(IJCSIS) International Journal of Computer Science and Information Security,Vol. 10, No. 8, August 2012
staff to attend on their own to have theirfingerprints and prove their identities  .
The fingerprint disadvantages:
Need a special device to capture the image.
Depends on the direct touch of the device thus maylead to transmission of infectious diseases.
Suffer from the problem of error if found dustgrains on the surface of the reader may not allowan authorized person to enter.
Suffer like any other biometric of penetrate thedatabase and change the existing samples thusallow unauthorized to access the system  .IV.
The Steganography is the hiding of a message - (data)within another message (other data) in order to hide theexistence of the first message for a specific purpose, thecovered data that is used as a circumstance or a bowl to hidecan be a multimedia file such as images, text, audio or videofiles, ... etc. Also may be an executable files for differentprograms(.exe), thus, the process to hide is needing two files,one called the cover, and the other is the substance to be hidden.V.
The process of trying to detect the presence of hiddeninformation, read, or to change or delete is called Steganalysis.To success the Steganalysis it must be: 
First, discovering that there is hidden information.Second, change, delete or just read it.
All of our technologies is to hide data in a way not raisesuspicions, do not leave any marks or trace evidence of achange. For example, in the case of hiding in images, it mustconsider several factors, including: Do not use well knownimages, or images that anyone can get copies of them (such asGoogle images) that facilitate comparison of two the images.As well as taking into account does not change image or blur itas change the colors clearly. Therefore, it is advised not to hidea lot of data at the same image fear of change in a way of destroying the primary purpose of the use of technology,raising suspicion that mean failure of the process.It is difficult to identify the hidden data if the program isunknown to the intruder, but unfortunately some programs hideinformation in a way have an impact works like a radiobroadcast news password! Therefore, attention should be paidwhen choosing a program to be used in the process of thishiding.The steganography idea is to put a message inside the cover toform the hidden target. This can be represented by thefollowing equation  :
Target = hidden message want to hide + cover + stego key
In general, the steganography methods can be divided into fourbasic methods:
The text can extracted the hidden message in it, either in away that the text be the first letter of each word represents theletter of the message or hidden in a grammatical or verbal.
The message could be hidden in an audio signal in time orfrequency domain by one of the following methods:
Low-bit coding: This method has a high inputcapacity, but vulnerable to discovery.
Extending the spectrum: the message is insertedinto the higher frequencies than necessary.
Coverage of perception: this way is more of inputcapacity, but the most vulnerable to discovery andis inserted into the text of the message inside theregions of the human person cannot be aware of the traffic light.
Hiding is derived from the images where the videos are only aset of successive images.
The most method that has been studied by researchers.  .VI.
LSB is the most commonly used method in theapplications, it required to enter one or more bits of themessage to be hidden and replaced with a less important bitsfrom the image . The least significant bit is deciding whohas the lowest value calculations (20 = 1) while the mostimportant decision is deciding which has the largest valuecalculations (27 = 128). For example: If you have an imagemade up of pixels each of which has 24-bit (24-bit image), itcan be extracted 3 bits of each byte of the image by 3-bit of themessage to hide. Therefore, the image of size (1024 × 768) canbe hidden a text of its size (294 × 912) bytes without noticewith the eye.Another example: Imagine that the letter "G" is to hideinside the image carrier of eight bytes binary representation is:10010101 00001101 11001001 1001011000001111 11001011 10011111 00010000We know that the representation of the "G" is 01000111binary, then we can get the character in the imagereplacement becomes the least significant bitrepresentation is:10010100 00001101 11001000 1001011000001110 11001011 10011111 00010001VII.
THE COLOR CONCEPT IN THE DIGITAL IMAGES
The color form red, green, blue (RGB) is a color modelwhich combines the lights red, green and blue with each otherin different ways to generate a wide range of colors.The main objective of the RGB color model is a sense,