LIDAR Image Data Authentication Using Pseudorandom Polygons

نویسنده

  • Y. M. Y. Hasan
چکیده

The development of effective remote sensing data authentication techniques is of remarkably growing interest. Several existing authentication algorithms have been reported as insecure, yielding inaccurate attack localization, and vulnerable to various attacks, especially the blind pattern matching attack. with insufficient security. In this paper, we propose a new pseudorandomly-shaped polygons based blind watermarking scheme that offers more secure embedding processes of the polygons' signatures and reliable deliberate local alterations detection, and effectively resists the blind pattern matching attack.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Integration of Visible Image and LIDAR Altimetric Data for Semi-Automatic Detection and Measuring the Boundari of Features

This paper presents a new method for detecting the features using LiDAR data and visible images. The proposed features detection algorithm has the lowest dependency on region and the type of sensor used for imaging, and about any input LiDAR and image data, including visible bands (red, green and blue) with high spatial resolution, identify features with acceptable accuracy. In the proposed app...

متن کامل

GEOMETRIC REFINEMENT OF LiDAR ROOF CONTOURS USING PHOTOGRAMMETRIC DATA AND MARKOV RANDOM FIELD MODEL

In this paper, a methodology is proposed for the geometric refinement of LiDAR building roof contours using high-resolution aerial images and Markov Random Field (MRF) models. The proposed methodology assumes that the 3D description of each building roof reconstructed from the LiDAR data (i.e., a polyhedron) is topologically correct and that it is only necessary to improve its accuracy. Since r...

متن کامل

Security measures for Smart Devices through Cryptography Using Cellular Automaton

Present Embedded industry is emphasising more on Smart devices and they have gained much importance in daily life. The devices includes communication, Bio-Medical, image processing, Power, etc. While using smart devices (iButton Technology) data acquisition and user authentication has to be done.Various security concepts are developed to suite these requirement. One such security measure is usi...

متن کامل

Delineating Individual Trees from Lidar Data: A Comparison of Vector- and Raster-based Segmentation Approaches

Light detection and ranging (lidar) data is increasingly being used for ecosystem monitoring across geographic scales. This work concentrates on delineating individual trees in topographically-complex, mixed conifer forest across the California’s Sierra Nevada. We delineated individual trees using vector data and a 3D lidar point cloud segmentation algorithm, and using raster data with an objec...

متن کامل

Cryptography Techniques for Image Security and Authentication using Cellular Automata Algorithms

This Security and authentication are the two important criteria for any industrial product controlled through electronics. Microcontrollers interfacing along with electronic circuits, Controls various aspects of industry equipment. One among them is the communication and transfer of data between the equipment. In certain situations a need arises to secure the data and a proper authentication is...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008