Aiming at the problem of easy tampering and difficult integrity authentication of paper text documents, this paper proposes a robust content authentication method for printed documents based on text watermarking scheme resisting print-and-scan attack. Firstly, an authentication watermark signal sequence related to content of text document is generated based on the Logistic chaotic map model; then, the authentication watermark signal sequence is embedded into printed paper document by using a robust text watermarking scheme; finally, the watermark information is extracted from scanned image of paper document, and compared with the authentication watermark information calculated in real time by the text document content obtained by OCR technology, thereby performing content integrity authentication of the paper text documents. Experimental results show that our method can achieve the robust content integrity authentication of paper text documents, and can also accurately locate the tampering position. In addition, the document after embedding the watermark information has a good visual effect, and the text watermarking scheme has a large information capacity.
Citation: Wenfa Qi, Wei Guo, Tong Zhang, Yuxin Liu, Zongming Guo, Xifeng Fang. Robust authentication for paper-based text documents based on text watermarking technology[J]. Mathematical Biosciences and Engineering, 2019, 16(4): 2233-2249. doi: 10.3934/mbe.2019110
[1] | Feida Jiang . Weak solutions of generated Jacobian equations. Mathematics in Engineering, 2023, 5(3): 1-20. doi: 10.3934/mine.2023064 |
[2] | Pengfei Guan . A weighted gradient estimate for solutions of Lp Christoffel-Minkowski problem. Mathematics in Engineering, 2023, 5(3): 1-14. doi: 10.3934/mine.2023067 |
[3] | Stefano Almi, Giuliano Lazzaroni, Ilaria Lucardesi . Crack growth by vanishing viscosity in planar elasticity. Mathematics in Engineering, 2020, 2(1): 141-173. doi: 10.3934/mine.2020008 |
[4] | Bin Deng, Xinan Ma . Gradient estimates for the solutions of higher order curvature equations with prescribed contact angle. Mathematics in Engineering, 2023, 5(6): 1-13. doi: 10.3934/mine.2023093 |
[5] | Jinghong Li, Hongyu Liu, Wing-Yan Tsui, Xianchao Wang . An inverse scattering approach for geometric body generation: a machine learning perspective. Mathematics in Engineering, 2019, 1(4): 800-823. doi: 10.3934/mine.2019.4.800 |
[6] | Edgard A. Pimentel, Miguel Walker . Potential estimates for fully nonlinear elliptic equations with bounded ingredients. Mathematics in Engineering, 2023, 5(3): 1-16. doi: 10.3934/mine.2023063 |
[7] | Giovanni Cupini, Paolo Marcellini, Elvira Mascolo . Local boundedness of weak solutions to elliptic equations with p,q−growth. Mathematics in Engineering, 2023, 5(3): 1-28. doi: 10.3934/mine.2023065 |
[8] | Zaffar Mehdi Dar, M. Arrutselvi, Chandru Muthusamy, Sundararajan Natarajan, Gianmarco Manzini . Virtual element approximations of the time-fractional nonlinear convection-diffusion equation on polygonal meshes. Mathematics in Engineering, 2025, 7(2): 96-129. doi: 10.3934/mine.2025005 |
[9] | Marco Cirant, Kevin R. Payne . Comparison principles for viscosity solutions of elliptic branches of fully nonlinear equations independent of the gradient. Mathematics in Engineering, 2021, 3(4): 1-45. doi: 10.3934/mine.2021030 |
[10] | Claudia Lederman, Noemi Wolanski . Lipschitz continuity of minimizers in a problem with nonstandard growth. Mathematics in Engineering, 2021, 3(1): 1-39. doi: 10.3934/mine.2021009 |
Aiming at the problem of easy tampering and difficult integrity authentication of paper text documents, this paper proposes a robust content authentication method for printed documents based on text watermarking scheme resisting print-and-scan attack. Firstly, an authentication watermark signal sequence related to content of text document is generated based on the Logistic chaotic map model; then, the authentication watermark signal sequence is embedded into printed paper document by using a robust text watermarking scheme; finally, the watermark information is extracted from scanned image of paper document, and compared with the authentication watermark information calculated in real time by the text document content obtained by OCR technology, thereby performing content integrity authentication of the paper text documents. Experimental results show that our method can achieve the robust content integrity authentication of paper text documents, and can also accurately locate the tampering position. In addition, the document after embedding the watermark information has a good visual effect, and the text watermarking scheme has a large information capacity.
This research focuses on the comprehensive connection among analytic functions and their inverses, which provides new ideas for investigating coefficient estimates and inequalities. The outcome of the present study is particularly relevant in the framework of geometric function theory (GFT), where particular geometric properties are established for analytic functions employing methods specific to this domain of research, but also could offer applications in other related fields such as partial differential equation theory, engineering, fluid dynamics, and electronics. Tremendous impact in the development of GFT was given by the Bieberbach's conjecture, an essential problem related to coefficient estimates for functions that lie within the family S of univalent functions. This conjecture suggests that for f∈S, expressed through the Taylor–Maclaurin series expansion:
f(υ)=υ+∞∑k=2dkυk,υ∈D, | (1.1) |
where D:={υ∈C:|υ|<1}, the coefficients inequality |dk|≤k holds for all k≥2. The family of such analytic functions with the series representation provided in (1.1) is represented by A. It is worth mentioning that Koebe first introduced S as a subclass of A in 1907. Bieberbach [1] originally proposed this conjecture in 1916, initially verifying it for the case k=2. Subsequent advancements by researchers including Löwner [2], Garabedian and Schiffer [3], Pederson and Schiffer [4], and Pederson [5] offered partial proofs for cases up to k=6. However, the complete proof for k≥7 remained unsolved until 1985, when de-Branges [6] utilized hypergeometric functions to establish it for k≥2.
