For the needs of tamper-proof detection and copyright identification of audio and video matching, this paper proposes a zero-watermark algorithm that can be used for audio and video matching verification. The algorithm segments audio and video in smaller time units, generates a video frame feature matrix based on NSCT, DCT, and SVD, and generates a sound watermark based on methods such as DWT and K-means. The zero watermark combines video, audio and copyright information. The experimental results show that the zero watermark generated by this algorithm can not only realize highly accurate matching detection and positioning of audio and video, but also well resist common single attack and combination attacks such as noise, scaling, rotation, frame attack and format conversion, which has good robustness.
Citation: Wenxue Sun, Huiyuan Zhao, Xiao Zhang, Yuchao Sun, Xiaoxin Liu, Xueling Lv, Di Fan. Zero-watermarking Algorithm for Audio and Video Matching Verification[J]. AIMS Mathematics, 2022, 7(5): 8390-8407. doi: 10.3934/math.2022468
[1] | Keltoum Bouhali, Sulima Ahmed Zubair, Wiem Abedelmonem Salah Ben Khalifa, Najla ELzein AbuKaswi Osman, Khaled Zennir . A new strict decay rate for systems of longitudinal m-nonlinear viscoelastic wave equations. AIMS Mathematics, 2023, 8(1): 962-976. doi: 10.3934/math.2023046 |
[2] | Soh E. Mukiawa, Tijani A. Apalara, Salim A. Messaoudi . Stability rate of a thermoelastic laminated beam: Case of equal-wave speed and nonequal-wave speed of propagation. AIMS Mathematics, 2021, 6(1): 333-361. doi: 10.3934/math.2021021 |
[3] | Qian Li . General and optimal decay rates for a viscoelastic wave equation with strong damping. AIMS Mathematics, 2022, 7(10): 18282-18296. doi: 10.3934/math.20221006 |
[4] | Abdelbaki Choucha, Salah Boulaaras, Asma Alharbi . Global existence and asymptotic behavior for a viscoelastic Kirchhoff equation with a logarithmic nonlinearity, distributed delay and Balakrishnan-Taylor damping terms. AIMS Mathematics, 2022, 7(3): 4517-4539. doi: 10.3934/math.2022252 |
[5] | Tae Gab Ha, Seyun Kim . Existence and energy decay rate of the solutions for the wave equation with a nonlinear distributed delay. AIMS Mathematics, 2023, 8(5): 10513-10528. doi: 10.3934/math.2023533 |
[6] | Qian Li, Yanyuan Xing . General and optimal decay rates for a system of wave equations with damping and a coupled source term. AIMS Mathematics, 2024, 9(10): 29404-29424. doi: 10.3934/math.20241425 |
[7] | Yousif Altayeb . New scenario of decay rate for system of three nonlinear wave equations with visco-elasticities. AIMS Mathematics, 2021, 6(7): 7251-7265. doi: 10.3934/math.2021425 |
[8] | Adel M. Al-Mahdi, Mohammad M. Al-Gharabli, Maher Nour, Mostafa Zahri . Stabilization of a viscoelastic wave equation with boundary damping and variable exponents: Theoretical and numerical study. AIMS Mathematics, 2022, 7(8): 15370-15401. doi: 10.3934/math.2022842 |
[9] | Adel M. Al-Mahdi, Mohammad M. Al-Gharabli, Mohammad Kafini . Asymptotic behavior of the wave equation solution with nonlinear boundary damping and source term of variable exponent-type. AIMS Mathematics, 2024, 9(11): 30638-30654. doi: 10.3934/math.20241479 |
[10] | Hicham Saber, Fares Yazid, Fatima Siham Djeradi, Mohamed Bouye, Khaled Zennir . Decay for thermoelastic laminated beam with nonlinear delay and nonlinear structural damping. AIMS Mathematics, 2024, 9(3): 6916-6932. doi: 10.3934/math.2024337 |
For the needs of tamper-proof detection and copyright identification of audio and video matching, this paper proposes a zero-watermark algorithm that can be used for audio and video matching verification. The algorithm segments audio and video in smaller time units, generates a video frame feature matrix based on NSCT, DCT, and SVD, and generates a sound watermark based on methods such as DWT and K-means. The zero watermark combines video, audio and copyright information. The experimental results show that the zero watermark generated by this algorithm can not only realize highly accurate matching detection and positioning of audio and video, but also well resist common single attack and combination attacks such as noise, scaling, rotation, frame attack and format conversion, which has good robustness.
We consider, for x∈Rn, t>0, j=1,2,…,m, the following system of m equations
{ujtt+aujt−Θ(x)Δ(uj+ωujt−∫t0ϖj(t−s)uj(s)ds)=fj(u1,u2,…,um)uj(x,0)=uj0(x)ujt(x,0)=uj1(x), | (1.1) |
where a∈R, ω>0, n≥3.
Various non-linear sources have been combined as follows, we combine all two consecutive equations together and of course the last equation with the first one, which get the whole system closely linked by the strong nonlinear sources. The functions fj(u1,u2,…,um)∈(Rm,R) are given for j=1,2,…,m−1, by
fj(u1,u2,…,um)=(p+1)[d|m∑i=1ui|(p−1)m∑i=1ui+e|uj|(p−3)/2uj|uj+1|(p+1)/2], |
and
fm(u1,u2,…,um)=(p+1)[d|m∑i=1ui|(p−1)m∑i=1ui+e|um|(p−3)/2um|u1|(p+1)/2], |
with d,e>0, p>3. For simplicity reason, we take d=e=1.
There exists a function F∈C1(R3,R) such that
m∑j=1ujfj(u1,u2,…,um)=(p+1)F(u1,u2,…,um), ∀(u1,u2,…,um)∈Rm. | (1.2) |
such that
(p+1)F(u1,u2,…,um)=|m∑j=1uj|p+1+2|m−1∑j=1ujuj+1|(p+1)/2+2|umu1|(p+1)/2. | (1.3) |
In order to use Poincare's inequality which is a key in calculus for the PDEs, we will study the problem (1.1) in the presence of a density function θ to find a generalized formula for Poincare's inequality that can be used in unbounded domain Rn. The function Θ(x)>0 for all x∈Rn is a density and (Θ)−1(x)=1/Θ(x)≡θ(x) such that
θ∈Lτ(Rn)withτ=2n2n−rn+2rfor2≤r≤2nn−2. | (1.4) |
We define a new space related to the nature of our system, taking into account the boundless of space Rn. The function spaces H is defined as the closure of C∞0(Rn), as in [20], we have
H={v∈L2nn−2(Rn)∣∇v∈L2(Rn)n}. |
with respect to the norm ‖v‖H=(v,v)1/2H for the inner product
(v,w)H=∫Rn∇v⋅∇wdx, |
and L2θ(Rn) as that to the norm ‖v‖L2θ=(v,v)1/2L2θ for
(v,w)L2θ=∫Rnθvwdx. |
For general r∈[1,+∞)
‖v‖Lrθ=(∫Rnθ|v|rdx)1r. |
is the norm of the weighted space Lrθ(Rn).
The following references in connection to our system for a single equation [6] and [7]. The work [6] was the pioneer in the literature for the single equation, source of inspiration of several works, while the work [7] is a recent generalization of [6] by introducing less dissipative effects (See [8,9,19,24,26]). With regard to the study of this type of systems without viscoelasticity, with the existence of both weak damping ut and strong damping Δut, under condition (3.2), we mention the work recently published in one equation in [14]
{utt+μut−Δu−ωΔut=uln|u|, (x,t)∈Ω×(0,∞)u(x,t)=0,x∈∂Ω,t≥0u(x,0)=u0(x),ut(x,0)=u1(x),x∈Ω, | (1.5) |
where Ω is a bounded domain of Rn, n≥1 with a smooth boundary ∂Ω. The aim goal was mainly on the local existence of weak solution by using contraction mapping principle and of course the authors showed the global existence, decay rate and infinite time blow up of the solution with certain conditions on initial energy.
In the case of non-bounded domain Rn, we mention the paper recently published by T. Miyasita and Kh. Zennir in [18], where they considered equation as follows
utt+aut−ϕ(x)Δ(u+ωut−∫t0g(t−s)u(s)ds)=u|u|p−1, | (1.6) |
with initial data
{u(x,0)=u0(x)ut(x,0)=u1(x). | (1.7) |
The authors succeeded in highlighting the existence of unique local solution and they continued to expand it to be global in time. The rate of the decay for solution was the main result, for more results related to decay rate of solution of this type of problems, please see [15,23,25,28].
Regarding the study of the coupled system of two nonlinear wave equations, we mention the work done by Baowei Feng et al. which was considered in [12], a coupled system for viscoelastic wave equations with nonlinear sources in bounded domain with smooth boundary as follows
{utt−Δu+∫t0g(t−s)Δu(s)ds+ut=f1(u,v)vtt−Δv+∫t0h(t−s)Δv(s)ds+vt=f2(u,v). | (1.8) |
Under appropriate hypotheses, they established a general decay result by multiplication techniques to extend some existing results for a single equation to the case of a coupled system.
There are several results in this direction, notably the generalization made by Shun in a complicate nonlinear case with degenerate damping term in [21]. The IBVP for a system of nonlinear viscoelastic wave equations in a bounded domain was considered in the problem
{utt−Δu+∫t0g(t−s)Δu(s)ds+(|u|k+|v|q)|ut|m−1ut=f1(u,v) vtt−Δv+∫t0h(t−s)Δv(s)ds+(|v|θ+|u|ρ)|vt|r−1vt=f2(u,v)u(x,t)=v(x,t)=0,x∈∂Ω,t>0u(x,0)=u0(x),v(x,0)=v0(x)ut(x,0)=u1(x),vt(x,0)=v1(x), | (1.9) |
where Ω is a bounded domain with a smooth boundary. Given certain conditions on the kernel functions, degenerate damping and nonlinear source terms, they got a decay rate of the energy function for some initial data.
In n−equations, paper in [1] considered a system
uitt+γuit−Δui+ui=m∑i,j=1,i≠j|uj|pj|ui|piui, i=1,2,…,m, | (1.10) |
where the absence of global solutions with positive initial energy was investigated. Next, a nonexistence of global solutions for system of three semilinear hyperbolic equations was introduced in [3]. A coupled system of semilinear hyperbolic equations was investigated by many authors and many results were obtained with the nonlinearities in the form f1=|u|p−1|v|q+1u,f2=|v|p−1|u|q+1v. (Please, see [2,16,22])
We introduce the Sobolev embedding and generalized Poincaré inequalities.
Lemma 2.1. [13,18] Let θ satisfy (1.4). For positive constants Cτ>0 and CP>0 depending only on θ and n, we have
‖v‖2nn−2≤Cτ‖v‖H, ‖v‖L2θ≤CP‖v‖H, |
and
‖v‖Lrθ≤Cr‖v‖H, Cr=Cτ‖θ‖1rτ, |
hold for v∈H. Here τ=2n/(2n−rn+2r) for 1≤r≤2n/(n−2).
In the 1950s and 1970s, the linear theory of viscoelasticity was extensively developed and now, it becomes widely used to represent this term using several improvements to the nature of decreasing the kernel function. We assume that the kernel functions ϖj∈C1(R+,R+) satisfying
1−¯ϖj=ρj>0for¯ϖj=∫+∞0ϖj(s)ds, ϖ′j(t)≤0, ϖj(0)>0. | (2.1) |
We mean by R+ the set {τ∣τ≥0}. Noting by
μ(t)=maxt≥0{ϖ1(t),ϖ2(t),…,ϖm(t)}, | (2.2) |
and
μ0(t)=mint≥0{∫t0ϖ1(s)ds,∫t0ϖ2(s)ds,…,∫t0ϖm(s)ds}. | (2.3) |
We assume that there is a function χ∈C1(R+,R+) which is linear or is strictly convex C2 function on (0,ε0),ε0≤ϖj(0), with χ(0)=χ′(0)=0 and a positive nonincreasing differentiable function ξ:[0,∞)→[0,∞), such that the novel properties
ϖ′j(t)+ξ(t)χ(ϖj(t))≤0,χ(0)=0,χ′(0)>0andχ″(ϱ)≥0, i=1,2,…,m, | (2.4) |
satisfied for any ϱ≥0.
We note that, if χ is a strictly increasing convex C2− function on (0,τ] with χ(0)=χ′(0)=0, then χ has an extension ˉχ, which is strictly increasing and strictly convex C2−function on (0,∞). For example, ˉχ can be given by
ˉχ(t)=12χ″(τ)t2+[χ′(τ)−χ″(τ)τ]t+χ(τ)−χ′(τ)τ+12χ″(τ)τ2, t>τ. |
Hölder and Young's inequalities give
‖uiuj‖(p+1)/2L(p+1)/2θ≤(‖ui‖2L(p+1)θ+‖uj‖2L(p+1)θ)(p+1)/2≤(ρi‖ui‖2H+ρj‖uj‖2H)(p+1)/2, | (2.5) |
Thanks to Minkowski's inequality to give
‖m∑j=1uj‖(p+1)L(p+1)θ≤c(m∑j=1‖uj‖2L(p+1)θ)(p+1)/2≤c(m∑j=1‖uj‖2H)(p+1)/2. |
Then, there exist η>0 such that
‖m∑j=1uj‖(p+1)L(p+1)θ+2‖m−1∑j=1ujuj+1‖(p+1)/2L(p+1)/2θ+2‖umu1‖(p+1)/2L(p+1)/2θ≤η(m∑j=1ρj‖uj‖2H)(p+1)/2. | (2.6) |
We need to define positive constants λ0 and E0 by
λ0≡η−1/(p−1)andE0=(12−1p+1)η−2/(p−1). | (2.7) |
The mainly aim of the present paper is to obtain a novel decay rate of solution from the convexity property of the function χ given in Theorem 3.4.
We denote, as in [18], an eigenpair {(λi,ei)}i∈N⊂R×H of
−Θ(x)Δei=λieix∈Rn, |
for any i∈N. Then
0<λ1≤λ2≤⋯≤λi≤⋯↑+∞, |
holds and {ei} is a complete orthonormal system in H.
Definition 2.2. The vectors (u1,u2,…,um) is said a weak solution to (1.1) on [0,T] if satisfies for x∈Rn
∫Rnujttφjdx+a∫Rnujtφjdx+∫RnΘ(x)∇(uj+ωujt−∫t0ϖj(t−s)uj(s)ds)∇φjdx=∫Rnfj(u1,u2,…,um)φjdx, | (2.8) |
for all test functions φj∈H,j=1,2,…,m for almost all t∈[0,T].
The local solution (in time [0,T]) is given in next Theorem.
Theorem 3.1. (Local existence) Assume that
1<p≤n+2n−2andn≥3. | (3.1) |
Let (u10,u20,…um0)∈Hm and (u11,u21,…,um1)∈[L2θ(Rn)]m. Under the assumptions (1.4)-(1.3) and (2.1)-(2.4), suppose that
a+λ1ω>0. | (3.2) |
Then (1.1) admits a unique local solution (u1,u2,…,um) such that
(u1,u2,…,um)∈XmT, XT≡C([0,T];H)∩C1([0,T];L2θ(Rn)), |
for sufficiently small T>0.
Remark 3.2. The constant λ1 introduced in (3.2) being the first eigenvalue of the operator −Δ.
We will show now the global solution in time established in Theorem 3.3. Let us introduce the potential energy J:Hm→R defined by
J(u1,u2,…,um)=m∑j=1(1−∫t0ϖj(s)ds)‖uj‖2H+m∑j=1(ϖj∘uj). | (3.3) |
The modified energy is defined by
E(t)=12m∑j=1‖ujt‖2L2θ+12J(u1,u2,…,um)−∫Rnθ(x)F(u1,u2,…,um)dx, | (3.4) |
here
(ϖj∘w)(t)=∫t0ϖj(t−s)‖w(t)−w(s)‖2Hds, |
for any w∈L2(Rn),j=1,2,…,m.
