Skip to main content
Log in

Involving Spaces of Unicode Standard Within Irreversible Arabic Text Steganography for Practical Implementations

  • Research Article-Computer Engineering and Computer Science
  • Published:
Arabian Journal for Science and Engineering Aims and scope Submit manuscript

Abstract

This paper introduces a novel method for Arabic text steganography for irreversible practical usage that involves using the spaces in Unicode standard. The method also benefits from several characters in the Arabic language that can be changed based on their locations within words. The main innovation of this proposed method is the utilization of the different typescripts of Unicode standard for each letter shape. The technique also utilizes spaces and other Unicode features of Arabic e-text to hide secret data. This method depends on the use of contextual forms of Arabic characters and whitespaces to irreversibly hide certain specific secret bits. Additionally, the method employs the extra characters zero-width-joiner and Kashida to further enhance embedding capacity while preserving maximum security. The research implementation experiments show that this technique outperforms most available existing irreversible methods in both capacity and security. Moreover, this procedure can be widely adopted in related languages, such as Urdu and Farsi, due to their use of similar Unicode features, which is the encoding standard used in most of the world’s writing systems.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Chen, B.; Wornell, G.W.: Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. IEEE Trans. Inf. Theory 47, 1423–1443 (2001)

    Article  MathSciNet  Google Scholar 

  2. Doshi, R.; Jain, P.; Gupta, L.: Steganography and its applications in security. International Journal of Modern Engineering Research (IJMER). 2(6), 4634–4638 (2012)

    Google Scholar 

  3. Khairullah: A novel steganography method using transliteration of Bengali text. Journal of King Saud University - Computer and Information Sciences. 31, 348–366 (2019)

  4. Hassan, F.; Gutub, A.: Efficient reversible data hiding multimedia technique based on smart image interpolation. Multimedia Tools and Applications. 79(39), 30087–30109 (2020). https://doi.org/10.1007/s11042-020-09513-1

    Article  Google Scholar 

  5. Kumar, R.; Malik, A.; Singh, S.; Kumar, B.; Chand, S.: A space based reversible high capacity text steganography scheme using font type and style. IEEE International Conference on Computing, Communication and Automation (ICCCA), Greater Noida, India. pp. 1090–1094, (2016) https://doi.org/10.1109/CCAA.2016.7813878

  6. Hassan, F.; Gutub, A.: Novel Embedding Secrecy within Images Utilizing an Improved Interpolation-Based Reversible Data Hiding Scheme. Journal of King Saud University - Computer and Information Sciences, in press. (2020) https://doi.org/10.1016/j.jksuci.2020.07.008

  7. Shirali-Shahreza, M.H.; Shirali-Shahreza, M.: A new approach to Persian/Arabic text steganography. IEEE/ACIS International Conference on Computer and Information Science (ICIS- COMSAR), pp. 310–315 (2006)

  8. Al-Nazer, A.; Gutub, A.: High capacity steganography tool for Arabic text using ‘Kashida’. The ISC International Journal of Information Security (ISeCure). 2(2), 107–118 (2010) https://doi.org/10.22042/ISECURE.2015.2.2.4

  9. Agarwal, M.: Text steganographic approaches: A comparison. International Journal of Network Security & Its Applications. 5 (2013)

  10. El-Abbadi, N.: New algorithm for text in text steganography. Al-Rafidain University college for Sciences Journal. 23, 99–112 (2008)

    Google Scholar 

  11. Benett, K.: Linguistic steganography - survey, analysis and robustness concerns for hiding information in text. Purdue University CERIAS Tech. Report, 13 (2004)

  12. Urjashee, S.; Medhi, S.: Linguistic grammar approach to textual steganography. IEEE International Conference on Computing for Sustainable Global Development, pp. 1671–1675 (2017)

  13. Rafat, K.F.: Enhanced text steganography in SMS. IEEE 2nd International Conference on Computer, Control and Communication, pp. 1–6 (2009)

  14. Alanazi, N.; Khan, E.; Gutub, A.: Functionality-improved Arabic text steganography based on unicode features. Arabian Journal for Science and Engineering. 45(12), 11037–11050 (2020). https://doi.org/10.1007/s13369-020-04917-5

