Abstract
Steganography is used for multimedia data security. It is a process of hiding the data within multimedia communication between the parties embedding the secret data inside a carrier file to be protected during its transmission. The research focus is on hiding within Arabic text steganography as a current challenging research area. The work innovation is utilizing text pseudo-spaces characters for data hiding. We present two studies for this text Steganography utilizing pseudo-spaces alone as well as combined with Kashida (extension character) as the old Arabic text stego techniques. Experimental results have shown that the proposed algorithms achieved high capacity and security ratio as compared to state-of-the-art Steganography methods presented for Arabic language. The proposed pseudo-spaces stego technique is of great benefit that can be further used for languages similar to Arabic such as Urdu and Persian as well as opening direction of text-stego research for other languages of the world.
Similar content being viewed by others
References
Aabed M, Awaida S, Elshafei A, Gutub A (2007) Arabic Diacritics Based Steganography. In: IEEE International Conference on Signal Processing and Communications, ICSPC, pp 756–759
Abdallah EE, Hamza AB, Bhattacharya P (2007) MPEG video watermarking using tensor singular value decomposition. Proc. International Conference Image Analysis and Recognition, pp 772–783
Abdallah EE, Ben Hamza A, Bhattacharya P (2010) Video watermarking using wavelet transform and tensor algebra. Journal of Signal, Image and Video Processing 4(2):233–245
Gutub A, Fattani M (2007) A novel arabic text steganography method using letter points and extensions. International Journal of Computer, Electrical, Automation, Control and Information Engineering 1(3):502–505
Alassaf N, Gutub A, Parah S, Al Ghamdi M. Enhancing Speed of SIMON: A Light-Weight-Cryptographic Algorithm for IoT Applications. Multimedia Tools and Applications: An International Journal – Springer, ISSN 1380–7501, https://doi.org/10.1007/s11042-018-6801-z, Published online: 5 November 2018
Alattar AM, Alattar OM (2004) Watermarking electronic text documents containing justified paragraphs and irregular line spacing. Proc SPIE 5306:685–695
Alginahi YM, Kabir MN, Tayan O (2013) An Enhanced Kashida-Based Watermarking Approach For Arabic Text-Documents. In: International Conference on Electronics, Computer and Computation (ICECCO), pp 301–304
Al-Haidari F, Gutub A, Al-Kahsah K, Hamodi J (2009) Improving Security and Capacity for Arabic Text Steganography Using ‘Kashida’ Extensions. 2009 IEEE/ACS Int. Conf. Comput. Syst. Appl., pp 396–399
Al-Nazer A, Gutub A (2009) Exploit Kashida Adding to Arabic e-Text for High Capacity Steganography. 2009 Third Int. Conf. Netw. Syst. Secur., pp 447–451
Al-Nofaie S, Fattani M, Gutub A (2016) Merging two steganography techniques adjusted to improve Arabic text data security. Journal of Computer Science & Computational Mathematics (JCSCM) 6(3):59–65. https://doi.org/10.20967/jcscm.2016.03.004
Alotaibi RA, Elrefaei LA (2016) Utilizing Word Space with Pointed and Un-pointed Letters for Arabic Text Watermarking, pp 111–116
Alotaibi RA, Elrefaei LA (2018) Improved capacity Arabic text watermarking methods based on open word space. Journal of King Saud University -Computer and Information Sciences 30(2): 236–248
An official site for MATLAB. [Online]. Available: https://www.mathworks.com/. Accessed 17 May 2018
Atawneh S, Almomani A, Al Bazar H, Sumari P, Gupta B (2017) Secure and imperceptible digital image steganographic algorithm based on diamond encoding in DWT domain. Multimed Tools Appl 76(18):18451–18472
Bender W, Gruhl D, Morimoto N, Lu A (1996) Techniques for data hiding. Proc IBM Syst J 35:313–336
Bennett K (2004) Linguistic Steganography: Survey, Analysis, and Robustness Concerns for Hiding Information in Text
Bensaad ML, Yagoubi MB (2013) Boosting the capacity of diacritics-based methods for information hiding in Arabic text. Arab J Sci Eng 38(8):2035–2041
Gupta B (2018) Computer and Cyber Security: Principles, Algorithm, Applications, and Perspectives. CRC Press, Taylor & Francis, 666
Gupta B, Agrawal DP, Yamaguchi S (2016) Handbook of research on modern cryptographic solutions for computer and cyber security. IGI Global
Gutub A, Alaseri K. Refining Arabic Text Stego-Techniques for Shares Memorization of Counting-Based Secret Sharing. Journal of King Saud University - Computer and Information Sciences, ISSN: 1319–1578, https://doi.org/10.1016/j.jksuci.2019.06.014, Published by Elsevier, Available online: 28 June 2019
Gutub A, Al-Ghamdi M (2019) Image Based Steganography to Facilitate Improving Counting-Based Secret Sharing. 3D Research - Springer, ISSN 2092–6731, https://doi.org/10.1007/s13319-019-0216-0, vol 10, no 1
Gutub A, Al-Nazer A (2010) High capacity steganography tool for Arabic text using Kashida. The ISC Int’l Journal of Information Security 2(2):109–120
Gutub A, Fattani M (2007) A Novel Arabic Text Steganography Method Using Letter Points and Extensions. In: WASET International Conference on Computer, Information and Systems Science and Engineering (ICCISSE)
Gutub A, Elarian Y, Awaida S, Alvi A (2008) Arabic Text Steganography Using Multiple Diacritics. WoSPA 2008 – 5th IEEE Int. Work. Signal Process. its Appl., pp. 18–20
Gutub A, Ghouti LM, Elarian YS, Awaideh SM, Alvi AK (2010) Utilizing diacritics Marks for Arabic text steganography. Kuwait J Sci Eng 37(1):89–109
Gutub A, Al-Haidari F, Al-Kahsah KM, Hamodi J (2010) E-text watermarking: utilizing Kashida extensions in Arabic language electronic writing. Journal of Emerging Technologies in Web Intelligence (JETWI) 2(1):48–55
Gutub A, Al-alwani W, Bin Mahfoodh A (2010) Improved method of Arabic text steganography using the extension ‘Kashida’ character. Bahria Univ J Inf Commun Technol 3(1):68–72
Gutub A, Al-Juaid N, Khan E (2019) Counting-based secret sharing technique for multimedia applications. Multimedia Tools and Applications: An International Journal – Springer, ISSN 1380-7501 78(5):5591–5619. https://doi.org/10.1007/s11042-017-5293-6
Khan E (2014) Using Arabic poetry system for steganography. ASIAN J Comput Sci Inf Technol 4(6):55–61
Kim Y, Moon K, Oh I, Kim Y-W, Moon K-A, Oh I-S (2003) A Text Watermarking Algorithm based on Word Classification and Inter-word Space Statistics. Seventh Int. Conf. Doc. Anal. Recognition, 2003. Proceedings., vol 1, pp 1–5
Li J, Yu C, Gupta BB, Ren X (2018) Color image watermarking scheme based on quaternion Hadamard transform and Schur decomposition. Multimed Tools Appl 77(4):4545–4561
Low SH, Maxemchuk NF, Brassil JT, O'Gorman L (1995) Document marking and identification using both line and word shifting. In: proceedings of the fourteenth annual joint conference of the IEEE computer and communications societies (INFOCOM ‘95), pp 853–860
Memon MS, Shah A (2011) A novel text steganography technique to Arabic language using reverse Fatha. Pakistan J Eng Technol Sci 1(2):106–113
Memos VA, Psannis KE, Ishibashi Y, Kim B-G, Gupta BB (2018) An efficient algorithm for media-based surveillance system (EAMSuS) in IoT smart city framework. Futur Gener Comput Syst 83:619–628
Mersal S, Alhazmi S, Alamoudi R, Almuzaini N (2014) Arabic text steganography in smartphone. Int J Comput Inf Technol 3(2):2279–2764
Microsoft (2017) Introduction to the C# Language and the.NET Framework. [Online]. Available: https://docs.microsoft.com/en-us/dotnet/opbuildpdf/csharp/getting-started/toc.pdf?branch=live. Accessed 09 Dec 2017
Niimi M, Minewaki S, Noda H, Kawaguchi E (2003) A framework of text-based steganography using SD-form semantics model. In: Pacific rim workshop on digital steganography, Kyushu Institute of Technology, Kitakyushu, Japan.
Odeh A, Elleithy K (2012) Steganography in Arabic text using zero width and Kashidha letters. Int J Comput Sci Inf Technol 4(3):1–11
Odeh A, Elleithy K (2012) Steganography in Arabic Text Using Full Diacritics Text. In: 25th International Conference on Computers and Their Applications in Industry and Engineering (CAINE-2012), pp 483–486
Odeh A, Alzubi A, Hani QB, Elleithy K (2012) Steganography by multipoint Arabic letters. 2012 IEEE Long Isl. Syst. Appl. Technol. Conf., pp 1–7
Popa R (1998) An Analysis of Steganographic Techniques. The Politehnica University of Timisoara
Por LY, Ang TF, Delina B (2008) WhiteSteg: a new scheme in information hiding using text steganography. WSEAS Trans Comput 7(6):735–745
Roslan NA, Mahmod R, Udzir NURI (2011) Sharp-edges method in Arabic text steganography. J Theor Appl Inf Technol 33(1):32–41
Shirali-Shahreza M (2007) A new Persian/Arabic text steganography using ‘La’ word. In: International Conference on Systems, Computing Sciences and Software Engineering; Advances in computer and information sciences and engineering, pp. 339–342
Shirali-Shahreza MH, Shirali-Shahreza M (2006) A New Approach to Persian/Arabic Text Steganography. In: Proceedings of the 5th IEEE/ACIS International Conference on Computer and Information Science, Software Architecture and Reuse (ICIS-COMSAR’06), pp 310–315
Shirali-shahreza MH, Shirali-shahreza M (2007) Text Steganography in Chat. In: Proceedings of 3rd IEEE/IFIP International Conference in Central Asia
Shirali-Shahreza M, Shirali-Shahreza MH (2008) An Improved Version of Persian/Arabic Text Steganography Using ‘La’ Word. In: Proceedings of IEEE 6th National Conference on Telecommunication Technologies and IEEE 2nd Malaysia Conference on Photonics, pp 372–376
Shirali-Shahreza M, Shirali-Shahreza MH (2008) High capacity Persian /Arabic text steganography. J Appl Sci 8(22):4173–4179
Singh H, Singh PK, Saroha K (2009) A Survey on Text Based Steganography. In: Proceedings of the 3rd National Conference, vol 3, no 3, pp 332–335
The Quran. [Online]. Available: http://www.islamicity.org/topics/quran. Accessed 14 Dec 2017
The Unicode Standard. The Unicode Standard. [Online]. Available: http://www.unicode.org. Accessed 20 Nov 2017
Topkara U, Topkara M, Atallah MJ (2006) The hiding virtues of ambiguity: quantifiably resilient watermarking of natural language text through synonym. In: Proceeding of the 8th workshop on Multimedia and security - MM&Sec ‘06, pp 164–174
Xiang L, Wu W, Li X, Yang C (2018) A linguistic steganography based on word indexing compression and candidate selection. Multimed Tools Appl 77(21):28969–28989
Acknowledgments
Thanks to Umm Al-Qura University (UQU) for supporting this work. We thank the College of Computers and Information Systems for helping us work this contribution through its master graduate program. Many thanks for the fruitful graduate course offering by Computer Engineering Department (via Prof. Adnan Gutub) for supervising this work.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Al-Nofaie, S.M.A., Gutub, A.AA. Utilizing pseudo-spaces to improve Arabic text steganography for multimedia data communications. Multimed Tools Appl 79, 19–67 (2020). https://doi.org/10.1007/s11042-019-08025-x
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-019-08025-x