فهرست:
فصل اول: کلیات تحقیق
1-1- ﻣﻘﺪﻣﻪ ................................................................................................................................... 3
1-2- تعریف پنهان نگاری............................................................................................................................ 4
1-2-1- اﺻﻄﻼﺣﺎتدر پنهان نگاری........................................................................................................... 5
1-2-2- ﺗﺎرﯾﺨﭽﻪی پنهان نگاری ..............................................................................................................5
1-3- تعریف رمزنگاری .................................................................................................................... 8
1-4- تفاوت رمزنگاری وپنهان نگاری ....................................................................................... 8
1-5- تعریف نهان نگاری .............................................................................................................. 10
1-5-1- تاریخچه نهان نگاری ..................................................................................................... 11
1-5-2- تفاوت نهان نگاری و پنهان نگاری .............................................................................. 11
1-5-3- محیط میزبان ................................................................................................................. 11
1-6- طرح کلی الگوریتم های نهان نگاری ................................................................................. 12
1-7- آنالیزهای لازم جهت انتخاب روش نهان نگاری ................................................................. 12
1-8-پارامترهای ارزیابی الگوریتم های نهان نگاری ......................................................................... 13
1-9-اساس کار روشهای نهان نگاری ........................................................................................................ 14
1-10-انواعنهان نگاری ............................................................................................................................. 14
1-11- استگاآنالیز یا کشف نهان نگاری ...................................................................................................... 15
1-12- حملات نهان نگاری ....................................................................................................................... 17
1-13- کاربردهای عملی نهان نگاری دیجیتال ............................................................................................ 17
1-14- علائم حقنشر(کپیرایت)............................................................................................................... 19
1-15- نهان نگاری دیجیتال در متن ............................................................................................... 20
1-16- انواع روش های نهان نگاری درمتن به طور کلی ............................................................... 21
1-16-1- روشدرج فاصله ....................................................................................................................... 21
1-16-2- روشمعنایی .............................................................................................................................. 22
1-16-3- روشمحتوایی ........................................................................................................................... 22
1-16-4- مبتنی برخصوصیات ................................................................................................................... 23
فصل دوم: مروری بر ادبیات و پیشینه تحقیق
2-1- مروری بر چندین روش نهان نگاری در متون دیجیتال........................................................ 24
2-2- روش درج نقطه................................................................................................................................ 24
2-2-1- شرح کلی روش........................................................................................................................... 24
2-2-2- نتیجه گیری .................................................................................................................................. 26
2-3- روش تغییر شکل حروف...................................................................................................................28
2-3-1- شرح روش ...................................................................................................................................28
2-3-2- نتیجه گیری ...................................................................................................................... 30
2-4 درج کاراکتر کشش بین کاراکترهای کلمات............................................................................... 31
2-4-1شرح روش .....................................................................................................................................31
2-4-2- نتیجه گیری ...................................................................................................................... 33
2-5- روش توسعه یافته درج کاراکتر کشش بین کاراکترهای کلمات............................................... 33
2-5-1شرح روش ..................................................................................................................................... 33
2-5-2- نتیجه گیری ..................................................................................................................................34
2-6- روش بهبود یافته "لا"........................................................................................................... 35
2-6-1- شرح روش ........................................................................................................................ 35
2-6-2- نتیجه گیری ....................................................................................................................... 36
2-7- روش درج کاراکتر بدون طول بین کلمات ......................................................................... 36
2-7-1-شرح روش ........................................................................................................................ 36
2-7-2- نتیجه گیری .................................................................................................................. 37
2-8- روش نهان نگاری بلوکی بین کلمات ............................................................................... 38
2-8-1- شرح روش ........................................................................................................................38
2-8-2- نتیجه گیری ..................................................................................................................................39
2-9- روش گروه بندی کاراکترهای متن(NP-UniCh)....................................................................... 40
2-9-1- شرح روش .................................................................................................................... 40
2-9-2- نتیجه گیری .............................................................................................................. 41
2-10- روش گروه بندی دوبیتی کاراکترهای متن ...................................................................... 42
2-10-1- شرح روش ................................................................................................................... 42
2-10-2- نتیجه گیری ..................................................................................................................42
2-11- استفاده از شکل دیگر کاراکترها در فونتهای متفاوت ................................................... 43
2-11-1-شرح روش ................................................................................................................................. 43
2-11-2- نتیجه گیری ............................................................................................................... 45
2-12- نهان نگاری براساس تغییر زاویه کلمات ........................................................................... 45
2-12-1شرح روش ................................................................................................................................... 45
2-12-2- نتیجه گیری ................................................................................................................................47
2-13- درج کاراکترهای نامحسوس درمتون لاتین ...................................................................................... 47
2-13-1- شرح روش .................................................................................................................................47
2-13-2- نتیجه گیری ................................................................................................................................49
2-14- درج فاصله های خاص در موقعیت های مختلف ............................................................................ 50
2-14-1- شرح روش .................................................................................................................................50
2-14-2نتیجه گیری .................................................................................................................................. 51
فصل دوم: روش اجرای تحقیق
3-1- کلیات روش پیشنهادی ......................................................................................................................53
3-2- مروری بر استاندارد یونیکد .................................................................................................. 54
3-2-1- تعیین کدهای کاراکترها ............................................................................................. 54
3-2-2- انواع فرم های انکدینگ ................................................................................................. 55
3-2-3- یونیکد فارسی/عربی ..................................................................................................... 55
3-2-4- کاراکترهای یونیکد کنترلی ................................................................................. 56
3-3- فرآیند کلی نهان نگاری و استخراج پیام در این رساله ........................................................ 56
3-4- شرح روش نهان نگاری در این رساله ....................................................................................... 58
3-4-1-تبدیل پیام رمز به معادل دودویی ...................................................................................................58
3-4-2درج و نشانه گذاری پیام رمز ...........................................................................................................59
3-4-3کشف و استخراج پیام رمز .............................................................................................................. 60
فصل چهارم: تجزیه و تحلیل داده ها
4-1-بررسی آزمایشات الگوریتم پیشنهادی ............................................................................................... 62
4-2-نتایج و بحث برروی نتایج ..................................................................................................... 62
4-3- بررسی پارامترهای نهان نگاری براساس نتایج اجرای الگوریتم.............................................. 63
4-3-1-مقاومت دربرابر حملات تغییر ...................................................................................................... 63
4-3-2- ظرفیت نهان نگاری ......................................................................................................................64
4-3-3- اندازه فایل نهان نگاری شده ............................................................................................. 65
4-3-4- شفافیت (تناسب با فایل میزبان) ........................................................................................ 65
4-3-5- آسیب پذیری دربرابر حملات ........................................................................................... 66
4-3-6- محدودیت ها و نواقص ................................................................................................................67
4-4- بررسی الگوریتم روش ......................................................................................................................67
4-4-1- الگوریتم نهان نگاری ....................................................................................................................67
4-4-2- محاسبه پیچیدی زمانی الگوریتم نهان نگاری ......................................................68
4-4-3- الگوریتم بازیابی پیام .....................................................................................................................68
4-4-4- محاسبه پیچیدی زمانی الگوریتم بازیابی پیام .......................................................68
4-5- نمودار مورد کاربرد عملیات نهان نگاری پیام رمز...................................................... 69
4-6-نمودار مورد کاربرد عملیات بازیابی پیام رمز................................................. 70
فصل پنجم: نتیجه گیری و پیشنهادات
5-1- خلاصه پژوهش ...................................................................................................... 72
5-2- نتیجه گیری ........................................................................................................ 73
فهرست منابع انگلیسی ........................................................................................................ 74
پیوست
پیوست 1 : کلاس الگوریتم پیشنهادی در این تحقیق ..................................................... 81
چکیده انگلیسی ............................................................................................................... 87
منبع:
1. Nicholas F. Maxemchuk, Steven H. Low, Aleta M. Lapone, (MARCH 1998), » Document Identification for Copyright Protection Using Centroid Detection« , IEEE TRANSACTIONS ON COMMUNICATIONS, pp. 372-383.
2. Hardikkumar, Pacheri Beri ,)December 2012(,» Steganography, Cryptography, Watermarking: A Comparative Study «, Journal of Global Research in Computer Science (JGRCS), pp. 33-35.