  15. Alkhudaydi, M.; Gutub, A.: Securing data via cryptography and Arabic text steganography. SN Computer Science, 2(46), 1–18 (2021). https://doi.org/10.1007/s42979-020-00438-y

  16. Alanazi, N.; Khan, E.; Gutub, A.: Efficient security and capacity techniques for Arabic text steganography via engaging Unicode standard encoding. Multimedia Tools and Applications, in press. (2020). https://doi.org/10.1007/s11042-020-09667-y

  17. Gutub, A.; Al-Alwani, W.; Bin Mahfoodh, A.: Improved method of Arabic text steganography using the extension ‘Kashida’ character. Bahria University Journal of Information & Communication Technology 3(1), 68–72 (2010)

    Google Scholar 

  18. Al-Nazer, A.; Gutub, A.: Exploit Kashida adding to Arabic e-text for high capacity steganography. IEEE International Workshop on Frontiers of Information Assurance & Security (FIAS), Australia, pp. 447–451 (2009). https://doi.org/10.1109/NSS.2009.21

  19. Alhusban, M.A.: A meliorated Kashida-based approach for Arabic text steganography. International Journal of Computer Science & Information Technology (IJCSIT). 9(2), 99–112 (2017)

    Article  Google Scholar 

  20. Gutub, A.; Al-Haidari, F.; Al-Kahsah, K.; Hamodi, J.: E-text watermarking: Utilizing ‘Kashida’ extensions in Arabic language electronic writing. Journal of Emerging Technologies in Web Intelligence (JETWI). 2(1), 48–55 (2010). https://doi.org/10.4304/jetwi.2.1.48-55

    Article  Google Scholar 

  21. Al-Haidari, F.; Gutub, A.; Al-Kahsah, K.; Hamodi, J.: Improving security and capacity for Arabic text steganography using ‘Kashida’ extensions. ACS/IEEE Inernational Conference on Computer Systems and Applications (AICCSA), pp. 396–399 (2009). https://doi.org/10.1109/AICCSA.2009.5069355

  22. Al-Nofaie, S.; Gutub, A.; Al-Ghamdi, M.: Enhancing Arabic text steganography for personal usage utilizing pseudo-spaces. J. King Saud Univ. Comput. Inf. Sci. (2019) https://doi.org/10.1016/j.jksuci.2019.06.010

  23. Al-Nofaie, S.; Gutub, A.; Al-Ghamdi, M.: Merging two steganography techniques adjusted to improve Arabic text data security. Journal of Computer Science & Computational Mathematics. 6, 59–65 (2016) https://doi.org/10.20967/jcscm.2016.03.004.

  24. Odeh, A.; Alzubi, A.; Hani, Q.B.; Elleithy, K.: Steganography by multipoint Arabic letters. IEEE Long Island Systems, Applications and Technology Conference (LISAT), pp. 1–7 (2012)

  25. Gutub, A.; Fattani, M.: A novel Arabic text steganography method using letter points and extensions. International Journal of Computer, Electrical, Automation, Control and Information Engineering 1(3), 502–505 (2007). https://doi.org/10.5281/zenodo.1061621

    Article  Google Scholar 

  26. Bensaad, M.L.; Yagoubi, M.B.: Boosting the capacity of diacritics-based methods for information hiding in Arabic text. Arabian Journal for Science and Engineering, pp. 2035–2041 (2013)

  27. Aabed, M.A.; Awaideh, S.M.; Elshafei, A.M.; Gutub, A.: Arabic diacritics-based steganography. IEEE International Conference on Signal Processing and Communications, pp. 756–759 (2007) https://doi.org/10.1109/ICSPC.2007.4728429

  28. Ahmadoh, E.; Gutub, A.: Utilization of two diacritics for Arabic text steganography to enhance performance. Lecture Notes on Information Theory. 3(1), 42–47 (2015) https://doi.org/10.18178/lnit.3.1.42-47

  29. Alkhudaydi, M.; Gutub, A.: Integrating light-weight cryptography with diacritics Arabic text steganography improved for practical security applications. Journal of Information Security and Cybercrimes Research (JISCR) 3(1), 13–30 (2020). https://doi.org/10.26735/FMIT1649

  30. Shirali-Shahreza, M.H.; Shirali-Shahreza, M.: Arabic/Persian text steganography utilizing similar letters with different codes. Arab. J. Sci. 35(IB), 213–222 (2010)

  31. Abbasi, A.T.; Syeda, N.S.; Naqvi, A.; Khan, B.A.: Urdu text steganography: Utilizing isolated letters. Australian Information Security Management Conference. Australia (2015)

  32. Shirali-Shahreza, M.H.; Shirali-Shahreza, M.: An improved version of Persian/Arabic text steganography using 'La' word. IEEE National Conference on Telecommunication Technologies, pp. 372–376 (2008)

  33. Shirali-Shahreza, M.H.; Shirali-Shahreza, M.: Steganography in Persian and Arabic Unicode texts using pseudo-space and pseudo connection characters. J. Theor. Appl. Inf. Technol. 4(8), 682–687 (2008)

    Google Scholar 

  34. Mohamed, A.: An improved algorithm for information hiding based on features of Arabic text: A Unicode approach. Egyptian Informatics Journal. 15(2), 79–87 (2014)

    Article  Google Scholar 

  35. Obeidat, A.: Arabic text steganography using Unicode of non-joined to right side letters. J. Comput. Sci. 13(6), 184–191 (2017)

    Article  Google Scholar 

  36. Roslan, N.; Mahmod, R.; Udzir, N.: Sharp-edges method in Arabic text steganography. J. Theor. Appl. Inf. Technol. 33(1), 32–34 (2011)

    Google Scholar 

  37. Khosravi, B.; Nazarkardeh, K.: A new method for pdf steganography in justified texts. J. Inf. Secur. Appl. 45, 61–70 (2019)

    Google Scholar 

  38. Arabic text benchmark document samples, Retrieved Sep (2019) http://mawdoo3.com/

  39. Khan, E.: Using Arabic poetry system for steganography. Asian Journal of Computer Science and Information Technology. 4(6) (2014). https://doi.org/10.15520/ajcsit.v4i6.2

  40. Shirali-Shahreza, M.: A new Persian/Arabic text steganography using “La” word. Advances in computer and information sciences and engineering, pp. 339–342 (2008)

  41. Kaur, H.; Rani, J.: A Survey on different techniques of steganography. MATEC Web of Conferences, 57 (2016).

  42. Idbeaa, T.; Abdul Samad, S.; Husain, H.: A secure and robust compressed domain video steganography for intra- and inter-frames using embedding-based byte differencing (EBBD). PLoS ONE. 11(3) (2016)

  43. Ahvanooey, M.; Li, Q.; Hou, J.; Rajput, A.; Chen, Y.: Modern Text Hiding, Text Steganalysis, and Applications: A Comparative Analysis. Entropy 21, 350–381 (2019)

    Article  MathSciNet  Google Scholar 

  44. AlKhodaidi, T.; Gutub, A.: Refining image steganography distribution for higher security multimedia counting-based secret-sharing. Multimedia Tools and Applications, in press. (2020) https://doi.org/10.1007/s11042-020-09720-w

  45. Alanazi, N.; Khan, E.; Gutub, A.: Inclusion of unicode standard seamless characters to expand Arabic text steganography for secure individual uses. Journal of King Saud University - Computer and Information Sciences, in press. (2020). https://doi.org/10.1016/j.jksuci.2020.04.011

Download references

Acknowledgment

The authors would like to thank Umm Al-Qura University (UQU) for all motivation and support toward this research. Thanks also for Al-Jouf University for this wonderful graduate studies cooperation giving Miss Norah Alanazi the chance to be teaching assistant and to continue her MS research in the field of information security at UQU–Makkah under supervision of Dr Esam Khan and Prof. Adnan Gutub.

Funding

There is no funding source.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Adnan Gutub.

Ethics declarations

Conflict of Interest

The authors declare that they have no conflict of interest.

Agreement

We declare that this work is original and not considered to be published in any other publication media.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Informed consent

Informed consent was obtained from all individual participants included in the study.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Alanazi, N., Khan, E. & Gutub, A. Involving Spaces of Unicode Standard Within Irreversible Arabic Text Steganography for Practical Implementations. Arab J Sci Eng 46, 8869–8885 (2021). https://doi.org/10.1007/s13369-021-05605-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s13369-021-05605-8

Keywords

Navigation