![]() ![]() However, this would be detectable by an attacker or other third party because of the minor change in the document. These attributes may be non-displayed characters, spaces, resized fonts, or purposeful misspellings scattered throughout the text. To embed information within a document, its attributes must be changed. Notably, text steganography is usually not given priority because of the difficulties in identifying redundant bits in a text file. Most of the research on steganography utilizes cover media, such as videos, images, and sounds. Steganography is an appropriate method, in which the user is able to conceal a message inside another message (cover media). ![]() Different techniques, such as steganography, cryptography, and coding, have been deployed to protect valuable information. Therefore, individuals are concerned about protecting their work and avoiding these unlawful actions. This is because the fabrication and faking of documents is prevalent globally, resulting in significant losses for individuals, societies, and industrial sectors, in addition to national security. There has been a persistent requirement for safeguarding documents and the data they contain, either in printed or electronic form. The evaluation showed the potential of using the multiple shapes of Arabic letters to satisfy steganography requirements. The cover represents the secret message itself and it provides high capacity to hide data also. Because the visual difference between the cover and the stego-cover must be unnoticeable to the human in any stego-system, the security in this framework is satisfying due there is no cover used. The framework was evaluated on capacity and security. A set of Arabic poetry and proverbs were used as a dataset. The Arabic font Naskh was used as a case study. The framework also includes corpus creation and a modification of the Aho-Corasick string-matching algorithm. The embedding phase uses string matching to generate stego text and accompanying letter shapes according to a secret message. The phases of the framework are preparation phase, embedding phase and extraction phase. In this paper, a framework that uses Arabic calligraphy to hide information is proposed. ![]() In particular, Arabic calligraphy contains multiple fonts and multiple shapes of Arabic alphabet letters. The Arabic language has a rich set of features which have not been utilized until now in this area. In linguistic steganography, languages’ features are employed to hide information. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |