
Citation: Smita H. Panda, Jyothsna Khanna Goli, Sushrirekha Das, NakulanandaMohanty. Production, optimization and probiotic characterization of potential lactic acid bacteria producing siderophores[J]. AIMS Microbiology, 2017, 3(1): 88-107. doi: 10.3934/microbiol.2017.1.88
[1] | Wen-Xin Zhang, Yaqing Liu . Solitary wave solutions and integrability for generalized nonlocal complex modified Korteweg-de Vries (cmKdV) equations. AIMS Mathematics, 2021, 6(10): 11046-11075. doi: 10.3934/math.2021641 |
[2] | Qiulan Zhao, Muhammad Arham Amin, Xinyue Li . Classical Darboux transformation and exact soliton solutions of a two-component complex short pulse equation. AIMS Mathematics, 2023, 8(4): 8811-8828. doi: 10.3934/math.2023442 |
[3] | Ahmed M. G. Ahmed, Alle Adjiri, Solomon Manukure . Soliton solutions and a bi-Hamiltonian structure of the fifth-order nonlocal reverse-spacetime Sasa-Satsuma-type hierarchy via the Riemann-Hilbert approach. AIMS Mathematics, 2024, 9(9): 23234-23267. doi: 10.3934/math.20241130 |
[4] | Yaqiong Liu, Yunting Li, Qiuping Liao, Yunhui Yi . Classification of nonnegative solutions to fractional Schrödinger-Hatree-Maxwell type system. AIMS Mathematics, 2021, 6(12): 13665-13688. doi: 10.3934/math.2021794 |
[5] | Hui-qing Liao, Ying Fu, He-ping Ma . A space-time spectral method for the 1-D Maxwell equation. AIMS Mathematics, 2021, 6(7): 7649-7668. doi: 10.3934/math.2021444 |
[6] | Dexin Meng . Wronskian-type determinant solutions of the nonlocal derivative nonlinear Schrödinger equation. AIMS Mathematics, 2025, 10(2): 2652-2667. doi: 10.3934/math.2025124 |
[7] | Muhammad Imran Asjad, Waqas Ali Faridi, Adil Jhangeer, Maryam Aleem, Abdullahi Yusuf, Ali S. Alshomrani, Dumitru Baleanu . Nonlinear wave train in an inhomogeneous medium with the fractional theory in a plane self-focusing. AIMS Mathematics, 2022, 7(5): 8290-8313. doi: 10.3934/math.2022462 |
[8] | Qingkun Xiao, Jianzhu Sun, Tong Tang . Uniform regularity of the isentropic Navier-Stokes-Maxwell system. AIMS Mathematics, 2022, 7(4): 6694-6701. doi: 10.3934/math.2022373 |
[9] | Fouad Mohammad Salama, Nur Nadiah Abd Hamid, Umair Ali, Norhashidah Hj. Mohd Ali . Fast hybrid explicit group methods for solving 2D fractional advection-diffusion equation. AIMS Mathematics, 2022, 7(9): 15854-15880. doi: 10.3934/math.2022868 |
[10] | Canlin Gan, Weiwei Wang . Existence result for the critical Klein-Gordon-Maxwell system involving steep potential well. AIMS Mathematics, 2023, 8(11): 26665-26681. doi: 10.3934/math.20231364 |
As an important branch of data hiding, steganography aims to establish covert communication by embedding the secret messages in the inconspicuously perceptive cover materials, such as text, audio, image, etc. In recent years, the traffic in mobile social networking and media sharing software have become the main traffic in mobile network while the technologies of mobile Internet, cloud computing and so on are developing rapidly and the intelligent mobile terminals are widely popularized. The massive digital media files in the traffic have become the important carriers of steganography. Due to the constraint of mobile network bandwidth and differences of various mobile terminals' displays, these digital media files may commonly be resampled by the media server when being pushed to the intelligent mobile terminals. The resampling is a transformation which enlarges or shrinks digital media files by a scale factor that is the same in all dimensions. For example, the audio resampling and image scaling are the common one-dimensional and two-dimensional resampling. The steganographic coding scheme which can reduce embedding distortion while ensuring the correct extraction of secret messages under resampling mechanism is worthy of more attentions.
To our best knowledge, there are some works on digital watermarking which are proposed to resist the resampling of media files. The watermarking messages were embedded in some domains which are insensitive to the resampling of media files, for example, non-subsampled contourlet transform (NSCT) domain[1], discrete wavelet transform domain[2,3,4,5,6,7], lifting wavelet transform domain[8], quaternion wavelet transform domain[9], and three dimensional discrete cosine transform domain of sub block[10]. To resist the resampling, the watermarking schemes based on geometric center and image mass centroid[11], the phase spectrum of the frequency domain signal[12,13], the invariant moment constructed by utilizing Radon and Fourier-Mellin transform[14] and Zernike moment[15] are presented. However, the capacities of the messages embedded in watermarking are small when the stego media files are distorted significantly and distinguished by some forensics scheme[16] in these watermarking schemes. Consequently, it is necessary to conduct a research on the steganographic coding scheme under resampling mechanism which can minimize embedding distortion and combine with current typical steganographic schemes in the context of the current mobile internet applications.
In this paper, a steganographic coding scheme based on dither convolutional trellis is proposed. The approximate linear relation of the resampling mapping is analyzed so that the resampling mapping is estimated with finite sample pairs. The resampling stego media files with secret messages embedded are generated from the estimated resampling cover media files by syndrome-trellis codes (STCs)[17,18]. Then the dither convolutional trellis (DCT) in one dimensional resampling is constructed. The source stego media files are generated from estimated resampling mapping, resampling stego media files and source cover media files by DCT embedding. The proposed scheme is also extended to the circumstance of two dimensional resampling such as image scaling. The proposed scheme can ensure the integrity of extracted messages and minimize embedding distortion under multi-dimensional resampling mechanism.
