Full text: Proceedings, XXth congress (Part 4)

  
HIDDEN COMMUNICATION IN FREQUENCY DOMAIN FOR INFORMATION 
EXCHANGE 
F. Gónül Toz* H.M. Palanctoëlu°, E. Besdok b 
? [TU, Civil Engineering Faculty, 80626 Maslak Istanbul, Turkey - tozg@itu.edu.tr 
° Erciyes University, Engineering Faculty, Geodesy and Photogrammetry Dept., Kayseri, Turkey, (hpalanci 
,cbesdok)@erciyes.edu.tr 
Commission VI, WG VI/4 
KEY WORDS: Spatial Information Sciences, Technology, Application, Data Mining, Pixel, and Theory... 
ABSTRACT: 
In last decade, Geoinformatic products such as geo-maps and aerial photos have been shared over the Web. The Web technologies 
have been employed in providing geo-information exchange. Today, there is a need to employ efficient tools such as Steganography 
to save copyrights of producers and prevent the unauthorized users from non-public geoinformation. In this paper, we propose a new 
method of hiding colored geo-images within gray scale images using Steganography methods. 
1. INTRODUCTION 
Cartography is the science of making maps. Though hand- 
drawn cartography is still prevalent, traditional drafting is being 
rapidly replaced by computers and graphics software, which 
allow maps to be created quickly and accurately. Complex geo- 
maps are made with sophisticated scanning equipment, while 
simpler geo-maps can be drawn on a personal computer. 
Generally, cartographers begin with a grid such as the latitude 
and longitude to which they add such information as streets, 
population density, and physical features. Many cartographers 
are employed by the governments around the world to make 
geo-maps for various purposes. Some of the geo-maps have 
been prepared for only authorized users. The Army Forces also 
employ cartographers for private purposed geo-map making. 
There are many companies making and selling all kinds of geo- 
maps from subsurface geo-maps to geo-thematic maps. In some 
countries, some kind of geo-maps such as militarial geo-maps 
or subsurface mine geo-maps have been prohibited to produce 
and use by unauthorized users. All public and private 
organizations have to secure their geoinformation based 
products in order to control their commercial market or rights. 
However, when they have to share some geoinformations over 
communication cannels such as over Web, some undesired and 
unsafe conditions could appear. The shared geoinformation 
should be hidden within a desired container signal such as 
images or audios in order to provide secure communication 
process. 
C^ ganography (Derrick 2001, Gruhl 1998, Anderson 1996, 
Anderson 1998, Arnol’d 1992, Cachin 1998, Chang 1997, 
Csiszar 1978, Currie 1996, Tsai 2002, Dijk 1997, Ettinger 1998, 
Kahl 1996, Kurak 1992, Menezes 1997, Mittelholzer 2000, 
Ptzmann 1996) is the art of hiding the existence of a message. 
The word Steganography comes from the Greek words steganos 
(secref) and graphy (writing). An example could be a letter 
written with two different inks. When the letter is submerged in 
water one of the inks dissolves while the other remains on the 
letter, thus revealing the secret message. The original message 
on the letter is just a cover to hide the existence of the secret 
message. Steganography is hiding the very existence of 
326 
communication. One famous example of early steganography is 
that of Herodotus who shaved the head of one of his slaves and 
tattooed a message on his head. After his hair had re-grown, he 
was sent to deliver a message to instigate a revolt against the 
Persians. Steganography has a wide range of forms from hiding 
messages in the soles of shoes to hiding messages in musical 
scores. 
Steganography is sometimes confused with cryptography. 
Cryptography (Menezez 1997, Schneier 1994) is the art of 
concealing the contents of a message (encryption) whereas 
Steganography is the art of hiding the existence of a message. 
The message can be any type of digital information including a 
simple text file, a JPEG image, or any other type of file. Much 
of the available software that embeds steganographic content 
into a host file often employs cryptography as well. This 
greatly adds to the complexity and difficulty of retrieving 
concealed content. 
One of the earliest examples of cryptography was used by 
Julius Caesar (Kahl 1996) when he sent military messages to 
his armies. Perhaps since that time, people have also tried to 
decode encrypted messages. Allies in World War II were able 
to break a secret German code called Enigma. This discovery 
enabled Allied forces to locate and sink many German U-boats. 
Moreover, they were able to obtain advanced information about 
German military operations that was critical to the campaign in 
Europe. Similar code-breaking abilities also allowed the United 
States Navy to intercept the Japanese fleet in one of the most 
decisive battles in the Pacific--The Battle of Midway. These are 
just a few examples of how cryptographic technology has 
played an important role in history (Kahl 1996). 
Watermarking (Derrick 2001) is often discussed alongside 
Steganography. It is similar to Steganography because extra 
information is kept embedded in the image. Sometimes a 
watermark is visible and sometimes it is invisible. 
Watermarking is widely used to protect intellectual property. 
Whereas Steganography seeks to go unseen and undetected, 
watermarks seck to be robust (difficult to remove). Many 
Intern 
photo. 
attem 
Still 5 
distril 
incom 
water 
distril 
infort 
on t 
stegal 
task | 
conta 
The 
Stegz 
Secti 
and s 
and c 
Steg: 
it wi 
conté 
takes 
infor 
exch 
them 
geo 
Steg 
plac: 
Folk 
metl 
Wit 
steg 
file: 
mak 
can 
ima 
goo 
file: 
bit 
Wet 
fror 
sha 
nun 
is ii 
be 
Wit 
file 
e
	        
Waiting...

Note to user

Dear user,

In response to current developments in the web technology used by the Goobi viewer, the software no longer supports your browser.

Please use one of the following browsers to display this page correctly.

Thank you.