Involving Spaces of Unicode Standard Within Irreversible Arabic Text Steganography for Practical Implementations

Author(s):  
Norah Alanazi ◽  
Esam Khan ◽  
Adnan Gutub
2021 ◽  
Vol 2 (1) ◽  
Author(s):  
Malak Alkhudaydi ◽  
Adnan Gutub

2021 ◽  
Vol 11 (15) ◽  
pp. 6851
Author(s):  
Reema Thabit ◽  
Nur Izura Udzir ◽  
Sharifah Md Yasin ◽  
Aziah Asmawi ◽  
Nuur Alifah Roslan ◽  
...  

Protecting sensitive information transmitted via public channels is a significant issue faced by governments, militaries, organizations, and individuals. Steganography protects the secret information by concealing it in a transferred object such as video, audio, image, text, network, or DNA. As text uses low bandwidth, it is commonly used by Internet users in their daily activities, resulting a vast amount of text messages sent daily as social media posts and documents. Accordingly, text is the ideal object to be used in steganography, since hiding a secret message in a text makes it difficult for the attacker to detect the hidden message among the massive text content on the Internet. Language’s characteristics are utilized in text steganography. Despite the richness of the Arabic language in linguistic characteristics, only a few studies have been conducted in Arabic text steganography. To draw further attention to Arabic text steganography prospects, this paper reviews the classifications of these methods from its inception. For analysis, this paper presents a comprehensive study based on the key evaluation criteria (i.e., capacity, invisibility, robustness, and security). It opens new areas for further research based on the trends in this field.


Author(s):  
Adeel Mohammed Alshamsi ◽  
Salem Matar Albaloushi ◽  
Mohammed Younes Alkhoori ◽  
Hamed Ahmed Almheiri ◽  
Nedal Ababneh

2021 ◽  
Vol 10 (1) ◽  
pp. 493-500
Author(s):  
Roshidi Din ◽  
Reema Ahmed Thabit ◽  
Nur Izura Udzir ◽  
Sunariya Utama

The enormous development in the utilization of the Internet has driven by a continuous improvement in the region of security. The enhancement of the security embedded techniques is applied to save the intellectual property. There are numerous types of security mechanisms. Steganography is the art and science of concealing secret information inside a cover media such as image, audio, video and text, without drawing any suspicion to the eavesdropper. The text is ideal for steganography due to its ubiquity. There are many steganography embedded techniques used Arabic language to embed the hidden message in the cover text. Kashida, Shifting Point and Sharp-edges are the three Arabic steganography embedded techniques with high capacity. However, these three techniques have lack of performance to embed the hidden message into the cover text. This paper present about traid-bit method by integrating these three Arabic text steganography embedded techniques. It is an effective way to evaluate many embedded techniques at the same time, and introduced one solution for various cases.


2010 ◽  
Vol 10 (5) ◽  
pp. 436-439 ◽  
Author(s):  
A.F. Al-Azawi ◽  
Moayad A. Fadhil

Author(s):  
Muhammad Qasim Memon ◽  
Haiyang Yu ◽  
Khurram Gulzar Rana ◽  
Muhammad Azeem ◽  
Cai Yongquan ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document