A two-strain TB model with multiplelatent stages

  • A two-strain tuberculosis (TB) transmission model incorporating antibiotic-generated TB resistant strains and long and variable waiting periods within the latently infected class is introduced. The mathematical analysis is carried out when the waiting periods are modeled via parametrically friendly gamma distributions, a reasonable alternative to the use of exponential distributed waiting periods or to integral equations involving ``arbitrary'' distributions. The model supports a globally-asymptotically stable disease-free equilibrium when the reproduction number is less than one and an endemic equilibriums, shown to be locally asymptotically stable, or l.a.s., whenever the basic reproduction number is greater than one. Conditions for the existence and maintenance of TB resistant strains are discussed. The possibility of exogenous re-infection is added and shown to be capable of supporting multiple equilibria; a situation that increases the challenges faced by public health experts. We show that exogenous re-infection may help established resilient communities of actively-TB infected individuals that cannot be eliminated using approaches based exclusively on the ability to bring the control reproductive number just below 1.

    Citation: Azizeh Jabbari, Carlos Castillo-Chavez, Fereshteh Nazari, Baojun Song, Hossein Kheiri. A two-strain TB model with multiplelatent stages[J]. Mathematical Biosciences and Engineering, 2016, 13(4): 741-785. doi: 10.3934/mbe.2016017

    Related Papers:

    [1] Gustavo Henrique Romeu da Silva, Andreas Nascimento, Christoph Daniel Baum, Nazem Nascimento, Mauro Hugo Mathias, Mohd Amro . Renewable energy perspectives: Brazilian case study on green hydrogen production. AIMS Energy, 2025, 13(2): 449-470. doi: 10.3934/energy.2025017
    [2] Malhar Padhee, Rajesh Karki . Bulk system reliability impacts of forced wind energy curtailment. AIMS Energy, 2018, 6(3): 505-520. doi: 10.3934/energy.2018.3.505
    [3] Saiyad S. Kutty, M. G. M. Khan, M. Rafiuddin Ahmed . Estimation of different wind characteristics parameters and accurate wind resource assessment for Kadavu, Fiji. AIMS Energy, 2019, 7(6): 760-791. doi: 10.3934/energy.2019.6.760
    [4] Takvor Soukissian, Anastasios Papadopoulos, Panagiotis Skrimizeas, Flora Karathanasi, Panagiotis Axaopoulos, Evripides Avgoustoglou, Hara Kyriakidou, Christos Tsalis, Antigoni Voudouri, Flora Gofa, Petros Katsafados . Assessment of offshore wind power potential in the Aegean and Ionian Seas based on high-resolution hindcast model results. AIMS Energy, 2017, 5(2): 268-289. doi: 10.3934/energy.2017.2.268
    [5] Wen-Tien Tsai . Overview of wind power development over the two past decades (2000-2019) and its role in the Taiwan's energy transition and sustainable development goals. AIMS Energy, 2021, 9(2): 342-354. doi: 10.3934/energy.2021018
    [6] Peter Majewski, Fatemeh Salehi, Ke Xing . Green hydrogen. AIMS Energy, 2023, 11(5): 878-895. doi: 10.3934/energy.2023042
    [7] Christopher R. Jones, Eckart Lange, Jian Kang, Aki Tsuchiya, Robert Howell, Aidan While, Richard J. Crisp, John Steel, Keelan Meade, Fei Qu, Danial Sturge, Agnes Bray . WindNet: Improving the impact assessment of wind power projects. AIMS Energy, 2014, 2(4): 461-484. doi: 10.3934/energy.2014.4.461
    [8] María del P. Pablo-Romero, Rafael Pozo-Barajas . Global changes in total and wind electricity (1990–2014). AIMS Energy, 2017, 5(2): 290-312. doi: 10.3934/energy.2017.2.290
    [9] Yanting Liu, Zhe Xu, Yongjia Yu, Xingzhi Chang . A novel binary genetic differential evolution optimization algorithm for wind layout problems. AIMS Energy, 2024, 12(1): 321-349. doi: 10.3934/energy.2024016
    [10] Nadwan Majeed Ali, Handri Ammari . Design of a hybrid wind-solar street lighting system to power LED lights on highway poles. AIMS Energy, 2022, 10(2): 177-190. doi: 10.3934/energy.2022010
  • A two-strain tuberculosis (TB) transmission model incorporating antibiotic-generated TB resistant strains and long and variable waiting periods within the latently infected class is introduced. The mathematical analysis is carried out when the waiting periods are modeled via parametrically friendly gamma distributions, a reasonable alternative to the use of exponential distributed waiting periods or to integral equations involving ``arbitrary'' distributions. The model supports a globally-asymptotically stable disease-free equilibrium when the reproduction number is less than one and an endemic equilibriums, shown to be locally asymptotically stable, or l.a.s., whenever the basic reproduction number is greater than one. Conditions for the existence and maintenance of TB resistant strains are discussed. The possibility of exogenous re-infection is added and shown to be capable of supporting multiple equilibria; a situation that increases the challenges faced by public health experts. We show that exogenous re-infection may help established resilient communities of actively-TB infected individuals that cannot be eliminated using approaches based exclusively on the ability to bring the control reproductive number just below 1.


    With the rapid development of network information technology, the communication of multimedia information has reached an unprecedented depth and breadth. The digital multimedia data provides great convenience for the wide dissemination of information. Various multimedia file data can be easily obtained through the network, and various forms of tampering can be performed on the multimedia data content. Therefore, the problem of the safe dissemination of multimedia information has become an important and urgent research topic. In recent years, how to efficiently solve the content authentication problem of multimedia information such as images [1,2,3,4,6,5,7,8,9,10], video [11,12,13,14,15,16], audio [17,18,19,20] and text [21,22,23,24,25] has become an increasing concern among multimedia security.

    Figure 1.  The tampering identification process for paper document content.

    However, in daily work, many important text documents are still transmitted on paper carriers, such as government confidential documents, financial contracts and legal documents, etc. It is worth noting that paper documents can be easily falsified and forged, for example, the common methods include page-extracting, page-changing, or tampering with individual paragraphs, words, and data in the text file. Once some important documents have been tampered with, the consequences will be very serious. If some forged documents spread within a certain range, it will cause reputational damage and economic losses, while severe ones will affect production safety and even national security. Therefore, the integrity certification and authenticity identification of important paper documents is extremely critical.

    In order to achieve content integrity authentication of paper documents, it is necessary to embed auxiliary authentication information in the printed paper document, digitize the paper document to obtain an image file, and extract corresponding information from the image to verify whether the document content has been changed. To this end, some researchers propose the methods to hide watermark information by printing visible shading [26,27] or 2D barcode [28] at specific locations on each page of the paper document, which can resist print-and-scan attack. However, it may affect the normal reading of the text document with poor visual effect, which is not allowed in some cases especially for government official documents. The text watermarking technology [29,30,31,32,33,34,35,36] can convert the key information of the document into invisible watermark information which can be embedded into the printed paper documents. Only after digitizing the paper documents by scanner, the hidden watermark information can be extracted through special software tools. So it can identify the authenticity of the paper documents through the extracted watermark information, thereby realizing the anti-forgery traceability, copyright protection, and content certification of the text documents and other purposes. The above text watermarking algorithms mainly focus on the robustness of resisting the print-and-copy attack, and it only needs to be able to completely extract the recovered watermark information, and does not need to ensure that each watermark information bit is correct. Therefore, this kind of method can detect the tampering behaviors of page-changing or replacement of the entire page of paper documents, but cannot detect the tampering behaviors of individual paragraphs, words and data, and accurately locate the tampering position in the whole text document.

    This paper proposes a robust authentication method for the paper document content based on text watermarking algorithm resisting print-and-scan attack. It embeds the authentication watermark signal sequence by replacing the vector fonts library to achieve the tampering identification for paper documents. The detailed content authentication process is shown in Figure 1.

    This section mainly discusses the output process of paper document containing the content authentication information. It generates a watermark information sequence as a paper document content authentication information according to certain rules. The information is embedded into the printed document by using text watermarking algorithm based on the replacement of vector font library. The text watermarking algorithm is capable of resisting print-and-scan attack, and it can determine whether the paper document has been tampered with and locate the corresponding tampering position based on the extracted content authentication information.

    For the sake of simplicity, security and reliability, this paper uses a Logistic chaotic map model [37] to generate watermark information bit sequence. Chaos is a deterministic and stochastic process that occurs in nonlinear dynamic systems. This process is aperiodic, non-converged but bounded, and has a sensitive dependence on the initial value [38,39]. Using this property, the chaotic maps can provide a large number of non-correlated, stochastic, and deterministic signals that are easy to generate and regenerate.

