ABSTRACT
Nowadays, there is a high motivation to develop techniques of sending secret information as a result of the need to transfer some data in a secret way. Steganography is one of the important techniques in this field. In particular, statistical text steganography is classified as an immune technique against the majority of steganalysis techniques compared to other steganography techniques. On the other hand, although Arabic is the official language of many countries, many steganography techniques remain unexplored for it. In this work, we implemented a Markov Chain (MC) encoder/decoder combined with Huffman Coding (HC) for Arabic text steganography. Additionally, we computed an upper bound and a lower bound for the stego-text length that depends on the designed encoder/decoder parameters. The proposed Arabic steganography technique capacity performance was investigated for different encoder parameters and secret message length. We found that applying some constraints on the MC increases the embedding capacity till it reaches an upper limit floor.
- B. Madhuravani et al., "Strong authentication using dynamic hashing and steganography," in International Conference on Computing, Communication & Automation (ICCCA), Noida, 2015.Google Scholar
- N. Johnson, et al., "Ch. 1," in Introduction"in Information Hiding: Steganography and Watermarking Attacks and Countermeasures, 3rd ed., New York, Springer, 2003, pp. 1--8.Google Scholar
- R. Mishra and P. Bhanodiya, "A review on steganography and cryptography," in International conference onAdvances in Computer Engineering and Applications (ICACEA), Ghaziabad, 2015.Google Scholar
- Md. P. Uddin, et al., "Developing an efficient solution to information hiding through text steganography along with cryptography," in the 9th International Forum on Strategic Technology (IFOST), Cox's Bazar, 2014.Google ScholarCross Ref
- A. Farghaly and K. Shaalan, "Arabic Natural Language Processing," ACM Transactions on Asian Language Information Processing, vol. 8, no. 4, pp. 1--22, 2009. Google ScholarDigital Library
- F. Alotaiby, et al., "Arabic vs. English: Comparative Statistical Study," Arabian Journal for Science and Engineering, vol. 39, no. 2, pp. 809--820, 2014.Google ScholarCross Ref
- E. Satir and H. Isik, "A Huffman compression based text steganography method," Multimedia Tools and Applications, vol. 70, no. 3, p. 2085--2110, 2014. Google ScholarDigital Library
- P. Johr, et al., "Survey on steganography methods (text, image, audio, video, protocol and network steganography)," in International conference on Computing for Sustainable Global Development (INDIACom), New Delhi, 2016.Google Scholar
- A. A. Gutub and M. M. Fattani, "A novel Arabic text steganography method using letter points and extensions," International Journal of Computer, Electrical, Automation, Control and Information Engineering, vol. 1, no. 3, 2007.Google Scholar
- F. Al-Haidari, et al., "Improving Security and Capacity for Arabic Text Steganography Using 'Kashida' Extensions," in IEEE/ACS International Conference on Computer Systems and Applications (AICCSA), Rabat, 2009.Google Scholar
- A. Odeh, et al., "Steganography in Arabic text using Kashida variation algorithm (KVA)," in IEEE Long Island Systems, Applications and Technology Conference (LISAT), New York, 2013.Google Scholar
- A. Odeh, et al., "Steganography by multipoint Arabic letters," in IEEE Long Island Systems, Applications and Technology Conference (LISAT), New York, 2012.Google Scholar
- M. L. Bensaad and M. B. Yagoubi, "High capacity diacritics-based method for information hiding in Arabic text," in International Conference on Innovations in Information Technology (IIT), Abu Dhabi, 2011.Google Scholar
- H. Shirali-Shahreza and M. Shirali-Shahreza, "Aranic/Persian text steganography utilizing similar letters with different codes," The Arabian Jouranl for Science and Engineering, vol. 35, no. 18.Google Scholar
- A. Desoky, "Listega: list-based steganography methodology," International Journal of Information Security, vol. 8, no. 4, p. 247--261, 2009. Google ScholarDigital Library
- P. Wayner, Disappearing Cryptography, 2nd ed., Menlo Park: Morgan Kaufmann, 2002, pp. 81--128.Google ScholarCross Ref
- M. Chapman, "Hiding the hidden: A software system for concealing ciphertext as innocuous text," Wisconsin-Milwaukee Univ., USA, 1998.Google Scholar
- K. Maher, "Texto," {Online}. Available: FTP:ftp://ftp.funet.fi/pub/crypt/steganography/texto.tar.gz.Google Scholar
- W. Dai, "Text steganography system using markov chain source model and DES algorithm," Journal of Software, vol. 5, no. 7, p. 785, 2010.Google ScholarCross Ref
- H. Moraldo, An Approach for Text Steganography Based on Markov Chains, Argentine: 4th Workshop on Information Security (WSegI), 2012, pp. 21--35.Google Scholar
- A. N. Shniperov and K. A. Nikitina, "A text steganography method based on Markov chains," Automatic Control and Computer Sciences, vol. 50, no. 8, p. 802--808, 2016.Google ScholarCross Ref
- B. Hoffmeister and T. Zeugmann, "Text mining using markov chains of variable length," International Workshop of Federation over the Web, vol. 3847, pp. 1--24, 1-6 May 2006. Google ScholarDigital Library
- W. Ching, et al., "Ch. 1, Ch. 5 and Ch. 6," in Markov Chains: Models, Algorithms and Applications, New York, Springer, 2013.Google ScholarCross Ref
- G. Barbieri, "Markov Constraints for Generating Texts with Style," University of Bologna, Bologna, 2013.Google Scholar
- M. Y. Elmahi, et al., "Text steganography using compression and random number generators," International Journal of Computer Applications Technology and Research, vol. 6, no. 6, pp. 259--263, 2017.Google ScholarCross Ref
- "Corpus," Google drive, {Online}. Available: https://drive.google.com/file/d/1T7AiOliG8H7JJo0EpkrDvm7wMVWyou-y/view.Google Scholar
Index Terms
- Capacity Investigation of Markov Chain-Based Statistical Text Steganography: Arabic Language Case
Recommendations
Implementation of Least Significant Bit Steganography and statistical steganalysis
CCSEIT '12: Proceedings of the Second International Conference on Computational Science, Engineering and Information TechnologyLeast Significant Bit (LSB) Steganography is a method for hidden information in such a way that can only be detected by its intended recipient. Steganography in Digital media becomes a challenging discipline, since the Human Auditory System (HAS) is ...
Audio steganography using LSB encoding technique with increased capacity and bit error rate optimization
CCSEIT '12: Proceedings of the Second International Conference on Computational Science, Engineering and Information TechnologyStaganography is the art and science of secret hiding. The secret message or plain text may be hidden in one various ways. The methods of cryptography render the message unintelligible to the outsider by various transformations of the text whereas the ...
Secure steganography based on embedding capacity
Mostly the embedding capacity of steganography methods is assessed in non-zero DCT coefficients. Due to unequal distribution of non-zero DCT coefficients in images with different contents, images with the same number of non-zero DCT coefficients may ...
Comments