Citation: Qichao Ying, Jingzhi Lin, Zhenxing Qian, Haisheng Xu, Xinpeng Zhang. Robust digital watermarking for color images in combined DFT and DT-CWT domains[J]. Mathematical Biosciences and Engineering, 2019, 16(5): 4788-4801. doi: 10.3934/mbe.2019241
[1] | Xiaoming Su, Jiahui Wang, Adiya Bao . Stability analysis and chaos control in a discrete predator-prey system with Allee effect, fear effect, and refuge. AIMS Mathematics, 2024, 9(5): 13462-13491. doi: 10.3934/math.2024656 |
[2] | Kottakkaran Sooppy Nisar, G Ranjith Kumar, K Ramesh . The study on the complex nature of a predator-prey model with fractional-order derivatives incorporating refuge and nonlinear prey harvesting. AIMS Mathematics, 2024, 9(5): 13492-13507. doi: 10.3934/math.2024657 |
[3] | Nehad Ali Shah, Iftikhar Ahmed, Kanayo K. Asogwa, Azhar Ali Zafar, Wajaree Weera, Ali Akgül . Numerical study of a nonlinear fractional chaotic Chua's circuit. AIMS Mathematics, 2023, 8(1): 1636-1655. doi: 10.3934/math.2023083 |
[4] | A. Q. Khan, Ibraheem M. Alsulami . Complicate dynamical analysis of a discrete predator-prey model with a prey refuge. AIMS Mathematics, 2023, 8(7): 15035-15057. doi: 10.3934/math.2023768 |
[5] | Xiao-Long Gao, Hao-Lu Zhang, Xiao-Yu Li . Research on pattern dynamics of a class of predator-prey model with interval biological coefficients for capture. AIMS Mathematics, 2024, 9(7): 18506-18527. doi: 10.3934/math.2024901 |
[6] | Weili Kong, Yuanfu Shao . The effects of fear and delay on a predator-prey model with Crowley-Martin functional response and stage structure for predator. AIMS Mathematics, 2023, 8(12): 29260-29289. doi: 10.3934/math.20231498 |
[7] | Asharani J. Rangappa, Chandrali Baishya, Reny George, Sina Etemad, Zaher Mundher Yaseen . On the existence, stability and chaos analysis of a novel 4D atmospheric dynamical system in the context of the Caputo fractional derivatives. AIMS Mathematics, 2024, 9(10): 28560-28588. doi: 10.3934/math.20241386 |
[8] | Yao Shi, Zhenyu Wang . Bifurcation analysis and chaos control of a discrete fractional-order Leslie-Gower model with fear factor. AIMS Mathematics, 2024, 9(11): 30298-30319. doi: 10.3934/math.20241462 |
[9] | Guilin Tang, Ning Li . Chaotic behavior and controlling chaos in a fast-slow plankton-fish model. AIMS Mathematics, 2024, 9(6): 14376-14404. doi: 10.3934/math.2024699 |
[10] | Xuyang Cao, Qinglong Wang, Jie Liu . Hopf bifurcation in a predator-prey model under fuzzy parameters involving prey refuge and fear effects. AIMS Mathematics, 2024, 9(9): 23945-23970. doi: 10.3934/math.20241164 |
Throughout the paper, we work over an algebraically closed field
Σk=Σk(C,L)⊆Pr |
of
Assume that
σk+1:Ck×C⟶Ck+1 |
be the morphism sending
Ek+1,L:=σk+1,∗p∗L, |
which is a locally free sheaf of rank
Bk(L):=P(Ek+1,L) |
equipped with the natural projection
H0(Bk(L),OBk(L)(1))=H0(Ck+1,Ek+1,)=H0(C,L), |
and therefore, the complete linear system
βk:Bk(L)⟶Pr=P(H0(C,L)). |
The
It is clear that there are natural inclusions
C=Σ0⊆Σ1⊆⋯⊆Σk−1⊆Σk⊆Pr. |
The preimage of
Theorem 1.1. Let
To prove the theorem, we utilize several line bundles defined on symmetric products of the curve. Let us recall the definitions here and refer the reader to [2] for further details. Let
Ck+1=C×⋯×C⏟k+1times |
be the
Ak+1,L:=Tk+1(L)(−2δk+1) |
be a line bundle on
The main ingredient in the proof of Theorem 1.1 is to study the positivity of the line bundle
Proposition 1.2. Let
In particular, if
In this section, we prove Theorem 1.1. We begin with showing Proposition 1.2.
Proof of Proposition 1.2. We proceed by induction on
Assume that
rz,k+1,L:H0(Ck+1,Ak+1,L)⟶H0(z,Ak+1,L|z) |
is surjective. We can choose a point
rz,k+1,L:H0(Ck+1,Ak+1,L)⟶H0(z,Ak+1,L|z) |
where all rows and columns are short exact sequences. By tensoring with
rz,k+1,L:H0(Ck+1,Ak+1,L)⟶H0(z,Ak+1,L|z) |
in which we use the fact that
Since
Lemma 2.1. Let
Proof. Note that
B′/A′⊗A′A′/m′q=B′/(m′qB′+A′)=B′/(m′p+A′)=0. |
By Nakayama lemma, we obtain
We keep using the notations used in the introduction. Recall that
αk,1:Bk−1(L)×C⟶Bk(L). |
To see it in details, we refer to [1,p.432,line –5]. We define the relative secant variety
Proposition 2.2. ([2,Proposition 3.15,Theorem 5.2,and Proposition 5.13]) Recall the situation described in the diagram
αk,1:Bk−1(L)×C⟶Bk(L). |
Let
1.
