You are on page 1of 36

u-L'.

',-,ttrt:'fi;#
a-i r"-ll e:LJl A*>Jt qlS/ttar a,-U

c.rti ,LJl 3!
Cf-il i:-1.-o cJilr u'd eEal
q
dlYl Crlj'"Jl \P
A-r.oA I

ertll +-,,.,1t !16 - ci!*tJl e-6 4..,uJ Jl ee '"''rtl lu


a+=1. oL J.,--11 r3t+UL. ..1. o +S .,Jt4 i--l-'- i-i xll
,:Lr,,,l.sJl erb .,r, c,J,"JdlJllts+ll

r:l,rlll"ll rl:ol

, ;r; are
trrl iJti gJ)e :.rl i.;L .t'J-,ul-.r-*-

iU-,Yl !ilJ''ib

$Li ,.r*,,,- *L.e.e

20L4-20L3

I
gi4,i *yi oists

ws#i''r gwi
/
fa
0 t3 )b,xrj
#ri

f$dl .lt .3u


zg LJt ; jrilt t..1..r*
elraYl
,jl-1,.ll ........ ,rill ,.*-,ll ir ,',i. 'r: | ,JlJi 6Jl dK Jl
......... JEjIJ i.+dL ail dls u" sll

....... Jl$il ult cu.,ll s.l.le O. Jl


_.rti:il cJ$ 4-..,1 a}.-l O. Jl
'.,
ill , c:ll .

.. .. ... .lalit j ,""S .,.,* ,-, Jt


-.,tl-Jt .F-,rl+ qi ,,Xl
,,.-ll i.;r_r Jl

aru.ll . -ol

ijr-J*Jl r,,JiiltJ an6- jl 6JA1!lt +rlitt Jl


o!:Ys. t-r;tl
| \rr
graJr GJ|FI

.....d| drA$ C,Jjtjll ,:tFyt Jl


. .. .. ctijll.r lJ iJ.iJ eliYl+ :tS ,1. Jt
......cJJru ff* U. Jl sjlJl .3:,-lt g..t4 Jl
sll "l!!-
.. +ai ir" i-.J- t',lJc
I
0,. Jl
......CJ| d el_,rl.p Alr,r--l dr crl-.rl+t_l _,1_.2:
g. rrl-lS3

.....tiJJ- il-L U! lJi,t - u," tl


'''-Jtl liJi.ll L^J , )J ll-;Sll tji$l.,l
"J'
C+lrj.ll t'-\+ 6_/ g.ul
,**'l-dyl.,.L
*'-.r,,.r r.Lc++-d_r
ry
...... el rljt
;rg.rJr
(&8 ,,-
c :* 3,,' *:L)
e*t r-,:,_*c':i:Jl
rE*yl
, e.ilr
"!.1...1u-;r J.-r-''Jr.Jr
Jl .1, I
-.,ft"+

fl ": il;iti;f:
oJs.r 4i!
-l
e' ;'-v,,,*,[
o4.''-':r
ertil c';'| t+
r''''!l l'u
',\
'',l "b|'r+;;,o.*. -toi".,i**\lr'l 't c.,L-eJ'"JL'
['rj' L.,ilt
c,,l+*L'tl
.",t tjr rl*-3 615rr iJ..* * tu-,.i'
d *t *
,r. uc. ajir *,-r.j :Iflffi,S#;,
* Jr &-'-Jrr rr,Jl
eoj+ r-sur ui.*c c .,,* .,r.Jr ,
* .'

""Sffiil,
,:l+Jis4ll a-:E
d:Yl cj..ill

) 1.................L$^ll1-1

crt-jl'-l1 j(c ryptogra p hy)_xi.i:ltZ- t


q$ 2.................................(steganographypii.ll

historica I for stega nogra phy )a;ii.lt crt"rlJt 4-.r"rHl :,:rilill3-1


2..................(background

5 ...'."...........(image steganography)e-.1j,.-ll-r cti:)14-1

6............ (audio steganogra phy) cre-lL elii)15-1

6........ . (stega nogra p hy a ppl icatio ns )4+iJl di-JLll ot5,l+!:5-1


9.........................iij_Jl cj+ryt7_1

(;JlJll U[alll

L0......................Lri.Il1-2

10......................iJii-ll di-JLll ellijl (,-,1-,)l e \r-nl2-2

1 1...............4Jiijl drL-J,-ll at! ertjl'j,.3-2

12............ ........... (stega nogra phy)4;iiJl diriJl Zl st4-2

!2..........................(pure steganography)i-i-,,-ll !i&11 cJt--J,-ll1-4-2

secret key )q;!l CEill 613 i'glJl ci'".J'-ll2-4-2


12.................(steganography

puplic key ) drh-ll Ctiill drli 4iiJl ci-iJl3-4-2


13..................(steganography

!4...................(steganography techniques)a+iJl di-.J'ill d.',11fi5-2

15...................... (su bstitution systemspllrr)l l^[y11-5-,

eiljlldL.iil
t7................. (least significant bits F"rl $Yl c+ll +rjtlF
20.........................1.ri"1t1_4

21.........................G.[-r+ll LL' C4
23........................c.UJ| sk+ll3-4

O,'.lill d;ill
27................ci+Ei:-yt1-5

27................... c.tJ,-Ct2_5
drs+ll ir. r-i+ll

i:I"" C#ll "J" .:r.+ .9$l lJ,iiill dJl6J l"ili3ll sJFl et eti;,)t 4lL, ,J.l"j
,,s
-,rJ.Jl rrLiiYl ,.r" tC L-illt fu"1-sjl $JjJ ci-J.-tl f"-l lli.jl €ll.rSJ eliiyl
ord LjNl ir.t ill -,JrJiJ 6iJ"jl clllJ i ,r,,- Ah(texq(oUJt"Jr
-IF.:J t+lJ,.CF
4- .ci.jJl

,e"-s
,%
,J 6t JL'll '6 '' . i.Glll i Uhll 1r;'ll d a-rLjl1.1
il:-ll cJ.+: a.,li.-1Jl Oj .e+-,t-tt _eo i'ill eLEl .,-,"Jll &lJ! rl.rrrlrt<-,t!, r.:t J'll
d 911+ U ah ai eln-.t.:.'+)l :3-.j,-5 .plLJl
'L.j JK,jp dtiJl rg)-l 'l1(l "1.",1

'l1il! C+,1".
l+ fLii- IAS$ll
rrtu e,ln-l rir .cJl+.!tl J ,5 3-.rt,ilt
-iYi .r,; -L bS

i," J+.S ri*i L:-ie JUI u+ 1!,S.-l llsa c}i d.'iJ OSl r o.;u,r,- *l' ,iL*:or
f+!t Crt1r.rclbA,',4,-ti ,,..1 hl-.pi,rrtuSi,:DrJl C1g\OFi.1,,;LJl sli;. ll
i.,-i-I i+l dr!$i crjls:l o:-r.a-Ly.rll c,\,"l.Jl a*iL,a,; ol-"jlJl ASJ. #!nl
.diJi'ill rl5J L.'Lll 1,'L! .rl++: ,:ll+ 6,iiS
.:)t iyl .:l+i:.+r I'r 4<- (Information Security)c,urMl i+i.l ,',-r i
. n-qliln ll tlJ-! drUt;+ll iJ"1-.1 i,-".-. o6l a.r.;..l eb e*l -9,l .;,1 ,l- Il !-gi , 3

i-'i"l crL.s eJlil ,.r-.S t rr-, . lalllll ob$ll eJlJ i+.t !l ,'.i.1 ,-j ajJl cl.-r
'L:il
!-ii ddrj,".ll .rE;!! a-E U! ,3r-i ,:l-i'Jl dLfill dtj 4S+i ei o\-L ro.y+-l
.t1] (2001)t+.,$ .l-pil .rFi .r-j,^;- 4! cS+ Y3 crli$ll ;eF a3.;};-; aboil aA

;.",ii"ll c.t-j.ll rl$i-Yl tl.+. dL..iL&lifua5Clr {Jl+-,Hl st+fi fJcl rin


drl ut- Il ';t-;-' (Steganography)leiJt .:'.J-'lb . [2] (2003)
,
'.bl!, "!
ap
. [3](2004)rill3 ilt*ull .:jr;3 elA) cDs ,y Jljyl j- ra tai"
i-1-+ -j &f.rf
MedialtJ+ J.-r,/ elii)l drL"ir. i=r
'Llill J"L-j "r:*l 6!
,',.Si ,

(5-A 6Jdb,"u.
ll oLiL p+ll r-lr .[4] ).5.;;.! t ;y crl ..rL -ll 'l3y !J-"il
&rur!-rl eljiy i-;;1 sui:l!:I!-rtj+b dr.!, .t3l(2004;'-r' t r:s!tig;!t
"oJJ,S3. dil-js
t- iJl+ j{9 (redundant Ji 4+iJ!l ''JrJl Ji ''u Il ,.r,
.t5l(2002)i',r"Jl ,--Li'-lt J ,-y. \l i}.
'l.iiy',J}il
l.u -::':*,
'-.j+Jl
hA .r:+ll
'ji,iill fL!,t,rs ar-e.ll \-.ii
c,l;lkJl 9Q 6i c-t;; ++ll etiiyl fu;j
iF--:+ iLtS ii.F-
..'l I
, r:J u! .c,lr..--F,,J' cr-} 6i .;a'; ,t-Uitt r;-l i1i .r-,.;
,n Cbi[ . -LG CELII .,.r rdl i,,-lL 6:riiJl .:,L1LJI . e$i)l ttLi j1+,! c.L.-ti:-r
C -i-r- -rdl .-'lj C'-,; Il .l.rfr , 'L( ..i
J+"rrnll r't"lll 6- U i il-,L
tLLi 4:rib.iJl
.t6l(2004)&\ $ ..-iill iL;Y1,.,/ . !r+

. (Cq/ptography) -riiJl :
(5-a ,.:rl .rl- ll i+r^l *, .",-\:.i -l :.!rLi dJr t',:1 \ .r'.

'tAJ ra
aliliJl ob!+ll :..rl.sJ Lr,,-i-jl &-All _r (Steganographyf+ii-ll 4.11 .rl- ll

.[](2001) ill{ll
(Steeanoeranhv)LJii.i &.Jh (Cryptosraphy),i.iill 2 .1
r3t{

,,'lJ i-,.ji !9 (Cryptography):uitj (steganograpy)i*i.-Jl 6t-J'-ll t lc r'r


(Secret r4)- JLil -ri,iJJl i!-lilll dr- LlbFl, [7](2002) r--..:lt ts- ir,-l
comy$
runlt e,.s, : y..rli NL\\l*r/
,.l,nl.. _x,3,-,''..S3J eLAyl tl
L', J.."S l t:r .i-r..!l ill 9ll ielF pl+lt
e;Ll*l
: [8](1998)
' -x-l i etir) I 6l dF ' e!n-i Oi e+t*^ll (51" - I
; xtl

.rri.r. -ll !U 6rE 61 - Z


ijl-jt ;,1.F ,-J.
e-l Y drlsJF.ill .r.+,-.rl ,,.1 -r (Steganography)i+ir-ll cil-rlJl d&.lri-l
dil,.Jl..ll :-: ,1 .' :l ettl+ g ; Y 1ll-.tl drt-J$rll ,-*,.rl.1 r .r.-,-ll3 diL.{jl JJiJ+
*rLI eu ' "'-ri!^b. it Ct ,lCt LA d: -r- - 4Jt- (Steganography)1,'i:..11 .

. [9] (1998)1+ri 61Lr"'rl 6i-

(Historical Backsround for L8.ll crl4&.ll 4oir,Ull iritill 3 .1


Stesanosranhv)
dJL......--JJl rr---j'i (ft Eov6- ,ibJ*ll L--.Kll
ur+bJ, irr',-t< ;-. ii:-i,. (steganograppr.r!y'{1 999,2000)[0,1 1] .i-'lir-ll

crl.rLll$ .[2] (2002) {-ir:sJl ,# lg1q!g/ r 6ui-ll .*Sg=9"


.t4l(2004)'cirJl Ji 4J3!l Jts cJst-Jll r.Ju-,,! + (steganogrAphy)i5i..lt
4:)+*, d.1,6ECl )..-"ll JJ .i.,,".,E:-* gill irjr
cr",.1lllJ+ qr.,ljCl C-lrJl
L-j
qri Lr:Sll glS $_e. (Steganography):l;r -t1 .:L-5JJ! *f Obdl 1s+lt oll+ll

dilL_r.+l LJ'ts.rl 6ls.rjy..rlor*"1 \.-,1 O! F$r.u-r"Jl -1oir.jll dlb


OUCI ,J ,'..,J:" i:rtjlc+ll elA) ,t':l ,jlL ,jll$ .irrli.-ll "si 4- .,:.-.[t ,J*.rl dl,J*
'e$ijl

, r)r-ll di+! cryl-s *r-rl: lelJ.ll ,rll ll ,rl I Lr:e


c)""LJl drlill ,rt' i,E+J
.,.b ilt^1lll Jg +sll ,y.!,,t-3L '''+- ryl6-A+ll "-x- J! ilLJ u*rrt A &-,;i te.r
.ilLell , ;'-<t l*"L .j\ .irell Jl ,.1--ri .+.lt *! ,; .4i 1 rr., 4-L i,,l
OUCI ti €1: L",fuJl 6l U-1tp -.;st L:ic ..r",.rr r1+.r i.,-"6 & @-l etir clba
glgflt .+;r,.' rrll ilL-J',.'.<r (r.{Esll 1-!J) CbJyl e^.i Ji- dllS '.'r.rl-r r
"li,-l
$r .l+ile LJst eil L,tlsl ndJl dllr,/ eJl*,r!: c-ts a!r$t O! iJ -95 g* 6J!
.Cl+r+ rrltsl ,'r-t iL':,,^
LE.6S drjl"? I u.-r b-,1E glF,lt .=..r,

rJl ,l 'r"..J ,r+_, &l.,jl '14) il;',ir ig.liL.r loj"i -lK!l .r'-,
rl-:cYlr rJ.,^ll ijg+ 1.."
€F"ll JCL aJtsll 6t4.,!t ps:*,I
,'q-i3,',J-r '9lF C Lt"J.:4lL1rJl r.-SL .q+'lb 4Hll ,
ijL-b! dlrr iJtull cli'Drl.e) ciAi i-..-rL eJEr .iJ,.ill Jxle .r-e- F r.r..9 d-n,!l OLJI
,'.r"In j.1All o:e.; .O.rlSlt+..Fils-,'.1- UJtl J! :r,-9t Cruslt ,l ,...1+clt O- {+-i
.e1+.511 Ce JJ+
-;ie ,.yrlJl d,rrtJil 1.Dr$d! (Steganography)i;iJl ot-rJJl g-',1,.:."!
,/ P;L-l ','1<ll .i13. {rjil '''J-i'; utll '-'. .!i'!l ,;-+ J'i-' "'+'+;rlt 6.'.tJl:
6+-l \*j ,Jc *-s.i d,b*. -tJlti o- J$ .t+!il dxi,J. dl! .dlL.l
", 'l+.$l
61-,-'J "Jl ell # ir'ir- Lr,,-i '
""<t '"'r,lbrtl ','''lS
i$-)- ASl , Af1+ ,J"4t J,!
(2004) .{-"ir u-ill etir} }t-. cJt"ell cl-h ,'rr1-l r!: A-61+
"J' -t #rr'., Cl
.[14,13]
s.JA .,i,3.s l.S'9.J1 f+- ,J+!a E-+ ''';-r *--,.^,ilt -l^:";ll ei5Sl Lr:e,
!r-t AlLj i; "..f !r.- gr,,Ul Li': ll o-JLi i.jr& ''u e- U\t'J . l1."-u C. hj
. : ,r g-i1 J! r.--ll r+-
6;t:' ijL. d.l-,eL rt-..ll A._,,[ ,lr.- ''.
Lu J fill
E:l
J) 'Jl r+- J3;x gts.)! e+.-t CHI 4L*"-: c.'L:'ll & ,J:gtt t'b;.4:lutt
.[15](1998)i-Jil""ll ',Esll drl-i C-G: r:l!6 i]iill ,:lbl (do0 a.Liill
aLiill .'r- l'-ll
.ftJi t;:,- i-'sill .ra 1A s1(Microdot I i+ji6+ " 4-1. ou-l
J*Jl o.:a l+s -F.a 9i-r,{1
.i! rl.'rl 'L-: [9](l
a1t .rL- .Dsi ,".iJll L',ij,J lc -i- nJ l,!-t Juijll ,-,;h y :.JiJl iltull . ,+$jll
J.- i-i".::. i-Ela
.6L+tr-r
e.r.-l,rjl .q|:l,,.r,.!-]i elj.J r.-r._,1!:4+llll 4+.llJl .+Jl ,.,-..u +J"Lll iDjll
#J
i.+ifll .4.-13 1..-t (Invisible Ink),,tJl cJl iF ijljr. eLiiyt cia:S.,,r^t cats
sl.ls ,'Ui 1 l-\ij.n ..,!i ttl e$ i.dii. ,-{Ji.:.ll
6i1S
er! 4rjit d:rls crul++ll ,lii,y 4lJlll
iL:Jl dJ+^S ,l .' ln ili ._i-_.! ; ll - st-$l .-r+-tr+lt rii
-11"t6 sjll il fil-l
6-,,-J
.+l +:l sj+ l*r 6rJ g,. (a,000 pens) ,,.1L'. iilill c,:lS llJ ,,!-r l3;lc LjS^
.[13](200a)6s.ll elb o3;-pe gr-
$$- ifl .ij;L'.JiiS ti. i.r, ri 4+ii.oll ,:L-9lJl alr: J gi ir pJll
a1.,1.r
-b
U"LjJti .lJi:rll<tll c-rl*r ol .i{r g,-l jLll ha
r-r<- \1, {;i$ ;,'+;., ,..{- !,rl-,"

rrl '.lnll h^ i, .drjJiiylr 61i -lJl Clc lJUl I'r..!l irLr; q,i..r i.{- d,'.j* ,_.uJt+
(Modem 4+sll i-,'ii-ll 4.,1 .'rl-.ll Oil . : Jr ll crl-J"Jl qt iill ! -rl dl-3^.,
'tir)l uyl e+.-l . '1!a .iL rl aj-i-r .,.i crL,I--tl oLiij gs,3 Steganography)
r-r$-*J LEL dJx {:4jjdl .1a i:GLJ dJ!^n!F el,,r-..-L s-i,ll rltJt e! &tsr eE
ilL-jl r.€.i rLJl tJL3-+,',;-l ,rl--!t ds-:,ll ;t -ui .'" ll d,ljtiilt J+F1l l-iry

.[5](2002)
r ir3. LJJil. I rL.+!t 6r Yr.' r4r:sJyl LLtl C- 4i!.ll idrll oL;i,-Jl j"t l
: [a]Q00$ 4$l ,,ro-r,.+1+!l .t $c lirj eJlzrJ t,lu-, hAr. ,JFJ,.-tll

\
AF GlllDt{+ c.'b!+ll C. tuiiJL dil-JLJ ,;-,.,1) -l\
'liiyl '!'tl 'F-
..*'-:<Yt
.&t--il ClFlb cJUl+Jl euiy rr+l1,.ll ,J i! de"l -LLjll
(
elts crl+-Ul g) ,1.'l1. lj l+il3
eltl t(..;i
EL.J3sl OF i",t dl,s Lrr. -2
isl,! crbl+Jl I

. &tarlt 3L'.-).,-Y ','!,-bll 8tJ")bAll i;,'u;cli<i cru$l

6r I Jl o1ii) elJ.,Jl ljL-r $: JJS ,Js.!'rrrr:Sj)l 6Lj,Jl t' ++ -3 /


'1{+
tV:' ,;lt* * ,Jb$ rrL'"'''-ut<Yl 613llr\l j..5-4
.11,1,,!r1l,14) 4i+lL-

, : .fKll ilol! stegano graphy)4:JiJl ourilt c,frU


-aJirjl
a,l .! l\ q-r.[
Cl "..i^s< c.,L..*-lt--'---\ljl
i-!J'-. "U .Jl crr
i.-!_r-;,.:;J1 ' ;i
', ..-.. gi t*+t rier f:lr JJr.il
LI oST39".'*
.qrJl cl',i tl irli ,ri,iilt a.},j! JJ.. y-Lii ctiiJl '"rJ .rL
J,c etLill .L--r Olj i lci l( ,',..r ( steganography)!.-ll cru:lJl ,#.Fl
1aer L:11 ,1a1 i-:;lil uF,*f _rl , I x t51 4j! . ar.-t r'i-; Ol ,,,ir.,,'- ll
.[2](2003),",Urilll ( steganography medium)ot[)l
'84 Jl Yl^ 9:]
Jr--ll .,L jl,r: (modem steganography)i3J.ll :,+in-Jl drLrLJ iF .;-is
L!-'!l il"ul !L-,tl ''rrFlb ,'y ll o$L .'-1r , [4](2004) 4r1r--11 6!L.iYb
6Ji: ;j ;,S.,.j grte gE.i,;;:-r.l.-1. i.;ta!l c.,LiL d ,,r'"r c":;ts!l ,.J bl..i JK!!,
.[6](2004)c.'r3]l rl$3-l $o ,l-r-Jl il- eiii)l c,l5--y uli d$s il{-,i

(Imaqe Stesanosraphv)i,.,.1L ptiiJt 4 .1

ebl Cr',;+" !t Oi\rJl qi Jsl i;r'.:' ,J" ,J.-- .r! 6'Jl ,b:'3-1r ela)l .1!
.,,, "i ,.g;!l
6-jF iol-r r+.UX ,"..!l-tSlt 'qr+.i i-i-tFSJyl -:"Jl -'; "Liryt
oL:J-:ll olaj r et;pll gll ,-.r=-+€r:r36t^JJl ftrJ,..rbt .J..-I .!-;F:yl
.'Ul,i)| cDi li 6t rlJl e;g -.Fy J+L 4,J.i3S : ,'' gl ;fu
''.1r,- J! i$1.6;Jra,J.J=l lJ^c, D*#rE{ J+fi ebr;ll 6!i Ll^c'or.^or.r
Lr'' lt ols C' il i.i.lll (Palette)y'rflt r-3'I p;s cJ,'*lt J:+- .rJ' ,16,
'o

)..is. irrsr iJ, r, " 6LFt 'rA ej5: dlls ,lriri'll ;rJl st l.F"n olrful

.{41Q004)
.ld ld3ll iFbi'll + ,J^-'ll !.!_,ll !*"lsll .1J,i3-1'l .r$ll .i
iJ_r-- g+--ll cJ.!; crLt ... ll c5-r: i-l^1S. J.:a 6ls :.rjr li-r3
)i*.i.l
(Audio Steqanoeraphv)or.altr eliiYl 5 .1
Crl"i.+ Y qFiJl &lrU,:l! ) '"Ur,:ll ,J' qt Hl
,"U ll rl\r""L d,r!.,I|
'Ui1 O!
.5,-1,.11
-'r-Jl al 'r': -l .r.lc J-d'3J cr\-JlJl .Ury ,ri,Ai LL". on ( l{aL- Ot"l)l
,)*rrr-,ll 6Y , gJSl-i,,.,'y ll el\:". ..L ,Uiyl siL+ r! 'sL.rLJl '13) tll,iS
,j,illl "$llJl .'u ll i.-'..,;"l d,1'jJ . . x olc irllLl lrrrsl lr.li.".'u. ll
'-".:ir--r
ol$_)ij! d,]-rlJl crF Jl ,J$+ lJAr .d5!vlP;3-6Ji.ifTls{Jul ol.r_,)ill ,:l-1,1J
,rJc 1,r ,' rt aeJ.-,,J1 6.luyl {,r*6 jl fi',lon-Audible Frequenc ) n.e_5,"Jt .,,;ao
.4+L;J o1.'u.'
(13 k)r+-+.'u .iL etii! ir- 4+L , ;}.,-6 i'jro (l.l) sj
F{.,r! 5L
Js,:'ll
(.ttpt\oo+1 (steganography) ' -J;r
ll crLrl'L'll
.lr:'' 'Lr (wav)i-!aa (168 k)
\/ \ ,
j:d'"JlAL1r6+ Arlt ja.:])ll . i-i,J,,:,.6Jr*-r tji" J 'r--+- n-liJt ,-il.ll ,'y
Jit
: rrrl !S lapY-e e.'.-eJl J"':"1 il$ .(rb ils+'G- L- ir:,sr qsL-U ''u tl ' * )t"*

[.+_i etA]l j,ri; lr. -;'. , t]ji U Olic+l


.f'r- dHiJ,.-ll )s O! f'l (silence)U.t-
,..,1-.i31 OrCl i€.,/ LIUI 6JUyl !\i,J't+Urt i-Ur r..I.*: ".ra-e)!il,:! 'L:1":
.(-rLCt ie ,J 6JuYl

@k

Clean .wav file (cover object) steeo . Wav file


aJ^L i+_r._r
'lLe
i.+J..-iL g*r.',, (l.l) dtl'JS-,
il,ti crl (stego -object;.r),Jr r-.tl *+ -u$l iL.E .,ir3 i+L-!l 6Jti)l LiH
:l :+-t!-,ll p@ot ., r.' tl gr e;r" J)l c+ L-J+ .qri-Jl dF, ;'"<\\
JUI jy ,j5.a1 d$l d i3- -1;; dK,! el ..!' . lt oi.r
LJi.o .ro,q gJ , dit.r-:ll cDtj,
.[4]Q004) 4-n ,-u ll , ge el:Sitl
't

, .,J.,: LJl+ir . 6J+S;$ti (steganography)lii-lt ol


+" c-t31!j ,lJl :i;
,',1- . (Digital Watermarking), l.Ull 4+Ut i-.\ll I
1."y , _ ,r-.s_.!l JUt i
eln-J, otjill tsll
C.Li^,c
cjiJl ..+r, ;l-ll "ijJ*r, L ,,-i.i . csjljyl ir",,Je 'tL-i 't*,t
)-,
rLi llF .J-=19,-ji
i^lJl rl:tL"l CJa^+ +.''! dllrr jSL c.d; Oi Cjl"t*r 6l$lt i1ti . dL4 4jl i.J*Ll GL
.
13. @l (2oo 4,200 t,2oo3l siJl
.ttL..il l+li,J,r tll rlAll cJ-..,,,.1.t .,-)l"Jrijl
oE+].t11 tTs;Eff-..-il!",
,i .r.>.* oL:tl i-J.+. a.c+ dL..tYb , ,r+,.- ll ,, . rll ,;i1 ^- glL r L,!" JjL6 .Ja
,

,-l--'rk qr----r rr--j{l ,-l ,', rr. t3l q\200a,2003) a-- ,.;hJ c,--L:..
".rl

dJL.--Jl"Jl ,lr|r ..'| !t'1 . (-+_,9 g-_lai . i r

.
[6](20 04 | ( st]ganography)4ii,"lr

ii.L*ll c,t ryl 7 .1


^r/ 996) (A.Tumas) pr:l
t:* *-ubi. 4ju:, ur) +jr!F\121-T1
(pseudorandom permutation).jl-..iJl grrrll ll.'l'..J qi i+,"l."!t 6Jsilt . ,+"iJ
I . elLilt 4r31.nl

'l."rt c.,L:,Lt iirl crirJ 6{fi=nf eeO) (D.paul and S.Michaet)pi


t!..- '3liL gtirJ ,rr a,r:.5.1t ;_u.-tt u, .
dj}ni! ,.. \r.i...l inJtll .ra . 6JFl dL
d
. 'r.r,rl c,L-JJJl ii+ L''- U-). LEL gi -rilJl ifu.Lll e^.,i . eljiyl
",-*-i+
. :rer -ll ajl.1l+Jl t..-
t+j-l $r t!trY- rf.ri5-J 6l .,,., vJr.lt aUi.lt
. :rLll
l-.
stjl!-eLiil &.L u:*id2hffl996) (S.Joshua and
\l ' ,-'-
iJl.iyl ,:$"-5j Ai 9ll dr|it+drl r.:1ll o:adr.rii-l (Spread Spectrur4)-'.rr.tt
eJsiJ . ilil$"ll \p C.Ll-i.ll ejF s-i "Llill .Jr- e.^ ti-y ,,,(J..- ,l! , ill-ll
ijirll .vj . l^,'Jlj rlJl il.lrll -uLryb eta)l 6u.-,- Lu.t
c.Ll3ll i$l.c LDj. ilLJ'll
(Threshold operation), ,,r"..111 iJ"o '+x le.ur , i'srL,p; ,p F 'llill 6 r r-,-o

elA)l drlil+ crl,6t$ 4,:. li:ll l.^ill '.'-',1 a-.iull C.Ltiill i.Cne {Je

)r 1998) (W.Andreas and W. Gritta) ri6


cr)LJF:i 6Jll)l JL" cl-p: . -l+ll rl}j i i.lJl

\--- 6j.i)r JL".


/
rr.a,',';ll A$9EJ.
oir-e . , ;l i.x JJ +._3n V ,r-s\y'ru.ff t:^ ,p ai',^ -r:-Jl sJ.nl
lf drLrJlsj ,
,rllr Y gill r+l-dl gSl . !l i-lsr u-l , U-; g.Jl -rrt- g! ' rt'tt 1;,.3' ir "
4l *! h! L+i i .-rl-. gl ,J-r---tt eLi.+ ) r t+i*si eJl"3-+ yr crLjlJl o.ra
"J'
'..jlll
A
, (patcwork) d+'.-,, d,JAlt{l (1998)(G.Daniel and B.Walter) ,:r:-t
\/
ijl -! ".lr-- !-.,- i (_r.r.
_d;_1,*.+ i+;Jl 6J1.-ll ,..s . 4r6L-si irut ,.+-,
"r-,
I LPrls e.li ':lh'i aiF-
6lr
.;rLr c>:.: !r$-- Lr,- ,LLJ 4JJ"
W000)
(L.Avedissian) #
Lr..i dl.rn -l afutll !r.r O-,-:l . i:rL i5,-v3l L-a;l {rio 6Js ol5 -.;6i 6r..-o s}il:
,'. " iF ijlJ" ,r-cr , Lr3lii,! -rlll 'ry.-ll O,.'o+r+ d,!!6:'J--\tl ;'"Jl ot4l-i
r r-;+r*:*jJl iJ-;, . c!.! | ,',-ltl llal , iL,J,.5ll 4J--,1i. t o!.>*;:ll J.lil iL..,. : ch!"
. Cl:i^Jt'U-l aLy3 iFl e';rlilsJ.
:a,b!t iF ilpr+ L,-r,.-i eui) i$L ffiot1(S.B.Abdulah) $r
-i-ue
,ai!l ir'+ll {r.31--i,ll ,} .u+ elAyl it ,'.d, ;l ,iU p } d-r!t otElt
2 s,,$;.-'-ri clA)l : ,iG:'i\3:tl -\l dl.ri:-l :i-9 r -o1*a $ sJlSll 'tliJl ' ,r.,;r'll
O- ",U! ,.+ ,Ury!, ','i.r:ll flrii-lr 2 ,rl$ 6s--* ' ljr)l , AJ.ai t r-,t+:Ullt iJl c.r.
"tr!
. d'Udl
ii,;!lt o.raj < 6,r..-o Al.r -o,r-,-o eui) afut p{yzoozl tA. M. Jafarl pr
r-f---
',J ' . 'rJJl LlJsi 6!';1 0":1:
/
i-.i. j dJ i."+.oro..-a clji! '4HW0$ @.Al Kafaji) c.,51
) , :p.r-
d)! i-*i al ,r: -l.r r-,ii e-tt+,f*l 'or.g Al.r ( i+Ia1 256 i-ljL r i-ult 6rr-,a
dlj.l':ll irnr..lsJ.. :* rl cFll 6ld$ll J.i. , (Image Downgrading) inlL : iif"i.
. l+rtfi.ll CLill ifu|Lr iiFdl ii.,;J.ll ,

ar!. 6rr,..-,r-iry i$t t3 I l(2005) (Naj la'a A.M.Al-Mayahee) c,-1a;1


afuUl lrA cij..:: $J r 1a11 xJ1 crlel-LiJl fiUJ. flri3-t+ JiSl f:L;-u- iil: "gai.-
. eU*Jl 6LJl ,,Je .r,,+., s:ll ,"U,r.Jixll .u Lil -ll 'oi,JJ (DCTF#!] rl ':'"1
PY dA irl4.l,Irirr ,tiil ars
drijt J-4iJl
(Steganography)i,,ii..lt 6LJ,-lt .l.', LJLII
7
. dL-ril oL .r. a..,,b i,Ji:i i_.-:: 4:t32)e}0l)iJi+I dljtujt iro , :.xrt ejji
I7)(2002);Li $.tr ilt:jl rF.r d.:,,u-,,,oJl
(cryptography),uLrlt dt''sJ y
c-!
F ulr 4+i qils. i.lii-I crL:rgl .rrh-:
. i.fJl ilLjl , i.r< L,aJA .JE,l, .
k+ *iq
iti .illJ . [33](2003)r+l..lt Cx ,*i , e:i.,..r t-:.:6 l+j.i .,J.,". ijL.,rJt
dlls l!!
Jr4 ,',;-r j fufill arl ,l.t.Jlr rj+Jiill riJl .ju e_* ii,ir-]f dll !r--rl alg g,..;
c,rru gril ,.+k+tl i',3l-- JiSl 1.1-il ,-Jrl3r r L[.;l iil", LIS
d i..lJl ilt{jl &!l
i-ljill i+liJl d,LJ,.ll i-},3| 6!i 4++g i+$tsr . orL:rl , :.x
di $iJl -.ijll LJt
.[28](2000)dcL *; \. Jlek y
crk&.Jl ftEil gr,t"lt airil 2 .2
(5j ,', n 6L:61i. e.3E: ,rJc ,' .r-, €il1
iJii^ll eLyLJl 63j; (1.2)gK-ll. ir-r
(1997) i=riiJl ot-1,.1 -I
6j.r:r 6j.xJl ri^ ,a+'.t31] (1996)@F"rs i--L
.[36,3s]

x0) Jz
G)

Sender Recipient

*sidl irii-ll 6LrL Jl €j* ir+


: 1,11 ''.r.r-
crl+ lt ilh
. 'eljiyl " 4rii.ll fE
."g$:-lt" gajll crl + lt tlh
.l{Ji clL}lJl ,lii,!
'fit
4ll etL:ll crblr
.l]1; cover
. laJrill rFt AlLull emb

r$,llt Cbi^ll key


. c+sdr 4JLrJl
e. r I L: ll CrUL! : stego

drf
"/
6'ul-o lll- gl ,J Lnyli..*l
aril drl jlLi ll 3i o6Jl 6. 1e-9,.r- .lr;
: [38,37](1998,2000)
4
:(Robustness) ir,,arjll . 1
l32l(1999)1"rL,liJl .,Je 4:,ii^il crl-Jr-tt 6Jj JJ &,-.:ll ,l iCr r,:i
ctr:"311 4*-,Jc, . i#dll ,'q r,.,,-/!ll
,l ,!t:lt ,s, clLdl dilit#.,1, cU+o., ol.p. J .:,
;.lJl cr1- 'u. cJ3.) (Linear and Nonlinear FilterF+${ll i+Lilt c.,r- ,y-ll
r
, (LosyCompression) drt-jlj,.ll
,rlr ;t .,___le c.rl -rl L: . ll , (!F_Jl,
,+-$j (Noise Adding)et ..,.. tl iil .
j!, (Rotation) aer:I .(Scaling)r*l+rit
. [38](l 998)tr+., (Color euantization),.gJll

e;ii..ll crt-3LJl Oj c15. +.1 ,.ttst


eE qr! fB.lt .,,rr- rl i*-lJl ,rA cB.i
dl+ . (l-il!)t5-,1d" 1l lr-t ol Lrll c.,l yl-
"J" e cE ii c.il5 hJ li.rLijsl o<., y
) l\ ,..[i Lc+ll c.t &ll etii)| LJ-iJl 6r..-oll el..o . rl diLrs. ,-J..1...1 lij . dbLiil
q+ * erei Ali hJ'"1*x 1,6t,-ryl {JFil-.3ll d e+, >S JJ$,t J! 19,U
6-!till

l!. . 6Jdl 'LJ .,JL-ayl elrFill l*,:.J, (Undetectability)._il,i$)rl


C. 6Jrill ,J-
. l+q 4rtii- AJLJ JJ+J , i.?r(, ,
u" r4i 6Jdl .rr.-+ i;lpii ii_,;,.o
"Fir ,.;lF! cJlS
.[38(1998)lltult r,bi +rls.J
€]r y AJL,jt .r-:s.: eitinst i.2.ri
G1..i1+.+i.- lt;l, i,,r*"lt aLa.ll p;s+ t$l+" tJr."-+
;Lt -iL.rslt ,Jc i.gill ar.e
. [29](2001),llill

flnvisibilitv) trr Jt ls .3
( visual system{Fr,:+lt
CJI j L3,,1JI
rUr u-3L-r,Jc pciJl tj,r , "-l
sl.u. 6lf lil (i 4O;i-_r..- -!+ dJt ul- Jl ;r,S: ( Ro human audio
tl"lJl -LLtl -xr.:jl .,.l, fU
O*+ _,1',e (Human Subject Average) u-li.,il,l

(Blind Test)a, !.l''i t-


€A {.'jt"ill i.id"ll , L\ii. 6l-J.. g1,,=r .,.ill iiL-ll
"f"
-rrS r&l dL"tll d$ill ,,-Je ^:,i, (psycho-Visual Experiment).j d4j_,,:
,'
,r!l
r:Pi c$lSJ . :J;i r (:l ul- ,Jo rflir! y .+L iriij 6l yl- I iJ.LsJl
r -.ll g-

1i
"Jf .;'. jc*"ll| ,Jc axlLi J+r u-li-i! I ey3n 6l ,-,r,ri , 50yo o i1g,!
6r,,,r1
. [38](1998) a.r&. oLrir-,slo :d,lJ!, iJ.-!l

(Securitv)L,-Jt .4
il.lil .tltE Jue i;i!"ll crLj.."ll clfS lj! ii1,.l
Ly,s3 rr;r J1 crLltr 4+r!i
^ll Ol
4Jil-ll dr1 .,rlr,Jl i.;.JlA il"l$l , U- Jl
,rJe l:L.,. I 1;kJl rl_ l4iLf,{l ,,*l 1. :i- ll1

. [38](1998)€,-I clnJb

(Capacitv)ir*,,J1 .5
&!l ilJl JJ ,l_rull eln-n y ksl-, cbr$r+ ujl .._usi.ll crl rlL.,-ll (}ilj!
rb: U$ll ful . -ll Lu: '-r y I t'.!i oLLa 9l ..,;iit.r iJ,JS ALe ,Ui)U . 1.."ii ,.,LrtJ
(J-{ L+u:u 6rr,-;I ri 4-+1Jt ,,, "-r ra dr.iJt 6Llr,,t
aj Ul . ,j.u.lr .jLrKyl
L .u n-r '* J! qp.jj ) s--i,'pji-o
ar-S,.j ,,, r+ iJt-,_jl Ol e_r.3 np-arjll
:.,;r -ll L5llJ ('lslt
a.,l-,,5.
Jjl .r{ oul4jt ,lAJ .rt':- rl 6JSa -F:3" [3g(199g),lLrjl
. [39](1999) eliiyl rU;i :]-! grr rr
e+ri.,j_r

Stesanosraph
:,r$]|K gFU oie,-,i. y .t-r .
tlri iili Jl idiJl dr1!L Jt _-6j

iirJl oLJMll , !:a,r.| L+s J*j.l Jl


6E l I gSt a,rii.Jl oLy,IJl rlli.j.*+
i;Le ' i r'r iri !s"r e.,Ll dK.i{ . {iJ4jjiJlg_14&& (clii)l oLA
, liS""ll iJ.b! | i.cj,"s.o "!.)
,r.r C O! C+
6lzli-l , D:C) M O. 1i13" 6j.,1.:-yl lrl"c , AlS..ll clLJ eEJ.+- 9 M :
,,i '"r-r ICP:lMl i!,sr al rj,rr.,l,.:ll ,.,1- . c.i-;l LEIJ . er L:tt
u.,li rJJt a.]l*,,Jl
Ol .,,+l ,,,F1 , eL..-.;t.yt ip-ulFl ,tiiyl Jj yr.-r l5f-r 6l .;1 -t*.rg d*.,;Jt )S