    Logistic mapping is a very simple but widely studied chaotic dynamic system, which can be described by the following nonlinear difference equation:

    xn+1=λxn(1xn),λ[0,4],xn[0,1] (2.1)

    The study shows that the chaotic region of Logistic chaotic map is λ[λ,4], where λ=3.569945672. It has been theoretically proved that the cross-correlation of two chaotic sequences x0,x1,...,xn and y0,y1,...,yn generated by two different initial values x0 and y0 is zero, which reflects the extreme sensitivity of Logistic chaotic maps to initial values. When λ=4, the probability distribution density function of the Logistic chaotic sequence is:

    ρ(x)={1πx(1x),x(0,1)0,others (2.2)

    the mean of the sequence is: ¯x=E{x}=0.5. Therefore, the real-value chaotic sequence x0,x1,,xn can be converted into 0/1 binary sequence b0,b1,,bn by the threshold function n0(x),

    n0(x)={1,x0.50,x<0.5 (2.3)

    In this paper, we perform content integrity authentication by judging whether the content of the text document output to the paper carrier has been changed or not. That is, when the characters in the text document are added, deleted or modified, it is judged that the paper document has been tampered with, which belongs to the robust certification. Since our method uses the chaotic sequence as the authentication watermark signal, in order to fully utilize the extreme sensitivity of the chaotic system to the initial value, the construction of the authentication watermark signal sequence must be related to the original character content. If the text strings are simply grouped and the initial value calculation of the chaotic system is performed, the calculation result of the initial value will change once the character is added or deleted, and the subsequent authentication information extraction is completely wrong. Therefore, the initial value of the chaotic system must be calculated in relation to each character, and there is independence on different characters. For each character, the specific authentication watermark signal generation process is as follows:

    (1) Read the hexadecimal Unicode of character C occupying a total of 2 bytes;

    (2) Convert the Unicode encoding of character C into a binary bit string and divide it into four subetaoups evenly, each group contains 4 bits, and four subetaoups are converted into four decimal numbers σ1, σ2, σ3 and σ4, respectively;

    (3) For the character C, calculate the initial value x0 of the Logistic chaotic map as follows:

    x0=12(144i=1σi16+k) (2.4)

    where k is the watermark key, k(0,1).

    (4) Take x0 and λ=4 as the initial value and the parameter of the Logistic chaotic map, and substitute the Logistic map iteration equation (2.1), and generate a real-value chaotic sequence x0,x1,,x15 of length 16 which is converted into a binary sequence using the threshold function n0(x), and take the 4th bit of the binary sequence as the watermark bit corresponding to the character C;

    (5) Each character is calculated according to the above process to obtain a corresponding watermark information bit string sequence φ1={b0,b1,...,bm}, where m is the number of all characters;

    (6) Calculate the CRC16 (Cyclic Redundancy Check) bit string of the watermark information bit string sequence φ1;

    (7) Finally, the CRC16 check code is appended to the watermark information bit sequence φ1 to generate a final authentication watermark signal sequence φ2.

    We use the text watermarking algorithm based on vector font replacement to embed the authentication watermark signal sequence φ2 calculated above into the printed paper document. The specific process is as follows: Firstly, a special watermark vector font library is designed, that is, by appropriately changing the topological structure of characters or strings, multiple glyphs of semantically identical characters (strings) are designed, and each glyph is given a different character code representing different watermark information bits, and save all character codes to a new font library. For example, as shown in Figure 2, the position of character stroke marked with gray shifts horizontally; then, when the text document is printed out, the text document content is intercepted by the terminal monitoring service program in the computer; finally, according to the watermark information bit string to be embedded, the watermark information is embedded by dynamically replacing the different glyph structures of the characters, and the modified text document content data is sent to the physical printer to be output in the end.

    Figure 2.  Schematic diagram of watermark character structure design. (a) The original FangSong font Chinese character "在". (b) The character structure is obtained by shifting the gray stroke to right direction and represents the watermark information bit 0. (c) The character structure is obtained by shifting the gray stroke to left direction and represents the watermark information bit 1.

    It should be noted that this method can be applied not only to complex Chinese characters, but also to English letters and Arabic numerals, just as shown in Figure 3 and Figure 4, the position of character strokes marked with gray shifts vertically. Considering the information capacity, each character can map multiple different glyph structures to represent more watermark information. For example, when mapping to 4 different glyphs, each character can represent a 2-bit watermark information. Therefore, the capacity of the authentication watermark signal sequence φ2 calculated by all the characters is only close to half of the watermark capacity. Other extended parameters information including the watermark key k, may also be encoded and embedded into the printed paper document. If the number of characters in the text document is large, the authentication watermark signal sequence φ2 will be repeatedly embedded to resist the watermark information missing attack caused by the multi-character deletion. In addition, all the characters in the printed document after embedding the watermark information have been replaced with the corresponding characters in the watermark font library.

