Efficient security and capacity techniques for Arabic text steganography via engaging Unicode standard encoding

  • PDF / 3,702,713 Bytes
  • 29 Pages / 439.37 x 666.142 pts Page_size
  • 89 Downloads / 213 Views

DOWNLOAD

REPORT


Efficient security and capacity techniques for Arabic text steganography via engaging Unicode standard encoding Norah Alanazi 1 & Esam Khan 2 & Adnan Gutub 1 Received: 12 January 2020 / Revised: 7 August 2020 / Accepted: 18 August 2020 # Springer Science+Business Media, LLC, part of Springer Nature 2020

Abstract

Steganography is the science of hiding information messages in groups of irrelevant data possibly of another form. Despite of several Arabic text steganography techniques that have been proposed in the literature, there are only limited number of researches that showed high steganography quality in terms of capacity and security. In this paper, we present a novel approach for hiding the secret bits within Arabic text by engaging Unicode standard. Our methods rely on the use of contextual form of Arabic characters to hide certain secret bits showing interesting feedback. Moreover, extra characters such as Zero-width-Joiner or Zero-width-without-joiner, Kashida, and MMSP, are all also used to further enhance the capacity, while preserving acceptable security. Our testing results show that these proposed techniques outperform most reviewed existing methods to be practical, i.e. in order of both efficiency measures of capacity and security. Moreover, our techniques can be widely adopted due to the use of Unicode, in Arabic as well as Urdu Languages, which is opening the research field for the encoding standards to be utilized differently benefitting the ongoing evolving World’s text writing systems. Keywords Arabic steganography . Letters Unicode . Capacity . Information security . Whitespace utilization . Kishida . Zero-width non-joiner . Zero-width joiner

* Adnan Gutub [email protected] Norah Alanazi [email protected] Esam Khan [email protected]

1

Computer Engineering Department, Umm Al-Qura University, Makkah, Saudi Arabia

2

Custodian of the Two Holy Mosques Institute of the Hajj & Omrah Research, Umm Al-Qura University, Makkah, Saudi Arabia

Multimedia Tools and Applications

1 Introduction With the emergence of the Internet, social network and mobile platforms, communication through digital media plays an important role in human life nowadays. Consequently, data breach has become one of the most key concerns. Several techniques have been developed to protect sensitive data including cryptography, water marking, and steganography [1]. Steganography is derived from Greek words stannous which means “covered” and graphy meaning “writing”. It thus can be understood as “covered or hidden writing”. Steganography is a science of hiding information within an unremarkable cover media. Its goal is to prevent individuals from being able to simply recognize the existence of hidden information [2]. Cryptography is another popular technique to protect digital content. Cryptography scrambles a message to conceal its content and thus making it unreadable by third parties. Steganography, on the other hand, hides messages in innocent-looking cover files to prevent the suspicion about the existence of it [3]. T