Theorem 3.3. (Global existence) Let (1.4)-(1.3) and (2.1)-(2.4) hold. Under (3.1), (3.2) and for sufficiently small (u10,u11),(u20,u21),…,(um0,um1)∈H×L2θ(Rn), problem (1.1) admits a unique global solution (u1,u2,…,um) such that
(u1,u2,…,um)∈Xm, X≡C([0,+∞);H)∩C1([0,+∞);L2θ(Rn)). | (3.5) |
The decay rate for solution is given in the next Theorem.
Theorem 3.4. (Decay of solution) Let (1.4)-(1.3) and (2.1)-(2.4) hold. Under conditions (3.1), (3.2) and
γ=η(2(p+1)p−1E(0))(p−1)/2<1, | (3.6) |
there exists t0>0 depending only on ϖj, a, ω, λ1 and χ′(0) such that
0≤E(t)<E(t0)exp(−∫tt0μ(s)1−μ0(t)), | (3.7) |
holds for all t≥t0.
In particular, by the positivity of μ in (2.2), we have, as in [17],
0≤E(t)<E(t0)exp(−∫tt0μ(s)ds), |
for a single wave equation.
Lemma 3.5. For (u1,u2,…,um)∈XmT, the functional E(t) associated with problem (1.1) is a decreasing energy.
Proof. For 0≤t1<t2≤T, we have
E(t2)−E(t1)=∫t2t1ddtE(t)dt=−m∑j=1∫t2t1(a‖ujt‖2L2θ+ω‖ujt‖2H+12ϖj(t)‖uj‖2H−12(ϖ′j∘uj))dt≤0, |
owing to (2.1)-(2.4).
We define an inner product as
(v,w)∗=ω∫Rn∇v⋅∇wdx+a∫Rnθvwdx, |
and the associated norm is given by
‖v‖∗=√(v,v)∗. |
∀v,w∈H. By (3.2), we get
(v,v)∗=ω∫Rn|∇v|2dx+a∫Rnθv2dx≥(ωλ1+a)∫Rnθv2dx≥0. |
The following Lemma yields.
Lemma 3.6. Let θ satisfy (1.4). Under condition (3.2), we get
√ω‖v‖H≤‖v‖∗≤√ω+C2P‖v‖H, |
for v∈H.
We give here the outline of the proof for local solution by a standard procedure (See [15,28]).
Proof. (Of Theorem 3.1.) Let (u10,u11),(u20,u21),…,(um0,um1)∈H×L2θ(Rn). The presence of the nonlinear terms in the right hand side of our problem (1.1) gives us negative values of the energy. For this purpose, for any fixed (u1,u2,…,um)∈XmT, we can obtain first, a weak solution of the related system
{zjtt+azjt−Θ(x)Δ(zj+ωzjt)+Θ(x)Δ∫t0ϖj(t−s)zj(s)ds=fj(u1,u2,…,um)zj(x,0)=uj0(x)zjt(x,0)=uj1(x). | (4.1) |
The Faedo-Galerkin's method consist to construct approximations of solutions (z1n,z2n,…,zmn,) for (4.1), then we obtain a prior estimates necessary to guarantee the convergence of approximations. In the last step we pass to the limit of the approximations by using the compactness of some embedding in the Sobolev spaces. The uniqueness is obtain by letting two solutions for (4.1) and then, after ordinary calculations, we find that the solutions are equal.
Some details regarding the transition to ODE systems are given, for this end let {ei} be the Galerkin basis and let
Wjn=span{ej1,ej2,....,ejn},j=1,…,m. |
Given initial data uj0∈H, uj1∈L2θ(Rn), we define the approximations
zjn=n∑i=1gjin(t)eji(x), | (4.2) |
which satisfy the following approximate problem
(zjntt,eji)+(azjnt,eji)−(Θ(x)Δ(zjn+ωzjnt),eji)=−(Θ(x)Δ∫t0ϖj(t−s)zjn(s)ds,eji)+(fj(u1,u2,…,um),eji), | (4.3) |
with initial conditions
zjn(x,0)=unj0(x), zjnt(x,0)=unj1(x), | (4.4) |
which satisfies
unj0→uj0,stronglyinHujn1→uj1,stronglyinL2θ(Rn). | (4.5) |
Taking eji=gji in (4.3) yields the following Cauchy problem for a ordinary differential equation with unknown gnji.
gnjitt(t)+agnjit(t)+λi(gnji(t)+ωgnjit(t))=λi∫t0ϖj(t−s)gnji(s)ds+(fj(u1,u2,…,um),gji), | (4.6) |
By using the Caratheodory Theorem for standard ordinary differential equations theory, the problem (4.3)-(4.4) has a solutions (g1in,g2in,…,gmin)i=1,n∈(H3[0,T])m and by using the embedding Hm[0,T]→Cm[0,T], we deduce that the solution (g1in,g2in,…,gmin)i=1,n∈(C2[0,T])4. In turn, this gives a unique (z1n,z2n,…,zmn) defined by (4.2) and satisfying (4.3).
To return to the problem (1.1), we should find a solution map
⊤:(u1,u2,…,um)↦(z1,z2,…,zm) |
from XmT to XmT. We are now ready to show that ⊤ is a contraction mapping in an appropriate subset of XmT for a small T>0. Hence ⊤ has a fixed point
⊤(u1,u2,…,um)=(u1,u2,…,um), |
which gives a unique solution in XmT.
We will show the global solution. For this end, by using conditions on functions ϖj, we have
E(t)≥12J(u1,u2,…,um)−∫Rnθ(x)F(u1,u2,…,um)dx≥12J(u1,u2,…,um)−1p+1‖m∑j=1uj‖(p+1)L(p+1)θ−2p+1(‖m−1∑j=1ujuj+1‖(p+1)/2L(p+1)/2θ+‖umu1‖(p+1)/2L(p+1)/2θ)≥12J(u1,u2,…,um)−ηp+1[m∑j=1ρj‖uj‖2H](p+1)/2≥12J(u1,u2,…,um)−ηp+1(J(u1,u2,…,um))(p+1)/2=G(β), | (4.7) |
here β2=J(u1,u2,…,um), for t∈[0,T), where
G(ξ)=12ξ2−ηp+1ξ(p+1). |
Noting that E0=G(λ0), given in (2.7). Then
{G(ξ)≥0in ξ∈[0,λ0]G(ξ)<0in ξ>λ0. | (4.8) |
Moreover, limξ→+∞G(ξ)→−∞. Then, we have the following Lemma
Lemma 4.1. Let 0≤E(0)<E0.
(i) If m∑j=1‖uj0‖2H<λ20, then local solution of (1.1) satisfies
J(u1,u2,…,um)<λ20, ∀t∈[0,T). |
(ii) If m∑j=1‖uj0‖2H>λ20, then, local solution of (1.1) satisfies
m∑j=1‖uj‖2H>λ21, ∀t∈[0,T),λ1>λ0. |
Proof. Since 0≤E(0)<E0=G(λ0), there exist ξ1 and ξ2 such that G(ξ1)=G(ξ2)=E(0) with 0<ξ1<λ0<ξ2.
The case (i). By (4.7), we have
G(J(u10,u20,…um0))≤E(0)=G(ξ1), |
which implies that J(u10,u20,…um0)≤ξ21. Then, we claim that J(u1,u2,…,um)≤ξ21, ∀t∈[0,T). Moreover, there exists t0∈(0,T) such that
ξ21<J(u1(t0),u2(t0),…,um(t0))<ξ22. |
Then
G(J(u1(t0),u2(t0),…,um(t0))>E(0)≥E(t0), |
by Lemma 3.5, which contradicts (4.7). Hence we have
J(u1,u2,…,um)≤ξ21<λ20, ∀t∈[0,T). |
The case (ii). We can now show that m∑j=1‖uj0‖2H≥ξ22 and that m∑j=1‖uj‖2H≥ξ22>λ20 in the same way as (i).
Proof. (Of Theorem 3.3.) Let (u10,u11),(u20,u21),…,(um0,um1)∈H×L2θ(Rn) satisfy both 0≤E(0)<E0 and m∑j=1‖uj0‖2H<λ20. By Lemma 3.5 and Lemma 4.1, we have
m∑j=1‖ujt‖2L2θ+m∑j=1ρj‖uj‖2H≤m∑j=1‖ujt‖2L2θ+m∑j=1[(1−∫t0ϖj(s)ds)‖uj‖2H+(ϖj∘uj)]≤2E(t)+2ηp+1(m∑j=1ρj‖uj‖2H)(p+1)/2≤2E(0)+2ηp+1(J(u1,u2,…,um))(p+1)/2≤2E0+2ηp+1λp+10=η−2/(p−1). | (4.9) |
This completes the proof.
Let
Λ(u1,u2,…,um)=12m∑j=1[(1−∫t0ϖj(s)ds)‖uj‖2H+(ϖj∘uj)]−∫Rnθ(x)F(u1,u2,…,um)dx, |
Π(u1,u2,…,um)=m∑j=1[(1−∫t0ϖj(s)ds)‖uj‖2H+(ϖj∘uj)]−(p+1)∫Rnθ(x)F(u1,u2,…,um)dx. |
Lemma 5.1. Let (u1,u2,…,um) be the solution of problem (1.1). If
m∑j=1‖uj0‖2H−(p+1)∫Rnθ(x)F(u1,u2,…,um)dx>0. | (5.1) |
Then, under condition (3.6), the functional Π(u1,u2,…,um)>0, ∀t>0.
Proof. By (5.1) and continuity, there exists a time t1>0 such that
Π(u1,u2,…,um)≥0,∀t<t1. |
Let
Y={(u1,u2,…,um)∣Π(u1(t0),u2(t0),…,um(t0))=0, Π(u1,u2,…,um)>0,∀t∈[0,t0)}. | (5.2) |
Then, by (5.1), we have for all (u1,u2,…,um)∈Y,
Λ(u1,u2,…,um)=p−12(p+1)m∑j=1(1−∫t0ϖj(s)ds)‖uj‖2H+p−12(p+1)m∑j=1(ϖj∘uj)+1p+1Π(u1,u2,…,um)≥p−12(p+1)m∑j=1[ρj‖uj‖2H+(ϖj∘uj)]. |
Owing to (3.4), it follows for (u1,u2,…,um)∈Y
ρj‖uj‖2H≤2(p+1)p−1Λ(u1,u2,…,um)≤2(p+1)p−1E(t)≤2(p+1)p−1E(0). | (5.3) |
By (2.6), (3.6) we have
(p+1)∫RnF(u1(t0),u2(t0),…,um(t0))≤ηm∑j=1(ρj‖uj(t0)‖2H)(p+1)/2≤η(2(p+1)p−1E(0))(p−1)/2m∑j=1ρj‖uj(t0)‖2H≤γm∑j=1ρj‖uj(t0)‖2H<m∑j=1(1−∫t00ϖj(s)ds)‖uj(t0)‖2H<m∑j=1(1−∫t00ϖj(s)ds)‖uj(t0)‖2H+m∑j=1(ϖj∘uj(t0)), | (5.4) |
hence Π(u1(t0),u2(t0),…,um(t0))>0 on Y, which contradicts the definition of Y since Π(u1(t0),u2(t0),…,um(t0))=0. Thus Π(u1,u2,…,um)>0, ∀t>0.
We are ready to prove the decay rate.
Proof. (Of Theorem 3.4.) By (2.6) and (5.3), we have for t≥0
0<m∑j=1ρj‖uj‖2H≤2(p+1)p−1E(t). | (5.5) |
Let
I(t)=μ(t)1−μ0(t), |
where μ and μ0 defined in (2.2) and (2.3).
Noting that limt→+∞μ(t)=0 by (2.1)-(2.3), we have
limt→+∞I(t)=0, I(t)>0, ∀t≥0. |
Then, we take t0>0 such that
0<I(t)<mint≥0{2(ωλ1+a),ξ(t)χ′(0)}, | (5.6) |
with (2.4) for all t>t0. Due to (3.4), we have
E(t)≤12m∑j=1‖ujt‖2L2θ+12m∑j=1(ϖj∘uj)+12m∑j=1(1−∫t0ϖj(s)ds)‖uj‖2H≤12m∑j=1‖ujt‖2L2θ+12m∑j=1(ϖj∘uj)+12(1−μ0(t))m∑j=1‖uj‖2H. |
Then, by definition of I(t), we have
I(t)E(t)≤12I(t)m∑j=1‖ujt‖2L2θ+12μ(t)m∑j=1‖uj‖2H+12I(t)m∑j=1(ϖj∘uj), | (5.7) |
and Lemma 3.5, we have for all t1,t2≥0
E(t2)−E(t1)≤−∫t2t1(am∑j=1‖ujt‖2L2θ+ωm∑j=1‖ujt‖2H+12μ(t)m∑j=1‖uj‖2H)dt+∫t2t112m∑j=1(ϖ′j∘uj)dt |
then, by generalized Poincaré's inequalities, we get
E′(t)≤−(ωλ1+a)m∑j=1‖ujt‖2L2θ−12μ(t)m∑j=1‖uj‖2H+12m∑j=1(ϖ′j∘uj), |
Finally, by (5.6), ∀t≥t0, we have
E′(t)+I(t)E(t)≤{12I(t)−(ωλ1+a)}m∑j=1‖ujt‖2L2θ+12m∑j=1(ϖ′j∘uj)+12I(t)m∑j=1(ϖj∘uj)≤12m∑j=1∫t0{ϖ′j(t−τ)+I(t)ϖj(t−τ)}‖uj(t)−uj(τ)‖2Hdτ≤12m∑j=1∫t0{ϖ′j(τ)+I(t)ϖj(τ)}‖uj(t)−uj(t−τ)‖2Hdτ≤12m∑j=1∫t0{−ξ(τ)χ(ϖj(τ))+ξ(τ)χ′(0)ϖj(τ)}‖uj(t)−uj(t−τ)‖2Hdτ≤0, |
by the convexity of χ and (2.4), we have
ξ(t)χ(ϱ)≥ξ(t)χ(0)+ξ(t)χ′(0)ϱ≥ξ(t)χ′(0)ϱ. |
Then
E(t)≤E(t0)exp(−∫tt0I(s)ds), |
which completes the proof.
The paper deals with a kind of m−nonlinear wave equations with viscoelastic structures. We considered the local existence, global existence and exponential decay rate of solution. We discussed the effects of weak and strong damping terms on decay rate. The methods are standard for local existence and we extended the local solution to a global one by appropriate energy estimates. At last, We obtained a novel decay rate of solution from the convexity property of the function which extends the results in [Math. Meth. Appl. Sci., 43(3), 1138 (2020); Mathematics 8(2), 203 (2020)]. The treatment of Cauchy problem for a family of effectively damped single wave models with a nonlinear memory on the righthand side, that is for x∈Rn
utt+(1+t)rut−Δ(u+ωut)=∫t0(t−s)−γ‖u(s,.)‖pds | (6.1) |
where ω>0,p>1,r∈(−1,1) and γ∈(0,1), remains as an open problem, which will be our next work, based on [4,5,10,11].
The author would like to thank the anonymous referees and the handling editor for their careful reading and for relevant remarks/suggestions to improve the paper.
All authors declare no conflicts of interest in this paper.
[1] |
H. Agarwal, F. Husain, Development of payload capacity enhanced robust video watermarking scheme based on symmetry of circle using lifting wavelet transform and SURF, J. Inf. Secur. Appl., 59 (2021), 102846. https://doi.org/10.1016/j.jisa.2021.102846 doi: 10.1016/j.jisa.2021.102846
![]() |
[2] |
S. Xuecheng, L. Zheming, W. Zhe, L. Yongliang, A geometrically robust multi-bit video watermarking algorithm based on 2-D DFT, Multimed. Tools Appl., 80 (2021), 13491-13511. https://doi.org/10.1007/s11042-020-10392-9 doi: 10.1007/s11042-020-10392-9
![]() |
[3] | G. Sandaruwan, L. Ranathunga, Robust and adaptive watermarking technique for digital images. IEEE International Conference on Industrial & Information Systems. IEEE, 2017, 1-6. https://doi.org/10.1109/ICⅡNFS.2017.8300387 |
[4] |
M. Reza Keyvanpour, N. Khanbani, M. Boreiry, A secure method in digital video watermarking with transform domain algorithms, Multimed. Tools Appl., 80 (2021), 20449-20476. https://doi.org/10.1007/s11042-021-10730-5 doi: 10.1007/s11042-021-10730-5
![]() |
[5] |
D. Ariatmanto, F. Ernawan, An improved robust image watermarking by using different embedding strengths, Multimed. Tools Appl., 79 (2020), 12041-12067. https://doi.org/10.1007/s11042-019-08338-x doi: 10.1007/s11042-019-08338-x
![]() |
[6] |
J. Abraham, V. Paul, An imperceptible spatial domain color image watermarking scheme, J. King Saud Univ.-Comput. Inf. Sci., 31 (2019), 125-133. https://doi.org/10.1016/j.jksuci.2016.12.004 doi: 10.1016/j.jksuci.2016.12.004
![]() |
[7] |
W. Zhou, G. Jiang, M. Yu, F. Shao, Z. Peng, Reduced-reference stereoscopic image quality assessment based on view and disparity zero-watermarks, Signal Process. Image Commun., 29 (2014), 167-176. https://doi.org/10.1016/j.image.2013.10.005 doi: 10.1016/j.image.2013.10.005
![]() |
[8] |
D. Fan, Y. Li, S. Gao, A novel zero watermark optimization algorithm based on Gabor transform and discrete cosine transform, Concurr. Comput. Pract. Exp., 2 (2020). https://doi.org/10.1002/cpe.5689 doi: 10.1002/cpe.5689
![]() |
[9] |
C. Kumar, A. K. Singh, P. Kumar, et al, SPHIT-based multiple image watermarking in NSCT domain, Concurr. Comput. Pract. Exp., 32 (2020), e4912.1-e4912.9. https://doi.org/10.1002/cpe.4912 doi: 10.1002/cpe.4912
![]() |
[10] |
M. Moosazadeh, G. Ekbatanifard, An improved robust image watermarking method using DCT and YCoCg-R color space, Optik, 140 (2017), 975-988. https://doi.org/10.1016/j.ijleo.2017.05.011 doi: 10.1016/j.ijleo.2017.05.011
![]() |
[11] | C. Zhu, Y. Li, W. Chi, S. Gao, D. Fan, Zero-watermarking algorithm for color image in contourlet domain based on Schur decomposition, Inf. Technol. Inf. Technol., 227 (2019), 94-98. |
[12] |
D. Wei, Y. Li, Convolution and Multichannel Sampling for the Offset Linear Canonical Transform and Their Applications, IEEE T. Signal PR., 67 (2019), 6009-6024. https://doi.org/10.1109/TSP.2019.2951191 doi: 10.1109/TSP.2019.2951191
![]() |
[13] |
D. Wei, M. Jiang, A fast image encryption algorithm based on parallel compressive sensing and DNA sequence, Optik, 238 (2021), 166748. https://doi.org/10.1016/j.ijleo.2021.166748 doi: 10.1016/j.ijleo.2021.166748
![]() |
[14] |
Y. Li, D. Wei, L. Zhang, Double-encrypted watermarking algorithm based on cosine transform and fractional Fourier transform in invariant wavelet domain, Inf. Sci., 551 (2021), 205-227. https://doi.org/10.1016/j.ins.2020.11.020 doi: 10.1016/j.ins.2020.11.020
![]() |
[15] |
W. Zhou, C. Liu, J. Lei, L. Yu, T. Luo, HFNet: Hierarchical feedback network with multilevel atrous spatial pyramid pooling for RGB-D saliency detection, Neurocomputing, 2021. https://doi.org/10.1016/j.neucom.2021.11.100 doi: 10.1016/j.neucom.2021.11.100
![]() |
[16] |
W. Zhou, J. Liu, J. Lei, L. Yu, J. Hwang, GMNet: Graded-feature multilabel-learning network for RGB-thermal urban scene semantic segmentation, IEEE T. Image Process., 30 (2021), 7790-7802. https://doi.org/10.1109/TIP.2021.3109518 doi: 10.1109/TIP.2021.3109518
![]() |
[17] |
M. Tancik, B. Mildenhall, R. NG, Invisible hyperlinks in physical photographs, Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2020, 2117-2126. https://doi.org/10.1109/CVPR42600.2020.00219 doi: 10.1109/CVPR42600.2020.00219
![]() |
[18] |
S. Anguraj, P. S. Shantharajah, E J. Jeba, A steganographic method based on optimized audio embedding technique for secure data communication in the Internet of Things, Comput. Intell., 36 (2019), 557-573. https://doi.org/10.1111/coin.12253 doi: 10.1111/coin.12253
![]() |
[19] |
P. Hu, D. Peng, Z. Yi. Y. Xiang, Robust time-spread echo watermarking using characteristics of host signals, Electron. Lett., 52 (2016), 5-6. https://doi.org/10.1049/el.2015.1508 doi: 10.1049/el.2015.1508
