bul 2004
0 pixels
~
Y
ima
e
a
d Error
nal To
:valuate
neasure
(9)
es. The
(10)
International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, Vol XXXV, Part B4. Istanbul 2004
Where M and N denote the total number of the pixels in the
horizontal and the vertical dimensions of the image. 5; ;
represents the pixels in the original image and Y, j represents
1997).
the pixels of the stego-image (Chang Pearson
Correlation Coefficient (Corr) is given by;
SG [y -Y)
Corr = (11)
ERSC-UYSO- Wy
eu
MN
where S =
Figure 5: Stego-Image.
Table 1: Objective measure values between Message image and
Stego-Image.
MSE Corr PSNR
0.999 27.380
118.866
5. RESULTS
Providing data security in spatial information systems has
became an important subject due to the widespread use of the
communication networks. The use of stenography in spatial
information systems provides the following uses:
- Protecting Copyright Infringement of IDs.
-Storing additional data without changing file structures
and sizes of the IDs.
-Providing opportunity to develop defense information
system applications with high security.
-Storing additional thematic data to the ID without
additional space.
329
-Providing high security in digital geoinformation
exchange. ;
- Providing the security of the multi-level ID by encrypting
the data for unauthorized user accessibility.
6. REFERENCES
G., Derrick, (2001), Data watermarking steganography and
watermarking of digital data, Computer Law & Security Report,
17 (2), 101-104.
D., Gruhl, W., Bender, (1998), Information hiding to foil the
casual counterfeiter, Second [International Workshop on
Information Hiding, YH'98, Portland, Oregon, 1-15.
R.J. Anderson, (1996), Stretching the limits of steganography,
Information Hiding: First International Workshop, 39-48.
R.J., Anderson, F.A.P. Petitcolas, (1998), On The Limits of
Steganography, [EEE Journal of Selected Areas in
Communications, 16 (4), 474-481.
V.I. Arnol'd, (1992), Catastrophe theory, Springer-Verlag,
Berlin.
C. Cachin, (1998), An information-theoretic model for
steganography, Second International Workshop, Lecture Notes
in Computer Science, 1525, 306-318.
L. Chang, I. S. Moskowitz, (1997), Critical analysis of security
in voice hiding techniques, Information and Communications
Security: First International Conference, Lecture Notes in
Computer Science, 1334, 203-216.
[. Csiszar, (1978), Broadcast channels with condential
messages, /EEE Transaction on Information Theory, 24 (3),
339-349.
D.L. Currie, C.E. Irvine, (1996), Surmounting the effects of
lossy compression on steganography, In National Information
System Security Conference, Baltimore, MD, 194-201.
C. S. Tsai, C.C., Chang, T.S., Chen, (2002), Sharing multiple
secrets in digital images, The Journal of Systems and Software,
64, 163-170.
M.V., Dijk, (1997), On a special class of broadcast channels
with condential Messages, IEEE Transactions on Information
Theory, 43 (2), 712-714.
J.M., Ettinger, (1998), Steganalysis and game equilibria,
Information Hiding: Second International Workshop, Lecture
Notes in Computer Science, 1525, 319-328.
D. Kahn, The history of steganography, (1996), Information
Hiding: First International! Workshop, Lecture Notes in
Computer Science, 1174, 1-6.
C., Kurak, J, McHugh, (1992),0nary note on image
downgrading, /n Computer Security Applications Conference,
San Antonio, TX, USA, 153-159.
A.J., Menezes, P.C.V., Oorschot, S.A., Vanstone, (1997),
Handbook of applied cryptography, CRC Press, Florida.