistical Science Research Project (2018LY12), and Six Talent Peaks Project in Jiangsu Province (XYDXXJS-011).

    All authors declare no conflicts of interest in this paper.

    [1] International Energy Agency (2014) World Energy Outlook 2014 Report. Paris, France.
    [2] International Renewable Energy Agency (IRENA) (2013) Renewable Power Generation Costs in 2014, Abu Dhabi: International Renewable Energy Agency.
    [3] Hogarth R, Granoff I (2015) Speaking truth to power: Why energy distribution, more than generation, is Africa’s poverty reduction challenge, Oversee Development Institute, Working Paper 418, London, UK.
    [4] Bardouille P, Muench D (2014) How a breed of distributed energy service companies can reach 500mm energy-poor customers within a decade.
    [5] Pueyo A, Gonzales F, Dent C, et al. (2013) The Evidence of Benefits for Poor People of Increased Access Renewable Electricity Capacity: Literature Review. Brighton: Institute of Development Studies.
    [6] Torkelsson A, Angelou N (2015) Filling the Gender and Energy Data Gap. World Bank and UN Women (Forthcoming).
    [7] Sustainable Energy for All (2015) Progress towards sustainable energy. Global tracking framework 2015.
    [8] World Energy Outlook 2014– Electricity Access Database, Paris, France.
    [9] Practical Action (2014) Poor People’s energy outlook 2014. Rugby, UK.
    [10] Africa Progress Report (2015) Seizing Africa’s energy and climate opportunities.
    [11] IPCC (2014) Mitigation of Climate Change –Working Group III. Intergovernmental Panel on Climate Change, Geneva, Switzerland.
    [12] The Clean Energy Country Competitiveness index (2015). Blomberg Energy Finance, UK Aid and Power Africa.
    [13] Nyquist S (2015) Lower oil prices but more renewable: what’s going on? McKinsey and Company. Houston Office, USA.
    [14] National Renewable Energy Laboratory (2014) Photovoltaic System Pricing Trends Historical, Recent, and Near-Term Projections 2014 Edition.
    [15] Onishi N (2015) Weak Power Grids in Africa Stunt Economies and Fire Up Tempers- New York Times-http://www.nytimes.com/2015/07/03/world/africa/weak-power-grids-in-africa-stunt-economies-and-fire-up-tempers.html.
    [16] Presentation from Qorax Energy. Available from: https://drive.google.com/file/d/0B4cp3qDeW0-XRDJGQmtkSURhLWM/view?pli=1.
    [17] UNEP and BNEF (2014) Global Trends in Renewable Energy Investment 2014, Frankfurt School, Germany.
    [18] UNEP (2011) Adapting for a Green Economy: Companies, Communities and Climate Change - A Caring for Climate Report, Nairobi, Kenya.
    [19] Waissbein O, Glemarec Y, Bayarakar H, et al. (2013) Derisking Renewable Energy Investment: A Framework to Support Policymakers in Selecting Public Investment to Promote Renewable Investment in Developing Countries, New York, United Nations Development Programme.
    [20] UNDP and ETH Zurich (2016) Scaling up by Scaling Down: De-risking Investment in Small-Scale Renewable Energy in Developing Countries. New York, USA and Zurich, Switzerland. Ongoing work.
    [21] UNEP (2014) Aligning the financial System with sustainable development - A paper from the Inquiry into the design of a sustainable financial system, Geneva.
    [22] World Economic Forum (2014): New Growth Models, Geneva.
    [23] Glemarec (2011) Catalyzing Climate Finance A Guidebook on Policy and Financing Options to Support Green, Low-Emission and Climate-Resilient Development New York, United Nations Development Programme.
    [24] Glemarec Y, Rickerson W, Waissbein O (2013) Transforming On-Grid Renewable Energy Markets New York, United Nations Development Programme.
    [25] Carafa L, Frisari G, Vidican G, (2015) Electricity transition in the Middle East and North Africa: A de-risking governance approach, Journal of Cleaner Production.
    [26] Smith J (2000) Solar-based rural electrification and microenterprise development in Latin America: A gender perspective. National Renewable Energy Laboratory. Colorado, USA.
    [27] Clancy J, Oparaocha S, Roehr U (2004) Gender Equity and Renewable Energy. Background paper for the International conference for renewable energy, Bonn.
    [28] ENERGIA & DFID Collaborative Research Group on Gender and Energy (CRGGE) (2006) From the Millennium Development Goals towards a gender-sensitive energy policy research and practice: Empirical evidence and case studies.
    [29] WHO (2014) Burden of disease from household air pollution for 2012. Geneva: World Health Organization.
    [30] UN Women and UNIDO (2013) Sustainable energy for all: the gender dimensions.
    [31] USAID/IUCN (2014): Women at the forefront of the clean energy future.
    [32] Arunachalam R (2007) Microfinance and Innovative financing for gender equality: Approaches, Challenges and Strategies.
    [33] Dutta S (2013) Gender briefing notes: Supporting active inclusion of women in energy and development projects. European Union Energy Initiative Partnership Dialogue Facility. Eschborn, Germany.
    [34] Presentation from Mackey, A. Solar Sister Initiative. Available at IUCN Global Gender Office. Available from: http://genderandenvironment.org/2015/10/gecco-webinar-gender-equality-in-the-energy-sector-understanding-how-renewable-energy-contributes-to-empowerment/.
    [35] wPOWER Hub Repot 2013-2014 (2014) Promoting women’s critical role in clean energy solutions to climate change. University of Nairobi, Kenya.
    [36] IRENA (2013) Renewable Energy and Jobs, International Renewable Energy Agency, Abu Dhabi.
