Research article Special Issues

Joint statistics matching for camera model identification of recompressed images

  • Received: 24 January 2019 Accepted: 09 May 2019 Published: 31 May 2019
  • Source camera identification has been well studied in laboratory environment where the training and test samples are all original images without recompression. However, image compression is quite common in the real world, when the training and test images are double JPEG compressed with different quantization tables, the identification accuracy of existing methods decreases dramati- cally. To address this challenge, we propose a novel iterative algorithm namely joint first and second order statistics matching (JSM) to learn a feature projection that projects the training and test fea- tures into a low dimensional subspace to reduce the shift caused by image recompression. Inspired by transfer learning, JSM aims to learn a new feature representation from original feature space by simultaneously matching the first and second order statistics between training and test features in a principled dimensionality reduction procedure. After the feature projection, the divergence between training and test features caused by recompression is reduced while the discriminative properties are preserved. Extensive experiments on public Dresden Image Database verify that JSM significantly outperforms several state-of-the-art methods on camera model identification of recompressed images.

    Citation: Bo Wang, Yabin Li, Xue Sui, Ming Li, Yanqing Guo. Joint statistics matching for camera model identification of recompressed images[J]. Mathematical Biosciences and Engineering, 2019, 16(5): 5041-5061. doi: 10.3934/mbe.2019254

    Related Papers:

    [1] Rundong Zhao, Qiming Liu, Huazong Zhang . Dynamical behaviors of a vector-borne diseases model with two time delays on bipartite networks. Mathematical Biosciences and Engineering, 2021, 18(4): 3073-3091. doi: 10.3934/mbe.2021154
    [2] Yan-Xia Dang, Zhi-Peng Qiu, Xue-Zhi Li, Maia Martcheva . Global dynamics of a vector-host epidemic model with age of infection. Mathematical Biosciences and Engineering, 2017, 14(5&6): 1159-1186. doi: 10.3934/mbe.2017060
    [3] Jie He, Zhenguo Bai . Global Hopf bifurcation of a cholera model with media coverage. Mathematical Biosciences and Engineering, 2023, 20(10): 18468-18490. doi: 10.3934/mbe.2023820
    [4] Sarita Bugalia, Jai Prakash Tripathi, Hao Wang . Mathematical modeling of intervention and low medical resource availability with delays: Applications to COVID-19 outbreaks in Spain and Italy. Mathematical Biosciences and Engineering, 2021, 18(5): 5865-5920. doi: 10.3934/mbe.2021295
    [5] Yan Wang, Minmin Lu, Daqing Jiang . Viral dynamics of a latent HIV infection model with Beddington-DeAngelis incidence function, B-cell immune response and multiple delays. Mathematical Biosciences and Engineering, 2021, 18(1): 274-299. doi: 10.3934/mbe.2021014
    [6] Zhenzhen Liao, Shujing Gao, Shuixian Yan, Genjiao Zhou . Transmission dynamics and optimal control of a Huanglongbing model with time delay. Mathematical Biosciences and Engineering, 2021, 18(4): 4162-4192. doi: 10.3934/mbe.2021209
    [7] Tailei Zhang, Hui Li, Na Xie, Wenhui Fu, Kai Wang, Xiongjie Ding . Mathematical analysis and simulation of a Hepatitis B model with time delay: A case study for Xinjiang, China. Mathematical Biosciences and Engineering, 2020, 17(2): 1757-1775. doi: 10.3934/mbe.2020092
    [8] Vanessa Steindorf, Sergio Oliva, Jianhong Wu . Cross immunity protection and antibody-dependent enhancement in a distributed delay dynamic model. Mathematical Biosciences and Engineering, 2022, 19(3): 2950-2984. doi: 10.3934/mbe.2022136
    [9] Yuhua Long, Yining Chen . Global stability of a pseudorabies virus model with vertical transmission. Mathematical Biosciences and Engineering, 2020, 17(5): 5234-5249. doi: 10.3934/mbe.2020283
    [10] Martin Luther Mann Manyombe, Joseph Mbang, Jean Lubuma, Berge Tsanou . Global dynamics of a vaccination model for infectious diseases with asymptomatic carriers. Mathematical Biosciences and Engineering, 2016, 13(4): 813-840. doi: 10.3934/mbe.2016019
  • Source camera identification has been well studied in laboratory environment where the training and test samples are all original images without recompression. However, image compression is quite common in the real world, when the training and test images are double JPEG compressed with different quantization tables, the identification accuracy of existing methods decreases dramati- cally. To address this challenge, we propose a novel iterative algorithm namely joint first and second order statistics matching (JSM) to learn a feature projection that projects the training and test fea- tures into a low dimensional subspace to reduce the shift caused by image recompression. Inspired by transfer learning, JSM aims to learn a new feature representation from original feature space by simultaneously matching the first and second order statistics between training and test features in a principled dimensionality reduction procedure. After the feature projection, the divergence between training and test features caused by recompression is reduced while the discriminative properties are preserved. Extensive experiments on public Dresden Image Database verify that JSM significantly outperforms several state-of-the-art methods on camera model identification of recompressed images.


    Plant has to rely solely on cellular innate immunity to deal with infections as it does not possess any form of mobile defence and therefore it exhibits many plant-specific characteristics [1]. Plants showing recovery phenotype to a specific viral infection initially become affected but later experience new growth that is progressively more resistant to the virus until they finally produce new virus-free leaves with complete immunity [2]. Generally, plant gains hypersensitive resistance by triggering the self-destruction of infected cells, with necrotic tissue forming at and around the infection site. The cells surrounding these necrotic lesions are usually found in the antiviral state. Although some of them may contain traces of the virus, the virus is unable to replicate. This can be explained by the post-transcriptional gene silencing (PTGS), or RNA interference [3]. Besides disease resistance, time delay in disease transmission, known as incubation period, is an important factor that arises from disease resistance. The length of this delay depends on the plant's resistance [4].

