3 research outputs found

    An embedding traid-bit method to improve the performance of Arabic text steganography

    Get PDF
    The enormous development in the utilization of the Internet has driven by continuous improvements in the region of security. The enhanced security techniques are applied to save the intellectual property. There are numerous sorts of security mechanisms. Steganography is the art and science of concealing secret information inside a cover media without drawing any suspicion to the eavesdropper so that the secret information can only be detected by its proposed recipient. This is done along with the other steganography methods such as image, audio, video, various text steganography methods that are being presented. The text is ideal for steganography due to its ubiquity. There are many steganography methods used several languages such as English, Chines and Arabic language to embed the hidden message in the cover text. Kashida, shifting point and sharp_edges are Arabic steganography methods with high capacity. However, kashida, shifting point and sharp_edges techniques have lack of capability to embed the hidden message into the cover text. This study proposed new method called Traid-bit method by integrating three several types of methods such us kashida, shifting point and sharp_edges to evaluate the proposed method in improving the performance of embedding process. The study presents the process design of proposed method including the algorithms and the system design. The study found that the evaluation of the proposed method provides good knowledge to steganographer to improve the performance of embedding process when the Arabic text steganography method is developed

    Robust Text Steganography Algorithms for Secure Data Communications

    Get PDF
    In the era of information technology, a large amount of digital information is distributed over the Internet in the form of videos, images, text, and audio. The main purpose of widespread distribution enables users to share knowledge between one another. As a result, data transmission and information sharing are effected due to malicious activities. Different techniques exist to protect user authentication, data privacy, and copyrights. Two main techniques that improve security and data protection are Cryptography and Steganography. Cryptographic algorithms convert the secret message from plain text into cipher text. Then the message is sent over the communication channel. Steganography hides a secret message inside the carrier media. This proposal will investigate different Steganography algorithms and present novel algorithms employing text file as a carrier file. The proposed model hides secret data in the text file by applying various properties into file font format by inserting special symbols in the text file. In addition, the suggested model can be applied in both Unicode and ASCII code languages, regardless of the text file format. The proposed system achieves a high degree of the main Steganography attributes like hidden ratio, robustness, and transparency. In addition, this proposal provides guidance for other researchers in text Steganography algorithms

    Novel steganography scheme using Arabic text features in Holy Quran

    Get PDF
    With the rapid growth of the Internet and mobile devices, the need for hidden communications has significantly increased. Steganography is a technique introduced for establishing hidden communication, Most steganography techniques have been applied to audio, images, videos, and text. Many researchers used steganography in Arabic texts to take advantage of adding, editing or changing letters or diacritics, but lead to notable and suspicious text. In this paper, we propose two novel steganography algorithms for Arabic text using the Holy Quran as cover text. The fact that it is forbidden to add, edit or change any letter or diacritics in the Holy Quran provides the valuable feature of its robustness and difficulty as a cover in steganography. The algorithms hide secret messages elements within Arabic letters benefiting from the existence of sun letters (Arabic: ḥurūf shamsīyah) and moon letters (ḥurūf qamarīyah). Also, we consider the existence of some Arabic language characteristics represented as small vowel letters (Arabic Diacritics). Our experiments using the proposed two algorithms demonstrate high capacity for text files. The proposed algorithms are robust against attack since the changes in the cover text are imperceptible, so our contribution offers a more secure algorithm that provides good capacity
    corecore