Title :
Steganography by multipoint Arabic letters
Author :
Odeh, Ammar ; Alzubi, A. ; Hani, Q.B. ; Elleithy, Khaled
Author_Institution :
Dept. of Comput. Sci. & Eng., Univ. of Bridgeport, Bridgeport, CT, USA
Abstract :
Security methodologies are taken into consideration for many applications, where transferring sensitive data over network must be protected from any intermediate attacker. Privacy of data can be granted using encryption, by changing transmitted data into cipher form. Apart from encryption, hiding data represents another technique to transfer data without being noticeable by an attacker. This technique is called Steganography. In this paper, we will discuss the main concepts of Steganography and a carrier media that is used for this goal. Employing text as mask for other text represents the most difficult method that can be used to hide data. We will discuss some algorithms that use Arabic text. We then describe our doted space methodology to enhance data hiding.
Keywords :
cryptography; data privacy; natural language processing; steganography; text analysis; Arabic text; carrier media; cipher form; data hiding; data privacy; encryption; intermediate attacker; multipoint Arabic letters; security methodology; steganography; transferring sensitive data; Algorithm design and analysis; Classification algorithms; Flowcharts; Media; Optical character recognition software; Receivers; Semantics; Persian/Arabic Text; Steganography; audio steganography; carrier file; image steganography; information hiding; steganalysis; stego medium; stego_key; text steganograph;
Conference_Titel :
Systems, Applications and Technology Conference (LISAT), 2012 IEEE Long Island
Conference_Location :
Farmingdale, NY
Print_ISBN :
978-1-4577-1342-2
DOI :
10.1109/LISAT.2012.6223209