Advertisement

Text Steganography with High Embedding Capacity Using Arabic Calligraphy

  • Ali A. HamzahEmail author
  • Hanaa Bayomi
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1073)

Abstract

Text is a challenging media for steganography due to the limited amount of redundancy bits in text and the ease of detecting minor changes in it. In linguistic steganography, the features of a language are used to hide data. The more features we have in a language, the more capacity of hiding data we can get. The Arabic language is rich in its features, many of which are still not used in text steganography. For example, Arabic calligraphy includes a variety of fonts and shapes for the Arabic alphabet. In this paper, by modifying a string matching algorithm and using suffix tree, the generation of Arabic stego text according to a secret message is implemented. The generation process is performed using a linguistic framework that utilizes Arabic calligraphy (AC-STEGA). In the presented work, multiple shapes of letters in Arabic font (Naskh) are used to increase the capacity of hiding data. This work comes as an extension of previous work to apply one shape of letters in (AC-STEGA). The evaluation showed an improvement in capacity of 65.4% compared to 25.4% presented in previous work. To satisfy security requirement, we did not use cover, the cover represents the secret message itself.

Keywords

Steganography Information hidden Linguistic steganography Arabic text Steganography Arabic Calligraphy 

References

  1. 1.
    Yang, Y.: Information analysis for steganography and steganalysis in 3D polygonal meshes. Durham University (2013)Google Scholar
  2. 2.
    Hassanein, M.S.: Secure digital documents using Steganography and QR Code. Brunel University (2014)Google Scholar
  3. 3.
    Por, L.Y., Delina, B.: Information hiding: a new approach in text steganography. In: WSEAS International Conference, Proceedings. Mathematics and Computers in Science and Engineering. World Scientific and Engineering Academy and Society (2008)Google Scholar
  4. 4.
    Hakak, S., Kamsin, A., Tayan, O., Idris, M.Y.I., Gilkar, G.A.: Approaches for preserving content integrity of sensitive online Arabic content: a survey and research challenges. Inf. Process. Manag. 1–14 (2017)Google Scholar
  5. 5.
    Gono, R.: Steganography in computer graphics. In: Faculty of Informatics. Masaryk University (2017)Google Scholar
  6. 6.
    Tatwadarshi, P., Nagarhalli, J.W.B., Jain, N.: A survey of Hindi text steganography. Int. J. Sci. Eng. Res. 7(3), 55–61 (2016)Google Scholar
  7. 7.
    Chang, C.-Y., Clark, S.: Linguistic steganography using automatically generated paraphrases. In: Human Language Technologies: The 2010 Annual Conference of the North American Chapter of the Association for Computational Linguistics. Association for Computational Linguistics (2010)Google Scholar
  8. 8.
    Sharma, S., et al.: Analysis of different text steganography techniques: a survey. In: 2016 Second International Conference on Computational Intelligence & Communication Technology (CICT). IEEE (2016)Google Scholar
  9. 9.
    Bhattacharyya, S., Banerjee, I., Sanyal, G.: A survey of steganography and steganalysis technique in image, text, audio and video as cover carrier. J. Glob. Res. Comput. Sci. 2(4), 1–16 (2011)Google Scholar
  10. 10.
    Ramakrishnan, B.K., Thandra, P.K., Srinivasula, A.S.M.: Text steganography: a novel character-level embedding algorithm using font attribute. Secur. Commun. Netw. 9(18), 6066–6079 (2016)CrossRefGoogle Scholar
  11. 11.
    Roslan, N.A., Mahmod, R., Udzir, N.I.: Sharp-edges method in Arabic text steganography. J. Theor. Appl. Inf. Technol. 33 (2011)Google Scholar
  12. 12.
    Shirali-Shahreza, M.H.: A new approach to Persian/Arabic text steganography. In: 5th IEEE/ACIS International Conference. IEEE (2006)Google Scholar
  13. 13.
