Full text: Proceedings, XXth congress (Part 4)

bul 2004 
  
0 pixels 
  
~ 
Y 
ima 
e 
a 
d Error 
nal To 
:valuate 
neasure 
(9) 
es. The 
(10) 
International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, Vol XXXV, Part B4. Istanbul 2004 
  
Where M and N denote the total number of the pixels in the 
horizontal and the vertical dimensions of the image. 5; ; 
represents the pixels in the original image and Y, j represents 
1997). 
the pixels of the stego-image (Chang Pearson 
Correlation Coefficient (Corr) is given by; 
SG [y -Y) 
Corr = (11) 
  
ERSC-UYSO- Wy 
eu 
MN 
where S = 
  
Figure 5: Stego-Image. 
Table 1: Objective measure values between Message image and 
Stego-Image. 
  
MSE Corr PSNR 
  
0.999 27.380 
  
  
  
  
118.866 
  
5. RESULTS 
Providing data security in spatial information systems has 
became an important subject due to the widespread use of the 
communication networks. The use of stenography in spatial 
information systems provides the following uses: 
- Protecting Copyright Infringement of IDs. 
-Storing additional data without changing file structures 
and sizes of the IDs. 
-Providing opportunity to develop defense information 
system applications with high security. 
-Storing additional thematic data to the ID without 
additional space. 
329 
-Providing high security in digital geoinformation 
exchange. ; 
- Providing the security of the multi-level ID by encrypting 
the data for unauthorized user accessibility. 
6. REFERENCES 
G., Derrick, (2001), Data watermarking steganography and 
watermarking of digital data, Computer Law & Security Report, 
17 (2), 101-104. 
D., Gruhl, W., Bender, (1998), Information hiding to foil the 
casual counterfeiter, Second [International Workshop on 
Information Hiding, YH'98, Portland, Oregon, 1-15. 
R.J. Anderson, (1996), Stretching the limits of steganography, 
Information Hiding: First International Workshop, 39-48. 
R.J., Anderson, F.A.P. Petitcolas, (1998), On The Limits of 
Steganography, [EEE Journal of Selected Areas in 
Communications, 16 (4), 474-481. 
V.I. Arnol'd, (1992), Catastrophe theory, Springer-Verlag, 
Berlin. 
C. Cachin, (1998), An information-theoretic model for 
steganography, Second International Workshop, Lecture Notes 
in Computer Science, 1525, 306-318. 
L. Chang, I. S. Moskowitz, (1997), Critical analysis of security 
in voice hiding techniques, Information and Communications 
Security: First International Conference, Lecture Notes in 
Computer Science, 1334, 203-216. 
[. Csiszar, (1978), Broadcast channels with condential 
messages, /EEE Transaction on Information Theory, 24 (3), 
339-349. 
D.L. Currie, C.E. Irvine, (1996), Surmounting the effects of 
lossy compression on steganography, In National Information 
System Security Conference, Baltimore, MD, 194-201. 
C. S. Tsai, C.C., Chang, T.S., Chen, (2002), Sharing multiple 
secrets in digital images, The Journal of Systems and Software, 
64, 163-170. 
M.V., Dijk, (1997), On a special class of broadcast channels 
with condential Messages, IEEE Transactions on Information 
Theory, 43 (2), 712-714. 
J.M., Ettinger, (1998), Steganalysis and game equilibria, 
Information Hiding: Second International Workshop, Lecture 
Notes in Computer Science, 1525, 319-328. 
D. Kahn, The history of steganography, (1996), Information 
Hiding: First International! Workshop, Lecture Notes in 
Computer Science, 1174, 1-6. 
C., Kurak, J, McHugh, (1992),0nary note on image 
downgrading, /n Computer Security Applications Conference, 
San Antonio, TX, USA, 153-159. 
A.J., Menezes, P.C.V., Oorschot, S.A., Vanstone, (1997), 
Handbook of applied cryptography, CRC Press, Florida. 
 
	        
Waiting...

Note to user

Dear user,

In response to current developments in the web technology used by the Goobi viewer, the software no longer supports your browser.

Please use one of the following browsers to display this page correctly.

Thank you.