Loading [MathJax]/jax/output/SVG/jax.js
Review Special Issues

Urban greening: environmentalism or marketable aesthetics

  • Received: 24 March 2015 Accepted: 17 November 2015 Published: 25 January 2015
  • In recent decades, urban greening has been conceptualized, and subsequently marketed, as a way of making cities more sustainable. Urban greening has been actualized in large global cities, regional centers, and also in many cities in the Global South, where it has been touted as a potential solution to the urban heat island (UHI) effect and as a way of reducing carbon dioxide (CO2) emissions. This involves planting street trees and installing curbside gardens, bioswales, green walls, green roofs, and the redevelopment of former industrial zones into urban parklands. This paper questions the assumption that this “greening” of the city must necessarily lead to positive environmental impacts. While such infrastructure itself might be constructed with environmental principles in mind, wider questions concerning the production of such landscapes, and the consumption-orientated lifestyles of those who inhabit these urban landscapes, are seldom considered. Moreover, green aesthetics and environmental sustainability are not always as mutually inclusive as the concepts might suggest, as aesthetics are often a dominating influence in the process of planning green urban environments. This review reorients the focus on the way in which the UHI effect and CO2 emissions have been framed by utilizing Foucault's (1980) “regimes of truth,” where environmental issues are contextualized within the “colonised lifeworld” of free-market forces. This review suggests that for sustainability to be achieved in urban contexts, the process of urban greening must move beyond quick techno-fixes through engagement in the co-production of knowledge.

    Citation: Dominic Bowd, Campbell McKay, Wendy S. Shaw. Urban greening: environmentalism or marketable aesthetics[J]. AIMS Environmental Science, 2015, 2(4): 935-949. doi: 10.3934/environsci.2015.4.935

    Related Papers:

    [1] Wen-Xin Zhang, Yaqing Liu . Solitary wave solutions and integrability for generalized nonlocal complex modified Korteweg-de Vries (cmKdV) equations. AIMS Mathematics, 2021, 6(10): 11046-11075. doi: 10.3934/math.2021641
    [2] Qiulan Zhao, Muhammad Arham Amin, Xinyue Li . Classical Darboux transformation and exact soliton solutions of a two-component complex short pulse equation. AIMS Mathematics, 2023, 8(4): 8811-8828. doi: 10.3934/math.2023442
    [3] Ahmed M. G. Ahmed, Alle Adjiri, Solomon Manukure . Soliton solutions and a bi-Hamiltonian structure of the fifth-order nonlocal reverse-spacetime Sasa-Satsuma-type hierarchy via the Riemann-Hilbert approach. AIMS Mathematics, 2024, 9(9): 23234-23267. doi: 10.3934/math.20241130
    [4] Yaqiong Liu, Yunting Li, Qiuping Liao, Yunhui Yi . Classification of nonnegative solutions to fractional Schrödinger-Hatree-Maxwell type system. AIMS Mathematics, 2021, 6(12): 13665-13688. doi: 10.3934/math.2021794
    [5] Hui-qing Liao, Ying Fu, He-ping Ma . A space-time spectral method for the 1-D Maxwell equation. AIMS Mathematics, 2021, 6(7): 7649-7668. doi: 10.3934/math.2021444
    [6] Dexin Meng . Wronskian-type determinant solutions of the nonlocal derivative nonlinear Schrödinger equation. AIMS Mathematics, 2025, 10(2): 2652-2667. doi: 10.3934/math.2025124
    [7] Muhammad Imran Asjad, Waqas Ali Faridi, Adil Jhangeer, Maryam Aleem, Abdullahi Yusuf, Ali S. Alshomrani, Dumitru Baleanu . Nonlinear wave train in an inhomogeneous medium with the fractional theory in a plane self-focusing. AIMS Mathematics, 2022, 7(5): 8290-8313. doi: 10.3934/math.2022462
    [8] Qingkun Xiao, Jianzhu Sun, Tong Tang . Uniform regularity of the isentropic Navier-Stokes-Maxwell system. AIMS Mathematics, 2022, 7(4): 6694-6701. doi: 10.3934/math.2022373
    [9] Fouad Mohammad Salama, Nur Nadiah Abd Hamid, Umair Ali, Norhashidah Hj. Mohd Ali . Fast hybrid explicit group methods for solving 2D fractional advection-diffusion equation. AIMS Mathematics, 2022, 7(9): 15854-15880. doi: 10.3934/math.2022868
    [10] Canlin Gan, Weiwei Wang . Existence result for the critical Klein-Gordon-Maxwell system involving steep potential well. AIMS Mathematics, 2023, 8(11): 26665-26681. doi: 10.3934/math.20231364
  • In recent decades, urban greening has been conceptualized, and subsequently marketed, as a way of making cities more sustainable. Urban greening has been actualized in large global cities, regional centers, and also in many cities in the Global South, where it has been touted as a potential solution to the urban heat island (UHI) effect and as a way of reducing carbon dioxide (CO2) emissions. This involves planting street trees and installing curbside gardens, bioswales, green walls, green roofs, and the redevelopment of former industrial zones into urban parklands. This paper questions the assumption that this “greening” of the city must necessarily lead to positive environmental impacts. While such infrastructure itself might be constructed with environmental principles in mind, wider questions concerning the production of such landscapes, and the consumption-orientated lifestyles of those who inhabit these urban landscapes, are seldom considered. Moreover, green aesthetics and environmental sustainability are not always as mutually inclusive as the concepts might suggest, as aesthetics are often a dominating influence in the process of planning green urban environments. This review reorients the focus on the way in which the UHI effect and CO2 emissions have been framed by utilizing Foucault's (1980) “regimes of truth,” where environmental issues are contextualized within the “colonised lifeworld” of free-market forces. This review suggests that for sustainability to be achieved in urban contexts, the process of urban greening must move beyond quick techno-fixes through engagement in the co-production of knowledge.


    As an important branch of data hiding, steganography aims to establish covert communication by embedding the secret messages in the inconspicuously perceptive cover materials, such as text, audio, image, etc. In recent years, the traffic in mobile social networking and media sharing software have become the main traffic in mobile network while the technologies of mobile Internet, cloud computing and so on are developing rapidly and the intelligent mobile terminals are widely popularized. The massive digital media files in the traffic have become the important carriers of steganography. Due to the constraint of mobile network bandwidth and differences of various mobile terminals' displays, these digital media files may commonly be resampled by the media server when being pushed to the intelligent mobile terminals. The resampling is a transformation which enlarges or shrinks digital media files by a scale factor that is the same in all dimensions. For example, the audio resampling and image scaling are the common one-dimensional and two-dimensional resampling. The steganographic coding scheme which can reduce embedding distortion while ensuring the correct extraction of secret messages under resampling mechanism is worthy of more attentions.

    To our best knowledge, there are some works on digital watermarking which are proposed to resist the resampling of media files. The watermarking messages were embedded in some domains which are insensitive to the resampling of media files, for example, non-subsampled contourlet transform (NSCT) domain[1], discrete wavelet transform domain[2,3,4,5,6,7], lifting wavelet transform domain[8], quaternion wavelet transform domain[9], and three dimensional discrete cosine transform domain of sub block[10]. To resist the resampling, the watermarking schemes based on geometric center and image mass centroid[11], the phase spectrum of the frequency domain signal[12,13], the invariant moment constructed by utilizing Radon and Fourier-Mellin transform[14] and Zernike moment[15] are presented. However, the capacities of the messages embedded in watermarking are small when the stego media files are distorted significantly and distinguished by some forensics scheme[16] in these watermarking schemes. Consequently, it is necessary to conduct a research on the steganographic coding scheme under resampling mechanism which can minimize embedding distortion and combine with current typical steganographic schemes in the context of the current mobile internet applications.

    In this paper, a steganographic coding scheme based on dither convolutional trellis is proposed. The approximate linear relation of the resampling mapping is analyzed so that the resampling mapping is estimated with finite sample pairs. The resampling stego media files with secret messages embedded are generated from the estimated resampling cover media files by syndrome-trellis codes (STCs)[17,18]. Then the dither convolutional trellis (DCT) in one dimensional resampling is constructed. The source stego media files are generated from estimated resampling mapping, resampling stego media files and source cover media files by DCT embedding. The proposed scheme is also extended to the circumstance of two dimensional resampling such as image scaling. The proposed scheme can ensure the integrity of extracted messages and minimize embedding distortion under multi-dimensional resampling mechanism.

    The rest of the paper is organized as follows. In the next section, some preliminaries including steganography under resampling mechanism, interpolation mapping in resampling, and the estimation of the resampling mapping are derived. In Section 3, some works on digital watermarking of media files to resist the resampling process are introduced. In Section 4, we propose the steganographic coding scheme based on dither convolutional trellis which includes the construction of dither convolutional trellis under one dimensional resampling mechanism and extensions of the proposed scheme to two dimensional resampling. Section 5 gives experimental results on embedding efficiency of the proposed scheme in one-dimensional resampling and steganalysis result of the proposed scheme applied in image scaling. Finally, Section 6 concludes the whole paper.

    The generic communication system of steganography under resampling mechanism is shown in Figure 1. The sender and receiver are two end-points of the system. The digital media files employed to embed the secret messages are defined as source cover objects. The secret messages are embedded in source cover objects to generate the stego digital media files which are defined as source stego objects. Then the transmitted stego digital media files are resampled by the media server. The practical resampling of digital media files is the process of generating the new media files with different sizes by one or two dimensional interpolation, such as audio resampling and image scaling [19,20,21]. The resampling stego digital media files are defined as the resampling stego objects. The resampling module in this system is not disregarded, which means that the sender can not communicate with receiver directly. At the receiver, the secret messages are extracted from the resampling stego objects.

    Figure 1.  Generic communication system of steganography under resampling mechanism.

    In the steganography under resampling mechanism, we assume that the resampling strategy of media server is stable which means that a resampling media file is certain for the corresponding source media file. Not only generating the source stego objects to ensure the receiver extract secret messages from the corresponding resampling stego objects correctly, but the security of the system is significant which means that the warden cannot reveal the existence of the steganography by steganalysis. In this paper, we assume that the warden has full administrative authority over the whole communication system. This implies that the warden has access to both the source and resampling stego objects and has the knowledge of the steganography schemes, which is also shown in Figure 1.

    The interpolations in resampling can be classified by target objects. The one-dimensional (1D) media files are resampled by 1D interpolation, and the two-dimensional (2D) interpolation is employed in resampling the 2D media files which is extended from the 1D interpolation. In the common 1D or 2D nearest-neighbor interpolation[22], each resampling element is equal to the nearest neighbor source element. The resampling objects are the impaired versions of the source objects. The steganographic coding scheme for this case has been proposed in the related work[23] which is omitted in the rest of the paper.

    In 1D interpolation, the source and resampling objects with sizes $ {N_s} $ and $ {N_r} $ are denoted as $ {\bf{s}} = \left({{s_1}, \ldots, {s_{{N_s}}}} \right) $ and $ {\bf{t}} = \left({{t_1}, \ldots, {t_{{N_r}}}} \right) $. For a resampling element $ {t_u}, u = 1, \ldots, {N_r} $, the interpolation coordinate which is defined as the relative coordinate in the corresponding source objects is obtained as (2.1).

    $ L(u)=Ns1Nr1u+NrNsNr1 $ (2.1)

    On the basis of the interpolation coordinate and window size $ \delta $ of chosen interpolation strategy, the interpolation window of $ {t_u} $ is determined which denotes the set of the neighbor source elements involved in the interpolation. The common 1D interpolation strategies are linear and cubic interpolations. The interpolation windows of a resampling element in linear and bilinear interpolation are denoted as $ {{\bf{w}}_{2, u}} = \left({{s_i}, {s_{i + 1}}} \right) $ and $ {{\bf{w}}_{4, u}} = \left({{s_{i - 1}}, {s_i}, {s_{i + 1}}, {s_{i + 2}}} \right) $ respectively, which are shown in Figure 2. The coordinate of the source element is got by $ i = \left\lfloor {L\left(u \right)} \right\rfloor $ where the symbol $ \left\lfloor {} \right\rfloor $ represents the process of rounding down. The decimal part of interpolation coordinate is obtained by $ {r_u} = L\left(u \right) - \left\lfloor {L\left(u \right)} \right\rfloor $. The coefficients of the source elements in linear and cubic interpolation windows are denoted as $ {{\bf{c}}_{2, u}} = \left({1 - {r_u}, {r_u}} \right) $ and $ {{\bf{c}}_{4, u}} = \left({{c_1}\left({{r_u}} \right), {c_2}\left({{r_u}} \right), {c_3}\left({{r_u}} \right), {c_4}\left({{r_u}} \right)} \right) $ respectively.The coefficients of the source elements in cubic interpolation are determined by the specific interpolation strategy which are related to the decimal part of interpolation coordinate $ {r_u} $. The mappings of the source and resampling elements in linear and cubic interpolation windows are given in (2.2) and (2.3).

    $ tu=c2,u(w2,u)T=(1ru)si+rusi+1 $ (2.2)
    $ tu=c4,u(w4,u)T=4n=1cn(ru)si+n2 $ (2.3)
    Figure 2.  Interpolation windows in (a) linear interpolation and (b) cubic interpolation.

    As the common 2D interpolations, the bilinear and bicubic interpolations are the extensions of linear and cubic interpolations[22]. The interpolation windows of a resampling element in bilinear and bicubic interpolations are shown in Figure 3. The mappings of the source and resampling elements in bilinear and bicubic interpolations are given in (2.4) and (2.5). The decimal parts of interpolation coordinates in horizontal and vertical directions are represented by $ {r_u} $ and $ {r_v} $. Consequently, the mappings in bilinear and bicubic interpolations have the similar linear forms as those in linear and cubic interpolations by (2.2)-(2.5).

    $ tu,v=c2,u(si,jsi,j+1si+1,jsi+1,j+1)(c2,v)T=(1ru)(1rv)si,j+(1ru)rvsi,j+1+(1rv)rusi+1,j+rurvsi+1,j+1 $ (2.4)
    $ tu,v=c4,u(si1,j1si1,jsi1,j+1si1,j+2si,j1si,jsi,j+1si,j+2si+1,j1si+1,jsi+1,j+1si+1,j+2si+2,j1si+2,jsi+2,j+1si+2,j+2)(c4,v)T=4m=14n=1cm(ru)cn(rv)si+m2,j+n2 $ (2.5)
    Figure 3.  Interpolation windows in (a) bilinear interpolation and (b) bicubic interpolation.

    Given that the elements in resampling digital media files are always integers, the resampling elements are rounded after the linear mapping of interpolations. The function of resampling for a resampling element $ t $ can be denoted as (2.6)

    $ t=[[δk=1cksk]] $ (2.6)

    Where $ \left[\kern-0.15em\left[{} \right]\kern-0.15em\right] $ means rounding the values got by the linear mapping of interpolations, $ \delta $ denotes the size of interpolation window and $ {c_k} $ is corresponding coefficients of source element $ {s_k} $ in the interpolation window.

    However, it is difficult to directly get the detailed function of resampling under normal circumstances. We assume that the sender can collect some sample pairs which has the same sizes as those for steganography. Because the coefficients in interpolation window of the resampling element with the same interpolation coordinate keep unchanged, the resampling mapping in a interpolation window can be represented as (2.7) with $ {N_p} $ pairs of source and resampling objects:

    $ t=δk=1cksk+Δ $ (2.7)

    Where $ {\bf{t}} = {\left({{t_1}, \ldots, {t_{{N_p}}}} \right)^{\rm{T}}} $ denotes a set of the resampling elements, $ {{\bf{s}}_k} = {\left({{s_{k, 1}}, \ldots, {s_{k, {N_p}}}} \right)^{\rm{T}}} $ denotes a set of the source elements in interpolation window, and $ {c_k} $ denotes the corresponding interpolation coefficients of source elements, $ {\bf{\Delta }} = {\left({{\Delta _1}, \ldots, {\Delta _{{N_p}}}} \right)^{\rm{T}}} $ are the errors due to the rounding process. To estimate the coefficients of source elements $ {c_k} $ with statistical stability, the equation (2.7) is solved by covariance. The errors $ {\bf{\Delta }} $ have little relationship with the source elements, the covariance of the errors $ {\bf{\Delta }} $ and the source elements is negligible[24,25]. With $ {\mathop{\rm cov}} \left({{\bf{\Delta }}, {{\bf{s}}_l}} \right) = 0, l = 1, \ldots, \delta $, the equation (2.7) is converted to (2.8)

    $ cov(t,sl)=δk=1ckcov(sk,sl),l=1,,δ $ (2.8)

    The $ \delta $ coefficients of source elements in (2.7) can obtained from the $ \delta $ equations generated by (2.8). With estimated coefficients $ c_k^ * $ in interpolation windows, the function of the estimated resampling mapping can be represented by (2.9)

    $ t=[[δk=1cksk]] $ (2.9)

    There are some works on digital watermarking of media files to resist the resampling process which is a type of geometric attacks.

    The watermarking messages were embedded in some transform domains which are insensitive to the resampling of media files. In [1], two rotation invariant watermark embedding schemes in the non-subsampled contourlet transform (NSCT) domain based on the scale-adapted local regions are presented which can efficiently resist both signal processing attacks and geometric attacks. A novel scaling watermarking scheme is proposed in [2] which embedded the watermark in the low-frequency wavelet coefficients to achieve improved robustness. [3] presents a secure, robust, and blind adaptive audio watermarking algorithm based on singular value decomposition (SVD) in the discrete wavelet transform domain using synchronization code. The watermark data embedded by applying a quantization-index-modulation process on the singular values in the SVD of the wavelet domain blocks is robust to additive noise, resampling, low-pass filtering, requantization, MP3 compression, cropping, echo addition, and de-noising. In [4], in order to resist both traditional signal processing attacks and geometric attacks, the watermark image is embedded in a content-based manner by modifying the wavelet transform coefficients. In [5], a blind and adaptive audio watermarking algorithm is proposed by combining the robustness of vector norm with that of the approximation Components after the discrete wavelet transform (DWT). This algorithm is able to tolerate a wide class of common attacks such as additive white Gaussian noise (AWGN), Gaussian Low-pass filter, Kaiser Low-pass filter, resampling, requantizing, cutting, MP3 compression and echo. In [6], the data is embedded in high pass filter coefficients of Discrete Wavelet Transform by LSB method. A blind digital speech watermarking technique based on Eigen-value quantization in Discrete Wavelet Transform is presented in [7] which is robust against different attacks such as filtering, additive noise, resampling, and cropping. In [8], a watermarking scheme for breath sounds, combining lifting wavelet transform (LWT), discrete cosine transform (DCT), singular value decomposition (SVD) and dither modulation (DM) quantization is proposed to insert encrypted source and identity information in breath sounds. The watermarking scheme obtains good robustness against common manipulation attacks and preserves imperceptivity. A audio watermarking scheme based on self-adaptive particles warm optimization (SAPSO) and quaternion wavelet transform (QWT) is proposed in [9]. The scheme is not only robust against de-synchronization attack, but also typical signal manipulations and StirMark attack. In order to improve the ability of resisting geometric attacks, a watermarking algorithm for medical volume data in sub-block three-dimensional discrete cosine transform domain is presented in [10].

    The data can be embedded in some other domains to resist the resampling attack. An anti-geometric attack SVD digital watermark algorithm based on geometric center and image mass centroid is proposed in [11] to resist large scale geometric deformation. In [12,13], the data is embedded in the phase spectrum of the frequency domain signal of audio files by the phase coding technique which can resist signal processing operations like noise addition, cropping and resampling. In [14], a watermarking algorithm based on constructing invariant moments by the analytic Fourier–Mellin transform is proposed which was robust to usually image processing operation and geometrical attacks. In [15], a spatial image adaptive steganography algorithm based on Zernike moment is proposed to resist scaling attack and statistic detection.

    However, in these watermarking schemes, the cover media files may be distorted significantly which may be distinguished by some forensics scheme[16], and the capacities of the messages embedded are small. It is necessary to conduct a steganographic coding scheme under resampling mechanism which can minimize embedding distortion in the context of the current mobile internet applications.

    In this section, we propose a steganographic coding scheme based on dither convolutional trellis under the resampling mechanism. The framework of the proposed steganographic coding scheme is shown in Figure 4. Due to the errors resulting from the estimation of resampling mapping, forward error corrections (FECs) are employed in the framework to reduce the influence on the transmission of the secret messages. Convolutional code is selected as the FEC in this paper. The parity check matrix of convolutional code and the extraction matrix in STCs have the similar structures. The joint parity check matrix generated from them also has the similar structure as that of convolutional code[23].

    Figure 4.  Framework of steganographic coding scheme based on dither convolutional trellis.

    At the sender, the secret messages $ {\bf{m}} $ are encoded to coded secret messages $ {{\bf{m}}_c} $ by FEC encoding. Meanwhile the estimated resampling cover objects $ {\bf{x}}_r^ * $ are generated by estimated resampling mapping and source cover objects $ {{\bf{x}}_s} $. The coded secret messages $ {{\bf{m}}_c} $ are embedded in the estimated resampling cover objects $ {\bf{x}}_r^ * $ by STC embedding. The estimated resampling stego objects with the least distortion are generated which are denoted as $ {\bf{y}}_r^ * $. Then the dither convolutional trellis (DCT) is constructed by source cover objects $ {{\bf{x}}_s} $, estimated resampling stego objects $ {\bf{y}}_r^ * $ and estimated resampling mapping. The corresponding source stego objects $ {{\bf{y}}_s} $ with the least distortion are got by dither convolutional trellis (DCT) embedding. At the receiver, the resampling stego object $ {{\bf{y}}_r} $ are obtained after the processing of the media server. Then the coded secret messages $ {{\bf{m}}_c} $ are got by extraction matrix in STC schemes, and the secret messages $ {\bf{m}} $ are got by FEC decoding. The proposed scheme is not reversible where the receiver can not reconstructed the source cover objects $ {{\bf{x}}_s} $ from the resampling stego objects $ {{\bf{y}}_r} $.

