A Novel Approach for Arabic Text Steganography Based on the “BloodGroup” Text Hiding Method
Abstract
Steganography is the science of hiding certain messages (data) in groups of irrelevant data possibly of other form. The purpose of steganography is covert communication to hide the existence of a message from an intermediary. Text Steganography is the process of embedding secret message (text) in another text (cover text) so that the existence of secret message cannot be detected by a third party. This paper presents a novel approach for text steganography using the Blood Group (BG) method based on the behavior of blood group. Experimentally it is found that the proposed method got good results in capacity, hiding capacity, time complexity, robustness, visibility, and similarity which shows its superiority as compared to most several existing methods.
Keywords:
Information Security, Steganography, Hiding Message, Text Steganography, Arabic StegoDownloads
References
M. Shirali-Shahreza, M. H. Shirali-Shahreza,An Improved Version of Persian/Arabic Text Steganography Using "La" Word, 2nd Malaysia Conference on Photonics. NCTT-MCP 2008 and 6th National Conference on Telecommunication Technologies 2008 and 2008, August 26-28, 2008 DOI: https://doi.org/10.1109/NCTT.2008.4814305
C. Cachin, “An Information-Theoretic Model for Steganography”, 2nd Information Hiding Workshop, Vol. 1525, pp. 306-318, 1998 DOI: https://doi.org/10.1007/3-540-49380-8_21
R. J. Anderson, F. A. P. Petitcolas, “On the Limits of Steganography”, IEEE Journal on Selected Areas in Communications, Vol. 16, pp. 474-481, 1998 DOI: https://doi.org/10.1109/49.668971
H. Shirali-Shahreza, M. Shirali-Shahreza, “A New Approach to Persian/Arabic Text Steganography”, 5th IEEE/ACIS International Conference on Computer and Information Science (ICIS-COMSAR 06), pp. 310- 315, 2006
A. Mohammed, A. Sameh, E. Abdul Rahman, G. Adnan, “Arabic Diacritics Based Steganography”, IEEE International Conference on Signal Processing and Communications (ICSPC’07), pp. 756–759, Dubai, UAE, 2007
A. M. Jibran, K. Kamran, K. Hameedullah, “Evaluation of Steganography for Urdu/Arabic Text”, Journal of Theoretical and Applied Information Technology, Vol. 4, No. 3, pp. 232–237, 2008
G. Adnan, A. N. Ahmed, “High Capacity Steganography Tool for Arabic Text Using ‘Kashida”, The ISC International Journal of Information Security, Vol. 2, No. 2, pp. 107–118, 2010
A. A. Maisa, A framework to design and implementation of linguistic Steganography system, PHD thesis, Department of Computer Science, University of Technology, 2016
S. Malalla, F. R. Shareef, “Improving Hiding Security of Arabic Text Steganography by Hybrid AES Cryptography and Text Steganography”, Journal of Engineering Research and Application, Vol. 6, No. 6, pp. 60-69, 2016
Downloads
How to Cite
License
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.