    Vector-borne plant viral diseases have attracted the interest of researchers who are working with modeling approach [5,6]. Mathematical modeling of vector-borne plant disease is an effective approach to understand the transmission of disease in host plants. With this approach, some effective measures can be done to make appropriate disease control strategy [7].

    For the modeling purposes, usually, the rate of infection in most of the models for viral disease is assumed to be bilinear in the carrier vector v and susceptible host x. However, the actual incidence rate is probably not linear over the entire range of v and x. Therefore, it is reasonable to assume the infection rate of plant-vector model as Beddington-DeAngelis functional response, λxv1+ax+cv, where a,c,λ0 are constants. The functional response was introduced by Beddington [8] and DeAngelis et al. [9]. It includes nonlinear incidence rate and bilinear functional response, Holling type II functional response and saturation response [10,11]. Mathematical models using Beddington-DeAngelis type infection rate have been proposed and analysed for viral disease dynamics [12,13].

    In plant epidemiology, Holt et al. have studied the dynamics of mosaic disease of Cassava which is also carried through whitefly [14]. Venturino et al. have proposed a mathematical model for studying the dynamics of Jatropha curcas mosaic disease vectored by whitefly [15] and observed oscillations in the system due to high infection rate. In [16], authors have proposed a model for the dynamics of soil-borne plant disease with host demography and shown the limit cycle behaviour. In the above mentioned articles authors have used bilinear disease transmission in modeling process. On the other hand, in [17,18], authors have taken nonlinear incidence rate for vector-borne plant disease propagation.

    Another important factor in a biological system is the time delay. Vector-borne plant disease models with delay can show stability switches, periodic oscillations, transcritical bifurcation etc. [14,15,16]. However, such an analysis is crucial to assess the persistence of infection and disease control.

    Van der Plank [19] first incorporated delay differential equation with the single delay in plant epidemics assuming the time evolution of the density of infected host tissue. Despite many studies that followed Van der Plank's model and that adopted discrete time approximations of it, delay differential equations are rarely used in theoretical studies of plant disease. In [20], the authors introduced plant incubation period as a delay in a plant disease model proposed by Meng et al. [21] to notice the changes in the dynamics of the model. Also in [16], authors have proposed a model for the dynamics of soil-borne plant disease taking a time delay due to latent period of inoculum/vectors. In [22], the authors modified the model by Shi et al. [23] for vector-borne disease in plants by including multiple delays to account for the incubation periods of plants and latent period in vectors. They have also noticed the changes in the dynamics of the system, specifically changes in the solutions trajectories. They have derived the threshold value for delay induced destabilization. But they have missed important dynamics that delay can induce misleading the conclusions that is established in [24,25]. Large delay can stabilise a system or make the system disease-free [26]. Therefore, construction of vector-borne plant disease models with time delays requires a clear understanding of the relevant biological mechanism.

    In this article, motivated by the above discussions, we have derived the mathematical model for plants viral disease including plants resistance and incubation delay (section 2). Then some basic properties of the model have been analysed (section 3). The effect of delay on the stability of equilibria has been focused (section 4, 5). Also, Hopf bifurcation due to the stability changes has been analysed and the outcomes are discussed and shown in figures (section 6). Finally, a discussion of the main results concludes the paper (section 7).

    Plant and vector populations are considered without explicitly including the mosaic virus. Here, x(t), y(t) denote the abundances of susceptible and infected plants (m2) respectively. Number of infected vector (virus carrier) is denoted by v(t) (plant1) at any time t.

    Logistic growth for susceptible plant due to the finite area of the plantation is specified by net growth rate r and carrying capacity k. A successful contact between infected vectors with a healthy plant makes it infected [27], m is the natural death rate, d is disease related death rate of infected plants.

    Let λ be the maximum contact rate from an infected vector to a susceptible plant. Usually the rate of infection in most of the models for viral disease is assumed to be bilinear in the carrier vector v and susceptible host x. However, the actual incidence rate is probably not linear over the entire range of v and x. Thus, from the above discussion, it is reasonable to assume a Beddington-DeAngelis type infection rate i.e., λxv1+ax+cv, where a is the plant resistance rate, c is rate for the crowding effect of vectors [12,13].

    Insect vector is recruited in the system at a rate b and is proportional to infected plant population. The infective insects do not get sick from the virus, they are just carriers [28]. Let μ be the mortality rate of infected vector.

    The effect of time delay in terms of incubation period of plant is modeled via the term λemτx(tτ)v(tτ)1+ax(tτ)+cv(tτ). The term emτ represents the survival probability of plant through the incubation time τ.

    Based on the above assumptions, we have the following mathematical model:

    dxdt=rx[1x+yk]λxv1+ax+cv,dydt=λemτx(tτ)v(tτ)1+ax(tτ)+cv(tτ)(m+d)y,dvdt=byμv.

    Let C denote the Banach space of continuous functions ϕ:[τ,0]R3 equipped with the sup-norm,

    ϕ=supτγ0{|ϕ1(γ)|,|ϕ2(γ)|,|ϕ3(γ)|},

    where, ϕ=(ϕ1,ϕ2,ϕ3)C([τ,0],R3). For biological reasons, populations always have nonnegative values, therefore, the initial function for model (2.1) is taken as below:

    x(γ)=ϕ1(γ),y(γ)=ϕ2(γ),v(γ)=ϕ3(γ)withϕi(γ)0,γ[τ,0),ϕi(0)>0,i=1,2,3. (2.1)

    In this section, some basic properties such as non-negativity, boundedness of solutions and possible equilibria are analysed.