    [37] IRENA (2015) Renewable Energy and Jobs—Annual Review 2015, International Renewable Energy Agency, Abu Dhabi.
    [38] The Solar Foundation (2014) National Solar Jobs Census 2014. Washington DC, USA.
    [39] United Nations Framework Convention on Climate Change (2015). Report on gender composition. Twenty-first session.
    [40] Westman M, Ciribello F, Torkelsson A (2015). Empowering women to tackle climate change through policies and practices: Lessons from Africa. Forthcoming. UNDP-UNEP PEI and UN Women.
    [41] GMI Ratings (2012) 2012 Women on Boards.
    [42] World Bank: 2016 Report on Law and Women.
    [43] UN Women (2015) Progress of the world’s women 2015-2016. Transforming Economies, Realizing Rights. New York, USA.
    [44] Food and Agriculture Organization (2011) The State of Food and Agriculture (2010-2011). Rome, Italy.
    [45] UN Women, the World Bank, UNEP and UNDP (2015) Gender gap in agricultural productivity in Malawi, Tanzania and Uganda.
    [46] Mckinsey Global Institute (2015) The power of parity: How advancing women’s equality can add $12 trillion to global growth. USA.
    [47] IUCN Gender in Mitigation Actions EGI Brief | November 2015. Available from: https://portals.iucn.org/union/sites/union/files/doc/gender_in_mitigation_actions.pdf.
    [48] International Finance Corporation (2011) Strengthening access to finance for women owned SMEs in developing countries. Washington DC, USA.
    [49] International Finance Corporation (2013) Small and medium enterprise finance: new findings, trends and G-20/Global partnership on financial inclusion progress. Washington DC, USA.
    [50] UN Women (2012) Progress Report on Women’s Access to Justice, In Pursuit of Justice.
    [51] UN WOMEN and OHCHR (2013) Realizing Women’s Rights to Land and other Productive Resources.
    [52] Thomson Reuters Foundation and World Bank (2013) Women and Land Rights: Legal Barriers impede Women’s Access to Resource
    [53] ILO (2011) Skills for Green Jobs: a Global View, Synthesis Report Based on 21 Country Studies, ILO, Geneva,
    [54] WECF (2015) Access to affordable low-cost solar water heating solutions as a basis for the first Gender Sensitive National Appropriate Mitigation Action, in Georgia, http://www.wecf.eu/english/energy-climate/.
    [55] USAID (2014) Integrating Women into Grameen Shakti’s Renewable Energy Value Chain in Bangladesh.
    [56] Glemarec Y, Bayat-Renoux F, et al (2015). Designing trust funds for performance. UNDP Multi-Partner Trust Fund Office, New York.
    [57] Childs S (2002) Concepts of Representation and the Passage of the Sex Discrimination (Election Candidates) Bill. The Journal of Legislative Studies 8: 90-108. doi: 10.1080/714003927
    [58] Phillips A (1995) The Politics of Presence: The Political Representation of Gender, Ethnicity, and Race. Oxford: Oxford University Press.
    [59] UN Women, UNDP, UNEP (2015) Empowering women for sustainable energy solutions to address climate change. Experiences from UN Women and UNDP-UNEP PEI Africa.
    [60] UN Women (2014) Project reports on partnership with the Barefoot College.
    [61] Glemarec Y (2012) Financing off-grid sustainable energy access for the poor. Energy Policy 47: 87-93.
    [62] Karlsson G, Rojas A (2013) The benefits of gender balance in climate change mitigation investments and sustainable energy initiatives.
    [63] Glemarec Y, Bardoux P, Roy T (2015) The Role Of Policy-Driven Institutions In Developing National Financial Systems For Long-Term Growth Nairobi,, UNEP Inquiry into the Design of a Sustainable Financial System United Nations Environment Programme
    [64] ARC Finance http://arcfinance.org/.
    [65] Wordsworth D, Gadnis A (2015) ASHILI.
    [66] O’Donohoe N, Leijonhufvud C, Saltuk Y (2010) Impact Investments: An emerging asset class-JP Morgan Global Research.
    [67] Pompa C (2013) Understanding challenge funds. ODI, London. UK.
    [68] Brain A, Gulrajani N, Mitchell J (2014) Meeting the challenge: How can enterprise challenge funds be made to work better, EPS PEAKS.
    [69] Pachauri S, Scott A, Scott L, et al. (2013) Energy for All: Harnessing the Power of Energy Access for Chronic Poverty Reduction, London. Chronic Poverty Advisory Network.
    [70] Legros G, Rijal K, Seyedi B (2011) Decentralized EnergyAccess and the MDGs. UNDP/AEPC, New York, USA.
    [71] Yadoo A, Cruickshank H (2012) The role for low carbon electrification technologies in poverty reduction and climate change strategies: a focus on renewable energy mini-grids with case studies in Nepal, Peru and Kenya, Energy Policy. Elsevier, UK.
    [72] UN Women (2013) Accessibility of micro-finance institution services for women: existing barriers and opportunities. UN Women Georgia.
    [73] Köhlin G, Sills E, Pattanayak S, et al (2011) Energy, gender and development. What are the linkages. Where are the linkages. A background paper prepared for the World Development Report 2012 on Gender Equality and Development. Paper number 125. World Bank. Washington DC, USA.
    [74] IRENA (2015) Accelerating off-grid renewable energy. IOREC 2014: Key findings and recommendations.
    [75] UN Women (2014) Project report on Energy Access in Uganda.
    [76] UN Women (2014) Project report on Oasis Project in Morocco.
    [77] Bachetta M, Ekkehard E, Bustamente J (2009) Globalziation and Informal Jobs in Developing Countries, WTO and ILO.
    [78] FAO (2011) Gender, food security and nutrition. Committee on world food security.
  • This article has been cited by:

