LIDAR Image Data Authentication Using Pseudorandom Polygons
نویسنده
چکیده
The development of effective remote sensing data authentication techniques is of remarkably growing interest. Several existing authentication algorithms have been reported as insecure, yielding inaccurate attack localization, and vulnerable to various attacks, especially the blind pattern matching attack. with insufficient security. In this paper, we propose a new pseudorandomly-shaped polygons based blind watermarking scheme that offers more secure embedding processes of the polygons' signatures and reliable deliberate local alterations detection, and effectively resists the blind pattern matching attack.
منابع مشابه
Integration of Visible Image and LIDAR Altimetric Data for Semi-Automatic Detection and Measuring the Boundari of Features
This paper presents a new method for detecting the features using LiDAR data and visible images. The proposed features detection algorithm has the lowest dependency on region and the type of sensor used for imaging, and about any input LiDAR and image data, including visible bands (red, green and blue) with high spatial resolution, identify features with acceptable accuracy. In the proposed app...
متن کاملGEOMETRIC REFINEMENT OF LiDAR ROOF CONTOURS USING PHOTOGRAMMETRIC DATA AND MARKOV RANDOM FIELD MODEL
In this paper, a methodology is proposed for the geometric refinement of LiDAR building roof contours using high-resolution aerial images and Markov Random Field (MRF) models. The proposed methodology assumes that the 3D description of each building roof reconstructed from the LiDAR data (i.e., a polyhedron) is topologically correct and that it is only necessary to improve its accuracy. Since r...
متن کاملSecurity measures for Smart Devices through Cryptography Using Cellular Automaton
Present Embedded industry is emphasising more on Smart devices and they have gained much importance in daily life. The devices includes communication, Bio-Medical, image processing, Power, etc. While using smart devices (iButton Technology) data acquisition and user authentication has to be done.Various security concepts are developed to suite these requirement. One such security measure is usi...
متن کاملDelineating Individual Trees from Lidar Data: A Comparison of Vector- and Raster-based Segmentation Approaches
Light detection and ranging (lidar) data is increasingly being used for ecosystem monitoring across geographic scales. This work concentrates on delineating individual trees in topographically-complex, mixed conifer forest across the California’s Sierra Nevada. We delineated individual trees using vector data and a 3D lidar point cloud segmentation algorithm, and using raster data with an objec...
متن کاملCryptography Techniques for Image Security and Authentication using Cellular Automata Algorithms
This Security and authentication are the two important criteria for any industrial product controlled through electronics. Microcontrollers interfacing along with electronic circuits, Controls various aspects of industry equipment. One among them is the communication and transfer of data between the equipment. In certain situations a need arises to secure the data and a proper authentication is...
متن کامل