An embedding traid-bit method to improve the performance of Arabic text steganography
The enormous development in the utilization of the Internet has driven by continuous improvements in the region of security. The enhanced security techniques are applied to save the intellectual property. There are numerous sorts of security mechanisms. Steganography is the art and science of conce...
Saved in:
Main Author: | |
---|---|
Format: | Thesis |
Language: | eng eng |
Published: |
2016
|
Subjects: | |
Online Access: | https://etd.uum.edu.my/6550/1/s814915_01.pdf https://etd.uum.edu.my/6550/2/s814915_02.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my-uum-etd.6550 |
---|---|
record_format |
uketd_dc |
institution |
Universiti Utara Malaysia |
collection |
UUM ETD |
language |
eng eng |
topic |
T58.5-58.64 Information technology T58.5-58.64 Information technology |
spellingShingle |
T58.5-58.64 Information technology T58.5-58.64 Information technology Thabit, Reema Ahmed Abdalla An embedding traid-bit method to improve the performance of Arabic text steganography |
description |
The enormous development in the utilization of the Internet has driven by continuous improvements in the region of security. The enhanced security techniques are applied to save the intellectual property. There are numerous sorts of security
mechanisms. Steganography is the art and science of concealing secret information inside a cover media without drawing any suspicion to the eavesdropper so that the secret information can only be detected by its proposed recipient. This is done along
with the other steganography methods such as image, audio, video, various text steganography methods that are being presented. The text is ideal for steganography due to its ubiquity. There are many steganography methods used several languages
such as English, Chines and Arabic language to embed the hidden message in the cover text. Kashida, shifting point and sharp_edges are Arabic steganography methods with high capacity. However, kashida, shifting point and sharp_edges techniques have lack of capability to embed the hidden message into the cover text. This study proposed new method called Traid-bit method by integrating three
several types of methods such us kashida, shifting point and sharp_edges to evaluate the proposed method in improving the performance of embedding process. The study presents the process design of proposed method including the algorithms and the
system design. The study found that the evaluation of the proposed method provides good knowledge to steganographer to improve the performance of embedding process when the Arabic text steganography method is developed. |
format |
Thesis |
qualification_name |
masters |
qualification_level |
Master's degree |
author |
Thabit, Reema Ahmed Abdalla |
author_facet |
Thabit, Reema Ahmed Abdalla |
author_sort |
Thabit, Reema Ahmed Abdalla |
title |
An embedding traid-bit method to improve the performance of Arabic text steganography |
title_short |
An embedding traid-bit method to improve the performance of Arabic text steganography |
title_full |
An embedding traid-bit method to improve the performance of Arabic text steganography |
title_fullStr |
An embedding traid-bit method to improve the performance of Arabic text steganography |
title_full_unstemmed |
An embedding traid-bit method to improve the performance of Arabic text steganography |
title_sort |
embedding traid-bit method to improve the performance of arabic text steganography |
granting_institution |
Universiti Utara Malaysia |
granting_department |
Awang Had Salleh Graduate School of Arts & Sciences |
publishDate |
2016 |
url |
https://etd.uum.edu.my/6550/1/s814915_01.pdf https://etd.uum.edu.my/6550/2/s814915_02.pdf |
_version_ |
1776103688438284288 |
spelling |
my-uum-etd.65502023-03-09T03:39:10Z An embedding traid-bit method to improve the performance of Arabic text steganography 2016 Thabit, Reema Ahmed Abdalla Awang Had Salleh Graduate School of Arts & Sciences Awang Had Salleh Graduate School of Arts and Sciences T58.5-58.64 Information technology PL Languages and literatures of Eastern Asia, Africa, Oceania The enormous development in the utilization of the Internet has driven by continuous improvements in the region of security. The enhanced security techniques are applied to save the intellectual property. There are numerous sorts of security mechanisms. Steganography is the art and science of concealing secret information inside a cover media without drawing any suspicion to the eavesdropper so that the secret information can only be detected by its proposed recipient. This is done along with the other steganography methods such as image, audio, video, various text steganography methods that are being presented. The text is ideal for steganography due to its ubiquity. There are many steganography methods used several languages such as English, Chines and Arabic language to embed the hidden message in the cover text. Kashida, shifting point and sharp_edges are Arabic steganography methods with high capacity. However, kashida, shifting point and sharp_edges techniques have lack of capability to embed the hidden message into the cover text. This study proposed new method called Traid-bit method by integrating three several types of methods such us kashida, shifting point and sharp_edges to evaluate the proposed method in improving the performance of embedding process. The study presents the process design of proposed method including the algorithms and the system design. The study found that the evaluation of the proposed method provides good knowledge to steganographer to improve the performance of embedding process when the Arabic text steganography method is developed. 2016 Thesis https://etd.uum.edu.my/6550/ https://etd.uum.edu.my/6550/1/s814915_01.pdf text eng public https://etd.uum.edu.my/6550/2/s814915_02.pdf text eng public masters masters Universiti Utara Malaysia Aabed, M. a., Awaideh, S. M., Elshafei, A. R. M., & Gutub, A. a. (2007). Arabic diacritics based steganography. ICSPC 2007 Proceedings - 2007 IEEE International Conference on Signal Processing and Communications, (September 2015), 756–759. Ahmadoh, E. M. (2015). Utilization of Two Diacritics for Arabic Text Steganography to Enhance Performance, 3(1). Al-Alwani, W., Mahfooz, A. Bin, & Gutub, A. A. A. (2007a). A Novel Arabic Text Steganography Method Using Extensions. Proceeding of World Academy of Science, Engineering and Technology, 1(3), 483–486. Al-Alwani, W., Mahfooz, A. Bin, & Gutub, A. A. A. (2007b). A Novel Arabic Text Steganography Method Using Extensions. Proceeding of World Academy of Science, Engineering and Technology, 1(3), 502–505. Alginahi, Y. M., Kabir, M. N., & Tayan, O. (2012). An Enhanced Kashida-Based Watermarking Approach for Increased Protection in Arabic Text-Documents, 1–10. Al-Haidari, F., Gutub, A., Al-Kahsah, K., & Hamodi, J. (2009). Improving security and capacity for arabic text steganography using “Kashida” extensions. 2009 IEEE/ACS International Conference on Computer Systems and Applications, AICCSA 2009, 396–399. Alla, K., & Prasad, R. S. R. (2009). An evolution of hindi text steganography. ITNG 2009 - 6th International Conference on Information Technology: New Generations, Alnazer, A., & Gutub, A. (2009). Exploit Kashida Adding to Arabic e - Text for High Capacity Steganography Objective y Proposed Approach, (October), 19–21. Al-Nazer, A., & Gutub, A. (2009). Exploit Kashida adding to Arabic E-text for High Capacity Steganography. NSS 2009 - Network and System Security, 447–451. Ammar, O., Khaled, E., & Miad, F. (2014). Steganography in Text by Using MS Word Symbols. Ardakani, S. B., Latif, A. M., & Mirzaie, K. (2015). Presentation a new method for Steganography in Persian text of an electronic document, 36. Atallah, M. J., McDonough, C. J., Raskin, V., & Nirenburg, S. (2000). Natural Language Processing for Information Assurance and Security: An Overview and Implementations. In NSPW ’00: Proceedings of the 2000 workshop on New securityparadigms (pp.51–65). Azawi, A. F. Al, & Fadhil, M. A. (2011).An Arabic Text Steganography Technique Using ZWJ Regular Expression 3(3), 419–424. Bensaad, M. L., & Yagoubi, M. B. (2011). High capacity diacritics-based method for information hiding in Arabic text. 2011 International Conference on Innovations in Information Technology,433–436. Bhattacharyya, S., Banerjee, I., & Sanyal, G. (2011). A Survey of Steganography and Steganalysis Technique in Image, Text, Audio and Video as Cover Carrier. Journal of Global Research in Computer Science, 2(4), 1–16. Chang, C.-Y., & Clark, S. (2010a). Linguistic Steganography Using Automatically Generated Paraphrases. Human Language Technologies: The 2010 Annual Conference of the North American Chapter of the Association for Computational Linguistics, (June), 591–599. Chang, C.-Y., & Clark, S. (2010b). Turn-taking and affirmative cue words in taskoriented dialogue. Dissertation Abstracts International, B: Sciences and Engineering, 70(8), 4943. Changder, S., Debnath, N. C., & Ghosh, D. (2010). A greedy approach to text steganography using properties of sentences. Proceedings - 2011 8th International Conference on Information Technology: New Generations, ITNG 2011, 30–35. Computing, M., Kumar, R., & Singh, a J. (2015). Understanding Steganography over Cryptography and Various Steganography Techniques, 4(3), 253–258. Cvejic, N., & Jic, C. V. E. (2004). Algorithms for Audio Watermarking and. Processing. Din, R., & Samsudin, A. (2011). A Conceptual Framework for Natural Language Steganalysis, 1. Gaur, M., & Sharma, M. (2015). A New PDAC (Parallel Encryption with Digit Arithmetic of Cover Text) Based Text Steganography Approach for Cloud Data Security, 1344–1352. Gutub, A. a, Ghouti, L. M., Elarian, Y. S., Awaideh, S. M., & Alvi, A. K. (2010). Utilizing Diacritics Marks for Arabic Text Steganography. Kuwait Journal of Science & Engineering (KJSE), 37(1), 89–109. Gutub, A. A. A., Al-Haidari, F., Al-Kahsah, K. M., & Hamodi, J. (2010). E-text watermarking: Utilizing “Kashida” extensions in Arabic language electronic writing. Journal of Emerging Technologies in Web Intelligence, 2(1), 48–55. Gutub, A., Ghouti, L., & Amin, A. (2007). Utilizing Extension Character “Kashida”With Pointed Letters For Arabic Text Digital Watermarking. Kamel, I., & Banawan, S. (2012). Hiding information in the placement of maneuverable words. 2012 International Conference on Innovations in Information Technology, IIT 2012, 255–260. Khairullah, M. (2009). A novel text steganography system using font color of the invisible characters in microsoft word documents. 2009 International Conference on Computer and Electrical Engineering, ICCEE 2009, 1, 482–484. Khan, E. A. (2014). Using arabic poetry system for steganography, 6, 55–61. Khan, S., & Abhijitha, B. (2015). Polish Text Steganography Method Using Letter Points and Extension. Khan, S., Sankineni, R., Balagurunathan, P., Suresh, N., & Shree, D. (2015). Czech Text Steganography Method by Selective Hiding Technique, I, 1–4. Liu, G., Ding, X., Su, B., & Meng, K. (2013). A Text Information Hiding Algorithm Based on Alternatives. Journal of Software, 8(8), 2072–2079. http://doi.org/10.4304/jsw.8.8.2072-2079 Malik, S., & Mitra, W. (2015). Hiding Information- A Survey, 3(3), 232–240. Memon, J. A., Khowaja, K., & Kazi, H. (2008). Evaluation of Steganography for Urdu / Arabic Text. Pace Pacing And Clinical Electrophysiology, 232-237. Mersal, S. (2014). Arabic Text Steganography in Smartphone, 03(02), 441–445. Mohamed, a. a. (2014). An improved algorithm for information hiding based on features of Arabic text: A Unicode approach. Egyptian Informatics Journal, 15(2), 79–87. Odeh, A. (2012). Steganography in Arabic Text Using Zero Width and Kashidha Letters. International Journal of Computer Science and Information Technology, 4(3), 1–11. Odeh, A. (2015). ROBUST TEXT STEGANOGRAPHY ALGORITHMS FOR SECURE DATA COMMUNICATIONS. Odeh, A., Alzubi, A., Hani, Q. B., & Elleithy, K. (2012). Steganography by multipoint Arabic letters. 2012 IEEE Long Island Systems, Applications and Technology Conference, LISAT 2012. Odeh, A., Elleithy, K., & Faezipour, M. (2013). Steganography in Arabic text using Kashida variation algorithm (KVA). 9th Annual Conference on Long Island Systems, Applications and Technology, LISAT 2013. http://doi.org/10.1109/LISAT.2013.6578239 Por, L. Y., Ang, T. F., & Delina, B. (2008). WhiteSteg: A new scheme in information hiding using text steganography. WSEAS Transactions on Computers, 7(6), 735–745. Por, L. Y., & Delina, B. (2008). Information Hiding: A New Approach in Text Steganography, (September). Prasad, R. S. R., & Alla, K. (2011). A new approach to Telugu text steganography. ISWTA 2011 - 2011 IEEE Symposium on Wireless Technology and Applications, 60–65. Rafat, K. F. (2009). Enhanced text steganography in SMS. 2009 2nd International Conference on Computer, Control and Communication, IC4 2009. Roslan, N. A., Mahmod, R., & Udzir, N. U. R. I. (2011). Sharp_Edges Method in Arabic Text Steganography, 33(1). Roslan, N. A., Mahmod, R., Udzir, N. U. R. I., & Zurkarnain, Z. A. (2014).Primitive Structural Method for High Capacity , 67(2), 373–383. Roy, S., & Manasmita, M. (2011). A novel approach to format based text steganography. Proceedings of the 2011 International Conference on Communication, Computing & Security - ICCCS ’11, 511. Sabir, A. S. (2013). A New Arabic Text (Diacritics, non Diacritics) Steganography, 31(3), 85–96. Samphaiboon, N., & Dailey, M. N. (2008). Steganography in thai text. 5th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology, ECTI-CON 2008, 1, 133–136. Shirali-Shahreza, M. (2008). Text steganography by changing words spelling. International Conference on Advanced Communication Technology, ICACT, 3(MARCH 2008), 1912–1913. Shirali-shahreza, M. H. (2007). Text Steganography in chat. Internet, 2007. ICI 2007. …. Retrieved from http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4401716 Shirali-shahreza, M. H., & Shirali-Shahreza, M. (2006). A new approach to Persian/Arabic text steganography. Proceedings - 5th IEEE/ACIS Int. Conf. on Comput. and Info. Sci., ICIS 2006. In Conjunction with 1st IEEE/ACIS, Int. Workshop Component-Based Software Eng., Softw. Archi. and Reuse, COMSAR 2006, 2006, 310–315. Shirali-Shahreza, M. H., & Shirali-Shahreza, M. (2010). Arabian/Persian text steganography utilizing similar letters with different codes. The Arabian Journal for Science and Engineering, 35(1), 213–222. Shirali-Shahreza, M., & Shirali-Shahreza, M. H. (2008a). An improved version of persian/arabic text steganography using “La” word. Proceedings of IEEE 2008 6th National Conference on Telecommunication Technologies and IEEE 2008 2nd Malaysia Conference on Photonics, NCTT-MCP 2008, (August), 372–376. Shirali-Shahreza, M., & Shirali-Shahreza, S. (2008b). Persian/arabic unicode text steganography. Proceedings - The 4th International Symposium on Information Assurance and Security, IAS 2008, 62–66. http://doi.org/10.1109/IAS.2008.12 Singh, P., Chaudhary, R., & Agarwal, A. (2012). A Novel Approach of Text Steganography based on null spaces. Iosrjournals.Org, 3(4), 11–17. Wilson, a, Blunsom, P., & Ker, a D. (2014). Linguistic steganography on Twitter: Hierarchical language modeling with manual interaction. Media Watermarking, Security, and Forensics 2014, 9028. Yuling, L., Xingming, S., Can, G., & Hong, W. (2007). RFalse, 2094–2097. |