    Lemma 1. All solutions of system (2.1) are non-negative on [0,+) under the initial conditions (2.1) and are ultimately bounded.

    Proof. We rewrite the first equation of (2.1) as

    dxdtx[r(1x+yk)λv1+ax+cv]=0. (3.1)

    Let f(x,y,v)=r(1x+yk)λv1+ax+cv, then from above equation, we have

    dxdtxf(x,y,v)=0[dxdtxf(x,y,v)]exp(t0f(x(ξ),y(ξ),v(ξ))dξ)=0ddt[xexp(t0f(x(ξ),y(ξ),v(ξ))dξ)]=0.
    x(t)=x(0)exp(t0f(x(ξ),y(ξ),v(ξ))dξ).

    Since, x(0)=ϕ1(0)>0, then x(t)>0 for t0.

    Using the method of steps, we show the non-negativity of y and v.

    The second equation of system (2.1) gives,

    y(t)(m+d)y(t) and v(t)μv(t),

    for some constant T>0 and for all t(0,T]. Using the standard comparison principle, we have y(t)0 and v(t)0 for all t(0,T].

    The above argument can be repeated to deduce the non-negativity of y and v on the interval t(T,2T] and so on the successive intervals t(nT,(n+1)T],n=2,3, to include all positive times.

    To ensure the model biologically plausible, both plant and vector populations have to remain bounded during their time evolution.

    To prove the boundedness of x(t) and y(t), let

    F(t)=emτx(t)+y(t+τ)

    Then,

    dF(t)dt=emτdxdt+dy(t+τ)dt=emτrx[1x+yk]emτλxv1+ax+cv+λemτxv1+ax+cv(m+d)y(t+τ)=emτrx[1x+yk](m+d)y(t+τ)<emτ[(r+q)xrx2k]qF(t),where, q=m+d

    Now, (r+q)xrx2k is a quadratic in x and its maximum value is k(r+q)24r and emτ1. Using this, we can write

    dF(t)dt<k(r+q)24rqF(t).

    This implies

    lim suptF(t)k(r+q)24rq. (3.2)

    and hence, the x(t) and y(t) are bounded. As y is bounded, using the well-known comparison principle, from the third equation of (2.1), v(t) is also bounded.

    We follow the method established in the paper by Hefferman et al. [29] for calculating R0.

    We consider the next generation matrix G comprised of two parts namely F and V, Fi are the new infections, while the Vi transfers of infections from one compartment to another.

    F=[Fi(E1)xj]=[0λemτk1+ak00]

    and

    V=[Vi(E1)xj]=[(d+m)0bμ]

    where E1(k,0,0) is the disease-free equilibrium and indices i, j correspond, respectively, to y and v. The basic reproduction number R0 is the dominant eigenvalue of the matrix G=FV1, i.e., Eq (3.3).

    R0=kλemτbμ(d+m)(1+ak). (3.3)

    Remark 1. It is important to note that R0 does not depend on c (crowding effect) and hence it is independent that how efficiently vectors interact with healthy plants. At the same time, taking the limit of k gives

    limkR0(ω0)=R0λemτbμ(d+m)a

    In light of the fact that R0 is monotonically decreasing with increasing a, this suggests that eradication of disease, as represented by a stable disease-free steady state E1 is possible if R0<1. The available means to achieve this is by increasing the resistance rate or incubation period. This can be done using nutrients, biocontrolling agents, genetic engineering, chemicals etc. [31,32,33,34].

    The model (2.1) has three equilibria namely (ⅰ) the trivial equilibrium E0(0,0,0), (ⅱ) the disease-free equilibrium, E1(k,0,0), and (ⅲ) the unique coexistence equilibrium, here E(x,y,v) is determined as follows.

    From the third equation of (2.1), we can write v as

    v=byμ (3.4)

    Considering the summation of the first and second equation times emτ of (2.1), we get y in term of x as

    y=remτx(kx)k(m+d)+remτx. (3.5)

    Putting the value of v and y in the first equation of (2.1), we get x as the positive root of the following equation:

    L(x)=L0x2+L1x+L2=0 (3.6)

    where,

    L0=rλemτ(bλemτbcq+aμq)L1=λ(bkλemτq+akμq2+bckemτqr+emτμqr)L2=kλμq2>0 (3.7)

    and q=(m+d).

    We can check that L(0)>0 always and L(k)<0 when R0>1. Hence there exists x satisfying 0<x<k if R0>1. Note that R0>1 implies that bλemτ>aμq, which shows L0<0 when R0>1. Therefore the solution x of L(x)=0 is unique and satisfies 0<x<k which ensures y>0, from (3.5).

    Thus we have the following result for the feasibility of endemic steady state E.

    Proposition 1. Let us assume R0>1. Then there exists a unique endemic equilibrium E of system (2.1).

    In this section, the local stability of the delayed system (2.1) is studied around the equilibria. For this, we linearize the system (2.1) about any equilibrium E(x,y,v) and we get

    dXdt=PX(t)+QX(tτ). (3.8)

    Here P,Q are 3×3 matrices, given below:

    P=[pij]=[r(12x+yk)λv(1+cv)(1+ax+cv)2rxkλx(1+ax)(1+ax+cv)20(d+m)00bμ],
    Q=[qij]=[000λemτv(1+cv)(1+ax+cv)20λemτx(1+ax)(1+ax+cv)2000].