    Figure 3.  Glyph structures morphing of Arabic numeral 5: the left one is a standard font, the middle one represents the watermark information bit 0 with the gray stroke shifting downward, and the right one represents the watermark information bit 1 with the gray stroke shifting upward.
    Figure 4.  Glyph structures morphing of English character F: the left one is a standard font, the middle one represents the watermark information bit 0 with the gray stroke shifting upward, and the right one represents the watermark information bit 1 with the gray stroke shifting downward.

    The digital document image I obtained by scanning the paper document with the watermark information embedded is processed, and the difference between the watermark character glyph structures is detected by the normalized-character-image-template-match method, thereby extracting the previously embedded authentication watermark signal sequence φ2 and recovering the original watermark information bit sequence φ1; and it recalculates the watermark information bit sequence φ"1 according to the characters of the text document image I; finally by comparing the difference between the signal sequences φ1 and φ"1, it determines whether the content of the paper document has been tampered with.

    Let the template character image be A of size MAMB, the character image to be matched is B, and the size is NANB, where MANA, MBNB. The matching process of the character image is to calculate the similarity of the two images, that is, calculate the autocorrelation coefficients of the character image A and the character image B at different positions, and the maximum of all the coefficients is the similarity of the two images.

    As shown in Figure 5, when the template image A slides to (u, v) on the image B to be matched, the normalized correlation coefficient r(u,v) between the two images is calculated as follows [40]:

    Figure 5.  Character image matching diagram.
    r(u,v)=i,j[f(u+i,v+j)¯fu,v][t(i,j)¯t]](i,j[f(u+i,v+j)¯fu,v]2)(i,j[t(i,j)ˉt]2) (3.1)

    Where f(i,j) is mean value of the character image B at the (i,j) position, and t(i,j) is the mean value of the template character image A at the (i,j) position, ˉt is pixel mean value of the template image A, ˉf is the pixel mean value of the corresponding image block to be matched under the position where the current template image A is located.

    Due to high computational complexity of above formula (3.1), the equivalent calculation method is as follows :

    Firstly, let t(i,j)=t(i,j)ˉt, then the numerator of equation (3.1) can be expressed as follows:

    i,jf(u+i,v+j)t(i,j)ˉfi,jt(i,j) (3.2)

    Obviously, the latter term of equation (3.2) is always equal to zero, and the previous term of equation (3.2) can be obtained by:

    i,jf(u+i,v+j)t(i,j)ˉti,jf(u+i,v+j) (3.3)

    The first term of the equation (3.3) can be regarded as a convolution operation of two signals in the spatial domain which is equivalent to the frequency multiplication operation based on the frequency domain. Therefore, the first term of equation (3.3) is equivalent to the following form:

    F1[F(f)F(t)] (3.4)

    where, F is the Fourier transform of the original signal, F is the conjugate complex operation of the transformed result, and F1 is the inverse Fourier transform for the frequency domain signal.

    Next, for the denominator portion of the equation (3.1), the latter term is the pixel value variance of the template character image A. The first item is simplified to get the following results:

    i,j[f(u+i,v+j)]2[i,jf(u+i,v+j)]2MANA (3.5)

    In order to calculate the equation (3.5), the sum and square sum of all pixel values in the sliding window of the character image B at (u,v) should be obtained firstly. To do this, the following functions are defined:

    s(u,v)=f(u,v)+s(u1,v)+s(u,v1)s(u1,v1) (3.6)
    s2(u,v)=f2(u,v)+s2(u1,v)+s2(u,v1)s2(u1,v1) (3.7)

    Then, through the dynamic programming, the accumulation of all elements of the sub-matrix composed of the point (0,0) to the point (u,v) as the diagonal element in the character image B is calculated by looking up the table, and the squared sum is obtained by summing the squares of all the elements in the submatrix.

    After that, the cumulative sum and cumulative square sum of all pixels in the windows which locates at any position (u,v) of the size (MA,NA) can be calculated as follows:

    i,jf(u+i,v+j)=s(u+MA1,v+NA1)s(u1,v+NA1)s(u+MA1,v1)+s(u1,v1) (3.8)
    i,jf2(u+i,v+j)=s2(u+MA1,v+NA1)s2(u1,v+NA1)s2(u+MA1,v1)+s2(u1,v1) (3.9)

    As shown in Figure 5, when the template character image A slides to the point (u,v), the cumulative sum and cumulative square sum of pixels in the sliding window, is equal to the corresponding values in the sub-matrix portion marked by yellow in the character image B. By substituting equations (3.8) and (3.6) into equations (3.3) and (3.5), it is possible to find the normalized correlation coefficient when the template character image A slides along the character image B to the point (u,v). The matching result of image A and B is the maximum value among all the correlation coefficients of the two graphs. The position coordinate (um,vm) at this time is the offset point coordinate of the image A with respect to the character image B, that is, when the image A moves to (um,vm) and the matching degree of the image B is the highest.