In 1960, Lawrence Zalcman postulated the functional |d2k−d2k−1|≤(k−1)2 with k≥2 for f∈S in order to establish the Bieberbach hypothesis. This has led to the publication of several papers [7,8,9] on the Zalcman hypothesis and its generalized form |λd2k−d2k−1|≤λk2−2k+1 with λ≥0 for various subfamilies of the family S. This hypothesis remained unproven for a long time until Krushkal's breakthrough in 1999, when he proved it in [10] for k≤6 and solved it by utilizing the holomorphic homotopy of univalent functions in an unpublished manuscript [11] for k≥2. It was also demonstrated that |dlk−dl(k−1)2|≤2l(k−1)−kl with k,l≥2 for f∈S. The Bieberbach conjecture landscape is further enhanced by other conjectures, such as the one presented by Ma [12] in 1999, which is
|djdk−dj+k−1|≤(j−1)(k−1),j,k≥2. |
He restricted his proof to a subclass of S. The challenge for class S remains available.
Now, let us recall the concept of subordination, which essentially describes a relationship between analytic functions. An analytic function g1 is subordinate to g2 if there exists a Schwarz function ω such that g1(υ)=g2(ω(υ)) and it is mathematically represented as g1≺g2. If g2 is univalent in D, then
g1(υ)≺g2(υ),(υ∈D), |
if and only if
g1(0)=g2(0) & g1(D)⊑g2(D). |
In essence, this relationship helps us understand how one function is "contained" within another, providing insights into their behavior within the complex plane. The family of univalent functions comprises three classic subclasses C, S∗, and K, each distinguished by its unique properties. These subclasses are commonly known as convex functions, starlike functions, and close-to-convex functions, respectively. Let us define each class:
C:={f∈S:(υf′(υ))′f′(υ)≺1+υ1−υ,υ∈D}, |
S∗:={f∈S:υf′(υ)f(υ)≺1+υ1−υ,υ∈D} |
and
K:={f∈S:υf′(υ)h(υ)≺1+υ1−υ,υ∈D}, |
for some h∈S∗. The above family K may be reduced to the family of bounded turning functions BT by choosing h(υ)=υ. Moreover, a number of intriguing subfamilies of class S were examined by replacing 1+υ1−υ by other special functions. For the reader's benefit, a few of them are included below:
(i). S∗e≡S∗(ez) and Ce≡C(ez) [13], S∗SG≡S∗(21+e−z) and CSG≡C(21+e−z)[14],
(ii). S∗cr≡S∗(z+√1+z2) and Ccr≡C(z+√1+z2) [15], S∗Ne≡S∗(1+z−13z3) [16],
(iii). S∗(n−1)L≡S∗(Ψn−1(z)) [17] with Ψn−1(z)=1+nn+1z+1n+1zn for n≥2.
(iv). S∗sinh≡S∗(1+sinh(λz)) with 0≤λ≤ln(1+√2) [18].
It is observed that a significant area of mathematics is the study of the inverse functions for the functions in various subclasses of S. The well-known Koebe's 1/4 theorem states that there exists the inverse f−1 for every univalent function f defined in D, at least on the disk with a radius of 1/4, which has Taylor's series form
f−1(ω):=ω+∞∑n=2Bnωn,|ω|<1/4. | (1.2) |
Employing the formula f(f−1(ω))=ω, we acquire
B2=−d2, | (1.3) |
B3=2d22−d3, | (1.4) |
B4=5d2d3−5d32−d4, | (1.5) |
B5=14d42+3d23−21d22d3+6d2d4−d5. | (1.6) |
We consider the Hankel determinant of f−1 given by
ˆHλ,n(f−1)=|BnBn+1…Bn+λ−1Bn+1Bn+2…Bn+λ⋮⋮…⋮Bn+λ−1Bn+λ…Bn+2λ−2|. |
Specifically, the second and third-order Hankel determinants of f−1 are defined as the following determinants, respectively:
ˆH2,2(f−1)=|B2B3B3B4|=B2B4−B23,ˆH3,1(f−1)=|1B2B3B2B3B4B3B4B5|=B3(B2B4−B23)−B4(B4−B2B3)+B5(B3−B22). |
As it is seen, f−1 is also not necessary to be univalent. Thus, this concept is also a natural generalization of the Hankel determinant with coefficients of f∈S as entries. There are very few publications in the literature that address coefficient-related problems of the inverse function, particularly determinants as stated above. Due to such a reason, the researchers motivated, and so this led to the publication of some good articles [19,20,21,22,23] on the above-stated Hankel determinants.
The key mathematical concept in this study is the Hankel determinant ˆHλ,n(f), where n,λ∈{1,2,…}. This concept was introduced by Pommerenke [24,25]. It is composed of the coefficients of the function f∈S and is expressed as
ˆHλ,n(f):=|dndn+1…dn+λ−1dn+1dn+2…dn+λ⋮⋮…⋮dn+λ−1dn+λ…dn+2λ−2|. |
This determinant is utilized in both pure mathematics and applied sciences, including non-stationary signal theory in the Hamburger moment problem, Markov process theory, and a variety of other fields. There are relatively few publications on the estimates of the Hankel determinant for functions in the general class S. Hayman established the best estimate for f∈S in [26] by asserting that |ˆH2,n(f)|≤|η|, where η is a constant. Moreover, it was demonstrated in [27] that |ˆH2,2(f)|≤η where 0≤η≤11/3 for f∈S. The two determinants ˆH2,1(f) and ˆH2,2(f) for different subfamilies of univalent functions have been thoroughly examined in the literature. Notable work was done by Janteng et al. [28], Lee et al. [29], Ebadian et al. [30], and Cho et al. [31], who determine the sharp estimates of the second-order Hankel determinant for certain subclasses of S.
The sharp estimate of the third-order Hankel determinant ˆH3,1(f) for some analytic univalent functions is mathematically more difficult to find than the second-order Hankel determinant. Numerous articles on the third-order Hankel determinant have been published in the literature in which nonsharp limits of this determinant for the fundamental subclasses of analytic functions are determined. Following these arduous investigations, a few scholars were eventually able to obtain sharp bounds of this determinant for the classes C, BT, and S∗, as reported in the recently published works [32,33,34], respectively. These estimates are given by
|ˆH3,1(f)|≤{4135forf∈C,14forf∈BT,49forf∈S∗. |
Later on, Lecko et al. [35] established the sharp estimate for |ˆH3,1(f)| by utilizing similar approaches, specifically for functions that belong to the S∗(1/2) class. Also, the articles [36,37,38] provide more investigations on the exact bounds of this third-order Hankel determinant.
Now, let us consider the three function classes defined respectively by
S∗Sg:={f∈S:2υf′(υ)f(υ)−f(−υ)≺21+e−υ,υ∈D}, |
S∗3l,s:={f∈S:2υf′(υ)f(υ)−f(−υ)≺1+45υ+15υ4,υ∈D} |
and
SKexp:={f∈S:2(υf′(υ))′(f(υ)−f(−υ))′≺eυ,υ∈D}. |
These classes have been studied by Faisal et al. [39], Tang et al. [40], and Mendiratta et al. [13] respectively. In this paper, we improved the bound of the third-order Hankel determinant |ˆH3,1(f−1)|, which was determined by Hu and Deng [41] and published recently in AIMS Mathematics. Furthermore, we obtain the bounds of the initial three inverse coefficients together with the sharp bounds of Krushkal, Zalcman, and Fekete–Szeg ö functionals along with the Hankel determinants |ˆH2,2(f−1)| and |ˆH3,1(f−1)| upper bounds.
Let B0 be the class of Schwarz functions. It is noted that ω∈B0 can be written as
ω(υ)=∞∑n=1σnυn,υ∈D. | (2.1) |
We require the following lemmas to prove our main results.
Lemma 2.1. [42] Let ω(υ) be a Schwarz function. Then, for any real numbers ϱ and ς such that
(ϱ,ς)={|ϱ|≤12, −1≤ς≤1}∪{12≤|ϱ|≤2, 427(|ϱ|+1)3−(|ϱ|+1)≤ς≤1},(ϱ,ς)={2≤|ϱ|≤4, 2(|ϱ|+1)|ϱ|4+|ϱ|2+2|ϱ|≤ς≤112(ϱ2+8)},(ϱ,ς)={12≤|ϱ|≤2, −23(1+|ϱ|)≤ς≤427(1+|ϱ|)3−(1+|ϱ|)}, |
the following sharp estimate holds:
|σ3+ϱσ1σ2+ςσ31|≤1. |
Lemma 2.2. [43] If ω(υ) be a Schwarz function, then
|σn|≤1,n≥1. | (2.2) |
Moreover, for τ∈C, the following inequality holds
|σ2+τσ21|≤max{1,|τ|}. | (2.3) |
Lemma 2.3. [44] Let ω(υ) be a Schwarz function. Then
|σ2|≤1−|σ1|2, | (2.4) |
|σ3|≤1−|σ1|2−|σ2|21+|σ1|, | (2.5) |
|σ4|≤1−|σ1|2−|σ2|2. | (2.6) |
Lemma 2.4. [45] Let ω(υ) be a Schwarz function. Then
|σ1σ3−σ22|≤1−|σ1|2 |
and
|σ4+(1+Λ)σ1σ3+σ22+(1+2Λ)σ21σ2+Λσ41|≤max{1,|Λ|},Λ∈C. | (2.7) |
In this section, we will improve the bound of the third-order Hankel determinant |ˆH3,1(f−1)| with inverse coefficient entries for functions belonging to the class S∗Sg.
Theorem 3.1. Let f−1 be the inverse of the function f∈S∗Sg and has the form (1.2). Then
|ˆH3,1(f−1)|<0.0317. |
Proof. Let f∈S∗Sg. Then, by subordination relationship, it implies
2υf′(υ)f(υ)−f(−υ)=21+e−ω(υ),υ∈D | (3.1) |
and also assumes that
ω(υ)=σ1υ+σ2υ2+σ3υ3+σ4υ4+⋯. | (3.2) |
Using (1.1), we obtain
2υf′(υ)f(υ)−f(−υ):=1+2d2υ+2d3υ2+(−2d2d3+4d4)υ3+(−2d23+4d5)υ4+⋯. | (3.3) |
By some easy calculation and utilizing the series expansion of (3.2), we achieve
21+e−ω(υ)=1+12σ1υ+12σ2υ2+(−124σ31+12σ3)υ3+(−18σ21σ2+12σ4)υ4+⋯. | (3.4) |
Now by comparing (3.3) and (3.4), we obtain
d2=14σ1, | (3.5) |
d3=14σ2, | (3.6) |
d4=−196σ31+18σ3+132σ1σ2, | (3.7) |
d5=18σ4+132σ22−132σ21σ2. | (3.8) |
Putting (3.5)–(3.8) in (1.3)–(1.6), we obtain
B2=−14σ1, | (3.9) |
B3=−14σ2+18σ21, | (3.10) |
B4=−13192σ31−18σ3+932σ1σ2, | (3.11) |
B5=532σ22−14σ21σ2+5128σ41−18σ4+316σ1σ3. | (3.12) |
The determinant |ˆH3,1(f−1)| can be reconfigured as follows:
|ˆH3,1(f−1)|=|2B2B3B4−B24−B22B5−B33+B3B5|. |
From (3.9)–(3.12), we easily write
|ˆH3,1(f−1)|=164|−σ23+(12σ2+16σ21)σ1σ3+5576σ61−32σ32+2σ2σ4 −548σ41σ2+516σ21σ22−12σ21σ4|. |
Now we begin by utilizing Lemma 2.1 with ϱ=−12 and ς=−16 that
|σ3[σ3+(−12)σ1σ2+(−16)σ31]|≤|σ3| |
and also by using Lemma 2.3, we have
|σ3|≤1−|σ2|21+|σ1|−|σ1|2≤1−|σ2|22−|σ1|2. |
Applying it and also using |σ4|≤1−|σ2|2−|σ1|2, we achieve
|ˆH3,1(f−1)|≤164E(|σ1|,|σ2|), |
where
E(σ,t)=1−σ2−12t2+5576σ6+32t3+2t(1−σ2−t2)+548σ4t+516σ2t2 +12σ2(1−σ2−t2), σ=|σ1|, t=|σ2|. |
But E is a decreasing function of the variable σ; consequently,
E(σ,t)≤E(0,t)=1−12t2−12t3+2t. |
The function E(0,t) reaches its maximum value in [0,1] if t=−13+13√13, so E(0,t)≤2.0322, which completes the proof.
Conjecture 3.2. If the inverse of f∈S∗Sg is of the form (1.2), then
|ˆH3,1(f−1)|≤164. |
Equality will be obtained by using (1.3)–(1.6) together with
2υf′(υ)f(υ)−f(−υ)=1+12υ3−124υ9+⋯. |
We begin this section by computing the estimates of the first three initial inverse coefficients for functions in the family S∗3l,s.
Theorem 4.1. Let the inverse function of f∈S∗3l,s has the series form (1.2). Then
|B2|≤25,|B3|≤25,|B4|≤15. |
The equality can easily be obtained by utilizing (1.3) up to (1.5) together with
2υf′(υ)f(υ)−f(−υ)=1+12υm−124υ4m+⋯, for m=1,2,3. | (4.1) |
Proof. Let f∈S∗3l,s. Then we easily write
2υf′(υ)f(υ)−f(−υ)=1+45ω(υ)+15(ω(υ))4,υ∈D, |
and here ω represents the Schwarz function. Also, let us assume that
ω(υ)=σ1υ+σ2υ2+σ3υ3+σ4υ4+⋯. | (4.2) |
Using (1.1), we obtain
2υf′(υ)f(υ)−f(−υ)=1+2d2υ+2d3υ2+(4d4−2d2d3)υ3 +(4d5−2d23)υ4⋯. | (4.3) |
By some easy calculation and utilizing the series expansion of (4.2), we have
1+45ω(υ)+15(ω(υ))4=1+45σ1υ+45σ2υ2+45σ3υ3+(45σ4+15σ41)υ4+⋯. | (4.4) |
Now, by comparing (4.3) and (4.4), we obtain
d2=25σ1, | (4.5) |
d3=25σ2, | (4.6) |
d4=15σ3+225σ1σ2, | (4.7) |
d5=15σ4+120σ41+225σ22. | (4.8) |
Substituting (4.5)–(4.8) in (1.3)–(1.6), we obtain
B2=−25σ1, | (4.9) |
B3=825σ21−25σ2, | (4.10) |
B4=−825σ31−15σ3+1825σ1σ2, | (4.11) |
B5=7712500σ41−144125σ21σ2+1225σ1σ3+25σ22−15σ4. | (4.12) |
Using (2.2) in (4.9), we achieve
|B2|≤25. |
To prove the second inequality, we can write (4.10) as
|B3|=25|σ2+(−45)σ21|. |
Applying (2.3) in the above equation, we achieve
|B3|≤25. |
From (4.11), we deduce that
|B4|=15|σ3+(−185)σ1σ2+85σ31|. |
Comparing it with Lemma 2.1, we note that
ϱ=−185andς=85. |
It is clear that 2≤|ϱ|≤4 with
2|ϱ|(|ϱ|+1)|ϱ|2+2|ϱ|+4=45151≤ςandς≤112(ϱ2+8)=13175. |
All the conditions of Lemma 2.1 are satisfied. Therefore
|B4|≤15. |
The required proof is thus completed.
Now, we compute the Fekete–Szegö functional bound for the inverse function of f∈S∗3l,s.
Theorem 4.2. If f−1 is the inverse of the function f∈S∗3l,s with series expansion (1.2), then
|B3−τB22|≤max{25,|4τ−825|},τ∈C. |
This functional bound is sharp.
Proof. Putting (4.9) and (4.10), we obtain
|B3−τB22|=|−25σ2−4τ25σ21+825σ21|=25|σ2+(2τ−45)σ21|. |
Application of (2.3) leads us to
|B3−τB22|≤max{25,|4τ−825|}. |
The bound of the above functional is best possible, and it can easily be checked by (1.3), (1.4), and (4.1) with m=2.
By replacing τ=1 in Theorem 4.2, we arrive at the below result.
Corollary 4.3. If the inverse of the function f∈S∗3l,s is f−1 with series expansion (1.2), then
|B3−B22|≤25. |
This estimate is sharp, and equality will be obtained by using (1.3), (1.4), and (4.1) with m=2.
Next, we investigate the Zalcman functional upper bound for f−1∈S∗3l,s.
Theorem 4.4. If f∈S∗3l,s and its inverse function f−1 have the form (1.2), then
|B2B3−B4|≤15. |
The above estimate is sharp.
Proof. Taking use of (4.9)–(4.11), we achieve
|B2B3−B4|=15|σ3+(−145)σ1σ2+2425σ31|. |
From Lemma 2.1, let
ϱ=−145andς=2425. |
It is clear that 2≤|ϱ|≤4 with
2|ϱ|(|ϱ|+1)|ϱ|2+2|ϱ|+4=35109≤ςandς≤112(ϱ2+8)=3325. |
Thus, all the conditions of Lemma 2.1 are satisfied. Hence
|B2B3−B4|≤15. |
The required estimate is best possible and will easily be obtained by using (1.3)–(1.5), and (4.1) with m=3.
Further, we intend to compute the Krushkal functional bound for the family S∗3l,s.
Theorem 4.5. If f∈S∗3l,s and its inverse function f−1 have the form (1.2), then
|B4−B32|≤15. |
This estimate is sharp.
Proof. Putting (4.9) and (4.11), we obtain
|B4−B32|=15|σ3+(−185)σ1σ2+(3225)σ31|. |
From Lemma 2.1, let
ϱ=−185andς=3225. |
It is clear that 2≤|ϱ|≤4 with
2|ϱ|(|ϱ|+1)|ϱ|2+2|ϱ|+4=45151≤ςandς≤112(ϱ2+8)=13175. |
Thus, all the conditions of Lemma 2.1 are satisfied. Hence
|B4−B32|≤15. |
This estimate is best possible and will be confirmed by using (1.3), (1.5), and (4.1) with m=3.
In the upcoming result, we will investigate the estimate of ˆH2,2(f−1) for the family S∗3l,s.
Theorem 4.6. Let the inverse function of f∈S∗3l,s has the series expansion (1.2). Then
|ˆH2,2(f−1)|≤425. |
This inequality is sharp, and equality will easily be achieved by using (1.3)–(1.5) and (4.1) with m=2.
Proof. The determinant ˆH2,2(f−1) can be reconfigured as follows:
ˆH2,2(f−1)=B2B4−B23.=−d23+d2d4−d22d3+d42. |
Substituting (4.9)–(4.11), we achieve
|ˆH2,2(f−1)|=425|−425σ41+15σ21σ2−12σ1σ3+σ22|=425|12(σ22−σ1σ3)+12(−825σ41+25σ21σ2+σ22)|≤450|σ22−σ1σ3|+450|−825σ41+25σ21σ2+σ22|=450Y1+450Y2, |
where
Y1=|σ22−σ1σ3|, |
and
Y2=|−825σ41+25σ21σ2+σ22|. |
Utilizing Lemma 2.4, we acquire Y1≤1. Applying (2.4) along with triangle inequality for Y2, we have
|Y2|≤(1−|σ1|2)2+825|σ1|4+25(1−|σ1|2)|σ1|2. |
By setting |σ1|=ϰ with ϰ∈(0,1], we obtain
|Y2|≤−23ϰ425−8ϰ25+1=N(ϰ). |
Clearly N′(ϰ)≤0, N(ϰ) is a decreasing function of ϰ, indicating that it achieves its maxima at ϰ=0, that is,
|Y2|≤1. |
Therefore
|ˆH2,2(f−1)|≤450Y1+450Y2≤425 |
and so the required proof is accomplished.
Theorem 4.7. Let f−1 be the inverse of f∈S∗3l,s with series expansion (1.2). Then
|ˆH3,1(f−1)|<0.11600. |
Proof. The determinant |ˆH3,1(f−1)| is described as follows:
|ˆH3,1(f−1)|=|2B2B3B4−B24−B22B5−B33+B3B5|. |
From (4.9)–(4.12), we easily write
|ˆH3,1(f−1)|=125|−σ23+45σ2σ1σ3−61625σ61−125σ32−67250σ41σ2 +5225σ21σ22−45σ21σ4+2σ2σ4|. |
The below inequality follows easily by using Lemma 2.1 with ϱ=−45 and ς=0
|σ3[σ3+(−45)σ1σ2+(0)σ31]|≤|σ3| |
and also by virtue of Lemma 2.3, we have
|σ3|≤1−|σ2|21+|σ1|−|σ1|2≤1−|σ2|22−|σ1|2. |
Applying it and also using |σ4|≤1−|σ2|2−|σ1|2, we achieve
|ˆH3,1(f−1)|≤125E(|σ1|,|σ2|), |
where
E(σ,t)=1−σ2−12t2+61625σ6+125t3+67250σ4t+5225σ2t2+45σ2(1−σ2−t2) +2t(1−σ2−t2), σ=|σ1|, t=|σ2|. |
But E is an increasing function of the variable σ; consequently,
E(σ,t)≤E(0,t)=1−12t2+25t3+2t. |
The function E(0,t) reaches its maximum value in [0,1] if t=1, so E(0,t)≤2910, which completes the proof.
Conjecture 4.8. If the inverse of f∈S∗3l,s is of the form (1.2), then
|ˆH3,1(f−1)|≤125. |
This result is best possible.
Next, we begin this section by determining the estimates of the first four initial coefficients for functions in the family f∈SKexp.
Theorem 5.1. If the function f∈SKexp has the series form (1.1), then
|d2|≤14,|d3|≤16,|d4|≤116,|d5|≤120. |
The equality is attained by the following extremal functions:
2υf′(υ)f(υ)−f(−υ)=1+υm+12υ2m+⋯, for m=1,2,3,4. | (5.1) |
Proof. Let f∈SKexp. Then there exists a Schwarz function w such that
2(υf′(υ))′(f(υ)−f(−υ))′=eω(υ),υ∈D. | (5.2) |
Also, assuming that
ω(υ)=σ1υ+σ2υ2+σ3υ3+σ4υ4+⋯. | (5.3) |
Using (1.1), we obtain
2(υf′(υ))′(f(υ)−f(−υ))′:=1+4d2υ+6d3υ2+(−12d2d3+16d4)υ3+(−18d23+20d5)υ4+⋯. | (5.4) |
By some easy calculation and utilizing the series expansion of (5.3), we achieve
eω(υ)=1+σ1υ+(σ2+12σ21)υ2+(σ3+σ1σ2+16σ31)υ3+(σ4+σ1σ3+12σ22+124σ41+12σ21σ2)υ4+⋯. | (5.5) |
Now by comparing (5.4) and (5.5), we have
d2=14σ1, | (5.6) |
d3=16σ2+112σ21, | (5.7) |
d4=116σ3+5192σ31+332σ1σ2, | (5.8) |
d5=120σ22+120σ4+120σ21σ2+120σ1σ3+1120σ41. | (5.9) |
Using (2.2) in (5.6), we obtain
|d2|≤14. |
Rearranging of (5.7), we obtain
|d3|=16|σ2+12σ21|. |
Applying (2.3) in the above equation, we achieve
|d3|≤16. |
For d4, we can write (5.8), as
|d4|=116|σ3+32σ1σ2+512σ31|. |
From Lemma 2.1, let
ϱ=32andς=512. |
It is clear that 12≤|ϱ|≤2 with
427(1+|ϱ|)3−(1+|ϱ|)=−527≤ςandς≤1. |
Hence the conditions of Lemma 2.1 are satisfied. Therefore
|d4|≤116. |
From (5.9), we deduce that
|d5|=120|12(2σ1σ3+σ4+σ22+σ41+3σ21σ2)+12(σ4+σ22−23σ41−σ21σ2)|. | (5.10) |
The initial segment is estimated by 12 by utilizing (2.7) with Λ=1. Lemma 2.3 uses for the estimation of the second segment in the following:
12|−23σ41+σ4−σ21σ2+σ22|≤12[−|σ2|2−|σ1|2+1+23|σ1|4+|σ1|2(1−|σ1|2)+|σ2|2].=−1|σ1|46+12≤12. |
By adding the bounds of the segments of (5.10), we achieve
|d5|≤120. |
Thus, the proof is completed.
Lastly, we will investigate the estimates of first three initial inverse coefficients for functions in the family SKexp.
Theorem 6.1. If the inverse function of f∈SKexp is of the form (1.2), then
|B2|≤14,|B3|≤16,|B4|≤116. |
Equalities hold in these bounds and will be confirmed by using (1.3)–(1.5) and (5.1) with m=1,2,3.
Proof. Applying (5.6)–(5.9) in (1.3)–(1.6), we achieve
B2=−14σ1, | (6.1) |
B3=124σ21−16σ2, | (6.2) |
B4=1196σ1σ2−116σ3, | (6.3) |
B5=−1320σ41−43960σ21σ2+7160σ1σ3+130σ22−120σ4. | (6.4) |
Using (2.2) in (6.1), we obtain
|B2|≤14. |
For B3, we can write (6.2), as
|B3|=16|σ2+(−14)σ21|. |
Applying (2.3) in the above equation, we achieve
|B3|≤16. |
For B4, we consider
|B4|=116|σ3+(−116)σ1σ2+(0)σ31|. |
From Lemma 2.1, let
ϱ=−116andς=0. |
It is clear that 12≤|ϱ|≤2 with
−23(|ϱ|+1)=−179≤ςandς≤427(1+|ϱ|)3−(1+|ϱ|)=391729. |
This shows that all conditions of Lemma 2.1 are satisfied. Thus
|B4|≤116. |
Thus, the required proof is completed.
Theorem 6.2. If f∈SKexp has inverse function f−1 with a series form (1.2), then
|B3−τB22|≤max16{1,|−2+3τ8|},τ∈C. |
This inequality is sharp.
Proof. Employing (6.1) and (6.2), we have
|B3−τB22|=16|σ2−14σ21+3τ8σ21|.=16|σ2+(3τ−28)σ21|. |
Implementation of Lemma 2.2 along with triangle inequality leads us to
|B3−τB22|≤max16{1,|−2+3τ8|}. |
The functional bound is sharp and will be obtained from (1.3), (1.4), and (5.1) with m=2.
By replacing τ=1 in Theorem 6.2, we arrive at the below result.
Corollary 6.3. If f∈SKexp has the inverse function with a series form (1.2), then
|B3−B22|≤16. |
The functional bound is sharp. Equality will be achieved by utilizing (1.3), (1.4), and (5.1) with m=2.
Theorem 6.4. If the inverse of the function f∈SKexp is expressed in (1.2), then
|B4−B2B3|≤116. |
This outcome is sharp, and it will be confirmed easily by using (1.3)–(1.5), and (5.1) with m=3.
Proof. From (6.1)–(6.3), we have
|B4−B2B3|=116|σ3−76σ1σ2−16σ31|. |
From Lemma 2.1, let
ϱ=−76andς=−16. |
It is clear that 12≤|ϱ|≤2 with
427(1+|ϱ|)3−(1+|ϱ|)=−481729≤ςandς≤1. |
Thus, all the conditions of Lemma 2.1 are satisfied. Hence
|B4−B2B3|≤116 |
and hence the proof is completed.
Theorem 6.5. If the inverse function of f∈SKexp is provided in (1.2), then
|B4−B32|≤116. |
Equality will be held by using (1.3), (1.5), and (5.1) with m=3.
Proof. Putting (6.1) and (6.3), we have
|B4−B32|=116|σ3+(−116)σ1σ2+(−14)σ31|. |
From Lemma 2.1, let
ϱ=−116andς=−14. |
It is clear that 12≤|ϱ|≤2 with
−23(|ϱ|+1)=−179≤ςandς≤427(1+|ϱ|)3−(1+|ϱ|)=391729. |
Thus, all the conditions of Lemma 2.1 are satisfied. Hence
|B4−B32|≤116. |
Theorem 6.6. Let f−1 be the inverse of f∈SKexp as defined in (1.2). Then
|ˆH2,2(f−1)|=|B2B4−B23|≤136. |
Equality will be achieved by using (1.3)–(1.5) and (5.1) with m=2.
Proof. From (6.1)–(6.3), we have
|ˆH2,2(f−1)|=136|116σ41+1732σ21σ2−916σ1σ3+σ22|=136|12(σ22−σ1σ3)+12(18σ41−18σ1σ3+1716σ21σ2+σ22)|≤172|σ22−σ1σ3|+172|18σ41−18σ1σ3+1716σ21σ2+σ22|=172R1+172R2, |
where
R1=|σ22−σ1σ3| |
and
R2=|18σ41−18σ1σ3+1716σ21σ2+σ22|. |
Utilizing Lemma 2.4, we obtain R1≤1. Also, by virtue of Lemma 2.3 for R2, we achieve
|R2|≤1716|σ1|2|σ2|+|σ1|48+|σ2|2+|σ1|8(−|σ2|2(|σ1|+1)−|σ1|2+1)≤|σ1|48+17|σ2||σ1|216+(−|σ1|8(|σ1|+1)+1)|σ2|2−|σ1|38+|σ1|8. | (6.5) |
Since (−|σ1|8(|σ1|+1)+1)>0. Thus, we can substitute (2.4) in (6.5), and we easily obtain
|R2|≤−|σ1|38+1716|σ1|2(1−|σ1|2)+(−|σ1|8(|σ1|+1)+1)(1−|σ1|2)2 +|σ1|8+|σ1|48. |
The basic computation of maximum and minimum leads us to
|R2|≤1. |
Hence
|ˆH2,2(f−1)|≤172R1+172R2≤136. |
The proof is thus accomplished.
Theorem 6.7. Let f−1 be the inverse function of f∈SKexp and is expressed in (1.2). Then
|ˆH3,1(f−1)|<0.006671. |
Proof. The determinant |ˆH3,1(f−1)| can be expressed as follows:
|ˆH3,1(f−1)|=|2B2B3B4−B24−B22B5−B33+B3B5|. |
From (6.1)–(6.4), we easily write
|ˆH3,1(f−1)|=1256|−σ23+(715σ2+110σ21)σ1σ3−1540σ61−160σ41σ2−13180σ21σ22 +415σ21σ4−32135σ32+3215σ2σ4|. |
At the beginning, it should be noted that
|σ3[σ3+(−715)σ1σ2+(−110)σ31]|≤|σ3|, |
where we have used Lemma 2.1 with ϱ=−715 and ς=−110. Also, by using Lemma 2.3, we have
|σ3|≤1−|σ2|21+|σ1|−|σ1|2≤1−|σ2|22−|σ1|2. |
Applying it and also using |σ4|≤1−|σ2|2−|σ1|2, we achieve
|ˆH3,1(f−1)|≤1256E(|σ1|,|σ2|), |
where
E(σ,t)=1−σ2−12t2+1540σ6+160σ4t+13180σ2t2+415σ2(1−σ2−t2) +32135t3+3215t(1−σ2−t2), σ=|σ1|, t=|σ2|. |
But E is a decreasing function of the variable σ; consequently,
E(σ,t)≤E(0,t)=1−12t2−256135t3+3215t. |
The function E(0,t) reaches its maximum value in [0,1] if t=−45512+1512√100329, so E(0,t)≤1.7079, which completes the proof.
Conjecture 6.8. If the inverse function of f∈SKexp is of the form (1.2), then the sharp bounds
|ˆH3,1(f−1)|≤1256. |
Equality will be achieved by using (1.3)–(1.5) and (5.1) with m=3.
The study of Hankel determinant bounds is of great importance in the research community due to its vast applications in mathematical science. In the current article, we have considered the Hankel determinant involving the coefficients of inverse functions for various subclasses of analytic functions. This generalizes the classical definition of the Hankel determinant and could provide more knowledge of inverse functions. The main focus of this article that we have studied is the coefficient-related problems along with Hankel determinants for the inverse function of the functions that belong to the families of symmetric starlike and symmetric convex functions associated with three different image domains. In particular, these problems include the sharp estimates of some initial inverse coefficients, the Zalcman, Fekete–Szegö, and Krushkal inequalities, along with the sharp estimation of second and third Hankel determinants containing inverse coefficients for functions in the mentioned families by using the concept of a Schwarz function. Also, we have given some conjectures that strongly support our obtained results. Our research introduces a new framework for analyzing the Hankel determinant, emphasizing the importance of inverse coefficients in analytic functions, potentially promoting more attention to coefficient-related problems. This study may be applied to meromorphic analytic functions, and the same methodology can be used to examine higher-order Hankel determinants, as studied in articles [46,47,48].
Huo Tang: Funding acquisition, Methodology, Project administration; Muhammad Abbas: Investigation, Writing-original draft; Reem K. Alhefthi: Formal analysis, Supervision, Writing-review and editing; Muhammad Arif: Formal analysis, Supervision, Writing-review and editing. All authors read and approved the final manuscript.
The first author (Huo Tang) was partly supported by the Natural Science Foundation of China under Grant 11561001, the Program for Young Talents of Science and Technology in Universities of Inner Mongolia Autonomous Region under Grant NJYT18-A14, the Natural Science Foundation of Inner Mongolia of China under Grants 2022MS01004 and 2020MS01011, and the Higher School Foundation of Inner Mongolia of China under Grant NJZY20200, the Program for Key Laboratory Construction of Chifeng University (No. CFXYZD202004), the Research and Innovation Team of Complex Analysis and Nonlinear Dynamic Systems of Chifeng University (No. cfxykycxtd202005) and the Youth Science Foundation of Chifeng University (No. cfxyqn202133).
The third author (Reem K. Alhefthi) would like to extend their sincere-appreciation to the Researchers Supporting Project number (RSPD2024R802) King Saud University, Riyadh, Saudi Arabia.
The authors declare that they have no conflicts of interest.
[1] | J. Lee and C. S. Won, A watermarking sequence using parities of error control coding for image authentication and correction, IEEE Trans. Consum. Electron., 46 (2000), 313–317. |
[2] | C. Li, Y. Wang and B. Ma, et al., Multi-block dependency based fragile watermarking scheme for fingerprint images protection, Multimed. Tools Appl., 64 (2013), 757–776. |
[3] | X. Lv and Z. J. Wang, Perceptual image hashing based on shape contexts and local feature points, IEEE Trans. Inf. Forensics Security, 7 (2012), 1081–1093. |
[4] | K. Maeno, Q. Sun and S. F. Chang, et al., New semi-fragile image authentication watermarking techniques using random bias and nonuniform quantization, IEEE Trans. Multimedia, 8 (2006), 32–45. |
[5] | C. Qin, P. Ji and C. Chang, et al., Non-uniform Watermark Sharing Based on Optimal Iterative BTC for Image Tampering Recovery, IEEE Multimedia, 25 (2018), 36–48. |
[6] | Z. Tang, X. Zhang and L. Huang, et al., Robust image hashing using ring-based entropies, Signal Process., 93 (2013), 2061–2069. |
[7] | R. Vartak and S. Deshmukh, Survey of digital image authentication techniques, International Journal of Research in Advent Technology, 2 (2014), 176–179. |
[8] | Y. Zhao, S. Wang and X. Zhang, et al., Robust hashing for image authentication using zernike moments and local features, IEEE Trans. Inf. Forensics Security, 8 (2013), 55–63. |
[9] | Z. Yang, Y. Huang and X. Li, et al., Efficient secure data provenance scheme in multimedia outsourcing and sharing, CMC-Comput. Mat. Contin., 56 (2018), 1–17. |
[10] | C. Qin, X. Chen and X. Luo, et al., Perceptual Image Hashing via Dual-cross Pattern Encoding and Salient Structure Detection, Inf. Sci., 423 (2018), 284–302. |
[11] | J. Dittmann, A. Steinmetz and R. Steinmetz, Content-based digital signature for motion pictures authentication and content-fragile watermarking, in Proceedings IEEE International Conference on Multimedia Computing and Systems, IEEE, (1999), 209–213. |
[12] | Z. Hou and X. Tang, Integrity authentication scheme of color video based on the fragile watermarking, in 2011 International Conference on Electronics, Communications and Control (ICECC), IEEE, (2011), 4354–4358. |
[13] | T. S. Rao and R. R. Kurra, A smart intelligent way of video authentication using classification and decomposition of watermarking methods, preprint, arXiv: 1404.7237. |
[14] | D. Xu, R. Wang and J. Wang, A novel watermarking scheme for H.264/AVC video authentication, Sig. Proc. Image Comm., 26 (2011), 267–279. |
[15] | W. Zhang, Research on algorithm of digital video watermarking based on H.264 for copyright protection and content, Ph.D thesis, Beijing university of Post and telecommunications, 2013. |
[16] | H. Zhu, The research of watermarking technology based on H.264/AVC, Ph.D thesis, Ningbo University, 2011. |
[17] | J. Li, Digital watermarking technology for protecting the copyright of audio aggregation and authenticating the integrity of audio aggregation, Ph.D thesis, Ningbo University, 2012. |
[18] | R. Wang and Y. Xiong, A novel watermarking algorithm for protecting audio aggregation based on ICA, in 6th International Conference on Digital Content, Multimedia Technology and its Applications, IEEE, (2010), 302–308. |
[19] | X. Wang, P. Niu and M. Lu, A robust digital audio watermarking scheme using wavelet moment invariance, J. Syst. Softw., 84 (2011), 1408–1421. |
[20] | I. K. Yeo and H. J. Kim, Modified patchwork algorithm: a novel audio watermarking scheme, IEEE Trans. Speech and Audio Processing, 11 (2003), 381–386. |
[21] | Z. Jalil, A. M. Mirza and H. Jabeen, Word length based zero-watermarking algorithm for tamper detection in text documents, in 2010 2nd International Conference on Computer Engineering and Technology, IEEE, (2010), 376–378. |
[22] | Q. C. Li and Z. H. Dong, Novel text watermarking algorithm based on chinese characters structure, in 2008 International Symposium on Computer Science and Computational Technology, IEEE, (2008), 348–351. |
[23] | J. Liu, L. He and D. Fang, et al., A text digital watermarking for chinese word document, in 2008 International Symposium on Computer Science and Computational Technology, IEEE, (2008), 217–220. |
[24] | L. Xiang, Y. Li and W. Hao, et al., Reversible natural language watermarking using synonym substitution and arithmetic coding, CMC-Comput. Mat. Contin., 55 (2018), 541–559. |
[25] | L. Xiang, W. Wu and X. Li, et al., A linguistic steganography based on word indexing compression and candidate selection, Multimed. Tools Appl., 77 (2018), 28969–28989. |
[26] | W. Guo, Y. Liu and B. Yang, et al., Research on information hiding technology in paper-based document, China Print. Pack. Study, 5 (2013), 30–34. |
[27] | B. Yang, W. Shi and W. Qi, et al., Methods and apparatus for embedding and detecting digital watermarks in a text document, 2012, US Patent 8,107,129. |
[28] | C. Ji, Y. Song and Z. Pang, A tamper proof method for the paper documents, 2012, China Patent 102,722,737. |
[29] | T. Amano and D. Misaki, A feature calibration method for watermarking of document images, in Proceedings of the Fifth International Conference on Document Analysis and Recognition. ICDAR'99 (Cat. No. PR00318), IEEE, (1999), 91–94. |
[30] | R. Chen, Research of Digital Watermarking technology to Resist Printing and Scanning, Ph.D thesis, Xidian University, 2014. |
[31] | M. Lei, Y. Yang and R. Hu, A print resilient watermark scheme based on character complexity, J. B.J. Univer. Posts Telecom., 38 (2015), 58–62. |
[32] | S. Li, A Study of Digital Watermarking Algorithm On Binary Text Image to Resist Hard-copy Attack, Ph.D thesis, Xidian University, 2012. |
[33] | W. Qi, X. Li and B. Yang, et al., Document watermarking scheme for information tracking, J. Communicat., 29 (2008), 183–190. |
[34] | M. Wu and B. Liu, Data hiding in binary image for authentication and annotation, IEEE Trans. Multimedia, 6 (2004), 528–538. |
[35] | H. Yang and A. C. Kot, Pattern-based data hiding for binary image authentication by connectivity-preserving, IEEE Trans. Multimedia, 9 (2007), 475–486. |
[36] | L. Xiang, J. Yu and C. Yang, et al., A word-embedding-based steganalysis method for linguistic steganography via synonym-substitution, IEEE Access, 6 (2018), 64131–64141. |
[37] | S. Chen and H. Leung, Ergodic chaotic parameter modulation with application to digital image watermarking, IEEE Trans. Image Process., 14 (2005), 1590–1602. |
[38] | Z. Li, Image authentication based on Digital Watermarking and Its Key Issues, Ph.D thesis, Beijing Jiaotong University, 2008. |
[39] | G. Shao and M. Zhang, Novel fragile authentication watermark based on chaotic system, in 2004 IEEE International Symposium on Industrial Electronics, IEEE, (2004), 1491–1494. |
[40] | J. C. Yoo and T. H. Han, Fast normalized cross-correlation, Circuits Syst. Signal Process., 28 (2009), 819–843. |
[41] | Y. Niu and C. Zhang, Comparison of string similarity algorithm, Comput. Digit. Eng., 40 (2012), 14–17. |
[42] | D. Liu, Research on novel text digital watermarking technologies and their typical applications, Ph.D thesis, University of Electronic Science and Technology, 2007. |
[43] | Y. Liu, W. Guo and W. Qi, Researches on Text Image Watermarking Scheme Based on the Structure of Character Glyph, App. Mechan. Material., 731 (2015), 1163–1168. |
1. | Neil S. Trudinger, A note on second derivative estimates for Monge-Ampère-type equations, 2023, 23, 2169-0375, 10.1515/ans-2022-0036 | |
2. | Feida Jiang, Weak solutions of generated Jacobian equations, 2023, 5, 2640-3501, 1, 10.3934/mine.2023064 | |
3. |
Cale Rankin,
Strict convexity and C1 regularity of solutions to generated Jacobian equations in dimension two,
2021,
60,
0944-2669,
10.1007/s00526-021-02093-4
|
|
4. | Cale Rankin, First and second derivative Hölder estimates for generated Jacobian equations, 2023, 62, 0944-2669, 10.1007/s00526-022-02406-1 | |
5. | Cale Rankin, Strict g-Convexity for Generated Jacobian Equations with Applications to Global Regularity, 2023, 55, 0036-1410, 5685, 10.1137/22M1518852 | |
6. | Grégoire Loeper, Neil S. Trudinger, On the convexity theory of generating functions, 2024, 1536-1365, 10.1515/ans-2023-0160 |