ABSTRACT
Steganography is allowing separate parties to send confidential data between each other as it permits users to hide data in different digital modes and types of image, text, audio/video etc. The most difficult technique of steganography is text as it has fewer amount of redundancy as well as minor variations could be detected easily. While inserting data in a text file, the main concern is its structure as the structure of the text document should remain the same “not transformed” and matching over by means of the text document file is transparent through saving, written and recovery phase. If the structure of the text file gets transformed the whole sense of the text file changes on the other hand in other digital methods, the variations could be completed effortlessly without even creating any noteworthy modification on the concerned output. Our report discusses the Arabic steganography methods, what are the weaknesses in each of them, what techniques are considered the best and the details of each type that makes them better or worse than the other techniques.
- A. Munasinghe, A. Dharmaratne and K. De Zoysa, "Video steganography," 2013 International Conference on Advances in ICT for Emerging Regions (ICTer), Colombo, 2013, pp. 56-59, doi: 10.1109/ICTer.2013.6761155.Google Scholar
- A. T. Bhole and R. Patel, "Steganography over video file using Random Byte Hiding and LSB technique," 2012 IEEE International Conference on Computational Intelligence and Computing Research, Coimbatore, 2012, pp. 1-6, doi: 10.1109/ICCIC.2012.6510230.Google Scholar
- Altaay, S. Sahib and M. Zamani, “An Introduction to Image Steganography Techniques," in 2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT), Kuala Lumpur, 2012 pp. 122-126. Google ScholarDigital Library
- C. Biswas, U. D. Gupta and M. M. Haque, "An Efficient Algorithm for Confidentiality, Integrity and Authentication Using Hybrid Cryptography and Steganography," 2019Google Scholar
- F. Djebbar, B. Ayad, H. Hamam and K. Abed-Meraim, "A view on latest audio steganography techniques," 2011 Internationa Conference on Innovations in Information Technology, Abu Dhabi, 2011, pp.409-414, doi: 10.1109/INNOVATIONS.2011.5893859.Google Scholar
- M. H. Shirali-Shahreza and M. Shirali-Shahreza, "A New Approach to Persian/Arabic Text Steganography," 5th IEEE/ACIS International Conference on Computer and Information Science and 1st IEEE/ACIS International Workshop on Component-Based Software Engineering,Software Architecture and Reuse (ICIS-COMSAR'06), Honolulu, HI, 2006, pp. 310-315, doi: 10.1109/ICIS-COMSAR.2006.10. Google ScholarDigital Library
- M. S. Abbas, S. S. Mahdi and S. A. Hussien, "Security Improvement of Cloud Data Using Hybrid Cryptography and Steganography," 2020 International Conference on Computer Science and Software Engineering (CSASE), Duhok, Iraq, 2020, pp. 123-127, doi: 10.1109/CSASE48920.2020.9142072.Google Scholar
- P. P. Balgurgi and S. K. Jagtap, "Intelligent processing: An approach of audio steganography," 2012 International Conference on Communication, Information & Computing Technology (ICCICT), Mumbai, 2012, pp. 1-6, doi: 10.1109/ICCICT.2012.6398182.Google Scholar
- Patiburn, Sivabalan & Iranmanesh, Vahab & Teh, Phoey. (2017). Text Steganography using Daily Emotions Monitoring. International Journal of Education and Management Engineering. 7. 1-14. 10.5815/ijeme.2017.03.01.Google ScholarCross Ref
- R. Tanwar and M. Bisla, "Audio steganography," 2014 International Conference on Reliability Optimization and Information Technology (ICROIT), Faridabad, 2014, pp. 322-325, doi: 10.1109/ICROIT.2014.6798347.Google Scholar
- S. Sharma, A. Gupta, M. C. Trivedi and V. K. Yadav, "Analysis of Different Text Steganography Techniques: A Survey," 2016 Second International Conference on Computational Intelligence & Communication Technology (CICT), Ghaziabad, 2016, pp. 130-133, doi: 10.1109/CICT.2016.34.Google Scholar
Index Terms
- A Review of Arabic Text Steganography
Recommendations
Implementation of Least Significant Bit Steganography and statistical steganalysis
CCSEIT '12: Proceedings of the Second International Conference on Computational Science, Engineering and Information TechnologyLeast Significant Bit (LSB) Steganography is a method for hidden information in such a way that can only be detected by its intended recipient. Steganography in Digital media becomes a challenging discipline, since the Human Auditory System (HAS) is ...
A JPEG-based statistically invisible steganography
ICIMCS '11: Proceedings of the Third International Conference on Internet Multimedia Computing and ServiceThe objective of steganography is to implement covert communication by hiding data in digital files such that there is no indication of the existence of hidden data; so an ideal steganographic system should be able to withstand all steganalysis methods--...
Revisiting weighted Stego-image Steganalysis for PVD steganography
Weighted stego-image (WS) method is famous for estimating embedding rate of steganography using least significant bit (LSB) scheme. This paper investigates its feasibility of analyzing pixel-value differencing (PVD) steganography, an algorithm without ...
Comments