    1. Ranjana Dwivedi, Vinay Kumar Srivastava, HSWmark: Robust and reversible image watermarking with improved capacity using Quad-tree segmentation, 2024, 27, 1433-7541, 10.1007/s10044-024-01370-0
    2. Xiuli Chai, Gongyao Cao, Zhifeng Fu, Zhihua Gan, Binjie Wang, Yushu Zhang, High-capacity reversible data hiding in encrypted medical images using adaptive pixel-modulation and HBP-RMC, 2024, 95, 17468094, 106424, 10.1016/j.bspc.2024.106424
    3. Zhifeng Fu, Xiuli Chai, Zongwei Tang, Xin He, Zhihua Gan, Gongyao Cao, Adaptive embedding combining LBE and IBBE for high-capacity reversible data hiding in encrypted images, 2024, 216, 01651684, 109299, 10.1016/j.sigpro.2023.109299
    4. Qiuling Wu, Dandan Huang, Jiangchun Wei, Wenhui Chen, Adaptive and blind audio watermarking algorithm based on dither modulation and butterfly optimization algorithm, 2023, 20, 1551-0018, 11482, 10.3934/mbe.2023509
    5. Chuanda Cai, Changgen Peng, Jin Niu, Weijie Tan, Hanlin Tang, Low distortion reversible database watermarking based on hybrid intelligent algorithm, 2023, 20, 1551-0018, 21315, 10.3934/mbe.2023943
  • Reader Comments
  • © 2016 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(9105) PDF downloads(1649) Cited by(16)

Figures and Tables

Figures(3)  /  Tables(4)

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog