Theoretical Evaluation of Li et al.'s Approach for Improving a Binary Watermark-Based Scheme in Remote Sensing Data Communications

by   Mohammad Reza Khosravi, et al.

This letter is about a principal weakness of the published article by Li et al. in 2014. It seems that the mentioned work has a terrible conceptual mistake while presenting its theoretical approach. In fact, the work has tried to design a new attack and its effective solution for a basic watermarking algorithm by Zhu et al. published in 2013, however in practice, we show the Li et al.'s approach is not correct to obtain the aim. For disproof of the incorrect approach, we only apply a numerical example as the counterexample of the Li et al.'s approach.


Remarks on an article by Rabern et al

We show that conjecture 15 in the article by Rabern et al. is wrong, and...

SiMRX - A Simulation toolbox for MRX

SiMRX is a MRX simulation toolbox written in MATLAB for simulation of re...

How to Avoid Reidentification with Proper Anonymization

De Montjoye et al. claimed that most individuals can be reidentified fro...

Point classification with Runge-Kutta networks and feature space augmentation

In this paper we combine an approach based on Runge-Kutta Nets considere...

Relationship between incidence of breathing obstruction and degree of muzzle shortness in pedigree dogs

There has been much concern about health issues associated with the bree...

Information Transfer in Swarms with Leaders

Swarm dynamics is the study of collections of agents that interact with ...

Discussion on a new extension of the FGM copula with application in reliability

A new extended Farlie-Gumbel-Morgenstern copula recently studied by Ebai...