New Rules Based Approach for Arabic Text Data Hiding
Journal Title: International Journal of Computer Science and Engineering - Year 2017, Vol 6, Issue 3
Abstract
In steganography, there are many hiding techniques to do the job of data hiding. These techniques differ from each other either by the applied hiding approach or by the used cover object. From the cover object side view, and even though text documents are unavoidable form of information communication among humans, researches on text hiding techniques are less in contrast to other cover object’s techniques. This is due to that text documents have relatively less number of features that can be used to hide data in comparison with other cover object types. In this paper, new text hiding approach is proposed, written in algorithms form, and then coded in mat lab (m-files). Text hiding technique used in this work has many advantages over other existing text-in-text hiding techniques. These advantages include the usage of Arabic or Arabic-English mixed cover text with the aids of two of the non-printing Unicode characters. Also applying new hiding rules concerning Arabic writing system. The cover text classified into groups of Arabic letters each with specific features and thus hiding text in between letters from these groups must controlled by these new text hiding rules. Mat lab programs for embedding and extracting the secret text, according to the new approach, are tested and the outputs have been found very satisfying. Both secret and cover text have the same original format and text configuration.
Authors and Affiliations
MOHAMMED JAWAR KHAMI
Deduplication in Cloud Computing Using Hybrid Cloud
Data deduplication is the technique which reduces the data size by removing the duplicate copies of identical data and it is extensively used in cloud storage to save bandwidth and minimize the storage space. To avoid th...
Side Effects of Computer Anti-Viruses
In this paper, a deep study on computer antiviruses, advantages and disadvantages will be conducted and more focus will be on the side effects of antivirus on overall computer system performance, then end user feedback o...
Focused Web Crawler Development Challenges: Eccrawler
Nowadays, the importance of focused web crawlers is more than any time before. As the web has become massive and spam my, it is now essential to have focused web crawlers that can crawl only the targeted websites and obt...
A Conceptual Analysis on Cloud Computing ACO Load Balancing Techniques
The Drastic Change in Computing has happened due to the Cloud Computing Technology. Cloud Computing was built on Utility Computing, Networks, web Services, Virtualization, Distributed Computing and Load Balancing. The cl...
Using Sentiment Words and Phrases
In this research paper creates algorithms for opinion mining. It discovers positive, negative or neutral opinion on a particular product as well as a comparative sentence of product. To capture the opinion and it classif...