Skip to main content
Log in

Functionality-Improved Arabic Text Steganography Based on Unicode Features

  • Research Article-Computer Engineering and Computer Science
  • Published:
Arabian Journal for Science and Engineering Aims and scope Submit manuscript

Abstract

Steganography is the science of hiding secret messages in irrelevant data that is possibly of another form. Despite several Arabic text steganography techniques having been proposed in the literature, there is only a limited amount of research that shows high-quality steganography in terms of capacity and security. In this paper, we present a novel approach of hiding secret bits in Arabic text by using Unicode. Our method relies on the use of a contextual form of Arabic characters to hide certain secret bits. Extra characters, such as zero-width joiner, Kashida, and zero-width non-joiner, are also involved to further enhance the capacity while preserving security. Our experimental results show that the technique outperforms most reviewed existing methods in both capacity and security performance measures. Moreover, our technique can be widely adopted in any linked to Arabic characters, such as Urdu and Farsi as well as many languages benefiting from Unicode as the encoding standard possibly used for most of the world’s writing systems.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Mohamed, A.A.: An improved algorithm for information hiding based on features of Arabic text: a Unicode approach, Egypt. Inf. J. 15, 79–87 (2014)

    Google Scholar 

  2. Gutub, A.; Al-Juaid, N.; Khan, E.: Counting-based secret sharing technique for multimedia applications. Multimed Tools Appl. 78, 5591–5619 (2019)

    Article  Google Scholar 

  3. Mersal, S.; Alhazmi, S.; Alamoudi, R.; Almuzaini, N.: Arabic text steganography in smartphone. Int. J. Comput. Inf. Technol. 3(2), 441–445 (2014)

    Google Scholar 

  4. Shirali-Shahreza, M.H.; Shirali-Shahreza, M.: A new approach to Persian/Arabic text steganography. In: IEEE/ACIS International Conference on Computer and Information Science (ICIS), pp. 310–315 (2006)

  5. Gutub, A.; Fattani, M.: A novel Arabic text steganography method using letter points and extensions. Int. J. Comput. Electr. Autom. Control Inf. Eng. 1(3), 502–505 (2007)

    Google Scholar 

  6. Shaker, A.; Ridzuan, F.; Pitchay, S.A.: Text steganography using extensions Kashida based on the moon and sun letters concept. Int. J. Adv. Comput. Sci. Appl. 8(8), 286–290 (2017)

    Google Scholar 

  7. Alhusban, A.M.: A meliorated Kashida-based approach for Arabic text steganography. Int. J. Comput. Sci. Inf. Technol. 9(2), 99–112 (2017)

    Google Scholar 

  8. Khan, E.: Using Arabic poetry system for steganography. Asian J. Comput. Sci. Inf. Technol. 4(6), 55–61 (2014)

    Google Scholar 

  9. Gutub, A.; Al-Alwani, W.; Bin Mahfoodh, A.: Improved method of Arabic text steganography using the extension ‘Kashida’ character. Bahria Univ. J. Inf. Commun. Technol. 3(1), 68–72 (2010)

    Google Scholar 

  10. Al-Nazer, A., Gutub, A.: Exploit Kashida adding to Arabic e-text for high capacity steganography. In: IEEE International Workshop on Frontiers of Information Assurance & Security (FIAS), pp. 447–451 (2009)

  11. Gutub, A.; Al-Nazer, A.: High capacity steganography tool for Arabic text Using ‘Kashida’. ISC Int. J. Inf. Secur. 2(2), 109–120 (2010)

    Google Scholar 

  12. Gutub, A.; Al-Haidari, F.; Al-Kahsah, K.; Hamodi, J.: E-text watermarking: utilizing ‘Kashida’ extensions in Arabic language electronic writing. J. Emerg. Technol. Web Intell. 2(1), 48–55 (2010)

    Google Scholar 

  13. Gutub, A., Ghouti, L., Amin, A., Alkharobi, T., Ibrahim, M.K.: Utilizing extension character ‘Kashida’ with pointed letters for Arabic text digital watermarking. In: International Conference on Security and Cryptography (SECRYPT), Barcelona, Spain, pp. 329–332 (2007). https://doi.org/10.5220/0002116903290332

  14. Al-Haidari, F., Gutub, A., Al-Kahsah, K., Hamodi, J.: Improving security and capacity for Arabic text steganography using ‘Kashida’ extensions. In: ACS/IEEE International Conference on Computer Systems and Applications (AICCSA), pp. 396–399 (2009)

  15. Odeh, A., Elleithy, K., Faezipour, M.: Steganography in Arabic text using Kashida variation algorithm (KVA). In: IEEE Long Island Systems, Applications and Technology Conference, pp. 1–6 (2013)

  16. Al-Nofaie, S.; Gutub, A.; Al-Ghamdi, M.: Enhancing Arabic text steganography for personal usage utilizing pseudo-spaces. J. King Saud Univ. Comput. Inf. Sci. (2019). https://doi.org/10.1016/j.jksuci.2019.06.010

    Article  Google Scholar 

  17. Al-Nofaie, S.; Gutub, A.: Utilizing pseudo-spaces to improve Arabic text steganography for multimedia data communications. Multimed Tools Appl. 79, 19–67 (2020)

    Article  Google Scholar 

  18. Al-Nofaie, S.; Fattani, M.; Gutub, A.: Merging two steganography techniques adjusted to improve Arabic text data security. J. Comput. Sci. Comput. Math. 6(3), 59–65 (2016)

