Theoretical Evaluation of Li et al.'s Approach for Improving a Binary Watermark-Based Scheme in Remote Sensing Data Communications

نویسندگان

  • Mohammad Reza Khosravi
  • Mohammad Kazem Moghimi
چکیده

This letter is about a principal weakness of the published article by Li et al. in 2014. It seems that the mentioned work has a terrible conceptual mistake while presenting its theoretical approach. In fact, the work has tried to design a new attack and its effective solution for a basic watermarking algorithm by Zhu et al. published in 2013, however in practice, we show the Li et al.'s approach is not correct to obtain the aim. For disproof of the incorrect approach, we only apply a numerical example as the counterexample of the Li et al.'s approach.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Mapping soil salinity using Landsat 8 images for land evaluation: A Case Study of Saveh

Introduction: As a valuable asset that play a key role in the environment, natural resources, and the production of agricultural products, soil provided an appropriate ground for plant growth and vegetation development. Therefore, any disregard to the preservation of such a valuable capital may result in food shortages, soil erosion, and degradation of natural resources. From among different i...

متن کامل

A New Surface Tension Model for Prediction of Interaction Energy between Components and Activity Coefficients in Binary Systems

In this work, we develop a correlative model based on the surface tension data in order to calculate thermodynamic parameters, such as interaction energy between components (Uij), activity coefficients and etc. In the new approach, by using Li et al. (LWW) model, a three-parameter surface tension equation is derived for liquid mixtures. The surface tension data of 54 aqueous and 73 non-aqueous ...

متن کامل

Analysis and Improving the Security of the Scalar Costa Scheme against Known Message Attack

Unintentional attacks on watermarking schemes lead to degrade the watermarking channel, while intentional attacks try to access the watermarking channel. Therefore, watermarking schemes should be robust and secure against unintentional and intentional attacks respectively. Usual security attack on watermarking schemes is the Known Message Attack (KMA). Most popular watermarking scheme with stru...

متن کامل

A Study to Predict the Development of Wear for the Wheel/interface of a Railway Track

The train transport is often confronted with greatly repeated changes in scope, vehicle travel well-being and transport safety because of the adjustments of wheel and rail profiles. These problems are frustrating and threatening. Thus, there is a requirement for an approach to predicting the wear of wheel/rail to tackle these problems. A new theoretical ground is broken through the build-up a m...

متن کامل

A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications

Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1703.09103  شماره 

صفحات  -

تاریخ انتشار 2017