    Owing to that the source and resampling stego objects $ {{\bf{y}}_s} $ and $ {{\bf{y}}_r} $ can be captured by warden, minimizing the distortion of the steganographic coding scheme under resampling mechanism can be converted to two steps. Firstly, with distortion profiles and the estimated resampling cover objects $ {\bf{x}}_r^ * $ which are got from estimated resampling mapping and source cover objects $ {{\bf{x}}_s} $, the distortions of the resampling stego objects $ {\bf{y}}_r^ * $ with secret messages embedded are minimized by STC embedding. Secondly, according to the estimated resampling mapping, distortion profiles and the resampling stego objects $ {\bf{y}}_r^ * $, the distortions of the source stego objects $ {{\bf{y}}_s} $ are minimized by DCT embedding. The function of the DCT embedding is represented by (4.1):

    $ ys=argminys{ωω|R(ωω)=yr}Ds(xs,ys) $ (4.1)

    Where $ {R^ * }\left({} \right) $ denotes the function of estimated resampling mapping and $ {D_s}\left({} \right) $ denotes the function of the distortions in source objects.

    In the following subsection, the construction of the dither convolutional trellis under 1D resampling mechanism is described. Then the extension of the proposed scheme to 2D resampling is demonstrated.

    The dither convolutional trellis under 1D resampling mechanism is constructed by source cover objects and estimated resampling stego objects. The source cover objects are denoted as $ {{\bf{x}}_s} = \left({{x_{s, 1}}, \ldots, {x_{s, {N_s}}}} \right) $ with size $ {N_s} $, and the estimated resampling stego objects are denoted as $ {\bf{y}}_r^ * = \left({y_{r, 1}^ *, \ldots, y_{r, {N_r}}^ * } \right) $ with size $ {N_r} $. So the equation (4.1) can furtherly be written as (4.2).

    $ ys=argminys{ωω|R(ωω)=yr}ρi(ωixs,i)|ωixs,i| $ (4.2)

    Where the distortion profile in $ \pm 1 $ embedding of the source cover objects is denoted as $ \rho = \left({{\rho _1}\left({{\omega _1} - {x_{s, 1}}} \right), } \right.\left. { \ldots, {\rho _{{N_s}}}\left({{\omega _{{N_s}}} - {x_{s, {N_s}}}} \right)} \right) $. The source stego objects $ {{\bf{y}}_s} $ satisfying $ {\bf{y}}_r^ * = {R^ * }\left({{{\bf{y}}_s}} \right) $ are got by dither convolutional trellis and distortion profiles.

    The dither convolutional trellis is a graph consisting of $ 3{N_s} $ nodes which is organized in a grid of $ {N_s} $ columns and 3 rows. The node in $ ith $ column and $ jth $ row means that the source cover element $ {x_{s, i}} $ is possibly modified by the value $ {n_{i, j}} = j - 2 $. The edges connecting two nodes in adjacent columns represent the combinations of the modifications to adjacent source elements. The paths which start in the leftmost column and extend to the rightmost column in the trellis represent the modification choices of all source cover elements. The path can be denoted as $ {\bf{z}} = \left({{z_1}, \ldots, {z_{{N_s}}}} \right) $ in which each element satisfies $ {z_i} = {n_{i, j}} \in \left\{ { - 1, 0, + 1} \right\} $. The feasible source stego objects can be got by $ {{\bf{y}}_s} = {{\bf{x}}_s} + {\bf{z}} $ when the modified resampling objects satisfy $ {{\bf{x}}_{rm}} = {R^ * }\left({{{\bf{x}}_s} + {\bf{z}}} \right) = {\bf{y}}_r^ * $. To find the source stego objects with the least embedding distortion, we assign distortion weights to all trellis nodes and thus convert the equation (4.2) to the problem of finding the feasible path with the least distortion weights through the trellis. The distortion weights of the nodes with label $ {\rho _i}({n_{i, j}}) $ in the trellis depend on the input of distortion profiles. The path through a node $ {n_{i, 2}} = 0 $ increases a distortion weight of 0 and the path through a node satisfying $ {n_{i, 2}} = 1 $ or $ {n_{i, 2}} = -1 $ increases a distortion weight of $ {\rho _i}(1) $ or $ {\rho _i}(-1) $. The dither convolutional trellis of cubic interpolation with the sizes of the source and resampling objects $ {N_s} = 16, {N_r} = 12 $ is shown in Figure 5. In Figure 5, the feasible path kept with the least distortion of the source cover object is shown as $ {\bf{z}} = \left({0, 0, 1, 0, 0, - 1, 0, 0, 0, 1, 0, 0, 1, 0, 0, 0} \right) $.

    Figure 5.  Example of a path in dither convolutional trellis of cubic interpolation.

    Then the dither convolutional trellis embedding is described. Because the modifications of the source cover objects $ {{\bf{x}}_s} $ are restricted by the resampling stego objects $ {\bf{y}}_r^ * $, the DCT embedding is conducted with the interpolation window moving. There are $ {N_r} $ steps in DCT embedding. It is observed that the modifications of the first and last source elements are only determined by the corresponding resampling elements in 1D interpolation. As a result, the modification in the first column of trellis is $ {z_1} = y_{r, 1}^ * - {x_{s, 1}} $. The modification in the last column of trellis is $ {z_{{N_s}}} = y_{r, {N_r}}^ * - {x_{s, {N_s}}} $. In the embedding of the other resampling elements, the interpolation windows of adjacent resampling elements may be overlapped. The number of the overlapped source elements between the interpolation windows of resampling stego elements $ y_{r, u - 1}^ * $ and $ y_{r, u}^ * $ is represented by $ {w_u}, u = 2, \ldots, {N_r} $. We assume that the resampling is downsampling in which the resampling rate satisfies $ \beta = {N_r}/{N_s} \in (0, 1) $. The interpolation windows of adjacent resampling elements will never be completely overlapped. With window size $ \delta = 2 $ in linear interpolation, the number of the overlapped source elements is $ {w_u} \in \left\{ {0, 1} \right\} $. The number of the overlapped source elements is satisfying $ {w_u} \in \left\{ {0, 1, 2, 3} \right\} $ with window size $ \delta = 4 $ in cubic interpolation.

    Take the DCT embedding of the resampling stego element $ y_{r, u}^ * $ for example, the interpolation windows and dither convolutional trellis in cubic interpolation are described in Figure 6. Here the window size of cubic interpolation is $ \delta = 4 $, the coefficients of interpolation window are denoted as $ {{\bf{c}}_u} = \left({{c_1}, {c_2}, {c_3}, {c_4}} \right) $, and the source cover elements in interpolation window are denoted as $ {{\bf{w}}_u} = \left({{x_{s, i - 1}}, {x_{s, i}}, {x_{s, i + 1}}, {x_{s, i + 2}}} \right) $. Before the embedding of the resampling stego element $ y_{r, u}^ * $, the number of the overlapped source elements between the interpolation windows of resampling stego elements $ y_{r, u-1}^ * $ and $ y_{r, u}^ * $ is $ {w_u} = 2 $. In the embedding of the resampling stego element $ y_{r, u-1}^ * $, the paths have been extended to the source element $ {x_{s, i}} $. The number of paths with all combinations of $ \left({{z_{i - 1}}, {z_i}} \right) $ which are kept with the least distortion weights is not more than $ {3^{{w_u}}} = 9 $. Then all the paths extend to the rightmost source cover element $ {x_{s, i + 2}} $ in interpolation window of resampling stego elements $ y_{r, u}^ * $. There are $ \delta - {w_u} = 2 $ source elements are newly involved in the embedding. All modified combination of the $ \delta - {w_u} = 2 $ source elements which are denoted as $ \left({{z_{i + 1}}, {z_{i + 2}}} \right) \in {\left\{ { - 1, 0, + 1} \right\}^2} $ are represented by red lines in Figure 6. The dither modification of the interpolation window is represented as $ {{\bf{z}}_u} = \left({{z_{i - 1}}, {z_i}, {z_{i + 1}}, {z_{i + 2}}} \right) $. The modified resampling element is got by (4.3)

    $ xrm,u=cu(wu+zu)T $ (4.3)
    Figure 6.  DCT embedding of a resampling stego element in cubic interpolation.

    Each modified resampling cover element is checked whether that is equal to the resampling stego element $ y_{r, u}^ * $. The path is kept if the modified resampling cover element satisfies $ {x_{rm, u}} = y_{r, u}^ * $. After finding all feasible paths, the number of the overlapped source elements between the interpolation windows of resampling stego elements $ y_{r, u}^ * $ and $ y_{r, u+1}^ * $ is $ {w_{u + 1}} = 3 $. The distortion weight of all paths with all the combinations of $ \left({{z_i}, {z_{i + 1}}, {z_{i + 2}}} \right) $ are calculated and the path with the least weight in each combination is kept. The complexity of DCT embedding in this steganographic coding scheme is related to the length of resampling stego objects and number of the overlapped source elements between the adjacent interpolation windows.

    In the case of upsampling, the interpolation windows of the adjacent resampling elements may be completely overlapped. That means it may be impossible to embed the secret message bits into the adjacent resampling elements at the same time. Thus part of the resampling cover elements are chosen for embedding secret messages in which interpolation windows of all resampling elements are not completely overlapped. Then the steganographic coding scheme under upsampling mechanism is converted to that under downsampling mechanism.

    In conventional steganographic coding schemes, the cover objects with one dimension are transformed from 2D digital media files which are the common carriers of steganography. The steganographic coding scheme based on dither convolutional are extended to the case of 2D resampling by some additional processes.

    According to the dither convolutional trellis under 1D resampling mechanism, the computational complexity of the DCT embedding depends on the number of the overlapped source elements between the adjacent interpolation windows. In 2D resampling, the source elements between the adjacent interpolation windows are overlapped complicatedly. So too many paths in each step of the DCT embedding has to be kept if the secret messages are embedded in all resampling cover objects. To reduce the computational complexity and embed the secret messages as much as possible, we choose some rows (columns) of the resampling objects for embedding in which interpolation windows of resampling elements are not overlapped in column (row) direction. Take the rows for example, the source elements between the adjacent interpolation windows in the same row are overlapped like that in 1D resampling, but the source elements between any interpolation windows in the different rows are never overlapped. If the $ {u_1}th $ row of the resampling objects in bilinear interpolation are chosen for embedding, the last row coordinate of the source elements in interpolation windows is $ \left\lfloor {L\left({{u_1}} \right)} \right\rfloor + 1 $. In the next $ {u_2}th $ row for embedding, the first row coordinate of the source elements in interpolation windows must satisfy $ \left\lfloor {L\left({{u_2}} \right)} \right\rfloor > \left\lfloor {L\left({{u_1}} \right)} \right\rfloor + 1 $ which can be further written as $ \left\lfloor {L\left({{u_2}} \right)} \right\rfloor - \left\lfloor {L\left({{u_1}} \right)} \right\rfloor > 1 $. In bicubic interpolation, the last row coordinate of interpolation windows of the chosen $ {u_1}th $ row is $ \left\lfloor {L\left({{u_1}} \right)} \right\rfloor + 2 $, the first row coordinate of interpolation windows of the chosen $ {u_2}th $ row must satisfy $ \left\lfloor {L\left({{u_2}} \right)} \right\rfloor - 1 > \left\lfloor {L\left({{u_1}} \right)} \right\rfloor + 2 $ which can be further written as $ \left\lfloor {L\left({{u_2}} \right)} \right\rfloor - \left\lfloor {L\left({{u_1}} \right)} \right\rfloor > 3 $.

    Assumed that the sizes of the source objects and resampling objects are $ {N_s} \times {N_s} $ and $ {N_r} \times {N_r} $ respectively, the resampling rates in row and column directions are $\beta = {N_r}/{N_s}$. The chosen embedding rate $ \gamma $ is defined as the rate of the maximum number of the chosen rows in resampling objects to the number of the rows in source objects. The chosen embedding rate with $ {N_s} = 512 $ are shown in Figure 7 in different interpolations. In Figure 7, the chosen embedding rate raises with the resampling rate increasing when the resampling rate is small, then the chosen embedding rate is stabilizing with the resampling rate increasing. The chosen embedding rate are not more than 1/2 in bilinear interpolation, which are not more than 1/4 in bicubic interpolation.

    Figure 7.  Chosen embedding rates with different resampling rates in bilinear and bicubic interpolation.

    Take a source image with the size $ 512 \times 512 $ for example, the resampling rate is set to be $ \beta = 0.7 $ in linear interpolations, the most resampling elements and the corresponding source elements chosen for embedding are presented in Figure 8. In Figure 8, the partly rows of resampling elements are chosen for embedding, and partly rows of source elements are involved in embedding. It should be noted that the other resampling elements may be modified although they are not selected for embedding.

    Figure 8.  Resampling elements and the corresponding source elements chosen for embedding.

    The dither convolutional Trellis of each row in 2D resampling is similar to that in 1D resampling. There are some differences in DCT embedding of the resampling elements. The first and last resampling elements are related to the two or four source elements in corresponding columns. If the resampling rate is $ \beta \in \left({0, 1} \right) $, the interpolation windows of adjacent resampling elements in the same row may be partly overlapped. The number of the overlapped source elements between the interpolation windows of resampling stego elements is represented by $ {w_{u, v}} $. With window size $ \delta = 4 $ in bilinear interpolation, the number of the overlapped source elements is satisfying $ {w_{u, v}} \in \left\{ {0, 2} \right\} $. The number of the overlapped source elements is satisfying $ {w_{u, v}} \in \left\{ {0, 4, 8, 12} \right\} $ with window size $ \delta = 16 $ in bicubic interpolation. The interpolation windows of a row of the resampling elements in bilinear interpolation is shown in Figure 9.

    Figure 9.  Interpolation windows of a row of resampling elements in bilinear interpolation.

    The experiments of the proposed steganographic coding scheme are presented in this section. The proposed coding scheme is evaluated by embedding efficiency in 1D resampling. Then the security of the proposed scheme applied in image scaling (2D resampling) is benchmarked. The convolutional code with the code rate $ 1/2 $ is employed in the proposed scheme as the FEC. The secret messages can be extracted correctly in the proposed steganographic coding scheme in 1D resampling and image scaling.

    The source cover objects and the secret messages are both provide by a pseudo-random bits generator. Three distortion profiles are used for benchmarking security of the steganographic coding scheme which are similar to [17,18]. They are the constant profile $ {\rho _i} = 1 $, the linear profile ${\rho _i} = 2i/{N_s}$ and the square profile $ {\rho _i} = 3{\left({i/{N_s}} \right)^2}$. We assume that the profiles of the resampling cover objects are got from those of the source cover objects and the estimated resampling mapping. The embedding efficiency is employed to evaluate the proposed scheme. The embedding efficiencies of source and resampling objects for three distortion profiles are calculated. Each embedding efficiency is obtained as an average over 2000 samples.

    The embedding efficiencies of source and resampling objects with different relative payloads for three distortion profiles are performed in Figure 10. The size of source cover objects is set to be $ {N_s} = 2000 $, the resampling rate is set to be $ \beta = 0.75 $. The relative payloads in resampling objects are set to be $\alpha = 1 / 2, 1 / 3, 1 / 4, 1 / 5, 1 / 6$. In Figure 10, the embedding efficiency of the source and resampling objects arise with relative payload decreasing. In Figure 10a, the embedding efficiency of the source and resampling objects with different window sizes are almost the same for constant profiles. In Figure 10b and 10c, for linear and square profiles, the embedding efficiencies of the source object are better than those of the estimated resampling objects, and the embedding efficiencies of the source and resampling objects decrease slightly with window size increasing.

    Figure 10.  Embedding efficiencies of source and resampling objects with different relative payloads for (a) the constant profile (b) the linear profile (c) the square profile.

    Then the embedding efficiencies of source and resampling objects with different resampling rates for three distortion profiles are shown in Figure 11. The size of source objects is set to be $ {N_s} = 2000 $, the relative payload in resampling objects is set to be $ \alpha = 1/2 $. The resampling rates are set to be $ \beta = 0.1, 0.2, \ldots, 0.9 $. In Figure 11, the embedding efficiencies of the resampling objects almost keep unchanged with resampling rate increasing for three distortion profiles. In Figure 11a, the embedding efficiencies of the source objects for constant profile are almost the same with the resampling rate increasing. In Figure 11b and 11c, the embedding efficiencies of the source objects for linear and square profiles will keep unchanged with resampling rate $ \beta < 0.5 $ and decrease with resampling rate $ \beta > 0.5 $. With window size increasing, the embedding efficiencies of the source objects arise slightly, and the embedding efficiencies of the resampling objects decrease slightly.

    Figure 11.  Embedding efficiencies of source and resampling objects with different resampling rates for (a) the constant profile (b) the linear profile (c) the square profile.

    It is proved that the proposed steganographic coding scheme under 1D resampling mechanism minimizes the embedding distortion while ensuring the accuracy of secret messages extraction for different distortion profiles.

    The experiments in image scaling are carried out on the BOSSbass ver.1.01[26], which contains 10000 uncompressed grayscale images sized $ 512 \times 512 $. The relative payloads in the resampling pixels in a row are set to be $ \alpha = 0.2, 0.4 $. The bilinear interpolation is chosen as the interpolation strategy in image scaling. The resampling rates are set to be $ \beta = 0.25, 0.5, 0.75 $. The steganographic method S-UNIWARD[27] is employed to generate the distortion profiles of source and resampling images. In the phase of steganalysis, the feature sets maxSRM[28] are employed in source and resampling images. The ensemble classifier[29] is used to measure the property of feature sets. In detail, half of the cover and stego feature sets are used as the training set while the remaining half are used as testing set. The criterion to evaluate the performance of feature sets is the minimal detection error $ {p_E} $ under equal priors achieved on the testing set[29]:

    $ pE=minPFA(pFA+pMD2) $ (5.1)

    Where $ {p_{FA}} $ is the false alarm rate, and $ {p_{MD}} $ is the missed detection rate. The performance is evaluated using the average value of $ {p_E} $ over ten random tests. As the closest methods, the detection error rates of image steganography based on Zernike moment (ISZM) are present for comparison.

    The detection error rates of source and resampling images with different relative payloads and resampling rates are demonstrated in Table 1. In Table 1, all the detection errors decrease with the relative payload and resampling rate arising. The detection errors of resampling images are larger than those of source images.Then the detection error rates of the source images in the proposed scheme and ISZM with different resampling rates are presented in Table 2 when the lengths of the secret message bits embedded in each image are given in Table 3. From Table 2 and 3, the detection error rates of the proposed scheme in which more secret messages are embedded are larger than those of ISZM. It is proved that the proposed steganographic coding scheme applied in image scaling performs better security than existing methods.

    Table 1.  Detection error rates of resampling and source images.
    $ \beta=0.25 $ $ \beta=0.5 $ $ \beta=0.75 $
    $ \alpha=0.2 $, Source images 0.4796 0.4526 0.4363
    $ \alpha=0.2 $, Resampling images 0.4803 0.471 0.4558
    $ \alpha=0.4 $, Source images 0.4439 0.3586 0.3383
    $ \alpha=0.4 $, Resampling images 0.4452 0.4199 0.3709

     | Show Table
    DownLoad: CSV
    Table 2.  Detection error rate of the proposed scheme and ISZM.
    $ \beta=0.25 $ $ \beta=0.5 $ $ \beta=0.75 $
    $ \alpha=0.2 $ 0.4796 0.4526 0.4363
    $ \alpha=0.4 $ 0.4439 0.3586 0.3383
    ISZM 0.2988 0.2845 0.2979

     | Show Table
    DownLoad: CSV
    Table 3.  Lengths of the secret message bits per image in the proposed scheme and ISZM.
    $ \beta=0.25 $ $ \beta=0.5 $ $ \beta=0.75 $
    $ \alpha=0.2 $ 1613 6502 9753
    $ \alpha=0.4 $ 3226 13004 19506
    ISZM 128 128 128

     | Show Table
    DownLoad: CSV

    In this paper, we propose the steganographic coding scheme based on dither convolutional trellis under resampling mechanism. The dither convolutional trellis under 1D resampling mechanism is constructed by utilizing common linear mapping in resampling. The source stego objects are generated from source cover objects and resampling stego objects by dither convolutional trellis embedding. The proposed scheme is also extended to 2D resampling such as image scaling. The experimental results show that the proposed scheme can achieve less embedding distortion while ensuring the covert communication under multi-dimensional resampling mechanism.

    Even if the steganographic coding scheme based on dither convolutional trellis can achieve high security, the computational complexity of the scheme is high. Part of the resampling elements are discarded in the embedding under 2D resampling mechanism. In the future work, we will reduce the computational complexity of steganographic coding scheme and try to make use of all resampling elements for secret messages embedding.

    This work was supported by The National Natural Science Foundation of China(Grant No. 61602247, 61702235, U1836104, U1636117), Natural Science Foundation of Jiangsu Province(Grant No. BK20160840) and Fundamental Research Funds for the Central Universities (30918012204).

    All authors declare no conflicts of interest in this paper.

    [1] Lankao PR (2007) Are we missing the point? Particularities of urbanization, sustainability and carbon emissions in Latin American cities. Environ Urban 19: 159-175. doi: 10.1177/0956247807076915
    [2] Betsill MM, Bulkeley H (2006) Cities and the multilevel governance of global climate change. Glob Gov 12: 141-159.
    [3] Heidegger M (2001) The Fundamental Concepts of Metaphysics. Indiana: Indiana University Press.
    [4] Gibbs DC (2000) Ecological modernization, regional economic development and Regional Development Agences. Geoforum 31: 9-19. doi: 10.1016/S0016-7185(99)00040-8
    [5] Myllyla S, Kuvaja K (2005) Societal premises for sustainable development in large southern cities. Glob Environ Change 15: 224-237. doi: 10.1016/j.gloenvcha.2005.01.001
    [6] Deonie A, Olive V, Arthur S, et al. (2015). Urban Sediment Transport through an Established Vegetated Swale: Long Term Treatment Efficiencies and Deposition. Water 7: 1046-1067 doi: 10.3390/w7031046
    [7] Hamilton C (2010) Consumerism, self-creation and prospects for a new ecological consciousness. J Clean Prod 18: 571-575. doi: 10.1016/j.jclepro.2009.09.013
    [8] Li J, Wai OWH, Li YS, et al. (2010) Effect of green roof on ambient CO2 concentration. Build Environ 45: 2644-2651. doi: 10.1016/j.buildenv.2010.05.025
    [9] Susca T, Gaffin SR, Dell'Osso GR (2011) Positive effects of vegetation: Urban heat island and green roofs. Environ Pollut 159: 2119-2126. doi: 10.1016/j.envpol.2011.03.007
    [10] Habermas J (1987) The Theory of Communicative Action, Volume 2: Life-World and System: A Critique of Functionalist Reason. Boston: Beacon Press.
    [11] Foucault M (1980) Power-knowledge: selected interviews and other writings, 1972-1977. New York: Pantheon Books.
    [12] Rabinow P (1991) The Foucault Reader. London: Penguin.
    [13] Chichilnisky G (2011) What is sustainability? Int J Sust Econ 3: 125-140.
    [14] Corburn J (2009) Cities, Climate Change and Urban Heat Island Mitigation: Localising Global Environmental Science. Urban Stud 46: 413-427. doi: 10.1177/0042098008099361
    [15] Jasanoff S (2004) States of knowledge: the co-production of science and the social order. London: Routledge.
    [16] Bai X (2007) Integrating global environmental concerns into urban management: the scale and readiness arguments. J Ind Ecol 11: 15-29. doi: 10.1162/jie.2007.1202
    [17] Miller C (2004) Resisting empire; globalism, relocalization, and the politics of knowledge. In: S Jasanoff, M Martello (eds.) Earthly Politics: Local and Global in Environmental Governance, 81-102. Cambridge, MA: MIT Press.
    [18] Ingold T (2000) The perception of the environment: essays on livelihood, dwelling and skill. Melbourne: Psychology Press.
    [19] Meinig DW, Jackson JB, Lewis PF, et al. (1979) The Interpretation of Ordinary Landscapes: Geographical Essays. New York: Oxford University Press.
    [20] Logan MI (1964) Manufacturing Decentralization in the Sydney Metropolitan Area. Econ Geogr 40: 151-162. doi: 10.2307/142194
    [21] Duncan J (1995) Landscape Geography, 1993-94. Prog Human Geogr 19: 414-422. doi: 10.1177/030913259501900308
    [22] Cosgrove D, Jackson P (1987) New directions in cultural geography. Area 19: 95-101.
    [23] Muir R (1998) Landscape: a wasted legacy. Area 30: 263-271. doi: 10.1111/j.1475-4762.1998.tb00071.x
    [24] Seddon G (1986) Landscape Planning: A Conceptual Perspective. Landsc Urban Plan 13: 335-347. doi: 10.1016/0169-2046(86)90051-4
    [25] Copley S (1994) The Politics of the Picturesque: Literature, Landscape, and Aesthetics since 1770. Cambridge: Cambridge University Press.
    [26] Kant I (1952) The science of right (W. Hastie, trans.). In: R Hutchins (ed.) Great books of the Western world, Vol. 42: Kant, 397-446. Chicago: Encyclopaedia Britannica.
    [27] Sauer C (1925) The Morphology of Landscape. Los Angeles: Univ Calif Publ Geogr 22: 19-53.
    [28] Gulinck H (1986) Landscape ecological aspects of agro-ecosystems. Agr Ecosyst Environ 16: 79-86. doi: 10.1016/0167-8809(86)90095-2
    [29] Olwig KR (1996) Recovering the substantive nature of landscape. Ann Assoc Am Geogr 86: 630-653. doi: 10.1111/j.1467-8306.1996.tb01770.x
    [30] Zhang LW, Jianping ZY, Jiong S (2004) A GIS-based gradient analysis of urban landscape pattern of Shanghai metropolitan area, China. Landsc Urban Plan 69: 1-16. doi: 10.1016/j.landurbplan.2003.08.006
    [31] Dickinson RE, Crowe PR (1939) Landscape and society. Scott Geogr Mag 55: 1-15.
    [32] Lewis P (1983) Learning from looking: geographic and other writing about the American cultural landscape. Am Quart 35: 242-261. doi: 10.2307/2712650
    [33] Jackson JB (1984) Discovering the vernacular landscape. New York: Yale University Press.
    [34] Cosgrove D, Daniels S (1988) The iconography of landscape: essays on the symbolic representation, design and use of past environments. London: Cambridge University Press.
    [35] Anderson K, Gale F (1992) Inventing places: Studies in cultural geography. Melbourne: Longman Cheshire.
    [36] Zukin S (1998). Urban lifestyles: diversity and standardisation in spaces of consumption. Urban Stud 35: 825-839. doi: 10.1080/0042098984574
    [37] Gobster P, Nassauer J, Daniel TC, et al. (2007) The shared landscape: what does aesthetics have to do with ecology? Landsc Ecol 22: 959-972 doi: 10.1007/s10980-007-9110-x
    [38] Johnston R (1998) Approaches to the perception of landscape. Archeo Dialog 5: 54-68. doi: 10.1017/S1380203800001161
    [39] Seamans S (2013) Mainstreaming the environmental benefits of street trees. Urban For Urban Gree 12: 2-11. doi: 10.1016/j.ufug.2012.08.004
    [40] Baker AR, Biger G (2006) Ideology and landscape in historical perspective: essays on the meanings of some places in the past, Vol. 18. London: Cambridge University Press.
    [41] Thompson JB (1984) Studies in the Theory of Ideology. Los Angeles: University of California Press.
    [42] Žižek S (1989) The sublime object of ideology. London: Verso.
    [43] Žižek S, Daly G (2004) Conversations with Zizek. Cambridge: Polity.
    [44] Cosgrove DE (1984) Social Formation and Symbolic Landscape. Totowa, NJ: Barnes and Noble.
    [45] Robinson GM, Liu Z (2015) Greening and “un”greening Adelaide, South Australia. AIMS Enviro Sci 2: 511-532. doi: 10.3934/environsci.2015.3.511
    [46] van Der Heijden H (1999) Environmental movements, ecological modernisation and political opportunity structures. Environ Polit 8: 199-221. doi: 10.1080/09644019908414444
    [47] Baker A (1992) Introduction: on ideology and landscape. In: Baker A, and Biger G (eds.) Ideology and landscape in historical perspective, 1-14. London: Cambridge University Press.
    [48] Bailey I, Gouldson A, Newell P (2011) Ecological modernisation and the governance of carbon: a critical analysis. Antipode 43: 682-703. doi: 10.1111/j.1467-8330.2011.00880.x
    [49] Blühdorn I, Welsh I (2007) Eco-politics beyond the paradigm of sustainability: a conceptual framework and research agenda. Environ Polit 16: 185-205. doi: 10.1080/09644010701211650
    [50] Derrida J (1990) Force of Law: The Mystical Foundation of Authority. Cardozo L Rev 11: 919.
    [51] Checker M (2011) Wiped out by the ‘Greenwave’: environmental gentrification and the paradoxical politics of urban sustainability. City Soc 23: 210-229. doi: 10.1111/j.1548-744X.2011.01063.x
    [52] Shaw W, Menday (2013) Fibro Dreaming: Greenwashed Beach-house Development on Australia's Coasts. Urban Stud 50: 2940-2958. doi: 10.1177/0042098013482507
    [53] Morris ES (2011) Down with ECO-towns! Up with ECO-communities. Or Is There a Need for Model Eco-towns? A Review of the 2009-2010 Eco-town Proposals in Britain. In: T Wong, B Yuen (eds.) Eco-city Planning-Policies, Pract and Design, 113-130. Dordrecht: Springer.
    [54] Meppem T, Bourke S (1999) Different ways of knowing: a communicative turn toward sustainability. Ecol Econ 30: 389-404. doi: 10.1016/S0921-8009(99)00053-1
    [55] Lee KN (2006) Urban sustainability and the limits of classical environmentalism. Environ Urban 18: 9-22. doi: 10.1177/0956247806063940
    [56] Birch E, Wachter S (2008) Growing greener cities: Urban sustainability in the twenty-first century. Philadelphia: University of Pennsylvania Press.
    [57] Leff E (1993) Marxism and the environmental question: From the critical theory of production to an environmental rationality for sustainable development. Capital Nat Social 4: 44-66. doi: 10.1080/10455759309358531
    [58] Scott AJ (1997) The cultural economy of cities. London: Sage.
    [59] Friedmann H (2005) From colonialism to green capitalism: Social movements and the emergence of food regimes. Res Rural Sociol Dev 11: 227-264.
    [60] Bakker K (2005) Market Environmentalism in Water Supply in England and Wales. Ann Assoc Am Geogr 95: 542-565. doi: 10.1111/j.1467-8306.2005.00474.x
    [61] Gibbs D, Jonas, A (2000) Governance and regulation in local environmental policy: The utility of a regime approach. Geoforum 34: 299-313. doi: 10.1016/S0016-7185(99)00052-4
    [62] Kovacs ZI, LeRoy CJ, Fischer DG, et al. (2006) How do Aesthetics Affect our Ecology. J Ecol Anthropol 10: 61-65. doi: 10.5038/2162-4593.10.1.5
    [63] Svensson K, Eliasson I (2002) Diurnal air temperatures in built-up areas in relation to urban planning. Landsc Urban Plan 61: 37-54. doi: 10.1016/S0169-2046(02)00076-2
    [64] Arnfield AJ (2003) Two decades of urban climate research: a review of turbulence, exchanges of energy and water, and the urban heat island. Int J Climatol 23: 1-26. doi: 10.1002/joc.859
    [65] Oke TR (1987) Boundary Layer Climates, 2nd edition. New York: Methuen.
    [66] Tan J, Zheng Y, Tang X, et al. (2010) The urban heat island and its impact on heat waves and human health in Shanghai. Int J Biometeorol 54: 75-84. doi: 10.1007/s00484-009-0256-x
    [67] Newman PWG (1999) Sustainability and cities: extending the metabolism model. Landsc Urban Plan 44: 219-226. doi: 10.1016/S0169-2046(99)00009-2
    [68] Durkheim E (1972) Emile Durkheim: selected writings. Sydney: Cambridge University Press.
    [69] United Nations, City planning will determine pace of global warming. United Nations, 2007. Available from: http://www.un.org/News/Press/docs/2007/gaef3190.doc.htm.
    [70] Parker JH (1983) Landscaping to reduce the energy used in cooling buildings. J Forest 81: 82-105.
    [71] Nowak DJ, Crane DE (2002) Carbon storage and sequestration by urban trees in the USA. Enviro Pollut 116: 381-389. doi: 10.1016/S0269-7491(01)00214-7
    [72] Chua BH (1998) World cities, globalisation and the spread of consumerism: a view from Singapore. Urban Stud 35: 981-1000. doi: 10.1080/0042098984646
    [73] Hurrell A, Sengupta S (2012) Emerging powers, North-South relations and global climate politics. Int Affair 88: 463-484. doi: 10.1111/j.1468-2346.2012.01084.x
    [74] Norman J, MacLean HL, Kennedy CA (2006) Comparing high and low residential density: life-cycle analysis of energy use and greenhouse gas emissions. J Urban Plan Dev 132: 10-21. doi: 10.1061/(ASCE)0733-9488(2006)132:1(10)
    [75] Jaffe AB, Newell RG, Stavins RN (2005) A tale of two market failures: Technology and environmental policy. Ecol Econ 54: 164-174. doi: 10.1016/j.ecolecon.2004.12.027
    [76] Thorpe A, Graham K (2009) Green buildings-are codes, standards and targets sufficient drivers of sustainability in New South Wales? Environ Plan Law J 26: 486-497.
    [77] Wolf D, Lundholm JT (2008). Water uptake in green roof microcosms: Effects of plant species and water availability. Ecol Eng 33: 179-186. doi: 10.1016/j.ecoleng.2008.02.008
    [78] Barnes K, Morgan J, Roberge M (2001) Impervious surfaces and the quality of natural built environments. Baltimore: Department of Geography and Environmental Planning.
    [79] Bowler DE, Buyung-Ali L, Knight TM, et al. (2010) Urban greening to cool towns and cities: A systematic review of the empirical evidence. Landsc Urban Plan 97: 147-155. doi: 10.1016/j.landurbplan.2010.05.006
    [80] Dunnett N, Kingsbury N (2004). Planting green roofs and living walls, Vol. 254. Portland, OR: Timber Press.
    [81] Francis RA, Lorimer J (2011) Urban reconciliation ecology: the potential of living roofs and walls. J Environ Manag 92: 1429-1437. doi: 10.1016/j.jenvman.2011.01.012
    [82] Saiz S, Kennedy C, Bass B, et al. (2006) Comparative life cycle assessment of standard and green roofs. Environ Sci Technol 40: 4312-4316. doi: 10.1021/es0517522
    [83] Ottelé M, van Bohemen HD, Fraaij AL (2010) Quantifying the deposition of particulate matter on climber vegetation on living walls. Ecol Eng 36: 154-162. doi: 10.1016/j.ecoleng.2009.02.007
    [84] Ford LR (1992) Reading the skylines of American cities. Geogr Rev 82: 180-200. doi: 10.2307/215431
    [85] Sudhira HS, Ramachandra TV, Jagadish KS (2004). Urban sprawl: metrics, dynamics and modelling using GIS. Int Appl Earth Obs Geoinf 5: 29-39. doi: 10.1016/j.jag.2003.08.002
    [86] Pincetl S (2010) Implementing municipal tree planting: Los Angeles million-tree initiative. Environ Manag 45: 227-238. doi: 10.1007/s00267-009-9412-7
    [87] Pacey A (1983) The Cult of Tech. Cambridge, MA: The MIT Press.
    [88] Sklair L (2010) Iconic Architecture and the Culture-ideology of Consumerism. Theor Cult Soc 27: 135-159. doi: 10.1177/0263276410374634
    [89] Jackson T (2005) Live Better by Consuming Less? Is There a ‘Double Dividend’ in Sustainable Consumption. J Ind Ecol 9: 19-36. doi: 10.1162/108819805775247873
    [90] Cluley R, Dunne S (2012) From commodity fetishism to commodity narcissism. Mark Theor 12: 251-265. doi: 10.1177/1470593112451395
    [91] Kumar M, Kumar P (2008) Valuation of the ecosystem services: A psycho-cultural perspective. Ecol Econ 64: 808-819. doi: 10.1016/j.ecolecon.2007.05.008
    [92] Gupta S, Ogden D (2006). The attitude-behavior gap in environmental consumerism. APUBEF Proc 3: 199-206.
    [93] Sanne C (2002) Willing consumers-of locked in? Policies for a sustainable consumption. Ecol Econ 42: 273-287.
    [94] Skollerhorn E (1998) Habermas and Nature: The Theory of Communicative Action for Studying Environmental Policy. J Environ Plan Manag 41: 555-573. doi: 10.1080/09640569811452
    [95] Hackworth J (2002) Postrecession gentrification in New York City. Urban Affair Rev 37: 815-843. doi: 10.1177/107874037006003
    [96] LeGates RT, Hartman C (1986) The anatomy of displacement in the United States. In: N Smith, P Williams (eds.) Gentrification of the City, 178-199. Boston: Allen & Unwin.
    [97] Zizek S (2010) Living in the End Times. London: Verso Books.
    [98] Mapes J, Wolch J (2011) ‘Living Green’: The promise and pitfalls of new sustainable communities. J Urban Design 16: 105-126. doi: 10.1080/13574809.2011.521012
    [99] Gray M (2002) Urban Surveillance and Panopticism: will we recognize the facial recognition society. Surveill Soc 1: 314-330.
  • Reader Comments
  • © 2015 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(9359) PDF downloads(1819) Cited by(8)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog