Professional Documents
Culture Documents
ﭼﮑﻴﺪﻩ :ﺍﻟﮕﻮﺭﻳﺘﻢﻫﺎﻱ ﺟﺎﺳﺎﺯﻱ ﺩﺭ ﺑﻴﺖ ﮐﻢ ﺍﺭﺯﺵ ﭘﻴﮑﺴﻞﻫﺎﻱ ﺗﺼﻮﻳﺮ ) LSB-Fﻭ (LSB-Mﺍﺯ ﺭﺍﻳﺞﺗﺮﻳﻦ ﻭ ﺳﺎﺩﻩﺗﺮﻳﻦ ﺭﻭﺵﻫﺎﻱ ﭘﻨﻬﺎﻥ-
ﻧﮕﺎﺭﻱ ﺍﺳﺖ .ﺩﺭ ﺍﻳﻦ ﻣﻘﺎﻟﻪ ﻣﺪﻟﻲ ﺭﻳﺎﺿﻲ ﺑﺮﺍﻱ ﺍﻳﻦ ﺭﻭﺵﻫﺎ ﺍﺭﺍﺋﻪ ﺷﺪﻩ ﺍﺳﺖ .ﺍﻳﻦ ﻣﺪﻝ ﻣﻲﺗﻮﺍﻧﺪ ﺑﺮﺍﻱ ﺗﻮﺟﻴﻪ ﺭﻓﺘﺎﺭ ﻭ ﺧﻮﺍﺹ ﺍﻳﻦ ﺩﻭ ﻧﻮﻉ
ﭘﻨﻬﺎﻥﻧﮕﺎﺭﻱ ﺑﮑﺎﺭ ﺭﻭﺩ .ﻫﻴﺴﺘﻮﮔﺮﺍﻡ ﺗﺼﻮﻳﺮ ﻳﮑﻲ ﺍﺯ ﻭﻳﮋﮔﻲﻫﺎﻱ ﺗﺼﻮﻳﺮ ﺍﺳﺖ ﮐﻪ ﺩﺭ ﺍﺛﺮ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻭﺵﻫﺎﻱ ﭘﻨﻬﺎﻥﻧﮕﺎﺭﻱ ﺗﻐﻴﻴﺮ ﻣﻲﮐﻨﺪ .ﺑﺎ
ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻣﺪﻝ ﺭﻳﺎﺿﻲ ﺍﺭﺍﺋﻪ ﺷﺪﻩ ،ﺭﻓﺘﺎﺭ ﻫﻴﺴﺘﻮﮔﺮﺍﻡ ﺗﺼﻮﻳﺮ ﺑﻌﺪ ﺍﺯ ﺟﺎﺳﺎﺯﻱ ﻧﻴﺰ ﻣﺪﻝ ﺷﺪﻩ ﺍﺳﺖ .ﺳﭙﺲ ﺍﺯ ﻣﺪﻝ ﻫﻴﺴﺘﻮﮔﺮﺍﻡ ﺗﺼﻮﻳﺮ ،ﺑﺮﺍﻱ
ﺗﺨﻤﻴﻦ ﻣﻴﺰﺍﻥ ﺗﻐﻴﻴﺮﺍﺕ ﻫﻴﺴﺘﻮﮔﺮﺍﻡ ﺩﺭ ﺍﺛﺮ ﺟﺎﺳﺎﺯﻱ ﺍﺳﺘﻔﺎﺩﻩ ﮔﺮﺩﻳﺪﻩ ﺍﺳﺖ .ﺻﺤﺖ ﻣﺪﻝﻫﺎﻱ ﺍﺭﺍﺋﻪ ﺷﺪﻩ ﺗﻮﺳﻂ ﺷﺒﻴﻪﺳﺎﺯﻱ ﺑﻪ ﺍﺛﺒﺎﺕ ﺭﺳﻴﺪﻩ
ﺍﺳﺖ.
ﻭﺍﮊﻩ ﻫﺎﻱ ﮐﻠﻴﺪﻱ :ﭘﻨﻬﺎﻥ ﻧﮕﺎﺭﯼ ،ﻫﻴﺴﺘﻮﮔﺮﺍﻡ ،ﻣﺪﻝ ﺭﻳﺎﺿﯽ ،ﺑﻴﺖ ﮐﻢ ﺍﺭﺯﺵ
ﭘﻨﻬﺎﻥ ﻧﮕﺎﺭﻱ ﻫﻨﺮ ﺍﺭﺗﺒﺎﻁ ﭘﻨﻬﺎﻧﻲ ﺍﺳﺖ ﻭ ﻫﺪﻑ ﺁﻥ ﭘﻨﻬﺎﻥ ﮐﺮﺩﻥ -۱ﻣﻘﺪﻣﻪ
٤
ﺍﺭﺗﺒﺎﻁ ﺑﻪ ﻭﺳﻴﻠﻪ ﻗﺮﺍﺭ ﺩﺍﺩﻥ ﭘﻴﺎﻡ ﺩﺭ ﻳﮏ ﺭﺳﺎﻧﻪ ﭘﻮﺷﺎﻧﻪ ﺍﺳﺖ ﺑﻪ ﻣﺘﻦ ،ﺗﺼﻮﻳﺮ ،ﺻﻮﺕ ﻭ ﻭﻳﺪﺋﻮ ﺭﺍ ﻣﻲﺗﻮﺍﻥ ﺑﻪ ﺻﻮﺭﺕ ﺩﺍﺩﻩﻫﺎﻱ
ﮔﻮﻧﻪ ﺍﻱ ﮐﻪ ﮐﻤﺘﺮﻳﻦ ﺗﻐﻴﻴﺮ ﻗﺎﺑﻞ ﮐﺸﻒ ﺭﺍ ﺩﺭ ﺁﻥ ﺍﻳﺠﺎﺩ ﻧﻤﺎﻳﺪ ﻭ ﺩﻳﺠﻴﺘﺎﻝ ﺑﻴﺎﻥ ﮐﺮﺩ .ﻓﺮﺍﮔﻴﺮﻱ ﻓﺰﺍﻳﻨﺪﻩ ﻭ ﺭﺷﺪ ﺳﺮﻳﻊ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ
ﻧﺘﻮﺍﻥ ﻣﻮﺟﻮﺩﻳﺖ ﭘﻴﺎﻡ ﭘﻨﻬﺎﻥ ﺩﺭ ﺭﺳﺎﻧﻪ ﺭﺍ ﺣﺘﻲ ﺑﻪ ﺻﻮﺭﺕ ﺍﻳﻨﺘﺮﻧﺖ ﺍﻧﺴﺎﻥﻫﺎ ﺭﺍ ﺑﻪ ﺳﻮﻱ ﺟﻬﺎﻥ ﺩﻳﺠﻴﺘﺎﻝ ﻭ ﺍﺭﺗﺒﺎﻁ ﺍﺯ ﻃﺮﻳﻖ
ﺍﺣﺘﻤﺎﻟﻲ ﺁﺷﻜﺎﺭ ﺳﺎﺧﺖ ].[2 ﺩﺍﺩﻩﻫﺎﻱ ﺩﻳﺠﻴﺘﺎﻝ ﺳﻮﻕ ﺩﺍﺩﻩ ﺍﺳﺖ .ﺍﻣﻨﻴﺖ ﺍﺭﺗﺒﺎﻃﺎﺕ ﺩﺍﻧﺸﻲ
ﺭﻣﺰﻧﮕﺎﺭﻱ ﻧﻴﺰ ﻳﮑﻲ ﺍﺯ ﺭﻭﺵﻫﺎﻱ ﺍﻣﻦ ﮐﺮﺩﻥ ﺍﺭﺗﺒﺎﻃﺎﺕ ﺍﺳﺖ .ﺩﺭ ﺍﺳﺖ ﮐﻪ ﺷﺎﻣﻞ ﻋﻠﻮﻡ ﻣﺨﺘﻠﻔﻲ ﭼﻮﻥ ﺭﻣﺰﻧﮕﺎﺭﻱ ،١ﺗﻪﻧﻘﺶ-
ﺭﻣﺰﻧﮕﺎﺭﻱ ﺗﻼﺷﻲ ﺑﺮﺍﻱ ﭘﻨﻬﺎﻥ ﮐﺮﺩﻥ ﭘﻴﺎﻡ ﮐﺪ ﺷﺪﻩ ﺍﻧﺠﺎﻡ ﻧﮕﺎﺭﻱ ،٢ﺍﺭﺗﺒﺎﻃﺎﺕ ﭘﻮﺷﻴﺪﻩ ٣ﻭ ...ﻣﻲﺑﺎﺷﺪ].[1
ﻧﻤﻲﺷﻮﺩ ﻭ ﻫﺪﻑ ،ﺍﻧﺘﻘﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺑﻪ ﮔﻮﻧﻪﺍﻱ ﺍﺳﺖ ﮐﻪ ﻃﺮﻑ
1 Cryptography
٢٤٩
2 Watermarking
4 Cover media 3 Covert Channel
www.SID.ir
Archvie of SID
10 Decryption
11 Decompression
12 Steganalysis 5 Compression
13 spatial domain 6 Encryption
14 transform domain 7 Embedding
)15 Least Significant Bit Flipping (LSB-F 8 Extraction ٢٥٠
)16 Least Significant Bit Matching (LSB-M 9 Stego Media
www.SID.ir
Archvie of SID
ﺗﺼﻮﻳﺮ ﺑﺮﺍﺑﺮ ﺍﺳﺖ .ﺑﻪ ﻫﻤﻴﻦ ﺩﻟﻴﻞ ﺍﻳﻦ ﺭﻭﺵ ﺩﺭ ﺑﺮﺍﺑﺮ ﺣﻤﻼﺗﻲ ﻫﻴﺴﺘﻮﮔﺮﺍﻡ ﺗﺼﻮﻳﺮ ،ﺗﺨﻤﻴﻨﻲ ﺍﺯ ﺗﻐﻴﻴﺮ ﺍﻳﺠﺎﺩ ﺷﺪﻩ ﺩﺭ ﻫﻴﺴﺘﻮﮔﺮﺍﻡ
ﺁﺳﻴﺐ ﭘﺬﻳﺮ ﺍﺳﺖ ﮐﻪ ﻫﻴﺴﺘﻮﮔﺮﺍﻡ ﺭﺍ ﺑﺮﺭﺳﻲ ﻣﻲ ﮐﻨﻨﺪ .ﺑﺮﺧﻲ ﺍﺯ ﺗﺼﻮﻳﺮ ﺩﺭ ﺍﺛﺮ ﺟﺎﺳﺎﺯﻱ ﺑﻪ ﺭﻭﺵﻫﺎﻱ LSB-Fﻭ LSB-Mﻗﺎﺑﻞ
ﺍﻳﻦ ﺣﻤﻼﺕ ﺩﺭ ] [10,13,14ﺁﻭﺭﺩﻩ ﺷﺪﻩ ﺍﺳﺖ .ﺍﻣﺎ ﺑﺎ ﺗﻮﺟﻪ ﺑﺎ ﻣﺤﺎﺳﺒﻪ ﺍﺳﺖ.
