Theoretical Evaluation of Li et al.'s Approach for Improving a Binary Watermark-Based Scheme in Remote Sensing Data Communications
نویسندگان
چکیده
This letter is about a principal weakness of the published article by Li et al. in 2014. It seems that the mentioned work has a terrible conceptual mistake while presenting its theoretical approach. In fact, the work has tried to design a new attack and its effective solution for a basic watermarking algorithm by Zhu et al. published in 2013, however in practice, we show the Li et al.'s approach is not correct to obtain the aim. For disproof of the incorrect approach, we only apply a numerical example as the counterexample of the Li et al.'s approach.
منابع مشابه
Mapping soil salinity using Landsat 8 images for land evaluation: A Case Study of Saveh
Introduction: As a valuable asset that play a key role in the environment, natural resources, and the production of agricultural products, soil provided an appropriate ground for plant growth and vegetation development. Therefore, any disregard to the preservation of such a valuable capital may result in food shortages, soil erosion, and degradation of natural resources. From among different i...
متن کاملA New Surface Tension Model for Prediction of Interaction Energy between Components and Activity Coefficients in Binary Systems
In this work, we develop a correlative model based on the surface tension data in order to calculate thermodynamic parameters, such as interaction energy between components (Uij), activity coefficients and etc. In the new approach, by using Li et al. (LWW) model, a three-parameter surface tension equation is derived for liquid mixtures. The surface tension data of 54 aqueous and 73 non-aqueous ...
متن کاملAnalysis and Improving the Security of the Scalar Costa Scheme against Known Message Attack
Unintentional attacks on watermarking schemes lead to degrade the watermarking channel, while intentional attacks try to access the watermarking channel. Therefore, watermarking schemes should be robust and secure against unintentional and intentional attacks respectively. Usual security attack on watermarking schemes is the Known Message Attack (KMA). Most popular watermarking scheme with stru...
متن کاملA Study to Predict the Development of Wear for the Wheel/interface of a Railway Track
The train transport is often confronted with greatly repeated changes in scope, vehicle travel well-being and transport safety because of the adjustments of wheel and rail profiles. These problems are frustrating and threatening. Thus, there is a requirement for an approach to predicting the wear of wheel/rail to tackle these problems. A new theoretical ground is broken through the build-up a m...
متن کاملA Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications
Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1703.09103 شماره
صفحات -
تاریخ انتشار 2017