Steganography in Arabic text using Kashida variation algorithm (KVA)

The need for secure communications has significantly increased with the explosive growth of the internet and mobile communications. The usage of text documents has doubled several times over the past years especially with mobile devices. In this paper, we propose a new steganography algorithm for Unicode language (Arabic). The algorithm employs some Arabic language characteristics which represent extension letters. Kashida letter is an optional property for any Arabic text and usually is not popularly used. Many algorithms tried to employ this property to hide data in Arabic text. In our method, we use this property to hide data and reduce the probability of suspicions. The proposed algorithm first introduces four scenarios to add Kashida letters. Then, random concepts are employed for selecting one of the four scenarios for each round. Message segmentation principles are also applied, enabling the sender to select more than one strategy for each block of message. At the other end, the recipient can recognize which algorithm was applied and can then decrypt then message content and aggregate it. Kashida variation algorithm can be extended to other similar Unicode languages to improve robustness and capacity.

[1]  Krista Bennett,et al.  LINGUISTIC STEGANOGRAPHY: SURVEY, ANALYSIS, AND ROBUSTNESS CONCERNS FOR HIDING INFORMATION IN TEXT , 2004 .

[2]  K. Elleithy,et al.  Steganography by multipoint Arabic letters , 2012, 2012 IEEE Long Island Systems, Applications and Technology Conference (LISAT).

[3]  Mohamed Bachir Yagoubi,et al.  High capacity diacritics-based method for information hiding in Arabic text , 2011, 2011 International Conference on Innovations in Information Technology.

[4]  N. C. Debnath,et al.  Linguistic approach for text steganography through Indian text , 2010, 2010 2nd International Conference on Computer Technology and Development.

[5]  M.A. Aabed,et al.  Arabic Diacritics based Steganography , 2007, 2007 IEEE International Conference on Signal Processing and Communications.

[6]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[7]  Shawn D. Dickman An Overview of Steganography , 2007 .

[8]  David Shulman,et al.  Classical Telugu poetry : an anthology , 2002 .

[9]  Sushil Jajodia,et al.  Exploring steganography: Seeing the unseen , 1998, Computer.

[10]  Chin-Chen Chang,et al.  Emoticon-based text steganography in chat , 2009, 2009 Asia-Pacific Conference on Computational Intelligence and Industrial Applications (PACIIA).

[11]  Ramineni Siva Ram Prasad,et al.  A new approach to Telugu text steganography , 2011, 2011 IEEE Symposium on Wireless Technology and Applications (ISWTA).

[12]  Lawrence O'Gorman,et al.  Document marking and identification using both line and word shifting , 1995, Proceedings of INFOCOM'95.

[13]  Mohammed Abbas Fadhil Al-Husainy Image Steganography by Mapping Pixels to Letters , 2009 .

[14]  Mohammad Hassan Shirali-Shahreza,et al.  A New Approach to Persian/Arabic Text Steganography , 2006, 5th IEEE/ACIS International Conference on Computer and Information Science and 1st IEEE/ACIS International Workshop on Component-Based Software Engineering,Software Architecture and Reuse (ICIS-COMSAR'06).

[15]  Liu Yuling,et al.  An Efficient Linguistic Steganography for Chinese Text , 2007, 2007 IEEE International Conference on Multimedia and Expo.

[16]  Jan H. P. Eloff,et al.  An overview of image steganography , 2005, ISSA.

[17]  Chet Hosmer,et al.  An Overview of Steganography , 2011, Adv. Comput..

[18]  Elizabeth Chang,et al.  Visibly Invisible: Ciphertext as a Steganographic Carrier , 2004 .