3. N. Proros and P. Honeyman, )2003(, »Hide and seek: An Introduction to Steganography «, IEEE: security & Privacy, vol. 10, pp. 32-44.
4.Polymnia, J. M. Dent & Sons,) 1992( , »Herodotus, The Hisories« , chap. 5 - The fifth book entitled Terpsichore, 7 - The seventh book entitled, Ltd.
5.Ms. Monika Patel, (1 November 2012), »Analytical Study of Line-Shift Text watermarking Technique «, International Journal of Computer Applications & Information Technology (IJCAIT), pp. 84-87.
6.R. Prasad and K. Alla, )2004(, » Steganography And Digital Watermarking «, Jonathan Cummins, Patrick Diskin, Samuel Lau and Robert Parlett, School of Computer Science.
7. Manoj Kumar SharmaandDr. P. C. Gupta,) 2012(» A COMPARATIVE STUDY OF STEGANOGRAPHY AND WATERMARKING «, International Journal of Research in IT & Management, pp. 1-12.
8. A.Manikandanand Dr. T. Meyyappan,( June 2012),» WATERMARKING TECHNIQUES «, International Journal of Computers & Technology (IJCT),vol 2. pp. 122-124.
9.Yusuf Perwej, Firoj Parwej , Asif Perwej, (April 2012),» An Adaptive Watermarking Technique for the copyright of digital images and Digital Image Protection« , The International Journal of Multimedia & Its Applications (IJMA), pp. 21-38.
10. Mr. Mali Makarand Lotan, Mr. Suryavanshi Hitendra Eknath and Mr. Nitin N Patil, (April 2012) ,»Angle based digital watermarking of text document «, National Conference on Emerging Trends in Information Technology (NCETIT), pp. 171-175.
11. Zunera Jalil and Anwar M. Mirza, December 2009,» A Review of Digital Watermarking Techniques for Text Documents « ,International Conference on Information and Multimedia Technology(ICIMT) IEEE, pp.330-334.
12. Xinmin Zhou, Weidong Zhao, Zhicheng Wang, Li Pan, (November 2009)," Security Theory and Attack Analysis for Text Watermarking", IEEE TRANSACTIONS ON COMMUNICATIONS.
13.Charlie Obimbo and Behzad Salami,)2008(, » Using Digital Watermarkingfor Copyright Protection« , www.intechopen.com, University of Guelph.
14. M. Hassan Shirali-Shahreza AND and Mohammad Shirali-Shahreza2, (December 2009), »ARABIC/PERSIAN TEXT STEGANOGRAPHY UTILIZING SIMILAR LETTERS WITH DIFFERENT CODES« , The Arabian Journal for Science and Engineering, Volume 35, pp.213-222.
15. Nikita Pande, Sayani Nandy, Shelly Sinha Choudhury, (October 2012), »Alternative Shift Algorithm for Digital Watermarking on Text «,International Journal of Scientific and Research Publications.
16. Xinmin Zhou, Zhicheng Wang, Weidong Zhao, Sichun Wang, Jianping Yu, (November 2009), »Performance Analysis and Evaluation of TextWatermarking« , IEEE TRANSACTIONS ON COMMUNICATIONS.
17. Zunera Jalil, Anwar M. Mirza, Maria Sabir,(2010), »Content based Zero-Watermarking Algorithm forAuthentication of Text Documents « , (IJCSIS) International Journal of Computer Science and Information Security, pp.212-217.
18. David J. Coumou, Gaurav Sharma, )JUNE 2008(, »Insertion, Deletion Codes With Feature-Based Embedding: A New Paradigm for Watermark Synchronization With Applications to Speech Watermarking« ,IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, pp.153-167
19. M. Hassan Shirali-Shahreza, Mohammad Shirali-Shahreza, 2006, »A New Approach to Persian/Arabic Text Steganography« ,International Conference on Computer and Information Science and 1st IEEE/ACIS.
20. R. Davarzani, K. Yaghmaie, May 2009,»Farsi Text Watermarking Based on Character Coding« ,IEEEInternational Conference on Signal Processing Systems, pp.152-156.
21. Gutub Adnan et, (July 2007),» Utilizing Extension Character ‘Kashida’ With Pointed Letters for Arabic Text Digital Watermarking « , International Conference on Security and Cryptography - SECRYPT, Barcelona, Spain.
22. Gutub Adnan et, (Octobre 2009),»Exploit Kashida Adding to Arabic e-Text for High Capacity Steganography « ,IEEE Third International Conference on Network and System Security.pp.447-451.
23. Mohammad Shirali-Shahreza,M. Hassan Shirali-Shahreza, (2008),» An Improved Version of Persian/ArabicText Steganography Using "La" Word« , Proceedings of IEEE 2008 6th National Conference on Telecommunication Technologies, pp.372-376.
24. Mohammad Shirali-Shahreza,( 2007),»A New Persian/Arabic Text Steganography Using "La" Word « , Information and Systems Sciences and Engineering (CISSE 2007),Bridgeport, CT, USA.
25. Mohammad Shirali-Shahreza,(2008) ,»Pseudo-Space Persian/Arabic Text Steganography« , IEEE/ACIS International Conference, pp.864-868.
26. Al Azawi A.F ,Fadhil M.A, (May 2011),»AN ARABIC TEXT STEGANOGRAPHY TECHNIQUE USING ZWJ AND ZWNJ REGULAR EXPRESSIONS« INTERNATIONAL JOURNAL And ACADEMIC RESEARCH Volume 3, No. 3, pp.419-423.
27. Aliea Salman Saber AL – Mozani, Wid Akeel Jawad Awadh,( August 2012),»A New Text Steganography Method by Using Non-Printing Unicode Characters andUnicode System Characteristics in English/Arabic documents« , ISSN 1991- 8690,pp.192-200.
28. Ammar Odeh, Khaled Elleith, (March 2013),»Steganography in Text by Merge ZWC and Space Character« , 28th International Conference onComputers and Their Applications(CATA-2013).
29. Prof. Abdul Monem S. Rahma,Wesam S.Bhaya, Dhamyaa A. AlNasrawi, (Aug 2013),»Text Steganography Based On Unicode of Characters inMultilingual« , International Journal ofEngineering Research and Applications (IJERA) ISSN: 2248-9622.
30. Mr. Mali Makarand Lotan, Mr. Suryavanshi Hitendra Eknath and Mr. Nitin N Patil Aug,( 2012),»Angle based digital watermarking of text document« , World Journal of Science and Technology ,ISSN: 2231-2587.
31. Akbas E. Ali,( 2010),»A New Text Steganography Method By UsingNon-Printing Unicode Characterst« , Eng. &Tech. Journal, Computer Science Department, University of Technology / Baghdad, Vol.28, No.1, 2010.
32. Lip Yee Por , KokSheik Wong, Kok Onn Chee, (2012), »A text-based data hiding method using Unicode space characters « , The Journal of Systems and SoftwareELSEVIER,pp.1075-1082.
33. Zunera Jalil , Anwar M. Mirza, (2010), »Text Watermarking Using Combined Image-plusText Watermark « , IEEE Second International Workshop on Education Technology and Computer Science,pp.11-14.
34.Jaseena K.U, Anita John, (2011), »Text Watermarking using Combined Image and Text for Authentication and Protection« , International Journal of Computer Applications,pp.8-13.
35. Yuanyuan Cheng, Jin Zhang, Xiaowei Liu, Qingcheng Li, Zhenlu Chen, (2013), » Research on Polymorphism in Digital Text Watermarking« ,IEEE 5th International Conference on Intelligent Networking and Collaborative Systems ,pp.166-172.
36. Nitin N. Patil, J. B. Patil , Makarand L. Mali, (2013), » Implementation of Text Watermarking TechniqueUsing Natural Language Watermarks« , International Conference on Communication Systems and Network Technologies,pp.481-486.
37. http://en.wikipedia.org/wiki/Unicode_control_characters,(05 May 2014), Unicode control character review
38. http://www.fileformat.info/info/unicode/char/200B/index.htm,( May 2014), ZWSPUnicode character review
39. http:// www.fileformat.info/info/unicode/char/200C/index.htm,( May 2014) , ZWNJUnicode character review
40. http:// www.fileformat.info/info/unicode/char/200D/index.htm, (May 2014), ZWJUnicode character review
41. http://www.fileformat.info/info/unicode/char/180e/index.htm,( May 2014), MVSUnicode control character review
42. http://www.fileformat.info/info/unicode/char/202a/index.htm,( May 2014), LREUnicode control character review
43. http://www.fileformat.info/info/unicode/char/202b/index.htm,( May 2014), RLEUnicode control character review
44. http://www.fileformat.info/info/unicode/char/feff/index.htm,( 05 May 2014), ZWNBSPUnicode control character review
44. http://ascii-table.com/, (07 July 2014), ASCII Code character review
45.Wengang Cheng, Hui Feng, Cuiru Yang, (2010), »A Robust Text Digital Watermarking Algorithm Based on Fragments Regrouping Strategy« ,IEEE,pp.600-603.
46. T. V. Khen and A. Makur,) 2006(»A Word Based Self-Embedding Scheme For Document Watermark« IEEE Region 10 Conference (TENCON 2006), Institute of Electrical and Electronics Engineers Inc, Nov. 2006, pp. 906–909, doi: 10.1109/TENCON.2006.344125.
47. Q. C. Li and Z. H. Dong, (2008),»Novel Text Watermarking Algorithm based on Chinese Characters Structure«, International Symposium on Computer Science and Computational Technology (ISCSCT), IEEE Press, Dec. 2008, pp. 348–51, doi: 10.1109/ISCSCT.2008.169.
48. X. M. Zhou, W. D. Zhao, S. C. Wang and R. Peng,( 2009), »A semi-fragile watermarking scheme for content authentication of Chinese text documents«, 2nd IEEE International Conference on Computer Science and Information Technology (ICCSIT 2009), IEEE Press, Aug. 2009, pp. 439–43.
49. Huijuan Yang and Alex C. Kot,(2004),»TEXT DOCUMENT AUTHENTICATION BY INTEGRATING INTER CHARACTER AND WORD SPACES WATERMARKING«,2004 IEEE International Conference on Multimedia and Expo (ICME)IEEE, pp. 955–958.
50. Zhao, Q. et al,)2005),»A PCA-based watermarking scheme for tamper-proof of web pages«, Pattern Recognition 38 (2005), pp.1321-1323.
51. I-Shi Lee, Wen-Hsiang Tsai,) 2008)»Secret Communication through Web Pages Using Special Space Codes in HTML Files«, International Journal of Applied Science and Engineering. 2008.6, pp:141-149.
52.Gurpreet Kaur, Kamaljeet Kaur,) 2013)»Digital Watermarking and Other Data Hiding Techniques«, International Journal of Innovative Technology and Exploring Engineering,pp:181-184.
53.Gurpreet Kaur, Kamaljeet Kaur,) 2005)»Adaptive Watermarking Schemes Based On A Redundant Contourlet Transform«, 2005 IEEE,pp:100-105.
54. Hitesh Singh, Pradeep Kumar Singh, Kriti Saroha,) 2009), »A Survey on Text Based Steganography«, Proceedings of the 3RdNational Conference,pp:170-177.
55. Sharon Rose Govada, Bonu Satish Kumar, Manjula Devarakondaand Meka James Stephen,) 2012), »Text Steganography with Multi level Shielding«, IJCSI International Journal of Computer Science Issues,pp:401-405.
56. M. Nosrati , R. Karimi and, M. Hariri ,(2011), »An introduction to steganography methods«, World Applied Programming, Vol (1), No (3),pp:191-195.
57. M. Bensaad, M. Yagoubi ,(2011),»High Capacity Diacritics-based Method For Information Hiding in Arabic Text« , International Conference on Innovations in Information Technology.
58. Jinjie Gu, YuzhuCheng,(2010),»High Capacity Diacritics-based Method For Information Hiding in Arabic Text« , IEEE,pp:155-159.
59. P. Lu, Z. Lu, and J. Gu, (2009), »An optimized natural language watermarking algorithm based on TMR«, Proceedings of 9thInternational Conferencefor Young Computer Scientists.
60. M. Topkara, U. Topraka, M.J. Atallah,(2007) »Information hiding through errors: a confusing approach«, Proceedings of SPIE InternationalConference on Security, Steganography, and Watermarking ofMultimedia Content IX., San Jose, CA.