skip to main content
10.1145/3314527.3314532acmotherconferencesArticle/Chapter ViewAbstractPublication PagesapitConference Proceedingsconference-collections
research-article

Capacity Investigation of Markov Chain-Based Statistical Text Steganography: Arabic Language Case

Authors Info & Claims
Published:25 January 2019Publication History

ABSTRACT

Nowadays, there is a high motivation to develop techniques of sending secret information as a result of the need to transfer some data in a secret way. Steganography is one of the important techniques in this field. In particular, statistical text steganography is classified as an immune technique against the majority of steganalysis techniques compared to other steganography techniques. On the other hand, although Arabic is the official language of many countries, many steganography techniques remain unexplored for it. In this work, we implemented a Markov Chain (MC) encoder/decoder combined with Huffman Coding (HC) for Arabic text steganography. Additionally, we computed an upper bound and a lower bound for the stego-text length that depends on the designed encoder/decoder parameters. The proposed Arabic steganography technique capacity performance was investigated for different encoder parameters and secret message length. We found that applying some constraints on the MC increases the embedding capacity till it reaches an upper limit floor.

References

  1. B. Madhuravani et al., "Strong authentication using dynamic hashing and steganography," in International Conference on Computing, Communication & Automation (ICCCA), Noida, 2015.Google ScholarGoogle Scholar
  2. N. Johnson, et al., "Ch. 1," in Introduction"in Information Hiding: Steganography and Watermarking Attacks and Countermeasures, 3rd ed., New York, Springer, 2003, pp. 1--8.Google ScholarGoogle Scholar
  3. R. Mishra and P. Bhanodiya, "A review on steganography and cryptography," in International conference onAdvances in Computer Engineering and Applications (ICACEA), Ghaziabad, 2015.Google ScholarGoogle Scholar
  4. Md. P. Uddin, et al., "Developing an efficient solution to information hiding through text steganography along with cryptography," in the 9th International Forum on Strategic Technology (IFOST), Cox's Bazar, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  5. A. Farghaly and K. Shaalan, "Arabic Natural Language Processing," ACM Transactions on Asian Language Information Processing, vol. 8, no. 4, pp. 1--22, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. F. Alotaiby, et al., "Arabic vs. English: Comparative Statistical Study," Arabian Journal for Science and Engineering, vol. 39, no. 2, pp. 809--820, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  7. E. Satir and H. Isik, "A Huffman compression based text steganography method," Multimedia Tools and Applications, vol. 70, no. 3, p. 2085--2110, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. P. Johr, et al., "Survey on steganography methods (text, image, audio, video, protocol and network steganography)," in International conference on Computing for Sustainable Global Development (INDIACom), New Delhi, 2016.Google ScholarGoogle Scholar
  9. A. A. Gutub and M. M. Fattani, "A novel Arabic text steganography method using letter points and extensions," International Journal of Computer, Electrical, Automation, Control and Information Engineering, vol. 1, no. 3, 2007.Google ScholarGoogle Scholar
  10. F. Al-Haidari, et al., "Improving Security and Capacity for Arabic Text Steganography Using 'Kashida' Extensions," in IEEE/ACS International Conference on Computer Systems and Applications (AICCSA), Rabat, 2009.Google ScholarGoogle Scholar
  11. A. Odeh, et al., "Steganography in Arabic text using Kashida variation algorithm (KVA)," in IEEE Long Island Systems, Applications and Technology Conference (LISAT), New York, 2013.Google ScholarGoogle Scholar
  12. A. Odeh, et al., "Steganography by multipoint Arabic letters," in IEEE Long Island Systems, Applications and Technology Conference (LISAT), New York, 2012.Google ScholarGoogle Scholar
  13. M. L. Bensaad and M. B. Yagoubi, "High capacity diacritics-based method for information hiding in Arabic text," in International Conference on Innovations in Information Technology (IIT), Abu Dhabi, 2011.Google ScholarGoogle Scholar
  14. H. Shirali-Shahreza and M. Shirali-Shahreza, "Aranic/Persian text steganography utilizing similar letters with different codes," The Arabian Jouranl for Science and Engineering, vol. 35, no. 18.Google ScholarGoogle Scholar
  15. A. Desoky, "Listega: list-based steganography methodology," International Journal of Information Security, vol. 8, no. 4, p. 247--261, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. P. Wayner, Disappearing Cryptography, 2nd ed., Menlo Park: Morgan Kaufmann, 2002, pp. 81--128.Google ScholarGoogle ScholarCross RefCross Ref
  17. M. Chapman, "Hiding the hidden: A software system for concealing ciphertext as innocuous text," Wisconsin-Milwaukee Univ., USA, 1998.Google ScholarGoogle Scholar
  18. K. Maher, "Texto," {Online}. Available: FTP:ftp://ftp.funet.fi/pub/crypt/steganography/texto.tar.gz.Google ScholarGoogle Scholar
  19. W. Dai, "Text steganography system using markov chain source model and DES algorithm," Journal of Software, vol. 5, no. 7, p. 785, 2010.Google ScholarGoogle ScholarCross RefCross Ref
  20. H. Moraldo, An Approach for Text Steganography Based on Markov Chains, Argentine: 4th Workshop on Information Security (WSegI), 2012, pp. 21--35.Google ScholarGoogle Scholar
  21. A. N. Shniperov and K. A. Nikitina, "A text steganography method based on Markov chains," Automatic Control and Computer Sciences, vol. 50, no. 8, p. 802--808, 2016.Google ScholarGoogle ScholarCross RefCross Ref
  22. B. Hoffmeister and T. Zeugmann, "Text mining using markov chains of variable length," International Workshop of Federation over the Web, vol. 3847, pp. 1--24, 1-6 May 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. W. Ching, et al., "Ch. 1, Ch. 5 and Ch. 6," in Markov Chains: Models, Algorithms and Applications, New York, Springer, 2013.Google ScholarGoogle ScholarCross RefCross Ref
  24. G. Barbieri, "Markov Constraints for Generating Texts with Style," University of Bologna, Bologna, 2013.Google ScholarGoogle Scholar
  25. M. Y. Elmahi, et al., "Text steganography using compression and random number generators," International Journal of Computer Applications Technology and Research, vol. 6, no. 6, pp. 259--263, 2017.Google ScholarGoogle ScholarCross RefCross Ref
  26. "Corpus," Google drive, {Online}. Available: https://drive.google.com/file/d/1T7AiOliG8H7JJo0EpkrDvm7wMVWyou-y/view.Google ScholarGoogle Scholar

Index Terms

  1. Capacity Investigation of Markov Chain-Based Statistical Text Steganography: Arabic Language Case

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      APIT '19: Proceedings of the 2019 Asia Pacific Information Technology Conference
      January 2019
      107 pages
      ISBN:9781450366212
      DOI:10.1145/3314527

      Copyright © 2019 ACM

      Publication rights licensed to ACM. ACM acknowledges that this contribution was authored or co-authored by an employee, contractor or affiliate of a national government. As such, the Government retains a nonexclusive, royalty-free right to publish or reproduce this article, or to allow others to do so, for Government purposes only.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 25 January 2019

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader