Loading [MathJax]/jax/output/SVG/jax.js
Review Special Issues

Breakthroughs in the discovery and use of different peroxidase isoforms of microbial origin

  • Peroxidases are classified as oxidoreductases and are the second largest class of enzymes applied in biotechnological processes. These enzymes are used to catalyze various oxidative reactions using hydrogen peroxide and other substrates as electron donors. They are isolated from various sources such as plants, animals and microbes. Peroxidase enzymes have versatile applications in bioenergy, bioremediation, dye decolorization, humic acid degradation, paper and pulp, and textile industries. Besides, peroxidases from different sources have unique abilities to degrade a broad range of environmental pollutants such as petroleum hydrocarbons, dioxins, industrial dye effluents, herbicides and pesticides. Ironically, unlike most biological catalysts, the function of peroxidases varies according to their source. For instance, manganese peroxidase (MnP) of fungal origin is widely used for depolymerization and demethylation of lignin and bleaching of pulp. While, horseradish peroxidase of plant origin is used for removal of phenols and aromatic amines from waste waters. Microbial enzymes are believed to be more stable than enzymes of plant or animal origin. Thus, making microbially-derived peroxidases a well-sought-after biocatalysts for versatile industrial and environmental applications. Therefore, the current review article highlights on the recent breakthroughs in the discovery and use of peroxidase isoforms of microbial origin at a possible depth.

    Citation: Pontsho Patricia Twala, Alfred Mitema, Cindy Baburam, Naser Aliye Feto. Breakthroughs in the discovery and use of different peroxidase isoforms of microbial origin[J]. AIMS Microbiology, 2020, 6(3): 330-349. doi: 10.3934/microbiol.2020020

    Related Papers:

    [1] Kun Han, Feng Jiang, Haiqi Zhu, Mengxuan Shao, Ruyu Yan . Learning cooperative strategies in StarCraft through role-based monotonic value function factorization. Electronic Research Archive, 2024, 32(2): 779-798. doi: 10.3934/era.2024037
    [2] Gaosong Shi, Qinghai Zhao, Jirong Wang, Xin Dong . Research on reinforcement learning based on PPO algorithm for human-machine intervention in autonomous driving. Electronic Research Archive, 2024, 32(4): 2424-2446. doi: 10.3934/era.2024111
    [3] Shi Wang, Sheng Li, Hang Yu . A power generation accumulation-based adaptive chaotic differential evolution algorithm for wind turbine placement problems. Electronic Research Archive, 2024, 32(7): 4659-4683. doi: 10.3934/era.2024212
    [4] Xiaochen Mao, Weijie Ding, Xiangyu Zhou, Song Wang, Xingyong Li . Complexity in time-delay networks of multiple interacting neural groups. Electronic Research Archive, 2021, 29(5): 2973-2985. doi: 10.3934/era.2021022
    [5] Longchao Da, Hua Wei . CrowdGAIL: A spatiotemporal aware method for agent navigation. Electronic Research Archive, 2023, 31(2): 1134-1146. doi: 10.3934/era.2023057
    [6] Yi Gong . Consensus control of multi-agent systems with delays. Electronic Research Archive, 2024, 32(8): 4887-4904. doi: 10.3934/era.2024224
    [7] Yu-Jing Shi, Yan Ma . Finite/fixed-time synchronization for complex networks via quantized adaptive control. Electronic Research Archive, 2021, 29(2): 2047-2061. doi: 10.3934/era.2020104
    [8] Ariel Leslie, Jianzhong Su . Modeling and simulation of a network of neurons regarding Glucose Transporter Deficiency induced epileptic seizures. Electronic Research Archive, 2022, 30(5): 1813-1835. doi: 10.3934/era.2022092
    [9] Agustín Moreno Cañadas, Pedro Fernando Fernández Espinosa, José Gregorio Rodríguez-Nieto, Odette M Mendez, Ricardo Hugo Arteaga-Bastidas . Extended Brauer analysis of some Dynkin and Euclidean diagrams. Electronic Research Archive, 2024, 32(10): 5752-5782. doi: 10.3934/era.2024266
    [10] Majed Alowaidi, Sunil Kumar Sharma, Abdullah AlEnizi, Shivam Bhardwaj . Integrating artificial intelligence in cyber security for cyber-physical systems. Electronic Research Archive, 2023, 31(4): 1876-1896. doi: 10.3934/era.2023097
  • Peroxidases are classified as oxidoreductases and are the second largest class of enzymes applied in biotechnological processes. These enzymes are used to catalyze various oxidative reactions using hydrogen peroxide and other substrates as electron donors. They are isolated from various sources such as plants, animals and microbes. Peroxidase enzymes have versatile applications in bioenergy, bioremediation, dye decolorization, humic acid degradation, paper and pulp, and textile industries. Besides, peroxidases from different sources have unique abilities to degrade a broad range of environmental pollutants such as petroleum hydrocarbons, dioxins, industrial dye effluents, herbicides and pesticides. Ironically, unlike most biological catalysts, the function of peroxidases varies according to their source. For instance, manganese peroxidase (MnP) of fungal origin is widely used for depolymerization and demethylation of lignin and bleaching of pulp. While, horseradish peroxidase of plant origin is used for removal of phenols and aromatic amines from waste waters. Microbial enzymes are believed to be more stable than enzymes of plant or animal origin. Thus, making microbially-derived peroxidases a well-sought-after biocatalysts for versatile industrial and environmental applications. Therefore, the current review article highlights on the recent breakthroughs in the discovery and use of peroxidase isoforms of microbial origin at a possible depth.


    In the past two decades, digital watermarking technology has played an increasingly important role in the field of information security. By embedding specific watermarks into digital works such as images [1,2], audio [3,4] or video [5], it can achieve the purposes of copyright tracking, integrity protection, content authentication, medical security and so on.

