Abstract
This research work proposed a system that improves Arabic text steganography. The paper’s primary goal is to advance confidentiality and capacity, as important aspects of security data hiding within stego Arabic text acceptable robustness practicality. The current security performance needs research to have more capacity of hidden bits preserving the inability of attackers to find out the hidden secrets inside the intended media. The paper exploitation improves by utilizing the ‘Kashida’ redundant extension, Arabic language characters, to positively regulate hiding private data. The work proposes three different novel Kashida models for securing privacy bits in the text without destroying its content and appearance. The research is analyzed on Imam Nawawi’s forty hadith script following standard Arabic text benchmark experimentations. The proposals showed various pros and cons, remarking that the third scheme (Model 3) showing a high amount of embedding opportunity in many cases averaged to be above 33%. Model 1 provides more ambiguity, with an average of 57% figure-of-merit approximation, though all models are showing comparable similar remarks making their confidentiality approximation practically acceptable. The work comparative analysis further linked to others remarking Model 3 as the best in an interesting attractive performance trade-off remarks, to be used further for specific Arabic secrecy studies and future relevant developments and investigations to come.
Similar content being viewed by others
Data availability
Data sharing not applicable to this article as no datasets were generated or analyzed during the current study.
References
Alanazi N et al (2021) Involving spaces of Unicode standard within irreversible arabic text steganography for practical implementations. Arab J Sci Eng (AJSE) 46(9):8869–8885. https://doi.org/10.1007/s13369-021-05605-8
Gutub A, Alaseri K (2020) Hiding shares of counting-based secret sharing via Arabic text steganography for personal usage. Arab J Sci Eng (AJSE) 45(4):2433–2458. https://doi.org/10.1007/s13369-019-04010-6
AlJarf A et al (2024) Is blind image steganalysis practical using feature-based classification?. Multimed Tools Appl (MTAP) 83(2):4579–4612. https://doi.org/10.1007/s11042-023-15682-6
Gutub A, Kheshaifaty N (2023) Practicality analysis of utilizing text-based CAPTCHA vs. graphic-based CAPTCHA authentication. Multimed Tools Appl (MTAP) 82(30):46577–46609. https://doi.org/10.1007/s11042-023-15586-5
Altalhi S et al (2021) A survey on predictions of cyber-attacks utilizing real-time twitter tracing recognition. J Ambient Intell Humaniz Comput 12(11):10209–10221. https://doi.org/10.1007/s12652-020-02789-z
Sufi F et al (2023) Automating global threat-maps generation via advancements of news sensors and AI. Arab J Sci Eng (AJSE) 48(2):2455–2472. https://doi.org/10.1007/s13369-022-07250-1
Gutub A, Almehmadi E (2023) Arabic text watermarking tuned for medical e-record semi-authentication. J Eng Res (JER) 11(3A):100–111. https://doi.org/10.36909/jer.18943
Almehmadi E et al (2022) Novel arabic e-text watermarking supporting partial dishonesty based on counting-based secret sharing. Arab J Sci Eng (AJSE) 47(2):2585–2609. https://doi.org/10.1007/s13369-021-06200-7
Alassaf N et al (2019) Enhancing speed of SIMON: a light-weight-cryptographic algorithm for IoT Applications. Multimed Tools Appl (MTAP) 78:32633–32657. https://doi.org/10.1007/s11042-018-6801-z
Singh A et al (2023) Redefining food safety traceability system through blockchain: findings, challenges and open issues. Multimed Tools Appl (MTAP) 82(14):21243–21277. https://doi.org/10.1007/s11042-022-14006-4
Alkhudaydi M et al (2021) Securing data via cryptography and arabic text steganography. SN Comput Sci 2:46. https://doi.org/10.1007/s42979-020-00438-y
Sahu AK et al (2022) Improving grayscale steganography to protect personal information disclosure within hotel services. Multimed Tools Appl (MTAP) 81(21):30663–30683. https://doi.org/10.1007/s11042-022-13015-7
Al-Roithy B et al (2021) Remodeling randomness prioritization to Boost-Up Security of RGB image encryption. Multimedia Tools Appl (MTAP) 80(18):28521–28581. https://doi.org/10.1007/s11042-021-11051-3
