Theoretical Evaluation of Li et al.'s Approach for Improving a Binary Watermark-Based Scheme in Remote Sensing Data Communications

03/27/2017
by   Mohammad Reza Khosravi, et al.
0

This letter is about a principal weakness of the published article by Li et al. in 2014. It seems that the mentioned work has a terrible conceptual mistake while presenting its theoretical approach. In fact, the work has tried to design a new attack and its effective solution for a basic watermarking algorithm by Zhu et al. published in 2013, however in practice, we show the Li et al.'s approach is not correct to obtain the aim. For disproof of the incorrect approach, we only apply a numerical example as the counterexample of the Li et al.'s approach.

READ FULL TEXT
08/03/2018

Remarks on an article by Rabern et al

We show that conjecture 15 in the article by Rabern et al. is wrong, and...
10/04/2018

SiMRX - A Simulation toolbox for MRX

SiMRX is a MRX simulation toolbox written in MATLAB for simulation of re...
08/03/2018

How to Avoid Reidentification with Proper Anonymization

De Montjoye et al. claimed that most individuals can be reidentified fro...
04/06/2021

Point classification with Runge-Kutta networks and feature space augmentation

In this paper we combine an approach based on Runge-Kutta Nets considere...
09/19/2022

Relationship between incidence of breathing obstruction and degree of muzzle shortness in pedigree dogs

There has been much concern about health issues associated with the bree...
06/30/2014

Information Transfer in Swarms with Leaders

Swarm dynamics is the study of collections of agents that interact with ...
03/19/2022

Discussion on a new extension of the FGM copula with application in reliability

A new extended Farlie-Gumbel-Morgenstern copula recently studied by Ebai...