A Comparative Analysis of Arabic Text Steganography

Protecting sensitive information transmitted via public channels is a significant issue faced by governments, militaries, organizations, and individuals. Steganography protects the secret information by concealing it in a transferred object such as video, audio, image, text, network, or DNA. As text...

Full description

Bibliographic Details
Main Authors: Reema Thabit, Nur Izura Udzir, Sharifah Md Yasin, Aziah Asmawi, Nuur Alifah Roslan, Roshidi Din
Format: Article
Language:English
Published: MDPI AG 2021-07-01
Series:Applied Sciences
Subjects:
Online Access:https://www.mdpi.com/2076-3417/11/15/6851
_version_ 1827686656597032960
author Reema Thabit
Nur Izura Udzir
Sharifah Md Yasin
Aziah Asmawi
Nuur Alifah Roslan
Roshidi Din
author_facet Reema Thabit
Nur Izura Udzir
Sharifah Md Yasin
Aziah Asmawi
Nuur Alifah Roslan
Roshidi Din
author_sort Reema Thabit
collection DOAJ
description Protecting sensitive information transmitted via public channels is a significant issue faced by governments, militaries, organizations, and individuals. Steganography protects the secret information by concealing it in a transferred object such as video, audio, image, text, network, or DNA. As text uses low bandwidth, it is commonly used by Internet users in their daily activities, resulting a vast amount of text messages sent daily as social media posts and documents. Accordingly, text is the ideal object to be used in steganography, since hiding a secret message in a text makes it difficult for the attacker to detect the hidden message among the massive text content on the Internet. Language’s characteristics are utilized in text steganography. Despite the richness of the Arabic language in linguistic characteristics, only a few studies have been conducted in Arabic text steganography. To draw further attention to Arabic text steganography prospects, this paper reviews the classifications of these methods from its inception. For analysis, this paper presents a comprehensive study based on the key evaluation criteria (i.e., capacity, invisibility, robustness, and security). It opens new areas for further research based on the trends in this field.
first_indexed 2024-03-10T09:18:55Z
format Article
id doaj.art-7fcc9c24ab564181908bb029418f7a98
institution Directory Open Access Journal
issn 2076-3417
language English
last_indexed 2024-03-10T09:18:55Z
publishDate 2021-07-01
publisher MDPI AG
record_format Article
series Applied Sciences
spelling doaj.art-7fcc9c24ab564181908bb029418f7a982023-11-22T05:20:36ZengMDPI AGApplied Sciences2076-34172021-07-011115685110.3390/app11156851A Comparative Analysis of Arabic Text SteganographyReema Thabit0Nur Izura Udzir1Sharifah Md Yasin2Aziah Asmawi3Nuur Alifah Roslan4Roshidi Din5Faculty of Computer Science and Information Technology, Universiti Putra Malaysia, UPM, Serdang 43400, Selangor Darul Ehsan, MalaysiaFaculty of Computer Science and Information Technology, Universiti Putra Malaysia, UPM, Serdang 43400, Selangor Darul Ehsan, MalaysiaFaculty of Computer Science and Information Technology, Universiti Putra Malaysia, UPM, Serdang 43400, Selangor Darul Ehsan, MalaysiaFaculty of Computer Science and Information Technology, Universiti Putra Malaysia, UPM, Serdang 43400, Selangor Darul Ehsan, MalaysiaFaculty of Computer Science and Information Technology, Universiti Putra Malaysia, UPM, Serdang 43400, Selangor Darul Ehsan, MalaysiaSchool of Computing, College of Arts and Sciences, Universiti Utara Malaysia, Sintok 06010, Kedah, MalaysiaProtecting sensitive information transmitted via public channels is a significant issue faced by governments, militaries, organizations, and individuals. Steganography protects the secret information by concealing it in a transferred object such as video, audio, image, text, network, or DNA. As text uses low bandwidth, it is commonly used by Internet users in their daily activities, resulting a vast amount of text messages sent daily as social media posts and documents. Accordingly, text is the ideal object to be used in steganography, since hiding a secret message in a text makes it difficult for the attacker to detect the hidden message among the massive text content on the Internet. Language’s characteristics are utilized in text steganography. Despite the richness of the Arabic language in linguistic characteristics, only a few studies have been conducted in Arabic text steganography. To draw further attention to Arabic text steganography prospects, this paper reviews the classifications of these methods from its inception. For analysis, this paper presents a comprehensive study based on the key evaluation criteria (i.e., capacity, invisibility, robustness, and security). It opens new areas for further research based on the trends in this field.https://www.mdpi.com/2076-3417/11/15/6851information hidingcovert communicationtext hidingArabic scriptArabic characteristics
spellingShingle Reema Thabit
Nur Izura Udzir
Sharifah Md Yasin
Aziah Asmawi
Nuur Alifah Roslan
Roshidi Din
A Comparative Analysis of Arabic Text Steganography
Applied Sciences
information hiding
covert communication
text hiding
Arabic script
Arabic characteristics
title A Comparative Analysis of Arabic Text Steganography
title_full A Comparative Analysis of Arabic Text Steganography
title_fullStr A Comparative Analysis of Arabic Text Steganography
title_full_unstemmed A Comparative Analysis of Arabic Text Steganography
title_short A Comparative Analysis of Arabic Text Steganography
title_sort comparative analysis of arabic text steganography
topic information hiding
covert communication
text hiding
Arabic script
Arabic characteristics
url https://www.mdpi.com/2076-3417/11/15/6851
work_keys_str_mv AT reemathabit acomparativeanalysisofarabictextsteganography
AT nurizuraudzir acomparativeanalysisofarabictextsteganography
AT sharifahmdyasin acomparativeanalysisofarabictextsteganography
AT aziahasmawi acomparativeanalysisofarabictextsteganography
AT nuuralifahroslan acomparativeanalysisofarabictextsteganography
AT roshididin acomparativeanalysisofarabictextsteganography
AT reemathabit comparativeanalysisofarabictextsteganography
AT nurizuraudzir comparativeanalysisofarabictextsteganography
AT sharifahmdyasin comparativeanalysisofarabictextsteganography
AT aziahasmawi comparativeanalysisofarabictextsteganography
AT nuuralifahroslan comparativeanalysisofarabictextsteganography
AT roshididin comparativeanalysisofarabictextsteganography