ﺍﻳﻦﮐﻪ ﺭﻭﺵ LSB-Mﺍﺯ ﺍﻳﺠﺎﺩ POVﺩﺭ ﻫﻴﺴﺘﻮﮔﺮﺍﻡ ﺟﻠﻮﮔﻴﺮﻱ ﺩﺭ ﺍﺩﺍﻣﻪ ﻣﻘﺎﻟﻪ ،ﺍﺑﺘﺪﺍ ﺍﻟﮕﻮﺭﻳﺘﻢ LSB-Mﻭ LSB-Fﺑﻪ ﺻﻮﺭﺕ
ﻣﻲﮐﻨﺪ ،ﺩﺭ ﺑﺮﺍﺑﺮ ﺣﻤﻼﺕ ﺍﺭﺍﺋﻪ ﺷﺪﻩ ﺑﺮﺍﻱ LSB-Fﻣﻘﺎﻭﻡ ﺍﺳﺖ. ﻣﺨﺘﺼﺮ ﺑﺮﺭﺳﻲ ﻣﻲﺷﻮﺩ .ﺳﭙﺲ ﺩﺭ ﺑﺨﺶ ،٣ﻣﺪﻝ ﺭﻳﺎﺿﻲ
ﺩﺭ ﻣﻮﺭﺩ LSB-Mﻧﻴﺰ ﺣﻤﻼﺕ ﺩﻳﮕﺮﻱ ﻣﻄﺮﺡ ﮔﺮﺩﻳﺪﻩ ﺍﺳﺖ ،ﺍﻣﺎ ﻣﺘﻨﺎﻇﺮ ﺑﺎ ﺍﻳﻦ ﺭﻭﺵ ﻫﺎ ﺍﺭﺍﺋﻪ ﻣﻲﺷﻮﺩ .ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻳﻦ ﻣﺪﻝﻫﺎﻱ
ﻫﻴﭻ ﮐﺪﺍﻡ ﺍﺯ ﺁﻧﻬﺎ ﮐﺎﻣﻼﹰ ﻣﻮﻓﻖ ﻧﺒﻮﺩﻩﺍﻧﺪ .ﺑﺮﺧﻲ ﺍﺯ ﺍﻳﻦ ﺣﻤﻼﺕ ﺭﻳﺎﺿﻲ ،ﺩﺭ ﺑﺨﺶ ٤ﺭﻭﺷﻲ ﺑﺮﺍﻱ ﻣﺤﺎﺳﺒﻪ ﺗﺨﻤﻴﻦ ﺧﻄﺎﻱ
ﺩﺭ ] [11,15ﺁﻭﺭﺩﻩ ﺷﺪﻩ ﺍﺳﺖ. ﻫﻴﺴﺘﻮﮔﺮﺍﻡ ﺩﺭ ﺍﺛﺮ ﺍﻋﻤﺎﻝ ﺍﻳﻦ ﺭﻭﺵﻫﺎ ﺍﺭﺍﺋﻪ ﻣﻲﺷﻮﺩ .ﺩﺭ ﺑﺨﺶ،٥
ﻧﺘﺎﻳﺞ ﺗﺨﻤﻴﻦ ﺧﻄﺎﻱ ﺣﺎﺻﻞ ﺍﺯ ﺗﺌﻮﺭﻱ ﻭ ﺷﺒﻴﻪ ﺳﺎﺯﻱ ﻣﻘﺎﻳﺴﻪ
ﻣﻲﺷﻮﺩ.
-۳ﻣﺪﻝ ﺭﻳﺎﺿﻲ ﺭﻭﺵﻫﺎﻱ LSB-Fﻭ LSB-M
ﺩﺍﺩﻩﻫﺎﻳﻲ ﮐﻪ ﺩﺭ ﻓﺮﺁﻳﻨﺪ ﺟﺎﺳﺎﺯﻱ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﻣﻲﮔﻴﺮﻧﺪ،
ﺑﺎﻳﺪ ﺍﺑﺘﺪﺍ ﻓﺸﺮﺩﻩ ﻭ ﺳﭙﺲ ﺭﻣﺰ ﺷﻮﻧﺪ .ﺩﺍﺩﻩﻫﺎﻳﻲ ﮐﻪ ﺑﻪ ﺍﻳﻦ -۲ﺍﻟﮕﻮﺭﻳﺘﻢ LSB-Fﻭ LSB-M
ﺻﻮﺭﺕ ﺗﻮﻟﻴﺪ ﻣﻲﺷﻮﻧﺪ ﺧﻮﺍﺻﻲ ﻣﺎﻧﻨﺪ ﻳﮏ ﺩﻧﺒﺎﻟﻪ ﺑﻴﺖ ﺗﺼﺎﺩﻓﻲ ﺭﺍﻳﺞﺗﺮﻳﻦ ﻭ ﺳﺎﺩﻩﺗﺮﻳﻦ ﺭﻭﺵ ﺟﺎﺳﺎﺯﻱ ﺩﺭ ﺣﻮﺯﻩ ﻣﮑﺎﻧﻲ ،ﺭﻭﺵ
ﺩﺍﺭﻧﺪ .ﺍﻣﻴﺪ ﺭﻳﺎﺿﻲ ﺗﻌﺪﺍﺩ ﺑﻴﺖﻫﺎﻱ ﻳﮏ ﻭ ﺻﻔﺮ ﺩﺭ ﺍﻳﻦ ﺭﺷﺘﻪ ﺟﺎﺳﺎﺯﻱ ﺩﺭ ﺑﻴﺖﻫﺎﻱ ﮐﻢ ﺍﺭﺯﺵ ﺍﺳﺖ ﮐﻪ ﭘﻴﺎﻡ ﺭﺍ ﺩﺭ ﮐﻢ ﺍﺭﺯﺵ-
ﺑﻴﺖ ﺑﺎ ﻳﮑﺪﻳﮕﺮ ﺑﺮﺍﺑﺮ ﺍﺳﺖ] .[16ﺟﺎﺳﺎﺯﻱ ﻳﮏ ﺑﻴﺖ ﺩﺍﺩﻩ ﺗﺮﻳﻦ ﺑﻴﺖﻫﺎﻱ ﭘﻴﮑﺴﻞﻫﺎ ﻗﺮﺍﺭ ﻣﻲﺩﻫﺪ .ﺟﺎﺳﺎﺯﻱ ﺑﻪ ﺍﻳﻦ ﺭﻭﺵ
ﺗﺼﺎﺩﻓﻲ ﺩﺭ ﻳﮏ ﭘﻴﮑﺴﻞ ﺑﺎﻋﺚ ﺍﻳﺠﺎﺩ ﺗﻐﻴﻴﺮﺍﺗﻲ ﺩﺭ ﻣﻘﺪﺍﺭ ﺳﻄﺢ ﺳﺎﺩﻩﺗﺮﻳﻦ ﺭﻭﺵ ﭘﻨﻬﺎﻥﻧﮕﺎﺭﻱ ﺩﺭ ﺣﻮﺯﻩ ﻣﮑﺎﻧﻲ ﺍﺳﺖ ﻭ ﺭﻭﺵ-
ﺭﻭﺷﻨﺎﻳﻲ ﺁﻥ ﭘﻴﮑﺴﻞ ﻣﻲﮔﺮﺩﺩ .ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺍﻳﻨﮑﻪ ﺟﺎﺳﺎﺯﻱ ﺑﻪ ﻫﺎﻱ ﭘﻨﻬﺎﻥﻧﮕﺎﺭﻱ ﺑﺴﻴﺎﺭﻱ ﺑﺮ ﻣﺒﻨﺎﻱ ﺍﻳﻦ ﺭﻭﺍﻝ ﺗﺎ ﺑﻪ ﺣﺎﻝ ﺍﺭﺍﺋﻪ
ﺭﻭﺵﻫﺎﻱ LSB-Mﻭ LSB-Fﺗﻨﻬﺎ ﻣﻘﺪﺍﺭ ﭘﻴﮑﺴﻞ ﺭﺍ ﺑﻪ ﺍﻧﺪﺍﺯﻩ ﺷﺪﻩ ﺍﺳﺖ .ﺑﺼﻮﺭﺕ ﮐﻠﻲ ،ﺭﻭﺵﻫﺎﻱ ﭘﻨﻬﺎﻥﻧﮕﺎﺭﻱ ﺩﺭ ﺑﻴﺖﻫﺎﻱ
ﻳﮏ ﻭﺍﺣﺪ ﮐﺎﻫﺶ ﻳﺎ ﺍﻓﺰﺍﻳﺶ ﻣﻲﺩﻫﺪ ،ﻣﻲﺗﻮﺍﻥ ﺗﻐﻴﻴﺮ ﻣﻘﺪﺍﺭ ﺳﻄﺢ ﮐﻢ ﺍﺭﺯﺵ ﺭﺍ ﺩﺭ ﺩﻭ ﺩﺳﺘﻪ LSB-Fﻭ LSB-Mﻣﻲﺗﻮﺍﻥ ﺗﻘﺴﻴﻢ
ﺭﻭﺷﻨﺎﻳﻲ ﻳﮏ ﭘﻴﮑﺴﻞ ﺩﺭ ﺍﺛﺮ ﺟﺎﺳﺎﺯﻱ ﻳﮏ ﺑﻴﺖ ﺩﺍﺩﻩ ﺗﺼﺎﺩﻓﻲ ﺭﺍ ﺑﻨﺪﻱ ﮐﺮﺩ].[11
ﺑﻪ ﺻﻮﺭﺕ ﺷﮑﻞ ٢ﻣﺪﻝ ﮐﺮﺩ. ﺩﺭ ﺭﻭﺵ ،LSB-Fﺗﻨﻬﺎ ﮐﻢ ﺍﺭﺯﺵﺗﺮﻳﻦ ﺑﻴﺖ ﻫﺮ ﭘﻴﮑﺴﻞ ﺗﻐﻴﻴﺮ
ﺍﮔﺮ ﺳﻄﺢ ﺭﻭﺷﻨﺎﻳﻲ ﻳﮏ ﭘﻴﮑﺴﻞ ﺭﺍ iﻓﺮﺽ ﮐﻨﻴﻢ ﻭ ﺳﻄﺢ ﻣﻲﮐﻨﺪ .ﺑﻪ ﻋﺒﺎﺭﺕ ﺩﻳﮕﺮ ﺩﺭ ﺍﻳﻦ ﺭﻭﺵ ﺑﻴﺖ ﮐﻢ ﺍﺭﺯﺵ ﭘﻴﮑﺴﻞ-
ﺭﻭﺷﻨﺎﻳﻲ ﻫﻤﻴﻦ ﭘﻴﮑﺴﻞ ﺑﻌﺪ ﺍﺯ ﺟﺎﺳﺎﺯﻱ ﺩﺭ ﺁﻥ ﺭﺍ jﺑﻨﺎﻣﻴﻢ، ﻫﺎﻱ ﺗﺼﻮﻳﺮ ﭘﻮﺷﺎﻧﻪ ﺑﺎ ﺑﻴﺖﻫﺎﻱ ﭘﻴﺎﻡ ﺟﺎﮔﺬﺍﺭﻱ ﻣﻲﺷﻮﻧﺪ .ﺩﺭ