2.
3.
As a direct consequence of the above proposition, we have an identification
H0(Ck+1,Ak+1,L)=H0(Σk,IΣk−1|Σk(k+1)). |
We are now ready to give the proof of Theorem 1.1.
Proof of Theorem 1.1. Let
b:˜Σk:=BlΣk−1Σk⟶Σk |
be the blowup of
b:˜Σk:=BlΣk−1Σk⟶Σk |
We shall show that
Write
γ:˜Σk⟶P(V). |
On the other hand, one has an identification
ψ:Ck+1⟶P(V). |
Also note that
ψ:Ck+1⟶P(V). |
Take an arbitrary closed point
α−1(x)⊆π−1k(x″)∩β−1k(x′). |
However, the restriction of the morphism
[1] | H. Larijani and G. Rad, A new spatial domain algorithm for gray scale images watermarking, International Conference on Computer and Communication Engineering, (2008), 157–161. |
[2] | H. Nemade and V. Kelkar, Reversible watermarking for colored medical images using histogram shifting method, 3rd International Conference on Computing for Sustainable Global Development, (2016), 2664–2668. |
[3] | A. Al-Nu'aimi and R. Qahwaji, Adaptive watermarking for digital colored images based on the energey of edges, IEEE International Conference on Signal Processing and Communications, (2007), 1371–1374. |
[4] | J. O'Ruanaidh and T. Pun, Rotation, scale, and translation invariant digital image watermarking, Sign. Process., 66 (1998), 303–317. |
[5] | F. N. Thakkar and V. K. Srivastava, A blind medical image watermarking: DWT-SVD based robust and secure approach for telemedicine applications. Multimed. Tools Appl., 76 (2017), 3669–3697. |
[6] | H. Hu and H. Lyu, Collective blind image watermarking in DWT-DCT domain with adaptive embedding strength governed by quality metrics, Multimed. Tools Appl., 76 (2017), 6575–6594. |
[7] | S. Horng, A blind image copyright protection scheme for e-government. J. Vis. Communic. Image, 24 (2013), 1099–1105. |
[8] | S. A. Parah, J. A. Sheikh, N. A. Loan, et al., Robust and blind watermarking technique in DCT domain using inter-block coefficient differencing, Dig. Signal Process., 53 (2016), 11–24. |
[9] | X. Kang, J. Huang and W. Zeng, Efficient general print-scanning resilient data hiding based on uniform log-polar mapping, IEEE T. Inf. Foren. Sec., 5 (2010), 1–12. |
[10] | D. Zheng, J. Zhao and A. El. Saddik, RST invariant digital image watermarking based on log-polar mapping and phase correlation, IEEE T. Circ. Syst. Vid., 13 (2003), 753–765. |
[11] | P. Niu, X. Wang, H. Jin, et al., A feature-based robust digital image watermarking scheme using Bandelet transform, Optics Laser Tech., 43 (2011), 437–450. |
[12] | M. Amini, M. O. Ahmad and M. N. S. Swamy, A robust multibit multiplicative watermark decoder using vector-based hidden Markov model in wavelet domain, IEEE T. Circ. Syst. Vid., 28 (2018), 402–413. |
[13] | M. Amini, M. O. Ahmad and M. N. S. Swamy, Digital watermark extraction in wavelet domain using hidden Markov model, Multimed. Tools Appl., 76 (2017), 3731–3749. |
[14] | E. Nezhadarya, Z. J. Wang and R. K. Ward, Robust image watermarking based on multiscale gradient direction quantization, IEEE T. Inf. Foren. Sec., 6 (2011), 1200–1213. |
[15] | V Ananthaneni, U. R.Nelakuditi, Hybrid digital image watermarking using contourlet transform (CT), DCT and SVD. Int. J. Image Process., 11 (2017), 85–93. |
[16] | A. K. Singh, M. Dave and A. Mohan, Hybrid technique for robust and imperceptible image watermarking in DWT–DCT–SVD Domain. Natl. Acad. Sci. Lett., 37 (2014) 351–358. |
[17] | Z. Wang, A. C. Bovik, H. R. Sheik, et al., Image quality assessment: from error visibility to structural similarity, IEEE T. Image Process., 13 (2004), 600–612. |
[18] | UCID-an Uncompressed Colour Image Database–a benchmark database for image retrieval with predefined ground truth, Accessed: 2019. (available: http://imagedatabase.cs.washington.edu/groundtruth/) |
[19] | T. Lin, M. Maire, S. Belongie, et al., Microsoft COCO: Common objects in context, European Conference on Computer Vision, (2014), 740–755, Accessed: 2019. (available: http://cocodataset.org/#home) |
[20] | T. Pevny, P. Bas, and J. Fridrich, Steganalysis by subtractive pixel adjacency matrix, IEEE T. Inf. Foren. Sec., 5 (2010), 215–224. |
[21] | J. Kodovsky, J. Fridrich and V. Holub, Ensemble classifiers for steganalysis of digital media, IEEE T. Inf. Foren. Sec., 7 (2012), 432–444. |