The rest of the paper is organized as follows. In the next section, some preliminaries including steganography under resampling mechanism, interpolation mapping in resampling, and the estimation of the resampling mapping are derived. In Section 3, some works on digital watermarking of media files to resist the resampling process are introduced. In Section 4, we propose the steganographic coding scheme based on dither convolutional trellis which includes the construction of dither convolutional trellis under one dimensional resampling mechanism and extensions of the proposed scheme to two dimensional resampling. Section 5 gives experimental results on embedding efficiency of the proposed scheme in one-dimensional resampling and steganalysis result of the proposed scheme applied in image scaling. Finally, Section 6 concludes the whole paper.
The generic communication system of steganography under resampling mechanism is shown in Figure 1. The sender and receiver are two end-points of the system. The digital media files employed to embed the secret messages are defined as source cover objects. The secret messages are embedded in source cover objects to generate the stego digital media files which are defined as source stego objects. Then the transmitted stego digital media files are resampled by the media server. The practical resampling of digital media files is the process of generating the new media files with different sizes by one or two dimensional interpolation, such as audio resampling and image scaling [19,20,21]. The resampling stego digital media files are defined as the resampling stego objects. The resampling module in this system is not disregarded, which means that the sender can not communicate with receiver directly. At the receiver, the secret messages are extracted from the resampling stego objects.
In the steganography under resampling mechanism, we assume that the resampling strategy of media server is stable which means that a resampling media file is certain for the corresponding source media file. Not only generating the source stego objects to ensure the receiver extract secret messages from the corresponding resampling stego objects correctly, but the security of the system is significant which means that the warden cannot reveal the existence of the steganography by steganalysis. In this paper, we assume that the warden has full administrative authority over the whole communication system. This implies that the warden has access to both the source and resampling stego objects and has the knowledge of the steganography schemes, which is also shown in Figure 1.
The interpolations in resampling can be classified by target objects. The one-dimensional (1D) media files are resampled by 1D interpolation, and the two-dimensional (2D) interpolation is employed in resampling the 2D media files which is extended from the 1D interpolation. In the common 1D or 2D nearest-neighbor interpolation[22], each resampling element is equal to the nearest neighbor source element. The resampling objects are the impaired versions of the source objects. The steganographic coding scheme for this case has been proposed in the related work[23] which is omitted in the rest of the paper.
In 1D interpolation, the source and resampling objects with sizes Ns and Nr are denoted as s=(s1,…,sNs) and t=(t1,…,tNr). For a resampling element tu,u=1,…,Nr, the interpolation coordinate which is defined as the relative coordinate in the corresponding source objects is obtained as (2.1).
L(u)=Ns−1Nr−1u+Nr−NsNr−1 | (2.1) |
On the basis of the interpolation coordinate and window size δ of chosen interpolation strategy, the interpolation window of tu is determined which denotes the set of the neighbor source elements involved in the interpolation. The common 1D interpolation strategies are linear and cubic interpolations. The interpolation windows of a resampling element in linear and bilinear interpolation are denoted as w2,u=(si,si+1) and w4,u=(si−1,si,si+1,si+2) respectively, which are shown in Figure 2. The coordinate of the source element is got by i=⌊L(u)⌋ where the symbol ⌊⌋ represents the process of rounding down. The decimal part of interpolation coordinate is obtained by ru=L(u)−⌊L(u)⌋. The coefficients of the source elements in linear and cubic interpolation windows are denoted as c2,u=(1−ru,ru) and c4,u=(c1(ru),c2(ru),c3(ru),c4(ru)) respectively.The coefficients of the source elements in cubic interpolation are determined by the specific interpolation strategy which are related to the decimal part of interpolation coordinate ru. The mappings of the source and resampling elements in linear and cubic interpolation windows are given in (2.2) and (2.3).
tu=c2,u(w2,u)T=(1−ru)si+rusi+1 | (2.2) |
tu=c4,u(w4,u)T=4∑n=1cn(ru)si+n−2 | (2.3) |
As the common 2D interpolations, the bilinear and bicubic interpolations are the extensions of linear and cubic interpolations[22]. The interpolation windows of a resampling element in bilinear and bicubic interpolations are shown in Figure 3. The mappings of the source and resampling elements in bilinear and bicubic interpolations are given in (2.4) and (2.5). The decimal parts of interpolation coordinates in horizontal and vertical directions are represented by ru and rv. Consequently, the mappings in bilinear and bicubic interpolations have the similar linear forms as those in linear and cubic interpolations by (2.2)-(2.5).
tu,v=c2,u(si,jsi,j+1si+1,jsi+1,j+1)(c2,v)T=(1−ru)(1−rv)si,j+(1−ru)rvsi,j+1+(1−rv)rusi+1,j+rurvsi+1,j+1 | (2.4) |
tu,v=c4,u(si−1,j−1si−1,jsi−1,j+1si−1,j+2si,j−1si,jsi,j+1si,j+2si+1,j−1si+1,jsi+1,j+1si+1,j+2si+2,j−1si+2,jsi+2,j+1si+2,j+2)(c4,v)T=4∑m=14∑n=1cm(ru)cn(rv)si+m−2,j+n−2 | (2.5) |
Given that the elements in resampling digital media files are always integers, the resampling elements are rounded after the linear mapping of interpolations. The function of resampling for a resampling element t can be denoted as (2.6)
t=[[δ∑k=1cksk]] | (2.6) |
Where [[]] means rounding the values got by the linear mapping of interpolations, δ denotes the size of interpolation window and ck is corresponding coefficients of source element sk in the interpolation window.
However, it is difficult to directly get the detailed function of resampling under normal circumstances. We assume that the sender can collect some sample pairs which has the same sizes as those for steganography. Because the coefficients in interpolation window of the resampling element with the same interpolation coordinate keep unchanged, the resampling mapping in a interpolation window can be represented as (2.7) with Np pairs of source and resampling objects:
t=δ∑k=1cksk+Δ | (2.7) |
Where t=(t1,…,tNp)T denotes a set of the resampling elements, sk=(sk,1,…,sk,Np)T denotes a set of the source elements in interpolation window, and ck denotes the corresponding interpolation coefficients of source elements, Δ=(Δ1,…,ΔNp)T are the errors due to the rounding process. To estimate the coefficients of source elements ck with statistical stability, the equation (2.7) is solved by covariance. The errors Δ have little relationship with the source elements, the covariance of the errors Δ and the source elements is negligible[24,25]. With cov(Δ,sl)=0,l=1,…,δ, the equation (2.7) is converted to (2.8)
cov(t,sl)=δ∑k=1ckcov(sk,sl),l=1,…,δ | (2.8) |
The δ coefficients of source elements in (2.7) can obtained from the δ equations generated by (2.8). With estimated coefficients c∗k in interpolation windows, the function of the estimated resampling mapping can be represented by (2.9)
t∗=[[δ∑k=1c∗ksk]] | (2.9) |
There are some works on digital watermarking of media files to resist the resampling process which is a type of geometric attacks.
The watermarking messages were embedded in some transform domains which are insensitive to the resampling of media files. In [1], two rotation invariant watermark embedding schemes in the non-subsampled contourlet transform (NSCT) domain based on the scale-adapted local regions are presented which can efficiently resist both signal processing attacks and geometric attacks. A novel scaling watermarking scheme is proposed in [2] which embedded the watermark in the low-frequency wavelet coefficients to achieve improved robustness. [3] presents a secure, robust, and blind adaptive audio watermarking algorithm based on singular value decomposition (SVD) in the discrete wavelet transform domain using synchronization code. The watermark data embedded by applying a quantization-index-modulation process on the singular values in the SVD of the wavelet domain blocks is robust to additive noise, resampling, low-pass filtering, requantization, MP3 compression, cropping, echo addition, and de-noising. In [4], in order to resist both traditional signal processing attacks and geometric attacks, the watermark image is embedded in a content-based manner by modifying the wavelet transform coefficients. In [5], a blind and adaptive audio watermarking algorithm is proposed by combining the robustness of vector norm with that of the approximation Components after the discrete wavelet transform (DWT). This algorithm is able to tolerate a wide class of common attacks such as additive white Gaussian noise (AWGN), Gaussian Low-pass filter, Kaiser Low-pass filter, resampling, requantizing, cutting, MP3 compression and echo. In [6], the data is embedded in high pass filter coefficients of Discrete Wavelet Transform by LSB method. A blind digital speech watermarking technique based on Eigen-value quantization in Discrete Wavelet Transform is presented in [7] which is robust against different attacks such as filtering, additive noise, resampling, and cropping. In [8], a watermarking scheme for breath sounds, combining lifting wavelet transform (LWT), discrete cosine transform (DCT), singular value decomposition (SVD) and dither modulation (DM) quantization is proposed to insert encrypted source and identity information in breath sounds. The watermarking scheme obtains good robustness against common manipulation attacks and preserves imperceptivity. A audio watermarking scheme based on self-adaptive particles warm optimization (SAPSO) and quaternion wavelet transform (QWT) is proposed in [9]. The scheme is not only robust against de-synchronization attack, but also typical signal manipulations and StirMark attack. In order to improve the ability of resisting geometric attacks, a watermarking algorithm for medical volume data in sub-block three-dimensional discrete cosine transform domain is presented in [10].
The data can be embedded in some other domains to resist the resampling attack. An anti-geometric attack SVD digital watermark algorithm based on geometric center and image mass centroid is proposed in [11] to resist large scale geometric deformation. In [12,13], the data is embedded in the phase spectrum of the frequency domain signal of audio files by the phase coding technique which can resist signal processing operations like noise addition, cropping and resampling. In [14], a watermarking algorithm based on constructing invariant moments by the analytic Fourier–Mellin transform is proposed which was robust to usually image processing operation and geometrical attacks. In [15], a spatial image adaptive steganography algorithm based on Zernike moment is proposed to resist scaling attack and statistic detection.
However, in these watermarking schemes, the cover media files may be distorted significantly which may be distinguished by some forensics scheme[16], and the capacities of the messages embedded are small. It is necessary to conduct a steganographic coding scheme under resampling mechanism which can minimize embedding distortion in the context of the current mobile internet applications.
In this section, we propose a steganographic coding scheme based on dither convolutional trellis under the resampling mechanism. The framework of the proposed steganographic coding scheme is shown in Figure 4. Due to the errors resulting from the estimation of resampling mapping, forward error corrections (FECs) are employed in the framework to reduce the influence on the transmission of the secret messages. Convolutional code is selected as the FEC in this paper. The parity check matrix of convolutional code and the extraction matrix in STCs have the similar structures. The joint parity check matrix generated from them also has the similar structure as that of convolutional code[23].
At the sender, the secret messages m are encoded to coded secret messages mc by FEC encoding. Meanwhile the estimated resampling cover objects x∗r are generated by estimated resampling mapping and source cover objects xs. The coded secret messages mc are embedded in the estimated resampling cover objects x∗r by STC embedding. The estimated resampling stego objects with the least distortion are generated which are denoted as y∗r. Then the dither convolutional trellis (DCT) is constructed by source cover objects xs, estimated resampling stego objects y∗r and estimated resampling mapping. The corresponding source stego objects ys with the least distortion are got by dither convolutional trellis (DCT) embedding. At the receiver, the resampling stego object yr are obtained after the processing of the media server. Then the coded secret messages mc are got by extraction matrix in STC schemes, and the secret messages m are got by FEC decoding. The proposed scheme is not reversible where the receiver can not reconstructed the source cover objects xs from the resampling stego objects yr.
Owing to that the source and resampling stego objects ys and yr can be captured by warden, minimizing the distortion of the steganographic coding scheme under resampling mechanism can be converted to two steps. Firstly, with distortion profiles and the estimated resampling cover objects x∗r which are got from estimated resampling mapping and source cover objects xs, the distortions of the resampling stego objects y∗r with secret messages embedded are minimized by STC embedding. Secondly, according to the estimated resampling mapping, distortion profiles and the resampling stego objects y∗r, the distortions of the source stego objects ys are minimized by DCT embedding. The function of the DCT embedding is represented by (4.1):
ys=argminys∈{ωω|R∗(ωω)=y∗r}Ds(xs,ys) | (4.1) |
Where R∗() denotes the function of estimated resampling mapping and Ds() denotes the function of the distortions in source objects.
In the following subsection, the construction of the dither convolutional trellis under 1D resampling mechanism is described. Then the extension of the proposed scheme to 2D resampling is demonstrated.
The dither convolutional trellis under 1D resampling mechanism is constructed by source cover objects and estimated resampling stego objects. The source cover objects are denoted as xs=(xs,1,…,xs,Ns) with size Ns, and the estimated resampling stego objects are denoted as y∗r=(y∗r,1,…,y∗r,Nr) with size Nr. So the equation (4.1) can furtherly be written as (4.2).
ys=argminys∈{ωω|R∗(ωω)=y∗r}∑ρi(ωi−xs,i)|ωi−xs,i| | (4.2) |
Where the distortion profile in ±1 embedding of the source cover objects is denoted as ρ=(ρ1(ω1−xs,1),…,ρNs(ωNs−xs,Ns)). The source stego objects ys satisfying y∗r=R∗(ys) are got by dither convolutional trellis and distortion profiles.
The dither convolutional trellis is a graph consisting of 3Ns nodes which is organized in a grid of Ns columns and 3 rows. The node in ith column and jth row means that the source cover element xs,i is possibly modified by the value ni,j=j−2. The edges connecting two nodes in adjacent columns represent the combinations of the modifications to adjacent source elements. The paths which start in the leftmost column and extend to the rightmost column in the trellis represent the modification choices of all source cover elements. The path can be denoted as z=(z1,…,zNs) in which each element satisfies zi=ni,j∈{−1,0,+1}. The feasible source stego objects can be got by ys=xs+z when the modified resampling objects satisfy xrm=R∗(xs+z)=y∗r. To find the source stego objects with the least embedding distortion, we assign distortion weights to all trellis nodes and thus convert the equation (4.2) to the problem of finding the feasible path with the least distortion weights through the trellis. The distortion weights of the nodes with label ρi(ni,j) in the trellis depend on the input of distortion profiles. The path through a node ni,2=0 increases a distortion weight of 0 and the path through a node satisfying ni,2=1 or ni,2=−1 increases a distortion weight of ρi(1) or ρi(−1). The dither convolutional trellis of cubic interpolation with the sizes of the source and resampling objects Ns=16,Nr=12 is shown in Figure 5. In Figure 5, the feasible path kept with the least distortion of the source cover object is shown as z=(0,0,1,0,0,−1,0,0,0,1,0,0,1,0,0,0).
Then the dither convolutional trellis embedding is described. Because the modifications of the source cover objects xs are restricted by the resampling stego objects y∗r, the DCT embedding is conducted with the interpolation window moving. There are Nr steps in DCT embedding. It is observed that the modifications of the first and last source elements are only determined by the corresponding resampling elements in 1D interpolation. As a result, the modification in the first column of trellis is z1=y∗r,1−xs,1. The modification in the last column of trellis is zNs=y∗r,Nr−xs,Ns. In the embedding of the other resampling elements, the interpolation windows of adjacent resampling elements may be overlapped. The number of the overlapped source elements between the interpolation windows of resampling stego elements y∗r,u−1 and y∗r,u is represented by wu,u=2,…,Nr. We assume that the resampling is downsampling in which the resampling rate satisfies β=Nr/Ns∈(0,1). The interpolation windows of adjacent resampling elements will never be completely overlapped. With window size δ=2 in linear interpolation, the number of the overlapped source elements is wu∈{0,1}. The number of the overlapped source elements is satisfying wu∈{0,1,2,3} with window size δ=4 in cubic interpolation.
Take the DCT embedding of the resampling stego element y∗r,u for example, the interpolation windows and dither convolutional trellis in cubic interpolation are described in Figure 6. Here the window size of cubic interpolation is δ=4, the coefficients of interpolation window are denoted as cu=(c1,c2,c3,c4), and the source cover elements in interpolation window are denoted as wu=(xs,i−1,xs,i,xs,i+1,xs,i+2). Before the embedding of the resampling stego element y∗r,u, the number of the overlapped source elements between the interpolation windows of resampling stego elements y∗r,u−1 and y∗r,u is wu=2. In the embedding of the resampling stego element y∗r,u−1, the paths have been extended to the source element xs,i. The number of paths with all combinations of (zi−1,zi) which are kept with the least distortion weights is not more than 3wu=9. Then all the paths extend to the rightmost source cover element xs,i+2 in interpolation window of resampling stego elements y∗r,u. There are δ−wu=2 source elements are newly involved in the embedding. All modified combination of the δ−wu=2 source elements which are denoted as (zi+1,zi+2)∈{−1,0,+1}2 are represented by red lines in Figure 6. The dither modification of the interpolation window is represented as zu=(zi−1,zi,zi+1,zi+2). The modified resampling element is got by (4.3)
xrm,u=cu(wu+zu)T | (4.3) |
Each modified resampling cover element is checked whether that is equal to the resampling stego element y∗r,u. The path is kept if the modified resampling cover element satisfies xrm,u=y∗r,u. After finding all feasible paths, the number of the overlapped source elements between the interpolation windows of resampling stego elements y∗r,u and y∗r,u+1 is wu+1=3. The distortion weight of all paths with all the combinations of (zi,zi+1,zi+2) are calculated and the path with the least weight in each combination is kept. The complexity of DCT embedding in this steganographic coding scheme is related to the length of resampling stego objects and number of the overlapped source elements between the adjacent interpolation windows.
In the case of upsampling, the interpolation windows of the adjacent resampling elements may be completely overlapped. That means it may be impossible to embed the secret message bits into the adjacent resampling elements at the same time. Thus part of the resampling cover elements are chosen for embedding secret messages in which interpolation windows of all resampling elements are not completely overlapped. Then the steganographic coding scheme under upsampling mechanism is converted to that under downsampling mechanism.
In conventional steganographic coding schemes, the cover objects with one dimension are transformed from 2D digital media files which are the common carriers of steganography. The steganographic coding scheme based on dither convolutional are extended to the case of 2D resampling by some additional processes.
According to the dither convolutional trellis under 1D resampling mechanism, the computational complexity of the DCT embedding depends on the number of the overlapped source elements between the adjacent interpolation windows. In 2D resampling, the source elements between the adjacent interpolation windows are overlapped complicatedly. So too many paths in each step of the DCT embedding has to be kept if the secret messages are embedded in all resampling cover objects. To reduce the computational complexity and embed the secret messages as much as possible, we choose some rows (columns) of the resampling objects for embedding in which interpolation windows of resampling elements are not overlapped in column (row) direction. Take the rows for example, the source elements between the adjacent interpolation windows in the same row are overlapped like that in 1D resampling, but the source elements between any interpolation windows in the different rows are never overlapped. If the u1th row of the resampling objects in bilinear interpolation are chosen for embedding, the last row coordinate of the source elements in interpolation windows is ⌊L(u1)⌋+1. In the next u2th row for embedding, the first row coordinate of the source elements in interpolation windows must satisfy ⌊L(u2)⌋>⌊L(u1)⌋+1 which can be further written as ⌊L(u2)⌋−⌊L(u1)⌋>1. In bicubic interpolation, the last row coordinate of interpolation windows of the chosen u1th row is ⌊L(u1)⌋+2, the first row coordinate of interpolation windows of the chosen u2th row must satisfy ⌊L(u2)⌋−1>⌊L(u1)⌋+2 which can be further written as ⌊L(u2)⌋−⌊L(u1)⌋>3.
Assumed that the sizes of the source objects and resampling objects are Ns×Ns and Nr×Nr respectively, the resampling rates in row and column directions are β=Nr/Ns. The chosen embedding rate γ is defined as the rate of the maximum number of the chosen rows in resampling objects to the number of the rows in source objects. The chosen embedding rate with Ns=512 are shown in Figure 7 in different interpolations. In Figure 7, the chosen embedding rate raises with the resampling rate increasing when the resampling rate is small, then the chosen embedding rate is stabilizing with the resampling rate increasing. The chosen embedding rate are not more than 1/2 in bilinear interpolation, which are not more than 1/4 in bicubic interpolation.
Take a source image with the size 512×512 for example, the resampling rate is set to be β=0.7 in linear interpolations, the most resampling elements and the corresponding source elements chosen for embedding are presented in Figure 8. In Figure 8, the partly rows of resampling elements are chosen for embedding, and partly rows of source elements are involved in embedding. It should be noted that the other resampling elements may be modified although they are not selected for embedding.
The dither convolutional Trellis of each row in 2D resampling is similar to that in 1D resampling. There are some differences in DCT embedding of the resampling elements. The first and last resampling elements are related to the two or four source elements in corresponding columns. If the resampling rate is β∈(0,1), the interpolation windows of adjacent resampling elements in the same row may be partly overlapped. The number of the overlapped source elements between the interpolation windows of resampling stego elements is represented by wu,v. With window size δ=4 in bilinear interpolation, the number of the overlapped source elements is satisfying wu,v∈{0,2}. The number of the overlapped source elements is satisfying wu,v∈{0,4,8,12} with window size δ=16 in bicubic interpolation. The interpolation windows of a row of the resampling elements in bilinear interpolation is shown in Figure 9.
The experiments of the proposed steganographic coding scheme are presented in this section. The proposed coding scheme is evaluated by embedding efficiency in 1D resampling. Then the security of the proposed scheme applied in image scaling (2D resampling) is benchmarked. The convolutional code with the code rate 1/2 is employed in the proposed scheme as the FEC. The secret messages can be extracted correctly in the proposed steganographic coding scheme in 1D resampling and image scaling.
The source cover objects and the secret messages are both provide by a pseudo-random bits generator. Three distortion profiles are used for benchmarking security of the steganographic coding scheme which are similar to [17,18]. They are the constant profile ρi=1, the linear profile ρi=2i/Ns and the square profile ρi=3(i/Ns)2. We assume that the profiles of the resampling cover objects are got from those of the source cover objects and the estimated resampling mapping. The embedding efficiency is employed to evaluate the proposed scheme. The embedding efficiencies of source and resampling objects for three distortion profiles are calculated. Each embedding efficiency is obtained as an average over 2000 samples.
The embedding efficiencies of source and resampling objects with different relative payloads for three distortion profiles are performed in Figure 10. The size of source cover objects is set to be Ns=2000, the resampling rate is set to be β=0.75. The relative payloads in resampling objects are set to be α=1/2,1/3,1/4,1/5,1/6. In Figure 10, the embedding efficiency of the source and resampling objects arise with relative payload decreasing. In Figure 10a, the embedding efficiency of the source and resampling objects with different window sizes are almost the same for constant profiles. In Figure 10b and 10c, for linear and square profiles, the embedding efficiencies of the source object are better than those of the estimated resampling objects, and the embedding efficiencies of the source and resampling objects decrease slightly with window size increasing.
Then the embedding efficiencies of source and resampling objects with different resampling rates for three distortion profiles are shown in Figure 11. The size of source objects is set to be Ns=2000, the relative payload in resampling objects is set to be α=1/2. The resampling rates are set to be β=0.1,0.2,…,0.9. In Figure 11, the embedding efficiencies of the resampling objects almost keep unchanged with resampling rate increasing for three distortion profiles. In Figure 11a, the embedding efficiencies of the source objects for constant profile are almost the same with the resampling rate increasing. In Figure 11b and 11c, the embedding efficiencies of the source objects for linear and square profiles will keep unchanged with resampling rate β<0.5 and decrease with resampling rate β>0.5. With window size increasing, the embedding efficiencies of the source objects arise slightly, and the embedding efficiencies of the resampling objects decrease slightly.
It is proved that the proposed steganographic coding scheme under 1D resampling mechanism minimizes the embedding distortion while ensuring the accuracy of secret messages extraction for different distortion profiles.
The experiments in image scaling are carried out on the BOSSbass ver.1.01[26], which contains 10000 uncompressed grayscale images sized 512×512. The relative payloads in the resampling pixels in a row are set to be α=0.2,0.4. The bilinear interpolation is chosen as the interpolation strategy in image scaling. The resampling rates are set to be β=0.25,0.5,0.75. The steganographic method S-UNIWARD[27] is employed to generate the distortion profiles of source and resampling images. In the phase of steganalysis, the feature sets maxSRM[28] are employed in source and resampling images. The ensemble classifier[29] is used to measure the property of feature sets. In detail, half of the cover and stego feature sets are used as the training set while the remaining half are used as testing set. The criterion to evaluate the performance of feature sets is the minimal detection error pE under equal priors achieved on the testing set[29]:
pE=minPFA(pFA+pMD2) | (5.1) |
Where pFA is the false alarm rate, and pMD is the missed detection rate. The performance is evaluated using the average value of pE over ten random tests. As the closest methods, the detection error rates of image steganography based on Zernike moment (ISZM) are present for comparison.
The detection error rates of source and resampling images with different relative payloads and resampling rates are demonstrated in Table 1. In Table 1, all the detection errors decrease with the relative payload and resampling rate arising. The detection errors of resampling images are larger than those of source images.Then the detection error rates of the source images in the proposed scheme and ISZM with different resampling rates are presented in Table 2 when the lengths of the secret message bits embedded in each image are given in Table 3. From Table 2 and 3, the detection error rates of the proposed scheme in which more secret messages are embedded are larger than those of ISZM. It is proved that the proposed steganographic coding scheme applied in image scaling performs better security than existing methods.
β=0.25 | β=0.5 | β=0.75 | |
α=0.2, Source images | 0.4796 | 0.4526 | 0.4363 |
α=0.2, Resampling images | 0.4803 | 0.471 | 0.4558 |
α=0.4, Source images | 0.4439 | 0.3586 | 0.3383 |
α=0.4, Resampling images | 0.4452 | 0.4199 | 0.3709 |
β=0.25 | β=0.5 | β=0.75 | |
α=0.2 | 0.4796 | 0.4526 | 0.4363 |
α=0.4 | 0.4439 | 0.3586 | 0.3383 |
ISZM | 0.2988 | 0.2845 | 0.2979 |
β=0.25 | β=0.5 | β=0.75 | |
α=0.2 | 1613 | 6502 | 9753 |
α=0.4 | 3226 | 13004 | 19506 |
ISZM | 128 | 128 | 128 |
In this paper, we propose the steganographic coding scheme based on dither convolutional trellis under resampling mechanism. The dither convolutional trellis under 1D resampling mechanism is constructed by utilizing common linear mapping in resampling. The source stego objects are generated from source cover objects and resampling stego objects by dither convolutional trellis embedding. The proposed scheme is also extended to 2D resampling such as image scaling. The experimental results show that the proposed scheme can achieve less embedding distortion while ensuring the covert communication under multi-dimensional resampling mechanism.
Even if the steganographic coding scheme based on dither convolutional trellis can achieve high security, the computational complexity of the scheme is high. Part of the resampling elements are discarded in the embedding under 2D resampling mechanism. In the future work, we will reduce the computational complexity of steganographic coding scheme and try to make use of all resampling elements for secret messages embedding.
This work was supported by The National Natural Science Foundation of China(Grant No. 61602247, 61702235, U1836104, U1636117), Natural Science Foundation of Jiangsu Province(Grant No. BK20160840) and Fundamental Research Funds for the Central Universities (30918012204).
All authors declare no conflicts of interest in this paper.
[1] |
Shanahan F (2004) Probiotics in inflammatory bowel disease—therapeutic rationale and role. Adv Drug Del Rev 56: 809-818. doi: 10.1016/j.addr.2003.11.003
![]() |
[2] | Patel AK, Ahire JJ, Pawar S, et al. (2010) Evaluation of the probiotic characteristics of siderophoregenic Bacillus spp. isolated from dairy waste. App Biochem Biotechnol 160: 140-155. |
[3] | Amagase H (2008) Current marketplace for probiotics: A Japanese perspective. Clin Infec Dis 46: 73-75. |
[4] |
Franz CMAP, Melanie HHA, Wilhelm H, Antonio G (2011) Enterococci as probiotics and their implications in food safety. Int J Food Microbiol 151: 125-140. doi: 10.1016/j.ijfoodmicro.2011.08.014
![]() |
[5] | Nichols AW (2007) Probiotics and athletic performance: A systematic review. Curr Sports Med Rep 6: 269-273. |
[6] | Gomes BC, deMelo FBDG, DeMartinis ECP (2010) Dualistic aspects of Enterococcus spp. in foods. Appl Microbial Biotechnol 1119-1125. |
[7] | Hoa NT, Baccigalupi L, HuxhamA, et al. (2000) Characterization of Bacillus species used for oral bacteriotherapy and bacterioprophylaxis of gastrointestinal disorders. Appl Environ Microbiol 66: 5241-5247. |
[8] | Szabo I, Wieler LH, Tedin K, Lydia S, et al. (2009) Influence of a probiotic strain of Enterococcus faecium on Salmonella enteric Serovar Typhimurium DT104 infection in a porcine animal infection model. Appl Environ Microbiol 75: 2621-2628. |
[9] | Duc LH, Hong HA, Barbosa TM, et al. (2004) Characterization of Bacillus probiotics available for human use. Appl Environ Microbiol 70: 2161-2171. |
[10] |
Lee JY, Janes BK, Passalacqua KD, et al. (2007) Biosynthetic analysis of the petrobactin siderophore pathway from Bacillus anthracis. J Bacteriol 189: 1698-1710. doi: 10.1128/JB.01526-06
![]() |
[11] | Patel AK, Deshattiwar MK, Chaudhari BL, et al. (2009a) Production, purification and chemical characterization of the catecholate siderophore from potent probiotic strains of Bacillus spp. Biores Technol 100: 368-373. |
[12] | Ahire JJ, Patil KP, ChaudhariBL, et al. (2011a) A potential probiotic culture ST2 produces siderophore 2,3-dihydroxybenzoylserine under intestinal conditions. Food Chem 127: 387-393. |
[13] | Chincholkar SB, Chaudhari BL, Rane MR (2007) Microbial siderophores in human and plant health care, In: Microbial siderophores, Springer Berlin Heidelberg: 205-214. |
[14] | Sharpe M, Elizabeth-pyer TF (1996) Identification of lactic acid bacteria, In:Gibbs BM & Skinner FA, Identification Methods for Microbiologists, New York: Academic Press, 65-79. |
[15] | Meyer JM, Abdallah MA (1978) The fluorescent pigment of Pseudomonas fluorescens: biosynthesis, purification and physicochemical properties. J General Microbiol 107: 319-328. |
[16] |
Schwyn B, Neilands JB (1987) Universal chemical assay for the detection and determination of siderophores. Anal Biochem 160: 47-56. doi: 10.1016/0003-2697(87)90612-9
![]() |
[17] |
Payne SM (1994) Detection, isolation and characterization of siderophores. Method Enzymol 235: 329-344. doi: 10.1016/0076-6879(94)35151-1
![]() |
[18] | Arnow LE (1937) Colorimetric determination of the components of 3,4 dihydroxyphenyl alanine-tyrosine mixtures. J Biological Chem 118: 531-537. |
[19] | Csaky TZ (1948) On the estimation of bound hydroxylamine in biological materials. Acta Chemica Scandinavica 2: 450-454. |
[20] | Tamura K, Dudley J, Nei M, et al. (2007) MEGA4: Molecular evolutionary genetics analysis (MEGA) software version 4.0. Mol Biol Evol 24: 1596-1599. |
[21] | Saitou N, Nei M (1987) The neighbor-joining method: A new method for reconstructing phylogenetic trees. Mol Biol Evol 4: 406-425. |
[22] | Tajima F, Nei M (1984) Estimation of evolutionary distance between nucleotide sequences. Mol Biol Evol 1: 269-285. |
[23] |
Del Re BS, Miglioli B, Palenzona MD (2000) Adhesion, autoaggregation and hydrophobicity of 13 strains of Bifidobacterium longum. Lett Appl Microbiol 31: 438-444. doi: 10.1046/j.1365-2672.2000.00845.x
![]() |
[24] |
Rosenberg M, Gutnick D, Rosenberg E (1980) Adherence of bacteria to hydrocarbons: A simple method for measuring cell-surface hydrophobicity. FEMS Microbiol Lett 9: 29-33. doi: 10.1111/j.1574-6968.1980.tb05599.x
![]() |
[25] | Holt JG, Krieg RN, Sneath PHA, et al. (1994) Bergey's manual of determinative bacteriology, 9 Eds., Baltimore: Williams and Wilkins. |
[26] |
Winkelmann G (2007) Ecology of siderophores with special reference to the fungi. Biometals 20: 379-392. doi: 10.1007/s10534-006-9076-1
![]() |
[27] | Bendale MS, Chaudhari BL, Chincholkar SB (2010) Influence of environmental factors on siderophore production by Streptomyces fulvissimus ATCC 27431. Pharmainfo Net 16: 36. |
[28] | Lisiecki P, Wysocki P, Mikucki J (1999) Occurrence of siderophores in Enterococci. ZentblBakteriol 289: 807-815. |
[29] | Patel AK, Ahire JJ, Pawar S, Chaudhari BL, et al. (2009b) Comparative accounts of probiotic characteristics of Bacillus spp. isolated from food wastes. Food Res Int 42: 505-510. |
[30] | Sayyed R, Badgujar MD, Sonawane HM, et al. (2005) Production of microbial iron chelators (siderophores) by fluorescent Pseudomonads. Indian J Biotechnol l4: 484-490. |
[31] | Sayyed RZ, Chincholkar SB (2010) Growth and siderophores production in Alcaligenes faecalis is regulated by metal ions. Indian J Microbiol 50: 179-182. |
[32] |
Bhakta JN, Ohnishi K, Munekage Y, et al. (2012) Characterization of lactic acid bacteria-based probiotics aspotential heavy metal sorbents. J Appl Microbiol 112: 1193-1206. doi: 10.1111/j.1365-2672.2012.05284.x
![]() |
[33] | Ahire JJ, PatilKP, Chaudhari BL, et al. (2011b) Bacillus spp. of human origin: A potential siderophoregenic probiotic bacteria. Appl Biochem Biotechnol 164:386-400. |
[34] | Gangadharan D, Sivaramakrishnan S, Pandey A, et al. (2010) Folate-producing lactic acid bacteria from cow's milk with probiotic characteristics. Int J Dairy Technol 63: 339-348. |
[35] |
Kumar P, Ferzin S, Chintan S, et al. (2009) Isolation and characterization of potential probiotic Escherichia coli strains from rat faecal samples. American J Infec Dis 5: 119-124. doi: 10.3844/ajidsp.2009.119.124
![]() |
[36] |
Pennacchia C, Ercolini D, Blaiotta G, et al. (2004) Selection of Lactobacillus strains fromfermented sausages for their potential use as probiotics. Meat Sci 67: 309-317. doi: 10.1016/j.meatsci.2003.11.003
![]() |
[37] |
Erkkila S, Petaja E (2000) Screening of commercial meat starter cultures at low pH in the presence of bile salts for potential probiotic use. Meat Sci 55: 297-300. doi: 10.1016/S0309-1740(99)00156-4
![]() |
[38] | Pérez-Miranda S, Cabirol N, George-Téllez R, et al. (2007) O-CAS, a fast and universal method for siderophore detection. J Microbiol Meth 70: 127-131. |
[39] | Aswathy RG, Ismail B, JohnRP, et al. (2008) Evaluation of the probiotic characteristics of newly isolated lactic acid bacteria. App Biochem Biotech 151: 244-255. |
[40] |
Qing HU, Dou M, Qi H, et al. (2007) Detection, isolation, and identification of cadmium-resistant bacteria based on PCR-DGGE. J Environ Sci 19: 1114-1119. doi: 10.1016/S1001-0742(07)60181-8
![]() |
[41] | Gonzalez L, Sandoval H, Sacristan N, et al. (2007) Identification of lactic acid bacteria isolated from Genestoso cheese throughout ripening and study of their antimicrobial activity. Food Cont 18: 716-722 |
[42] | Moreno F, Sarantinopoulos MR, Tsakalidou PE, et al. (2006) Therole of application of Enterococci in food and health. Int J Food Microbiol 106: 1-24. |
[43] | Espeche MC, Otero MC, Sesma F, et al. (2009) Screening of surface properties and antagonistic substances production by lactic acid bacteria isolated from the mammary gland of healthy and mastitis cows. Vet Microbiol 135: 346-357. |
[44] | KosB, Suskovic J, Vokavic S, et al. (2003) Adhesion and autoaggregation ability of probiotic strain Lactobacillus acidophilus M92. J Appl Microbiol 94: 981-987. |
[45] | Hamadi F, Latrache H (2008) Comparison of contact angle measurement and microbial adhesion to solvents for assaying electron donor-electron acceptor (acid-base) properties of bacterial surface. Colloid Surface B 65 134-139. |
β=0.25 | β=0.5 | β=0.75 | |
α=0.2, Source images | 0.4796 | 0.4526 | 0.4363 |
α=0.2, Resampling images | 0.4803 | 0.471 | 0.4558 |
α=0.4, Source images | 0.4439 | 0.3586 | 0.3383 |
α=0.4, Resampling images | 0.4452 | 0.4199 | 0.3709 |
β=0.25 | β=0.5 | β=0.75 | |
α=0.2 | 0.4796 | 0.4526 | 0.4363 |
α=0.4 | 0.4439 | 0.3586 | 0.3383 |
ISZM | 0.2988 | 0.2845 | 0.2979 |
β=0.25 | β=0.5 | β=0.75 | |
α=0.2 | 1613 | 6502 | 9753 |
α=0.4 | 3226 | 13004 | 19506 |
ISZM | 128 | 128 | 128 |
β=0.25 | β=0.5 | β=0.75 | |
α=0.2, Source images | 0.4796 | 0.4526 | 0.4363 |
α=0.2, Resampling images | 0.4803 | 0.471 | 0.4558 |
α=0.4, Source images | 0.4439 | 0.3586 | 0.3383 |
α=0.4, Resampling images | 0.4452 | 0.4199 | 0.3709 |
β=0.25 | β=0.5 | β=0.75 | |
α=0.2 | 0.4796 | 0.4526 | 0.4363 |
α=0.4 | 0.4439 | 0.3586 | 0.3383 |
ISZM | 0.2988 | 0.2845 | 0.2979 |
β=0.25 | β=0.5 | β=0.75 | |
α=0.2 | 1613 | 6502 | 9753 |
α=0.4 | 3226 | 13004 | 19506 |
ISZM | 128 | 128 | 128 |