Skip to main content
Log in

Securing Data via Cryptography and Arabic Text Steganography

  • Original Research
  • Published:
SN Computer Science Aims and scope Submit manuscript

Abstract

This research proposes an efficient security system for hiding classified Arabic text-data on limited processors devices benefiting from the combination of both techniques: light-weight cryptography (LWC) and Arabic text steganography. The work assumes to secure the sensitive text-data on devices suffering low resource allocation by layer of LWC encryption to provide acceptable security. In this work, we use a two-layer technique, where we firstly encrypt the Arabic secret text-data examining effectiveness of different LWC algorithms, i.e. AES, DES, and IDEA; then, embedding the encrypted data into diacritics within Arabic text cover media. The work tested the possibility of accepting LWC security of AES, IDEA, and DES encryption assuming their suitable effect on the text stego-cover. The work runs numerous different experimentations to study the preference, where LWC selection of DES algorithm finds the applicable scheme giving acceptable security in efficient manner.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22
Fig. 23
Fig. 24
Fig. 25
Fig. 26
Fig. 27
Fig. 28
Fig. 29
Fig. 30
Fig. 31
Fig. 32
Fig. 33
Fig. 34
Fig. 35
Fig. 36
Fig. 37
Fig. 38

Similar content being viewed by others

References

  1. Kheshaifaty N, Gutub A. Preventing multiple accessing attacks via efficient integration of captcha crypto hash functions. Int J Comput Sci Netw Secur. 2020;20(9):16–28. https://doi.org/10.22937/IJCSNS.2020.20.09.3.

    Article  Google Scholar 

  2. Almutairi S, Gutub A, Al-Ghamdi M. Image steganography to facilitate online students account system. Rev Bus Technol Res. 2019;16(2):43–9.

    Google Scholar 

  3. Bin-Hureib E, Gutub A. Enhancing medical data security via combining elliptic curve cryptography and image steganography. Int J Comput Sci Netw Secur. 2020;20(8):1–8. https://doi.org/10.22937/IJCSNS.2020.20.08.1.

    Article  Google Scholar 

  4. Gutub A. utilizing information security techniques as digital evidence for cybercrime activities. In: Cybercrimes and Digital Forensics Forum, Naif Arab University for Security Sciences (NAUSS), 2019. http://doi.org/10.13140/RG.2.2.14885.45281

  5. Almutairi S, Gutub A, Al-Juaid N. Motivating teachers to use information technology in educational process within Saudi Arabia. Int J Technol Enhanced Learn. 2020;12(2):200–17. https://doi.org/10.1504/IJTEL.2020.10027118.

    Article  Google Scholar 

  6. Dinu D, Corre Y, Khovratovich D, Perrin L, Großschädl J, Biryukov A. Triathlon of lightweight block ciphers for the internet of things. J Cryptogr Eng. 2019;9:283–302.

    Article  Google Scholar 

  7. Alassaf N, Gutub A. Simulating light-weight-cryptography implementation for IoT healthcare data security applications. Int J E-Health Med Commun. 2019;10(4):1–15. https://doi.org/10.4018/IJEHMC.2019100101.

    Article  Google Scholar 

  8. Alanazi N, Khan E, Gutub A. Functionality-improved Arabic text steganography based on unicode features. Arab J Sci Eng. 2020. https://doi.org/10.1007/s13369-020-04917-5.

    Article  Google Scholar 

  9. Bailey K, Curran K. An evaluation of image based steganography methods. Multimed Tools Appl. 2006;30:55–88. https://doi.org/10.1007/s11042-006-0008-4.

  10. Gutub A, Ghouti L, Elarian Y, Awaideh S, Alvi A. Utilizing diacritic marks for Arabic text steganography. Kuwait J Sci Eng. 2010;37(1):89–109.

    Google Scholar 

  11. Gutub A, Al-Nazer A. High capacity steganography tool for Arabic text using “Kashida.” ISC Int J Inf Secur. 2010;2(2):107–18. https://doi.org/10.22042/ISECURE.2015.2.2.4.

    Article  Google Scholar 

  12. Odeh A, Alzubi A, Hani Q, Elleithy K. Steganography by multipoint Arabic letters. In: IEEE Long Island Systems, Applications and Technology Conference (LISAT), 2012, pp. 1–7.

  13. Al-Otaibi N, Gutub A. 2-leyer security system for hiding sensitive text data on personal computers. Lect Notes Inf Theory. 2014;2(2):151–7. https://doi.org/10.12720/lnit.2.2.151-157.

    Article  Google Scholar 

  14. Samkari H, Gutub A. Protecting medical records against cybercrimes within Hajj period by 3-layer security. Recent Trends Inf Technol Appl. 2019;2(3):1–21.

    Google Scholar 

  15. Alassaf N, Gutub A, Parah S, AlGhamdi M. Enhancing speed of SIMON: a light-weight-cryptographic algorithm for IoT applications. Multimed Tools Appl. 2019;78:32633–57. https://doi.org/10.1007/s11042-018-6801-z.