Hassan F et al (2020) Efficient reversible data hiding multimedia technique based on smart image interpolation. Multimedia Tools and Applications (MTAP) 79(39):30087–30109. https://doi.org/10.1007/s11042-020-09513-1
Al-Ghamdi M et al (2019) Security enhancement of shares generation process for multimedia counting-based secret-sharing technique. Multimedia Tools Appl (MTAP) 78(12):16283–16310. https://doi.org/10.1007/s11042-018-6977-2
Gutub A, Al-Alwani W, Bin-Mahfoodh A (2010) Improved method of arabic text steganography using the extension ‘Kashida’ character. Bahria Univ J Inform Communication Technol (BUJICT) 3(1):68–72. http://ojs.bahria.edu.pk/index.php/bujict/article/view/33
Thabit R et al (2022) CSNTSteg: Color Spacing normalization text Steganography model to improve capacity and invisibility of hidden data. IEEE Access 10:65439–65458. https://doi.org/10.1109/ACCESS.2022.3182712
Dmitri V (2007) Digital security and privacy for human rights defenders. The International Foundation for Human Right Defenders, Feb. 2007, Manual, European Union, Ireland. https://aarhusclearinghouse.unece.org/resources/digital-security-and-privacy-human-rights-defenders
Roslan NA et al (2022) Systematic literature review and analysis for arabic text steganography method practically. Egypt Inf J 23(4):177–191. https://doi.org/10.1016/j.eij.2022.10.003
Shirali-Shahreza MH, Shirali-Shahreza M (2006) A new approach to Persian/Arabic text steganography. IEEE/ACIS International Conference on Computer and Information Science, Honolulu, pp 310–315
Aabed M et al (2007) Arabic diacritics based steganography. IEEE International Conference on Signal Processing and Communications (ICSPC), Dubai, UAE, pp 756–759. https://doi.org/10.1109/ICSPC.2007.4728429
Gutub A, Fattani M (2007) A novel arabic text steganography method using letter points and extensions. Int J Comput Electr Autom Control Inform Eng 1(3):502–505. https://doi.org/10.5281/zenodo.1061621
Al-Nofaie S et al (2021) Enhancing arabic text steganography for personal usage utilizing pseudo-spaces. J King Saud Univ - Comput Inform Sci 33(8):963–974. https://doi.org/10.1016/j.jksuci.2019.06.010
Alanazi N et al (2020) Functionality-improved arabic text steganography based on Unicode features. Arab J Sci Eng (AJSE) 45(12):11037–11050. https://doi.org/10.1007/s13369-020-04917-5
Alkhudaydi M et al (2020) Integrating light-weight cryptography with diacritics arabic text steganography improved for practical security applications. J Inform Secur Cybercrimes Res (JISCR) 3(1):13–30. https://doi.org/10.26735/FMIT1649
Gutub A, Almehmadi E (2023) Advancing partial verification of watermarking for arabic text via utilization of innovative counting-based secret sharing. Arab J Sci Eng (AJSE) 48(8):9963–9989. https://doi.org/10.1007/s13369-022-07387-z
Samphaiboon N, Dailey M (2008) Steganography in thai text. IEEE international conference on electrical engineering/electronics, computer, Telecommunications and Information Technology, Krabi, Thailand, pp 133–136. https://doi.org/10.1109/ECTICON.2008.4600390
Amano T, Misaki D (1999) A feature calibration method for watermarking of document images. Proceedings of the Fifth International Conference on Document Analysis and Recognition (ICDAR 1999), vol 2. Bangalore, pp 91–94
Kim YW, Oh IS (2004) Watermarking text document images using Edge Direction histograms. Pattern Recognit Lett 25:1243–1251. https://doi.org/10.1016/j.patrec.2004.04.002
Alghamdi M, Muzaffar Z (2007) KACST Arabic diacritizer. First International Symposium on Computers and Arabic Language. Citeseer, KACST, Riyadh, Saudi Arabia, pp 25–28
Gutub A et al (2007) Utilizing extension character ‘Kashida’ with pointed letters for Arabic text digital watermarking. International Conference on Security and Cryptography (SECRYPT), pp 329–332, Barcelona, Spain. https://doi.org/10.5220/0002116903290332
Alanazi N et al (2021) Efficient security and capacity techniques for arabic text steganography via engaging Unicode standard encoding. Multimedia Tools Appl (MTAP) 80:1403–1431. https://doi.org/10.1007/s11042-020-09667-y
Abandah G, Khundakjie F (2004) Issues concerning code system for arabic letters. Dirasat Eng Sci J 31(1):165–177
Alanazi N et al (2022) Inclusion of Unicode standard seamless characters to expand arabic text steganography for secure individual uses. J King Saud Univ - Comput Inform Sci 34(4):1343–1356. https://doi.org/10.1016/j.jksuci.2020.04.011
Ahmadoh E et al (2015) Utilization of two diacritics for arabic text steganography to enhance performance. Lecture Notes Inform Theory 3(1):42–47. https://doi.org/10.18178/lnit.3.1.42-47
Al-Juaid N et al (2019) Combining RSA and audio steganography on personal computers for enhancing security. SN Appl Sci 1:830. https://doi.org/10.1007/s42452-019-0875-8
Gutub A, Alaseri K (2021) Refining arabic text stego-techniques for shares memorization of counting-based secret sharing. J King Saud Univ - Comput Inform Sci 33(9):1108–1120. https://doi.org/10.1016/j.jksuci.2019.06.014
Al-Nofaie S et al (2020) Utilizing pseudo-spaces to improve arabic text steganography for multimedia data communications. Multimedia Tools Appl 79:19–67. https://doi.org/10.1007/s11042-019-08025-x
Bender W et al (1996) Techniques for data hiding. IBM Syst J 35:313–336
Alotaibi R, Elrefaei L (2016) Utilizing word space with pointed and un-pointed letters for Arabic text watermarking. IEEE UK Sim-AMSS 18th International Conference on Computer Modelling and Simulation (UKSim), Cambridge, UK, pp 111–116
Alotaibi R, Elrefaei L (2018) Improved capacity Arabic text watermarking methods based on open word space. J King Saud Univ – Comput Inf Sci 30(2):236–248. https://doi.org/10.1016/j.jksuci.2016.12.007
Al-Nofaie S et al (2016) Merging two steganography techniques adjusted to improve arabic text data security. J Comput Sci Comput Math (JCSCM) 6(3):59–65. https://doi.org/10.20967/jcscm.2016.03.004
Gutub A (2024) Emerging Arabic text watermarking utilizing combinations of different diacritics. Arab J Sci Eng (AJSE). https://doi.org/10.1007/s13369-023-08629-4
Saeidi Z et al (2024) High performance image steganography integrating IWT and hamming code within secret sharing. IET Image Process 18(1):129–139. https://doi.org/10.1049/ipr2.12938
Gutub A (2024) Adjusting counting-based secret-sharing via personalized passwords and email-authentic reliability. J Eng Res (JER). https://doi.org/10.1016/j.jer.2023.09.014
Acknowledgements
Special thanks to my brilliant student, Ms. Khulood Aljuaid (44181690), whom worked under my supervision on this related exploration as special tasks of her graduate studies course research project (1403699-6) offered by Computer Engineering Department in Winter-Term 2022. Though her hard work inspired this study publication with some confusing remarks and problems in reporting, she could not complete all the work requirements and proper write-up toward publication, but deserves this indebtedness acknowledgment. All appreciation to my other genius graduate students of Computer Engineering course: Advanced Topics in Information Security (1400519) as well as students of Computer & Information Security course (14034107-3) and Cryptography & Network Security course (14034108-3) offered both by Computer Engineering Department in Fall-Term and Winter-Term 2023, as their collaborative work remarked attractive contribution and completion used within this paper. Thanks to our great school, Umm Al-Qura University – Makkah, for supporting me by sabbatical leave year (2022–2023) to focus working out the Cybersecurity research hoping to continue offering the MS graduate program as well as allowing for PhD, approved by Ministry of Education within Saudi Arabia, opening doors for progressive scientific activities.
Funding
There is no funding source.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Agreement
This work is original and not considered in other publication media.
Ethical approval
This article does not contain any studies with human participants or animals.
Conflict of interest
The authors declare that they have no conflict of interest.
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Gutub, A. Regulating Kashida Arabic steganography to improve security and capacity performance. Multimed Tools Appl (2024). https://doi.org/10.1007/s11042-024-18946-x
Received:
Revised:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11042-024-18946-x