Published March 21, 2007 | Version 5745
Journal article Open

A Novel Arabic Text Steganography Method Using Letter Points and Extensions

Description

This paper presents a new steganography approach suitable for Arabic texts. It can be classified under steganography feature coding methods. The approach hides secret information bits within the letters benefiting from their inherited points. To note the specific letters holding secret bits, the scheme considers the two features, the existence of the points in the letters and the redundant Arabic extension character. We use the pointed letters with extension to hold the secret bit 'one' and the un-pointed letters with extension to hold 'zero'. This steganography technique is found attractive to other languages having similar texts to Arabic such as Persian and Urdu.

Files

5745.pdf

Files (172.9 kB)

Name Size Download all
md5:779d3ad8287e0dadd8572ae9e3745e50
172.9 kB Preview Download

Additional details

References

  • B. Chen and G.W. Wornell, "Quantization Index Modulation: A Class of Provably Good Methods for Digital Watermarking and Information Embedding," IEEE Trans. Information Theory, Vol. 47, No. 4, pp. 1423- 1443, 2001.
  • M. Hassan Shirali-Shahreza, Mohammad Shirali-Shahreza, "A New Approach to Persian/Arabic Text Steganography," 5th IEEE/ACIS International Conference on Computer and Information Science (ICISCOMSAR 06), pp. 310- 315, July 2006.
  • J.C. Judge, "Steganography: Past, Present, Future", SANS white paper, http://www.sans.org/rr/papers/, November 30, 2001.
  • R. Chandramouli, and N. Memon, "Analysis of LSB based image steganography techniques", Proceedings of the International Conference on Image Processing, Vol. 3, pp. 1019 - 1022, Oct. 2001.
  • G. Do├½rr and J.L. Dugelay, "A Guide Tour of Video Watermarking", Signal Processing: Image Communication, Vol. 18, No 4, pp. 263-282, 2003.
  • K. Gopalan, "Audio steganography using bit modification", Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, (ICASSP '03), Vol. 2, pp. 421-424, April 2003.
  • W. Bender, D. Gruhl, N. Morimoto, and A. Lu, "Techniques for data hiding", IBM Systems Journal, Vol. 35, No 4, pp. 313-336, 1996.
  • K. Bennett, "Linguistic Steganography: Survey, Analysis, and Robustness Concerns for Hiding Information in Text", Purdue University, CERIAS Tech. Report 2004-13, 2004.
  • S.H. Low, N.F. Maxemchuk, J.T. Brassil, and L. O'Gorman, "Document marking and identification using both line and word shifting", Proceedings of the Fourteenth Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '95), April 1995. [10] K. Rabah, "Steganography-The Art of Hiding Data", Information Technology Journal, vol. 3, Issue 3, pp. 245-269, 2004. [11] M. H. Shirali-Shahreza, and S. Shirali-Shahreza, "A Robust Page Segmentation Method for Persian/Arabic Document", WSEAS Transactions on Computers, vol. 4, Issue 11, Nov. 2005, pp. 1692-1698. [12] N. Provos and P. Honeyman, "Hide and Seek: An Introduction to Steganography", IEEE Security & Privacy, pp. 32-44, May/June 2003.