Functionality-Improved Arabic Text Steganography Based on Unicode Features

  • PDF / 2,122,567 Bytes
  • 14 Pages / 595.276 x 790.866 pts Page_size
  • 65 Downloads / 239 Views

DOWNLOAD

REPORT


RESEARCH ARTICLE-COMPUTER ENGINEERING AND COMPUTER SCIENCE

Functionality‑Improved Arabic Text Steganography Based on Unicode Features Norah Alanazi1 · Esam Khan2 · Adnan Gutub1  Received: 20 February 2020 / Accepted: 29 August 2020 © King Fahd University of Petroleum & Minerals 2020

Abstract Steganography is the science of hiding secret messages in irrelevant data that is possibly of another form. Despite several Arabic text steganography techniques having been proposed in the literature, there is only a limited amount of research that shows high-quality steganography in terms of capacity and security. In this paper, we present a novel approach of hiding secret bits in Arabic text by using Unicode. Our method relies on the use of a contextual form of Arabic characters to hide certain secret bits. Extra characters, such as zero-width joiner, Kashida, and zero-width non-joiner, are also involved to further enhance the capacity while preserving security. Our experimental results show that the technique outperforms most reviewed existing methods in both capacity and security performance measures. Moreover, our technique can be widely adopted in any linked to Arabic characters, such as Urdu and Farsi as well as many languages benefiting from Unicode as the encoding standard possibly used for most of the world’s writing systems. Keywords  Arabic steganography · Unicode letters · Capacity · Information security · Kashida · Zero-width non-joiner · Zero-width joiner

1 Introduction With the expansion of the Internet, social networks, Internet of Things (IoT), and mobile platforms, communication through digital media plays an increasingly important role in human life. However, it has also created new opportunities for attackers to gather valuable information from other people with little effort. Therefore, several techniques have been developed to protect sensitive data, including forms of cryptography, watermarking, secret sharing, and steganography [1].

* Adnan Gutub [email protected] Norah Alanazi [email protected] Esam Khan [email protected] 1



Computer Engineering Department, Umm Al-Qura University, Makkah, Saudi Arabia



Custodian of the Two Holy Mosques Institute of the Hajj and Omrah Research, Umm Al-Qura University, Makkah, Saudi Arabia

2

Steganography is a method for concealing information in an unremarkable media cover. Its goal is simply to prevent people from recognizing the presence of hidden information, similar in its application to secret sharing of multimedia [2]. Steganography, as a scientific phrase is derived from the Greek word “steganós,” which means “covered” combined to “graphy,” meaning “writing.” It can thus be understood as “sheltered or hidden writing.” Steganography can take many forms, and secret bits can be concealed in text, images, audio, or video. In general, there are two processes in steganography: first, the hiding process, in which the secret data are hidden in the cover media, and second, the extraction process, in which the secret bits are retrieved from the stego cov