Refining Arabic text stego-techniques for shares memorization of counting-based secret sharing

Sensitive information requires many security systems to be protected by secret keys. One of these practical security systems is the so-called counting-based secret sharing, in which certain key portions are distributed to allow sharing access by specified number of real participants. Secret shares a...

Full description

Bibliographic Details
Main Authors: Adnan Abdul-Aziz Gutub, Khaled Aydh Alaseri
Format: Article
Language:English
Published: Elsevier 2021-11-01
Series:Journal of King Saud University: Computer and Information Sciences
Subjects:
Online Access:http://www.sciencedirect.com/science/article/pii/S1319157819302289
_version_ 1818360018450251776
author Adnan Abdul-Aziz Gutub
Khaled Aydh Alaseri
author_facet Adnan Abdul-Aziz Gutub
Khaled Aydh Alaseri
author_sort Adnan Abdul-Aziz Gutub
collection DOAJ
description Sensitive information requires many security systems to be protected by secret keys. One of these practical security systems is the so-called counting-based secret sharing, in which certain key portions are distributed to allow sharing access by specified number of real participants. Secret shares are hidden adopting a humanized remembrance tool to serve uncontrolled assigned shares, which are generated from the security system via an automatic authentic target key generation process. While in their counting-based secret sharing process, the shares become challenging to be memorized unlike the normal password assignment that enjoys full personal selection. Therefore, our secret shares models are proposed to be hidden inside the personally chosen texts utilizing improved Arabic text steganography. The current steganography models’ study is based on Kashida extension character that is redundant within Arabic writing text. We refined new models to hide data via Arabic text steganography used within counting-based secret sharing technique. The research tests our two proposed modifications to original Arabic text steganography and all are serving secret sharing on the same text database. The comparisons examined the different models on the same benchmark of 40 standard text statements (40 Prophet Hadiths). The results are significant and present promising research contributions.
first_indexed 2024-12-13T20:54:07Z
format Article
id doaj.art-26c9da7da34d48ed961d3bd06261b115
institution Directory Open Access Journal
issn 1319-1578
language English
last_indexed 2024-12-13T20:54:07Z
publishDate 2021-11-01
publisher Elsevier
record_format Article
series Journal of King Saud University: Computer and Information Sciences
spelling doaj.art-26c9da7da34d48ed961d3bd06261b1152022-12-21T23:31:47ZengElsevierJournal of King Saud University: Computer and Information Sciences1319-15782021-11-0133911081120Refining Arabic text stego-techniques for shares memorization of counting-based secret sharingAdnan Abdul-Aziz Gutub0Khaled Aydh Alaseri1Corresponding author.; Computer Engineering Department, Umm Al-Qura University, Makkah, Saudi ArabiaComputer Engineering Department, Umm Al-Qura University, Makkah, Saudi ArabiaSensitive information requires many security systems to be protected by secret keys. One of these practical security systems is the so-called counting-based secret sharing, in which certain key portions are distributed to allow sharing access by specified number of real participants. Secret shares are hidden adopting a humanized remembrance tool to serve uncontrolled assigned shares, which are generated from the security system via an automatic authentic target key generation process. While in their counting-based secret sharing process, the shares become challenging to be memorized unlike the normal password assignment that enjoys full personal selection. Therefore, our secret shares models are proposed to be hidden inside the personally chosen texts utilizing improved Arabic text steganography. The current steganography models’ study is based on Kashida extension character that is redundant within Arabic writing text. We refined new models to hide data via Arabic text steganography used within counting-based secret sharing technique. The research tests our two proposed modifications to original Arabic text steganography and all are serving secret sharing on the same text database. The comparisons examined the different models on the same benchmark of 40 standard text statements (40 Prophet Hadiths). The results are significant and present promising research contributions.http://www.sciencedirect.com/science/article/pii/S1319157819302289Arabic text steganographyCounting-based secret sharingInformation securityKashida steganographyKey managementKey remembrance
spellingShingle Adnan Abdul-Aziz Gutub
Khaled Aydh Alaseri
Refining Arabic text stego-techniques for shares memorization of counting-based secret sharing
Journal of King Saud University: Computer and Information Sciences
Arabic text steganography
Counting-based secret sharing
Information security
Kashida steganography
Key management
Key remembrance
title Refining Arabic text stego-techniques for shares memorization of counting-based secret sharing
title_full Refining Arabic text stego-techniques for shares memorization of counting-based secret sharing
title_fullStr Refining Arabic text stego-techniques for shares memorization of counting-based secret sharing
title_full_unstemmed Refining Arabic text stego-techniques for shares memorization of counting-based secret sharing
title_short Refining Arabic text stego-techniques for shares memorization of counting-based secret sharing
title_sort refining arabic text stego techniques for shares memorization of counting based secret sharing
topic Arabic text steganography
Counting-based secret sharing
Information security
Kashida steganography
Key management
Key remembrance
url http://www.sciencedirect.com/science/article/pii/S1319157819302289
work_keys_str_mv AT adnanabdulazizgutub refiningarabictextstegotechniquesforsharesmemorizationofcountingbasedsecretsharing
AT khaledaydhalaseri refiningarabictextstegotechniquesforsharesmemorizationofcountingbasedsecretsharing