Skip to main content
Log in

Utilizing pseudo-spaces to improve Arabic text steganography for multimedia data communications

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Steganography is used for multimedia data security. It is a process of hiding the data within multimedia communication between the parties embedding the secret data inside a carrier file to be protected during its transmission. The research focus is on hiding within Arabic text steganography as a current challenging research area. The work innovation is utilizing text pseudo-spaces characters for data hiding. We present two studies for this text Steganography utilizing pseudo-spaces alone as well as combined with Kashida (extension character) as the old Arabic text stego techniques. Experimental results have shown that the proposed algorithms achieved high capacity and security ratio as compared to state-of-the-art Steganography methods presented for Arabic language. The proposed pseudo-spaces stego technique is of great benefit that can be further used for languages similar to Arabic such as Urdu and Persian as well as opening direction of text-stego research for other languages of the world.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22
Fig. 23
Fig. 24
Fig. 25
Fig. 26
Fig. 27
Fig. 28
Fig. 29
Fig. 30
Fig. 31
Fig. 32
Fig. 33
Fig. 34
Fig. 35
Fig. 36
Fig. 37
Fig. 38
Fig. 39
Fig. 40
Fig. 41
Fig. 42

Similar content being viewed by others

References

  1. Aabed M, Awaida S, Elshafei A, Gutub A (2007) Arabic Diacritics Based Steganography. In: IEEE International Conference on Signal Processing and Communications, ICSPC, pp 756–759

  2. Abdallah EE, Hamza AB, Bhattacharya P (2007) MPEG video watermarking using tensor singular value decomposition. Proc. International Conference Image Analysis and Recognition, pp 772–783

  3. Abdallah EE, Ben Hamza A, Bhattacharya P (2010) Video watermarking using wavelet transform and tensor algebra. Journal of Signal, Image and Video Processing 4(2):233–245

    Article  Google Scholar 

  4. Gutub A, Fattani M (2007) A novel arabic text steganography method using letter points and extensions. International Journal of Computer, Electrical, Automation, Control and Information Engineering 1(3):502–505

  5. Alassaf N, Gutub A, Parah S, Al Ghamdi M. Enhancing Speed of SIMON: A Light-Weight-Cryptographic Algorithm for IoT Applications. Multimedia Tools and Applications: An International Journal – Springer, ISSN 1380–7501, https://doi.org/10.1007/s11042-018-6801-z, Published online: 5 November 2018

    Article  Google Scholar 

  6. Alattar AM, Alattar OM (2004) Watermarking electronic text documents containing justified paragraphs and irregular line spacing. Proc SPIE 5306:685–695

    Article  Google Scholar 

  7. Alginahi YM, Kabir MN, Tayan O (2013) An Enhanced Kashida-Based Watermarking Approach For Arabic Text-Documents. In: International Conference on Electronics, Computer and Computation (ICECCO), pp 301–304

  8. Al-Haidari F, Gutub A, Al-Kahsah K, Hamodi J (2009) Improving Security and Capacity for Arabic Text Steganography Using ‘Kashida’ Extensions. 2009 IEEE/ACS Int. Conf. Comput. Syst. Appl., pp 396–399

  9. Al-Nazer A, Gutub A (2009) Exploit Kashida Adding to Arabic e-Text for High Capacity Steganography. 2009 Third Int. Conf. Netw. Syst. Secur., pp 447–451

  10. Al-Nofaie S, Fattani M, Gutub A (2016) Merging two steganography techniques adjusted to improve Arabic text data security. Journal of Computer Science & Computational Mathematics (JCSCM) 6(3):59–65. https://doi.org/10.20967/jcscm.2016.03.004

  11. Alotaibi RA, Elrefaei LA (2016) Utilizing Word Space with Pointed and Un-pointed Letters for Arabic Text Watermarking, pp 111–116

  12. Alotaibi RA, Elrefaei LA (2018) Improved capacity Arabic text watermarking methods based on open word space. Journal of King Saud University -Computer and Information Sciences 30(2): 236–248

    Article  Google Scholar 

  13. An official site for MATLAB. [Online]. Available: https://www.mathworks.com/. Accessed 17 May 2018

  14. Atawneh S, Almomani A, Al Bazar H, Sumari P, Gupta B (2017) Secure and imperceptible digital image steganographic algorithm based on diamond encoding in DWT domain. Multimed Tools Appl 76(18):18451–18472

    Article  Google Scholar 

  15. Bender W, Gruhl D, Morimoto N, Lu A (1996) Techniques for data hiding. Proc IBM Syst J 35:313–336

    Article  Google Scholar 

  16. Bennett K (2004) Linguistic Steganography: Survey, Analysis, and Robustness Concerns for Hiding Information in Text

  17. Bensaad ML, Yagoubi MB (2013) Boosting the capacity of diacritics-based methods for information hiding in Arabic text. Arab J Sci Eng 38(8):2035–2041

    Article  Google Scholar 

  18. Gupta B (2018) Computer and Cyber Security: Principles, Algorithm, Applications, and Perspectives. CRC Press, Taylor & Francis, 666

  19. Gupta B, Agrawal DP, Yamaguchi S (2016) Handbook of research on modern cryptographic solutions for computer and cyber security. IGI Global

  20. Gutub A, Alaseri K. Refining Arabic Text Stego-Techniques for Shares Memorization of Counting-Based Secret Sharing. Journal of King Saud University - Computer and Information Sciences, ISSN: 1319–1578, https://doi.org/10.1016/j.jksuci.2019.06.014, Published by Elsevier, Available online: 28 June 2019

  21. Gutub A, Al-Ghamdi M (2019) Image Based Steganography to Facilitate Improving Counting-Based Secret Sharing. 3D Research - Springer, ISSN 2092–6731, https://doi.org/10.1007/s13319-019-0216-0, vol 10, no 1

  22. Gutub A, Al-Nazer A (2010) High capacity steganography tool for Arabic text using Kashida. The ISC Int’l Journal of Information Security 2(2):109–120

  23. Gutub A, Fattani M (2007) A Novel Arabic Text Steganography Method Using Letter Points and Extensions. In: WASET International Conference on Computer, Information and Systems Science and Engineering (ICCISSE)

  24. Gutub A, Elarian Y, Awaida S, Alvi A (2008) Arabic Text Steganography Using Multiple Diacritics. WoSPA 2008 – 5th IEEE Int. Work. Signal Process. its Appl., pp. 18–20

  25. Gutub A, Ghouti LM, Elarian YS, Awaideh SM, Alvi AK (2010) Utilizing diacritics Marks for Arabic text steganography. Kuwait J Sci Eng 37(1):89–109

    Google Scholar 

  26. Gutub A, Al-Haidari F, Al-Kahsah KM, Hamodi J (2010) E-text watermarking: utilizing Kashida extensions in Arabic language electronic writing. Journal of Emerging Technologies in Web Intelligence (JETWI) 2(1):48–55

  27. Gutub A, Al-alwani W, Bin Mahfoodh A (2010) Improved method of Arabic text steganography using the extension ‘Kashida’ character. Bahria Univ J Inf Commun Technol 3(1):68–72

    Google Scholar 

  28. Gutub A, Al-Juaid N, Khan E (2019) Counting-based secret sharing technique for multimedia applications. Multimedia Tools and Applications: An International Journal – Springer, ISSN 1380-7501 78(5):5591–5619. https://doi.org/10.1007/s11042-017-5293-6

    Article  Google Scholar 

  29. Khan E (2014) Using Arabic poetry system for steganography. ASIAN J Comput Sci Inf Technol 4(6):55–61

    Google Scholar 

  30. Kim Y, Moon K, Oh I, Kim Y-W, Moon K-A, Oh I-S (2003) A Text Watermarking Algorithm based on Word Classification and Inter-word Space Statistics. Seventh Int. Conf. Doc. Anal. Recognition, 2003. Proceedings., vol 1, pp 1–5

  31. Li J, Yu C, Gupta BB, Ren X (2018) Color image watermarking scheme based on quaternion Hadamard transform and Schur decomposition. Multimed Tools Appl 77(4):4545–4561

    Article  Google Scholar 

  32. Low SH, Maxemchuk NF, Brassil JT, O'Gorman L (1995) Document marking and identification using both line and word shifting. In: proceedings of the fourteenth annual joint conference of the IEEE computer and communications societies (INFOCOM ‘95), pp 853–860

  33. Memon MS, Shah A (2011) A novel text steganography technique to Arabic language using reverse Fatha. Pakistan J Eng Technol Sci 1(2):106–113

    Google Scholar 

  34. Memos VA, Psannis KE, Ishibashi Y, Kim B-G, Gupta BB (2018) An efficient algorithm for media-based surveillance system (EAMSuS) in IoT smart city framework. Futur Gener Comput Syst 83:619–628

    Article  Google Scholar 

  35. Mersal S, Alhazmi S, Alamoudi R, Almuzaini N (2014) Arabic text steganography in smartphone. Int J Comput Inf Technol 3(2):2279–2764

    Google Scholar 

  36. Microsoft (2017) Introduction to the C# Language and the.NET Framework. [Online]. Available: https://docs.microsoft.com/en-us/dotnet/opbuildpdf/csharp/getting-started/toc.pdf?branch=live. Accessed 09 Dec 2017

  37. Niimi M, Minewaki S, Noda H, Kawaguchi E (2003) A framework of text-based steganography using SD-form semantics model. In: Pacific rim workshop on digital steganography, Kyushu Institute of Technology, Kitakyushu, Japan.

  38. Odeh A, Elleithy K (2012) Steganography in Arabic text using zero width and Kashidha letters. Int J Comput Sci Inf Technol 4(3):1–11

    Google Scholar 

  39. Odeh A, Elleithy K (2012) Steganography in Arabic Text Using Full Diacritics Text. In: 25th International Conference on Computers and Their Applications in Industry and Engineering (CAINE-2012), pp 483–486

  40. Odeh A, Alzubi A, Hani QB, Elleithy K (2012) Steganography by multipoint Arabic letters. 2012 IEEE Long Isl. Syst. Appl. Technol. Conf., pp 1–7

  41. Popa R (1998) An Analysis of Steganographic Techniques. The Politehnica University of Timisoara

  42. Por LY, Ang TF, Delina B (2008) WhiteSteg: a new scheme in information hiding using text steganography. WSEAS Trans Comput 7(6):735–745

    Google Scholar 

  43. Roslan NA, Mahmod R, Udzir NURI (2011) Sharp-edges method in Arabic text steganography. J Theor Appl Inf Technol 33(1):32–41

    Google Scholar 

  44. Shirali-Shahreza M (2007) A new Persian/Arabic text steganography using ‘La’ word. In: International Conference on Systems, Computing Sciences and Software Engineering; Advances in computer and information sciences and engineering, pp. 339–342

    Chapter  Google Scholar 

  45. Shirali-Shahreza MH, Shirali-Shahreza M (2006) A New Approach to Persian/Arabic Text Steganography. In: Proceedings of the 5th IEEE/ACIS International Conference on Computer and Information Science, Software Architecture and Reuse (ICIS-COMSAR’06), pp 310–315

  46. Shirali-shahreza MH, Shirali-shahreza M (2007) Text Steganography in Chat. In: Proceedings of 3rd IEEE/IFIP International Conference in Central Asia

  47. Shirali-Shahreza M, Shirali-Shahreza MH (2008) An Improved Version of Persian/Arabic Text Steganography Using ‘La’ Word. In: Proceedings of IEEE 6th National Conference on Telecommunication Technologies and IEEE 2nd Malaysia Conference on Photonics, pp 372–376

  48. Shirali-Shahreza M, Shirali-Shahreza MH (2008) High capacity Persian /Arabic text steganography. J Appl Sci 8(22):4173–4179

    Article  Google Scholar 

  49. Singh H, Singh PK, Saroha K (2009) A Survey on Text Based Steganography. In: Proceedings of the 3rd National Conference, vol 3, no 3, pp 332–335

  50. The Quran. [Online]. Available: http://www.islamicity.org/topics/quran. Accessed 14 Dec 2017

  51. The Unicode Standard. The Unicode Standard. [Online]. Available: http://www.unicode.org. Accessed 20 Nov 2017

  52. Topkara U, Topkara M, Atallah MJ (2006) The hiding virtues of ambiguity: quantifiably resilient watermarking of natural language text through synonym. In: Proceeding of the 8th workshop on Multimedia and security - MM&Sec ‘06, pp 164–174

  53. Xiang L, Wu W, Li X, Yang C (2018) A linguistic steganography based on word indexing compression and candidate selection. Multimed Tools Appl 77(21):28969–28989

    Article  Google Scholar 

Download references

Acknowledgments

Thanks to Umm Al-Qura University (UQU) for supporting this work. We thank the College of Computers and Information Systems for helping us work this contribution through its master graduate program. Many thanks for the fruitful graduate course offering by Computer Engineering Department (via Prof. Adnan Gutub) for supervising this work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Adnan Abdul-Aziz Gutub.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Al-Nofaie, S.M.A., Gutub, A.AA. Utilizing pseudo-spaces to improve Arabic text steganography for multimedia data communications. Multimed Tools Appl 79, 19–67 (2020). https://doi.org/10.1007/s11042-019-08025-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-08025-x

Keywords

Navigation