    Shirali-Shahreza, M.: A new persian/arabic text steganography using “La” word. In: Sobh, T. (ed.) Advances in Computer and Information Sciences and Engineering, pp. 339–342. Springer, Dordrecht (2008)Google Scholar
  14. 14.
    Gutub, A., Fattani, M.: A novel Arabic text steganography method using letter points and extensions. In: WASET International Conference on Computer, Information and Systems Science and Engineering (ICCISSE) (2007)Google Scholar
  15. 15.
    Gutub, A., Al-Nazer, A.A.: High capacity steganography tool for Arabic text using ‘Kashida’. ISC Int. J. Inf. Secur. 2(2), 107–118 (2010)Google Scholar
  16. 16.
    Alotaibi, N., Gutub, A., Khan, E.: Stego-system for hiding text in images of personal computers. In: The 12th Learning and Technology Conference: Wearable Tech/Wearable Learning (2015)Google Scholar
  17. 17.
    Aabed, M.A., et al.: Arabic diacritics based steganography. In: IEEE International Conference on Signal Processing and Communications, ICSPC 2007. IEEE (2007)Google Scholar
  18. 18.
    Gutub, A.A., Elarian, Y.S., Awaideh, S., Alvi, A.: Arabic text steganography using multiple diacritics. In: Proceedings of the 5th IEEE International Workshop on Signal Processing and its Applications (WoSPA 2008), Sharjah, UAE (2008)Google Scholar
  19. 19.
    Ahmadoh, E., Gutub, A.: Utilization of two diacritics for Arabic text steganography to enhance performance. Lect. Notes Inf. Theory 3(1), 42–47 (2015)Google Scholar
  20. 20.
    Uday Nazim Farman, K.A.D.: Aesthetic theory of Arabic calligraphy in the Islamic Art. J. Nabo 11–12, 143–173 (2015)Google Scholar
  21. 21.
    Hamzah, A.A., Khattab, S., Bayomi, H.: A linguistic steganography framework using Arabic calligraphy. J. King Saud Univ.-Comput. Inf. Sci. (2019)Google Scholar
  22. 22.
    Gutub, A., et al.: Utilizing extension character ‘Kashida’ with pointed letters for Arabic text digital watermarking. In: International Conference on Security and Cryptography (2007)Google Scholar
  23. 23.
    Al-Nofaie, S., Fattani, M., Gutub, A.: Capacity improved Arabic text steganography technique utilizing ‘Kashida’ with whitespaces. In: The 3rd International Conference on Mathematical Sciences and Computer Engineering (ICMSCE2016) (2016)Google Scholar
  24. 24.
    Taha, A., Hammad, A.S., Selim, M.M.: A high capacity algorithm for information hiding in Arabic text. J. King Saud Univ.-Comput. Inf. Sci. (2018)Google Scholar
  25. 25.
    Odeh, A., Elleithy, K., Faezipour, M.: Steganography in Arabic text using Kashida variation algorithm (KVA). In: Proceedings of the 2013 IEEE Long Island Systems, Applications and Technology Conference (LISAT), May 2013Google Scholar
  26. 26.
    Alaseri, K., Adnan, A.: Merging secret sharing within Arabic text steganography for practical retrieval. IJRDO J. Comput. Sci. Eng. 4, 1–17 (2018)Google Scholar
  27. 27.
    Odeh, A., et al.: Steganography by multipoint Arabic letters. In: Systems, Applications and Technology Conference (LISAT). IEEE, Long Island (2012)Google Scholar
  28. 28.
    Yang, Z., et al.: Automatically generate steganographic text based on Markov Model and Huffman Coding. arXiv preprint arXiv:1811.04720 (2018)
  29. 29.
    Wilson, A., Ker, A.D.: Avoiding detection on twitter: embedding strategies for linguistic steganography. Electron. Imaging 8, 1–9 (2016)CrossRefGoogle Scholar
  30. 30.
    Zhou, Z., et al.: Coverless information hiding method based on multi-keywords. In: International Conference on Cloud Computing and Security. Springer (2016)Google Scholar
  31. 31.
    Topkara, M., Topkara, U., Atallah, M.J.: Information hiding through errors: a confusing approach. In: Security, Steganography, and Watermarking of Multimedia Contents IX 2007. International Society for Optics and Photonics (2007)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Faculty of Computers and Artificial IntelligenceCairo UniversityGizaEgypt

Personalised recommendations