    With the wide application of audio on the Internet, people are paying more and more attention to the copyright protection of audio, which attracts many scholars to research audio watermarking technology. Salah et al. [6] presented an audio watermarking algorithm by using a discrete Fourier transform, which has high transparency but poor robustness. Bhat et al. [7] proposed an audio watermarking algorithm based on a discrete cosine transform (DCT). The algorithm used singular value decomposition to achieve blind watermark extraction, and it had strong robustness to some signal processing operations, but its payload capacity was low. Hu and Hsu [8] proposed a sufficient audio watermarking algorithm in the discrete wavelet transform domain by applying the spectrum shaping technology into vector modulation. Authors claimed the payload capacity reached 818.26 bits per second (bps). Hwang et al. [9] designed an audio watermarking algorithm with singular value decomposition and quantization index modulation in order to reach blind extraction. This algorithm applied singular value decomposition on the stereo signal to achieve strong robustness against amplitude scaling, MP3 compression and resampling, but its transparency was low. Merrad [10] developed a robust audio watermarking algorithm based on the strong correlation between two continuous samples in a hybrid domain that consisted of a discrete wavelet transform and DCT. With the increasingly widespread application of audio watermarking algorithms, people have put forward higher and higher requirements for the performance of the algorithm. How to resist malicious attacks on audio has always been a challenging issue in the research of audio watermarking algorithms. Yamni et al. [11] proposed a blind and robust audio watermarking algorithm by combining the discrete Tchebichef moment transform, the chaotic system of the mixed linear–nonlinear coupled map lattices and a discrete wavelet transform. This algorithm achieved good results in terms of robustness and payload capacity, but no experimental results against synchronous attacks were found. A robust and blind audio watermarking scheme based on the dual tree complex wavelet transform and the fractional Charlier moment transform was proposed in paper [12]. It also obtained high imperceptibility and robustness against most common audio processing operations. Synchronous attacks may seriously destroy the structure of audio data in the embedding process, which will make the extracting algorithm unable to accurately search the location of a watermark in the carried audio [13,14]. Therefore, how to resist synchronization attacks is the bottleneck in improving the robustness of algorithms [15]. A robust audio watermarking algorithm for overcoming synchronous attacks was proposed in paper [16]. This algorithm took the audio frame sequence number as a global feature to carry the watermark, and it could resist partial synchronization attacks. Hu et al. [17] explored the distributive feature of the approximate coefficients to develop an audio watermarking algorithm with a self-synchronization mechanism in a discrete wavelet transform. This algorithm reconstructed and reshaped the wavelet coefficients for tracking the locations of the watermark. It had strong robustness to attacks, but its transparency only was a low level. An audio watermarking algorithm for resisting during de-synchronization and recapturing attacks was developed in a previous paper [18]. In this algorithm, the logarithmic mean feature was constructed to design the embedding and extracting algorithm according to the residuals of the two sets of features. He et al. [19] proposed a novel audio watermarking by embedding watermarks into the frequency domain power spectrum feature to resist recapturing attacks. From the analysis of the above literatures, it can be seen that embedding a watermark on some stable features can effectively improve the robustness of the algorithm. The main reason is that these features will not change much due to the stable performance when the audio is attacked, so the embedded watermark will not be easily lost.

    The performance of an audio watermarking algorithm is not only related to the embedding and extracting rules, but it is also related to the setting of algorithm parameters, so how to choose the parameters in the application is particularly important. When different applications put forward new requirements for payload capacity, transparency and robustness, the watermarking algorithm usually cannot accurately adjust its parameters to meet these performance requirements. Nowadays, parameters of most audio watermarking algorithms are chosen by the users according to their experience in application, or are adjusted by the designers according to the performance achieved by the algorithm in experiments. These methods lack an effective parameter adjustment mechanism and cannot effectively stimulate the performance of the algorithm. Robustness, transparency, and payload capacity are three important indicators of audio watermarking algorithms, and these indicators are determined by multiple algorithm parameters. Therefore, how to set these parameters so that all three indicators can meet performance requirements is a multi-parameter and multi-objective combinatorial optimization problem.

    In order to solve the above problems, some scholars have used meta-heuristic algorithms to optimize the parameters of watermarking algorithms. Meta-heuristic algorithms are self-organized and decentralized algorithms used for solving complex problems using team intelligence [20]. Wu et al. [21] proposed an audio watermarking algorithm based on a genetic algorithm for parameter optimization. This algorithm had high transparency and a large payload capacity, but it was not robust against attacks due to the lack of a synchronization mechanism. Kaur et al. [22] also proposed an audio watermarking method with a genetic algorithm which was used to find the optimal number of audio samples needed to conceal the watermark. Some scholars have attempted to apply sine and cosine algorithms to the design of image watermarking algorithms [23,24]. With the deepening of the research on watermarking technology, more and more watermarking algorithms based on meta-heuristic algorithms were explored. They all play a positive role in improving the performance of watermarking algorithms, but there are still many problems to be solved in the practical application.

    Based on the above analysis, weak robustness and a multi-parameter optimization problem are still urgent issues in the current research and application of audio watermarking algorithms. In our research, an adaptive and blind audio watermarking algorithm based on dither modulation and a BOA is proposed. The main contributions are as follows.

    1) We propose a robust and blind audio watermarking algorithm based on convolution and dither modulation. A stable feature is designed using convolution operations, and dither modulation is performed on this feature to design embedding and extracting algorithms. The stability of this feature improves the robustness of the algorithm to prevent watermark loss. The algorithm has the capability of blind extraction, and the watermark can be extracted only by comparing the feature value and quantized value, which will be very convenient for the algorithm to be applied in practice.

    2) We propose a method for setting the parameters to solve the multi-parameter and multi-objective problem of audio watermarking algorithms, which can adaptively adjust the algorithm parameters with the performance requirements. The BOA is used to optimize the key parameters of the algorithm which can be adaptively matched for the performance requirements by coding the population and constructing the fitness function. In the case of meeting the performance requirements of transparency and payload capacity, the fitness function of the BOA is constructed by the total bit error ratio (BER), which is a comprehensive evaluation of the watermark extracted from the carried audio after it has been subjected to multiple malicious attacks. Through global search and local search, the population is continuously optimized to search for the global optimal butterflies, so as to improve the robustness under specific performance requirements.

    In this section, the embedding and extracting principle of the proposed algorithm will be described in detail. A feature which is closely linked to the change of the intermediate frequency coefficient is designed by convolving the low frequency coefficient and the intermediate frequency coefficient. When embedding the watermark, the feature will be quantized by dither modulation, and the direction of dither modulation is controlled by the value of a binary watermark. When extracting the watermark, the feature will be calculated and uniformly quantized, and the binary watermark will be obtained by comparing the feature value and the quantized value.

    Based on the energy concentration characteristics of the DCT and the bidirectional quantization characteristics of dither modulation [25,26], a feature is explored to carry the watermark in the DCT domain, and then the binary watermark can be embedded into the audio by modifying the feature with dither modulation.

    The original audio with N sample-points can be supposed as x(n) (1nN). The binary watermark W that will be embedded into the audio can be expressed as the formula (1).

    W={win(l,m),1lL1,1mL2} (1)

    where win(l,m){0,1}. Divide x(n) into L1 audio fragments, and use the synchronization mechanism proposed in a previous paper [27] to select the voiced frame with the highest energy xl(n0) (1n0N1) with N1 sample-points from each audio fragment to carry the watermark.xl(n0) will be processed by the DCT using the formulas (2) and (3).

    Xl(0)=1N1N1n0=0xl(n0),k=0 (2)
    Xl(k)=2N1N1n0=0xl(n0)cos(2n0+1)kπ2N1,k0 (3)

    where Xl(0) is the component with a frequency of 0 Hz, and Xl(k) is the harmonic component with fk Hz. fk is the frequency of each harmonic component, calculated by using the formula (4), and fs is the sampling-rate.

    fk=kfs2N1(k0) (4)

    Assumed that Xl0(k) and Xlm(k) respectively represent the low frequency-band and intermediate frequency-band containing N2 spectral lines from Xl(k). r0 and r1 are the positions of the first spectral line of Xl0(k) and Xl1(k) in Xl(k). The watermark is embedded into audio fragments by modifying Xlm(k), and the carried frequency-band Xlm(k) which carries the L2 bit watermark can be represented by the formula (5), where ρm is a constant, indicating the change proportion of the intermediate frequency coefficients Xlm(k).

    Xlm(k)=ρmXlm(k) (5)

    The feature CFlm shown in the formula (6) can be used to represent the change of the intermediate frequency-band relative to the low frequency-band.

    CFlm=Xl0(k)Xlm(k)/2N21|Xl0(k)|2/N2 (6)

    where represents the convolution operation on Xl0(k) and Xlm(k). The numerator of this formula refers to the average value of the convolution result, and the denominator means the average value of the square of the magnitude of Xl0(k). Quantize CFlm at an equal interval δ, and the quantized value CFQlm can be shown in the formula (7).

    CFQlm=round(CFlmδ) (7)

    round() means that the data point in the brackets is equal to its nearest integer. Modulate win(l,m) into a bipolar bitstream w(l,m) according to the formula (8).

    w(l,m)={1win(l,m)=11win(l,m)=0 (8)

    The embedding rule for embedding L2 bits watermark into xl(n0) can be expressed as the formula (9).

    CFlm=δCFQlm+δw(l,m)4 (9)

    According to the formulas (5) and (6), the carried feature CFlm can also be showed in the formula (10).

    CFlm=Xl0(k)Xlm(k)/2N21|Xl0(k)|2/N2=ρmCFlm (10)

    It can be seen that CFlm changes in equal proportion similar to the change of Xlm(k), so Xlm(k) can be changed by modifying CFlm in order to embed L2 bits watermark into the audio fragment xl(n). The change proportion ρm can be expressed as the formula (11).

    ρm=CFlmCFlm=Xlm(k)Xlm(k)=δCFQlm+δw(l,m)4N2Xl0(k)xlm(k)2N21|Xl0(k)|2 (11)

    Therefore, watermarks can be concealed into an audio fragment by modifying the intermediate frequency-band coefficients Xlm(k), and the change proportion ρm can be calculated according to the formula (11).

    Figure 1 shows the flow diagram of the embedding algorithm, and the embedding steps can be described as follows in detail.

    Figure 1.  Flow diagram of the embedding algorithm.

    Step 1: Convert the watermark into a binary-string win(l,m) and modulate it to obtain a bipolar bit-stream w(l,m).

    Step 2: Divide x(n) into L1 fragments to obtain xl(n0).

    Step 3: Apply a DCT to xl(n0) to obtain the DCT coefficients Xl(k).

    Step 4: Select Xl0(k) and Xlm(k) from Xl(k).

    Step 5: Calculate CFlm according to the formulas (6).

    Step 6: Quantize CFlm to get CFQlm according to the formulas (7).

    Step 7: Embed L2 bits watermark into xl(n0), and get the carried feature CFlm according to the formulas (9).

    Step 8: Calculate ρm according to the formulas (11).

    Step 9: Calculate the carried frequency-band Xlm(k) according to the formulas (5), and Substitute Xlm(k) to obtain the carried spectrum Xl(k).

    Step10: Obtain the carried audio fragment xl(n0) by applying an inverse DCT to Xl(k).

    Step 11: Repeat step 3 to step 10 until all bits of the watermark are concealed into the audio.

    Step 12: Reconstruct all xl(n0) to obtain the carried audio x(n).

    According to the embedding principle described in Section 2.1, the binary watermark can be concealed into the audio by applying dither modulation to the feature. In the extracting process, the feature will also be quantized at the same interval as the embedding process, and then the binary watermark can be extracted without the original audio by comparing the feature value with the quantized value.

    Divide the carried audio x(n) to get L1 audio fragments xl(n0) which will be applied in the DCT to obtain Xl(k). Calculate CFlm with the formula (6), and quantize CFlm at δ to obtain CFQlm with the formula (7). The quantized value CFlm can be calculated with the formula (12).

    CFlm=δCFQlm (12)

    The extracting rule for obtaining L2 bits watermark wout(l,m) from xl(n0) can be expressed as the formula (13).

    wout(l,m)={1CFlmCFlm0CFlm>CFlm (13)

    Figure 2 shows the flow diagram of the extracting algorithm, and the extracting steps can be described as follows in detail.

    Figure 2.  Flow diagram of the extracting algorithm.

    Step 1: Divide the carried audio x(n) into L1 audio fragments to obtain xl(n0).

    Step 2: Apply a DCT to xl(n0) to obtain the DCT coefficients Xl(k).

    Step 3: Select Xl0(k) and Xlm(k) from Xl(k).

    Step 4: Calculate CFlm with the formulas (6).

    Step 5: Quantize CFlm to get CFQlm with the formulas (7).

    Step 6: Calculate CFlm with the formula (12).

    Step 7: Extract the L2 bits watermark from xl(n0) with the formula (13).

    Step 8: Repeat step 2 to step 7 until all bits of the watermark are extracted.

    In order to stimulate the performance in different applications, the parameters of the algorithm must be set adaptively to meet the different performance requirements. The BOA is a new nature-inspired optimization algorithm developed in 2019. It can be used to solve the global optimization problem by imitating the food-searching and mating behavior of butterflies, and it has the advantages of fast convergence and strong searching ability [28]. There are four important key parameters (r0, r1, N2, δ) in the proposed algorithm, which have a significant impact on the overall performance of the algorithm.

    It is assumed that the initial population POP has M butterflies, and the position of each butterfly consists of four key parameters, as shown in the formula (14).

    POP=[B1BiBM]=[r01r11N21r0ir1iN2ir0Mr1MN2Mδ1δiδM] (14)

    where Bi=(r0ir1iN2iδi) (1iM) represents the ith butterfly, and r0i, r1i, N2i, δi mean that they take random values on their respective ranges [Min(r0), Max(r0)], [Min(r1), Max(r1)], [Min(N2), Max(N2)] and [Min(δ), Max(δ)]. Min() and Max() represent the minimum and maximum values of the variables in brackets respectively. Each butterfly emits a certain intensity of fragrance fi, which can be expressed in the formula (15).

    fi=cIi (15)

    where c is the perceptual form, is the power index, and I is the stimulus factor. Normally, c and are constants, and Ii is related to the fitness function of this butterfly. Fitness function Fiti comprehensively considers three indicators, including payload capability, transparency and robustness under various attacks in the proposed algorithm, as shown in the formula (16).

    Fiti=1Ii=Aj=1ajBERj,1jA (16)

    The boundary conditions of the above formula are SNR>SNR0 and Cap>Cap0, where SNR is the signal-to-noise ratio (SNR), as expressed as the formula (17). Cap is the payload capacity of this algorithm. SNR0 and Cap0 respectively indicate the thresholds of transparency and payload capacity that need to be provided. A indicates the total number of attacks, and BERj means the BER of the extracted watermark after applying the jth attack on the carried audio, as expressed in the formula (18). aj indicates the importance of the jth attack in total attack types, and Aj=1aj=1.

    SNR=10lg(Nn=1x2(n)Nn=1(x(n)x(n))2) (17)
    BER=L1l=1L2m=1win (l,m)wout (l,m)L1L2×100% (18)

    A butterfly can conduct a random local search near its self-position, or they can move towards the butterfly with the highest fragrance value and conduct a global search. Assume that there is a switch probability p. When there is a need to update the position of the butterfly Bti in the tth iteration, a random number r is generated. If rp, then the butterfly performs a local search, and its new position Bt+1i will be updated according to the formula (19).

    Bt+1i=Bti+(r2×Bti0Bti1)×fi,1i0,i1M (19)

    where Bti0 and Bti1 represent the positions of the i0th butterfly and the i1th butterfly in the tth iteration. Else, the butterfly will perform a global search, and its new position Bt+1i will be updated according to the formula (20).

    Bt+1i=Bti+(r2×gBti)×fi (20)

    where g represents the position of the best butterfly with the highest fragrance value in the tth iteration. The optimization process can be described as follows in detail.

    Step 1: Initialize the population and parameters. Set the perceptual form c, the power index , the switch probability p, the population size M, the maximum number of iterations MaxG, SNR0 and Cap0, and then produce an initial population POP0.

    Step 2: Put four parameters from each butterfly into the embedding algorithm in order to get the carried audio, and then calculate SNR with the formula (17).

    Step 3: Select all qualified butterflies with performance that meets the boundary conditions, and run the embedding algorithm to get the carried audio.

    Step 4: Perform attack. Apply malicious attacks to the carried audio respectively, and then carry out the extracting algorithm to calculate BERj with the formula (18).

    Step 5: Calculate Fiti with the formula (16) to obtain the best butterfly in the current population.

    Step 6: Calculate fi of each butterfly with the formula (15).

    Step 7: Generate r and compare it with p. If rp, update the position according to the formula (19); else, update the position with the formula (20).

    Step 8: Repeat Step 2 to Step 7 until the maximum number of iterations reaches MaxG or the same global best butterfly occurs in five consecutive iterations.

    This section will evaluate the performance of the proposed algorithm in terms of payload capacity, transparency, robustness and complexity. Transparency is measured using the SNR and the object difference grade (ODG) which is the key output of the perceptual evaluation of audio quality. In addition, the transparency can be evaluated by observing the audio changes before and after embedding the watermark from the waveform and spectrogram. Robustness can be evaluated with the BER, normalized correlation (NC) which can be expressed as the formula (21) and structural similarity (SSIM) proposed by the laboratory for image and video engineering of the university of Texas at Austin to reflect the similarity between the extracted watermark and the original watermark. If the extracted watermark is very similar to the original watermark, NC and SSIM all will be very close to 1, which indicates that the robustness is strong. Complexity can be measured by the elapsed time consumed by the embedding algorithm and the extracting algorithm.

    NC=L1l=1L2m=1win(l,m)wout(l,m)L1l=1L2m=1win(l,m)2L1l=1L2m=1wout(l,m)2 (21)

    Here, we will list the experimental parameters and conditions in our test: 1) Algorithm parameters: M=50, c=0.1, ∝=0.1, p=0.8, MaxG = 500, N1=4096, aj=0.1, (j=1,2,10), Min(r0) = 1, Max(r0) = 100, Min(r1) = 100, Max(r1) = 1000, Min(N2) = 1, Max(N2) = 20, Min(δ) = 0, Max(δ) = 2; 2) Twenty 64-second audio signals which come from the TIMIT standard database including popular and symphony music were tested, and they were formatted by WAV, sampled at 44,100 Hz and quantized at 16 bits; 3)There were two groups of experiments according to the different watermarks. The first watermark was a binary image shown as Figure 3(a) with the size of 43 × 64, Cap0=40bps, and SNR0=27dB; The second watermark is shown as Figure 3(b) with the size of 86 × 64, Cap0=80bps and SNR0=26dB; 4) Computer system: 64-bit Microsoft Windows 10; 5) Programming language: Matlab 2016R.

    Figure 3.  Two watermarks: (a) The first image with 43 × 64; (b) The second image with 86 × 64.

    Payload capacity refers to the bit number of the watermark that can be contained in audio per second. In our study, the payload capacity is related to the size of the watermark and the duration T of the audio, so it can be calculated by the formula (22). The duration T of the audio was about 64 seconds, and the size of the first watermark was 43 × 64 bits, so the pay-load capacity in the first group was 43 bps. Similarly, the payload capacity in the second group was 86 bps.

    Cap=L1L2T (22)

    The average experimental results for the SNR (dB), ODG, BER (%), NC, SSIM and Cap (bps) are listed in Table 1. "Yes" in Table 1 indicates the watermarking algorithm with the BOA. "No" indicates the watermarking algorithm without the BOA, and its key parameters (r0, r1, N2, δ) were set as (20,600,5,0.4).

    Table 1.  Average results under no attack.
    Item 1st group 2nd group Paper [9] Paper [13] Paper [17] Paper [21]
    Yes No Yes No
    SNR 27 24 26 23 25 31 19 26
    ODG −0.75 −0.85 −1.02 −0.98 −0.81 −0.08 −3.24 −1.18
    BER 0.00 0.12 0.05 0.16 0.06 0.00 0.00 0.00
    NC 1 0.98 0.99 0.98 0.99 0 1 0
    SSIM 1 1 1 1 1 1 1 1
    Cap 43 43 86 86 43 43 86 86

     | Show Table
    DownLoad: CSV

    According to the standards of the international federation of the phonographic industry (IFPI) for audio watermarking algorithms, the SNR should be more than 20 dB and payload capacity should be greater than 20 bps. It can be seen from the data of two groups in Table 1 that the average SNR values with the BOA were 27 dB and 26 dB, while the average SNR values without the BOA were 24 dB and 23 dB, which indicates that the proposed algorithm meets the standards of the IFPI in terms of transparency and payload capacity, and the proposed algorithm achieved good transparency under the payload capacities of 43 bps and 86 bps. Compared with other algorithms with the same payload capacity, the transparency of this proposed algorithm was the same as that of the algorithms in a previous study [21], far superior to the algorithm in [9] and [17], but inferior to the algorithm in [13].

    Figure 4 shows the waveform comparison of the original audio and the carried audio respectively. In order to display the details of the audio more clearly, only a 5-second audio clip is shown here. Their spectrograms under different payload capacities are shown in Figure 5. It can be seen that the waveforms and spectrograms of the original audio and the carried audio with different watermarks all have no visible changes, which also indicates that the transparency of this algorithm is high. The main reasons are as follows. Firstly, the watermark is only embedded in the intermediate frequency coefficients, and the location of the watermark can be adjusted by optimizing the key parameters. Second, the algorithm only modifies the DCT coefficient by dither modulation, so the audio data are less damaged. The frequency range with watermarks can be calculated according to the formula (4).

    Figure 4.  Waveform comparison. (a) Original audio. (b) Carried audio with the first watermark. (c) Carried audio with the second watermark.
    Figure 5.  Spectrogram comparison. (a) original audio. (b) Carried audio with the first watermark. (c) Carried audio with the second watermark.

    Table 1 also shows the robustness results under no attack. It can be seen that all algorithms can perfectly extract watermarks from the carried audio without any attacks. The robustness against malicious attacks will be discussed in this section. Two watermarks with different sizes are embedded into the audio respectively, and then different attacks are performed on the carried audio. In the case of meeting the transparency requirements, the BOA is used to adaptively select the algorithm parameters that minimize the fitness function according to the formula (16), so that the algorithm can achieve the strongest robustness against these attacks. Attack types can be shown as follows.

    A. Noise addition: Add Gaussian noise with 30 dB into the carried audio.

    B. Echo addition: Add an echo with a delay of 50 ms into the carried audio.

    C. MP3 compression: Apply MPEG-1 layer 3 compression at a bit rate of 128 kbps.

    D. Low-pass filtering: Apply a low-pass filter with a cutoff frequency of 12 kHz.

    E. Re-quantization: Re-quantize the carried audio with 8 bits per sample, and back into 16 bits per sample.

    F. Re-sampling: Re-sample the carried audio with 22.05 kHz and back into 44.1 kHz.

    G. Amplitude scaling: Scale the amplitude at a factor of 0.8.

    H. Time scale modification (TSM): Apply TSM with 1% on the carried audio.

    I. Jittering: Randomly delete one audio sample from every 1000 samples in the carried audio.

    J. Random cropping: Randomly cut out 100 samples from the carried audio.

    The above attacks were applied to the carried audio one by one. The average results of the BER (%) are listed in Table 2. The extracted watermarks corresponding to the global best butterfly, NC and SSIM are shown in Figures 6 and 7.

    Table 2.  Robustness comparison with other algorithms.
    Item 1st group 2nd group Paper [9] Paper [13] Paper [17] Paper [21]
    Yes No Yes No
    A 0.00 0.32 0.78 1.02 11.96 0.49 0.02 1.25
    B 0.08 0.39 0.97 1.54 18.64 0.18 0.34 0.16
    C 0.53 0.86 0.82 1.41 19.97 0.24 0.01 0.18
    D 0.00 0.19 0.76 1.12 0.28 1.27 0.00 0.09
    E 0.00 0.62 0.72 1.21 0.76 1.89 0.01 0.25
    F 0.55 0.98 1.03 1.57 0.89 0.00 0.01 0.12
    G 0.00 0.16 0.46 0.88 0.33 0.05 0.01 0.08
    H 10.42 13.03 12.21 16.44 48.25 38.45 5.71 42.89
    I 1.64 2.69 2.53 3.87 25.19 28.42 1.78 32.59
    J 0.57 1.24 1.57 2.11 22.82 29.17 0.87 46.24

     | Show Table
    DownLoad: CSV
    Figure 6.  The first extracted watermarks. (a) Noise addition (30 dB). (b) Echo addition (50 s). (c) MP3 compression (128 kbps). (d) Low-pass filtering (12 kHz). (e) Re-quantization. (f) Re-sampling. (g) Amplitude scaling (0.8). (h) TSM (1%). (i) Jittering (1000). (j) Random cropping (100). (k) no attack.
    Figure 7.  The second extracted watermarks. (a) Noise addition (30 dB). (b) Echo addition (50 s). (c) MP3 compression (128 kbps). (d) Low-pass filtering (12 kHz). (e) Re-quantization. (f) Re-sampling. (g) Amplitude scaling (0.8). (h) TSM (1%). (i) Jittering (1000). (j) Random cropping (100). (k) no attack.

    From the experimental results of two groups in Table 2, it can be seen that the proposed algorithm with the BOA shows strong robustness under different payload capacities. After the payload capacity was doubled, the experimental results in the second group became larger than those in the first group, indicating that the robustness decreases as the payload capacity increases. In addition, the robustness of the algorithm with the BOA was stronger than the algorithm without the BOA, indicating that BOA is effective in improving the robustness by optimizing multiple key parameters.

    When the carried audio was subjected to noise addition at 30 dB, echo addition at 50ms, MP3 compression at 128 kbps, low-pass filtering at 12 kHz, re-quantization, re-sampling, amplitude scaling and random cropping, the proposed algorithm with the BOA showed particularly excellent robustness, which can be reflected by the following three points: 1) All BER values are very close to 0 in Table 2. 2) The extracted watermarks are very clear in Figures 6 and 7. 3) All NC and SSIM values are very close to 1 in Figures 6 and 7.

    The proposed algorithm with the BOA showed good robustness when a jittering attack was applied to the carried audio. The extracted watermark was very similar to the original watermark, as shown in Figure 6(i) and Figure 7(i). The BER values were 1.64% and 2.53% under two payload capacities, and NC values were higher than 0.96.

    Under TSM attack, the BER values in the two groups of experiments reached 10.42% and 12.21% respectively, indicating that the robustness of the proposed algorithm against TSM is weak. However, these results still meet IFPI, and the main information can be distinguished from the extracted images, as seen in the Figure 6(h) and Figure 7(h).

    From the comprehensive results of transparency, hiding capacity, and robustness, the proposed algorithm with the BOA has stronger robustness than those in [9] and [13] under the payload capacity with 43 bps when resisting most attacks. When the payload capacity reaches 86 bps, this proposed algorithm has higher transparency, but worse robustness against attacks than that in [17]. This is mainly because the SNR of the algorithm in [17] is only 19 dB, which does not meet the IFPI standard, so it traded for strong robustness by reducing transparency. The proposed algorithm with the BOA has the same payload capacity and transparency as that in [21], and it is more robust when resisting noise addition, amplitude scaling, TSM, jittering and random cropping. It can be viewed from the above analysis that the robustness and transparency of this algorithm are excellent under different payload capacities. This is mainly because of the following two reasons: 1) The feature designed by using convolution is relatively stable, which makes the watermark embedded in it also very stable and will not easily lost when the carried audio is attacked. 2) With the minimum total BER as the optimization goal, the BOA can adaptively search the most suitable key parameters according to the performance requirements, which makes the proposed algorithm have the strong robustness in resisting various attacks.

    Complexity is an important indicator for evaluating the performance of a watermarking algorithm. The lower the complexity, the less time it takes for the algorithm to embed and extract the watermark. Table 3 lists the average runtime (seconds) of the proposed algorithm and four related algorithms in embedding and extracting process.

    Table 3.  Complexity comparison with other algorithms (seconds).
    Item 1st group 2nd group Paper [9] Paper [13] Paper [17] Paper [21]
    Yes No Yes No
    Embed 856 1.80 1147 1.91 2.95 3.42 2.89 1526
    Extract 0.92 0.92 1.08 1.08 1.79 2.59 1.84 1.89

     | Show Table
    DownLoad: CSV

    According to the experimental results, when embedding watermark, the running time of the algorithm with the BOA is much higher than that of the algorithm without the BOA, mainly because the BOA needs to run the embedding program and extraction program repeatedly when optimizing the parameters of the watermark algorithm. The extracting time of the two groups is basically the same, which indicates that the algorithm with the BOA does not increase the complexity in the extracting process. Compared with papers [9,13,17], the proposed algorithm without the BOA has lower complexity due to its shorter running time. The algorithm proposed in [21] costs 1526 seconds to embed the watermark, which is much higher than that of our proposed algorithm with the BOA. The main reason is that the BOA is simpler than the genetic algorithm used in [21] and can quickly jump out of the local optimal solution.

    Based on the experimental results of the above four indicators, the following points can be summarized: 1) The algorithm has stronger robustness by embedding watermarks on the stable feature. 2) The algorithm can adaptively search for the optimal parameters to meet the requirements of transparency and payload capacity in practical applications, thereby improving the overall performance of the algorithm. 3) Under the same payload capacity and transparency, the algorithm with the BOA has stronger robustness than the algorithm without the BOA, but the BOA increases the complexity in the embedding process.

    An adaptive audio watermarking algorithm based on dither modulation and the BOA has been proposed to improve the poor robustness and optimize the key parameters of audio watermarking. Based on convolutional operation and dither modulation, a watermark will be embedded into the stable feature to prevent watermark loss. When extracting the watermark, a binary watermark can be extracted by comparing the feature value and the quantized value without the original audio, which is very convenient for practical application. In order to match the key parameters of the algorithm with the performance requirements in different applications, the BOA is used to optimize the key parameters of the algorithm. Under the condition of meeting the two indicators of payload capacity and transparency, a fitness function composed of the BER under various attacks is constructed. In the process of continuous iteration, the key parameters of the algorithm are adaptively optimized by searching for the position of the butterfly with the largest fragrance.

    Experimental results demonstrate that the proposed algorithm with the BOA has good transparency, strong robustness, and the ability to search for the optimal parameters. Our research provides a solution to the multi-parameter and multi-objective optimization problem formed between the parameters and performance of watermarking algorithms. The population coding method and the construction scheme for the fitness function can also provide an example for other meta heuristic algorithms to be applied for the parameter optimization of watermarking algorithms. Compared with other related watermarking algorithms, although the proposed algorithm has achieved better results in terms of robustness and overall performance improvement, it still has problems, such as high complexity and weak robustness in resisting TSM. In future research, we will further explore the methods to overcome TSM, reduce the complexity, and focus on using more intelligent optimization algorithms to improve the overall performance of the watermark algorithm.

    This work was funded by the High-Level Talent Scientific Research Foundation of Jinling Institute of Technology, China (Grant No. jit-b-201918), Industry-university-research Cooperation Project of Jiangsu Province in 2022 (BY2022654), National Natural Science Foundation of China, China (Grant No. 11601202), Collaborative Education Project of the Ministry of Education (Grant no.202102089002) and Jiangsu Provincial Vice President of Science and Technology Project in 2022 (Grant no. FZ20220114).

    The authors declare that there is no conflict of interest.


    Acknowledgments



    The authors express their deepest gratitude to the research team at OMICS Research Group and Research Facility at the Department of Biotechnology, Vaal University of Technology for their technical support. The funding was provided by South African Bio-Design Initiative (SABDI) grant number 420/01 SABDI 16/1021 secured by Dr NA Feto.

    Conflict of interest



    The authors declare that they have no conflict of interest.

    Ethical approval



    This article does not contain any studies with human participants or animals performed by any of the authors.

    Funding



    The project was supported by South African Bio-Design Initiative (SABDI) grant number 420/01 SABDI 16/1021 secured by Dr NA Feto.

    [1] Karigar CS, Rao SS (2011) Role of microbial enzymes in the bioremediation of pollutants: A review. Enzyme Res 2011: 805187. doi: 10.4061/2011/805187
    [2] Chandrasekaran M, Kumar SR (2010) Marine microbial enzymes. Biotechnology 9: 1-15.
    [3] Opwis K, Kiehl K, Gutmann JS (2016) Immobilization of peroxidases on textile carrier materials and thier use in bleaching processes. Chem Eng Trans 49: 67-72.
    [4] Casciello C, Tonin F, Berini F, et al. (2017) A valuable peroxidase activity from the novel species Nonomuraea gerenzanensis growing on alkali lignin. Biotechnol Rep 13: 49-57. doi: 10.1016/j.btre.2016.12.005
    [5] Madhu A, Chakraborty JN (2017) Developments in application of enzymes for textile processing. J Cleaner Prod 145: 114-133. doi: 10.1016/j.jclepro.2017.01.013
    [6] Bansal N, Kanwar SS (2013) Peroxidase(s) in environment protection. Sci World J 2013: 714639. doi: 10.1155/2013/714639
    [7] Choi J, Detry N, Kim KT, et al. (2014) fPoxDB: fungal peroxidase database for comparative genomics. BMC Microbiol 14: 117. doi: 10.1186/1471-2180-14-117
    [8] Colpa DI, Fraaije MW, Bloois EV (2014) DyP-type peroxidase: a promising versatile class of enzymes. J Ind Microbiol Biotechnol 41: 1-7. doi: 10.1007/s10295-013-1371-6
    [9] Kolhe P, Ingle S, Wagh N (2015) Degradation of phenol containing wastewater by advance catalysis system–a review. Annu Res Rev Biol 8: 1-15. doi: 10.9734/ARRB/2015/19936
    [10] Lončar N, Colpa DI, Fraaije MW (2016) Exploring the biocatalytic potential of a DyP-type peroxidase by profiling the substrate acceptance of Thermobifida fusca DyP peroxidase. Tetrahedrom 72: 7276-7281. doi: 10.1016/j.tet.2015.12.078
    [11] Pandey VP, Bhagat PK, Prajapati R, et al. (2016) A defense associated peroxidase from lemon having dye decolorizing ability and offering resistance to heat, heavy metals and organic solvents. Biochem Anal Biochem 5: 291. doi: 10.4172/2161-1009.1000291
    [12] Passardi F, Theiler G, Zamocky M, et al. (2007) PeroxiBase: the peroxidase database. Phytochemistry 68: 1605-1611. doi: 10.1016/j.phytochem.2007.04.005
    [13] Rajkumar R, Yaakob Z, Takriff MS, et al. (2013) Optimization of medium composition for the production of peroxidase by Bacillus sp. Der Pharma Chemica 5: 167-174.
    [14] Zhang Z, Lai J, Wu K, et al. (2018) Peroxidase-catalyzed chemiluminescence system and its application in immunoassay. Talanta 180: 260-270. doi: 10.1016/j.talanta.2017.12.024
    [15] Patil SR (2014) Production and purification of lignin peroxidase from Bacillus megaterium and its application in bioremediation. CIBTech J Microbiol 3: 22-28.
    [16] Adewale IO, Adekunle AT (2018) Biochemical properties of peroxidase from white and red cultivars of Kola nut (Cola nitida). Biocatal Agric Biotechnol 14: 1-9. doi: 10.1016/j.bcab.2018.01.013
    [17] Cesarino I, Araujo P, Sampaio Mayer JL, et al. (2012) Enzymatic activity and proteomic profile of class III peroxidases during sugarcane stem development. Plant Physiol Biochem 55: 66-76. doi: 10.1016/j.plaphy.2012.03.014
    [18] Li J, Liu C, Li B (2015) Identification and molecular characterization of a novel DyP-type peroxidase from Pseudomonas aeruginosa PKE117. Appl Biochem Biotechnol 166: 774-85. doi: 10.1007/s12010-011-9466-x
    [19] Ganesh P, Dineshraj D, Yoganathan K (2017) Production and screening of depolymerising enymes by potential bacteria and fungi isolated from plastic waste dump yard sites. Int J Appl Res 3: 693-695.
    [20] Khelil O, Choubane S, Cheba BA (2015) Co-production of cellulases and manganese peroxidases by Bacillus sp. R2 and Bacillus Cereus 11778 on waste newspaper: application in dyes decolourization. Procedia Technol 19: 980-987. doi: 10.1016/j.protcy.2015.02.140
    [21] Pandey VP, Awasthi M, Singh S, et al. (2017) A comprehensive review on function and application of plant peroxidases. Biochem Anal Biochem 6: 1. doi: 10.4172/2161-1009.1000308
    [22] Pathak VM, Navneet (2017) Review on the current status of polymer degradation: a microbial approach. Bioresources Bioprocessing 4: 15. doi: 10.1186/s40643-017-0145-9
    [23] Wei R, Zimmermann W (2017) Microbial enzymes for the recycling of recalcitrant petroleum-based plastics: how far are we? Microb Biotechnol 10: 1308-1322. doi: 10.1111/1751-7915.12710
    [24] Zahmatkesh M, Spanjers H, van Lier JB, et al. (2017) Fungal treatment of humic-rich industrial wastewater: application of white rot fungi in remediation of food-processing wastewater. Environ Technol 38: 2752-2762. doi: 10.1080/09593330.2016.1276969
    [25] Xie X, Chen M, Aiyi Z (2017) Identification and characterization of two selenium-dependent glutathione proxidase 1 isoforms from Larimichthys croceaFish Shellfish Immunol 71: 411-422. doi: 10.1016/j.fsi.2017.09.067
    [26] Yoshida T, Sugano Y (2015) A structural and functional perspective of DyP-type peroxidase family. Arch Biochem Biophys 574: 49-55. doi: 10.1016/j.abb.2015.01.022
    [27] Datta R, Kelkar A, Baraniya D, et al. (2017) Enzymatic degradation of lignin in soil: a review. Sustainability 9: 1163. doi: 10.3390/su9071163
    [28] Min K, Gong G, Woo H, et al. (2015) A dye-decolorizing peroxidase from Bacillus subtilis exhibiting subtrate-dependent optimum temperature for dyes and beta-ether lignin dimer. Sci Rep 5: 8245. doi: 10.1038/srep08245
    [29] Bholay AD, Borkhataria BV, Jadhav PU, et al. (2012) Bacterial lignin peroxidase: a tool for biobleaching and biodegradation of industrial effluents. Universal J Environ Res Technol 2: 58-64.
    [30] Guisado G, Lopez MJ, Vargas-Garcia MC, et al. (2012) Pseudallescheria angusta, A lingninolytic microorganisms for wood fibres biomodification. Bioresources 7: 464-474.
    [31] Niladevi KN (2009) Lignolytic enzymes. Biotechnol Agro-Ind Residues Util 4: 397-414.
    [32] Osuji AC, Osayi EE, Eze SOO, et al. (2014) Biobleaching of industrial important dyes with peroxidase partially purified from garlic. Scientific World J 2014: 183163. doi: 10.1155/2014/183163
    [33] Baysal O, Yildiz A (2017) Bacillus subtilis: An industrially important microbe for enzyme production. EC Microbiol 5: 148-156. doi: 10.1186/s40168-017-0368-1
    [34] Dragana R, Nikola G, Željko D, et al. (2017) Separation of peroxidases from Miscanthus x giganteus, their partial characterisation and application for degradation of dyes. Plant Physiol Biochem 120: 179-185. doi: 10.1016/j.plaphy.2017.10.009
    [35] Chanwun T, Muhamad N, Chirapongsatonkul N, et al. (2013) Hecea brasiliensis cell suspension peroxidase: purification, chracterization and application for dye decolorization. AMB Express 3: 14. doi: 10.1186/2191-0855-3-14
    [36] van Bloois E, Torres Pazmino DE, Winter RT, et al. (2010) A robust and extracellular heme-containing peroxidase from Thermobifida fusca as prototype of a bacterial peroxidase superfamily. Appl Microbiol Biotechnol 86: 1419-1430. doi: 10.1007/s00253-009-2369-x
    [37] Shigeto J, Tsutsumi Y (2016) Diverse functions and reactions of class III peroxidases. New Phytol 209: 1395-1402. doi: 10.1111/nph.13738
    [38] Veitch NC (2004) Horseradish peroxidase: a modern view of a classic enzyme. Phytochemistry 65: 249-259. doi: 10.1016/j.phytochem.2003.10.022
    [39] Petrić M, Subotić A, Jevremović S, et al. (2015) Esterase and peroxidase isoforms in different stages of morphogenesis in Fritillaria meleagris L. in bulb-scale culture. Comptes Rendus Biologies 338: 793-802. doi: 10.1016/j.crvi.2015.08.002
    [40] Racz A, Hideg E, Czegeny G (2018) Selective responses of class III plant peroxidase isoforms to environmentally relevant UV-B doses. J Plant Physiol 221: 101-106. doi: 10.1016/j.jplph.2017.12.010
    [41] Kanwar SS, Bansal N (2014) Decolorization of industrial dyes by an extracellular peroxidase from Bacillus sp. F31. JAM 1: 252-265.
    [42] Gholami-Borujeni F, Mahvi AH, Naseri S, et al. (2011) Application of immobilized horseradish peroxidase for removal and detoxification of azo dye from aqueous solution. Res J Chem Environ 15: 217-221.
    [43] Shafi J, Tian H, Ji M (2017) Bacillus species as versatile weapons for plant pathogens a review. Biotechnol Biotechnol Equipment 31: 446-459. doi: 10.1080/13102818.2017.1286950
    [44] Matamoros MA, Saiz A, Penuelas M, et al. (2015) Function of glutathion peroxidase in legume root nodules. J Exp Bot 66: 2979-2990. doi: 10.1093/jxb/erv066
    [45] Silva MC, Torres JA, Corrêa AD, et al. (2012) Obtention of plant peroxidase and its potential for the decolorization of the reactive dye Remazol Turquoise G133%. Water Sci Technol 65: 669-675. doi: 10.2166/wst.2012.892
    [46] Singh R, Kumar M, Mittal A, et al. (2016) Microbial enzymes: industrial progress in 21st century. Biotechnology 6: 174.
    [47] Ruiz-Dueñas F, Fernández E, Martínez MJ, et al. (2011) Pleurotus ostreatus heme peroxidases: An in silico analysis from the genome sequence to the enzyme molecular strucuture. C R Biol 334: 795-805. doi: 10.1016/j.crvi.2011.06.004
    [48] Malomo SO, Adeoye RL, Babatunde L, et al. (2011) Suicide inactivation of horseradish peroxidase by excess hydrogen peroxide: the effects of reaction pH, buffer ion concentration, and redoz mediation. Biokemistri 23: 124-128.
    [49] Falade A, Mabinya L, Okoh A, et al. (2019) Studies on peroxidase productin and detection of Sporotrichum thermophile-like catalase-peroxidase gene in a Bacillus species isolated from Hogsback forest reserve, South Africa. Heliyon 5: e03012. doi: 10.1016/j.heliyon.2019.e03012
    [50] Simo C, Djocgoue PF, Minyaka E, et al. (2018) Guaicol proxidase heritability in tolerance of cocoa (Theobroma cacao L.) to Phytophthora megakarya, agent of cocoa black pod disease. Int J Agric Policy Res 6: 7-20.
    [51] Shahin SA, Jonathan S, Lary DJ, et al. (2017) Phytophthora megakarya and Phytophthora palmivora, closely related casual agents of cacao balsk pod rot, underwent increases in genome sizes and gene numbers by differnt mechanisms. Genome Biol Evol 9: 536-557. doi: 10.1093/gbe/evx021
    [52] Shahin SA, Jonathan S, Lary DJ, et al. (2017) Phytothora megakarya and P. palmivora, casual agents of black pod rot, induce similar plant defense responses late during infection of susceptible cacoa pods. Fontiers Plant Sci 18: 1-18.
    [53] Falade A, Mabinya L, Okoh A, et al. (2018) Peroxidases produced by new ligninolytic Bacillus strains isolated form marsh and grassland decolourized anthraquinone and azo dyes. Pol J Environ Stud 28: 3163-3172. doi: 10.15244/pjoes/92520
    [54] Husain Q (2010) Peroxidase mediated decolorizatio and remediation of wastewar containing industrial dyes: a review. Rev Environ Sci Biotechnol 9: 117-140. doi: 10.1007/s11157-009-9184-9
    [55] Karn SK, Fang G, Duan J (2017) Bacillus sp. acting as dual role for corrosion induction and corrosion inhibition with carbon steel (CS). Front Microbiol 8: 2038. doi: 10.3389/fmicb.2017.02038
    [56] Nayanashree G, Thippeswamy B (2015) Natural rubber degradation by laccase and manganese peroxidase enzymes of Penicillium chrysogenum. Int J Environ Sci Technol 12: 2665-2672. doi: 10.1007/s13762-014-0636-6
    [57] Nayanashree G, Thippeswamy B, Krishnappa M., et al. (2014) Enzymatic studies on Natural rubber biodegradation by Bacillus pumilusInt J Biological Res 2: 44-47.
    [58] Gopi V, Upgade A, Soundararajan N (2012) Bioremediation potential of individual and consortium Non-adapted fungal strains on Azo dye containing textile effluent. Adv Appl Sci Res 3: 303-311.
    [59] Ong ST, Keng PS, Lee WN, et al. (2011) Dye waste treatment. Water 3: 157-176. doi: 10.3390/w3010157
    [60] Ratanapongleka K, Phetsom J (2014) Decolorization of synthetic dyes by crude laccase from Lentinus polychrous Lev. Int J Chem Eng Appli 5: 26-30.
    [61] Bikovens O, Dizhbite T, Telysheva G (2012) Characterisation of humin substances formed during co-compositing of grass and wood wastes with animal grease. Environ Technol 33: 1427-1433. doi: 10.1080/09593330.2011.632652
    [62] Grinhut T, Hadar Y, Chen Y (2007) Degradation and transformation of humic substances by saprotrophic fungi: processes and mechanisms. Fungal Biol Rev 21: 179-189. doi: 10.1016/j.fbr.2007.09.003
    [63] Mojsov K (2011) Application of enzymes in the textile industry: a review. II International Congress "engineering 230–239.
    [64] Gomathi VC, Ramanathan B, Sivaramaiah N, et al. (2012) Decolourization of paper mill effluent by immobilized cells of Phanerochaete chrysosporiumInt J Plant Anim Environ Sci 2: 141-146.
    [65] Jadhav UP, Bholay AD, Shindikar M, et al. (2016) Bacterial lignin peroxidase mediated biobleaching and biodegradation of paper and pulp mill effluent. IOSR J Environ Sci Toxicol Food Technol 10: 31-36. doi: 10.9790/2402-1009023136
    [66] Andrady AL (2011) Microplastics in the marine environment. Mar Pollut Bull 62: 1596-1605. doi: 10.1016/j.marpolbul.2011.05.030
    [67] Sowmya HV, Ramalingappa, Krishnappa M, et al. (2014) Biodegradation of polyethylene by Bacillus cereusAdv Polymer Sci Technol Int J 4: 28-32.
    [68] Wilkes RA, Aristilde L (2017) Degradation and metabolism of synthetic plastics and associated products by Pseudomonas sp.: capabilities and challenges. J Appl Microbiol 123: 582-593. doi: 10.1111/jam.13472
    [69] Roohi, Kulsoom B, Mohammed K, et al. (2017) Microbial enzymatic degradation of biodegradable plastics. Curr Pharm Biotechnol 18. doi: 10.2174/1389201018666170523165742
    [70] Sharma M, Sharma P, Sharma A, et al. (2015) Microbial degradation of plastic-a brief review. CIBTech J Microbiol 4: 85-89.
    [71] Sowmya HV, Ramlingappa B, Krishnappa M, et al. (2014) Low density polyethylene degrading fungi isolated from local dumpsite of shivamogga district. Int J Biol Res 2: 39-43.
    [72] Sowmya HV, Ramalingappa, Krishnappa M, et al. (2014) Degradation of polyethylene by Trichoderma harzianum--SEM, FTIR, and NMR analyses. Environ Monit Assess 186: 6577-6586. doi: 10.1007/s10661-014-3875-6
    [73] Khatoon N, Jamal A, Ali MI (2018) Lignin peroxidase isoenzyme: a novel approach to biodegrade the toxic synthetic polymer waste. Environ Technol 40: 1-10.
    [74] Sowmya HV, Ramalingappa B, Nayanashree G, et al. (2015) Polyethylene degradation by fungal consortium. Int J Environ Sci Technol 9: 823-830.
    [75] Krueger M, Harms H, Schlosser D (2015) Prospects for microbiological solution to environmental pollution with plastics. Appl Microbiol Biotechnol 99: 8857-8574. doi: 10.1007/s00253-015-6879-4
    [76] Dang T, Nguyen D, Thai H, et al. (2018) Plastic degradation by thermophilic Bacillus sp. BCBT21 isolated from composting agricultural residual in Vietnam. Adv Nat Sci Nanosci Nanotechnol 9: 015014. doi: 10.1088/2043-6254/aaabaf
    [77] Gore S, Khotha A, Nevgi D, et al. (2017) The use of horse radish peroxidase, an eco-friendly method for removal of phenol from industrial effluent. J Environ Sci Toxicol Food Technol 11: 7-13.
    [78] Shekoohiya S, Moussavi G, Naddafi K (2016) The peroxidase-mediated biodegradation of petroleum hydrocarbons in a H2O2-induced SBR using in-situ production of peroxidase: Biodegradation experiments and bacterial identification. J Hazard Mater 313: 170-178. doi: 10.1016/j.jhazmat.2016.03.081
  • This article has been cited by:

    1. Mohamed Yamni, Achraf Daoui, Hicham Karmouni, Mhamed Sayyouri, Hassan Qjidaa, Saad motahhir, Ouazzani Jamil, Walid El-Shafai, Abeer D. Algarni, Naglaa F. Soliman, Moustafa H. Aly, An efficient watermarking algorithm for digital audio data in security applications, 2023, 13, 2045-2322, 10.1038/s41598-023-45619-w
  • Reader Comments
  • © 2020 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(9412) PDF downloads(462) Cited by(31)

Figures and Tables

Figures(3)  /  Tables(1)

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog