A Comparative Analysis of Arabic Text Steganography
Protecting sensitive information transmitted via public channels is a significant issue faced by governments, militaries, organizations, and individuals. Steganography protects the secret information by concealing it in a transferred object such as video, audio, image, text, network, or DNA. As text...
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2021-07-01
|
Series: | Applied Sciences |
Subjects: | |
Online Access: | https://www.mdpi.com/2076-3417/11/15/6851 |
_version_ | 1827686656597032960 |
---|---|
author | Reema Thabit Nur Izura Udzir Sharifah Md Yasin Aziah Asmawi Nuur Alifah Roslan Roshidi Din |
author_facet | Reema Thabit Nur Izura Udzir Sharifah Md Yasin Aziah Asmawi Nuur Alifah Roslan Roshidi Din |
author_sort | Reema Thabit |
collection | DOAJ |
description | Protecting sensitive information transmitted via public channels is a significant issue faced by governments, militaries, organizations, and individuals. Steganography protects the secret information by concealing it in a transferred object such as video, audio, image, text, network, or DNA. As text uses low bandwidth, it is commonly used by Internet users in their daily activities, resulting a vast amount of text messages sent daily as social media posts and documents. Accordingly, text is the ideal object to be used in steganography, since hiding a secret message in a text makes it difficult for the attacker to detect the hidden message among the massive text content on the Internet. Language’s characteristics are utilized in text steganography. Despite the richness of the Arabic language in linguistic characteristics, only a few studies have been conducted in Arabic text steganography. To draw further attention to Arabic text steganography prospects, this paper reviews the classifications of these methods from its inception. For analysis, this paper presents a comprehensive study based on the key evaluation criteria (i.e., capacity, invisibility, robustness, and security). It opens new areas for further research based on the trends in this field. |
first_indexed | 2024-03-10T09:18:55Z |
format | Article |
id | doaj.art-7fcc9c24ab564181908bb029418f7a98 |
institution | Directory Open Access Journal |
issn | 2076-3417 |
language | English |
last_indexed | 2024-03-10T09:18:55Z |
publishDate | 2021-07-01 |
publisher | MDPI AG |
record_format | Article |
series | Applied Sciences |
spelling | doaj.art-7fcc9c24ab564181908bb029418f7a982023-11-22T05:20:36ZengMDPI AGApplied Sciences2076-34172021-07-011115685110.3390/app11156851A Comparative Analysis of Arabic Text SteganographyReema Thabit0Nur Izura Udzir1Sharifah Md Yasin2Aziah Asmawi3Nuur Alifah Roslan4Roshidi Din5Faculty of Computer Science and Information Technology, Universiti Putra Malaysia, UPM, Serdang 43400, Selangor Darul Ehsan, MalaysiaFaculty of Computer Science and Information Technology, Universiti Putra Malaysia, UPM, Serdang 43400, Selangor Darul Ehsan, MalaysiaFaculty of Computer Science and Information Technology, Universiti Putra Malaysia, UPM, Serdang 43400, Selangor Darul Ehsan, MalaysiaFaculty of Computer Science and Information Technology, Universiti Putra Malaysia, UPM, Serdang 43400, Selangor Darul Ehsan, MalaysiaFaculty of Computer Science and Information Technology, Universiti Putra Malaysia, UPM, Serdang 43400, Selangor Darul Ehsan, MalaysiaSchool of Computing, College of Arts and Sciences, Universiti Utara Malaysia, Sintok 06010, Kedah, MalaysiaProtecting sensitive information transmitted via public channels is a significant issue faced by governments, militaries, organizations, and individuals. Steganography protects the secret information by concealing it in a transferred object such as video, audio, image, text, network, or DNA. As text uses low bandwidth, it is commonly used by Internet users in their daily activities, resulting a vast amount of text messages sent daily as social media posts and documents. Accordingly, text is the ideal object to be used in steganography, since hiding a secret message in a text makes it difficult for the attacker to detect the hidden message among the massive text content on the Internet. Language’s characteristics are utilized in text steganography. Despite the richness of the Arabic language in linguistic characteristics, only a few studies have been conducted in Arabic text steganography. To draw further attention to Arabic text steganography prospects, this paper reviews the classifications of these methods from its inception. For analysis, this paper presents a comprehensive study based on the key evaluation criteria (i.e., capacity, invisibility, robustness, and security). It opens new areas for further research based on the trends in this field.https://www.mdpi.com/2076-3417/11/15/6851information hidingcovert communicationtext hidingArabic scriptArabic characteristics |
spellingShingle | Reema Thabit Nur Izura Udzir Sharifah Md Yasin Aziah Asmawi Nuur Alifah Roslan Roshidi Din A Comparative Analysis of Arabic Text Steganography Applied Sciences information hiding covert communication text hiding Arabic script Arabic characteristics |
title | A Comparative Analysis of Arabic Text Steganography |
title_full | A Comparative Analysis of Arabic Text Steganography |
title_fullStr | A Comparative Analysis of Arabic Text Steganography |
title_full_unstemmed | A Comparative Analysis of Arabic Text Steganography |
title_short | A Comparative Analysis of Arabic Text Steganography |
title_sort | comparative analysis of arabic text steganography |
topic | information hiding covert communication text hiding Arabic script Arabic characteristics |
url | https://www.mdpi.com/2076-3417/11/15/6851 |
work_keys_str_mv | AT reemathabit acomparativeanalysisofarabictextsteganography AT nurizuraudzir acomparativeanalysisofarabictextsteganography AT sharifahmdyasin acomparativeanalysisofarabictextsteganography AT aziahasmawi acomparativeanalysisofarabictextsteganography AT nuuralifahroslan acomparativeanalysisofarabictextsteganography AT roshididin acomparativeanalysisofarabictextsteganography AT reemathabit comparativeanalysisofarabictextsteganography AT nurizuraudzir comparativeanalysisofarabictextsteganography AT sharifahmdyasin comparativeanalysisofarabictextsteganography AT aziahasmawi comparativeanalysisofarabictextsteganography AT nuuralifahroslan comparativeanalysisofarabictextsteganography AT roshididin comparativeanalysisofarabictextsteganography |