    The characteristic equation of the delay system (2.1), at any equilibrium point, is given by

    H(ξ,τ)=∣ξIPeξτQ∣=0.

    This gives

    H(ξ,τ)=ξ3+m1ξ2+m2ξ+m5+eξτ[m3+m4ξ]=0. (3.9)

    Here,

    m1=(p11+p22+p33),m2=p22p33+p11p33+p11p22,m4=(p32q23+p12q21),m3=p13q21p32+p11q23p32+q21p12p33,m5=p11p22p33.

    The trivial equilibrium E0(0,0,0) is always unstable in view of the fact that one eigenvalue (ξ=r) is positive. Now we study the stability of disease-free and endemic equilibria.

    For the disease-free equilibrium E1,

    P=[pij]=[rrλk1+ak0p2200bμ],Q=[qij]=[00000λemτk1+ak000]

    where p22=(d+m). Now, ξIPeξτQ∣=0 gives the following characteristic equation at E1,

    H(ξ,τ)=(ξ+r)(ξ2+(m+d+μ)ξ+(m+d)μbλke(m+ξ)τ1+ak)=0. (4.1)

    The following two cases are raised: (ⅰ) τ=0 and (ⅱ) τ>0.

    (ⅰ) For τ=0, the characteristic equation is

    H(ξ,0)=(ξ+r)(ξ2+(m+d+μ)ξ+(m+d)μbλk1+ak)=0. (4.2)

    Thus, at the disease-free equilibrium E1(k,0,0), one eigenvalue is r<0, and the rest of the eigenvalues will be negative or with negative real part if (m+d)μbλk1+ak>0, which is equivalent to R0<1. Thus for the stability of E1, we have the following theorem.

    Theorem 1. For τ=0, the disease-free equilibrium E1 of the model (2.1) is stable if R0<1 and unstable if R0>1.

    (ⅱ) For τ>0, one eigenvalue is r<0, and the remaining roots satisfy the quadratic equation

    H(ξ,τ)=ξ2+(m+d+μ)ξ+(m+d)μbλke(m+ξ)τ1+ak=0, (4.3)

    and we have the following theorem.

    Theorem 2. Disease-free equilibrium E1 of the model (2.1) for τ>0 is asymptotically stable for R0<1, and unstable for R0>1.

    Proof. Assume that R0>1, then H(0,τ)=(m+d)μbkλemτ1+ak=(m+d)μ(1R0)<0. Since limξH(ξ,τ)=, there exists at least one real positive root of the characteristic equation (4.3), implying that E1 is unstable.

    Next, let us assume R0<1. We note that in this case for τ=0 all characteristic roots of Eq (4.3) have negative real part (Theorem 1) and therefore, our goal is to show that as τ>0, none of the characteristic roots can reach the imaginary axis.

    Let us assume by contradiction that for some τ>0, ξ=iκ is a root of (4.3). Putting ξ=iκ in (4.3) and separating real and imaginary parts, we have

    κ2+M2=M3cosκτ, (4.4)
    κM1=M3sinκτ. (4.5)

    Here M1=(m+d+μ), M2=(m+d)μ, and M3=bkλemτ1+ak. Squaring and then adding the above equations, we finally obtain

    κ4+κ2(q2+μ2)+(M22M23)=0. (4.6)

    Note that R0<1 implies M3<M2. Since this equation has no real roots for κ, it means that the characteristic equation (4.3) cannot have purely imaginary roots. Thus, for R0<1, the steady state E1 is asymptotically stable for all τ0.

    For the stability of endemic equilibrium E, again we consider two cases, τ=0 and τ>0.

    When τ=0, the characteristic at E equation becomes

    H(ξ,0)=ξ3+m1ξ2+(m2+m4)ξ+(m3+m5)=0. (5.1)

    Denoting by σ1=m1,σ2=(m2+m4),σ3=(m3+m5) and using the Routh-Hurwitz criterion [30], for τ=0, we can get the following theorem.

    Theorem 3. For τ=0, the coexistence equilibrium point E(x,y,v) is stable if the conditions

    σ1>0,σ3>0andσ1σ2σ3>0 (5.2)

    are satisfied.

    Now, we study the local Hopf bifurcation of E. Any of the parameters of the model may be a bifurcation parameter. We assume, α as the generic bifurcating parameter of the system. The following theorem characterises the possible occurrence of Hopf bifurcation for τ=0.

    Theorem 4. The system (2.1) with τ=0, undergoes Hopf bifurcation around the endemic equilibrium point E at α=α, where the critical parameter value is contained in the following domain

    ΓHB={αR+:σ1(α)σ2(α)σ3(α)=0, withσ1(α)>0,σ2(α)>0,σ3(α)(σ1(α)σ2(α)+σ1(α)σ2(α))0} (5.3)

    Primes denote the derivative with respect to α.

    Proof. Using the condition, σ1σ2σ3=0, the characteristic equation (5.1) becomes

    (ξ2+σ2)(ξ+σ1)=0, (5.4)

    which has three roots namely ξ1=+iσ2,ξ2=iσ2 and ξ3=σ1. Therefore, a pair of purely imaginary eigenvalues exists for σ1σ2σ3=0. Now we verify the transversality condition.

    Differentiating the characteristic equation (5.1) with respect to α, we have

    dξdα|ξ=iσ2=ξ2σ1+ξσ2+σ33ξ2+2ξσ1+σ2|ξ=iσ2=σ3(σ1σ2+σ1σ2)2(σ21+σ2)|ξ=iσ2+i[σ2(σ1σ3+σ2σ2σ1σ1σ2)2σ2(σ21+σ2)]|ξ=iσ2.