. [40K2000) i.iL- 3e.t+,:jr!Flt i,.'s

| ,/'
-
,/-,.r C .llijl dLgll Jll+ .-,.d.xX fjL" qOJl Clr rl drl: iji;I all ,l- ll alg
!i.c $r CtjLll dii"I tiJ . K 16lt CELI| ,t,,l "tr c C elLiJL rJ,*ll ilL{.!l

4n
lA
. ;+ii"ll ill+';ll
elF-,b iJL.ll ,:,ti et L* &51 , +."ff ii;,_ .u! el .,,rrr ,6iy1
61 6,s"; ' li,"r i*r.Lii- l'q or ,,.iJ (stego r- .,, c elr;Jr gl
-object)cla)t
Dk elAi-yl i+l"cr Ek :CxMxK ) C I,J+-i 4+ii-ll crt d- rl i;Lc,. . ;
,.r
. [4](1996)Ajs..lt airJt iej ....re K OJ 4s . :CxK )
Giti"jt M
.'/
,--

atl'iJ a.r.l,:". 9j (Public);l! (Secret),,t_ d-e!t ap-tii. plJiil tje o--i


sj OJ..jl CELII &i-l
. (Public Key Cryptography)
OJJr Cl.tiJt fr li,:;tl
,.+,J!l CELII dL"L. ir5 -b ijL- c,tjl+ 6reE si,.,.)j,i, ijJt drLj.-ll 4J.e
. rgJt itr,._rt gr.rj,"l a+Lc
ol--ll"ll tb ob rSlA,s.r-! gLI
ar';-I €l ui,ril rUx dil-ri...l lnJL .,j
D illJl dJ'Jl Cts.Jl g;r i,1ii.ll oL Jr-ll
fllij dl",i."J j,! . irL-ll ar.:i tl alli lii-Jl
4il",nt . iJ-, L lrAr M 4jb,t xl:o .lo 6Jt+, arS: qrjl i{Jl iJtsJl grs..,,;rr."y
u'-rll A ilFi d+,ii- oL;l,- ,Uii ot+J . ol-Lil! (Naturat Randomness)i;agJl
. [40](2000) g;!/t(;.lt-rtD,_,..I gr y1.
Ji&rl

13
(2.2) tJl,lt ; ir"J.r" t S
C+1-.-"
,', " .,-ll t..,;r -ll crLrJJl crl-4i: , rr . .r
6l ,:S+
.[40x2000)

Steganography

Substitution Transform Spread


Domain Statistical Distortion Cover
System Specfum
Technique Method Technique Generation
Technique
M6thod

eljill crldft, .!,. r iri, Q.2) $:Sl

el L:lt di i.r.*ll , ,:+ill ,lFl ,-Ff :(substitution system)(rJJ+tl ptgil -l


. iJJt ilL:.,Jli
dJLJJI ,rj;.i :(Iransform Domain Techniques)&rr:ll dil_+. crl+ij -2
. ($_.!l LII+- &) 'eUyt
d i,.!l
cL-rs: ot.
. i
..,ri, crl;ii:ll oie :(spread spectrum Techniques)
J&f.I dcLJl e!n: -3
. -r.ii"Jl
, iLll dL-:l Jtsii
Q.ji)l .l.i cilt:+ cLj.-ltCis: :@istortion Techniques)tdr.i:I 6f+iit -4
. gL.:jir.Yl a\|.,1,, (JL-!l rF (deviation) -i!,.jyl j &jJl u4,itr
"ll.ill
Lrair. :ll ,*+ crLjJl ys .y'-r :(statistical 14"1trs6s)li$a!t &$Il -5
. et+j-Yl iJ." ,,s ri '!";l d$li",rl
+i-,ir erL:ll L-syl 4.',3"

Afuj"ll., oLj*ll _rs c,l_, :(CoverGeneration Methods)rtlil +b: 6,U -6


. [28](2000) qlJJl Jt"-Oll 6Lr erLill lLsl
sil

rt
Substitution Svstems) irjl.rr^yl i
,J- L{-ll * ,l.r-. !l ir}Jl ,tt J,-lt Ji.ii ol drLi i+L!l dh.,)t i-lnl
d,,,,li
i.ir +*,J cr:ls t3l c,t .,_rl- Jl e-:,+ gi _h*tl
cJ.i,+ . LFI ill*ijl c,t+Lis elr :tl
d ,'.t ^ $.G+.i.-.l,rr,sl dtljA OI c+-,., . .l ll c.L_i.-.ll Lsi ,.,;.rrt djl i!r.ll+
til:. A-lnlt or4r . ,4lj L\ i! d-e
e+lCl dl L.bif_ _b--ll cj,U . etiiyl 4iLe

' .rjYK ,rt: drlrt;'' ltc iJ.

jl+j! eU.ill xlio ix {ir.. jrt^i} ii.j+ i.eJ.+-


_lr'arl ,} c6i)l {_r!or: --,-r ,,

) mi il*b Cli J i*l .Fyt ,'.rl dhr:-t dryi,,.,p r l+rio Cr1+---+ mi gtlrr)t a;Lc
J"-lie GraS-,] gt+J-Yl rr' . ( I _rl 0 ,.,.S Ol Cs^,,-l ilt-l,tll crllii. d+.r]'l!,
4Jqjl db,* .rfti aF
sS . bJt ilL,:jl ,Li.1! 6rt'y ,lLilt ir ir.al dfyl c.,EJt
d L,'{..Jt ilhll ,-lje ilJ- Jl ,Jr_;tl * J.rti irj.si oi ,,,}r _bJu . i{Jl
dJl 6- L'',. cLjLJl cjEjl el.till
-,;.-l;e 6+.+ rii!, t.9-rt cr,! . elA)l i.+Le
( el L:tl ualie clrt ,-r. a;jt 6Jr.-, c.El crt 6l-$ ,_rrh .r i,!Jl llLjl
i, +r_U . J,-je
Ole.!L{ &-rlt , l..1it"-:+l ,rL , eu.ill eL.jtl cJg .o*l- eliiyt irl& 0!.i , (L c)
d't ,jFlE ; aig. i;-l i8.i" J {r-i., Ol OS.r t.'3 . 1r d.rrl _*-Uf
C+r el,fo
l+i J-. j Y grJl , ;l3l c_,lCl LF -JjSl , ;hr - iJjt -J o,ail-..i .rth -#. el LiJl g-.c
. [29(2001),-,!.+":

el Lill s*js . eUiyl Ll"e I ..1_rJf ,.S+ cl Lrll


u+ tC" c,lrtli e+^r s:lS lil
.Js,sjo iS!r.i' at''.+t?E,il irsa'+ "tt iJL-lJl crgti3 r
,i!e&Jt Jr.-:Jl er r^i*
)l ,-iJtll llt.1,1ll oU" $,.;l ,,,i."j r
F+la.Jl l+dlli rri-.rrl ir..ri! i;:6:ll ojA d, . ettill
. ,Jilt L-ijJ elit)l .].i.l
s-6.

+* CIr ...jrto),pti,:t il-Lr . eili:,il ./lr.i. dJ $r. cSti+ lrs,Uiyt t L.


Ol is+,rxnl ,.j !J-ll ,y. jt .r-pjl+ _,.-.Ltt d tjLull c,I+:r.i: O_ kth di,i:r
ijJli.ll+ 6Jp.-i iltlt| .3tts lj.!, . u-
"F_j;ll
.j ,.u-i . il-Lll ,i.,y ,:t J:sl J.&
Ol gsa l-i"rLi.ll c.,!itl-$! . kJLAJ ,j,,s+ L,.:.J[rjll i-Jr^.i-l c.r,lj , , LLill J..-lie C-
. [28,291Q000,2001) rt-:t1 er.--:,Ji,.: /.rii.! la.,hJ :L;

-15-
.grl l-rr'.- cb,li bl.-,Eiy JL,in , 4;ll,r,yl i-*!t O- a..^-t.i' iJL u+_r
-JA:ll 4+Lu ) ,llill l+.- tb ++"ri cFyf
6,.1t c.gBlt cJ"*.; cr* , ,r-i: p+-Jlr.r
, i.r!l ir.-,-.Jl gL.-,,1,r.,,yj . i:'lJt 6l--jl
iF i+"At ..jns!t C_',jt cr$ljll+ ( ilJJJl rl
,rj . (stego-Image) i.,!l 6JrF-!l iJ.Llt ir.--I 4;. !^l ,.Fyr crr;i$!t .plii.;
. 1".*F lits tJJl 6JJl 6r. -Lit c.,!n6 6.,,..J ,JUg/ at .+., r c.ryl_ll g. ;Kll
,r-r <jSJj
u.-rl" J+ i'.*S or url oJ.ii
.l-!l O-
l-',..lJi,i
*jt-r A;+ i$J.ll ,j^ €j
. [67,40]Q003,2000)dr$ Jts ajs,
,J."lt dlJntl

(Cover
'lliJl :.ilia {cl...cqc l} i;lli -,r+ ;-j.j+ i-J.+. Ui , .r"*: 6l OS",
: gr! .,rl- ll ,;hr. ,it[. i.rc (Jle elLdl
LJI iF 6r-!, 4Sl.i: ;3 . Region)
"ii! e_.t
*r iili. rjs cr (Parity Bit)d,lu.il _i.iu: &t d .!J r ,.-]. ,Js .r. i+ iilj. dK ei
: ,o:! l..s (Jcunll i,6l-t,J."- i,S+ . etiiyl iJ"c
b(I)=.X(D=LSB(ci)mod2 ......(l-6)
ieI
(m) &-r (l<:I<:(m) ,.,.si ,',.-r Ii etJ.ilt dgtj. Jtjij elayt irLc
d
lilj b(I) inUJl i"6l-i .jm; i,!t id$l ,rj:l .,.r r Le3lirj .{ll o!:l:i!t gl3-L
ui.lii..ii eL._l'.,Y| l+l"c d t-l na J! dri]j i-,Jt i,6$ll e ,-*U.6 y ilill c.,jlS
xitj. .El dFunl c,tdli
. al.-_.fl +-f: a:Ley 6JEij
CtjL .,J. .rLtcyL,3 er Lill dlti. Jljil qt' l$lr.,, .t$ iiut dl-.Lt f4l ,is+,

[67]Q003) Q*

. el.UJt cl .. ,ill J.-ljrlt iF ,",1,.1.,rS


.J- (Binary Image)fuiEjll -rJl ,,r,,t :
,Ui.L rJ+S 6Jr..i
-iln tFl ),1 l+Jj, ll+4t| dtr,Jt :J.c LilC.i r+rs.,! ,.r. p_jt .,Jc_r
ltJ.-r Jo A-;Si d$l cfi+Jyl .
c+ Po@i) cFlBl lllL @locks)otolJ.i JJ $ti:lr .rJt eG
;.!,iJl L..,rll
6r.-,r .cr.'lill J,.-U,ll LJ6ll i;dt .re pl(B)J Bij o$l gUi,ri ellJl
-l-E"Jl
. ( P0@t)>0.50)d!ts ltl 0r ( pr(Bi)>0.50)ejls tjj .:.lr
,lal ri Llo tE,rj 1
.,lll '-tdt ,F ob+., _.,5i: f{J.t^ll aeljl sJ, cL,.-rll J,t.li,ll s_q;fjJ -*t
.t-ear ,rJc. ,"'!i'.:ll j+.n rLrll
irl Jltl cJ.: i.6r$ll JJJ| d . (*t -)Lrsl*" aj rdlr+l
. [67](2003) i--r,"r. _;e a_'s:,F elr,J! cr..;itt
.1-lir!l

-6-
gi$l Jt 4.iJl

3l iJrb iJ:3 J.rt c"Jt t.F OF eil.t.9 or;1


J<-l C r*_..1r,,f c,b/,4,t i/_F \.!.,t,'Jt $, e
lo3" ut iti(s $u.l6'r.b1 ,f 6tV g c"Jt,1r"iJt r+Jrr"Jrf ,.,-rrf-lt
,J t Lo .b st JiltuJ i$u
.r'! t*J j.y"t < *ty I aa e 49 5 ;-ar Xr. J'flt Git or<r a-qi iili,Jt
i,, ,J ) 4t., :r
r'll ;ilt ;e 611.r cJt byet c+q ( e":r. ) sq art"J
Jsg: 0 9t I r.r d#r,ijt d*jJl
iirilJ i.rr9 9 byte .s;K:r
,, ."UrJf ,l 0 ,,:Jt irj(1 .rr r, .Lii i,Jt.;>l ,Js Gg f,r.
. g,-p!t ilnt tl ut|all cJr,J,l'"Jt
e! ,f :luJt ,pa , g,jzcJt,,p cr.rrlr b .,*rJJ ltJ*:-.!l
cr r,rjt .rt, 256=8 64 ,)t tJt 2 ,p gy;,:.il.tt ort 4J: ..{ g
;,. rrc c+Ur .,&
c.J fl!'j Jt silC' fi,ilt Jry u-* dreliJ e{Ut i,tf
J.{_.1 , lf lf llll
Jl 00000000
c&Jq 41 dlr^!6r(00froor)sclr J3.r,.Jr ,,*.- yl A jey'ti tf-p pb
5r,e;a
r)b3il,.Jl qd.rti It i,J*:-.Jt 6.ujJr jo c,{Ut drl fjJ- . gJ.L,Jr
I,Lh.;Jq 65 ejV.s_rb .r.t
I'ol , r.:r = c"iul ')l bob Ul: , ( dt .... .rtJl+..Jb oriLlt pj+> _.ft )r ir-, (*,t_Jt
) sle
. c".U+r 1024= crtr$; 1024 = :-*jS: p ourta."
0 rs9-.pl sJl irl l4le l*+ .f q"rt Jielt c-,Jl 'ort!,s s.g byte
Jt fr-, J! La t "gl, JSJ
dr"$ r-trt c,erJt ,/ et Jt r.! Gjgr I :r

255 Jt 10 4..J J..ir .rr;Jr gra iJl- ,,re 0 U ) a,4 256Jr.r J-lrt c"1qJr ,.rt gajrr u t1o.2

1 l- c.rQr
.r.,iJt .lfoJi rrre
0 1 0 0 0 0 0 7

t7
1 Jl 0 d, Jl*Jl d, .:Jl J#.,f s.-t) u lJ.i 64 drr g.r.." 0 Jr I d,. dE*Jr ,J, sjjr
i qn\ , &b i,.",Jt ..Jc S.iJt c^Jl ) .?..rt J6It cJt
9 raJl c..Jt .,,* t.i. 193 djl ei.,,
64 Cjt Gp't l;.""u*.

mous signifi cant BitlMSB)


Least signifi cant Bit(Lsb)

JJd -\;:iijt oi! uFi trt , .rsi.r J.<1 i.i,#.,J #t gJt ,rtsCr Jr.aijt c^.# i,lt dJ,;gl
i".ill J5l .r-tf,t c+Ut ilt,_l.et: iit ll
JiiElt Jl E-Bi
",
o|'Jl t4,,gi #t irj<r.| crttut irt otlr, tJ.6J dt l rrl4tt b ,lr-.J|r,.1., o.r-rj 6tJ,€lJ;JrlJl
. drlrjl
OJ:J| crti ,.€"rjt Cr J{ "U;jt iJol .J ,J ;t,Jr'l4Jt iJ,^4Jt Jt J,.r ul,*l t. U.J oJr,
J.rojl irl trle e.,.bJrlre 3 J-r- ,:r+rr 9 .-J, J.b s{U g"i' ,Jc rrrt Ju. .'i!.l., i,'"r!_tJ
619"a

66 lriJl ill"l S.Ur , Bj,jt Js.r g.ijr c{Ut


etult Js"Jt C-) , 13 bytesf_it:,"i fc !q .r,lrl
uit gt , 01000010: 4r"Jr 6y)\ 66
dll J.l"l oL, t.rae ,
@SCf,f, )ode; ; pratr
b-J 0l tJ:ijl r3t91r d".;rarlr
J.,.rrjt c,l+q it' J-tJ,:"{14 d" c{ JSE#, -O a;;
oia uf*u !-l , 210.2 80t 26 77 l0
t 5 2 161 5 : 6s9At ,oul Flf{u,t erl4ut .,o!

10010001
0101000 110t 0010

-: orja r31 ;.ib)iJ 4:o^t JbJt c"Jt .r",a*rt


r0010001 10100001 00001010 01001101 00011010
01010000 ll0100l
ll 001

1s
-: 4.erf JrJl cJt 1 ,rr'.t; ,i'4t J,c. st:lut |r"e

r44 160 10 76 26 80 2r0


10010000 10100000 00001010 01001100 000n010 01010000 11010010

-: 66 flt Js,f,t +tclt shJt {-irej lrj . oIt r'.J otir'>t r,ijt .,$ijl JdUt -b-l

t44 160 10 76 210

10010000 10100001 00001010 01001101 00011010 01010000 rr0t00r0 'r


010001 0

145 161 10 77 26 81 210

10010001 10100010 00001010 01001101 00011010 01010001 11010010


ltgl .y d 4!.rl Jrtt c-Jt rd'{ 210J81 2265 77 210 J 16l I 145 ,r.4r c.,.rrl Jy,ll iJ., r,u
qu o-r5 d ijJl 44!l JSlt ,alt Ju.-!
fjor ;li-rhjt tJ, 1t,rri:-r!.9 rti:It ge $e irf.,cjt e)t ,jJlFJl
6"rJc

..p a+,lJtijl o.i.6J ir-,t-,It c.r!*eJt 6,.3 irJl ijujt J|-JI t Ji:_.Jt 6JJ-JI ..J ,r.lr Cr" ,jjr OtJrq J l}i,
,t ett ( L-/t iJl-,Jl cUi t ;Ji:',.*ll cilJt ; ctlilt f*- .J fi,- !* g.r+ J ert)t .r:l.rr
fl+Jl J,t dl
Ol JD rlgtl (=n Jt rtirlt !it.::'l iJ", ltirrt J3 Ot *.r) irrt gt:.o
irl Jt i.*,jjtjnjt ti.o ui oJ4io;p rjz.9

Fbr-l gJl d.,UUl 4!JJi. g $/Ull rCt t4 6ui,c Jil-JJ rjl'.j{ Jf g,).iit r 6rsejt 6rg2
sle rt}- $ ,Lir)l
, tdr t dl+u-r

\1
ctl
' ?tldt
\ --'-
,r-^-aJ'
l'-..
u.tilr l-4
sl, fJr.:.--lJ ,r-e! Jb,t c.+ prJt l.i^
ro+.4:J dl.-* JlF.iJt uJ jt.r*:-,t ,e
.rtext under signature image; erlyt :ia-rLj (cover imagey
-,,g.r

eUrJt
LLz. )-{
eU.t.y1 LLe -l
r'": 6s. jll i.rr.- iJil.: oliij U.c dt# oE.:l!!i-oll
) *rllr CfCl ./ i;.llt "6 dlralt ,cot d) ry 'Jt Jl
"$tt
cf" Clr++ il

-10-
1, '1, I
011
001

LL1
110
100
IIl
010
010

:r,.J j .-J ut sJ :-r >nl

-:r -,-r: -al .'51


.-f
Sr,J _J,,'-,J

eliiYl gt! LLr ^ -2


ge" jilli_Ll- q!l.r,.r.r cli:! eli iqLc gg1; LLr Jl
'Lrl

ZL
r.dlJd J!,:rr ,rr

,tl tei'*

eEJ+ll sk+l:3-4
elgj i-,J* cjr^-l di [ie; i-lFl di+^rl-l

(1,0) ki4$ Oi: fo-lr.- 6rrJ Jsi;JJ,.-llLJl,. e+- tin-Z


jl r9-lgl
"r:+l

2_2-
dtG.l :l_,2.11 ,*'ill s!i:l a3;- lj. ' u'-ill cllitl-E

r$l;JJ"-ll li- it* : tarliil rlll i-r-r-ll l:;--4


e."l+ kJ, U,-ill eEi.l

23
i el c+t-:
rcLi- i Cl;-,p"-ll 16i -5
"ill;J-ll..Il t+Ji L,,,.ill.Li-

t' g"rll udlt elr n-'t6i;-; r5tAlf gSlt qrillebJ:-t-6

2+
6:6911
;:-l- g)-lr +.rtAl

/.>
*".tAr JeAl
oVlls .>t*ba")l
+t*L*.,Yll-5
JrJt i dt ;+r+t dt''Jt Jy. ,:,s Vt Jryt ,-Jl .? "rj-)t C,.;r.r=b J,{
:'*U ,ll,!, gtrlt oj-o dE-r.J; F- q+
dJl .jJlrfl ct.Fl
Jk*l J}-,_r dJJiJ eu')t z)^s- a-t- f frift e.Jt d-l
tal*14 .t*j ,J-dl a)t ut" U Jf _dt
r4'.-rJl C4,J.iJb 6#t ,st jf I
. eU>'l

.cU-)l ta;i fl\:*tt &,FJt o.ri; c;-rJt nJ.:lt;r, W -2


€lt\te f ,:,uUl"*)g)-,0 ur LSB eu-)ta,..;!r*,t.r:.:,-r-3

At,y,ty',J 1"42q{5\..,J1) .:urlrll ,-e y'A."tiriyrr -4


€q1c")1LSB; vtv,* -r-,1BMP>

ot*cjlt 2-5
.IGIF,JPEG) ,P tAt v Ls--t (r;t .y ru>)t ,.:,Lir,-r=b-l
. t Al i' .'*;; JS uelt ,;s Jr +'lt ;:l,J *lLi i+a,.r.rsu-,t_2
. oldl F C.irt -bt-"Jlt ir,. ,5r-t {yt Lgb cu-)t ota;: 6*Ls-3

_26_
JJtra,cll

JFll !3S. , 1dt l+tb.J i,+..11 , il+l r.sl , q;3|&ill .r


t1-l . tggT , .b , ,-r. t:sl! L.;dl
[2] All ii3l. i.Lya rttil .r.r. !l , iil+
pt8i ,
, lrhll 1$ , dil+ i".l+ sJl Lrf..,;i.";tr lJL.; , &jl. 6.uya
2003
[3] A.ds. Ois.il rie elr : th-ts, 147 rrll , {iJbI I'l+.
id= 694& http ://www.almarefrh . org /news. Php?
Action= show
[4] J. kremer, steganography, http:www.com
I T eamI s I stega nogra phy.htm l,Augst, 13,2fi)4

[5] petitcolas,A.p.fabien, in formation hiding -asuruey.


proceedings of the leee 87:7.10621078.1999

[6] G. c.kessler, Anover view of steganography for the


computer forensics Examiner, 2004 http://www.
Garykessler . net /Library/fsc.

[7] F.A.P . Petitcolas,R.J.Anderson, and


M.G.kuhn,lnformation Hiding- Asurvey, proc, IEEE,
VOL. 8Z no,7, t999,pp.1062-L07 8
[8]wayner,peter,disappearing cryptography: information
hiding:steganography and watermarking,san
Francisco :morgan kaufman-2O 02(2"d edition).

-u-
T
[9]steganos gmbh,steganos security
suit.6,http ://www. steganos.com Frankfu rt am
main=2004.
[10] l.z aredissian, image in image steganography
system,ph.d,thesis,university of technolog1r,200O.
[1 l] a.mjafer,image steganography using wavblet
ftansform techniques, m.sc.thesis,university of
Baghdad,2002.
[2]i.fridrich application of data hiding in digital images
,tutuorial for the ispacs,98 conference in Melboume
Aushali4(1998).
[13] e.t.lin and ej delph,a review of data hinding in
digital images,pics99,ed.,apr.1999.
[l4]s.katzenbisser and f.a .pettcolas,information hiding
techniques for steganography and digital water
marking,artech house,usa,2O0O.

-28.
crJtll fujn; i

You might also like