New Text Steganography Method Using the Arabic Letters Dots

Ahlam Khekan

Abstract


 

ABSTRACT

With the increasing technological and electronic development, methods have been developed to hide important information using Text Steganography as a new technology, since it is not noticeable and easy to send and receive. The use of the Arabic language is one of the new methods used to hide data. In this work we preview our method that depend to use the part of Arabic language properties to embed the secret English message in to cover text to create text steganography. More than half Arabic characters contain dots. Several characters have upper dots and others have lower dots. Some have one dot others have tow dots. Few have even three dots. In this new idea we will use the dots of charters to embed the English secret message. First, we will compress the secret message by using the 5-Bit Encoding (T-5BE) to make the cover text able to embed more bits of the secret message by 37.5%. Then we start use the Arabic semantic dictionary to correct the hiding path and enhancement the stego-cover text to elimination errors that caused by switching words. In this research, we were able to extract experimental results that show that the proposed model achieves high masking accuracy in addition to the storage capacity of the cover text.


Keywords


Keywords: text steganography, characters dots, Huffman coding, stego-cover.

References


R. Din, S. Utama, and A. Mustapha, “Evaluation review on effectiveness and security performances of text steganography technique,” Indones. J. Electr. Eng. Comput. Sci., vol. 11, no. 2, pp. 747–754, 2018, doi: 10.11591/ijeecs.v11.i2.pp747-754.

A. Koluguri, S. Gouse, and P. B. Reddy, “Text steganography methods and its tools,” Int. J. Adv. Sci. Tech. Res., vol. 2, no. 4, pp. 888–902, 2014.

S. F. Lu, O. Farooq, and H. Ali, “New Steganography Method Using Litter Manipulations Frequency,” DEStech Trans. Comput. Sci. Eng., no. icitia, pp. 224–229, 2017, doi: 10.12783/dtcse/icitia2017/13247.

M. Shirali-Shahreza and S. Shirali-Shahreza, “High capacity Persian/Arabic text steganography,” Journal of Applied Sciences, vol. 8, no. 22. pp. 4173–4179, 2008, doi: 10.3923/jas.2008.4173.4179.

K. Wang and Q. Gao, “A Coverless Plain Text Steganography Based on Character Features,” IEEE Access, vol. 7, pp. 95665–95676, 2019, doi: 10.1109/ACCESS.2019.2929123.

R. Kumar and H. Singh, “Recent Trends in Text Steganography with Experimental Study,” Handb. Comput. Networks Cyber Secur., pp. 849–872, 2020, doi: 10.1007/978-3-030-22277-2_34.

H. Alshahrani and G. Weir, “Hybrid Arabic text steganography,” Int. J. Comput. Inf. Technol., vol. 6, no. 6, pp. 329–338, 2017.

S. M. A. Al-Nofaie and A. A. A. Gutub, “Utilizing pseudo-spaces to improve Arabic text steganography for multimedia data communications,” Multimed. Tools Appl., vol. 79, no. 1–2, pp. 19–67, 2020, doi: 10.1007/s11042-019-08025-x.

K. M. S. Foda, A. Fahmy, K. Shehata, and H. Saleh, “A Qur’anic Code for Representing the Holy Qur’an (Rasm Al-’Uthmani),” Proc. - 2013 Taibah Univ. Int. Conf. Adv. Inf. Technol. Holy Quran Its Sci. NOORIC 2013, pp. 304–309, 2015, doi: 10.1109/NOORIC.2013.67.

M. H. Shirali-Shahreza and M. Shirali-Shahreza, “A new approach to Persian/Arabic text steganography,” Proc. - 5th IEEE/ACIS Int. Conf. Comput. Info. Sci., ICIS 2006. conjunction with 1st IEEE/ACIS, Int. Work. Component-Based Softw. Eng., Softw. Arch. Reuse, COMSAR 2006, vol. 2006, no. July 2006, pp. 310–315, 2006, doi: 10.1109/ICIS-COMSAR.2006.10.

M. H. Shirali-Shahreza and M. Shirali-Shahreza, “Arabic/Persian text steganography utilizing similar letters with different codes,” Arab. J. Sci. Eng., vol. 35, no. 1, pp. 213–222, 2010.

A. F. Al-Azawi and M. A. Fadhil, “Arabic text steganography using kashida extensions with Huffman code,” Journal of Applied Sciences, vol. 10, no. 5. pp. 436–439, 2010, doi: 10.3923/jas.2010.436.439.

A. Gutub, W. Al-Alwani, and A. Mahfoodh, “Improved Method of Arabic Text SteganographyUsing the Extension „Kashida‟ Character,” Bahria Univ. J. Inf. …, vol. 3, no. 1, pp. 68–72, 2010.

S. Al-nofaie, M. Fattani, and A. Gutub, “Capacity Improved Arabic Text Steganography Technique Utilizing ‘ Kashida ’ with Whitespaces Capacity Improved Arabic Text Steganography Technique Utilizing ‘ Kashida ’ with Whitespaces Related : Kashida Approach,” 3rd Int. Conf. Math. Sci. Comput. Eng. (ICMSCE 2016) Capacit., no. February, pp. 38–44, 2016.

A. A. Hamzah, S. Khattab, and H. Bayomi, “A linguistic steganography framework using Arabic calligraphy,” J. King Saud Univ. - Comput. Inf. Sci., no. xxxx, 2019, doi: 10.1016/j.jksuci.2019.04.015.




DOI: http://doi.org/10.11591/ijeecs.v21.i3.pp%25p
Total views : 24 times

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

shopify stats IJEECS visitor statistics