Abstract
This research proposes an efficient security system for hiding classified Arabic text-data on limited processors devices benefiting from the combination of both techniques: light-weight cryptography (LWC) and Arabic text steganography. The work assumes to secure the sensitive text-data on devices suffering low resource allocation by layer of LWC encryption to provide acceptable security. In this work, we use a two-layer technique, where we firstly encrypt the Arabic secret text-data examining effectiveness of different LWC algorithms, i.e. AES, DES, and IDEA; then, embedding the encrypted data into diacritics within Arabic text cover media. The work tested the possibility of accepting LWC security of AES, IDEA, and DES encryption assuming their suitable effect on the text stego-cover. The work runs numerous different experimentations to study the preference, where LWC selection of DES algorithm finds the applicable scheme giving acceptable security in efficient manner.
Similar content being viewed by others
References
Kheshaifaty N, Gutub A. Preventing multiple accessing attacks via efficient integration of captcha crypto hash functions. Int J Comput Sci Netw Secur. 2020;20(9):16–28. https://doi.org/10.22937/IJCSNS.2020.20.09.3.
Almutairi S, Gutub A, Al-Ghamdi M. Image steganography to facilitate online students account system. Rev Bus Technol Res. 2019;16(2):43–9.
Bin-Hureib E, Gutub A. Enhancing medical data security via combining elliptic curve cryptography and image steganography. Int J Comput Sci Netw Secur. 2020;20(8):1–8. https://doi.org/10.22937/IJCSNS.2020.20.08.1.
Gutub A. utilizing information security techniques as digital evidence for cybercrime activities. In: Cybercrimes and Digital Forensics Forum, Naif Arab University for Security Sciences (NAUSS), 2019. http://doi.org/10.13140/RG.2.2.14885.45281
Almutairi S, Gutub A, Al-Juaid N. Motivating teachers to use information technology in educational process within Saudi Arabia. Int J Technol Enhanced Learn. 2020;12(2):200–17. https://doi.org/10.1504/IJTEL.2020.10027118.
Dinu D, Corre Y, Khovratovich D, Perrin L, Großschädl J, Biryukov A. Triathlon of lightweight block ciphers for the internet of things. J Cryptogr Eng. 2019;9:283–302.
Alassaf N, Gutub A. Simulating light-weight-cryptography implementation for IoT healthcare data security applications. Int J E-Health Med Commun. 2019;10(4):1–15. https://doi.org/10.4018/IJEHMC.2019100101.
Alanazi N, Khan E, Gutub A. Functionality-improved Arabic text steganography based on unicode features. Arab J Sci Eng. 2020. https://doi.org/10.1007/s13369-020-04917-5.
Bailey K, Curran K. An evaluation of image based steganography methods. Multimed Tools Appl. 2006;30:55–88. https://doi.org/10.1007/s11042-006-0008-4.
Gutub A, Ghouti L, Elarian Y, Awaideh S, Alvi A. Utilizing diacritic marks for Arabic text steganography. Kuwait J Sci Eng. 2010;37(1):89–109.
Gutub A, Al-Nazer A. High capacity steganography tool for Arabic text using “Kashida.” ISC Int J Inf Secur. 2010;2(2):107–18. https://doi.org/10.22042/ISECURE.2015.2.2.4.
Odeh A, Alzubi A, Hani Q, Elleithy K. Steganography by multipoint Arabic letters. In: IEEE Long Island Systems, Applications and Technology Conference (LISAT), 2012, pp. 1–7.
Al-Otaibi N, Gutub A. 2-leyer security system for hiding sensitive text data on personal computers. Lect Notes Inf Theory. 2014;2(2):151–7. https://doi.org/10.12720/lnit.2.2.151-157.
Samkari H, Gutub A. Protecting medical records against cybercrimes within Hajj period by 3-layer security. Recent Trends Inf Technol Appl. 2019;2(3):1–21.
Alassaf N, Gutub A, Parah S, AlGhamdi M. Enhancing speed of SIMON: a light-weight-cryptographic algorithm for IoT applications. Multimed Tools Appl. 2019;78:32633–57. https://doi.org/10.1007/s11042-018-6801-z.
Alanazi N, Khan E, Gutub A. Efficient security and capacity techniques for Arabic text steganography via engaging unicode standard encoding. Multimed Tools Appl. 2020. https://doi.org/10.1007/s11042-020-09667-y.
Al-Otaibi N, Gutub A. Flexible stego-system for hiding text in images of personal computers based on user security priority. In: International conference on advanced engineering technologies (AET), 2014; pp. 250–256.
Al-Nofaie S, Fattani M, Gutub A. Capacity improved Arabic text steganography technique utilizing ‘Kashida’ with whitespaces. In: International conference on mathematical sciences and computer engineering (ICMSCE2016), 2016; pp. 38–44.
Kadhem SM, Ali DW. Proposed hybrid method to hide information in Arabic text. J Theor Appl Inf Technol. 2017;95(7):1466–1478.
Malik A, Sikka G, Verma HK. A high capacity text steganography scheme based on LZW compression and color coding. Eng Sci Technol. 2017;20:72–9.
Mohamed A. An improved algorithm for information hiding based on features of Arabic text: a unicode approach. Egypt Inform J. 2014;15:79–87.
Bensaad ML, Yagoubi MB. High capacity diacritics-based method for information hiding in Arabic text. In: International conference on innovations in information technology. 2011; pp. 433–436.
Al-Haidari F, Gutub A, Al-Kahsah K, Hamodi J. Improving security and capacity for arabic text steganography using ‘Kashida’ extensions. In: IEEE/ACS international conference on computer systems and applications. 2009; pp. 396–399.
Al-Azawi AF, Fadhil MA. Arabic text steganography using Kashida extensions with Huffman code. J Appl Sci. 2010;10:436–9.
Shirali-Shahreza M, Shirali-Shahreza S. High capacity Persian/Arabic text steganography. Appl Sci. 2008;8:4173–9.
Por LY, Wong K, Chee KO. UniSpaCh: a text-based data hiding method using unicode space characters. J Syst Softw. 2012;85:1075–82.
Desoky A. Listega: list-based steganography methodology. Int J Inf Secur. 2009;8:247–61.
Alabish A, Goweder A, Enakoa A. A universal lexical steganography technique. Int J Comput Commun Eng. 2013;2:153–157. https://doi.org/10.7763/IJCCE.2013.V2.159.
Al-Nofaie S, Gutub A. Utilizing pseudo-spaces to improve Arabic text steganography for multimedia data communications. Multimed Tools Appl. 2020;79:19–67. https://doi.org/10.1007/s11042-019-08025-x.
Al-Nofaie S, Gutub A, Al-Ghamdi M. Enhancing Arabic text steganography for personal usage utilizing pseudo-spaces. J King Saud Univ Comput Inf Sci. 2019. https://doi.org/10.1016/j.jksuci.2019.06.010.
Gutub A, Fattani M. A novel Arabic text steganography method using letter points and extensions. Int J Comput Electr Autom Control Inf Eng. 2007;1(3):502–5. https://doi.org/10.5281/zenodo.1061621.
AlKhodaidi T, Gutub A. Refining image steganography distribution for higher security multimedia counting-based secret-sharing. Multimed Tools Appl. 2020. https://doi.org/10.1007/s11042-020-09720-w.
Gutub A, Al-Juaid N, Khan E. Counting-based secret sharing technique for multimedia applications. Multimed Tools Appl. 2019;78:5591–619. https://doi.org/10.1007/s11042-017-5293-6.
Hassan F, Gutub A. Efficient reversible data hiding multimedia technique based on smart image interpolation. Multimed Tools Appl. 2020;79(39):30087–109. https://doi.org/10.1007/s11042-020-09513-1.
Acknowledgements
The authors like to thank Umm Al-Qura University for all their motivation and support towards this research.
Funding
There is no funding source.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of Interest
The authors declare that they have no conflict of interest.
Agreement
We declare that this work is original and not was considered to be published in any other publication media.
Ethical approval
This article does not contain any studies with human participants or animals performed by any of the authors.
Informed consent
Informed consent was obtained from all individual participants included in the study.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Alkhudaydi, M., Gutub, A. Securing Data via Cryptography and Arabic Text Steganography. SN COMPUT. SCI. 2, 46 (2021). https://doi.org/10.1007/s42979-020-00438-y
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s42979-020-00438-y