Abstract
Text is a challenging media for steganography due to the limited amount of redundancy bits in text and the ease of detecting minor changes in it. In linguistic steganography, the features of a language are used to hide data. The more features we have in a language, the more capacity of hiding data we can get. The Arabic language is rich in its features, many of which are still not used in text steganography. For example, Arabic calligraphy includes a variety of fonts and shapes for the Arabic alphabet. In this paper, by modifying a string matching algorithm and using suffix tree, the generation of Arabic stego text according to a secret message is implemented. The generation process is performed using a linguistic framework that utilizes Arabic calligraphy (AC-STEGA). In the presented work, multiple shapes of letters in Arabic font (Naskh) are used to increase the capacity of hiding data. This work comes as an extension of previous work to apply one shape of letters in (AC-STEGA). The evaluation showed an improvement in capacity of 65.4% compared to 25.4% presented in previous work. To satisfy security requirement, we did not use cover, the cover represents the secret message itself.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Yang, Y.: Information analysis for steganography and steganalysis in 3D polygonal meshes. Durham University (2013)
Hassanein, M.S.: Secure digital documents using Steganography and QR Code. Brunel University (2014)
Por, L.Y., Delina, B.: Information hiding: a new approach in text steganography. In: WSEAS International Conference, Proceedings. Mathematics and Computers in Science and Engineering. World Scientific and Engineering Academy and Society (2008)
Hakak, S., Kamsin, A., Tayan, O., Idris, M.Y.I., Gilkar, G.A.: Approaches for preserving content integrity of sensitive online Arabic content: a survey and research challenges. Inf. Process. Manag. 1–14 (2017)
Gono, R.: Steganography in computer graphics. In: Faculty of Informatics. Masaryk University (2017)
Tatwadarshi, P., Nagarhalli, J.W.B., Jain, N.: A survey of Hindi text steganography. Int. J. Sci. Eng. Res. 7(3), 55–61 (2016)
Chang, C.-Y., Clark, S.: Linguistic steganography using automatically generated paraphrases. In: Human Language Technologies: The 2010 Annual Conference of the North American Chapter of the Association for Computational Linguistics. Association for Computational Linguistics (2010)
Sharma, S., et al.: Analysis of different text steganography techniques: a survey. In: 2016 Second International Conference on Computational Intelligence & Communication Technology (CICT). IEEE (2016)
Bhattacharyya, S., Banerjee, I., Sanyal, G.: A survey of steganography and steganalysis technique in image, text, audio and video as cover carrier. J. Glob. Res. Comput. Sci. 2(4), 1–16 (2011)
Ramakrishnan, B.K., Thandra, P.K., Srinivasula, A.S.M.: Text steganography: a novel character-level embedding algorithm using font attribute. Secur. Commun. Netw. 9(18), 6066–6079 (2016)
Roslan, N.A., Mahmod, R., Udzir, N.I.: Sharp-edges method in Arabic text steganography. J. Theor. Appl. Inf. Technol. 33 (2011)
Shirali-Shahreza, M.H.: A new approach to Persian/Arabic text steganography. In: 5th IEEE/ACIS International Conference. IEEE (2006)
Shirali-Shahreza, M.: A new persian/arabic text steganography using “La” word. In: Sobh, T. (ed.) Advances in Computer and Information Sciences and Engineering, pp. 339–342. Springer, Dordrecht (2008)
Gutub, A., Fattani, M.: A novel Arabic text steganography method using letter points and extensions. In: WASET International Conference on Computer, Information and Systems Science and Engineering (ICCISSE) (2007)
Gutub, A., Al-Nazer, A.A.: High capacity steganography tool for Arabic text using ‘Kashida’. ISC Int. J. Inf. Secur. 2(2), 107–118 (2010)
Alotaibi, N., Gutub, A., Khan, E.: Stego-system for hiding text in images of personal computers. In: The 12th Learning and Technology Conference: Wearable Tech/Wearable Learning (2015)
Aabed, M.A., et al.: Arabic diacritics based steganography. In: IEEE International Conference on Signal Processing and Communications, ICSPC 2007. IEEE (2007)
Gutub, A.A., Elarian, Y.S., Awaideh, S., Alvi, A.: Arabic text steganography using multiple diacritics. In: Proceedings of the 5th IEEE International Workshop on Signal Processing and its Applications (WoSPA 2008), Sharjah, UAE (2008)
Ahmadoh, E., Gutub, A.: Utilization of two diacritics for Arabic text steganography to enhance performance. Lect. Notes Inf. Theory 3(1), 42–47 (2015)
Uday Nazim Farman, K.A.D.: Aesthetic theory of Arabic calligraphy in the Islamic Art. J. Nabo 11–12, 143–173 (2015)
Hamzah, A.A., Khattab, S., Bayomi, H.: A linguistic steganography framework using Arabic calligraphy. J. King Saud Univ.-Comput. Inf. Sci. (2019)
Gutub, A., et al.: Utilizing extension character ‘Kashida’ with pointed letters for Arabic text digital watermarking. In: International Conference on Security and Cryptography (2007)
Al-Nofaie, S., Fattani, M., Gutub, A.: Capacity improved Arabic text steganography technique utilizing ‘Kashida’ with whitespaces. In: The 3rd International Conference on Mathematical Sciences and Computer Engineering (ICMSCE2016) (2016)
Taha, A., Hammad, A.S., Selim, M.M.: A high capacity algorithm for information hiding in Arabic text. J. King Saud Univ.-Comput. Inf. Sci. (2018)
Odeh, A., Elleithy, K., Faezipour, M.: Steganography in Arabic text using Kashida variation algorithm (KVA). In: Proceedings of the 2013 IEEE Long Island Systems, Applications and Technology Conference (LISAT), May 2013
Alaseri, K., Adnan, A.: Merging secret sharing within Arabic text steganography for practical retrieval. IJRDO J. Comput. Sci. Eng. 4, 1–17 (2018)
Odeh, A., et al.: Steganography by multipoint Arabic letters. In: Systems, Applications and Technology Conference (LISAT). IEEE, Long Island (2012)
Yang, Z., et al.: Automatically generate steganographic text based on Markov Model and Huffman Coding. arXiv preprint arXiv:1811.04720 (2018)
Wilson, A., Ker, A.D.: Avoiding detection on twitter: embedding strategies for linguistic steganography. Electron. Imaging 8, 1–9 (2016)
Zhou, Z., et al.: Coverless information hiding method based on multi-keywords. In: International Conference on Cloud Computing and Security. Springer (2016)
Topkara, M., Topkara, U., Atallah, M.J.: Information hiding through errors: a confusing approach. In: Security, Steganography, and Watermarking of Multimedia Contents IX 2007. International Society for Optics and Photonics (2007)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Hamzah, A.A., Bayomi, H. (2020). Text Steganography with High Embedding Capacity Using Arabic Calligraphy. In: Saeed, F., Mohammed, F., Gazem, N. (eds) Emerging Trends in Intelligent Computing and Informatics. IRICT 2019. Advances in Intelligent Systems and Computing, vol 1073. Springer, Cham. https://doi.org/10.1007/978-3-030-33582-3_13
Download citation
DOI: https://doi.org/10.1007/978-3-030-33582-3_13
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-33581-6
Online ISBN: 978-3-030-33582-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)