Hiding Shares of Counting-Based Secret Sharing via Arabic Text Steganography for Personal Usage

被引:0
作者
Adnan Gutub
Khaled Alaseri
机构
[1] Umm Al-Qura University,Computer Engineering Department
来源
Arabian Journal for Science and Engineering | 2020年 / 45卷
关键词
Arabic text steganography; Counting-based secret sharing; Information security; Kashida steganography; Key management; Key remembrance;
D O I
暂无
中图分类号
学科分类号
摘要
This paper presented new models to hide sensitive data via Arabic text steganography. The models are structured to serve personal remembrance of secret shares to be used within counting-based secret sharing technique. This research hides secret shares adopting humanized remembrance tool to serve uncontrolled assigned shares, which are generated from the security system via automatically authentic target key generation process. The shares in their original secret sharing process are challenging to be memorized unlike normal password assignment that is enjoying the full personal selection. Therefore, our models for hiding secret shares are proposed to be hidden inside the personally chosen texts utilizing improved Arabic text steganography. This steganography models study is based on Kashida extension character used redundant within Arabic writing text. The research tests our two proposed modifications to original Arabic text steganography all serving secret sharing on the same text database. The comparisons examined the different models on the same benchmark of Imam Nawawi’s forty hadeeth collected by Islamic Scholar: Yahya ibn Sharaf an-Nawawi as standard text statements (40 Prophet Hadiths) showing interesting results and promising research contributions.
引用
收藏
页码:2433 / 2458
页数:25
相关论文
共 112 条
  • [1] Shamir A(1979)How to share a secret Commun. ACM 22 612-613
  • [2] Alassaf N(2018)Enhancing speed of SIMON: a light-weight-cryptographic algorithm for IoT applications Multimed. Tools Appl. Int. J 37 103-120
  • [3] Gutub A(2004)Efficient scalable VLSI architecture for Montgomery inversion in GF (p) Integr. VLSI J. 2 151-157
  • [4] Parah S(2014)2-Layer security system for hiding sensitive text data on personal computers Lect. Notes Inf. Theory 1 8-18
  • [5] Al Ghamdi M(2018)Enhancing PC Data Security via combining RSA cryptography and video based steganography JISCR 2 9-18
  • [6] Gutub A(2017)Data visualization to explore improving decision-making within Hajj services Sci. Model. Res. 31 541-555
  • [7] Tenca AF(2015)Velocity-based modeling of physical interactions in dense crowds Vis. Comput. 32 1141-1146
  • [8] Al-Otaibi N(2014)Information gathering schemes for collaborative sensor devices Proc. Comput. Sci. 2350 111-118
  • [9] Gutub A(2013)Users’ evaluation of rail systems in mass events: case study in Mecca, Saudi Arabia Transp. Res. Rec. J. Transp. Res. Board 29 1277-1292
  • [10] Al-Juaid N(2012)Microscopic modeling of large-scale pedestrian–vehicle conflicts in the city of Madinah, Saudi Arabia J. Adv. Transp. 8 55-72