Steganography in Arabic Text Using Zero Width and Kashidha Letters

The need for secure communication methods has significantly increased with the explosive growth of the internet and mobile communications. The usage of text documents has doubled several times over the past years especially with mobile devices. In this paper we propose a new steganography algorithm for Arabic text. The algorithm employs some letters that can be joined with other letters. These letters are the extension letter, Kashida and Zero width character. The extension letter, Kashida, does not have any change in the word meaning if joined to other letters. Also, the Zero width character (Ctrl+ Shift +1) does not change the meaning. The new proposed algorithm, Zero Width and Kashidha Letters (ZKS), mitigate the possibility to be discovered by steganoanalysis through using parallel connection and permutation function.

[1]  Shawn D. Dickman An Overview of Steganography , 2007 .

[2]  Adnan Abdul-Aziz Gutub,et al.  A Novel Arabic Text Steganography Method Using Letter Points and Extensions , 2007 .

[3]  Mohammed A. Aabed,et al.  Arabic Diacritics based Steganography , 2007, 2007 IEEE International Conference on Signal Processing and Communications.

[4]  M. Shirali-Shahreza,et al.  An Improved Version of Persian/Arabic Text Steganography Using "La" Word , 2008, 2008 6th National Conference on Telecommunication Technologies and 2008 2nd Malaysia Conference on Photonics.

[5]  Mohammed Abbas Fadhil Al-Husainy Image Steganography by Mapping Pixels to Letters , 2009 .

[6]  Vimal Bhatia,et al.  Proceedings IEEE International Conference on Signal Processing and Communications , 2004 .

[7]  M. Shirali-Shahreza,et al.  Steganography in TeX documents , 2008, 2008 3rd International Conference on Intelligent System and Knowledge Engineering.

[8]  Chet Hosmer,et al.  An Overview of Steganography , 2011, Adv. Comput..

[9]  M.H. Shirali-Shahreza,et al.  Text Steganography in chat , 2007, 2007 3rd IEEE/IFIP International Conference in Central Asia on Internet.

[10]  Mehdi Hariri Ronak Karimi Masoud Nosrati An introduction to steganography methods , 2011 .

[11]  Elizabeth Chang,et al.  Visibly Invisible: Ciphertext as a Steganographic Carrier , 2004 .

[12]  Krista Bennett,et al.  LINGUISTIC STEGANOGRAPHY: SURVEY, ANALYSIS, AND ROBUSTNESS CONCERNS FOR HIDING INFORMATION IN TEXT , 2004 .

[13]  Mohammad Hassan Shirali-Shahreza,et al.  A New Approach to Persian/Arabic Text Steganography , 2006, 5th IEEE/ACIS International Conference on Computer and Information Science and 1st IEEE/ACIS International Workshop on Component-Based Software Engineering,Software Architecture and Reuse (ICIS-COMSAR'06).

[14]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..