New Rules Based Approach for Arabic Text Data Hiding
Journal Title: International Journal of Computer Science and Engineering - Year 2017, Vol 6, Issue 3
Abstract
In steganography, there are many hiding techniques to do the job of data hiding. These techniques differ from each other either by the applied hiding approach or by the used cover object. From the cover object side view, and even though text documents are unavoidable form of information communication among humans, researches on text hiding techniques are less in contrast to other cover object’s techniques. This is due to that text documents have relatively less number of features that can be used to hide data in comparison with other cover object types. In this paper, new text hiding approach is proposed, written in algorithms form, and then coded in mat lab (m-files). Text hiding technique used in this work has many advantages over other existing text-in-text hiding techniques. These advantages include the usage of Arabic or Arabic-English mixed cover text with the aids of two of the non-printing Unicode characters. Also applying new hiding rules concerning Arabic writing system. The cover text classified into groups of Arabic letters each with specific features and thus hiding text in between letters from these groups must controlled by these new text hiding rules. Mat lab programs for embedding and extracting the secret text, according to the new approach, are tested and the outputs have been found very satisfying. Both secret and cover text have the same original format and text configuration.
Authors and Affiliations
MOHAMMED JAWAR KHAMI
File Translator for Multi-Dimensional Design Model – A Smart Manufacturing Approach
The Information Technology era has significantly altered the modus operandi for transferring statistics, as well as the manner and nature of "things". Information technology for transfer of statistics has...
Information Propagation Model on Multilayer Scale-Free Networks
People usually use multiple social networks simultaneously, and can share the information they learned from one social network to another. In this paper, we study the information spreading on multilayer networks and prop...
Unexplored Idea to Examine Grain Specimen Quality by Utilizing Image Processing Intelligence
The significance of measurement of grain quality has been felt since way back to a century old. However it is tedious, but very important measurement is to measure the individual kernel’s qualitative analysis. Analyzing...
Deduplication in Cloud Computing Using Hybrid Cloud
Data deduplication is the technique which reduces the data size by removing the duplicate copies of identical data and it is extensively used in cloud storage to save bandwidth and minimize the storage space. To avoid th...
SONIC SENSEINTERFACING HC04 SONIC SENSOR WITH PIC16F452 TO ASSIST VISUALLY DISABLED PERSON NAVIGATE THROUGH AN OBSTACLE COURSE.
This project is designed to guide a visually impaired person to walk and avoid bumping into obstacles. Low-cost ultrasonic rangefinders along with a microcontroller are used to measure the distance to obstacles and if th...