A Meliorated Kashida Based Approach for Arabic Text Steganography

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

A new method to hide secret message within Arabic texts has been proposed. This method depends primarily on the nature of letters; whether they are pointed or un-pointed letters. We have exploited this feature of Arabic text to add a kashida (-). Since there are two cases of each letter; pointed or un-pointed, a table of four cases is used to add a kashida between two letters every time to hide two bits in each kashida. The most common kashida-based methods hided just one bit in each kashida or used a kashida as well as a zero-width character to hide two bits, while the proposed method hided two bits using kashida without the need to add the zero-width character. Adding zero-width character increases the file size dramatically, which affects the security measures. By hiding two bits in each kashida, the capacity is remarkably increased as compared with some of the well-known kashida-based approaches. The dependency on the nature of both of the surrounding letters of the kashida as well as dividing the cover text into two blocks, each one is being dealt with in a different way, increases the security of the proposed method. Since, intruders are not able to expect the method of extraction. Furthermore, the original kashida case is considered. Ignoring the original kashida in the cover text affects the accuracy of extraction phase. A system of embedding the secret message within a cover text and extracting the secret message from a stego text has been built. This system has a hashing phase in order to distinguish between the authorized user and the un-authorized user, which may increase the robustness of the system. In some cases, the capacity ratio of the proposed method may affected by the sequences of the secret bits, and suitable appearances of the targeted kashida(-). This might be considered as limitation that may yield to undesirable results in such cases. As a future work, we should overcome this drawback by proposing a suitable method to make use of all kashidas irrespective to the sequences of the secret bits.

Author(s): Ala’a M. Alhusban, Jehad Q. Odeh Alnihoud
Publisher: International Journal of Computer Science & Information Technology (IJCSIT)
Year: 2017

Language: English
Pages: 14
Tags: steganography, arabic text, kashida, data hiding