Presentation is loading. Please wait.

Presentation is loading. Please wait.

1 Adnan Gutub Computer Engineering King Fahd University of Petroleum & Minerals Saudi Arabia A Novel Arabic Text Steganography Method Using Letter Points.

Similar presentations


Presentation on theme: "1 Adnan Gutub Computer Engineering King Fahd University of Petroleum & Minerals Saudi Arabia A Novel Arabic Text Steganography Method Using Letter Points."— Presentation transcript:

1 1 Adnan Gutub Computer Engineering King Fahd University of Petroleum & Minerals Saudi Arabia A Novel Arabic Text Steganography Method Using Letter Points & Extensions

2 2 Arabic Diacritics حركات Based Steganography Steganography is the ability of hiding information in redundant bits of any unremarkable cover media. This presentation will discuss new Arabic text steganography schemes. IntroductionBackgroundProposed ApproachResults & Analysis

3 3

4 4 Difficulties of Text Steganography In steganography, the cover media used to hide the message can be text, image, video or audio files. Using text media for this purpose is considered the hardest ! Text data does not have much needless information within the essential data. Fig. 1: Data Hiding in Binary Text Documents

5 5 Previous Techniques Many techniques have been proposed for text steganography that are mostly graphical in nature: 1. Line shifting: Text is divided into lines. Implementing 1 is by shifting the line a small fraction that can’t be detected by the bare eye. Implementing a 0 means keeping the line as is. 2. Word shifting: Same as previous but text is divided into words. 3. Word horizontal shifting: Same as previous approach but words are shifted left and right to indicate bits. Original Text: We are embedding a ‘b’ using horizontal word shifting. Modified Text: We are embedding a ‘b’ using horizontal word shifting. Hiding ‘b’ = 0x62 = 0 1 1 0 0 0 1 0 b 4. White space manipulation: White spaces at the end of the line are not apparent. 5. HTML formatting: HTML syntax is case insensitive. This can be used to hide information.

6 6 p h g l o j i m e i s s u n a f y ne i rs n r Apparently neutral’s protest is thoroughly discounted and ignored. Isman hard hit. Blockade issue affects pretext for embargo on by-products, ejecting suets and vegetable oils.

7 7 p h g l o j i m e i s s u n a f y ne i rs n r

8 8 Previous Techniques Other variations for the previous techniques are proposed. Pointed letters shifting. Some approaches consider the syntactic structure of the language used. ‘Run’ can be used instead of ‘sprint’ to mean something. In summary the previous techniques tackle one of two areas: Limitations of human sight. Specific language grammar.

9 9

10 10 Arabic Based Steganography Arabic language is the largest living member of the Semitic language family in terms of speakers. (270 million speakers). It contains 28 alphabet characters; 15 of which have points. اللٌّغَةُ Characters with no points Characters with one point Characters with two points Characters with three points أ ح د ر س ص ط ع ك ل م هـ و ب ج خ ذ ز ض ظ غ ف ن ت ق يث ش Fig. 2: Arabic Alphabet

11 11 Pointed Letters (Special for Arabic)  Shirali-Shahreza, 2006  Drawback: robustness un-pointed letters pointed letters ا ح د ر س ص ط ع ك ل م هـ و ب ت ثج خ ذ زش ضظ غ فق ن يب ت ثج خ ذ زش ضظ غ فق ن ي

12 12

13 13 Pointed Letters & Extensions  adding extensions after pointed letters. من حسن اسلام المرء تركه مالا يعنيه 1011 من حسن اسلام المرء تـركه مالا يـعنيـه 101 1

14 14 Pointed Letters & Extensions  adding extensions before pointed letters. من حسن اسلام المرء تركه مالا يعنيه 1011 مـن حسـن اسلام المرء تركه مالا يعنـيه 101 1

15 15

16 16 Evaluation Approachpqr(p+r+q)/2 Dots0.27640.43130.03000.3689 Extension-Before0.27570.42960.02980.3676 Extension-After0.18800.22040.00280.2056 16 File TypeFile Size (Bytes)Cover Size (Bytes)Capacity (%).txt44393651811.215 %.html44393785891.172 %.cpp101277995771.266 %.gif188151121.244 % Average1.22 %

17 17 Conclusion  The text and image approaches are discussed which are used to hide information in Arabic diacritics for steganographic.  This paper presents a variety of scenarios that may achieve up to arbitrary capacities. Sometimes tradeoffs between capacity, security and robustness imply that a particular scenario should be chosen.  The overhead of Kashidah suffers from restrictions on its insertion especially the need of dotted character. 17

18 18 Summary  Steganography has its place in the security. On its own, it won ’ t serve much but when used as a layer of cryptography, it would lead to a greater security.  Far fetched applications in privacy protection and intellectual property rights protection.  Research is going on in both the directions  One is how to incorporate hidden or visible copyright information in various media, which would be published.  At the same time, in opposite direction, researcher are working on how to detect the trafficking of illicit material & covert messages published by certain outlawed groups.


Download ppt "1 Adnan Gutub Computer Engineering King Fahd University of Petroleum & Minerals Saudi Arabia A Novel Arabic Text Steganography Method Using Letter Points."

Similar presentations


Ads by Google