    Article  Google Scholar 

  19. Shirali-Shahreza, M.H.; Shirali-Shahreza, M.: Arabic/Persian text steganography utilizing similar letters with different codes. Arab. J. Sci. Eng. 35(1B), 213–222 (2010)

    Google Scholar 

  20. Shirali-Shahreza, M.H.; Shirali-Shahreza, M.: Steganography in Persian and Arabic Unicode texts using pseudo-space and pseudo connection characters. J. Theor. Appl. Inf. Technol. 4(8), 682–687 (2008)

    Google Scholar 

  21. Abbasi, A.T.; Naqvi, S.N.S.; Khan, A.; Ahmad, B.: Urdu text steganography: utilizing isolated letters. In: Australian Information Security Management Conference, pp. 36–46. (2015) https://doi.org/10.4225/75/57b699bed938a

  22. Shirali-Shahreza, M.: A new Persian/Arabic text steganography using “La” word. In: Advances in Computer and Information Sciences and Engineering, pp. 339–342. Springer, Dordrecht (2008)

  23. Obeidat, A.A.: Arabic text steganography using Unicode of non-joined to right side letters. J. Comput. Sci. 13, 184–191 (2017)

    Article  Google Scholar 

  24. Tayyeh, H.; Mahdi, M.; Al-Jumaili, A.: Novel steganography scheme using Arabic text features in Holy Quran. Int. J. Electr. Comput. Eng. 9, 1910–1918 (2019). https://doi.org/10.11591/ijece.v9i3

    Article  Google Scholar 

  25. Ditta, A.; Cai, Y.; Azeem, M.; Rana, K.G.; Yu, H.; Memon, M.Q.: Information hiding: Arabic text steganography by using Unicode characters to hide secret data. Int. J. Electro. Secur. Digit. Forens. 10, 61–78 (2018)

    Article  Google Scholar 

  26. Alghamdi, N., Berriche, L.: Capacity Investigation of Markov chain-based statistical text steganography: Arabic language case. In: Asia Pacific Information Technology Conference (APIT), pp. 37–43 (2019)

  27. Hamzah, A., Bayomi, H.: Text steganography with high embedding capacity using Arabic calligraphy. In: International Conference of Reliable Information and Communication Technology, pp. 127–138 (2019)

  28. Alanazi, N.; Khan, E.; Gutub, A.: Efficient security and capacity techniques for Arabic text steganography via engaging Unicode standard encoding. Multimed Tools Appl. (2020). https://doi.org/10.1007/s11042-020-09667-y

  29. Alanazi, N.; Khan, E.; Gutub, A.: Inclusion of Unicode standard seamless characters to expand Arabic text steganography for secure individual uses. J. King Saud Univ. Comput. Inf. Sci. (2020). https://doi.org/10.1016/j.jksuci.2020.04.011

  30. Gutub, A.; Ghouti, L.; Elarian, Y.; Awaideh, S.; Alvi, A.: Utilizing diacritic marks for Arabic text steganography. Kuwait J. Sci. Eng. (KJSE) 37(1), 89–109 (2010)

    Google Scholar 

  31. Almazrooie, M.; Samsudin, A.; Gutub, A.; Salleh, M.S.; Omar, M.A.; Hassan, S.A.: Integrity verification for digital Holy Quran verses using cryptographic hash function and compression. J. King Saud Univ. Comput. Inf. Sci. 32(1), 24–34 (2020)

    Google Scholar 

  32. Gutub, A.; Ghouti, L.; Amin, A.; Alkharobi, T.; Ibrahim, M.K.: Utilizing extension character ‘Kashida’ with pointed letters for arabic text digital watermarking. Int. Conf. Security Cryptography, pp. 329-332 (2007). https://doi.org/10.5220/0002116903290332

  33. Gutub, A.; Alaseri, K.: Hiding shares of counting-based secret sharing via Arabic text steganography for personal usage. Arab. J. Sci. Eng. 45, 2433–2458 (2020)

    Article  Google Scholar 

  34. Shirali-Shahreza, M.; Shirali-Shahreza, M.H.: Text steganography in SMS. In: IEEE International Conference on Convergence Information Technology, pp. 2260–2265 (2007)

  35. Ahmadoh, E.; Gutub, A.: Utilization of two diacritics for Arabic text steganography to enhance performance. Lect. Notes Inf. Theory 3(1), 42–47 (2015)

    Google Scholar 

  36. Gutub, A.; Alaseri, K.: Refining Arabic text stego-techniques for shares memorization of counting-based secret sharing. J. King Saud Univ. Comput. Inf. Sci. (2019). https://doi.org/10.1016/j.jksuci.2019.06.014

    Article  Google Scholar 

Download references

Acknowledgements

Thanks to Umm Al-Qura University, Saudi Arabia, for the educational support given toward this research.

Funding

Funding

There is no funding source.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Adnan Gutub.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Ethical Approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Informed Consent

Informed consent was obtained from all individual participants included in the study.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Alanazi, N., Khan, E. & Gutub, A. Functionality-Improved Arabic Text Steganography Based on Unicode Features. Arab J Sci Eng 45, 11037–11050 (2020). https://doi.org/10.1007/s13369-020-04917-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s13369-020-04917-5

Keywords

Navigation