Arabic Text Steganography Based on Deep Learning Methods

被引:11
作者
Adeeb, Omer Farooq Ahmed [1 ]
Kabudian, Seyed Jahanshah [1 ]
机构
[1] Razi Univ, Dept Elect & Comp Engn, Kermanshah 6718773654, Iran
关键词
Steganography; Artificial intelligence; Symbols; Natural language processing; Linguistics; Codes; Deep learning; Text processing; Information sharing; Text steganography; hiding information; letter frequency; LSTM; Baudot code;
D O I
10.1109/ACCESS.2022.3201019
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Steganography is one of the oldest methods for securely sending and transferring secret information between two people without raising suspicion. Recently, the use of Artificial Intelligence (AI) has become simpler and more widely used. Since the emergence of natural language processing (NLP), building language models using deep learning has become more. Furthermore, because of the importance of concealing secret information in delivered messages, Artificial Intelligence theories along with Natural Language Processing algorithms were employed to conceal secret information within the text cover. The Arabic language was used because of its large number of words, vocabulary, and linguistic meanings, and its most significant feature is Arabic poetry. This study discovered a new way to hide secret data inside newly formulated Arabic poetry based on previous Arabic poetic texts and a database of a number of Arab poets from the ancient and modern eras using Artificial Intelligence and Long Short-Term Memory (LSTM) theories to increase storage capacity by 45 percent. The linguistic accuracy and volume of secret data hidden within the formulated poetry were increased using a Baudot Code algorithm, where the secret data is hidden at the level of letters rather than words, and the linguistic accuracy and volume of secret data hidden within the formulated poetry were increased to eliminate the drawbacks found in previous studies.
引用
收藏
页码:94403 / 94416
页数:14
相关论文
共 45 条
[1]  
Adnan G., 2010, Bahria University Journal of Information Communication Technology, V3, P68
[2]  
Ahmadoh Esraa Mohammad, 2015, Lecture Notes on Information Theory, V3, P42, DOI 10.18178/lnit.3.1.42-47
[3]  
Ahmed H. M., 2016, MUSTANSIRIYAH J SCI, V17, P397
[4]  
Al Azzawi A. F., 2019, INT J NETW SECUR APP, V11, P27, DOI [10.5121/ijnsa.2019.11103.855, DOI 10.5121/IJNSA.2019.11103.855]
[5]  
Al-Azawi A. F., 2010, Journal of Applied Sciences, V10, P436, DOI 10.3923/jas.2010.436.439
[6]   Improving Security and Capacity for Arabic Text Steganography Using 'Kashida' Extensions [J].
Al-Haidari, Fahd ;
Gutub, Adnan ;
Al-Kahsah, Khalid ;
Hamodi, Jameel .
2009 IEEE/ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1 AND 2, 2009, :396-399
[7]   Utilizing pseudo-spaces to improve Arabic text steganography for multimedia data communications [J].
Al-Nofaie, Safia Meteb Awad ;
Gutub, Adnan Abdul-Aziz .
MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (1-2) :19-67
[8]   Efficient security and capacity techniques for Arabic text steganography via engaging Unicode standard encoding [J].
Alanazi, Norah ;
Khan, Esam ;
Gutub, Adnan .
MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (01) :1403-1431
[9]   Inclusion of Unicode Standard seamless characters to expand Arabic text steganography for secure individual uses [J].
Alanazi, Norah ;
Khan, Esam ;
Gutub, Adnan .
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2020, 34 (04) :1343-1356
[10]   Utilizing Word Space with Pointed and Un-pointed Letters for Arabic Text Watermarking [J].
Alotaibi, Reem A. ;
Elrefaei, Lamiaa A. .
2016 UKSIM-AMSS 18TH INTERNATIONAL CONFERENCE ON COMPUTER MODELLING AND SIMULATION (UKSIM), 2016, :111-116