![]() |
[20] |
M. Mosleh, S. Setayeshi, B. Barekatain, M. Mohammad, A novel audio watermarking scheme based on fuzzy inference system in DCT domain, Multimed. Tools Appl., 80 (2021), 20423-20447. https://doi.org/10.1007/s11042-021-10686-6 doi: 10.1007/s11042-021-10686-6
![]() |
[21] |
M. Abdelwahab Khaled, M. Abd El-atty Saied, Wi. El-Shafa, S. El-Rabaie, F. E. Abd El-Samie, Efficient SVD-based audio watermarking technique in FRT domain, Multimed. Tools Appl., 79 (2020), 5617-5648. https://doi.org/10.1007/s11042-019-08023-z doi: 10.1007/s11042-019-08023-z
![]() |
[22] |
H. Karajeh, T. Khatib, L. Rajab, M. Maqableh, A robust digital audio watermarking scheme based on DWT and Schur decomposition, Multimed. Tools Appl., 78 (2019), 18395-18418. https://doi.org/10.1007/s11042-019-7214-3 doi: 10.1007/s11042-019-7214-3
![]() |
[23] |
S. Bhargavi Latha, D. Venkata Reddy, A. Damodaram, Video watermarking using neural networks, Int. J. Inf. Comput. Secur., 14 (2021), 40-59. https://doi.org/10.1504/IJICS.2021.112207 doi: 10.1504/IJICS.2021.112207
![]() |
[24] |
J. Sang, Q. Liu, C. Song, Robust video watermarking using a hybrid DCT-DWT approach, J. Electron. Sci. Technol., 18 (2020), 179-189. https://doi.org/10.1016/j.jnlest.2020.100052 doi: 10.1016/j.jnlest.2020.100052
![]() |
[25] |
Kh. Manglem Singh, A robust rotation resilient video watermarking scheme based on the SIFT, Multimed. Tools Appl., 77 (2018), 16419-16444. https://doi.org/10.1007/s11042-017-5213-9 doi: 10.1007/s11042-017-5213-9
![]() |
[26] |
A. Rakesh, B. Sarabjeet Singh, Video watermarking scheme based on IDR frames using MPEG-2 structure, Int. J. Inf. Comput. Secur., 11 (2019), 585-603. https://doi.org/10.1504/IJICS.2019.103065 doi: 10.1504/IJICS.2019.103065
![]() |
[27] |
C. Li, Y. Yang, K. Liu, L. Tian, A Semi-Fragile video watermarking algorithm based on H.264/AVC, Wirel. Commun. Mob. Comput., 2020. https://doi.org/10.1155/2020/8848553 doi: 10.1155/2020/8848553
![]() |
[28] |
F. Madine, M. A. Akhaee, N. Zarmehi, A multiplicative video watermarking robust to H.264/AVC compression standard, Signal Process. Image Commun., 68 (2018), 229-240. https://doi.org/10.1016/j.image.2018.06.015 doi: 10.1016/j.image.2018.06.015
![]() |
[29] |
S. Gaj, A. Sur, PK. Bora, Prediction mode based H.265/HEVC video watermarking resisting re-compression attack, Multimed. Tools Appl., 79 (2020), 18089-18119. https://doi.org/10.1007/s11042-019-08301-w doi: 10.1007/s11042-019-08301-w
![]() |
[30] |
J. Dittmann, A. Steinmetz, R. Steinmetz, Content-based Digital Signature for Motion Pictures Authentication and Content-Fragile Watermarking, IEEE International Conference of the Multimedia Systems, 1 (1999), 574-579. https://doi.org/10.1109/MMCS.1999.779264 doi: 10.1109/MMCS.1999.779264
![]() |
[31] | P. Agrawal, A. Khurshid, DWT and GA-PSO Based Novel Watermarking for Videos Using Audio Watermark, International conference on swarm intelligence. ICSI, 2014,212-220. https://doi.org/10.1007/978-3-319-11897-0_25 |
[32] |
M. Sun dararajan, G. Yamuna, CWT and CS algorithm based video watermarking using audio watermark, Procedia Comput. Sci., 87 (2016), 93-98. https://doi.org/10.1016/j.procs.2016.05.132 doi: 10.1016/j.procs.2016.05.132
![]() |
[33] | X. Wang, Y. Pan, Audio and video cross watermarking algorithm based-on visual saliency model, Electron. Meas. Technol., 40 (2017), 112-115. |
[34] | Z. Esmaeilbeig, S. Ghaemmaghami, Compressed Video Watermarking for Authentication and Reconstruction of the Audio Part, 2018 15th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology. ISCISC. 2018, 1-6. https://doi.org/10.1109/ISCISC.2018.8546897 |
[35] |
G. Sucharitha, R. Kumar Senapati, Biomedical image retrieval by using local directional edge binary patterns and Zernike moments, Multimed. Tools Appl., 79 (2020), 1847-1864. https://doi.org/10.1007/s11042-019-08215-7 doi: 10.1007/s11042-019-08215-7
![]() |
[36] | J. Qu, Image encryption algorithm based on Logistic chaotic scrambling, Science and Technology Innovation, 2020, 2. |
[37] | Y. Jiang, M. Cai, C. Song, SIFT based video watermarking algorithm against manifold attacks in contourlet domain, Comput. Simul., 35 (2018), 314-320. |
[38] |
C. Maiti, B. C. Dhara, Robust non-blind video watermarking using DWT and QR decomposition, Adv. Intel. Syst. Comput., 999 (2020), 333-343. https://doi.org/10.1007/978-981-13-9042-5_28 doi: 10.1007/978-981-13-9042-5_28
![]() |
[39] | R. Singh, A. Ashok, M. Saraswat, Robust Video Watermarking in Frequency Domain for Copyright Protection, ACM International Conference Proceeding Series, AICPS, 2021,174-178. https://doi.org/10.1145/3474124.3474148 |