skip to main content
10.1145/3456146.3456148acmotherconferencesArticle/Chapter ViewAbstractPublication PagesdsdeConference Proceedingsconference-collections
research-article

A Review of Arabic Text Steganography

Published:08 July 2021Publication History

ABSTRACT

Steganography is allowing separate parties to send confidential data between each other as it permits users to hide data in different digital modes and types of image, text, audio/video etc. The most difficult technique of steganography is text as it has fewer amount of redundancy as well as minor variations could be detected easily. While inserting data in a text file, the main concern is its structure as the structure of the text document should remain the same “not transformed” and matching over by means of the text document file is transparent through saving, written and recovery phase. If the structure of the text file gets transformed the whole sense of the text file changes on the other hand in other digital methods, the variations could be completed effortlessly without even creating any noteworthy modification on the concerned output. Our report discusses the Arabic steganography methods, what are the weaknesses in each of them, what techniques are considered the best and the details of each type that makes them better or worse than the other techniques.

References

  1. A. Munasinghe, A. Dharmaratne and K. De Zoysa, "Video steganography," 2013 International Conference on Advances in ICT for Emerging Regions (ICTer), Colombo, 2013, pp. 56-59, doi: 10.1109/ICTer.2013.6761155.Google ScholarGoogle Scholar
  2. A. T. Bhole and R. Patel, "Steganography over video file using Random Byte Hiding and LSB technique," 2012 IEEE International Conference on Computational Intelligence and Computing Research, Coimbatore, 2012, pp. 1-6, doi: 10.1109/ICCIC.2012.6510230.Google ScholarGoogle Scholar
  3. Altaay, S. Sahib and M. Zamani, “An Introduction to Image Steganography Techniques," in 2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT), Kuala Lumpur, 2012 pp. 122-126. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. C. Biswas, U. D. Gupta and M. M. Haque, "An Efficient Algorithm for Confidentiality, Integrity and Authentication Using Hybrid Cryptography and Steganography," 2019Google ScholarGoogle Scholar
  5. F. Djebbar, B. Ayad, H. Hamam and K. Abed-Meraim, "A view on latest audio steganography techniques," 2011 Internationa Conference on Innovations in Information Technology, Abu Dhabi, 2011, pp.409-414, doi: 10.1109/INNOVATIONS.2011.5893859.Google ScholarGoogle Scholar
  6. M. H. Shirali-Shahreza and M. Shirali-Shahreza, "A New Approach to Persian/Arabic Text Steganography," 5th IEEE/ACIS International Conference on Computer and Information Science and 1st IEEE/ACIS International Workshop on Component-Based Software Engineering,Software Architecture and Reuse (ICIS-COMSAR'06), Honolulu, HI, 2006, pp. 310-315, doi: 10.1109/ICIS-COMSAR.2006.10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. M. S. Abbas, S. S. Mahdi and S. A. Hussien, "Security Improvement of Cloud Data Using Hybrid Cryptography and Steganography," 2020 International Conference on Computer Science and Software Engineering (CSASE), Duhok, Iraq, 2020, pp. 123-127, doi: 10.1109/CSASE48920.2020.9142072.Google ScholarGoogle Scholar
  8. P. P. Balgurgi and S. K. Jagtap, "Intelligent processing: An approach of audio steganography," 2012 International Conference on Communication, Information & Computing Technology (ICCICT), Mumbai, 2012, pp. 1-6, doi: 10.1109/ICCICT.2012.6398182.Google ScholarGoogle Scholar
  9. Patiburn, Sivabalan & Iranmanesh, Vahab & Teh, Phoey. (2017). Text Steganography using Daily Emotions Monitoring. International Journal of Education and Management Engineering. 7. 1-14. 10.5815/ijeme.2017.03.01.Google ScholarGoogle ScholarCross RefCross Ref
  10. R. Tanwar and M. Bisla, "Audio steganography," 2014 International Conference on Reliability Optimization and Information Technology (ICROIT), Faridabad, 2014, pp. 322-325, doi: 10.1109/ICROIT.2014.6798347.Google ScholarGoogle Scholar
  11. S. Sharma, A. Gupta, M. C. Trivedi and V. K. Yadav, "Analysis of Different Text Steganography Techniques: A Survey," 2016 Second International Conference on Computational Intelligence & Communication Technology (CICT), Ghaziabad, 2016, pp. 130-133, doi: 10.1109/CICT.2016.34.Google ScholarGoogle Scholar

Index Terms

  1. A Review of Arabic Text Steganography
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Other conferences
            DSDE '21: 2021 4th International Conference on Data Storage and Data Engineering
            February 2021
            165 pages
            ISBN:9781450389303
            DOI:10.1145/3456146

            Copyright © 2021 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 8 July 2021

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article
            • Research
            • Refereed limited
          • Article Metrics

            • Downloads (Last 12 months)6
            • Downloads (Last 6 weeks)0

            Other Metrics

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          HTML Format

          View this article in HTML Format .

          View HTML Format