    For each character in the text document image I, it matches the scanned character image with the standard glyph image of the character and each variant glyph image one by one by using the normalized image template matching method described in Section 3.1, and makes the following judgments:

    a) If the matching degree of scanned character image and standard glyph image is the highest, it indicates that the character is not the character after embedding the watermark in the printout process, and does not represent any watermark information. Therefore, the character can be regarded as a new character that is falsified after being added and inserted into the contents of the paper document, and the position of the falsified character is recorded;

    b) Otherwise, according to the matching degree of scanned character image and the variant glyph image, the binary watermark information string represented by the character is calculated.

    After all the characters are subjected to the image matching operation, all the watermark information bit strings are recovered and the final authenticated watermark signal sequence φ2 is obtained.

    The process of the robust authentication of the paper document content is described as follows:

    a) Decompose the obtained authentication watermark signal sequence φ2 into two parts which are the embedded watermark information bit string sequence φ1 and CRC16 check code bit string information respectively;

    b) For each character in the text document image I, recalculate the watermark information bit string sequence φ"1 according to the method described in Section 2.1;

    c) Perform the same CRC check operation for the extracted watermark information bit sequence φ1, if the check passes, the watermark information bit sequence φ1 is correct, and the watermark signal sequences φ1 and φ"1 are compared one bit by one bit: If the two information bit strings are the same, the content of the paper document does not change, otherwise it is falsified, and the accurate tampering position is given according to the difference of the bit string;

    d) If the CRC check fails, the similarity comparison between the signal sequence φ1 and φ"1 is executed, and the longest common substring of the two signal sequences is calculated according to the string minimum edit distance algorithm [41]. The positions of the rest different string bits are regarded as the suspicious tampering positions.

    At first, we verify the robustness of the text watermarking algorithm based on the vector font library. After modifying the glyph topology of the original Chinese character "在" as shown in Figure 2a, it is mapped into two different glyph structures, as shown in Figure 2b and Figure 2c, respectively, and they represent the watermark information bit 0 and 1, respectively. When the watermark information is embedded, according to the watermark bit string information, Figure 2a is replaced with the two glyph structures of Figure 2b or Figure 2c correspondingly. When the watermark information is extracted, the paper document embedded with the watermark information is scanned into a digitized text image, and the sub-image block of the Chinese character "在" is segmented as shown in Figure 6.

    Figure 6.  The sub-image block of Chinese character "在" after printing and scanning.

    The normalized-character-image-template-match (NCITM) method described in Section 3.1 is used to match the glyph structure images of Figure 6 with the two images Figure 2b and Figure 2c, respectively. It should be noted that before image matching, the size of the scanned character image needs to be normalized. Firstly, the paper document is scanned with the accuracy of more than 300 PDI to ensure that the scanned character image is clear; then, the size of each character is scaled to the size of the standard character image read from the font library; finally, the NCITM process is carried out. The matching results are shown in Figure 7, in which Figure 7a and Figure 7b are the schematic diagrams showing the optimal matching effect of Figure 6 and the two structures shown in Figure 2b and Figure 2c, respectively. The correlation coefficients of the glyph structure calculated according to formula (3.1) are 0.94249 and 0.79489, respectively. It can be decided that the matching degree of Figure 6 and Figure 2b is higher, thereby deriving the watermark information bit string represented by the character as 0. In order to improve the information capacity, each character can be mapped to more deformation effects, for example, when one character corresponds to 4 different deformations, and one character can represent 2-bit watermark information. However, when the number of corresponding deformed fonts of one character increases, the workload of designing the watermark font library is relatively larger.

    Figure 7.  The matching result of Figure 6 with the standard watermark glyph structure. (a) The optimal matching effect of Figure 6 and Figure 2(b). (b) The optimal matching effect of Figure 6 and Figure 2(c).

    In this experiment, we designed the robust performance test of the text watermarking algorithm in three scenarios: printing and scanning, capturing screen and shooting screen. Figure 8 is a schematic diagram of the effect of the original document without embedding watermark information with the Chinese FangSong font type of size 13 pounds. Figure 9 shows the effect of the document after embedding the watermark information, and each character has different font deformation effects. For example, the Chinese character "不" has 4 different deformations and represents 2 bits watermark information, while the Chinese character "人" has two different deformations and represents one bit information. In order to facilitate the description of the font deformation effect, the Chinese characters "不" and "人" are enlarged and bolded intentionally. Figure 9 contains 168 Chinese characters in which 326 bits watermark information is embedded. Figure 10 is the image data obtained by scanning the paper document shown in Figure 9, and this test is marked as PS. Figure 11 is the document image effect after the screen shooting, while the electronic document format with the watermark information embedded is displaying on the computer screen, which is marked as CC. Figure 12 is a schematic diagram of photographing computer screen of Figure 10 outside the screen through the mobile phone, and this test is marked as PC. It can be seen from the Figure 12 that there is serious moiré interference phenomena in the photograph. In addition, for the test of shooting screen of the electronic document just like Figure 11, we use MS Office Word software to open the doc/docx format file embedded with watermark information under the different page displaying ratios of 100%, 110%, 120%, 130%, 140% and 150% respectively, then a screen capture is taken and the screen capture image is obtained from which the watermark information is extracted. Under the attack operations shown in Figure 10-12 as mentioned above, the success rate of watermark extraction of [42], [43] and our proposed method are shown in Table 1. It can be seen that our method achieves very good extraction success rate except for some special cases where the display ratios are 100% and 110%, because the deformations of the character strokes in the screenshot image are severe. When the display ratio of the electronic document page is larger, the clearer the stroke structure of the character is displayed and the higher the accuracy of the character image is, and correspondingly the higher the watermark extraction rate is. So we can conclude that the text watermarking algorithm has strong robust performance for attack operations such as print-and scan, capturing screen and shooting screen, etc. By contrast, our approach has outperformed [42] and [43] in all cases.

    Figure 8.  The original document image.
    Figure 9.  The effect of the original watermarked document.
    Figure 10.  The effect of the printed and scanned watermarked paper document.
    Figure 11.  The effect of the screen capture image while the electronic watermarked document is displaying.
    Figure 12.  The effect of photographing computer screen through the mobile phone while the electronic watermarked document is displaying.
    Table 1.  The watermark correct extraction rate.
    PS CC-100% CC-110% CC-120% CC-130% CC-140% CC-150% PC
    Method[42] 100% 51% 79% 86% 88% 93% 95% 94%
    Method[43] 100% 75% 85% 88% 92% 96% 98% 100%
    Our method 100% 89% 97% 100% 100% 100% 100% 100%

     | Show Table
    DownLoad: CSV

    As mentioned above, in the text-based watermarking algorithm based on vector fonts, we change the glyph structure of the watermark characters, which will remain unchanged before and after the print-and-scan. Therefore, the algorithm can effectively resist the print-and-scan attack, the watermark information is propagated along with the paper document, and if necessary, the paper document can be digitized into an image file, and the content integrity authentication of the paper document can be performed by extracting the hidden watermark information.

    In this experiment, the authentication watermark signal sequence is calculated according to the document content as shown in Figure 13 using the method described in Section 2.2, and the watermark information is embedded in the process of document printing and output. Figure 14 is a schematic diagram showing the effect of manually tampering with the contents of a paper document. The watermark information extraction is performed according to the NCITM method described in Section 3.1. The characters "红", "女", "0", and "监" identified in the rectangle are new characters added by deleting the original ones in the same positions, which does not disturb the character order in the original sequence and is seen as the Character-Replacement mode. These characters have the highest matching degrees with the characters in the standard font library and do not contain any watermark information, and they do not belong to the watermark fonts. Since each character in Figure 13 has been modified by font substitution, the above four characters are identified as content tampering and the corresponding tampering positions are recorded. Similarly, the Arabic numerals 1 marked with hexagons is also confirmed as being tampered with by the Character-Adding mode, and the corresponding tampering position is recorded. Finally, using the document content robustness authentication process described in Section 3.3, the similarity between the embedded watermark information bit sequence φ1 and the recalculated watermark information bit sequence φ"1 is compared. The part between the Chinese character "[" and "]" will be marked as content tampering by Character-Deleting mode, and the corresponding tampering position will be recorded.

    Figure 13.  The original printed paper document.
    Figure 14.  The manually falsified paper documen of Figure 10.

    This paper proposes a robust content authentication method for paper text documents, which solves the problem of paper document content integrity verification, tamper identification and tamper position locating, etc. The main contributions include: 1) A Logistic chaotic map model is used to generate a watermark information bit sequence, which is related to the content of the text document. Based on the sensitivity of the Logistic chaotic map to the initial value, once the corresponding character changes, the watermark information bit string will be wrong, thereby performing the content tampering identification and locating the specific tampering position. 2) The generated authentication watermark signal sequence is embedded into the printed paper document by using the text watermarking algorithm based on the vector font library. The watermark information does not depend on the additional carrier, and the text document embedded with the watermark has a good visual effect. The watermark information is embedded during the process of printout, which avoids the risk of malicious tampering of the watermark information, so this method has high security performance. The watermarking algorithm is robust against print-and-scan attack and has a large information capacity. 3) The minimum string edit distance algorithm is used to compare the difference between authentication watermark signal sequence extracted from the scanned image and the one calculated in real-time, through which it discriminates whether the paper text document content changes and accurately locates the tampering position. In addition, there are still some issues to be improved for our method, such as how to establish the association between the text document content and the logistic chaotic map based on the logistic chaotic map model more reasonably, and to locate the tampering position more accurately.

    This work was supported by National R & D project of China under contract No. 2018YFB0803402 and National Natural Science Foundation of China (Nos.U1636206, 61572052).

    The authors declare no competing interests.

    [1] J Theor Biol, 215 (2002), 227-237.
    [2] in Mathematical Approaches for Emerging and Reemerging Infectious Diseases: An Introduction, Springer-Verlag. Edited by Sally Blower, Carlos Castillo-Chavez, Denise Kirschner, Pauline van den Driessche and Abdul-Aziz Yakubu, 125 (2002), 351-360.
    [3] J Theor Biol, 206 (2000), 327-341.
    [4] Math Biosci Eng, 6 (2009), 209-237.
    [5] Am Rev Respir Dis, 114 (1976), 353-358.
    [6] ASM Press, Washington, D.C., 1994.
    [7] Nature Medicine, 1 (1995), 815-821.
    [8] SIAM, 2013.
    [9] Biomath, 2 (2013), 1312319, 2pp.
    [10] J Math Biol, 35 (1997), 629-656.
    [11] Advances in Mathematical Population Dynamics - Molecules, Cells, and Man O. Arino, D. Axelrod, M. Kimmel, (eds), World Scientific Press, (1998), 629-656.
    [12] Math Biosci Eng, 1 (2004), 361-404.
    [13] Lancet Infect Dis, 5 (2005), 629-636.
    [14] Math Biosci, 180 (2002), 29-48.
    [15] Theor Popul Biol, 57 ( 2000), 235-247.
    [16] Journal of Dynamics and Differential Equations, 13 (2001), 425-452.
    [17] Bulletin of Mathematical Biology, 69 (2007), 1511-1536.
    [18] 2013. Available from: http://www.theguardian.com/society/2013/jan/23/antibiotic-resistant-diseases-apocalyptic-threat,
    [19] 2015. Available from: http://apps.who.int/medicinedocs/documents/s21682en/s21682en.pdf.
    [20] Math Biosc, 28 (1976), 335-356.
    [21] SIAM Rev, 42 (2000), 599-653.
    [22] Mathematical Biosciences, 167 (2000), 65-86.
    [23] Math Biosc, 246 (2013), 84-93.
    [24] Marcel Dekker Inc, New York and Basel, 41, 1989.
    [25] Lancet Infect Dis, 3 (2003), 282-287.
    [26] N Engl J Med, 315 (1986), 1570-1575.
    [27] Trends in Pharmacological Sciences, 35 (2014), 664-674.
    [28] Theoretical Population Biology, 54 (1998), 117-132.
    [29] Am Rev Respir Dis, 108 (1973), 639-642.
    [30] Am Rev Respir Dis, 112 (1975), 497-503.
    [31] 2014. Available from: http://www.who.int/tb/publications/global_report/gtbr14_supplement_web_v3.pdf.
    [32] Math Biosci Eng, 6 (2009), 815-837.
    [33] Emerging Infectious Disease, 12 (2006), 1176-1178.
    [34] N Engl J Med, 328 (1993), 1137-1144.
    [35] American Mathematical Society, 1995.
    [36] Thesis (Ph.D.)-Cornell University, 2002.
    [37] Mathematical Biosciences, 180 (2002), 187-205.
    [38] in Mathematical Approaches for Emerging and Reemerging Infectious Diseases: Models Methods and Theory (eds. C. Castillo-Chavez, S. Blower, P. van den Driessche, D. Kirschner, A. A. Yakubu), Springer, New York, IMA, 126 (2002), 275-294.
    [39] Am Rev Respir Dis, 91 (1965), 811-22.
    [40] Theoretical Population Biology, 54 (1998), 117-132.
    [41] Ph.D. Thesis, Purdue University, 2005.
    [42] International Symposium on Mathematical and Computational Biology, (2010), 304-330.
    [43] Available from: http://reliefweb.int/sites/reliefweb.int/files/resources/F530290AD0279399C12577D8003E9D65-Full_Report.pdf.
  • This article has been cited by:

    1. Alexander V. Kozachok, Sergey Kopylov, 2020, Estimation of Watermark Embedding Capacity with Line Space Shifting, 978-1-7281-9088-4, 29, 10.1109/IVMEM51402.2020.00011
    2. Ali A. R. Alkhafaji, Nilam Nur Amir Sjarif, M. A. Shahidan, Nurulhuda Firdaus Mohd Azmi, Haslina Md Sarkan, Suriayati Chuprat, Tamper Detection and Localization for Quranic Text Watermarking Scheme Based on Hybrid Technique, 2021, 68, 1546-2226, 77, 10.32604/cmc.2021.015770
    3. Xi Yang, Weiming Zhang, Han Fang, Zehua Ma, Nenghai Yu, Language universal font watermarking with multiple cross-media robustness, 2023, 203, 01651684, 108791, 10.1016/j.sigpro.2022.108791
    4. Xingjun Wang, Yuxin Jin, 2022, A high-capacity text watermarking method based on geometric micro-distortion, 978-1-6654-9062-7, 1749, 10.1109/ICPR56361.2022.9956587
    5. Jipeng Qiang, Shiyu Zhu, Yun Li, Yi Zhu, Yunhao Yuan, Xindong Wu, Natural language watermarking via paraphraser-based lexical substitution, 2023, 317, 00043702, 103859, 10.1016/j.artint.2023.103859
    6. Yinan Li, Weiming Zhang, Han Fang, Xi Yang, Zehua Ma, Nenghai Yu, 2022, Font Watermarking Network for Text Images, 978-1-6654-9620-9, 486, 10.1109/ICIP46576.2022.9897724
    7. Petra Gomez‐Krämer, 2022, 9781789450279, 59, 10.1002/9781119987390.ch3
    8. Dan Liu, Yajun Chen, Shaokang Wang, Yinping Bai, Zhaofeng Zhou, 2021, Chapter 18, 978-3-030-78620-5, 230, 10.1007/978-3-030-78621-2_18
    9. Chaoen Xiao, Ruiling Luo, Xin Jin, Jianxin Wang, Lei Zhang, Yu Wang, 2024, Chapter 25, 978-981-99-9108-2, 250, 10.1007/978-981-99-9109-9_25
    10. Miaomiao Lu, Xuanling Dai, Ping Jiang, Binary Wavelet Transform-Based Financial Text Image Authentication Algorithm, 2024, 58, 0146-4116, 326, 10.3103/S0146411624700202
    11. Heng Wang, Hongxia Wang, Xinyi Huang, Zhenhao Shi, 2024, Enhanced Screen Shooting Resilient Document Watermarking, 979-8-3503-4485-1, 4515, 10.1109/ICASSP48485.2024.10447457
    12. Xinyi Huang, Hongxia Wang, Robust text watermarking based on average skeleton mass of characters against cross-media attacks, 2024, 104, 10473203, 104300, 10.1016/j.jvcir.2024.104300
    13. Zhenhao Shi, Hongxia Wang, Heng Wang, Xinyi Huang, Robust Screen-Shooting Document Watermarking for Multiple Fonts, 2024, 31, 1070-9908, 2215, 10.1109/LSP.2024.3449231
    14. Fahd N. Al-Wesabi, Fadwa Alrowais, Heba G. Mohamed, Mesfer Al Duhayyim, Anwer Mustafa Hilal, Abdelwahed Motwakel, Heuristic Optimization Algorithm Based Watermarking on Content Authentication and Tampering Detection for English Text, 2023, 11, 2169-3536, 86104, 10.1109/ACCESS.2023.3297263
    15. Nan Sun, Chenxin Zhao, Sijing Xie, Hefei Ling, 2024, InvertedFontNet: Font Watermarking based on Perturbing Style Manifold, 979-8-3503-4485-1, 4720, 10.1109/ICASSP48485.2024.10446897
    16. Lingyun Xiang, Yangfan Liu, Zhongliang Yang, A reversible natural language watermarking for sensitive information protection, 2024, 61, 03064573, 103661, 10.1016/j.ipm.2024.103661
    17. Ziyu Jiang, Hongxia Wang, Zhenhao Shi, Run Jiao, Reversible source-aware natural language watermarking via customized lexical substitution, 2025, 62, 03064573, 103977, 10.1016/j.ipm.2024.103977
    18. Hai Chen, Yanli Chen, Zhicheng Dong, Yongrong Wang, Asad Malik, Hanzhou Wu, Robust Text Watermarking Based on Modifying the Stroke Components of Chinese Characters, 2025, 19, 1751-9659, 10.1049/ipr2.70025
  • Reader Comments
  • © 2016 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(2678) PDF downloads(603) Cited by(17)

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog