
Citation: Yan Li, Junwei Wang, Shuangkui Ge, Xiangyang Luo, Bo Wang. A reversible database watermarking method with low distortion[J]. Mathematical Biosciences and Engineering, 2019, 16(5): 4053-4068. doi: 10.3934/mbe.2019200
[1] | Chuanda Cai, Changgen Peng, Jin Niu, Weijie Tan, Hanlin Tang . Low distortion reversible database watermarking based on hybrid intelligent algorithm. Mathematical Biosciences and Engineering, 2023, 20(12): 21315-21336. doi: 10.3934/mbe.2023943 |
[2] | Qichao Ying, Jingzhi Lin, Zhenxing Qian, Haisheng Xu, Xinpeng Zhang . Robust digital watermarking for color images in combined DFT and DT-CWT domains. Mathematical Biosciences and Engineering, 2019, 16(5): 4788-4801. doi: 10.3934/mbe.2019241 |
[3] | Shaozhang Xiao, Xingyuan Zuo, Zhengwei Zhang, Fenfen Li . Large-capacity reversible image watermarking based on improved DE. Mathematical Biosciences and Engineering, 2022, 19(2): 1108-1127. doi: 10.3934/mbe.2022051 |
[4] | Wenfa Qi, Wei Guo, Tong Zhang, Yuxin Liu, Zongming Guo, Xifeng Fang . Robust authentication for paper-based text documents based on text watermarking technology. Mathematical Biosciences and Engineering, 2019, 16(4): 2233-2249. doi: 10.3934/mbe.2019110 |
[5] | Shanqing Zhang, Xiaoyun Guo, Xianghua Xu, Li Li, Chin-Chen Chang . A video watermark algorithm based on tensor decomposition. Mathematical Biosciences and Engineering, 2019, 16(5): 3435-3449. doi: 10.3934/mbe.2019172 |
[6] | Kaimeng Chen, Chin-Chen Chang . High-capacity reversible data hiding in encrypted images based on two-phase histogram shifting. Mathematical Biosciences and Engineering, 2019, 16(5): 3947-3964. doi: 10.3934/mbe.2019195 |
[7] | Hongyan Xu . Digital media zero watermark copyright protection algorithm based on embedded intelligent edge computing detection. Mathematical Biosciences and Engineering, 2021, 18(5): 6771-6789. doi: 10.3934/mbe.2021336 |
[8] | Qiuling Wu, Dandan Huang, Jiangchun Wei, Wenhui Chen . Adaptive and blind audio watermarking algorithm based on dither modulation and butterfly optimization algorithm. Mathematical Biosciences and Engineering, 2023, 20(6): 11482-11501. doi: 10.3934/mbe.2023509 |
[9] | Haoyu Lu, Daofu Gong, Fenlin Liu, Hui Liu, Jinghua Qu . A batch copyright scheme for digital image based on deep neural network. Mathematical Biosciences and Engineering, 2019, 16(5): 6121-6133. doi: 10.3934/mbe.2019306 |
[10] | Rong Li, Xiangyang Li, Yan Xiong, An Jiang, David Lee . An IPVO-based reversible data hiding scheme using floating predictors. Mathematical Biosciences and Engineering, 2019, 16(5): 5324-5345. doi: 10.3934/mbe.2019266 |
A molecular graph in chemical graph theory is the graphical representation of the structural formula of a chemical compound in which the vertices represent atoms and edges represent chemical bond between those atoms. A topological index of a molecular graph G is a real number which characterizes the topology of G. Also it is invariant under graph automorphism. Topological indices have been widely used in Quantitative Structure-Activity Relationship (QSAR) and Quantitative Structure-Property Relationship (QSPR) studies. It has application in many folds, to name a few areas, biochemistry, nanotechnology, pharmacology. Bond energy is a measure of bond strength of a chemical compound. The distance between two atoms is considered as the bond length between them. The higher the bond energy, the smaller is the bond length between those atoms. The recently introduced 2-degree based topological invariants, analogous to novel graph invariants (Zagreb indices), namely leap Zagreb indices, may be applied in studying such bond energy between atoms in a molecular graph of a chemical compound.
Throughout this paper, G=(V,E) represents a connected molecular graph with the vertex set V(G) and the edge set E(G). Let the number of vertices and edges of G be n and m respectively. The degree of a vertex v in G is the number of vertices adjacent to v in G and denoted by deg(v:G). The 2-degree (or the second-degree) of a vertex v in G is the number of vertices which are at distance two from v in G and denoted by d2(v:G). The Zagreb indices, namely, the first and second Zagreb indices, are the most important and oldest molecular structure descriptors. These indices have been studied extensively in the field of Mathematical Chemistry [3,4,5]. Recently, the concept of Forgotten topological index also known as F-index have attracted many researchers which results in over 100 research articles related to F-index. A.M.Naji et al. [13] have recently introduced and studied some properties of a new topological invariant called Leap Zagreb indices. They are defined as follows:
Definition 1. (ⅰ) The first leap Zagreb index LM1(G) of a graph G is equal to the sum of squares of the second degrees of the vertices, LM1(G)=∑u∈V(G)d2(u)2.
(ⅱ) The second leap Zagreb index LM2(G) of a graph G is equal to the sum of the products of the second degrees of pairs of adjacent vertices, LM2(G)=∑uv∈E(G)d2(u)d2(v).
(ⅲ) The third leap Zagreb index LM3(G) of a graph G is equal to the sum of the products of the degree with the second degree of every vertex in G, LM3(G)=∑u∈V(G)deg(u)d2(u)
Subsequently, Z. Shao et al. [18] generalized the results of Naji et al.[13] for trees and unicyclic graphs and determined upper and lower bounds on leap Zagreb indices and characterized extremal graphs. Basavanagoud et al.[2] computed exact values for first and second leap hyper Zagreb indices of some nano structures. V. R. Kulli [7,8,9] introduced and studied various leap indices. Shiladhar et al.[17] computed leap Zagreb indices of wind mill graphs. Most recently, Naji et al.[14] have studied some properties of leap graphs.
Azari et al.[1] found formulae for first and second Zagreb indices of bridge and chain graphs. Nilanjan De [15,16] computed F-index and hyper Zagreb index of bridge and chain graphs. Jerline et al. [6] obtained exact values for harmonic index of bridge and chain graphs. E. Litta et al. [10] worked on modified Zagreb indices of bridge graphs. Mohanad Ali et al. [11] computed F-leap index of some special classes of bridge and chain graphs. Zhang et al.[12] worked on Edge-Version Atom-Bond Connectivity and Geometric Arithmetic Indices of generalized bridge molecular graphs. Motivated by their results, we compute exact values for the first and third leap Zagreb indices of bridges and chain graphs. Also we discuss some applications related to these indices in the last section of this paper. First, we recall the definitions of bridge and chain graphs from [1] as follows:
Definition 2. Let {Gi}di=1 be a set of finite pairwise disjoint graphs with distinct vertices vi∈V(Gi). The bridge graph B1=B1(G1,G2,…,Gd;v1,v2,v3,…,vd) of {Gi}di=1 with respect to the vertices {vi}di=1 as shown in Figure 1, is the graph obtained from the graphs G1,G2,…,Gd by connecting the vertices vi and vi+1 by an edge for all i=1,2,…,d−1.
Definition 3. The bridge graph B2=B2(G1,G2,…,Gd;v1,w1,v2,w2,…,vd,wd) of {Gi}di=1 with respect to the vertices {vi,wi}di=1 as shown in Figure 2, is the graph obtained from the graphs G1,G2,G3,…,Gd by connecting the vertices wi and vi+1 by an edge for all i=1,2,…,d−1.
Definition 4. The chain graph C=C(G1,G2,…,Gd;v1,w1,v2,w2,…,vd,wd) of {Gi}di=1 with respect to the vertices {vi,wi}di=1 as shown in Figure 3, is the graph obtained from the graphs G1,G2,…,Gd by identifying the vertices wi and vi+1 for all i=1,2,…,d−1.
The following lemma gives the 2-degree of any arbitrary vertex in the bridge graph B1.
Lemma 5. Let G1,G2,⋯,Gd be d≥5 connected graphs. Then the 2-degree of any arbitrary vertex u in the bridge graph B1 formed by these graphs is as follows:
d2(u:B1)={ν1+μ2+1,ifu=v1νd+μd−1+1,ifu=vdν2+μ1+μ3+1,ifu=v2νd−1+μd+μd−2+1,ifu=vd−1νi+μi−1+μi+1+2,,ifu=vi,3≤i≤d−2d2(u:G1)+1,ifu∈NG1(v1)d2(u:Gd)+1,ifu∈NGd(vd)d2(u:Gi)+2,ifu∈NGi(vi),2≤i≤d−1d2(u:Gi),ifu∈V(Gi)∖NGi[vi],1≤i≤d, | (2.1) |
where νi=d2(vi:Gi) and μi=deg(vi:Gi),1≤i≤d.
Next, we compute the first leap Zagreb index of the type-Ⅰ bridge graph B1.
Let Si=∑u∈NGi(vi)d2(u:Gi), 1≤i≤d.
Theorem 6. LM1(B1)=d∑i=1LM1(Gi)+d−1∑i=2[(μi−1+μi+1+1)2+2νi(μi−1+μi+1+1)+4Si+8μi]+2d−2∑i=3νi+2(S1+Sd)+(μ1+μd−2μ3−2μd−2)+(μ2+1)(μ2+2ν1+1)+(μd−1+1)(μd−1+2νd+1)+3d−12.
Proof. By virtue of Lemma 5
LM1(B1)=∑u∈V(B1)d2(u:B1)2=(ν1+μ2+1)2+(νd+μd−1+1)2+(ν2+μ1+μ3+1)2+(νd−1+μd+μd−2+1)2+d−2∑i=3(νi+μi−1+μi+1+2)2+∑u∈NG1(v1)(d2(u:G1)+1)2+∑u∈NGd(vd)(d2(u:Gd)+1)2+d−1∑i=2∑u∈NGi(vi)(d2(u:Gi)+2)2+d∑i=1∑u∈V(Gi)∖NGi[vi]d2(u:Gi)2 |
=ν21+(μ2+1)2+2ν1(μ2+1)+ν2d+(μd−1+1)2+2νd(μd−1+1)+ν22+(μ1+μ3+1)2+2ν2(μ1+μ3+1)+ν2d−1+(μd+μd−2+1)2+2νd−1(μd+μd−2+1)+d−2∑i=3[(νi+1)2+2(νi+1)(μi−1+μi+1+1)+(μi−1+μi+1+1)2]+∑u∈NG1(v1)[d2(u:G1)2+2d2(u:G1)]+μ1+∑u∈NGd(vd)[d2(u:Gd)2+2d2(u:Gd)]+μd+d−1∑i=2∑u∈NGi(vi)[d2(u:Gi)2+4d2(u:Gi)]+4d−1∑i=2μi+d∑i=1∑u∈V(Gi)∖NGi[vi]d2(u:Gi)2 |
=d∑i=1LM1(Gi)+d−1∑i=2[(μi−1+μi+1+1)2+2νi(μi−1+μi+1+1)+4Si+8μi]+2d−2∑i=3νi+2(S1+Sd)+(μ1+μd−2μ2−2μ3−2μd−2−2μd−1)+(μ2+1)(μ2+2ν1+1)+(μd−1+1)(μd−1+2νd+1)+3d−12. |
Thus the result follows.
Corollary 7. If G1=G2=⋯=Gd=G in a bridge graph B1, then LM1(B1)=dLM1(G)+(4d−6)μ2+(4d−8)ν+(12d−26)μ+(4d−4)(νμ+S)+4d−12, where S=∑u∈NG(v)d2(u:G).
Lemma 8. [1] The degree of an arbitrary vertex u of the bridge graph B1,d≥5 is given by:
deg(u:B1)={μ1+1,ifu=v1μd+1,ifu=vdμi+2,ifu=vi,2≤i≤d−1deg(u:Gi),ifu∈V(Gi)∖{vi},1≤i≤d, | (2.2) |
where μi=deg(vi:Gi),1≤i≤d.
Next, we compute the third leap Zagreb index of the type-Ⅰ bridge graph B1 Let us denote si=∑u∈NGi(vi)deg(u:Gi), 1≤i≤d.
Theorem 9. LM3(B1)=d∑i=1LM3(Gi)+(s1+sd)+2d−1∑i=2si+d∑i=1(2νi+6μi)+2d∑i=2(μi−1μi)−2(μ2+μd−1)−(ν1+νd)−3(μ1+μd)+4d−10.
Proof. By virtue of Lemma 5 and 8
LM3(B1)=∑u∈v(B1)d2(u)deg(u)=(ν1+μ2+1)(μ1+1)+(ν2+μ1+μ3+1)(μ2+2)+(νd+μd−1+1)(μd+1)+(νd−1+μd+μd−2+1)(μd−1+2)+d−2∑i=3(νi+μi−1+μi+1+2)(μi+2)+∑u∈NG1(v1)(d2(u:G1)+1)(deg(u:G1))+∑u∈NGd(vd)(d2(u:Gd)+1)(deg(u:Gd))+d−1∑i=2∑u∈NGi(vi)(d2(u:Gi)+2)(deg(u:Gi))+d∑i=1∑u∈V(Gi)∖NGi[vi](d2(u:Gi))(deg(u:Gi)) |
=(ν1μ1+ν1+μ2μ1+μ2+μ1+1)+(ν2μ2+2ν2+μ1μ2+2μ1+μ3μ2+2μ3+μ2+2)+(νdμd+νd+μd−1μd+μd−1+μd+1)+(νd−1μd−1+2νd−1+μdμd−1+2μd+μd−2μd−1+2μd−2+μd−1+2)+d−2∑i=3(νiμi+2νi+μi−1μi+2μi−1+μi+1μi+2μi+1+2μi+4)+∑u∈NG1(v1)(d2(u:G1)deg(u:G1)+deg(u:G1))+∑u∈NGd(vd)(d2(u:Gd)deg(u:Gd)+deg(u:Gd))+d−1∑i=2∑u∈NGi(vi)(d2(u:Gi)deg(u:Gi)+2deg(u:Gi))+d∑i=1∑u∈V(Gi)∖NGi[vi]d2(u:Gi)deg(u:Gi) |
Thus the result follows.
Corollary 10. If G1=G2=⋯=Gd=G in a bridge graph B1, then LM3(B1)=dLM3(G)+2(d−1)(s+ν+μ2)+2μ(3d−5)+4d−10, where s=∑u∈NG(v)deg(u:G).
For any two nonempty sets A and B, AΔB denotes the symmetric difference of A and B and defined as AΔB=(A∖B)∪(B∖A)=(A∪B)∖(A∩B). First, we obtain the 2-degree of any arbitrary vertex in the type-Ⅱ bridge graph B2 as follows:
Lemma 11. Let G1,G2,⋯,Gd be d≥5 triangle free connected graphs. Then 2-degree of any arbitrary vertex u in the bridge graph B2 formed by these graphs is as follows:
d2(u:B2)={d2(u:G1),ifu∈V(G1)∖NG1[w1]d2(u:G1)+1,ifu∈NG1(w1)d2(u:Gi),ifu∈V(Gi)∖{NGi[vi]∪NGi[wi]},2≤i≤d−1d2(u:Gd),ifu∈V(Gd)∖NGd[vd]d2(u:Gd)+1,ifu∈NGd(vd)d2(u:Gi)+1,ifu∈(NGi(vi)ΔNGi(wi)),2≤i≤d−1d2(u:Gi)+2,ifu∈NGi(vi)∩NGi(wi),2≤i≤d−1δi+μi+1,ifu=wi,1≤i≤d−1νi+λi−1,ifu=vi,2≤i≤d. | (2.3) |
where νi=d2(vi:Gi),μi=deg(vi:Gi);2≤i≤d,δi=d2(wi:Gi),λi=deg(wi:Gi);1≤i≤d−1.
Next, we compute the first leap Zagreb index of type-Ⅱ bridge graph B2.
Let us denote S′1=∑u∈NG1(w1)d2(u:G1) and Sd=∑u∈NGd(vd)d2(u:Gd)
Theorem 12. LM1(B2)=d∑i=1LM1(Gi)+2(S′1+Sd)+(λ1+μd)+d−1∑i=2∑u∈NGi(vi)ΔNGi(wi)[2d2(u:Gi)+1]+4d−1∑i=2∑u∈NGi(vi)∩NGi(wi)[d2(u:Gi)+1]+d−1∑i=1(μ2i+1+2δiμi+1)+d∑i=2(λ2i−1+2νiλi−1).
Proof.
LM1(B2)=∑u∈V(B2)d2(u:B2)2=∑u∈V(G1)∖NG1[w1]d2(u:G1)2+d−1∑i=2 ∑u∈V(Gi)∖{NGi[vi]∪NGi[wi]}d2(u:Gi)2+∑u∈V(Gd)∖NGd[vd]d2(u:Gd)2+∑u∈NG1(w1)(d2(u:G1)+1)2+d−1∑i=2∑u∈NGi(vi)ΔNGi(wi)(d2(u:Gi)+1)2+∑u∈NGd(vd)(d2(u:Gd)+1)2+d−1∑i=2∑u∈NGi(vi)∩NGi(wi)(d2(u:Gi)+2)2+d−1∑i=1(δi+μi+1)2+d∑i=2(νi+λi−1)2 |
=LM1(G1)−δ21−∑u∈NG1(w1)d2(u:G1)2+d−1∑i=2[∑u∈V(Gi)d2(u:Gi)2−∑u∈N(vi)∪N(wi)d2(u:Gi)2−ν2i−δ2i]+LM1(Gd)−ν2d−∑u∈NGd(vd)d2(u:Gd)2+∑u∈NG1(w1)d2(u:G1)2+2∑u∈NG1(w1)d2(u:G1)+λ1+d−1∑i=2[∑u∈NGi(vi)ΔNGi(wi)[d2(u:Gi)2+2d2(u:Gi)+1]]+∑u∈NGd(vd)[d2(u:Gd)2+2d2(u:Gd)+1]+d−1∑i=2[∑u∈NGi(vi)∩NGi(wi)[d2(u:Gi)2+4d2(u:Gi)+4]]+d−1∑i=1[δ2i+2δiμi+1+μ2i+1]+d∑i=2[ν2i+2νiλi−1+λ2i−1] |
Thus,
LM1(B2)=d∑i=1LM1(Gi)+2(S′1+Sd)+(λ1+μd)+d−1∑i=2∑u∈NGi(vi)ΔNGi(wi)[2d2(u:Gi)+1]+4d−1∑i=2∑u∈NGi(vi)∩NGi(wi)[d2(u:Gi)+1]+d−1∑i=1(μ2i+1+2δiμi+1)+d∑i=2(λ2i−1+2νiλi−1). |
Corollary 13. If G1=G2=⋯,Gd=G, in a bridge graph B2, then LM1(B2)=dLM1(G)+λ+μ+2(S+S′)+(d−2)∑u∈NG(v)ΔNG(w)(2d2(u:G)+1)+4(d−2)∑u∈NG(v)∩NG(w)(d2(u:G)+1)+(d−1)[μ2+λ2]+2(d−1)[δμ+νλ], where S=∑u∈NG(w)d2(u:G) and S′=∑u∈NG(v)d2(u:G).
In what follows next, we compute the third leap Zagreb index of B2.
Lemma 14. The degree of an arbitrary vertex u of the bridge graph B2, d≥5 is given by:
deg(u:B2)={deg(u:G1),ifu∈V(G1)∖{w1}deg(u:Gd),ifu∈V(Gd)∖{vd}deg(u:Gi),ifu∈V(Gi)∖{vi,wi},2≤i≤d−1λi+1,ifu=wi,1≤i≤d−1μi+1,ifu=vi,2≤i≤d. | (2.4) |
where μi=deg(vi:Gi);2≤i≤d,λi=deg(wi:Gi);1≤i≤d−1.
Theorem 15. LM3(B2)=d∑i=1LM3(Gi)+∑u∈NG1(w1)deg(u:G1)+∑u∈NGd(vd)deg(u:Gd)+d−1∑i=2∑u∈NGi(wi)∖NGi(vi)deg(u:Gi)+d−1∑i=2∑u∈NGi(vi)∖NGi(wi)deg(u:Gi)+d−1∑i=2∑u∈NGi(vi)∩NGi(wi)2deg(u:Gi)+d−1∑i=12μi+1λi+d−1∑i=1μi+1+d∑i=2λi−1+d∑i=1(δi+νi)−ν1−δd.
Proof. By virtue of Lemma 2.7 and 2.10
LM3(B2)=∑u∈V(B2)d2(u)deg(u)=∑u∈V(G1)∖NG1[w1]d2(u:G1)deg(u:G1)+d−1∑i=2∑u∈V(Gi)∖{NGi[vi]∪NGi[wi]}d2(u:Gi)deg(u:Gi)+∑u∈V(Gd)∖NGd[vd]d2(u:Gd)deg(u:Gd)+∑u∈NG1(w1)(d2(u:G1)+1)(deg(u:G1))+d−1∑i=2∑u∈NGi(wi)∖NGi(vi)(d2(u:Gi)+1)(deg(u:Gi))+d−1∑i=2∑u∈NGi(vi)∖NGi(wi)(d2(u:Gi)+1)(deg(u:Gi))+∑u∈NGd(vd)(d2(u:Gd)+1)(deg(u:Gd))+d−1∑i=2∑u∈NGi(vi)∩NGi(wi)(d2(u:Gi)+2)(deg(u:Gi))+d−1∑i=1(δi+μi+1)(λi+1)+d∑i=2(νi+λi−1)(μi+1) |
Thus the result follows.
Corollary 16. If G1=G2=⋯=Gd=G in a bridge graph B2, then LM3(B2)=dLM3(G)+∑u∈NG(w)deg(u:G)+∑u∈NG(v)deg(u:G)+(d−2)(∑u∈NG(w)∖NG(v)deg(u:G)+∑u∈NG(v)∖NG(w)deg(u:G)+∑u∈NG(v)∩NG(w)2deg(u:G))+(d−1)(2μλ+μ+λ)+d(δ+ν)−(ν+δ).
In the following lemma, we obtain the 2-degree of any vertex in the chain graph C.
Lemma 17. Let G1,G2,⋯,Gd, d≥5 be C3-free connected graphs and let C=C(G1,G2,⋯,Gd;w1,v2,w2,v3,⋯,wd−1,vd) be the chain graph formed using these graphs. Then the 2-degree of any vertex u in C is given as follows:
d2(u:C)={d2(u:G1),ifu∈V(G1)∖NG1[w1]d2(u:G1)+μ2,ifu∈NG1(w1)d2(u:Gd),ifu∈V(Gd)∖NGd[vd]d2(u:Gd)+λd−1,ifu∈NGd(vd)d2(u:Gi),ifu∈V(Gi)∖{NGi[wi]∪NGi[vi]},2≤i≤d−1d2(u:Gi)+μi+1,ifu∈NGi(wi)∖NGi(vi),2≤i≤d−1d2(u:Gi)+λi−1,ifu∈NGi(vi)∖NGi(wi),2≤i≤d−1d2(u:Gi)+λi−1+μi+1,ifu∈NGi(vi)∩NGi(wi),2≤i≤d−1δi+νi+1,ifu=wi=vi+1,1≤i≤d−1, | (2.5) |
where νi=d2(vi:Gi),μi=deg(vi:Gi),λi=deg(wi:Gi) and δi=d2(wi:Gi) for all 1≤i≤d.
Now, we compute the first leap Zagreb index of the chain graph C by applying Lemma 17.
Theorem 18. For the chain graph C,
LM1(C)=d∑i=1LM1(Gi)+∑u∈NG1(w1)[2μ2d2(u:G1)+μ22]+∑u∈NGd(vd)[2λd−1d2(u:Gd)+λ2d−1]+d−1∑i=2 ∑u∈NGi(wi)∖NGi(vi)[2μi+1d2(u:Gi)+μ2i+1]+d−1∑i=2 ∑u∈NGi(vi)∖NGi(wi)[2λi−1d2(u:Gi)+λ2i−1]+2d−1∑i=2 ∑u∈NGi(vi)∩NGi(wi)[λi−1d2(u:Gi)+μi+1d2(u:Gi)+λi−1μi+1]+d−1∑i=2 ∑u∈NGi(vi)∩NGi(wi)(λ2i−1+μ2i+1)+2d−1∑i=1δiνi+1. |
Proof. By Lemma 17, we have
LM1(C)=∑u∈V(C)d2(u:C)2=∑u∈V(G1)∖NG1[w1]d2(u:G1)2+∑u∈NG1(w1)[d2(u:G1)+μ2]2+∑u∈V(Gd)∖NGd[vd]d2(u:Gd)2+∑u∈NGd(vd)[d2(u:Gd)+λd−1]2+d−1∑i=2 ∑u∈V(Gi)∖{NGi[vi]∪NGi[wi]}d2(u:Gi)2+d−1∑i=2 ∑u∈NGi(wi)∖NGi(vi)[d2(u:Gi)+μi+1]2+d−1∑i=2 ∑u∈NGi(vi)∖NGi(wi)[d2(u:Gi)+λi−1]2+d−1∑i=2 ∑u∈NGi(vi)∩NGi(wi)[d2(u:Gi)+λi−1+μi+1]2+d−1∑i=1[δi+νi+1]2 |
=LM1(G1)−∑u∈NG1(w1)[d2(u:G1)2]−δ21+∑u∈NG1(w1)[d2(u:G1)2+2d2(u:G1)μ2+μ22]+LM1(Gd)−∑u∈NGd(vd)d2(u:Gd)2−ν2d+∑u∈NGd(vd)[d2(u:Gd)2+2λd−1d2(u:Gd)+λ2d−1]+d−1∑i=2∑u∈V(Gi)d2(u:Gi)2−d−1∑i=2 ∑u∈NGi[vi]∪NGi[wi]d2(u:Gi)2+d−1∑i=2 ∑u∈NGi(wi)∖NGi(vi)[d2(u:Gi)2+2μi+1d2(u:Gi)+μ2i+1]+d−1∑i=2 ∑u∈NGi(vi)∖NGi(wi)[d2(u:Gi)2+2λi−1d2(u:Gi)+λ2i−1]+d−1∑i=2∑u∈NGi(vi)∩NGi(wi)[d2(u:Gi)2+2λi−1d2(u:Gi)+2μi+1d2(u:Gi)+2λi−1μi+1+λ2i−1+μ2i+1]+d−1∑i=1[δ2i+ν2i+1]+2d−1∑i=1δiνi+1 |
=d∑i=1LM1(Gi)+∑u∈NG1(w1)[2μ2d2(u:G1)+μ22]+∑u∈NGd(vd)[2λd−1d2(u:Gd)+λ2d−1]+d−1∑i=2 ∑u∈NGi(wi)∖NGi(vi)[2μi+1d2(u:Gi)+μ2i+1]+d−1∑i=2 ∑u∈NGi(vi)∖NGi(wi)[2λi−1d2(u:Gi)+λ2i−1]+2d−1∑i=2 ∑u∈NGi(vi)∩NGi(wi)[λi−1d2(u:Gi)+μi+1d2(u:Gi)+λi−1μi+1]+d−1∑i=2 ∑u∈NGi(vi)∩NGi(wi)(λ2i−1+μ2i+1)+2d−1∑i=1δiνi+1. |
Corollary 19. In a chain graph C, if G1=G2=⋯=Gd=G, then LM1(C)=dLM1(G)+∑u∈NG(w)[2μd2(u:G)+μ2]+∑u∈NG(v)[2λd2(u:G)+λ2]+(d−2)∑u∈NG(w)∖NG(v)[2μd2(u:G)+μ2]+(d−2)∑u∈NG(v)∖NG(w)[2λd2(u:G)+λ2]+2(d−2)∑u∈NG(v)∩NG(w)[λd2(u:G)+μd2(u:G)+λμ]+(d−2)∑u∈NG(v)∩NG(w)(λ2+μ2)+2(d−1)δν.
Lemma 20. Let G1,G2,⋯,Gd, d≥5 be C3-free connected graphs and let C=C(G1,G2,⋯,Gd;w1,v2,w2,v3,⋯,wd−1,vd) be the chain graph formed using these graphs. Then the degree of any vertex u in C is given as follows:
deg(u:C)={deg(u:G1),ifu∈V(G1)∖{w1}deg(u:Gd),ifu∈V(Gd)∖{vd}deg(u:Gi),ifu∈V(Gi)∖{vi,wi},2≤i≤d−1λi+μi+1,ifu=wi=vi+1,1≤i≤d−1, | (2.6) |
where μi=deg(vi:Gi),λi=deg(wi:Gi) for all 1≤i≤d
Finally, we compute the third leap Zagreb index of the chain graph C by applying Lemma 17 and 2.16.
Theorem 21. LM3(C)=d∑i=1LM3(Gi)+∑u∈NG1(w1)μ2deg(u:G1)+∑u∈NGd(vd)λd−1deg(u:Gd)+d−1∑i=2∑u∈NGi(wi)∖NGi(vi)μi+1deg(u:Gi)+d−1∑i=2∑u∈NGi(vi)∖NGi(wi)λi−1deg(u:Gi)+d−1∑i=2∑u∈NGi(vi)∩NGi(wi)(λi−1deg(u:Gi)+μi+1deg(u:Gi))+d−1∑i=1(δiμi+1+νi+1λi).
Proof. By virtue of Lemma 17 and 20
LM3(C)=∑u∈V(C)d2(u)deg(u)=∑u∈V(G1)∖NG1[w1]d2(u:G1)deg(u:G1)+∑u∈NG1(w1)(d2(u:G1)+μ2)deg(u:G1)+∑u∈V(Gd)∖NGd[vd]d2(u:Gd)deg(u:Gd)+∑u∈NGd(vd)(d2(u:Gd)+λd−1)deg(u:Gd)+d−1∑i=2∑u∈V(Gi)∖{NGi[wi]∪NGi[vi]}d2(u:Gi)deg(u:Gi)+d−1∑i=2∑u∈NGi(wi)∖NGi(vi)(d2(u:Gi)+μi+1)deg(u:Gi)+d−1∑i=2∑u∈NGi(vi)∖NGi(wi)(d2(u:Gi)+λi−1)deg(u:Gi)+d−1∑i=2∑u∈NGi(vi)∩NGi(wi)(d2(u:Gi)+λi−1+μi+1)deg(u:Gi)+d−1∑i=1(δi+νi+1)(λi+μi+1). |
Thus the result follows.
Corollary 22. In a chain graph C, if G1=G2=⋯=Gd=G, then LM3(C)=dLM3(G)+∑u∈NG(w)μdeg(u:G)+∑u∈NG(v)λdeg(u:G)+(d−2)(∑u∈NG(w)∖NG(v)μdeg(u:G)+∑u∈NG(v)∖NG(w)λdeg(u:G)+∑u∈NG(v)∩NG(w)(λ+μ)deg(u:G))+(d−1)(δμ+νλ).
In this section, we determine the first and third leap Zagreb indices of some molecular graph structures. Two vertices v and w of a hexagon H (C6) (please refer Figure 4) are said to be in
(ⅰ) ortho-position, if they are adjacent in H
(ⅱ) meta-position, if they are distance two in H
(ⅲ) para-position, if they are distance three in H.
We connect h≥5 ortho-hexagons to form a polyphenyl chain denoted by Oh as follows:
One can observe that the Polyphenyl chain Oh shown in Figure 5 is a B1 type bridge graph. Therefore, from Corollary 7, we get
LM1(Oh)=hLM1(G)+(4h−6)μ2+(4h−8)ν+(12h−26)μ+(4h−4)[νμ+∑u∈NG(v)d2(u:G)]+4h−12=24h+(4h−6)(4)+(4h−8)(2)+(12h−26)(2)+(4h−4)(4)+(4h−4)(4)+4h−12=108h−136. |
Similarly,
From Corollary 10, we get
LM3(Oh)=24h+(2h−2)(2)+(2h−2)(2)+2(2)(3h−5)+2(h−1)(2+4)+4h−10=60h−50 |
The polyphenyl chain Mh is formed by connecting h≥5 meta-hexagons as shown in Figure 6.
The polyphenyl chain Ph is formed by connecting h≥5 para-hexagons as shown in the following Figure 7.
It is clear that the Polyphenyl chains Mh and Ph are type-Ⅱ bridge graphs B2.
Using Corollary 2.9, we get
LM1(Mh)=hLM1(G)+λ+μ+2∑u∈NG(w)d2(u:G)+(h−2)[∑u∈NG(w)∖NG(v)(2d2(u:G)+1)]+(h−2)∑u∈NG(v)∖NG(w)(2d2(u:G)+1)+4(h−2)∑u∈NG(v)∩NG(w)(d2(u:G)+1)+2∑u∈NG(v)d2(u:G)+(h−1)μ2+2(h−1)δμ+2(h−1)νλ+(h−1)λ2=24h+4+2(4)+(h−2)[2(2)+1]+(h−2)[2(2)+1]+4(h−2)(2+1)+2(4)+(h−1)(4)+4(h−1)(4)+(h−1)(4) |
Thus LM1(Mh)=70h−48.
Similarly, by Corollary 13, we have
LM1(Ph)=24h+4+2(4)+(h−2)[2(4)+2]+(h−2)(8+2)+4(h−2)(0)+2(4)+(h−1)(4)+8(h−1)+8(h−1)+(h−1)(4) |
Therefore, LM1(Ph)=68h−44.
Using Corollary 2.12, we get
LM3(Mh)=24h+8+(h−2)8+(h−1)12+h(4)−4=48h−24 |
LM3(Ph)=24h+8+(h−2)8+(h−1)12+4h−4=48h−24. |
Next, we shall see an application related to the chain graph C. The spiro-chain SPC4(d,3) is a chain graph formed using d≥5 copies of the cycle C4.
Here the number 3 in the construction denotes the position of the vertices v and w in the spiro-chain (refer Figure 8).
The spiro-chain SPC6(d,4) is a chain graph formed using d≥5 copies of the cycle C6 or hexagon where the vertices v and w are connected in the 4th position (refer Figure 9).
By applying Corollary 19, we get
LM1(SPC4(d,3))=dLM1(G)+∑u∈NG(w)[2μd2(u:G)+μ2]+∑u∈NG(v)[2λd2(u:G)+λ2]+(d−2)∑u∈NG(w)∖NG(v)[2μd2(u:G)+μ2]+(d−2)∑u∈NG(v)∖NG(w)[2λd2(u:G)+λ2]+2(d−2)∑u∈NG(v)∩NG(w)[λd2(u:G)+μd2(u:G)+λμ]+(d−2)∑u∈NG(v)∩NG(w)(λ2+μ2)+2(d−1)δν=54d−66. |
Similarly, from Corollary 19, we have LM1(SPC6(d,4))=80d−56.
By applying Corollary 22, we get
LM3(SPC4(d,3))=8d+2(2+2)+2(2+2)+(d−2)(16)+(d−1)(4)=28d−20 |
Similarly, from Corollary 22, we have LM3(SPC6(d,4))=48d−24.
We have computed exact values of one of the recent topological invariants namely first and third leap Zagreb indices for bridge and chain graphs. It is worth mentioning that computing second leap Zagreb index of bridges and chain graphs has not yet addressed and interested researchers may work on it. Also these indices need to be explored for several other interesting graph structures arising from mathematical chemistry and other branches of science.
The authors wish to thank the referees for their careful reading of the manuscript and valuable suggestions. This work was supported in part by the National Key Technologies R & D Program of China under Grant 2017YFB0802300, 2018YFB0904205, in part by the Key Laboratory of Pattern Recognition and Intelligent Information Processing, Institutions of Higher Education of Sichuan Province under Grant MSSB-2020-12.
The authors declare that no competing interests exist.
[1] | N. Gursale and A. Mohanpurkar, A robust, distortion minimization fingerprinting technique for relational database, IJRITCC, 2(2014), 1737–1741. |
[2] | R. Agrawal and J. Kiernan, Watermarking relational databases, VLDB, Elsevier, Hong Kong, China, 28 (2002), 155–166. |
[3] | R. Sion, Proving ownership over categorical data, ICDE, Boston, (2004), 584–596. |
[4] | R. Sion, M. Atallah and S. Prabhakar, Rights protection for categorical data, IEEE Trans. Knowl. Data Eng., 17(2005), 912–926. |
[5] | S. Liu, S. Wang, R. Deng, et al, A block oriented fingerprinting scheme in relational database, ISCISC, Seoul, Korea, (2004), 145–192. |
[6] | M. Shehab, E. Bertino and A. Ghafoor, Watermarking relational databases using optimization-based techniques, IEEE Trans. Knowl. Data Eng., 20 (2008), 116–129. |
[7] | Y. Zhang, B. Yang and X. Niu, Reversible watermarking for relational database authentication, JCP, 17 (2006), 59–65. |
[8] | J. Chang and H. Wu, Reversible fragile database watermarking technology using difference expansion based on SVR prediction, IS3C, Taiwan, China, (2012), 690–693. |
[9] | E. Mahmoud, H. Farfoura and X. Wang, A novel blind reversible method for watermarking relational databases, JCIE, 36 (2013), 87–97. |
[10] | V. Khanduja, S. Chakraverty and O. Verma, Enabling information recovery with ownership using robust multiple watermarks, JISA, 29 (2016), 80–92. |
[11] | G. Gupta and J. Pieprzyk, Reversible and blind database watermarking using difference expansion, IJDCF, 1 (2008), 42–54. |
[12] | G. Gupta and J. Pieprzyk, Database relation watermarking resilient against secondary watermarking attacks, Inform. System. Secur., Springer, (2009), 222–236. |
[13] | S. Bhattacharya and A. Cortesi, A distortion free watermark framework for relational databases, ICSDT, Sofia, Bulgaria, (2013), 229–234. |
[14] | K. Jawad and A. Khan, Genetic algorithm and difference expansion based reversible watermarking for relational databases, J. System Software, 86 (2013), 2742–2753. |
[15] | M. Farfoura and A. Horng, A novel blind reversible method for watermarking relational databases, ISPA, (2010), 563–569. |
[16] | S. Iftikhar, M. Kamran and Z. Anwar, RRW-a robust and reversible watermarking technique for relational data, IEEE Trans. Knowl. Data Eng., 27 (2015), 1132–1145. |
[17] | D. H. Hu, D. Zhao and S. L. Zheng, A new robust approach for reversible database watermarking with distortion control, IEEE Trans. Knowl. Data Eng., (2018), DOI: 10.1109/TKDE.2018.2851517. |
[18] | Y. Cao, Z. L. Zhou, X. M. Su, et al., Coverless information hiding based on the molecular structure images of material, CMC, 54 (2018), 197–207. |
[19] | W.J. Xu, S.J. Xiang and V. Sachnev, A Cryptograph Domain Image Retrieval Method Based on Paillier Homomorphic Block Encryption, CMC, 55 (2018), 285–295. |
[20] | J. W. Wang, T. Li, X. Y. Luo, et al., Identifying computer generated images based on quaternion central moments in color quaternion wavelet domain, TCSVT, (2018), DOI: 10.1109/TCSVT.2018.2867786. |
[21] | Y. Du, Z. X. Yin and X. P. Zhang, Improved lossless data hiding for jpeg images based on histogram modification, CMC, 55 (2018), 495–507. |
[22] | Y. Zhang, C. Qin, W. M. Zhang, et al., On the fault-tolerant performance for a class of robust image steganography, Signal Process.g, 146 (2018), 99–111. |
[23] | X. Y. Luo, X. F. Song, X. L. Li, et al., Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes, Mult Tool Appl., 75 (2016), 13557–13583. |
[24] | T. Qiao, R. Shi, X. Y. Luo, et al., Statistical model-based detector via texture weight map: Application in re-sampling authentication, TMM, (2018), DOI: 10.1109/TMM.2018.2872863. |
[25] | Y. Y. Ma, X. Y. Luo, X. L. Li, et al., Selection of rich model steganalysis features based on decision rough set α-positive region reduction, TCSVT, 29 (2019), 336–350. |
1. | Yan Li, Junwei Wang, Xiangyang Luo, A reversible database watermarking method non-redundancy shifting-based histogram gaps, 2020, 16, 1550-1477, 155014772092176, 10.1177/1550147720921769 | |
2. | Yan Li, Junwei Wang, Hongyong Jia, A Robust and Reversible Watermarking Algorithm for a Relational Database Based on Continuous Columns in Histogram, 2020, 8, 2227-7390, 1994, 10.3390/math8111994 | |
3. | Heyan Chai, Shuqiang Yang, Zoe L. Jiang, Xuan Wang, Yiqun Chen, Hengyu Luo, 2020, Chapter 11, 978-3-030-38990-1, 153, 10.1007/978-3-030-38991-8_11 | |
4. | Ali Hamadou, Lanciné Camara, Abdoul Aziz Issaka Hassane, Harouna Naroua, Reversible Fragile Watermarking Scheme for Relational Database Based on Prediction-Error Expansion, 2020, 2020, 1024-123X, 1, 10.1155/2020/1740205 | |
5. | Rizwan Taj, Feng Tao, Shahzada Khurram, Ateeq Ur Rehman, Syed Kamran Haider, Akber Abid Gardezi, Saima Kanwal, Reversible Watermarking Method with Low Distortion for the Secure Transmission of Medical Images, 2022, 130, 1526-1506, 1309, 10.32604/cmes.2022.017650 | |
6. | Sapana Rani, Raju Halder, An efficient format-independent watermarking framework for large-scale data sets, 2022, 208, 09574174, 118085, 10.1016/j.eswa.2022.118085 | |
7. | Qianwen Li, Xiang Wang, Qingqi Pei, Kwok-Yan Lam, Ning Zhang, Mianxiong Dong, Victor C. M. Leung, Database Watermarking Algorithm Based on Decision Tree Shift Correction, 2022, 9, 2327-4662, 24373, 10.1109/JIOT.2022.3188631 | |
8. | Sapana Rani, Raju Halder, Comparative Analysis of Relational Database Watermarking Techniques: An Empirical Study, 2022, 10, 2169-3536, 27970, 10.1109/ACCESS.2022.3157866 | |
9. | Qiang Liu, Hequ Xian, Jiancheng Zhang, Kunpeng Liu, 2023, Chapter 22, 978-3-031-25537-3, 413, 10.1007/978-3-031-25538-0_22 | |
10. | Asmaa Alqassab, Mafaz Alanezi, 2023, Chapter 49, 978-981-19-1411-9, 563, 10.1007/978-981-19-1412-6_49 | |
11. | Yexing Zhang, Zihou Wang, Zhaoguo Wang, Chuanyi Liu, 2022, Chapter 1, 978-981-16-9228-4, 3, 10.1007/978-981-16-9229-1_1 | |
12. | De Li, Chi Ma, Haoyang Gao, Xun Jin, LBP feature and hash function based dual watermarking algorithm for database, 2023, 148, 0169023X, 102228, 10.1016/j.datak.2023.102228 | |
13. | Cheng Li, Xinhui Han, Wenfa Qi, Zongming Guo, 2023, An Improved Reversible Database Watermarking Method based on Histogram Shifting, 9798400700545, 103, 10.1145/3577163.3595091 | |
14. | Wenfa Qi, Cheng Li, Xinhui Han, Research on blind reversible database watermarking algorithm based on dual embedding strategy, 2024, 0010-4620, 10.1093/comjnl/bxae080 | |
15. | Zhiwen Ren, Zehua Ma, Weiming Zhang, Nenghai Yu, 2023, SPSW: Database Watermarking Based on Fake Tuples and Sparse Priority Strategy, 979-8-3503-8199-3, 896, 10.1109/TrustCom60117.2023.00128 | |
16. | Wenling Li, Ning Li, Jianen Yan, Zhaoxin Zhang, Ping Yu, Gang Long, Secure and High-Quality Watermarking Algorithms for Relational Database Based on Semantic, 2022, 1041-4347, 1, 10.1109/TKDE.2022.3194191 | |
17. | Jiang Han, Xiaowei Peng, Hequn Xian, Dalin Yang, 2024, A Distortion Free Watermark Scheme for Relational Databases, 979-8-3503-8461-1, 1, 10.1109/ICCCN61486.2024.10637516 | |
18. | Zhiwen Ren, Han Fang, Jie Zhang, Zehua Ma, Ronghao Lin, Weiming Zhang, Nenghai Yu, A Robust Database Watermarking Scheme That Preserves Statistical Characteristics, 2024, 36, 1041-4347, 2329, 10.1109/TKDE.2023.3324932 | |
19. | Chuanda Cai, Changgen Peng, Jin Niu, Weijie Tan, Hanlin Tang, Low distortion reversible database watermarking based on hybrid intelligent algorithm, 2023, 20, 1551-0018, 21315, 10.3934/mbe.2023943 | |
20. | Chundong Wang, Yue Li, 2023, A Copyright Authentication Method Balancing Watermark Robustness and Data Distortion, 979-8-3503-3168-4, 1178, 10.1109/CSCWD57460.2023.10152729 | |
21. | Yantao Tan, Zhiwen Ren, Zehua Ma, Weiming Zhang, Nenghai Yu, 2024, Low Distortion Database Watermarking Based on Attribute Prediction, 979-8-3315-0707-7, 62, 10.1109/ICCC62609.2024.10941885 | |
22. | Dharmapuri Siri, S. Sangeetha, P. Kalaiselvi, Devayanai V C, Haassan M.M. AlJawahry, Ritin Behl, 2025, A Strong and Adaptable Watermarking Methodology for Relational Databases, 979-8-3315-2749-5, 1243, 10.1109/IC363308.2025.10956503 | |
23. | Peng Zuo, Shiqiang Xu, Yang Wang, Peiyu Xiao, Peiyi Han, 2025, Chapter 25, 978-981-96-4508-4, 371, 10.1007/978-981-96-4509-1_25 | |
24. | Wenhao Xu, Hequn Xian, 2025, Chapter 22, 978-981-96-4730-9, 444, 10.1007/978-981-96-4731-6_22 |