    Article  Google Scholar 

  16. Alanazi N, Khan E, Gutub A. Efficient security and capacity techniques for Arabic text steganography via engaging unicode standard encoding. Multimed Tools Appl. 2020. https://doi.org/10.1007/s11042-020-09667-y.

    Article  Google Scholar 

  17. Al-Otaibi N, Gutub A. Flexible stego-system for hiding text in images of personal computers based on user security priority. In: International conference on advanced engineering technologies (AET), 2014; pp. 250–256.

  18. Al-Nofaie S, Fattani M, Gutub A. Capacity improved Arabic text steganography technique utilizing ‘Kashida’ with whitespaces. In: International conference on mathematical sciences and computer engineering (ICMSCE2016), 2016; pp. 38–44.

  19. Kadhem SM, Ali DW. Proposed hybrid method to hide information in Arabic text. J Theor Appl Inf Technol. 2017;95(7):1466–1478.

  20. Malik A, Sikka G, Verma HK. A high capacity text steganography scheme based on LZW compression and color coding. Eng Sci Technol. 2017;20:72–9.

    Google Scholar 

  21. Mohamed A. An improved algorithm for information hiding based on features of Arabic text: a unicode approach. Egypt Inform J. 2014;15:79–87.

    Article  Google Scholar 

  22. Bensaad ML, Yagoubi MB. High capacity diacritics-based method for information hiding in Arabic text. In: International conference on innovations in information technology. 2011; pp. 433–436.

  23. Al-Haidari F, Gutub A, Al-Kahsah K, Hamodi J. Improving security and capacity for arabic text steganography using ‘Kashida’ extensions. In: IEEE/ACS international conference on computer systems and applications. 2009; pp. 396–399.

  24. Al-Azawi AF, Fadhil MA. Arabic text steganography using Kashida extensions with Huffman code. J Appl Sci. 2010;10:436–9.

    Article  Google Scholar 

  25. Shirali-Shahreza M, Shirali-Shahreza S. High capacity Persian/Arabic text steganography. Appl Sci. 2008;8:4173–9.

    Article  Google Scholar 

  26. Por LY, Wong K, Chee KO. UniSpaCh: a text-based data hiding method using unicode space characters. J Syst Softw. 2012;85:1075–82.

    Article  Google Scholar 

  27. Desoky A. Listega: list-based steganography methodology. Int J Inf Secur. 2009;8:247–61.

    Article  Google Scholar 

  28. Alabish A, Goweder A, Enakoa A. A universal lexical steganography technique. Int J Comput Commun Eng. 2013;2:153–157. https://doi.org/10.7763/IJCCE.2013.V2.159.

    Article  Google Scholar 

  29. Al-Nofaie S, Gutub A. Utilizing pseudo-spaces to improve Arabic text steganography for multimedia data communications. Multimed Tools Appl. 2020;79:19–67. https://doi.org/10.1007/s11042-019-08025-x.

    Article  Google Scholar 

  30. Al-Nofaie S, Gutub A, Al-Ghamdi M. Enhancing Arabic text steganography for personal usage utilizing pseudo-spaces. J King Saud Univ Comput Inf Sci. 2019. https://doi.org/10.1016/j.jksuci.2019.06.010.

    Article  Google Scholar 

  31. Gutub A, Fattani M. A novel Arabic text steganography method using letter points and extensions. Int J Comput Electr Autom Control Inf Eng. 2007;1(3):502–5. https://doi.org/10.5281/zenodo.1061621.

    Article  Google Scholar 

  32. AlKhodaidi T, Gutub A. Refining image steganography distribution for higher security multimedia counting-based secret-sharing. Multimed Tools Appl. 2020. https://doi.org/10.1007/s11042-020-09720-w.

    Article  Google Scholar 

  33. Gutub A, Al-Juaid N, Khan E. Counting-based secret sharing technique for multimedia applications. Multimed Tools Appl. 2019;78:5591–619. https://doi.org/10.1007/s11042-017-5293-6.

    Article  Google Scholar 

  34. Hassan F, Gutub A. Efficient reversible data hiding multimedia technique based on smart image interpolation. Multimed Tools Appl. 2020;79(39):30087–109. https://doi.org/10.1007/s11042-020-09513-1.

    Article  Google Scholar 

Download references

Acknowledgements

The authors like to thank Umm Al-Qura University for all their motivation and support towards this research.

Funding

There is no funding source.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Adnan Gutub.

Ethics declarations

Conflict of Interest

The authors declare that they have no conflict of interest.

Agreement

We declare that this work is original and not was considered to be published in any other publication media.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Informed consent

Informed consent was obtained from all individual participants included in the study.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Alkhudaydi, M., Gutub, A. Securing Data via Cryptography and Arabic Text Steganography. SN COMPUT. SCI. 2, 46 (2021). https://doi.org/10.1007/s42979-020-00438-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s42979-020-00438-y

Keywords

Navigation