    Therefore,

    dReξdα|ξ=iσ2=σ3(σ1σ2+σ1σ2)2(σ21+σ2)|ξ=iσ20σ3(σ1σ2+σ1σ2)|ξ=iσ20. (5.5)

    and thus Hopf bifurcation occurs at α=α.

    For τ>0, the characteristic equation at E becomes

    ψ(ξ,τ)=ξ3+m1ξ2+m2ξ+m5+[m3+m4ξ]eξτ=0, (5.6)

    which is a transcendental equation in ξ with infinitely many roots. It is known that E is locally stable (or unstable) if all the roots of the corresponding characteristic equation have negative real parts (or at least one root has a positive real part). Also, Hopf bifurcating periodic solution exists if purely imaginary roots exist. We shall check the possible occurrence of Hopf bifurcation.

    For this, suppose ξ=iw(τ) is a root of the Eq (5.6), then we have

    iw3m1w2+im2w+(m4iw+m3)(coswτisinwτ)+m5=0. (5.7)

    Separating real and imaginary parts, we obtain the following equations,

    w3m2w=m4wcoswτm3sinwτ. (5.8)
    m1w2m5=m3coswτ+m4wsinwτ. (5.9)

    Squaring and adding the real and imaginary parts, we get

    w6+(m212m2)w4+(m222m1m5m24)w2+(m25m23)=0. (5.10)

    Denote z=w2 and the Eq (5.10) becomes

    F(z)=z3+S1z2+S2z+S3=0, (5.11)

    where,

    S1=m212m2,S2=m222m1m5m24,S3=m25m23.

    By Descartes rule of signs, we can say that if the conditions S10,S20,S30 are satisfied, then it is easy to show that the Eq (5.11) has no positive real roots.

    Lemma 2. If the conditions (i) σ1>0,σ3>0 and σ1σ2σ3>0, and (ii) S10,S30 and S20 are satisfied then the infected steady state E is asymptotically stable for all τ0.

    Remark 2. We can say that if the model parameters satisfy the conditions given in Lemma 2, the steady state E of the delay model (2.1) is asymptotically stable for all τ>0 i.e., the stability of the system is independent of delay.

    If S3<0, then Eq (5.11) satisfies F(0)<0 and limzF(z)=. Thus Eq (5.11) has at least one positive root, r for S3<0, and consequently the characteristic equation (5.6) has a pair of purely imaginary roots ±ir=iw, say.

    We have the following lemmas.

    Lemma 3. If S3<0, then there exists at least one positive root of Eq (5.11).

    Let us assume (5.11) has three positive roots denoted as rk,k=1,2,3. Then (5.10) has three positive roots wr=rk. Let us define

    τ0=minn0,1k3{τnk},w0=wk(τ0). (5.12)

    For w(τ0)=w0, the Eqs (5.8) and (5.9) give,

    τ0=1w0arccos[m4w04(m2m4m1m3)w02m3m5m24w20+m23]+2nπw0,n=0,1,2,. (5.13)

    if (m1m4m3)w30(m2m3m4m5)w20>0, and

    τ0=1w0arccos[m4w04(m2m4m1m3)w02m3m5m24w20+m23]+2(n+1)πw0,n=0,1,2,. (5.14)

    if (m1m4m3)w30(m2m3m4m5)w200. Thus we have the following theorem.

    Theorem 5. Suppose that the interior equilibrium point E exists and is locally asymptotically stable for τ=0 i.e., σ1>0,σ3>0 and σ1σ2σ3>0 hold. If S3<0, then E is asymptotically stable for τ<τ0 and unstable for τ>τ0, where

    τ0=1w0arccos[(m4w04)(m2m4m1m3)w02m3m5m24w20+m23]. (5.15)

    When τ=τ0, Hopf bifurcation occurs, i.e., a family of periodic solution bifurcates at E as τ passes through the critical value τ0 provided the transversality condition,

    P(w0)R(w0)Q(w0)S(w0)0, (5.16)

    is fulfilled.

    Proof. Differentiating (5.8) and (5.9) with respect to τ, we have

    ddτ[Re{λ(τ)}]|τ=τ0,w=w0=P(w)R(w)Q(w)S(w)P2(w)+Q2(w)|τ=τ0,w=w0 (5.17)

    where,

    P(w)=3w2+m2+m4coswττ(m3coswτ+m4wsinwτ)Q(w)=2m1w+m4sinwττ(m3sinwτm4wcoswτ)R(w)=m3wsinwτm4w2coswτS(w)=m3wcoswτ+m4w2sinwτ.

    Therefore, ddτ[Re{λ(τ)}]τ=τ0,w=w00 if P(w0)R(w0)Q(w0)S(w0)0. Thus, the transversality condition is satisfied and hence Hopf bifurcation occurs at τ=τ0.

    Remark 3. Theorem 5 only holds if (5.11) has at least one positive real root. Lemma 3 guarantees the occurrence of a positive root. However, when S30, it is impractical to consider the analytical distribution of roots.

    In this section, the analytical results of the previous sections are corroborated by numerical simulations. We have varied the important parameters, within their feasible range, to observe their impact on both the solution trajectories and equilibria of the model (2.1). We have plotted Figures 25 using ode45 solver in MATLAB. Figure 6 is plotted using the sign of eigenvalues at an equilibrium point. The values of parameters used in the numerical simulations are given in Table 1.

    Figure 1.  Forward bifurcation at R0=1 taking parameter from Table 1 except λ(0,0.5) for the system (2.1) without delay.
    Figure 2.  Phase portrait diagram of the system (2.1) without delay for different values of infection rate λ. Other parameters values are taken from Table 1.
    Figure 3.  Hopf bifurcation of endemic equilibrium E of the system without delay taking λ as the main parameter. Parameter values are the same as in Figure 2. Actually, the steady state values of all populations are plotted and the minimum/maximum of the periodic solution whenever it exists. Solid line indicates the stable endemic equilibrium.
    Figure 4.  Solution trajectories of the system (2.1) is plotted for (a) τ=0 (b) τ=2 and (c) τ=6. Here, we have taken λ=0.35 and the rest of the parameters values as in Table 1.
    Figure 5.  Bifurcation diagram of the delayed system (2.1) taking τ as the bifurcation parameter. We have taken λ=0.35 and the other parameters are as given in Table 1. Here, the steady state values of all populations are plotted and the minimum/maximum of the periodic solution when it exists. Solid line indicates stable endemic equilibrium.
    Figure 6.  Region of stability of different steady states of (2.1) is plotted: (a) in λb, (b) in λa, (c) in λτ and (d) in aτ parameter planes. Disease-free equilibrium E1 is stable in sky-blue region, endemic equilibrium E is stable in violet region and unstable in yellow region. Parameter values are taken from Table 1. In plots (a) to (b), the values of τ is taken τ=0.
    Table 1.  Values of the parameters used in the numerical simulations.
    Parameters Description Values (unit)
    r growth rate of plant density 0.1 day1
    k maximum plant density 1 m2
    λ infection rate of plant 0.4 vector1 day1
    m infected plant removal rate 0.1 day1
    d additional death due to infection 0.025 day1
    b growth rate of infected vector 0.4 day1
    μ mortality rate of vector 0.1 day1
    a resistance rate of plant 0.5 m 2
    c crowding effect of vector 0.5 plant

     | Show Table
    DownLoad: CSV

    Figure 1 shows how the steady state values of the infected plant change with the infection transmission rate λ. This figure shows that the endemic steady state E becomes feasible for some minimum value of λ that corresponds to R0=1 as discussed in Proposition 1. For values of λ just above its critical value λ, the steady state E is unstable.

    In Figure 2, numerical solution of the system (2.1) is plotted using different values of λ (the disease transmission rate from vectors to plant) for τ=0. The endemic equilibrium, E, is stable for some lower value of λ and system has a periodic orbit for λ=0.4. Oscillation increases the value of λ. In particular, there exists a critical value of λ below which E is stable but if λ crosses this value then the system undergoes bifurcation and a stable periodic solution appears which is clearly presented in the figure. From Figure 3 and using Theorem 4, we observe that Hopf bifurcation occurs at λ=0.3667. The higher transmission rate causes larger amplitude of oscillations around this steady state E.

    In Figure 4, numerical solution of the system is plotted for three different value of delay τ for a fixed value of λ=0.35 i.e., the E is stable for τ=0 at that value of λ. The system (2.1) has periodic orbits when τ lies in the range τ(0,6). That is endemic equilibrium E is stable for higher values of delay. It is clear from Figure 5 that the stability switches of the endemic equilibrium E in terms of time delay τ at two points, nearly at τ1.012 days and τ5.56 days from stable to unstable and from unstable to stable, respectively.

    Figure 6 illustrates the stability of equilibrium points in different parameter planes. It is observed that the stability of equilibria depends on time delay τ, the plant infection rate λ and vector growth rate b and immune response rate a. This figure shows that in the parameter region with R0<1, the system is free of disease, as signified by the stable disease-free equilibrium E1, and in the region with R0>1, the disease is present i.e., the endemic steady state E is feasible there.

    Figure 6(a) shows that disease-free state is stable when the product of infection rate λ and infective vector growth rate b is below some threshold value. It also illustrates that when the product of transmission rate λ and b crosses some threshold value, the endemic steady state becomes feasible and stable but it loses its stability for higher values of both λ and b. Figure 6(b), (c) suggest that disease transmission significantly depends on the resistance of plant and the incubation delay. Critical value of λ for Hopf bifurcation depends on these two parameter. Region of stability of equilibria widens as both of them are increased. Figure 6(d) shows that E is unstable for small a and then becomes stable for larger time delay τ. It is also clear that disease resistance rate a and delay parameter τ have the ability to transform the unstable endemic into a stable disease-free state.

    In this article, we have formulated a mathematical model using Beddington-DeAngelis functional response type infection rate and studied the dynamics of vector-borne plant disease. We have derived the basic reproduction number, R0, that helps us in understanding the dynamics of the model depending on the time delay and disease resistance. In the case where R0<1, the disease-free state, E1, is stable. This is also corroborated by the numerical calculations. When R0>1, however, the disease-free state becomes unstable and the endemic steady state becomes feasible. Oscillations in the solution of the susceptible plant, infected plant and infective vectors have been observed around the endemic equilibrium point. Resistance rate of the vector has been chosen as the continuation parameter, since it is one value that can be enhanced using nutrients which prevent the disease from occurring [28,34].

    Numerical simulations have shown that the model can support resistant and recovery-type behaviours. We also found that the delay preserves the stability property of disease-free equilibrium by failing to induce stability switches when the equilibrium is stable. It is interesting to see that when endemic equilibrium is unstable and a periodic solution emerges at the endemic equilibrium (without delay), large delay or the resistance rate leads to the disappearance of the periodic solutions and later to disease-free situation [35]. This can be done using different control strategies (Remark 1).

    In conclusion, Beddington-DeAngelis functional response type disease transmission rate has been successfully fitted in the model. The predictions from the model concerning particular dynamical regimes depending on parameters can provide the managers with effective methods for disease monitoring, as well as for developing proper techniques for successful disease management.

    YT's research is supported by Japan Society for the Promotion of Science "Grant-in-Aid 20K03755".

    All authors declare no conflicts of interest in this paper.



    [1] M. C. Stamm, M. Wu and K. J. R. Liu, Information forensics: An overview of the first decade, IEEE Access, 1 (2013), 167–200.
    [2] A. Piva, An overview on image forensics, Isrn Signal Process., 2013.
    [3] M. Kirchner and T. Gloe, Forensic camera model identification, in Handbook of Digital Forensics of Multimedia Data and Devices, Chichester, U.K.: Wiley, 2015, 329–374.
    [4] J. Lukáš, J. Fridrich and M. Goljan, Determining digital image origin using sensor imperfections, in Proc. SPIE, San Jose, CA, USA, 2005, 249–260.
    [5] M. Chen, J. J. Fridrich and M. Goljan, Digital imaging sensor identification (further study)., in Proc. SPIE, San Jose, CA, USA, 2007, 65050P–65050P13.
    [6] C. T. Li, Source camera identification using enhanced sensor pattern noise, IEEE Trans. Inf. Foren. Secur., 5 (2010), 280–287.
    [7] X. Kang, Y. Li, Z. Qu, et al., Enhanced source camera identification performance with a camera reference phase sensor, IEEE Trans. Inf. Foren. Secur., 7 (2012), 393–402.
    [8] A. Lawgaly, F. Khelifi and A. Bouridane, Weighted averaging-based sensor pattern noise esti-mation for source camera identification, in Proc. IEEE Int. Conf. Image Process., Paris, France, 2014, 5357–5361.
    [9] A. Lawgaly and F. Khelifi, Sensor pattern noise estimation based on improved locally adaptive dct filtering and weighted averaging for source camera identification and verification, IEEE Trans. Inf. Foren. Secur., 12 (2017), 392–404.
    [10] Y. Hu, C. T. Li and Z. Lai, Fast source camera identification using matching signs between query and reference fingerprints, Mult. Tool. Appl., 74 (2015), 7405–7428.
    [11] S. Bayram, H. T. Sencar and N. Memon, Sensor fingerprint identification through composite fingerprints and group testing, IEEE Trans. Inf. Foren. Secur., 10 (2015), 597–612.
    [12] D. Valsesia, G. Coluccia, T. Bianchi, et al., Compressed fingerprint matching and camera identi-fication via random projections, IEEE Trans. Inf. Foren. Secur., 10 (2015), 1472–1485.
    [13] R. Li, C. T. Li and Y. Guan, Inference of a compact representation of sensor fingerprint for source camera identification, Patt. Recogn., 74 (2018), 556 – 567.
    [14] Y. Hu, C. T. Li, C. Zhou, et al., Source camera identification issues: forensic features selection and robustness, Int. J. Digit. Crime Foren., 3 (2011), 1–15.
    [15] M. Kharrazi, H. T. Sencar and N. Memon, Blind source camera identification, in Proc. IEEE Int. Conf. Image Process., vol. 1, Singapore, 2004, 709–712.
    [16] K. San Choi, E. Y. Lam and K. K. Wong, Source camera identification by jpeg compression statistics for image forensics, in Proc. IEEE Region 10 Conf., Hong Kong, China, 2006, 1–4.
    [17] B. Wang, Y. Guo, X. Kong, et al., Source camera identification forensics based on wavelet features, in Proc. IEEE Fifth Int. Conf. Intelligent Inf. Hiding and Multimedia Signal Process., Kyoto, Japan, 2009, 702–705.
    [18] S. Bayram, H. Sencar, N. Memon, et al., Source camera identification based on cfa interpolation, in Proc. IEEE Int. Conf. Image Process., vol. 3, Genova, Italy, 2005, 69–72.
    [19] J. S. Ho, O. C. Au, J. Zhou, et al., Inter-channel demosaicking traces for digital image forensics, in Proc. IEEE Int. Conf. Multimedia Expo, Suntec, Singapore, 2010, 1475–1480.
    [20] Y. Hu, C. T. Li, X. Lin, et al., An improved algorithm for camera model identification using inter-channel demosaicking traces, in 8th Int. Conf. Intelligent Inform. Hiding and Multimedia Signal Process., Piraeus, Greece, 2012, 325–330.
    [21] G. Xu and Y. Q. Shi, Camera model identification using local binary patterns, in Proc. IEEE Int. Conf. Multimedia Expo, Melbourne, VIC, Australia, 2012, 392–397.
    [22] B. Xu, X. Wang, X. Zhou, et al., Source camera identification from image texture features, Neurocomputing, 207 (2016), 131–140.
    [23] C. Chen and M. C. Stamm, Camera model identification framework using an ensemble of de-mosaicing features, in Proc. IEEE International Workshop on Information Forensics and Security (WIFS), 2015, 1–6.
    [24] A. Tuama, F. Comby and M. Chaumont, Camera model identification based machine learning approach with high order statistics features, in Proc. 24th European Signal Processing Conference (EUSIPCO), 2016, 1183–1187.
    [25] A. Roy, R. S. Chakraborty, U. Sameer, et al., Camera source identification using discrete cosine transform residue features and ensemble classifier, in Proc. IEEE Conference on Computer Vision and Pattern Recognition (CVPR) Workshops, 2017.
    [26] L. Zeng, X. Kong, M. Li, et al., Jpeg quantization table mismatched steganalysis via robust dis-criminative feature transformation., in Proc. SPIE Media Watermarking, Security, and Forensics, San Francisco, CA, USA, 2015, 94090U–94090U9.
    [27] S. J. Pan, I. W. Tsang, J. T. Kwok, et al., Domain adaptation via transfer component analysis, IEEE Trans. Neural Netw., 22 (2011), 199–210.
    [28] M. Long, J. Wang, G. Ding, et al., Transfer feature learning with joint distribution adaptation, in Proc. IEEE Int. Conf. Comput. Vision, San Francisco, CA, USA, 2013, 2200–2207.
    [29] X. Li, X. Kong, B. Wang, et al., Generalized transfer component analysis for mismatched jpeg steganalysis, in Proc. IEEE Int. Conf. Image Process., Melbourne, VIC, Australia, 2013, 4432–4436.
    [30] L. Luo, X. Wang, S. Hu, et al., Close yet distinctive domain adaptation, arXiv:1704.04235.
    [31] G. Zhang, B. Wang and Y. Li, Cross-class and inter-class alignment based camera source identi-fication for re-compression images, in Proc. IEEE Int. Conf. Image Graphics, Shanghai, China, 2017.
    [32] A. Gretton, K. M. Borgwardt, M. Rasch, et al., A kernel method for the two-sample-problem, in Proc. Advances Neural Inf. Process. Syst., Vancouver, BC, Canada, 2007, 513–520.
    [33] B. Quanz, J. Huan and M. Mishra, Knowledge transfer with low-quality data: A feature extraction issue, IEEE Trans. Knowl. Data Eng., 24 (2012), 1789–1802.
    [34] E. Zhong, W. Fan, J. Peng, et al., Cross domain distribution adaptation via kernel mapping, in Proc. 15th ACM SIGKDD Int. Conf. on Knowl. Discovery Data Mining, Paris, France, 2009, 1027–1036.
    [35] T. Gloe and R. Böhme, The dresden image database for benchmarking digital image forensics, J. Digit. Forensic Pract., 3 (2010), 150–159.
  • This article has been cited by:

    1. Benito Chen-Charpentier, Stochastic Modeling of Plant Virus Propagation with Biological Control, 2021, 9, 2227-7390, 456, 10.3390/math9050456
    2. Zhenzhen Liao, Shujing Gao, Shuixian Yan, Genjiao Zhou, Transmission dynamics and optimal control of a Huanglongbing model with time delay, 2021, 18, 1551-0018, 4162, 10.3934/mbe.2021209
    3. Nabeela Anwar, Shafaq Naz, Muhammad Shoaib, Reliable numerical treatment with Adams and BDF methods for plant virus propagation model by vector with impact of time lag and density, 2022, 8, 2297-4687, 10.3389/fams.2022.1001392
    4. Pushpendra Kumar, Dumitru Baleanu, Vedat Suat Erturk, Mustafa Inc, V. Govindaraj, A delayed plant disease model with Caputo fractional derivatives, 2022, 2022, 2731-4235, 10.1186/s13662-022-03684-x
    5. Benito Chen-Charpentier, Delays in Plant Virus Models and Their Stability, 2022, 10, 2227-7390, 603, 10.3390/math10040603
    6. Muhammad Farman, Rabia Sarwar, Ali Akgul, Modeling and analysis of sustainable approach for dynamics of infections in plant virus with fractal fractional operator, 2023, 170, 09600779, 113373, 10.1016/j.chaos.2023.113373
    7. Benito Chen-Charpentier, A Model of Hepatitis B Viral Dynamics with Delays, 2024, 4, 2673-9909, 182, 10.3390/appliedmath4010009
    8. Benito Chen-Charpentier, SIRS Epidemic Models with Delays, Partial and Temporary Immunity and Vaccination, 2024, 4, 2673-9909, 666, 10.3390/appliedmath4020036
    9. Sahabuddin Sarwardi, Hasanur Mollah, Aeshah A. Raezah, Fahad Al Basir, Direction and stability of Hopf bifurcation in an eco-epidemic model with disease in prey and predator gestation delay using Crowley-Martin functional response, 2024, 9, 2473-6988, 27930, 10.3934/math.20241356
    10. Benito Chen-Charpentier, Delays and Exposed Populations in Infection Models, 2023, 11, 2227-7390, 1919, 10.3390/math11081919
    11. Kimben M. Gonzales, Juancho A. Collera, Effects of vector preferential settling in the dynamics of a plant virus model with latent periods, 2025, 24058440, e42707, 10.1016/j.heliyon.2025.e42707
    12. Benito Chen-Charpentier, Mathematical Models of Epidemics with Infection Time, 2025, 5, 2673-9909, 47, 10.3390/appliedmath5020047
    13. Muhammad Ozair, Hanadi Alzubadi, Mathematical Study of Plant Disease Model using Atangana-Baleanu Fractional Operators with Beddington-DeAngelis Incidence, 2025, 1016-2526, 505, 10.52280/pujm.2024.56(9)02
    14. Sahabuddin Sarwardi, Selim Reja, Fahad Al Basir, Aeshah A. Raezah, Delay-induced bubbling in a harvested plankton-fish model: A study on the role of two fish predators, 2025, 0924-090X, 10.1007/s11071-025-11285-y
  • Reader Comments
  • © 2019 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(4654) PDF downloads(476) Cited by(3)

Figures and Tables

Figures(4)  /  Tables(5)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog