Loading [MathJax]/jax/output/SVG/jax.js
Research article Special Issues

Modelling the dynamics of Trypanosoma rangeli and triatomine bug with logistic growth of vector and systemic transmission


  • In this paper, an insect-parasite-host model with logistic growth of triatomine bugs is formulated to study the transmission between hosts and vectors of the Chagas disease by using dynamical system approach. We derive the basic reproduction numbers for triatomine bugs and Trypanosoma rangeli as two thresholds. The local and global stability of the vector-free equilibrium, parasite-free equilibrium and parasite-positive equilibrium is investigated through the derived two thresholds. Forward bifurcation, saddle-node bifurcation and Hopf bifurcation are proved analytically and illustrated numerically. We show that the model can lose the stability of the vector-free equilibrium and exhibit a supercritical Hopf bifurcation, indicating the occurrence of a stable limit cycle. We also find it unlikely to have backward bifurcation and Bogdanov-Takens bifurcation of the parasite-positive equilibrium. However, the sustained oscillations of infected vector population suggest that Trypanosoma rangeli will persist in all the populations, posing a significant challenge for the prevention and control of Chagas disease.

    Citation: Lin Chen, Xiaotian Wu, Yancong Xu, Libin Rong. Modelling the dynamics of Trypanosoma rangeli and triatomine bug with logistic growth of vector and systemic transmission[J]. Mathematical Biosciences and Engineering, 2022, 19(8): 8452-8478. doi: 10.3934/mbe.2022393

    Related Papers:

    [1] Chuanda Cai, Changgen Peng, Jin Niu, Weijie Tan, Hanlin Tang . Low distortion reversible database watermarking based on hybrid intelligent algorithm. Mathematical Biosciences and Engineering, 2023, 20(12): 21315-21336. doi: 10.3934/mbe.2023943
    [2] Hongyan Xu . Digital media zero watermark copyright protection algorithm based on embedded intelligent edge computing detection. Mathematical Biosciences and Engineering, 2021, 18(5): 6771-6789. doi: 10.3934/mbe.2021336
    [3] Qichao Ying, Jingzhi Lin, Zhenxing Qian, Haisheng Xu, Xinpeng Zhang . Robust digital watermarking for color images in combined DFT and DT-CWT domains. Mathematical Biosciences and Engineering, 2019, 16(5): 4788-4801. doi: 10.3934/mbe.2019241
    [4] Shanqing Zhang, Xiaoyun Guo, Xianghua Xu, Li Li, Chin-Chen Chang . A video watermark algorithm based on tensor decomposition. Mathematical Biosciences and Engineering, 2019, 16(5): 3435-3449. doi: 10.3934/mbe.2019172
    [5] Wenfa Qi, Wei Guo, Tong Zhang, Yuxin Liu, Zongming Guo, Xifeng Fang . Robust authentication for paper-based text documents based on text watermarking technology. Mathematical Biosciences and Engineering, 2019, 16(4): 2233-2249. doi: 10.3934/mbe.2019110
    [6] Yan Li, Junwei Wang, Shuangkui Ge, Xiangyang Luo, Bo Wang . A reversible database watermarking method with low distortion. Mathematical Biosciences and Engineering, 2019, 16(5): 4053-4068. doi: 10.3934/mbe.2019200
    [7] Qiuling Wu, Dandan Huang, Jiangchun Wei, Wenhui Chen . Adaptive and blind audio watermarking algorithm based on dither modulation and butterfly optimization algorithm. Mathematical Biosciences and Engineering, 2023, 20(6): 11482-11501. doi: 10.3934/mbe.2023509
    [8] Kaimeng Chen, Chin-Chen Chang . High-capacity reversible data hiding in encrypted images based on two-phase histogram shifting. Mathematical Biosciences and Engineering, 2019, 16(5): 3947-3964. doi: 10.3934/mbe.2019195
    [9] Haoyu Lu, Daofu Gong, Fenlin Liu, Hui Liu, Jinghua Qu . A batch copyright scheme for digital image based on deep neural network. Mathematical Biosciences and Engineering, 2019, 16(5): 6121-6133. doi: 10.3934/mbe.2019306
    [10] Guodong Ye, Huishan Wu, Kaixin Jiao, Duan Mei . Asymmetric image encryption scheme based on the Quantum logistic map and cyclic modulo diffusion. Mathematical Biosciences and Engineering, 2021, 18(5): 5427-5448. doi: 10.3934/mbe.2021275
  • In this paper, an insect-parasite-host model with logistic growth of triatomine bugs is formulated to study the transmission between hosts and vectors of the Chagas disease by using dynamical system approach. We derive the basic reproduction numbers for triatomine bugs and Trypanosoma rangeli as two thresholds. The local and global stability of the vector-free equilibrium, parasite-free equilibrium and parasite-positive equilibrium is investigated through the derived two thresholds. Forward bifurcation, saddle-node bifurcation and Hopf bifurcation are proved analytically and illustrated numerically. We show that the model can lose the stability of the vector-free equilibrium and exhibit a supercritical Hopf bifurcation, indicating the occurrence of a stable limit cycle. We also find it unlikely to have backward bifurcation and Bogdanov-Takens bifurcation of the parasite-positive equilibrium. However, the sustained oscillations of infected vector population suggest that Trypanosoma rangeli will persist in all the populations, posing a significant challenge for the prevention and control of Chagas disease.



    Reversible image watermarking technology requires that the embedding of the watermark information into the original images should be conducted on the premise of ensuring the visual quality of the images; meanwhile the original images can be restored nondestructively after extracting the watermark. Compared with the digital image watermarking [1], reversible image watermarking has higher requirements on watermark embedding, which also makes it more widely studied and applied in military, medical, and other fields with high image authenticity and integrity. One of the fundamental goals of watermarking is to increase the embedding rate while reducing the certain visual quality of the image.

    Tian [2] proposed a reversible watermarking technology with high embedding rate, which used the difference expansion (DE) to embed watermark based on adjacent pixel pairs. This algorithm has attracted great attentions. Consequently, a number of improved embedding algorithms have been developed based on the DE.

    However, using the DE method, an overflow will be generated, which will degrade the watermarking embedding quality. Therefore, removing the overflow location map is greatly valuable to enhance the performance of the algorithms. A reversible watermarking algorithm that combined the DE and the reversible contrast map was proposed in [3]. In this algorithm, the contrast pixel pair was mainly used to embed a small amount of auxiliary information instead of the location map, and the embedding capacity was greatly enhanced. However, the deterioration in image quality was more serious. Wang et al. [4] proposed a reversible watermarking method based on difference histogram. It was more unique in terms of overflow processing, but it still needed to embed a compressed positioning map. A reversible image watermarking scheme based on the DE effectively tackled the issues of overflow and underflow encountered during embedding in [5]. A quadratic DE based reversible technique was developed by Zhang et al. [6] where the DE was applied twice to improve the security and embedding capacity while ensuring the quality. The location map was not generated, which further allowed hiding large watermark.

    The reversible image watermarking algorithm combining the DE with the least significant bit (LSB) was proposed in [7]. The algorithm realized greater embedding capacity while maintaining better imperceptibility. By combining histogram transform and prediction DE, Lin et al. [8] put forward a reversible watermarking technology, which effectively expanded the embedding capacity and achieved promising results.

    Muhammad et al. [9] introduced a reversible image watermarking algorithm based on Genetic Programming (GP). Firstly, the algorithm resolved the image pixels, then executed integer wavelet transform (IWT) on the adjusted image, and blocked the sub-band coefficients without overlapping. The GP algorithm was implemented to achieve the optimal load for coefficient compression, and subsequently, the LSB was utilized to embed the watermark into the compressed coefficients. The algorithm guaranteed that the image embedded with the watermark had better visibility and higher payload. A reversible image watermarking algorithm based on local prediction was put forward by Vinoth et al. [10]. This algorithm divided image into many blocks with no superposition. Pixels on the edge of the block were detected by Median Edge Detection predictor (MED), and other pixels were predicted by local prediction. It had better visual quality and lower embedding rate. Jia et al. [11] proposed a reversible data hiding algorithm to lessen an invalid pixel shift in histogram shift. Based on image texture, the algorithm reduced the invalid shift of pixels in the histogram shift. The algorithm had distinguished embedding capacity and visual quality.

    Literature [12] proposed an enhanced reduced DE based reversible image watermarking aiming to reduce the loss of image quality during embedding. Likewise, Yu et al. [13] also proposed a reversible watermarking algorithm based on multidimensional prediction error expansion, which can reduce the embedding distortion by discarding the embedding map that may produce high distortion. The algorithm was more suitable for images with smooth and simple textures. In addition, a reversible watermarking based on double-layer difference expansion was proposed in [14]. In this algorithm, smooth pixel pairs were preferred to embed watermark, and the distortion can be well controlled. However, the embedding rate was not high.

    Based on the analysis of the traditional DE watermarking, an improved large-capacity reversible image watermarking algorithm based on the DE is proposed in this paper, which can effectively improve the embedding capacity and reduce the image distortion. It provides an effective solution to avoiding pixel overflow.

    The reversible image watermarking studied mainly uses multi-scale decomposition, interpolation expansion, generalized difference expansion (GDE) and overflow processing to realize the embedding and extraction of watermarking algorithm.

    Compared to the adjacent pixel expansion algorithm presented by Tian [2], generalized difference expansion algorithm makes more fully use of the redundant information between adjacent pixels. It picks up a plurality of adjacent pixels for processing, and which can be used to embed more watermark information. This paper uses this method to embed information into the selected original image pixel blocks. Suppose X = (x0, x1, x2, x3, …, xn-1) is a set of pixel values, the direct transform of the generalized integer transform is:

    ˉx=n1i=0aixi/n1i=0aid1=x1x0d2=x2x0dn1=xn1x0 (1)

    For a group of pixel interpolations d1,d2, …, dn1, Eq (2) can be used separately to hide 1 bit watermark information b:

    di=2×di+b (2)

    where d'i is the pixel difference after embedding the watermark. It requires the watermark embedding process not to cause the overflow of image pixel values. The corresponding inverse transform is:

    x0=ˉxn1i=1di/n1i=0ai.x1=x0+d1x2=x0+d2xn1=x0+dn1 (3)

    A set of pixel values X'=(x'0,x'1,x'2,x3,,x'n1) is generated by the generalized difference expansion algorithm, in which the mean of the group pixels is:

     ¯x'=n1i=0aix'i/n1i=0ai (4)

    After deduction and calculation, x'x=0. Visibly a group of pixels have the same group mean value after the generalized difference expansion transform. After using the generalized difference expansion algorithm to embed information into the pixel blocks, the mean value of the block pixels should be unchanged, and that is a fairly strict requirement.

    An image F is divided into multiple scales from a whole to parts, thus obtaining sub-image blocks Fi, j at different scales, where i = 1, 2, …, d is denoted as the segmentation scale; j = 1, … 4i-1 is denoted as the number of sub-blocks at each scale. Due to the limited size of the image, the segmentation scale is also limited.

    The segmentation method is displayed in Figure 1. From left to right there is segmentation from the 1st to the 3rd scales, respectively. The whole image is the sub-blocks F1, 1 obtained after being decomposed at the 1st scale, and then the whole image is divided into four sub-blocks F2, 1, F2, 2, F2, 3 and F2, 4; each sub-block is called a second scale sub-block, and then they are divided until they reach the maximum scale set.

    Figure 1.  Multi-scale segmentation of Lena image.

    As the traditional multi-scale decomposition also belongs to fixed-sized block decomposition method, this paper makes an improvement of the multi-scale decomposition.

    The improved image multi-scale decomposition is to divide a rectangular image into 4 equal-sized square blocks, and then determine whether or not these four square blocks meet the homogeneity criterion. If it is satisfied, the current block maintains unchanged; otherwise it continues to be decomposed into four square blocks, and determines whether or not they meet the criterion, until all the blocks meet the given criterion. The decomposition criterion can be expressed as:

    |pipave|>(gl1)×γ (5)

    In Formula (5), Pi and Pave are the gray value of any pixel and the average gray value of all pixels in a square block, respectively; gl is the gray level of a pixel; γ is a decimal in the range of [0, 1]. The criterion is, when the guidelines when the absolute value of the difference between the gray value of either pixel and the average gray value of all pixels in the square block is greater than (gl1)×γ, the block needs to be further divided, as shown in Figures 2 and 3.

    Figure 2.  Original image.
    Figure 3.  The generated block map after modified multi-scale decomposition.

    As per the block division method, it divides images into unfixed sizes. Also from the perspective of the division results, the image blocks decomposed have pixels with high homogeneity, which are suitable for lossless watermark embedding. As specified in the algorithm, the minimum block size is 4×4.

    After multi-scale decomposition, the size of each image block is 22+n×22+n, n{0,1,2,7}. The size information of each block can be converted into binary form. Each of the decomposed sub-blocks is coded by the sub-block size, as shown in Table 1.

    Table 1.  Scale coding of image block after multi-scale decomposition.
    Size / pixels code Size / pixels code
    4×4 000 64×64 100
    8×8 001 128×128 101
    16×16 010 256×256 110
    32×32 011 512×512 111

     | Show Table
    DownLoad: CSV

    After multi-scale decomposition, the image sub-blocks obtained are sorted (from top to bottom, from left to right), and the scale information of each sub-block is recorded sequentially as per the ordering result, thereby constituting the decomposition information q of the original image. Given there are a small number of large-sized blocks decomposed, Huffman encoding [15] can be used to further reduce the length of the image decomposition information, denoted as Huf (q).

    For security of the algorithm, the length and encode table of the parameter Huf (q) are sent to the recipient in form of a secret key.

    The GDE algorithm may produce an overflow after embedding watermark. The overflow processing will have a significant impact on the watermark embedding capacity. In this paper, the overflow points generated by embedding the watermark into the original image are labeled in a location map having the same image size. The generated location map is a binary image marked by 0 or 1 for each pixel. At the same time, for the overflow point, the original pixel value is replaced by the generated value by using the GDE. The difference between the generated value and the maximum pixel value of the image is taken into consideration by the inverse DE to calculate the new pixel value.

    The 2 × 2 image block contains 4 pixel values (a, b, c, d). After embedding the watermark through the GDE, it becomes 4 new pixel values (A, B, C, D). If the generated second pixel overflows, it will be overflowed to make its gray value within the range of 0–255 in order to complete the watermark embedding. The specific adjustment is carried out as follows:

    If the generated pixel value B is positive overflow, the transformed pixel value is 255|B - 255|.

    If the generated pixel value B is negative overflow, the transformed pixel value is 0 + |B - 0|.

    For instance, if the pixel value generated by the DE is 266, the new image pixel value will be 244. The transform is detailed as follows:

    266255=11
    25511=244

    The original image is divided into sub-blocks with a size of 2 × 2 pixels. As shown in Figure 4, if the pixel values in one of the sub-blocks are (244,254,250,248), the amount of the watermark embedded by the GDE is 3 bits. Suppose that the embedded watermark is (1, 1, 1), then, the pixel values of the generated image sub-block are (239,260,252,248) by using a generalized difference transform processing. As a result, the value of the second pixel in the image sub-block will overflow and the overflow processing is needed to better embed the watermark.

    Figure 4.  Overflow processing flow chart.

    Through performing inverse difference transform, the pixel values of the image sub-block are (239,250,252,248). After embedding the watermark information (1, 1, 1) into the transformed sub-block by using the generalized difference transform again, the pixel values of the new sub-block are (230,253,257,249). The sub-block overflows by using the GDE, and the pixel values of the generated sub-block are (230,253,253,249) by performing inverse transformation.

    After overflow processing, the watermark can be embedded into the generated overflow pixels by using the GDE. The overflow point generated by the last DE is expressed by using overflow location. Keeping certain visual quality, the overflow algorithm can carry out multiple times for watermark embedding.

    As mentioned in Section 1, the shortcomings in terms of embedding capacity and visual quality of the watermarked images in previous schemes is identified. At the same time, the existing algorithms do not deal with overflow very well. In order to solve the problems of bad imperceptibility and low embedding rate of the existing algorithms, a novel large-capacity reversible image watermarking based on the DE is proposed. The proposed scheme effectively controls the overflow of pixel values when embedding watermark with the DE, and uses multi-scale decomposition technology to remove the abrupt points in each image-block. After the information is embedded into the sub-block by the GDE, the average value of the pixels in each sub-block remains unchanged to extract the watermark information effectively. The scheme is made of two procedures: watermark embedding and watermark extraction.

    The embedding process of the reversible watermarking algorithm is shown in Figure 5, and the specific operation flow is described as follows:

    Figure 5.  Watermark embedding flow chart.

    STEP1: The watermark W' is obtained when the watermark W is scrambled by using Arnold transform [16]. The W' is converted into a one-dimensional binary sequence. To enhance robustness and security, the scrambling method is improved as follows:

     (x'y')=(1112)c(2111)d(xy)mod Mx',y'{0,1,2,,N1} (6)

    where (x,y) is the coordinate of the original image pixel, (x,y)is the transformed coordinate, M refers to the size of the image matrix, and c and d are the randomly generated scrambled numbers.

    STEP2: The original image I (M×N, M and N are all integer multiples of 4 is divided into non-overlapping image sub-blocks Ii, i(0,M×N4×4 - 1);

    STEP3: The smoothness value of each block Ii is calculated [18], then all sub-blocks are sorted in an ascending order with respect to their smoothness values, along with the establishment of a sort index table according to the sorting results. Finally, the blocks in front of the sequence are selected properly to embed the watermark in turn;

    STEP4: There may be abrupt points in the selected image sub-block Ii. In this regard, the multi-scale decomposition algorithm is applied to delete the image sub-blocks with abrupt points. The effective watermark information will not be embedded into these blocks. Finally, according to the number of the embedded watermarks, the pixel blocks in front of the sequence (image sub-blocks containing abrupt points have been removed) are selected to embed watermarks properly;

    STEP5: Considering the requirement of watermark embedding capacity, the pixel sub-blocks (assuming the first n blocks) in front of the sequence are selected to embed the watermark in turn. Note that, the algorithm removes the selected image sub-blocks with abrupt points (if there are m blocks). Therefore, the number of image blocks used for embedding watermark information is n-m. At the same time, the sorting sequence numbers of the image sub-blocks containing abrupt points are recorded for watermark extraction.

    STEP6: The watermark is embedded into any selected sub-block Ai (0in) by using the GDE (For the block size of 4×4 pixels, the 15-bit binary watermark can be embedded). When using the DE to embed watermark, the pixels beyond the range of the gray values will be marked in the binary location map having the same size as the original image. Specifically, if an overflow occurs, a value of 1 is marked at the corresponding location, and if no overflow occurs, a value of 0 is marked at the corresponding location, thereby generating an overflow location map.

    STEP7: For identifying the corresponding pixel points of overflows, a transform algorithm (Section 2) is adopted to avoid the pixel overflow. The pixel value transform is carried out for the identified pixels, so that the watermark can be embedded with the GDE again. The overflowed pixel value is beyond the range of the image gray values, and the absolute difference is calculated to make the pixel value within a reasonable range.

    If the pixel value generated by the DE is positive overflow, that is a, the transformed pixel value is 255|a - 255|.

    If the pixel value generated by the DE is negative overflow, that is b, the transformed pixel value is 0 + |b - 0|.

    The auxiliary information (the compressed overflow graph, embedding capacity and scrambling times c and d, etc.) is hidden into the complex texture blocks.

    STEP8: For the corresponding sub-blocks not used to embed the watermark in the original image I, those are the original sub-blocks with high texture complexities. Then, the last k sub-blocks are selected to realize the embedding of the auxiliary information by the difference quantization method and the selected k is saved for watermark extraction.

    STEP9: The auxiliary information is embedded into each pixel in each selected pixel sub-block by difference quantization.

    STEP9.1: Calculate the average pixel value of each original image pixel block corresponding to the last k sub-blocks in the sorting sequence as follows:

    ¯avg=x1+x2++xm×nm×n (7)

    where m and n refer to the row and column of the divided sub-blocks, respectively. x1,x2,xm,xn are the pixels contained in the sub-blocks.

    STEP9.2: The maximum pixel value and the minimum pixel value in each sub-block are obtained, and the auxiliary information is embedded using difference quantization. Each image sub-block can embed two bits of auxiliary information using difference quantization. In each sub-block, one bit of the auxiliary information is embedded by comparing the minimum pixel value and the average value, and then the next bit of the auxiliary information is embedded by comparing the maximum pixel value and the average value.

    1) Embed the auxiliary information by comparing the minimum pixel value and the average value.

    a={a1((¯avga)%2=1,w=1)||((¯avga)%2=0,w=0)a((¯avga)%2=1,w=0)||((¯avga)%2=0,w=1) (8)

    where, a represents the pixel value to be embedded; ¯avg refers to the average value of the pixels in the sub-block where the embedded pixel is located; w represents the embedded binary watermark information, and % represents the operation of model.

    When embedding one bit of the auxiliary information by comparing the minimum pixel value and the average value, if (¯avga)%2=1,w=1) and (¯avga)%2=0,w=0) are established at the same time, the new minimum pixel value a is equal to a1; if (¯avga)%2=1,w=0) and (¯avga)%2=0,w=1) are established at the same time, the new minimum pixel value a is equal to a.

    2) Embed the auxiliary information by comparing the maximum pixel value and the average value.

    a={a+1((¯avga)%2=1,w=1)||((¯avga)%2=0,w=0)a((¯avga)%2=1,w=0)||((¯avga)%2=0,w=1) (9)

    When embedding one bit of the auxiliary information by comparing the maximum pixel value and the average value, if (¯avga)%2=1,w=1) and (¯avga)%2=0,w=0) are established at the same time, the new maximum pixel value a is equal to a + 1; if (¯avga)%2=1,w=0) and (¯avga)%2=0,w=1) are established at the same time, the new maximum pixel value a is equal to a.

    STEP10: The watermarked image Ii is obtained by embedding the watermark information with the GDE and the differential quantization technology.

    Suppose that the watermark is embedded into any pixel pair < x, y > by the DE. If the embedded watermark is 1, the value of the new pixel pair < a, b > will be:

    a=x+y2+(xy)×2+1+12 = x+y2+(xy)+1 (10)
    b=x+y2(xy)×2+12 = x+y2(xy) (11)

    Accordingly, a - b = 2x2y+1

    Therefore, for all pixel pairs, if the one-bit embedded watermark value is 1, the difference between the new pixel pair is odd; otherwise, if the one-bit embedded watermark value is 0, the difference between the new pixel pair is even. Accordingly, when resorting the original image, if the difference between the generated pixel pair < a, b > is odd, the one-bit watermark value is 1, otherwise it is 0. Based on this, the watermark can be extracted in order.

    The watermark extraction flow is shown in Figure 6. The specific operation flow is detailed as follows:

    Figure 6.  The flow chart of watermark extraction and image recovery.

    STEP1: The watermarked imageI (M × N, M and N are all integer multiples of 4) is divided into non-overlapping image sub-blocks Ii, i(0,M×N4×4 - 1);

    STEP2: Calculate the smoothness value of each blockIi, then sort all sub-blocks in an ascending order with respect to their smoothness values and create the sort index table accordingly. Since the average value of the pixels in each sub-block remains unchanged after the information is embedded into the sub-block with the GDE, the smoothness value of the image block stays unchanged before and after the watermark is embedded, and the two sort orders are the same [18].

    STEP3: The posterior k sub-blocks in the sequence are selected to extract the auxiliary information by differential quantization.

    The auxiliary information is extracted by the difference quantization method. The order of extracting information is opposite to that of embedding information. Recall that one bit of the auxiliary information is first embedded with a minimum pixel value, and then the next bit of the auxiliary information is embedded with a maximum pixel value. Therefore, in order to keep the parity relation between the minimum value and the average value, as well as between the maximum value and the average value, before and after embedding the auxiliary information, the maximum pixel value is first used to extract one bit of the auxiliary information, and then the minimum pixel value is used to extract another bit of the auxiliary information as well.

    w={1(¯avga)%2=00(¯avga)%2=1 (12)

    where, a represents the pixel value used to extract the watermark, ¯avg refers to the average value of the pixels in the sub-block where the embedded pixel is located, w represents the embedded binary watermark information, and % represents the operation of model.

    STEP4: According to the extracted auxiliary information, an inverse GDE is used to extract the watermark from the first n blocks that are well-ordered (remove the image sub-blocks containing the abrupt points). The watermark information W is recovered by Arnold inverse transform.

    STEP5: After extracting the watermark information, the recovered image I is combined with the corresponding sub-blocks containing the abrupt points to obtain the image I. The image I is then combined with the image obtained after extracting the auxiliary information to obtain the final image A.

    In this experiment, eight 8-bit standard gray images with the size of 512 × 512 pixels, including Lena, Barbara, Baboon, Pepper, Girl, Cameraman, Man and Couple were selected as the host images for watermark embedding (Figure 7) (all images were derived from http://sipi.suc.edu/database). A binary image with the size of 32 × 32 pixels was selected as the watermark image (Figure 8).

    Figure 7.  Experimental test images.
    Figure 8.  Watermark image.

    The integrity of the watermark embedding algorithm is generally measured by the NC (Normalized Correlation), whose analytical form is given in Eq (13):

    N C=L1i=0K1j=0I(i, j)I(i, j)L1i=0K1j=0[I(i, j)]2 (13)

    where, I(i,j) and I(i,j) respectively denote the pixel values at (i,j) in the original image and the carrier image of recovery after the watermark is extracted. L and K denote the numbers of rows and columns of the image respectively.

    The above Table 2 indicates the integrity assessment results of the watermarked images without attacks. It indicates that the NC values of these images are the same with the value of 1 when suffering from no attacks. In the case of no attacks, if the NC value is 1, the original image is completely restored. This shows that the carrier image restored by this algorithm has high visual quality.

    Table 2.  Integrity assessment of this algorithm without any attacks.
    Image (512 × 512 pixels) Lena Barbara Baboon Peppers Girl Cameraman Man Couple
    NC 1 1 1 1 1 1 1 1

     | Show Table
    DownLoad: CSV

    PSNR (Peak Signal to Noise Ratio) is currently one of the main indicators used to evaluate the visual quality of the reversible watermarking. The PSNR is formally formulated as shown in Eq (14):

    PSNR=10log(25521MNM1i=0N1j=0[I(i,j)I(i,j)]2) (14)

    where I(i,j)and I(i,j)respectively denote the pixel values at position (i,j)in the original image and the watermarked image. Here, M and N represent the numbers of rows and columns of the image respectively.

    The SSIM (structural similarity) is utilized to evaluate the quality of a stego image and the mathematical form of the SSIM is stated in Eq (15):

    SSIM(x,y|w)=(2ˉwxˉwy+C1)(2σwxwy+C2)(ˉw2x+ˉw2y+C1)(σ2wx+σ2wy+C2) (15)

    where C1and C2are small constants, ¯wx is a mean value of the regionwx, while ¯wy represents the average value of the region wy.σ2wx is the variance of wx, and σwxwy is the covariance between the two regions. A higher value of the SSIM indicates a higher quality level for the stego image. The numeric value of the SSIM lies in the range of [0, 1]. In the evaluation of the reversible information hiding algorithm, the SSIM value of the hidden image is the value closest to 1.

    The values of the PSNR and SSIM are shown in Table 3 by using the algorithm proposed in this paper and those proposed in [17] and [10] after dividing sub-blocks with 4 × 4 pixels.

    Table 3.  Visual quality analysis of the proposed algorithm.
    Image name Proposed algorithm literature 17 literature 10
    PSNR SSIM PSNR SSIM PSNR SSIM
    Lena 54.63 0.989 46.72 0.982 52.18 0.984
    Baboon 52.36 0.987 48.37 0.985 51.37 0.988
    Barbara 53.51 0.993 47.54 0.983 51.93 0.986
    Peppers 53.14 0.991 46.81 0.981 51.73 0.987
    Girl 54.27 0.989 47.13 0.986 52.43 0.987
    Cameraman 53.69 0.991 46.92 0.982 51.52 0.985
    Man 52.73 0.988 47.98 0.984 51.49 0.987
    Couple 53.12 0.990 46.85 0.983 52.17 0.986

     | Show Table
    DownLoad: CSV

    After the watermark is embedded into the aforementioned eight images, the PSNR value of the proposed algorithm can reach as high as 54.63 dB, which is better than the algorithms in [17] and [10]. At the same time, compared with the algorithms in [17] and [10], the SSIM is also higher. As reflected from Table 3, it's not hard to see that this algorithm is better than those in [17] and [10] and achieves excellent SSIM and PSNR under the same payload capacity. It means that the proposed algorithm has better visual quality. The details are shown in Table 4.

    Table 4.  Visual effect of algorithm experiment.
    Image name Original images Watermarked images Original watermark Extracted watermark PSNR
    Lena 54.63
    Baboon 52.36
    Barbara 53.51
    Peppers 53.14
    Girl 54.27
    Cameraman 53.69
    Man 52.73
    Couple 53.12

     | Show Table
    DownLoad: CSV

    It can be witnessed from these watermarked images that the naked eye is unable to sense the presence of the watermark. The watermarked images possess good visual effects, and their corresponding PSNR values illustrate the proposed algorithm with good imperceptibility for various image types. The average PSNR value of the above eight images shown in Figure 7 after embedding the watermark is up to 53.43 dB.

    It can be seen from Tables 3 and 4, the proposed algorithm has good visual invisibility for different texture types of images. In order to estimate the maximum watermark embedding capacity, the watermark needs to be embedded into all sub-blocks (except for the block containing the abrupt points). In this paper, the algorithm can be embedded many times under the premise of guaranteeing a certain visual quality. Here, an example of one-time embedding is provided.

    As shown in Table 5, 10, 30, 70, 90 and 100% refer to the proportion of the watermark capacity to be embedded with regard to the maximum embedding capacity. The PSNR and SSIM are used to evaluate the visual quality of the watermarked images when embedding 10, 30, 70, 90 and 100% of the maximum embedding capacity. In Table 5, it is obvious that the proposed reversible watermarking technique outperforms the techniques in [17] and [18] with competitive SSIM and PSNR values in terms of payload capacity. The results show that the proposed technology not only guarantees the visual quality of the watermarked images, but also significantly improves the payload capacity.

    Table 5.  Performance comparison of watermarking algorithms.
    Image name Algorithms Embedding capacity (bit) SSIM PSNR
    10% 30% 70% 90% 100%
    Lena Literature 18 276,599 0.7331 54.37 42.92 36.83 32.91 31.95
    Literature 17 9767 0.9188 45.78 43.48 41.58 39.78 38.64
    Proposed 236,432 0.7935 48.65 45.24 38.91 37.05 36.34
    Baboon Literature 18 41,519 0.8232 51.25 42.43 34.94 33.48 31.02
    Literature 17 11,056 0.9047 45.86 43.84 41.95 40.56 39.76
    Proposed 224,512 0.8217 47.44 44.65 38.77 37.21 36.42
    Barbara Literature 18 392,740 0.6724 50.12 48.54 46.80 45.11 31.65
    Literature 17 13,232 0.8931 45.66 42.89 39.54 37.10 36.65
    Proposed 232,864 0.8011 47.33 44.14 38.47 37.28 36.17

    Peppers
    Literature 18 138,695 0.8154 52.62 42.98 35.12 33.58 31.53
    Literature 17 8562 0.9369 46.24 44.77 41.82 39.54 38.26
    Proposed 232,434 0.8115 48.13 44.35 38.54 36.79 35.84
    Girl Literature 18 293,674 0.7323 53.14 42.17 36.32 32.33 31.35
    Literature 17 14,876 0.9157 45.31 42.86 41.03 39.25 38.12
    Proposed 224,796 0.7938 48.09 44.71 38.20 36.51 35.96
    Cameraman Literature 18 179,643 0.8123 52.32 42.36 34.42 33.97 31.02
    Literature 17 12,392 0.9219 46.03 44.10 41.25 39.05 37.72
    Proposed 236,562 0.8112 47.67 43.82 38.09 36.29 35.33
    Man Literature 18 159,427 0.8032 51.47 41.49 33.35 32.99 30.42
    Literature 17 10,074 0.9182 45.91 43.85 41.07 38.79 37.41
    Proposed 224,862 0.8112 47.67 43.82 38.09 36.29 35.33
    Couple Literature 18 233,912 0.7638 52.38 42.67 34.84 33.37 31.22
    Literature 17 12,128 0.9298 46.11 44.23 41.54 39.25 37.83
    Proposed 235,956 0.8231 47.98 44.09 38.26 36.48 35.53

     | Show Table
    DownLoad: CSV

    Table 6 shows the experimental results of the calculated PSNR values, the SSIM values of the original image and the restored image after extracting the watermark, and the SSIM values of the original watermark and the extracted watermark by the three algorithms. It can be seen that the PSNR value of the watermarked image obtained by this algorithm is higher, especially much higher than that of the methods in [19]. Furthermore, the original image can be recovered after extracting the watermark, and the similarity between the extracted watermark and the original watermark is same. Compared with the methods in [1921], the proposed algorithm has improved significantly.

    Table 6.  Performance comparison of watermarking algorithms.
    Evaluating indicators Images   Algorithms
    Literature 19 Literature 20 Literature 21 Proposed
    PSNR (watermarked images) Lena 46.03 50.60 48.05 54.63
    Baboon 41.22 48.64 49.22 52.36
    Barbara 46.15 47.22 49.01 53.51
    Peppers 42.05 41.31 48.20 53.14
    Girl 45.71 49.63 48.41 54.27
    Cameraman 43.35 43.29 48.77 53.69
    Man 43.28 43.25 48.59 52.73
    Couple 42.11 41.25 48.08 53.12
    SSIM (original image and recovered image after extracting) Lena 1 0.9975 0.9945 1
    Baboon 0.9999 0.9995 0.9994 1
    Barbara 0.9999 0.9995 0.9982 1
    Peppers 0.9999 0.9954 0.9964 1
    Girl 1 0.9987 0.9954 1
    Cameraman 0.9999 0.9969 0.9968 1
    Man 0.9999 0.9973 0.9965 1
    Couple 0.9999 0.9964 0.9962 1
    SSIM (original watermark and extracted watermark) Lena 1 0.9905 0.9835 1
    Baboon 1 0.9738 0.9978 1
    Barbara 1 0.9676 0.9845 1
    Peppers 1 0.9655 0.9878 1
    Girl 1 0.9836 0.9803 1
    Cameraman 1 0.9752 0.9845 1
    Man 1 0.9749 0.9842 1
    Couple 1 0.9652 0.9875 1

     | Show Table
    DownLoad: CSV

    In this paper, 3 fixed embedding rates of 0.5, 1.0 and 1.2 bpp were selected for comparing the corresponding PSNRs, and the results are shown in Table 7. The "—" in Table 7 indicates that the corresponding experimental measurement cannot be carried out because of the characteristics of the image itself. It can be seen from Table 7, in the case of the same selected embedding rate, when the embedding rate is 0.5 bpp, the average PSNR of the proposed algorithm is 2.67 dB higher than that in [22], which is 1.93 dB higher than that in [23]. With the increase of the embedding rate, the average PSNR of the proposed algorithm is 2.6 dB higher than that in [22] when reaching 1.0 bpp, which is 1.6 dB higher than that in [23]. When the same embedding rate is 1.2 bpp, the average PSNR of the proposed algorithm is 2.5 dB higher than that in [22], which is 0.7 dB higher than that in literature [23]. The main reason for this difference is that the algorithm in [22] uses a reversible image watermarking based on the histogram shift interpolation technique. The algorithm obtains a better performance in the small embedding amount because of the more concentrated prediction error histogram. The host image exhibits a vast proportion of pixels in the lightest or darkest end. Due to the lack of a gray overflow control scheme, the auxiliary information for the host images cannot be completely saved, therefore leading to an embedding failure. In [23], the watermarks were mostly distributed in the local area with strong watermark embedding ability, and the watermarks were rarely distributed in the local area with weak watermark embedding ability. It inevitably produces distortion after iterative processing, thus affecting the image quality. Therefore, the proposed algorithm achieves a better image visual quality and is suitable for embedding high-capacity watermark information.

    Table 7.  PSNR value comparison under the same embedding rate (dB).
    Embedding rate Original images Lena Baboon Barbara Peppers Girl Cameraman Man Couple
    0.5 bpp Literature 22 42.5 33.9 42.8 -- -- -- -- --
    Literature 23 42.7 38.3 42.9 -- 41.5 41.1 40.9 --
    Proposed 41.5 40.9 41.8 41.4 41.4 41.2 41.1 41.4
    1.0 bpp Literature 22 33.2 -- 34.3 -- -- 33.7 -- --
    Literature 23 34.7 -- 35.2 -- 34.9 -- -- --
    Proposed 36.3 36.2 36.4 35.8 36.3 35.9 35.8 35.9
    1.2 bpp Literature 22 -- -- 30.9 -- -- -- -- --
    Literature 23 32.1 -- 32.8 -- 31.8 32.5 32.4 --
    Proposed 33.2 32.8 33.4 32.9 33.2 32.8 32.9 32.8

     | Show Table
    DownLoad: CSV

    This paper presents an improved large-capacity reversible image watermarking based on the DE. The algorithm can effectively improve the embedding rate and visual quality. The proposed scheme effectively controls the overflow of pixel values when embedding watermark with the DE, and uses multi-scale decomposition technology to remove the abrupt points in each image-block. On the one hand, when embedding watermark, the GDE has higher embedding amount than the DE. On the other hand, the overflow processing method proposed in this paper can improve the embedding capacity without locating the overflow pixels. There is no need to eliminate the overflow pixels which may be generated when using the GDE to embed the watermark. The GDE is used to embed the watermark directly without considering the overflow of pixels. Keeping certain visual quality, the overflow algorithm can carry out multiple times for watermark embedding. After extracting the embedded watermark, the algorithm can recover the original image without any loss. Compared with other algorithms, the main contribution of this proposed algorithm is to enhance the embedding rate while maintaining promising visual quality. The simulation results showed that the effective watermark capacity embedded in this algorithm was superior to other algorithms under the premise of maintaining good visual quality.

    This work is supported by the National Statistical Science Research Project (2018LY12), and Six Talent Peaks Project in Jiangsu Province (XYDXXJS-011).

    All authors declare no conflicts of interest in this paper.



    [1] P. Bernard, B. Carolina, S. Eric, R. Isabella, V. Rafael, G. Joaquim, The benefit trial: Where do we go from here?, PLoS Neg. Trop. Dis., 10 (2016), 1–4. https://doi.org/10.1371/journal.pntd.0004343 doi: 10.1371/journal.pntd.0004343
    [2] B. Y. Lee, S. M. Bartsch, L. Skrip, D. L. Hertenstein, A. Galvani, Are the london declaration's 2020 goals sufficient to control chagas disease?: Modeling scenarios for the yucatan peninsula, PLoS Neg. Trop. Dis., 12 (2018), 1–20. https://doi.org/10.1371/journal.pntd.0006337 doi: 10.1371/journal.pntd.0006337
    [3] World Health Organization, Chagas disease in Latin America: an epidemiological update based on 2010 estimates, Weekly Epidemiol. Record, 90 (2015), 33–43.
    [4] C. H. Imperador, F. Madeira, M. T. Oliveira, A. B. Oliveira, K. C. Alevi, Parasite-vector interaction of chagas disease: A mini-review, Amer. J. Trop. Med, Hyg., 98 (2018), 653–655. https://doi.org/10.4269/ajtmh.17-0657 doi: 10.4269/ajtmh.17-0657
    [5] A. R. Méndez, E. Aldasoro, E. D. Lazzari, E. Sicuri, M. Brown, D. A. J. Moore, et al., Prevalence of chagas disease in latin-american migrants living in Europe: A systematic review, meta-analysis, PLoS Neg. Trop. Dis., 9 (2015), 1–15. https://doi.org/10.1371/journal.pntd.0003540 doi: 10.1371/journal.pntd.0003540
    [6] P. J. Plourde, K. Kadkhoda, M. Ndao, Congenitally transmitted chagas disease in canada: a family cluster, Can. Medi. Asso. J., 189 (2017), 1489–1492. https://doi.org/10.1503/cmaj.170648 doi: 10.1503/cmaj.170648
    [7] C. Hernández, Z. Cucunubá, E. Parra, G. Toro, P. Zambran, J. D. Ramírez, COVID-19: implications for people with Chagas disease, Heart, 15 (2020), 69. https://doi.org/10.5334/gh.891 doi: 10.5334/gh.891
    [8] E. J. Zaidel, Chagas disease (Trypanosoma cruzi) and HIV co-infection in Colombia, Inter. J. Infect. Dis., 26 (2014), 146–148. https://doi.org/10.1016/j.ijid.2014.04.002 doi: 10.1016/j.ijid.2014.04.002
    [9] N. Tomasini, P. G. Ragone, S. Gourbire, J. P. Aparicio, P. Diosque, Epidemiological modeling of trypanosoma cruzi: Low stercorarian transmission and failure of host adaptive immunity explain the frequency of mixed infections in humans, PLoS Comput. Biol., 13 (2017), 1–21. https://doi.org/10.1371/journal.pcbi.1005532 doi: 10.1371/journal.pcbi.1005532
    [10] X. T. Wu, D. Z. Gao, Z. L. Song, J. H. Wu, Modelling triatomine bug population and trypanosoma rangeli transmission dynamics: co-feeding, pathogenic effect and linkage with chagas disease, Math. Bios., 324 (2020), 1–14. https://doi.org/10.1016/j.mbs.2020.108326 doi: 10.1016/j.mbs.2020.108326
    [11] S. S. Weber, S. Noack, P. M. Selzer, R. Kaminsky, Blocking transmission of vector borne diseases, Inter. J. Paras.: Drugs Drug Resist., 7 (2017), 90–109. https://doi.org/10.1016/j.ijpddr.2017.01.004 doi: 10.1016/j.ijpddr.2017.01.004
    [12] N. Tomasini, P. G. Ragone, S. Gourbire, J. P. Aparicio, P. Diosque, Epidemiological modeling of trypanosoma cruzi: low stercorarian transmission and failure of host adaptive immunity explain the frequency of mixed infections in humans, PLoS Comput. Biol., 13 (2017), 1–21. https://doi.org/10.1371/journal.pcbi.1005532 doi: 10.1371/journal.pcbi.1005532
    [13] M. A. A. Zegarra, D. Olmos-Liceaga, J. X. Velasco-Hernández, The role of animal grazing in the spread of chagas disease, J. Theor. Biol., 457 (2018), 19–28. https://doi.org/10.1016/j.jtbi.2018.08.025 doi: 10.1016/j.jtbi.2018.08.025
    [14] R. C. Ferreira, C. F. Teixeira, V. F. A. de Sousa, A. A. Guarneri, Effect of temperature and vector nutrition on the development and multiplication of trypanosoma rangeli in rhodnius prolixus, Parasitol. Res., 117 (2018), 1737–1744. https://doi.org/10.1007/s00436-018-5854-2 doi: 10.1007/s00436-018-5854-2
    [15] A. A. Guarneri, M. G. Lorenzo, Triatomine physiology in the context of trypanosome infection, J. Insect. Physiol., 97 (2017), 66–76. https://doi.org/10.1016/j.jinsphys.2016.07.005 doi: 10.1016/j.jinsphys.2016.07.005
    [16] J. K. Peterson, S. M. Bartsch, B. Y. Lee, A. P. Dobson, Broad patterns in domestic vector-borne trypanosoma cruzi transmission dynamics: synanthropic animals and vector control, Paras. & Vectors, 8 (2015), 1–10. https://doi.org/10.1186/s13071-015-1146-1 doi: 10.1186/s13071-015-1146-1
    [17] J. K. Peterson, A. L. Graham, What is the true effect of Trypanosoma rangeli on its triatomine bug vector?, J. Vector Ecol., 41 (2016), 27–33. https://doi.org/10.1111/jvec.12190 doi: 10.1111/jvec.12190
    [18] L. D. Ferreira, M. H. Pereira, A. A. Guarneri, Revisiting trypanosoma rangeli transmission involving susceptible and non-susceptible hosts, PLoS One, 10 (2015), 1–14. https://doi.org/10.1371/journal.pone.0140575 doi: 10.1371/journal.pone.0140575
    [19] S. E. Randolph, L. Gern, P. A. Nuttall, Co-feeding ticks: Epidemiological significance for tick-borne pathogen transmission, Parasitol. Today, 12 (1996), 472–479. https://doi.org/10.1016/S0169-4758(96)10072-7 doi: 10.1016/S0169-4758(96)10072-7
    [20] M. J. Voordouw, Co-feeding transmission in Lyme disease pathogens, Parasitology, 142 (2015), 290–302. https://doi.org/10.1017/S0031182014001486 doi: 10.1017/S0031182014001486
    [21] K. Nah, F. M. Magpantay, Á. Bede-Fazekas, G. Röst, J. H. Wu, Assessing systemic and non-systemic transmission risk of tick-borne encephalitis virus in Hungary, PLoS One, 14 (2019), 1–18. https://doi.org/10.1371/journal.pone.0217206 doi: 10.1371/journal.pone.0217206
    [22] X. Zhang, X. T. Wu, J. H. Wu, Critical contact rate for vector-host-pathogen oscillation involving co-feeding and diapause, J. Biol. Syst., 25 (2017), 1–19. https://doi.org/10.1142/S0218339017400083 doi: 10.1142/S0218339017400083
    [23] J. X. Velasco-Hernández, An epidemiological model for the dynamics of chagas disease, Biosystems, 26 (1991), 127–134. https://doi.org/10.1016/0303-2647(91)90043-K doi: 10.1016/0303-2647(91)90043-K
    [24] J. X. Velasco-Hernández, A model for chagas disease involving transmission by vectors and blood transfusion, Theor. Pop. Biol., 46 (1994), 1–31. https://doi.org/10.1006/tpbi.1994.1017 doi: 10.1006/tpbi.1994.1017
    [25] M. A. Acuña-Zegarra, D. O. Liceaga, J. X. Velasco-Hernández, The role of animal grazing in the spread of chagas disease, J. Theor. Biol., 457 (2018), 19–28. https://doi.org/10.1016/j.jtbi.2018.08.025 doi: 10.1016/j.jtbi.2018.08.025
    [26] C. M. Kribs, C. Mitchell, Host switching vs. host sharing in overlapping sylvatic trypanosoma cruzi transmission cycles, J. Biol. Dyn., 9 (2015), 1–31. https://doi.org/10.1080/17513758.2015.1075611 doi: 10.1080/17513758.2015.1075611
    [27] G. E. Ricardo, C. A. Leonardo, K. O. Paula, A. L. Leonardo, S. Raúl, K. Uriel, Strong host-feeding preferences of the vector triatoma infestans modified by vector density: Implications for the epidemiology of chagas disease, PLoS Neg. Trop. Dis., 3 (2009), 1–12. https://doi.org/10.1371/journal.pntd.0000447 doi: 10.1371/journal.pntd.0000447
    [28] L. Stevens, D. M. Rizzo, D. E. Lucero, J. C. Pizarro, Household model of chagas disease vectors (hemiptera: Reduviidae) considering domestic, peridomestic, and sylvatic vector populations, J. Med. Entomol., 50 (2013), 907–915. https://doi.org/10.1603/ME12096 doi: 10.1603/ME12096
    [29] C. J. Schofield, N. G. Williams, T. F. D. C. Marshall, Density-dependent perception of triatomine bug bites, Ann. Trop. Med. Paras., 80 (1986), 351–358. https://doi.org/10.1080/00034983.1986.11812028 doi: 10.1080/00034983.1986.11812028
    [30] R. Gurgel-Goncalves, C. Galvão, J. Costa, A. T. Peterson, Geographic distribution of chagas disease vectors in brazil based on ecological niche modeling, J. Trop. Med., 2012 (2012), 1–15. https://doi.org/10.1155/2012/705326 doi: 10.1155/2012/705326
    [31] L. Frédéric, Niche invasion, competition and coexistence amongst wild and domestic bolivian populations of chagas vector triatoma infestans (hemiptera, reduviidae, triatominae), Comptes Rendus Biol., 336 (2013), 183–193. https://doi.org/10.1016/j.crvi.2013.05.003 doi: 10.1016/j.crvi.2013.05.003
    [32] C. M. Barbu, A. Hong, J. M. Manne, D. S. Small, E. J. Q. Caldern, K. Sethuraman, et al., The effects of city streets on an urban disease vector, PLoS Comput. Biol., 9 (2013), 1–9. https://doi.org/10.1371/journal.pcbi.1002801 doi: 10.1371/journal.pcbi.1002801
    [33] H. Inaba, H. Sekine, A mathematical model for chagas disease with infection-age-dependent infectivity, Math. Biosci., 190 (2004), 39–69. https://doi.org/10.1016/j.mbs.2004.02.004 doi: 10.1016/j.mbs.2004.02.004
    [34] C. Barbu, E. Dumonteil, S. Gourbière, Optimization of control strategies for non-domiciliated triatoma dimidiata, chagas disease vector in the yucatan peninsula, Meaxico, PLoS Neg. Trop. Dis., 3 (2009), 1–10. https://doi.org/10.1371/journal.pntd.0000416 doi: 10.1371/journal.pntd.0000416
    [35] M. Z. Levy, F. S. M. Chavez, J. G. Cornejo, C. del Carpio, D. A. Vilhena, F. E. Mckenzie, et al., Rational spatio-temporal strategies for controlling a chagas disease vector in urban environments, J. R. Soc. Interface, 7 (2010), 1061–1070. https://doi.org/10.1098/rsif.2009.0479 doi: 10.1098/rsif.2009.0479
    [36] R. E. Guëtler, U. Kitron, M. C. Cecere, E. L. Segura, J. E. Cohen, Sustainable vector control and management of chagas disease in the gran chaco, Argentina, Proc. Nat. Acad. Sci. U. S. A., 104 (2007), 16194–16199. https://doi.org/10.1073/pnas.0700863104 doi: 10.1073/pnas.0700863104
    [37] B. Y. Lee, K. M. Bacon, A. R. Wateska, M. E. Bottazzi, E. Dumonteil, P. J. Hotez, Modeling the economic value of a chagas' disease therapeutic vaccine, Hum. Vaccines & Immunother., 8 (2012), 1293–1301. https://doi.org/10.4161/hv.20966 doi: 10.4161/hv.20966
    [38] B. Y. Lee, K. M. Bacon, M. E. Bottazzi, P. J. Hotez, Global economic burden of chagas disease: a computational simulation model, Lancet Infect. Dis., 13 (2013), 342–348. https://doi.org/10.1016/S1473-3099(13)70002-1 doi: 10.1016/S1473-3099(13)70002-1
    [39] J. E. Rabinovich, J. A. Leal, D. F. de Pinero, Domiciliary biting frequency and blood ingestion of the chagasis disease vector rhodnius prolixus stahl (hemiptera: reduviidae in Venezuela), Trans. R. Soc. Trop. Med. Hyg., 73 (1979), 272–283. https://doi.org/10.1016/0035-9203(79)90082-8 doi: 10.1016/0035-9203(79)90082-8
    [40] P. Driessche, J. Watmough, Reproduction numbers and sub-threshold endemic equilibria for compartmental models of disease transmission, Math. Bios., 180 (2002), 29–48. https://doi.org/10.1016/S0025-5564(02)00108-6 doi: 10.1016/S0025-5564(02)00108-6
    [41] Y. C. Xu, Z. R. Zhu, Y. Yang, F. W. Meng, Vectored immunoprophylaxis and cell-to-cell transmission in HIV dynamics, Inter. J. Bifur. Chaos, (2020), 1–19. https://doi.org/10.1142/S0218127420501850
    [42] M. Y. Li, S. M. James, A geometric approach to global-stability problems, SIAM J. Math. Anal., 27 (1996), 1070–1083. https://doi.org/10.1137/S0036141094266449 doi: 10.1137/S0036141094266449
    [43] M. Y. Li, J. R. Graef, L. Wang, J. Karsai, Global dynamics of a seir model with varying total population size, Math. Bios., 160 (1999), 191–213. https://doi.org/10.1016/S0025-5564(99)00030-9 doi: 10.1016/S0025-5564(99)00030-9
    [44] R. H. Martin, Logarithmic norms and projections applied to linear differential systems, J. Math. Anal. Appl., 45 (1974), 432–454. https://doi.org/10.1016/0022-247X(74)90084-5 doi: 10.1016/0022-247X(74)90084-5
    [45] H. L. Smith, Monotone dynamical systems: an introduction to the theory of competitive and cooperative systems, Am. Math. Soc. Math. Surv. Monogr., 1995. https://doi.org/http://dx.doi.org/10.1090/surv/041
    [46] W. J. Zhang, R. Bhagavath, N. Madras, J. Heffernan, Examining HIV progression mechanisms via mathematical approaches, Math. Appl. Sci. Eng., 99 (2020), 1–24. https://doi.org/10.5206/mase/10774 doi: 10.5206/mase/10774
    [47] E. J. Doedel, B. E. Oldeman, AUTO-07P: Continuation and bifurcation software for ordinary differential equations, Technical report, Concordia University, 2009. https://doi.org/US5251102A
    [48] Y. C. Xu, Y. Yang, F. W. Meng, P. Yu, Modeling and analysis of recurrent autoimmune disease, Nonl. Anal.: Real World Appl., 54 (2020), 1–28. https://doi.org/10.1016/j.nonrwa.2020.103109 doi: 10.1016/j.nonrwa.2020.103109
  • This article has been cited by:

