Regulating Kashida Arabic steganography to improve security and capacity performance

被引:0
作者
Gutub A. [1 ]
机构
[1] CyberSecurity Department, College of Computing, Umm Al-Qura University, Makkah
关键词
Arabic steganography; Information security; Kashida data hiding; Multimedia privacy; Private communication;
D O I
10.1007/s11042-024-18946-x
中图分类号
学科分类号
摘要
This research work proposed a system that improves Arabic text steganography. The paper’s primary goal is to advance confidentiality and capacity, as important aspects of security data hiding within stego Arabic text acceptable robustness practicality. The current security performance needs research to have more capacity of hidden bits preserving the inability of attackers to find out the hidden secrets inside the intended media. The paper exploitation improves by utilizing the ‘Kashida’ redundant extension, Arabic language characters, to positively regulate hiding private data. The work proposes three different novel Kashida models for securing privacy bits in the text without destroying its content and appearance. The research is analyzed on Imam Nawawi’s forty hadith script following standard Arabic text benchmark experimentations. The proposals showed various pros and cons, remarking that the third scheme (Model 3) showing a high amount of embedding opportunity in many cases averaged to be above 33%. Model 1 provides more ambiguity, with an average of 57% figure-of-merit approximation, though all models are showing comparable similar remarks making their confidentiality approximation practically acceptable. The work comparative analysis further linked to others remarking Model 3 as the best in an interesting attractive performance trade-off remarks, to be used further for specific Arabic secrecy studies and future relevant developments and investigations to come. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024.
引用
收藏
页码:5457 / 5490
页数:33
相关论文
共 45 条
[1]  
Alanazi N., Et al., Involving spaces of Unicode standard within irreversible arabic text steganography for practical implementations, Arab J Sci Eng (AJSE), 46, 9, pp. 8869-8885, (2021)
[2]  
Gutub A., Alaseri K., Hiding shares of counting-based secret sharing via Arabic text steganography for personal usage, Arab J Sci Eng (AJSE), 45, 4, pp. 2433-2458, (2020)
[3]  
Aljarf A., Et al., Is blind image steganalysis practical using feature-based classification?, Multimed Tools Appl (MTAP), 83, 2, pp. 4579-4612, (2024)
[4]  
Gutub A., Kheshaifaty N., Practicality analysis of utilizing text-based CAPTCHA vs. graphic-based CAPTCHA authentication, Multimed Tools Appl (MTAP), 82, 30, pp. 46577-46609, (2023)
[5]  
Altalhi S., Et al., A survey on predictions of cyber-attacks utilizing real-time twitter tracing recognition, J Ambient Intell Humaniz Comput, 12, 11, pp. 10209-10221, (2021)
[6]  
Sufi F., Et al., Automating global threat-maps generation via advancements of news sensors and AI, Arab J Sci Eng (AJSE), 48, 2, pp. 2455-2472, (2023)
[7]  
Gutub A., Almehmadi E., Arabic text watermarking tuned for medical e-record semi-authentication, J Eng Res (JER), 11, 3A, pp. 100-111, (2023)
[8]  
Almehmadi E., Et al., Novel arabic e-text watermarking supporting partial dishonesty based on counting-based secret sharing, Arab J Sci Eng (AJSE), 47, 2, pp. 2585-2609, (2022)
[9]  
Alassaf N., Et al., Enhancing speed of SIMON: a light-weight-cryptographic algorithm for IoT Applications, Multimed Tools Appl (MTAP), 78, pp. 32633-32657, (2019)
[10]  
Singh A., Et al., Redefining food safety traceability system through blockchain: findings, challenges and open issues, Multimed Tools Appl (MTAP), 82, 14, pp. 21243-21277, (2023)