ﺁﻧﮕﺎﻩ ﺩﺭ ﺣﺎﻟﺖ ﮐﻠﻲ ،ﺑﺎ ﻓﺮﺽ ﺍﻳﻨﮑﻪ ﻣﻘﺪﺍﺭ ﺩﺍﺩﻩ ﺟﺎﺳﺎﺯﻱ ﺷﺪﻩ ﺭﻭﺵ LSB-Mﻧﻴﺰ ﻫﺪﻑ ﻳﮑﺴﺎﻥ ﮐﺮﺩﻥ ﺑﻴﺖ LSBﭘﻴﮑﺴﻞﻫﺎﻱ
dﺑﺎﺷﺪ ،ﺍﺣﺘﻤﺎﻝ ﺗﻐﻴﻴﺮ iﺑﻪ jﺑﺮﺍﺑﺮ ﺍﺳﺖ ﺑﺎ: ﺗﺼﻮﻳﺮ ﺑﺎ ﺑﻴﺖﻫﺎﻱ ﭘﻴﺎﻡ ﺍﺳﺖ ،ﺍﻣﺎ ﻣﻤﮑﻦ ﺍﺳﺖ ﺑﺮﺍﻱ ﺭﺳﻴﺪﻥ ﺑﻪ
P (i ® j ) = P (i ® j | d = 0) P (d = 0) + ﺍﻳﻦ ﻫﺪﻑ ﭼﻨﺪ ﺑﻴﺖ ﭘﻴﮑﺴﻞ ﺗﻐﻴﻴﺮ ﻳﺎﺑﺪ .ﺩﺭ ﺍﻳﻦ ﺭﻭﺵ ﺩﺭ
)P (i ® j | d = 1) P (d = 1
ﺻﻮﺭﺕ ﺗﻄﺎﺑﻖ ﺑﻴﺖ ﺩﺍﺩﻩ ﺑﺎ ﺑﻴﺖ ﮐﻢ ﺍﺭﺯﺵ ﭘﻴﮑﺴﻞ ،ﺗﻐﻴﻴﺮﻱ ﺩﺭ
ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺍﻟﮕﻮﺭﻳﺘﻢ ﺑﮑﺎﺭ ﺭﻓﺘﻪ ﺑﺮﺍﻱ ﺟﺎﺳﺎﺯﻱ ،ﻣﻘﺪﺍﺭ ﺍﻳﻦ
ﭘﻴﮑﺴﻞ ﺍﻳﺠﺎﺩ ﻧﻤﻲﺷﻮﺩ .ﺩﺭ ﺻﻮﺭﺕ ﻋﺪﻡ ﺗﻄﺎﺑﻖ ،ﻣﻘﺪﺍﺭ ﭘﻴﮑﺴﻞ
ﺍﺣﺘﻤﺎﻝ ﺩﺭ ﺣﺎﻻﺕ ﻣﺨﺘﻠﻒ ،ﻣﺘﻔﺎﻭﺕ ﺍﺳﺖ .ﺩﺭ ﺟﺪﻭﻝ ،١ﻣﻘﺪﺍﺭ
ﺑﻪ ﺻﻮﺭﺕ ﺗﺼﺎﺩﻓﻲ ﮐﺎﻫﺶ ﻳﺎ ﺍﻓﺰﺍﻳﺶ ﻣﻲﻳﺎﺑﺪ .ﺑﻪ ﻫﻤﻴﻦ ﺩﻟﻴﻞ
ﺍﻳﻦ ﺍﺣﺘﻤﺎﻝ ﺩﺭ ﺣﺎﻻﺕ ﮔﻮﻧﺎﮔﻮﻥ ﻧﺸﺎﻥ ﺩﺍﺩﻩ ﺷﺪﻩ ﺍﺳﺖ.ﺑﺎ ﺗﻮﺟﻪ
ﺍﻳﻦ ﺭﻭﺵ ﺑﺎ ﻋﻨﻮﺍﻥ ﺭﻭﺵ ﺟﺎﺳﺎﺯﻱ ± 1ﻧﻴﺰ ﺷﻨﺎﺧﺘﻪ ﻣﻲ-
ﺑﻪ ﻣﻘﺎﺩﻳﺮ ﺑﺪﺳﺖ ﺁﻣﺪﻩ ﺩﺭ ﺟﺪﻭﻝ ،١ﻣﻲ ﺗﻮﺍﻥ ﺷﮑﻞ ٢ﺭﺍ ﺑﺮﺍﻱ
ﺷﻮﺩ].[12
ﺭﻭﺵ LSB-Fﺑﻪ ﺻﻮﺭﺕ ﺷﮑﻞ -٣ﺍﻟﻒ ﻭ ﺑﺮﺍﻱ ﺭﻭﺵ LSB-M
١٧
ﺟﺎﺳﺎﺯﻱ ﺑﻪ ﺭﻭﺵ ،LSB-Fﺟﻔﺖ ﺭﻧﮓ ﻫﺎ ﻳﺎ ﺯﻭﺝ ﻣﻘﺎﺩﻳﺮﻱ
٢٥١ ﺑﻪ ﺻﻮﺭﺕ ﺷﮑﻞ -٣ﺏ ﻧﻤﺎﻳﺶ ﺩﺍﺩ.
ﺩﺭ ﻫﻴﺴﺘﻮﮔﺮﺍﻡ ﺗﺼﻮﻳﺮ ﺍﻳﺠﺎﺩ ﻣﻲﮐﻨﺪ ﮐﻪ ﺗﻌﺪﺍﺩ ﺭﺧﺪﺍﺩ ﺁﻥﻫﺎ ﺩﺭ
17
)Pair Of Value (POV www.SID.ir
Archvie of SID
ﺷﮑﻞ :۲ﻣﺪﻝ ﮐﻠﻲ ﺗﻐﻴﻴﺮ ﻣﻘﺪﺍﺭ ﺳﻄﺢ ﺭﻭﺷﻨﺎﻳﻲ ﻳﮏ ﭘﻴﮑﺴﻞ ﺩﺭ ﺍﺛﺮ ﺟﺎﺳﺎﺯﻱ ﻳﮏ ﺑﻴﺖ ﺩﺍﺩﻩ
ﻫﻴﺴﺘﻮﮔﺮﺍﻡ ﺭﻧﮓ ﭘﻴﮑﺴﻞﻫﺎﻱ ﺗﺼﻮﻳﺮ ﺑﻮﺟﻮﺩ ﺧﻮﺍﻫﺪ ﺁﻣﺪ .ﺩﺭ ﺩﺭ ﺷﮑﻞ -٣ﺍﻟﻒ ﺩﻳﺪﻩ ﻣﻲﺷﻮﺩ ﮐﻪ ﭘﻴﮑﺴﻠﻲ ﺑﺎ ﺳﻄﺢ ﺭﻭﺷﻨﺎﻳﻲ
ﺍﺩﺍﻣﻪ ﺗﺼﺎﻭﻳﺮ ﻃﻴﻒ ﺧﺎﮐﺴﺘﺮﻱ ٢٠ﻣﻮﺭﺩ ﺑﺮﺭﺳﻲ ﻗﺮﺍﺭ ﻣﻲﮔﻴﺮﻧﺪ. ﺯﻭﺝ ﺩﺭ ﺍﺛﺮ ﺟﺎﺳﺎﺯﻱ ﺑﻴﺖ ١ﺑﻪ ﺳﻄﺢ ﺭﻭﺷﻨﺎﻳﻲ ﻓﺮﺩ ﺗﻐﻴﻴﺮ ﻣﻲ-
ﺭﻭﺵ ﭘﻴﺸﻨﻬﺎﺩﻱ ﺭﺍ ﻣﻲﺗﻮﺍﻥ ﺑﺮﺍﻱ ﺗﺼﺎﻭﻳﺮ ﺭﻧﮕﻲ ﻧﻴﺰ ﺗﻌﻤﻴﻢ ﺩﺍﺩ، ﮐﻨﺪ .ﺩﺭ ﺭﻭﺵ ،LSB-Fﺍﮔﺮ ﺩﺍﺩﻩﻫﺎﻱ ﺟﺎﺳﺎﺯﻱ ﺷﺪﻩ ﺭﺍ ﺗﺼﺎﺩﻓﻲ
ﺯﻳﺮﺍ ﺗﺼﺎﻭﻳﺮ ﺭﻧﮕﻲ ﺭﺍ ﻣﻲﺗﻮﺍﻥ ﺑﻪ ﺻﻮﺭﺕ ﺳﻪ ﺗﺼﻮﻳﺮ ﻃﻴﻒ ﻓﺮﺽ ﮐﻨﻴﻢ ﭘﻴﮑﺴﻠﻲ ﺑﺎ ﺳﻄﺢ ﺭﻭﺷﻨﺎﻳﻲ 2iﺑﻪ ﺍﺣﺘﻤﺎﻝ 1 2ﺑﻪ
ﺧﺎﮐﺴﺘﺮﻱ ﻣﺠﺰﺍ ﺩﺭ ﻧﻈﺮ ﮔﺮﻓﺖ. ﺳﻄﺢ ﺭﻭﺷﻨﺎﻳﻲ 2i+ 1ﺗﺒﺪﻳﻞ ﻣﻲﺷﻮﺩ.
ﺗﺼﻮﻳﺮﻫﺎﻱ ﻃﻴﻒ ﺧﺎﮐﺴﺘﺮﻱ ﺑﺎ ﭘﻴﮑﺴﻞﻫﺎﻱ ٨ﺑﻴﺘﻲ ﺩﺍﺭﺍﻱ ﺟﺎﺳﺎﺯﻱ ﺑﻪ ﺭﻭﺵ LSB-Mﺭﺍ ﻣﻲﺗﻮﺍﻥ ﺑﺎ ﺍﺿﺎﻓﻪ ﺷﺪﻥ
ﺭﻭﺷﻨﺎﻳﻲ ﺩﺭ ﺑﺎﺯﻩ ] [0,255ﻣﻲﺑﺎﺷﻨﺪ .ﻓﺮﺽ ﮐﻨﻴﺪ ﺭﻭﺷﻨﺎﻳﻲ ﺍﻏﺘﺸﺎﺵ ١٨ﺑﻪ ﺗﺼﻮﻳﺮ ﻣﺪﻝ ﮐﺮﺩ .ﺗﺼﻮﻳﺮ ﺍﺳﺘﮕﻮ ﺣﺎﺻﻞ ﺟﻤﻊ
ﺗﺼﻮﻳﺮ ﺩﺭ ﻣﻮﻗﻌﻴﺖ ) (m,nﺭﺍ ﺑﺎ ) I(m,nﻧﺸﺎﻥ ﺩﻫﻴﻢ. ﺗﺼﻮﻳﺮ ﭘﻮﺷﺎﻧﻪ ﻭ ﻧﻮﻳﺰ ﮔﻮﺳﻲ ١٩ﺍﺳﺖ .ﺩﺭ ﺍﻳﻦ ﺭﻭﺵ ،ﻧﻮﻳﺰ
ﻫﻴﺴﺘﻮﮔﺮﺍﻡ ،ﺑﻴﺎﻧﮕﺮ ﻓﺮﮐﺎﻧﺲ ﺭﺧﺪﺍﺩ ﻫﺮ ﺭﻭﺷﻨﺎﻳﻲ ﺩﺭ ﺗﺼﻮﻳﺮ ﺍﺿﺎﻓﻪ ﺷﺪﻩ ﺗﻨﻬﺎ ﺳﻪ ﻣﻘﺪﺍﺭ 0 ،+ 1ﻭ -1ﺭﺍ ﻣﻲﺗﻮﺍﻧﺪ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ.
ﺍﺳﺖ ،ﺑﻪ ﻋﺒﺎﺭﺕ ﺩﻳﮕﺮ: ﺍﺣﺘﻤﺎﻝ ﺍﺿﺎﻓﻪ ﺷﺪﻥ ﻫﺮ ﮐﺪﺍﻡ ﺍﺯ ﺍﻳﻦ ﻣﻘﺎﺩﻳﺮ ﺑﺪﻳﻦ ﺻﻮﺭﺕ ﺍﺳﺖ:
}hi = {(m, n) | I (m, n) = i p(-1) = 1 4 , p(0) =1 2 , p(1) = 1 4
ﺩﺭ ﺍﻳﻨﺠﺎ ﻣﻨﻈﻮﺭ ﺍﺯ ، hiﺗﻌﺪﺍﺩ ﭘﻴﮑﺴﻞﻫﺎﻱ ﺑﺎ ﺭﻭﺷﻨﺎﻳﻲ iﺩﺭ ﺩﺭ ﺍﻳﻦ ﺻﻮﺭﺕ ﺑﺎ ﺍﺣﺘﻤﺎﻝ 1 2ﻣﻘﺪﺍﺭ ﭘﻴﮑﺴﻞ ﺗﻐﻴﻴﺮﻱ ﻧﻤﻲﮐﻨﺪ
ﺗﺼﻮﻳﺮ ﺍﺳﺖ] .[11ﻓﺮﺽ ﮐﻨﻴﺪ ﺑﺮﺍﻱ ﻫﻴﺴﺘﻮﮔﺮﺍﻡ ﺗﺼﻮﻳﺮ ﭘﻮﺷﺎﻧﻪ ) ( p(0) =1 2ﻭ ﺑﺎ ﺍﺣﺘﻤﺎﻝ 1 4ﻣﻘﺪﺍﺭ ﭘﻴﮑﺴﻞ ﺍﻓﺰﺍﻳﺶ
ﻭ ﺗﺼﻮﻳﺮ ﺍﺳﺘﮕﻮ ﺑﻪ ﺗﺮﺗﻴﺐ ﺍﺯ ﻧﻤﺎﺩﻫﺎﻱ hiﻭ hi¢ﺍﺳﺘﻔﺎﺩﻩ ﮐﻨﻴﻢ. ) ( p(1) =1 4ﻳﺎ ﮐﺎﻫﺶ ) ( p(-1) =1 4ﻣﻲﻳﺎﺑﺪ.
ﺩﺭ ﺭﻭﺵ LSB-Mﻣﻘﺪﺍﺭ hi¢ﺗﺤﺖ ﺗﺄﺛﻴﺮ ﺳﻪ ﻣﻘﺪﺍﺭ hi ، hi -1ﻭ ﺣﺎﻝ ﻣﻲﺧﻮﺍﻫﻴﻢ ﺑﺪﺍﻧﻴﻢ ﺍﮔﺮ ﺍﻟﮕﻮﺭﻳﺘﻢ LSB-Mﻭ LSB-Fﺭﺍ ﻳﮏ
hi +1ﻗﺮﺍﺭ ﻣﻲﮔﻴﺮﺩ .ﺑﻪ ﻋﺒﺎﺭﺕ ﺩﻳﮕﺮ ،ﻣﻲﺗﻮﺍﻥ ﮔﻔﺖ ﺑﺎﺭ ﺭﻭﻱ ﺗﻤﺎﻡ ﭘﻴﮑﺴﻞﻫﺎﻱ ﺗﺼﻮﻳﺮ ﺍﻋﻤﺎﻝ ﮐﻨﻴﻢ ،ﭼﻪ ﺗﻐﻴﻴﺮﺍﺗﻲ ﺩﺭ
ﺷﮑﻞ :۳ﻣﺪﻝ ﺗﻐﻴﻴﺮ ﻣﻘﺪﺍﺭ ﺳﻄﺢ ﺭﻭﺷﻨﺎﻳﻲ ﻳﮏ ﭘﻴﮑﺴﻞ ﺩﺭ ﺍﺛﺮ ﺟﺎﺳﺎﺯﻱ ﻳﮏ ﺑﻴﺖ ﺩﺍﺩﻩ ﺩﺭ ﺭﻭﺵ )ﺍﻟﻒ( ) LSB-Mﺏ( LSB-F
hi -1 ﻣﻘﺪﺍﺭ ﻧﻬﺎﻳﻲ hi¢ﺣﺎﺻﻞ ﺳﻪ ﻣﻮﺭﺩ ﺯﻳﺮ ﺍﺳﺖ:
ﺩﻭﺟﻤﻠﻪﺍﻱ ﻣﺮﺑﻮﻃﻪ ﺭﺍ ﺗﻌﺮﻳﻒ ﮐﺮﺩ M +1 = å S+1 .ﻳﮏ
j =1
· ﺗﻌﺪﺍﺩ ﭘﻴﮑﺴﻞﻫﺎﻳﻲ ﺑﺎ ﺭﻭﺷﻨﺎﻳﻲ i - 1ﮐﻪ ﻧﻮﻳﺰﻱ ﺑﺎ ﻣﻘﺪﺍﺭ + 1
ﻣﺘﻐﻴﺮ ﺩﻭﺟﻤﻠﻪﺍﻱ ﺑﺎ ﭘﺎﺭﺍﻣﺘﺮﻫﺎﻱ n = hi -1ﻭ p = 1 4ﺍﺳﺖ.
ﺑﻪ ﺁﻥﻫﺎ ﺍﺿﺎﻓﻪ ﺷﺪﻩ ﺍﺳﺖ.
hi
M 0 = å S0ﻧﻴﺰ ﻳﮏ ﻣﺘﻐﻴﺮ ﺩﻭﺟﻤﻠﻪﺍﻱ ﺑﺎ ﭘﺎﺭﺍﻣﺘﺮﻫﺎﻱ n = hi · ﺗﻌﺪﺍﺩ ﭘﻴﮑﺴﻞﻫﺎﻳﻲ ﺑﺎ ﺭﻭﺷﻨﺎﻳﻲ iﮐﻪ ﻣﻘﺪﺍﺭ ﺁﻥﻫﺎ ﺗﻐﻴﻴﺮﻱ
j =1
hi +1 ﻧﮑﺮﺩﻩ ﺍﺳﺖ.
ﻭ p = 1 2ﺍﺳﺖ .ﺑﻪ ﻫﻤﻴﻦ ﺗﺮﺗﻴﺐ M -1 = å S-1ﻳﮏ ﻣﺘﻐﻴﺮ
j =1 · ﺗﻌﺪﺍﺩ ﭘﻴﮑﺴﻞﻫﺎﻳﻲ ﺑﺎ ﺭﻭﺷﻨﺎﻳﻲ i + 1ﮐﻪ ﻧﻮﻳﺰﻱ ﺑﺎ ﻣﻘﺪﺍﺭ -1
ﺩﻭﺟﻤﻠﻪﺍﻱ ﺑﺎ ﭘﺎﺭﺍﻣﺘﺮﻫﺎﻱ n = hi +1ﻭ p = 1 4ﺍﺳﺖ .ﺑﻨﺎﺑﺮﺍﻳﻦ ﺑﻪ ﺁﻥﻫﺎ ﺍﺿﺎﻓﻪ ﺷﺪﻩ ﺍﺳﺖ.
H i¢ﻣﺠﻤﻮﻉ ﺳﻪ ﻣﺘﻐﻴﺮ ﺩﻭ ﺟﻤﻠﻪﺍﻱ ﺍﺳﺖ. ﻣﻲﺗﻮﺍﻥ ﻫﺮ ﮐﺪﺍﻡ ﺍﺯ ﻣﻮﺍﺭﺩ ﺑﺎﻻ ﺭﺍ ﺑﺎ ﻳﮏ ﺗﻮﺯﻳﻊ ﺑﺮﻧﻮﻟﻲ ﻣﺪﻝ
H i¢ = M +1 + M 0 + M -1 ﮐﺮﺩ .ﻣﻮﺭﺩ ﺍﻭﻝ ﻳﮏ ﺁﺯﻣﺎﻳﺶ ﺑﺮﻧﻮﻟﻲ ﺍﺳﺖ ﮐﻪ hi -1ﺑﺎﺭ ﺗﮑﺮﺍﺭ
ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺍﻳﻦ ﻧﮑﺘﻪ ﮐﻪ ﺩﺭ ﺻﻮﺭﺕ ﺑﺰﺭﮒ ﺑﻮﺩﻥ ﻣﻘﺪﺍﺭ ، nﻣﻲ- ﻣﻲﺷﻮﺩ ﻭ ﺩﺭ ﻫﺮ ﺗﮑﺮﺍﺭ ﺍﺣﺘﻤﺎﻝ ﻣﻮﻓﻘﻴﺖ ﺁﻥ )ﺗﺒﺪﻳﻞ i - 1ﺑﻪ ( i
ﺗﻮﺍﻥ ﺗﻮﺯﻳﻊ ﺩﻭﺟﻤﻠﻪﺍﻱ ﺑﺎ ﭘﺎﺭﺍﻣﺘﺮﻫﺎﻱ ) (n, pﺭﺍ ﺑﺎ ﻳﮏ ﺗﻮﺯﻳﻊ 1 / 4ﻭ ﺍﺣﺘﻤﺎﻝ ﺷﮑﺴﺖ )ﻋﺪﻡ ﺗﺒﺪﻳﻞ i - 1ﺑﻪ 3 / 4 ( iﺍﺳﺖ.
ﻧﺮﻣﺎﻝ ﺑﺎ ﭘﺎﺭﺍﻣﺘﺮﻫﺎﻱ )) (np, np(1 - pﺗﺨﻤﻴﻦ ﺯﺩ ،ﺑﻨﺎﺑﺮﺍﻳﻦ ﻣﺘﻐﻴﺮ ﻣﻮﺭﺩ ﺩﻭﻡ ﻧﻴﺰ ﻳﮏ ﺁﺯﻣﺎﻳﺶ ﺑﺮﻧﻮﻟﻲ ﺍﺳﺖ ﮐﻪ hiﺑﺎﺭ ﺗﮑﺮﺍﺭ ﻣﻲ-
ﺗﺼﺎﺩﻓﻲ H i¢ﺭﺍ ﻣﻲﺗﻮﺍﻥ ﺑﻪ ﺻﻮﺭﺕ ﺯﻳﺮ ﻧﻴﺰ ﺗﻌﺮﻳﻒ ﮐﺮﺩ: ﺷﻮﺩ ﻭ ﺩﺭ ﻫﺮ ﺗﮑﺮﺍﺭ ﺍﺣﺘﻤﺎﻝ ﻣﻮﻓﻘﻴﺖ ﺁﻥ )ﻋﺪﻡ ﺗﻐﻴﻴﺮ 1 / 2 ( iﻭ
)H i¢ = N (hi -1 .1 4 , hi -1 . 3 16) + N (hi .1 2 , hi .1 4
ﺍﺣﺘﻤﺎﻝ ﺷﮑﺴﺖ )ﺗﻐﻴﻴﺮ ( iﻧﻴﺰ 1 / 2ﺍﺳﺖ .ﻣﻮﺭﺩ ﺳﻮﻡ ﻧﻴﺰ
)+ N (hi +1 .1 4 , hi +1 . 3 16
ﺗﻮﺯﻳﻌﻲ ﻣﺎﻧﻨﺪ ﻣﻮﺭﺩ ﺍﻭﻝ ﺩﺍﺭﺩ .ﺑﻨﺎﺑﺮﺍﻳﻦ ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺍﺯ ﺗﻤﺎﻡ
ﻣﻲﺩﺍﻧﻴﻢ ﮐﻪ ﺗﻮﺯﻳﻊ ﻣﺠﻤﻮﻉ ﭼﻨﺪ ﻣﺘﻐﻴﺮ ﺗﺼﺎﺩﻓﻲ ﻧﺮﻣﺎﻝ ،ﻳﮏ
ﭘﻴﮑﺴﻞﻫﺎﻱ ﺗﺼﻮﻳﺮ ﺑﺮﺍﻱ ﺟﺎﺳﺎﺯﻱ ﺍﺳﺘﻔﺎﺩﻩ ﺷﻮﺩ ،ﻣﻲﺗﻮﺍﻥ ﻣﺘﻐﻴﺮ
ﺗﻮﺯﻳﻊ ﻧﺮﻣﺎﻝ ﺑﺎ ﭘﺎﺭﺍﻣﺘﺮﻫﺎﻱ ﺯﻳﺮ ﺍﺳﺖ:
n n n ﺗﺼﺎﺩﻓﻲ ﺗﻮﺯﻳﻊ ﺗﻌﺪﺍﺩ ﭘﻴﮑﺴﻞﻫﺎﻱ ﺑﺎ ﻣﻘﺪﺍﺭ iﭘﺲ ﺍﺯ ﺟﺎﺳﺎﺯﻱ
2 2
) å N (m i , s i ) = N ( å m i , å s i
i =1 i =1 i =1 ، H i¢ ،ﺭﺍ ﺑﻪ ﺻﻮﺭﺕ ﺯﻳﺮ ﺑﻴﺎﻥ ﮐﺮﺩ:
ﺑﻨﺎﺑﺮﺍﻳﻦ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺍﻳﻦ ﺭﺍﺑﻄﻪ H i¢ ،ﺭﺍ ﻣﻲﺗﻮﺍﻥ ﺑﻪ ﺻﻮﺭﺕ ﻳﮏ hi -1 hi hi +1
H i ¢ = å S+1 + å S0 + å S-1
ﻣﺘﻐﻴﺮ ﻧﺮﻣﺎﻝ ﺑﻴﺎﻥ ﮐﺮﺩ: j =1 j =1 j =1
) (hi -1 + 2hi + hi +1 ﺁﺯﻣﺎﻳﺶ ﺑﺮﻧﻮﻟﻲ ﺍﻭﻝ ،ﺩﻭﻡ ﻭ ﺳﻮﻡ ﺑﻪ ﺗﺮﺗﻴﺐ ﺑﺎ ﻧﻤﺎﺩﻫﺎﻱ S+1
= H i¢ = N (m i ,
4 )ﺍﺿﺎﻓﻪ ﺷﺪﻥ ﻧﻮﻳﺰﻱ ﺑﺎ ﻣﻘﺪﺍﺭ ) S0 ،(+ 1ﺍﺿﺎﻓﻪ ﺷﺪﻥ ﻧﻮﻳﺰﻱ
) (3hi -1 + 4hi + 3hi +1
= s i2 ) ﺑﺎ ﻣﻘﺪﺍﺭ (0ﻭ ) S-1ﺍﺿﺎﻓﻪ ﺷﺪﻥ ﻧﻮﻳﺰﻱ ﺑﺎ ﻣﻘﺪﺍﺭ (-1ﻧﻤﺎﻳﺶ
16
ﺍﻟﺒﺘﻪ ﺩﺭ ﺍﻳﻦ ﺭﺍﺑﻄﻪ ﺑﺮﺍﻱ iﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﻣﺮﺯ ﺍﺳﺘﺜﻨﺎﺋﺎﺗﻲ ﻧﻴﺰ ﺩﺍﺩﻩ ﺷﺪﻩﺍﻧﺪ .ﺍﮔﺮ nﺁﺯﻣﺎﻳﺶ ﺑﺮﻧﻮﻟﻲ ﻣﺴﺘﻘﻞ ،ﻫﻤﮕﻲ ﺑﺎ ﺍﺣﺘﻤﺎﻝ
ﺑﺎﻳﺪ ﺩﺭ ﻧﻈﺮ ﮔﺮﻓﺘﻪ ﺷﻮﺩ h-1 .ﻭ h256ﺭﺍ ﺻﻔﺮ ﻓﺮﺽ ﻣﻲﮐﻨﻴﻢ ﻣﻮﻓﻘﻴﺖ pﺍﻧﺠﺎﻡ ﺷﻮﻧﺪ ،ﺁﻧﮕﺎﻩ ﻣﺘﻐﻴﺮ ﺗﺼﺎﺩﻓﻲ Xﮐﻪ ﺗﻌﺪﺍﺩ
ﻭ ﺑﺮﺍﻱ ١ﻭ ٢٥٤ﭘﺎﺭﺍﻣﺘﺮﻫﺎﻱ ﺗﻮﺯﻳﻊ ﺑﻪ ﺻﻮﺭﺕ ﺯﻳﺮ ﺍﺳﺖ: ﻣﻮﻓﻘﻴﺖﻫﺎ ﺭﺍ ﻧﺸﺎﻥ ﻣﻲﺩﻫﺪ ،ﻣﺘﻐﻴﺮﻱ ﺩﻭﺟﻤﻠﻪﺍﻱ ﺑﺎ ﭘﺎﺭﺍﻣﺘﺮﻫﺎﻱ
) (2h0 + 2h1 + h2 nﻭ pﺍﺳﺖ .ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻣﺴﺘﻘﻞ ﺑﻮﺩﻥ ﺗﮑﺮﺍﺭﻫﺎﻱ ﻣﺨﺘﻠﻒ
٢٥٣ = H 1¢ = N ( m1 ,
4
) (4h0 + 4h1 + 3h2 ﺁﺯﻣﺎﻳﺶﻫﺎﻱ ﺑﺮﻧﻮﻟﻲ ﺗﻌﺮﻳﻒ ﺷﺪﻩ ﺩﺭ ﺑﺎﻻ ،ﻣﻲﺗﻮﺍﻥ ﻣﺘﻐﻴﺮﻫﺎﻱ
s 12 = )
16
www.SID.ir
Archvie of SID
ﺗﺮﺗﻴﺐ ﻣﺤﺎﺳﺒﻪ ﮐﺮﺩ: ﻧﻤﻮﺩ ،ﺯﻳﺮﺍ LSB-Fﺣﺎﻟﺘﻲ ﺧﺎﺹ ﺍﺯ ﺍﻟﮕﻮﺭﻳﺘﻢ ﻋﺎﻡ LSB-Mﻣﻲ-
255 255 ﺑﺎﺷﺪ.
] E ( Error ) = E[ å (hi - H i¢ ) 2 ] = å E[(hi - H i¢ ) 2
i =0 i =0 )H 2¢ i = Bino(ni = h2i + h2i +1 , p = 1 2
ﭘﺲ ﮐﺎﻓﻲ ﺍﺳﺖ ﺑﺘﻮﺍﻥ ﺍﻣﻴﺪ ﺭﻳﺎﺿﻲ ﻣﺮﺑﻊ ﺗﻔﺎﻭﺕ ﺩﻭ ﺳﺘﻮﻥ
H 2¢ i +1 = ni - H 2i
ﻣﻌﺎﺩﻝ ﺍﺯ ﻫﻴﺴﺘﻮﮔﺮﺍﻡ ﺗﺼﻮﻳﺮ ﭘﻮﺷﺎﻧﻪ ﻭ ﺍﺳﺘﮕﻮ ﺭﺍ ﻣﺤﺎﺳﺒﻪ ﮐﺮﺩ. ﺑﻌﻼﻭﻩ ﻣﻲﺗﻮﺍﻥ ﻧﺸﺎﻥ ﺩﺍﺩ ﮐﻪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺗﻮﺯﻳﻊ ﻧﺮﻣﺎﻝ ﻧﻴﺰ
ﻣﻲﺩﺍﻧﻴﻢ: ﻣﻘﺪﺍﺭ ﻫﻴﺴﺘﻮﮔﺮﺍﻡ ﺑﻌﺪ ﺍﺯ ﺟﺎﺳﺎﺯﻱ ﺑﻪ ﺭﻭﺵ LSB-Fﺩﺍﺭﺍﻱ
2 2 2
] E[(hi - H i¢ ) ] = E[hi ] + E[ H i¢ ] - 2 E[hi H i¢ ﺗﻮﺯﻳﻊ ﺯﻳﺮ ﺧﻮﺍﻫﺪ ﺑﻮﺩ]:[١٤
ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺍﻳﻦ ﮐﻪ ، hiﻣﻘﺪﺍﺭ ﺳﺘﻮﻥ iﺩﺭ ﻫﻴﺴﺘﻮﮔﺮﺍﻡ ﺗﺼﻮﻳﺮ
)H 2¢ i = H 2¢ i +1 = N (m i = ni 2 , s i2 = ni 4
ﭘﻮﺷﺎﻧﻪ ﺍﺳﺖ ﻭ ﻣﻘﺪﺍﺭ ﺁﻥ ﻣﺸﺨﺺ ﺍﺳﺖ ،ﺑﻨﺎﺑﺮﺍﻳﻦ hiﺑﻪ
ﺻﻮﺭﺕ ﻳﮏ ﺛﺎﺑﺖ ﻓﺮﺽ ﻣﻲﺷﻮﺩ ﻭ : -۴ﺗﺨﻤﻴﻦ ﺗﻐﻴﻴﺮﺍﺕ ﻫﻴﺴﺘﻮﮔﺮﺍﻡ LSB-FﻭLSB-M
] E[(hi - H i¢ ) 2 ] = hi 2 + E[ H i¢2 ] - 2hi E[ H i¢ ﻳﮑﻲ ﺍﺯ ﻣﻌﻴﺎﺭﻫﺎﻱ ﻣﻘﺎﻳﺴﻪ ﺭﻭﺵﻫﺎﻱ ﻣﺨﺘﻠﻒ ﭘﻨﻬﺎﻥﻧﮕﺎﺭﻱ،
ﺑﻨﺎﺑﺮﺍﻳﻦ ﺗﻨﻬﺎ ﻣﺴﺌﻠﻪ ﺑﺎﻗﻲ ﻣﺎﻧﺪﻩ ﻣﺤﺎﺳﺒﻪ ] E[ H i¢ﻭ ] E[ H i¢
2
ﺑﺮﺭﺳﻲ ﺗﺄﺛﻴﺮ ﻫﺮ ﮐﺪﺍﻡ ﺍﺯ ﺭﻭﺵﻫﺎ ﺭﻭﻱ ﻫﻴﺴﺘﻮﮔﺮﺍﻡ ﺗﺼﻮﻳﺮ
ﺍﺳﺖ .ﻧﺸﺎﻥ ﺩﺍﺩﻩ ﺷﺪ ﮐﻪ H i¢ﺩﺭ ﺟﺎﺳﺎﺯﻱ ﺑﻪ ﺭﻭﺵ LSB-M ﭘﻮﺷﺎﻧﻪ ﺍﺳﺖ .ﺭﻭﺷﻲ ﮐﻪ ﮐﻤﺘﺮﻳﻦ ﺗﻐﻴﻴﺮ ﺭﺍ ﺭﻭﻱ ﻫﻴﺴﺘﻮﮔﺮﺍﻡ
ﺣﺎﺻﻞ ﻣﺠﻤﻮﻉ ﺳﻪ ﻣﺘﻐﻴﺮ ﺗﺼﺎﺩﻓﻲ ﺩﻭﺟﻤﻠﻪﺍﻱ ﺍﺳﺖ .ﺑﺮﺍﻱ ﻫﺮ ﺍﻳﺠﺎﺩ ﮐﻨﺪ ،ﺩﺭ ﺑﺮﺍﺑﺮ ﺣﻤﻼﺗﻲ ﻣﻘﺎﻭﻣﺘﺮ ﻫﺴﺘﻨﺪ ﮐﻪ ﺑﺮ ﻣﺒﻨﺎﻱ ﺗﻐﻴﻴﺮ
ﻣﺘﻐﻴﺮ ﺗﺼﺎﺩﻓﻲ Xﻣﻲﺩﺍﻧﻴﻢ ﮐﻪ: ﻫﻴﺴﺘﻮﮔﺮﺍﻡ ﮐﺎﺭ ﻣﻲﮐﻨﻨﺪ .ﺑﺮﺍﻱ ﺑﻴﺎﻥ ﻋﺪﺩﻱ ﺍﺯ ﺗﺄﺛﻴﺮ ﻫﺮ ﺭﻭﺵ
) Mgf X (t ) = E (e tx
, = ] E[ X n
)M (Xn) (0 ﺭﻭﻱ ﻫﻴﺴﺘﻮﮔﺮﺍﻡ ﻣﻲﺗﻮﺍﻥ ﻣﻌﻴﺎﺭﻱ ﺑﺎ ﻋﻨﻮﺍﻥ ﺧﻄﺎ ﺗﻌﺮﻳﻒ ﮐﺮﺩ.
ﺍﮔﺮ Xﻳﮏ ﻣﺘﻐﻴﺮ ﺗﺼﺎﺩﻓﻲ ﺩﻭﺟﻤﻠﻪﺍﻱ ﺑﺎﺷﺪ: ﺧﻄﺎ ﺭﺍ ﻣﺠﻤﻮﻉ ﻣﺮﺑﻌﺎﺕ ﺗﻔﺎﺿﻞ ﺳﺘﻮﻥﻫﺎﻱ ﻣﻌﺎﺩﻝ ﻫﻴﺴﺘﻮﮔﺮﺍﻡ
Mgf X (t ) = ( pe t + q ) n ﺗﺼﻮﻳﺮ ﭘﻮﺷﺎﻧﻪ ﻭ ﺗﺼﻮﻳﺮ ﺍﺳﺘﮕﻮ ﺗﻌﺮﻳﻒ ﻣﻲﮐﻨﻴﻢ:
E[ X ] = np , 2
E[ X ] = np + n(n - 1) p 2 255
Error = å (hi - hi¢ ) 2
ﺩﻭﺟﻤﻠﻪﺍﻱ ﺗﺼﺎﺩﻓﻲ ﻣﺘﻐﻴﺮ ﺳﻪ ﻣﻮﺭﺩ ﺩﺭ ﺑﻨﺎﺑﺮﺍﻳﻦ i =0
hiﻭ ، hi¢ﻣﻘﺪﺍﺭ ﺳﺘﻮﻥ iﺩﺭ ﻫﻴﺴﺘﻮﮔﺮﺍﻡ ﺗﺼﻮﻳﺮ ﭘﻮﺷﺎﻧﻪ ﻭ
M -1 , M 0 , M +1ﻣﻲﻭﺍﻥ ﮔﻔﺖ:
ﺗﺼﻮﻳﺮ ﺍﺳﺘﮕﻮ ﺍﺳﺖ .ﺧﻄﺎﻱ ﮐﻤﺘﺮ ﺑﻪ ﻣﻌﻨﺎﻱ ﺗﻐﻴﻴﺮ ﮐﻤﺘﺮ ﺩﺭ
Mgf M +1 (t ) = (1 4 e t + 3 4) hi -1 , E[ M +1 ] = hi -1 4
ﻫﻴﺴﺘﻮﮔﺮﺍﻡ ﺗﺼﻮﻳﺮ ﭘﻮﺷﺎﻧﻪ ﺑﺮﺍﻱ ﺑﺪﺳﺖ ﺁﻭﺭﺩﻥ ﺗﺼﻮﻳﺮ ﻣﻴﺰﺑﺎﻥ
Mgf M 0 (t ) = (1 2 e t + 1 2) hi , E[ M 0 ] = hi 2
ﻧﻬﺎﻳﻲ ﺍﺳﺖ .ﻣﻘﺪﺍﺭ ﺧﻄﺎ ،ﻋﻼﻭﻩ ﺑﺮ ﻧﻮﻉ ﺭﻭﺵ ﭘﻨﻬﺎﻥ ﻧﮕﺎﺭﻱ ﺑﻪ
Mgf M -1 (t ) = (1 4 e t + 3 4) hi +1 , E[ M -1 ] = hi +1 4
ﺗﺼﻮﻳﺮ ﭘﻮﺷﺎﻧﻪ ﻧﻴﺰ ﺑﺴﺘﮕﻲ ﺩﺍﺭﺩ .ﺑﻨﺎﺑﺮﺍﻳﻦ ﺍﮔﺮ ﺑﺘﻮﺍﻥ ﻗﺒﻞ ﺍﺯ
ﺑﻌﻼﻭﻩ ﻣﻲﺩﺍﻧﻴﻢ:
= ) Mgf H i¢ (t ) = Mgf M +1 + M 0 + M -1 (t ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﮏ ﺭﻭﺵ ﭘﻨﻬﺎﻥ ﻧﮕﺎﺭﻱ ﺧﺎﺹ ،ﻣﻘﺪﺍﺭ ﺧﻄﺎﻱ ﺭﻭﺵ
) Mgf M +1 (t ).Mgf M 0 (t ).Mgf M -1 (t ﺍﻧﺘﺨﺎﺏ ﺷﺪﻩ ﺑﺮﺍﻱ ﺗﺼﻮﻳﺮ ﭘﻮﺷﺎﻧﻪ ﻣﻮﺭﺩ ﻧﻈﺮ ﺭﺍ ﺗﺨﻤﻴﻦ ﺯﺩ،
ﺑﺎ ﺟﺎﮔﺬﺍﺭﻱ ﻣﻘﺎﺩﻳﺮ ﻣﻨﺎﺳﺐ ﺩﺭ ﺍﻳﻦ ﻓﺮﻣﻮﻝ ﻭ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻓﺮﻣﻮﻝ- ﺁﻧﮕﺎﻩ ﺑﻬﺘﺮ ﻣﻲ ﺗﻮﺍﻥ ﺩﺭ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻥ ﺭﻭﺵ ﺗﺼﻤﻴﻢ
ﻫﺎﻱ ﻗﺒﻠﻲ ،ﺍﻣﻴﺪﻫﺎﻱ ﻣﻮﺭﺩﻧﻈﺮ ﺑﺪﻳﻦ ﺻﻮﺭﺕ ﻣﺤﺎﺳﺒﻪ ﻣﻲﺷﻮﻧﺪ: ﮔﺮﻓﺖ. ٢٥٤
E[ H i¢ ] = hi -1 4 + hi 2 + hi +1 4
www.SID.ir
Archvie of SID
-۵ﻣﻘﺎﻳﺴﻪ ﻧﺘﺎﻳﺞ ﺣﺎﺻﻞ ﺍﺯ ﺗﺌﻮﺭﻱ ﻭ ﺷﺒﻴﻪﺳﺎﺯﻱ ))(hi -1 .(hi -1 - 1) + 4.hi .(hi - 1) + hi +1 (hi +1 - 1
= ] E[ H i¢ 2
16
ﺑﺮﺍﻱ ﺗﺴﺖ ﻣﺪﻝ ﺭﻳﺎﺿﻲ ﺍﺭﺍﺋﻪ ﺷﺪﻩ ،ﺩﺭ ٢٠٠ﺗﺼﻮﻳﺮ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ) (2.hi -1 .hi + hi -1 .hi +1 + 2.hi .hi +1 ) (hi -1 + 2.hi + hi +1
+ +
ﺍﺯ ﺍﻟﮕﻮﺭﻳﺘﻢ LSB-Fﻭ LSB-Mﺟﺎﺳﺎﺯﻱ ﮐﺮﺩﻩ ﻭ ﻣﻴﺰﺍﻥ ﺧﻄﺎﻱ 8 4
ﺍﻧﺘﻈﺎﺭ ﺩﺍﺭﻳﻢ ﮐﻪ ﻣﻘﺪﺍﺭ ﻧﻬﺎﻳﻲ H i¢ﺩﺭ ﻭﺍﻗﻊ ﻣﺠﻤﻮﻉ ﻧﻴﻤﻲ ﺍﺯ
ﺣﺎﺻﻞ ﺍﺯ ﺷﺒﻴﻪ ﺳﺎﺯﻱ ﻭ ﺧﻄﺎﻱ ﺣﺎﺻﻞ ﺍﺯ ﻣﺤﺎﺳﺒﺎﺕ ﺭﻳﺎﺿﻲ ﺭﺍ
ﻣﻘﺪﺍﺭ ﺍﺑﺘﺪﺍﻳﻲ hiﻭ 1 4ﺍﺯ ﻣﻘﺪﺍﺭ ﺍﺑﺘﺪﺍﻳﻲ hi -1ﻭ 1 4ﺍﺯ
ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻫﺮ ﺩﻭ ﺭﻭﺵ ﺗﻮﺯﻳﻊ ﺩﻭﺟﻤﻠﻪ ﺍﻱ ﻭ ﺗﻮﺯﻳﻊ ﻧﺮﻣﺎﻝ
ﻣﻘﺪﺍﺭ ﺍﺑﺘﺪﺍﻳﻲ hi +1ﺑﺎﺷﺪ .ﻣﺸﺎﻫﺪﻩ ﻣﻲﺷﻮﺩ ﮐﻪ ﻣﻘﺪﺍﺭ ﺍﻣﻴﺪ H i¢
ﻣﺤﺎﺳﺒﻪ ﮐﺮﺩﻳﻢ .ﻧﺘﺎﻳﺞ ﺗﺨﻤﻴﻦ ﺧﻄﺎ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻫﺮ ﺩﻭ ﺗﻮﺯﻳﻊ
ﺑﺎ ﻣﻘﺪﺍﺭﻱ ﮐﻪ ﺑﻪ ﺭﻭﺵ ﺗﺤﻠﻴﻠﻲ ﺍﻧﺘﻈﺎﺭ ﺩﺍﺷﺘﻴﻢ ﻣﺴﺎﻭﻱ ﺷﺪﻩ
ﮐﺎﻣﻼﹰ ﻳﮑﺴﺎﻥ ﺍﺳﺖ .ﻫﻴﺴﺘﻮﮔﺮﺍﻡ ﺩﺭﺻﺪ ﺍﺧﺘﻼﻑ ﻣﻘﺪﺍﺭ ﻭﺍﻗﻌﻲ ﻭ
ﺍﺳﺖ .ﺍﻳﻦ ﺗﺴﺎﻭﻱ ﻣﻲﺗﻮﺍﻧﺪ ﺗﻀﻤﻴﻨﻲ ﺑﺮﺍﻱ ﻣﺪﻝ ﺍﺭﺍﺋﻪ ﺷﺪﻩ ﺑﺎﺷﺪ.
ﻣﻘﺪﺍﺭ ﺣﺎﺻﻞ ﺍﺯ ﺗﺨﻤﻴﻦ ﺭﻳﺎﺿﻲ ﺧﻄﺎ ﺩﺭ ﺷﮑﻞ ٤ﻭ ٥ﻧﺸﺎﻥ ﺩﺍﺩﻩ
ﺍﻟﺒﺘﻪ ﺩﺭ ﺭﻭﺍﺑﻂ ﺑﺎﻻ ﺑﺮﺍﻱ iﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﻣﺮﺯ ﺍﺳﺘﺜﻨﺎﺋﺎﺗﻲ ﻧﻴﺰ
ﺷﺪﻩ ﺍﺳﺖ.
ﺑﺎﻳﺪ ﺩﺭ ﻧﻈﺮ ﮔﺮﻓﺘﻪ ﺷﻮﺩ .ﺑﺎ ﺣﻞ ﺷﺪﻥ ﻣﺴﺌﻠﻪ ﻣﺤﺎﺳﺒﻪ ] E[ H i¢ﻭ
ﺍﻳﻦ ﺷﮑﻞ ﺩﻗﺖ ﺑﺎﻻﻱ ﺗﺨﻤﻴﻦ ﺣﺎﺻﻞ ﺍﺯ ﻣﺪﻝ ﺭﻳﺎﺿﻲ ﺍﺭﺍﺋﻪ ﺷﺪﻩ ] ، E[ H i¢2ﺣﺎﻝ ﻣﻲﺗﻮﺍﻥ ﻣﺤﺎﺳﺒﻪ ﺍﻣﻴﺪ ﺧﻄﺎ ﺭﺍ ﻧﻴﺰ ﺗﮑﻤﻴﻞ ﮐﺮﺩ.
ﺭﺍ ﻧﺸﺎﻥ ﻣﻲﺩﻫﺪ .ﻫﻤﺎﻧﮕﻮﻧﻪ ﮐﻪ ﺩﻳﺪﻩ ﻣﻲﺷﻮﺩ ﺩﺭ ﺍﮐﺜﺮ ﺗﺼﺎﻭﻳﺮ، ﺍﺯ ﻃﺮﻑ ﺩﻳﮕﺮ ،ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺍﻳﻦ ﮐﻪ H i¢ﺭﺍ ﺑﺎ ﻳﮏ ﻣﺘﻐﻴﺮ ﺗﺼﺎﺩﻓﻲ
ﻧﺘﺎﻳﺞ ﺷﺒﻴﻪ ﺳﺎﺯﻱ ﻭ ﻣﺪﻝ ﺭﻳﺎﺿﻲ ﺍﺭﺍﺋﻪ ﺷﺪﻩ ﮐﺎﻣﻼﹰ ﻣﺸﺎﺑﻪ ﺑﻮﺩﻩ ﻧﺮﻣﺎﻝ ﻧﻴﺰ ﻣﺪﻝ ﮐﺮﺩﻳﻢ ﻭ ﻣﻲﺩﺍﻧﻴﻢ:
ﺍﺳﺖ ﻭ ﺍﺧﺘﻼﻑ ﺧﻄﺎﻫﺎﻱ ﺗﻮﻟﻴﺪ ﺷﺪﻩ ﺑﺮﺍﺑﺮ ﺑﺎ ﺻﻔﺮ ﻣﻲﺑﺎﺷﺪ. E[ H i¢ ] = m i , E[ H i¢ 2 ] = m i2 + s i2
ﺑﻌﻼﻭﻩ ﻣﻘﺎﻳﺴﻪ ﺩﻭ ﻧﻤﻮﺩﺍﺭ ﻧﺸﺎﻥ ﻣﻲﺩﻫﺪ ﮐﻪ ﺗﺨﻤﻴﻦ ﺗﻐﻴﻴﺮﺍﺕ ﺑﻨﺎﺑﺮﺍﻳﻦ ﺑﺎ ﺣﻞ ﺷﺪﻥ ﻣﺴﺌﻠﻪ ﻣﺤﺎﺳﺒﻪ ] E[ H i¢ﻭ ] ، E[ H i¢2ﺣﺎﻝ
ﻫﻴﺴﺘﻮﮔﺮﺍﻡ ﺩﺭ ﺭﻭﺵ LSB-Fﺩﻗﻴﻖﺗﺮ ﺍﺯ ﺭﻭﺵ LSB-Mﺍﻧﺠﺎﻡ ﻣﻲﺗﻮﺍﻥ ﻣﺤﺎﺳﺒﻪ ﺍﻣﻴﺪ ﺧﻄﺎ ﺭﺍ ﻧﻴﺰ ﺗﮑﻤﻴﻞ ﮐﺮﺩ.
ﺷﺪﻩ ﺍﺳﺖ. 255
)] E ( Error ) = å (hi2 + E[ H i¢ 2 ] - 2hi E[ H i
i =0
255
) = å (hi2 + m i2 + s i2 - 2hi m i
i =0
ﺗﻌﺪﺍﺩ
ﺑﻨﺎﺑﺮﺍﻳﻦ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺗﻮﺯﻳﻊ ﻧﺮﻣﺎﻝ ﻧﻴﺰ ﻣﻲﺗﻮﺍﻧﻴﻢ ﺗﺨﻤﻴﻨﻲ ﺍﺯ
ﺗﺼﺎﻭﻳﺮ
ﺧﻄﺎﻱ ﻫﻴﺴﺘﻮﮔﺮﺍﻡ ﺩﺭ ﺭﻭﺵ LSB-Mﻣﺤﺎﺳﺒﻪ ﮐﻨﻴﻢ.
ﻣﺸﺎﺑﻪ ﻣﺤﺎﺳﺒﺎﺕ ﺑﺎﻻ ﺭﺍ ﻣﻲﺗﻮﺍﻥ ﺑﺮﺍﻱ ﺗﺨﻤﻴﻦ ﺗﻐﻴﻴﺮﺍﺕ
ﺩﺭﺻﺪ ﺧﻄﺎ ﻫﻴﺴﺘﻮﮔﺮﺍﻡ ﺩﺭ ﺭﻭﺵ LSB-Fﻧﻴﺰ ﺗﮑﺮﺍﺭ ﮐﺮﺩ .ﺑﺮﺍﻱ ﺍﺟﺘﻨﺎﺏ ﺍﺯ
LSB-F ﺷﮑﻞ :۴ﻫﻴﺴﺘﻮﮔﺮﺍﻡ ﺩﺭﺻﺪ ﺍﺧﺘﻼﻑ ﺷﺒﻴﻪﺳﺎﺯﻱ ﻭ ﻣﺪﻝ ﺩﺭ ﻃﻮﻻﻧﻲ ﺷﺪﻥ ﺑﺤﺚ ،ﺗﻨﻬﺎ ﺑﻪ ﻧﺘﺎﻳﺠﻤﺪﻝ ﺭﻳﺎﺿﻲ ﺍﺷﺎﺭﻩ ﻣﻲﮐﻨﻴﻢ.
ﺩﺭ ﺻﻮﺭﺕ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺗﻮﺯﻳﻊ ﺩﻭﺟﻤﻠﻪﺍﻱ ﻭ ﺑﺎ ﺩﺭ ﻧﻈﺮﮔﺮﻓﺘﻦ
ﺭﺍﺑﻄﻪ ، ni = h2i + h2i +1ﺭﻭﺍﺑﻂ ﺯﻳﺮ ﺑﺮﺍﻱ ] E[ H i¢ﻭ ] E[ H i¢2
ﺗﻌﺪﺍﺩ ﺑﺮﻗﺮﺍﺭ ﺍﺳﺖ:
ﺗﺼﺎﻭﻳﺮ
E[ H 2¢ i ] = E[ H 2¢ i +1 ] = n 2
E[ H 2¢ i 2 ] = E[ H 2¢ i +1 2 ] = n 2 + n(n - 1) 4
ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺗﻮﺯﻳﻊ ﻧﺮﻣﺎﻝ ،ﻓﺮﻣﻮﻝ ﻣﺤﺎﺳﺒﻪ ] E[ H i¢ﻭ
ﺩﺭﺻﺪ ﺧﻄﺎ
] E[ H i¢2ﺩﺭ ﺭﻭﺵ LSB-Fﻧﻴﺰ ﻣﺸﺎﺑﻪ ﻓﺮﻣﻮﻝ ﻣﺤﺎﺳﺒﺎﺕ ﺗﻮﺯﻳﻊ
ﺩﺭ LSB-M ﺷﮑﻞ :۵ﻫﻴﺴﺘﻮﮔﺮﺍﻡ ﺩﺭﺻﺪ ﺍﺧﺘﻼﻑ ﺷﺒﻴﻪﺳﺎﺯﻱ ﻭ ﻣﺪﻝ
ﻧﺮﻣﺎﻝ ﺩﺭ ﺭﻭﺵ LSB-Mﺍﺳﺖ .ﻓﻘﻂ ﺗﻔﺎﻭﺕ ﺩﺭ ﻣﻘﺪﺍﺭ m iﻭ
-۶ﻧﺘﻴﺠﻪ ﮔﻴﺮﻱ s iﺍﺳﺖ ،ﮐﻪ ﺑﺮﺍﻱ ﻫﺮ ﺩﻭ ﺭﻭﺵ ﺩﺭ ﺑﺨﺶ ﻗﺒﻞ ﻣﺤﺎﺳﺒﻪ ﮐﺮﺩﻳﻢ.
٢٥٥
ﺑﺮﺭﺳﻲ ﺭﻓﺘﺎﺭ ﺍﻟﮕﻮﺭﻳﺘﻢﻫﺎﻱ ﭘﻨﻬﺎﻥﻧﮕﺎﺭﻱ ﺑﻪ ﺷﻨﺎﺳﺎﻳﻲ ﻫﺮ ﭼﻪ
ﺑﻬﺘﺮ ﻣﺰﺍﻳﺎ ﻭ ﻣﻌﺎﻳﺐ ﺭﻭﺵﻫﺎ ،ﺍﺭﺍﺋﻪ ﺣﻤﻼﺕ ﻣﻮﻓﻖ ﻭ ﺑﻌﻼﻭﻩ
www.SID.ir
Archvie of SID
[11] A. D. Ker, “Steganalysis of LSB Matching in ﺩﺭ ﺍﻳﻦ.ﭘﻴﺸﻨﻬﺎﺩ ﺭﻭﺵﻫﺎﻱ ﭘﻨﻬﺎﻥﻧﮕﺎﺭﻱ ﻣﻘﺎﻡﺗﺮ ﻣﻨﺠﺮ ﻣﻲﺷﻮﺩ
Grayscale Images”, IEEE Signal Processing
Letters, Vol. 12, No. 6, June 2005. ﺭﻓﺘﺎﺭ ﺍﻟﮕﻮﺭﻳﺘﻢﻫﺎﻱ ﭘﻨﻬﺎﻥﻧﮕﺎﺭﻱ،ﻣﻘﺎﻟﻪ ﺑﺎ ﺍﺭﺍﺋﻪ ﻳﮏ ﻣﺪﻝ ﺭﻳﺎﺿﻲ
[12] A. Westfeld, "Detecting low embedding rates," in
Proc. Inf. Hiding Workshop, Springer LNCS, vol. . ﺑﻪ ﻃﻮﺭ ﮐﺎﻣﻞ ﺑﺮﺭﺳﻲ ﺷﺪﻩ ﺍﺳﺖLSB-F ﻭLSB-M
2578, 2002.
[13] J. Fridrich, , M. Goljan, and R. Du, “Reliable
ﺍﻟﮕﻮﺭﻳﺘﻢﻫﺎﻱ ﭘﻨﻬﺎﻥﻧﮕﺎﺭﻱ ﺗﻐﻴﻴﺮﺍﺗﻲ ﺭﺍ ﺩﺭ ﻭﻳﮋﮔﻲﻫﺎﻱ ﺗﺼﻮﻳﺮ
Detection of LSB Steganography in Grayscale and ﮐﻪ ﻫﻴﺴﺘﻮﮔﺮﺍﻡ ﺗﺼﻮﻳﺮ ﻳﮑﻲ ﺍﺯ ﺍﻳﻦ،ﭘﻮﺷﺎﻧﻪ ﺍﻳﺠﺎﺩ ﻣﻲﮐﻨﻨﺪ
Color Images”, Proc. of ACM: Special Session on
Multimedia Security and Watermarking, pp. 27- ﺩﺭ ﺍﻳﻦ ﻣﻘﺎﻟﻪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻣﺪﻝ ﺭﻳﺎﺿﻲ ﺍﺭﺍﺋﻪ.ﻭﻳﮋﮔﻲﻫﺎ ﺍﺳﺖ
30, Ottawa, Canada, 2001.
"ﺭﻭﺷﻲ ﺟﺪﻳﺪ، . ﻑ، ﻣﻨﺼﻮﺭﻱ، . ﺍ، ﺫﺍﻛﺮ،. ﺵ، ﺳﻤﺎﻭﻱ،. ﻡ،[ ﻣﻬﺪﻭﻱ14] ﺗﺨﻤﻴﻨﻲ ﺍﺯ ﺗﻐﻴﻴﺮﺍﺕ،LSB-F ﻭLSB-M ﺷﺪﻩ ﺑﺮﺍﻱ ﺭﻭﺵﻫﺎﻱ
ﻣﺒﺘﻨﻲ ﺑﺮ ﮔﺮﺍﺩﻳﺎﻥ ﻣﺤﻠﻲ ﻫﻴﺴﺘﻮﮔﺮﺍﻡ ﺗﺼﻮﻳﺮ ﺑﺮﺍﻱ ﭘﻨﻬﺎﻥ ﺷﻜﻨﻲ ﺩﺭ ﺗﺨﻤﻴﻦ ﻣﻴﺰﺍﻥ ﺗﻐﻴﻴﺮﺍﺕ ﻫﻴﺴﺘﻮﮔﺮﺍﻡ.ﻫﻴﺴﺘﻮﮔﺮﺍﻡ ﺗﺼﻮﻳﺮ ﺍﺭﺍﺋﻪ ﺷﺪ
- ﺗﻬﺮﺍﻥ- ﺩﻭﺍﺯﺩﻫﻤﻴﻦ ﻛﻨﻔﺮﺍﻧﺲ ﺑﻴﻦ ﺍﻟﻤﻠﻠﻲ ﻛﺎﻣﭙﻴﻮﺗﺮ،"ﺍﺳﺘﮕﺎﻧﻮﮔﺮﺍﻓﻲ ﻣﻲﺗﻮﺍﻧﺪ ﻣﺒﻨﺎﻳﻲ ﺑﺮﺍﻱ ﺍﻧﺘﺨﺎﺏ ﺗﺼﻮﻳﺮﻱ ﺑﺎ،ﻗﺒﻞ ﺍﺯ ﺟﺎﺳﺎﺯﻱ ﭘﻴﺎﻡ
١٣٨٥ ﺍﺳﻔﻨﺪ
ﻣﻌﺎﺩﻝ ﺑﻮﺩﻥ ﻧﺘﺎﻳﺞ.ﮐﻤﺘﺮﻳﻦ ﺗﻐﻴﻴﺮ ﺑﻪ ﻋﻨﻮﺍﻥ ﺗﺼﻮﻳﺮ ﭘﻮﺷﺎﻧﻪ ﺑﺎﺷﺪ
[15] A. Ker, “Improved detection of LSB
steganography in grayscale images, in Proc. Inf. ﺷﺒﻴﻪﺳﺎﺯﻱﻫﺎ ﻭ ﻣﺪﻝ ﺍﺭﺍﺋﻪ ﺷﺪﻩ ﺑﻴﺎﻧﮕﺮ ﺻﺤﺖ ﻓﺮﺿﻴﺎﺕ ﺍﻳﻦ
Hiding Workshop, Springer LNCS, vol. 3200,
2004. .ﻣﻘﺎﻟﻪ ﺑﻮﺩﻩ ﺍﺳﺖ
"ﺭﻭﺵ ﭘﻨﻬﺎﻥ، . ﺹ، ﺍﻛﺮﻣﻲ، . ﻡ، ﺍﺧﻮﺕ،. ﺵ، ﺳﻤﺎﻭﻱ، . ﻡ،[ ﻣﻬﺪﻭﻱ16]
ﭘﺎﻧﺰﺩﻫﻤﻴﻦ ﻛﻨﻔﺮﺍﻧﺲ،"ﻧﮕﺎﺭﻱ ﺗﻄﺒﻴﻘﻲ ﺑﺮ ﺍﺳﺎﺱ ﺍﻏﺘﺸﺎﺵ ﺟﻤﻊ ﺷﻮﻧﺪﻩ ﻣﺮﺍﺟﻊ-۷
۱۳۸۶ ﺍﺭﺩﻳﺒﻬﺸﺖ،ﻣﻬﻨﺪﺳﻲ ﺑﺮﻕ ﺍﻳﺮﺍﻥ [1] F.A.P. Petitcolas, R.J. Anderson and M.G. Kuhn,
"Information Hiding - A Survey'', Proc. of IEEE,
pp.1062-1078, July, 1999.
[2] R.J Anderson and F.A.P. Petitcolas, “On the Limits
of Steganography”, IEEE Journal of Selected
Areas in Communications, Special Issue on
Copyright and privacy Protection, Vol. 16(4), pp.
474-481, May 1998.
[3] M. M. Amin, M. Salleh, S. Ibrahim, M.R. Katmin
and M.Z.I. Shamsuddin,” Information Hiding
using Steganography”, 4th National Conference
on Telecommunication Technology Proceedings,
2003.
[4] B. ŞİMŞEK, "Steganography in JPEG Images",
Dokuz Eylül University, İZMİR, July, 2004.
[5] N. Provos and P. Honeyman, ”Hide and Seek: An
Introduction to Steganography”, IEEE Security &
Privacy, pp. 32-44, May-June, 2003.
[6] N.F. Johnson and S. Jajodia, “Exploring
Steganography: Seeing the Unseen”, Computer ,
Vol. 31, No. 2, pp.26–34, 1998.
[7] Y.K Lee and L.H. Chen, “High capacity image
steganographic model,” Vision, Image and Signal
Processing, IEE Proceedings, Vol. 147, Jun 2000.
[8] N. Provos, “Defending Against Statistical
Steganalysis”, Proc. 10th Usenix Security Symp,
Usenix Assoc., pp. 323-335, 2001.
[9] A. Westfeld, “F5-A Steganographic Algorithm
:High Capacity Despite Better Steganalysis”, Proc.
4th Int’l Information Hiding Workshop, Springer-
Verlog, Vol. 2137 , Berlin Heidelberg New York ,
pp.289-302, 2001.
[10] A. Westfeld and A. Pfitzman, “Attacks on ٢٥٦
Steganographic Systems”, Proc. 3rd Int’l
Information Hiding Workshop , Springer-Verlag,
Berlin Heidelberg New York, pp. 61-76, 1999.
www.SID.ir
Surf and download all data from SID.ir: www.SID.ir
Use our educational service (Courses, Workshops, Videos and etc.) via Workshop: www.sid.ir/workshop