    1. Ranjana Dwivedi, Vinay Kumar Srivastava, HSWmark: Robust and reversible image watermarking with improved capacity using Quad-tree segmentation, 2024, 27, 1433-7541, 10.1007/s10044-024-01370-0
    2. Xiuli Chai, Gongyao Cao, Zhifeng Fu, Zhihua Gan, Binjie Wang, Yushu Zhang, High-capacity reversible data hiding in encrypted medical images using adaptive pixel-modulation and HBP-RMC, 2024, 95, 17468094, 106424, 10.1016/j.bspc.2024.106424
    3. Zhifeng Fu, Xiuli Chai, Zongwei Tang, Xin He, Zhihua Gan, Gongyao Cao, Adaptive embedding combining LBE and IBBE for high-capacity reversible data hiding in encrypted images, 2024, 216, 01651684, 109299, 10.1016/j.sigpro.2023.109299
    4. Qiuling Wu, Dandan Huang, Jiangchun Wei, Wenhui Chen, Adaptive and blind audio watermarking algorithm based on dither modulation and butterfly optimization algorithm, 2023, 20, 1551-0018, 11482, 10.3934/mbe.2023509
    5. Chuanda Cai, Changgen Peng, Jin Niu, Weijie Tan, Hanlin Tang, Low distortion reversible database watermarking based on hybrid intelligent algorithm, 2023, 20, 1551-0018, 21315, 10.3934/mbe.2023943
  • Reader Comments
  • © 2022 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(2392) PDF downloads(100) Cited by(1)

Figures and Tables

Figures(7)  /  Tables(1)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog