A Novel Arabic Text Steganography Method Using Letter Points and Extensions

This paper presents a new steganography approach suitable for Arabic texts. It can be classified under steganography feature coding methods. The approach hides secret information bits within the letters benefiting from their inherited points. To note the specific letters holding secret bits, the scheme considers the two features, the existence of the points in the letters and the redundant Arabic extension character. We use the pointed letters with extension to hold the secret bit 'one' and the un-pointed letters with extension to hold 'zero'. This steganography technique is found attractive to other languages having similar texts to Arabic such as Persian and Urdu.




References:
[1] B. Chen and G.W. Wornell, "Quantization Index Modulation: A Class of
Provably Good Methods for Digital Watermarking and Information
Embedding," IEEE Trans. Information Theory, Vol. 47, No. 4, pp. 1423-
1443, 2001.
[2] M. Hassan Shirali-Shahreza, Mohammad Shirali-Shahreza, "A New
Approach to Persian/Arabic Text Steganography," 5th IEEE/ACIS
International Conference on Computer and Information Science (ICISCOMSAR
06), pp. 310- 315, July 2006.
[3] J.C. Judge, "Steganography: Past, Present, Future", SANS white paper,
http://www.sans.org/rr/papers/, November 30, 2001.
[4] R. Chandramouli, and N. Memon, "Analysis of LSB based image
steganography techniques", Proceedings of the International Conference
on Image Processing, Vol. 3, pp. 1019 - 1022, Oct. 2001.
[5] G. Doërr and J.L. Dugelay, "A Guide Tour of Video Watermarking",
Signal Processing: Image Communication, Vol. 18, No 4, pp. 263-282,
2003.
[6] K. Gopalan, "Audio steganography using bit modification", Proceedings
of the IEEE International Conference on Acoustics, Speech, and Signal
Processing, (ICASSP '03), Vol. 2, pp. 421-424, April 2003.
[7] W. Bender, D. Gruhl, N. Morimoto, and A. Lu, "Techniques for data
hiding", IBM Systems Journal, Vol. 35, No 4, pp. 313-336, 1996.
[8] K. Bennett, "Linguistic Steganography: Survey, Analysis, and Robustness Concerns for Hiding Information in Text", Purdue
University, CERIAS Tech. Report 2004-13, 2004.
[9] S.H. Low, N.F. Maxemchuk, J.T. Brassil, and L. O'Gorman, "Document
marking and identification using both line and word shifting",
Proceedings of the Fourteenth Annual Joint Conference of the IEEE
Computer and Communications Societies (INFOCOM '95), April 1995.
[10] K. Rabah, "Steganography-The Art of Hiding Data", Information
Technology Journal, vol. 3, Issue 3, pp. 245-269, 2004.
[11] M. H. Shirali-Shahreza, and S. Shirali-Shahreza, "A Robust Page
Segmentation Method for Persian/Arabic Document", WSEAS
Transactions on Computers, vol. 4, Issue 11, Nov. 2005, pp. 1692-1698.
[12] N. Provos and P. Honeyman, "Hide and Seek: An Introduction to
Steganography", IEEE Security & Privacy, pp. 32-44, May/June 2003.