Adnan Abdul-Aziz Gutub* and Ahmed Ali Al-Nazer

Slides:



Advertisements
Similar presentations
Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.
Advertisements

Mohammed Aabed Sameh Awaideh Abdul-Rahman Elshafei.
KING FAHD UNIVERSITY OF PETROLEUM AND MINERALS COLLEGE OF ENVIRONMENTAL DESIGN Dhahran, Saudi Arabia THERMAL AND ECONOMIC PERFORMANCE OF INSULATION FOR.
1 EFFICIENT ADDERS TO SPEEDUP MODULAR MULTIPLICATION FOR CRYPTOGRAPHY Adnan Gutub Hassan Tahhan Computer Engineering Department KFUPM, Dhahran, SAUDI ARABIA.
1 Adnan Gutub Computer Engineering King Fahd University of Petroleum & Minerals Saudi Arabia A Novel Arabic Text Steganography Method Using Letter Points.
Copyright: All rights reserved.Not to be reproduced by any means without prior permission 1 Coordinator Dr. Sadiq M. Sait Department of Computer Engineering.
RGB Intensity Based Variable- Bits Image Steganography 2008 IEEE Asia-Pacific Services Computing Conference (APSCC 2008) 1 st International Workshop on.
King Fahd University of Petroleum and Minerals Electrical Engineering Department EE-400 Telecommunication Networks Internet Protocol Version 6 IPv6 Abdul.
ME 307 Machine Design I Dr. A. Bazoune Chapter 7: Fatigue Failure Resulting from variable Loading Dr. A. Aziz Bazoune King Fahd University of Petroleum.
ARABIC TEXT STEGANOGRAPHY USING MULTIPLE DIACRITICS Adnan Gutub Yousef Elarian Sameh Awaideh Aleem Alvi Computer Engineering Department King Fahd University.
1 ICS102: Introduction To Computing King Fahd University of Petroleum & Minerals College of Computer Science & Engineering Information & Computer Science.
A Hybrid Test Compression Technique for Efficient Testing of Systems-on-a-Chip Aiman El-Maleh King Fahd University of Petroleum & Minerals, Dept. of Computer.
An Efficient and Scalable Pattern Matching Scheme for Network Security Applications Department of Computer Science and Information Engineering National.
An Expandable Montgomery Modular Multiplication Processor Adnan Abdul-Aziz GutubAlaaeldin A. M. Amin Computer Engineering Department King Fahd University.
A Geometric-Primitives-Based Compression Scheme for Testing Systems-on-a-Chip Aiman El-Maleh 1, Saif al Zahir 2, Esam Khan 1 1 King Fahd University of.
Adnan Gutub Mahmoud Ankeer Muhammad AbuGhalioun
Improving Security and Capacity for Arabic Text Steganography Using 'Kashida' Extensions By : Fahd Al-Haidari Adnan Gutub Khalid Al-Kahsah Jamil Hamodi.
A Digitally Programmable Highly Linear Active-RC Filter by Hussain Alzaher Electrical Engineering Department King Fahd University of Petroleum & Minerals.
E - BOOK FOR COLLEGE ALGEBRA King Fahd University of Petroleum & Minerals A2 E - BOOK FOR COLLEGE ALGEBRA King Fahd University of Petroleum & Minerals.
Using Multiple Diacritics in Arabic Scripts for Steganography By Yousef Salem Elarian Aleem Khalid Alvi 1.
Secure Steganography in Audio using Inactive Frames of VoIP Streams
KING FAHD UNIVERSITY OF PETROLEUM & MINERALS DHAHRAN, SAUDI ARABIA ARE-512 Life Cycle Costing – Cost Data Bank For By G. C. SOFAT S.K. TYAGI Presented.
Three Novel Algorithms for Hiding Data in PDF Files Based on Incremental Updates Li Lei School of Information Science and Technology Sun Yat-Sen University.
E - BOOK FOR COLLEGE ALGEBRA King Fahd University of Petroleum & Minerals 2.2 E - BOOK FOR COLLEGE ALGEBRA King Fahd University of Petroleum & Minerals.
E - BOOK FOR COLLEGE ALGEBRA King Fahd University of Petroleum & Minerals 2.7 E - BOOK FOR COLLEGE ALGEBRA King Fahd University of Petroleum & Minerals.
Copyright: All rights reserved.Not to be reproduced by any means without prior permission 0-1 Coordinator Dr. Sadiq M. Sait Department of Computer Engineering.
Data Hiding in binary images using block parity Group ID -17 Guided by Mr. Pramod Ganjewar By – Sipendra Sinha Deepak Kumar Rohit Singh Amol Gaikwad Snehal.
E - BOOK FOR COLLEGE ALGEBRA King Fahd University of Petroleum & Minerals B.2 E - BOOK FOR COLLEGE ALGEBRA King Fahd University of Petroleum & Minerals.
A Virtual Distributed Honeynet at KFUPM: A Case Study Build a high-interaction honeynet environment at KFUPM’s two main campuses: The students’ living.
E - BOOK FOR COLLEGE ALGEBRA King Fahd University of Petroleum & Minerals 3.6 E - BOOK FOR COLLEGE ALGEBRA King Fahd University of Petroleum & Minerals.
STEGANOGRAPHY Sonya Febiatiningsih ( ) for further detail, please visit
1 Adaptive Data Hiding in Palette images by Color Ordering and Mapping With Security Protection Authors: Chih-Hsuan Tzeng, Zhi-Fang Yang, and Wen-Hsiang.
Data Hiding in a Kind of PDF Texts for Secret Communication Authors : S.P. Zhong, X.Q. Cheng, and T.R. Chen Source : International Journal of Network Security,
E - BOOK FOR COLLEGE ALGEBRA King Fahd University of Petroleum & Minerals 3.3 E - BOOK FOR COLLEGE ALGEBRA King Fahd University of Petroleum & Minerals.
A Measurement Based Memory Performance Evaluation of Streaming Media Servers Garba Isa Yau and Abdul Waheed Department of Computer Engineering King Fahd.
Using Multiple Diacritics in Arabic Scripts for Steganography By Yousef Salem Elarian Aleem Khalid Alvi.
Computer Networks Short Course Offered by: Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran, Saudi Arabia.
MULTIPLEXING Habib Youssef, Ph.D Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran, Saudi.
Title Authors Introduction Text, text, text, text, text, text Background Information Text, text, text, text, text, text Observations Text, text, text,
E - BOOK FOR COLLEGE ALGEBRA King Fahd University of Petroleum & Minerals 2.6 E - BOOK FOR COLLEGE ALGEBRA King Fahd University of Petroleum & Minerals.
人力資源報告 Image and Signal Processing 1 Steganography Using Sudoku Revisited Wien Hong, Tung-Shou Chen, Chih-Wei Shiu Department of Information Management,
Copyright: All rights reserved.Not to be reproduced by any means without prior permission 1 Coordinator Dr. Sadiq M. Sait Department of Computer Engineering.
Render Sequence Encoding for Document Protection
影像偽裝術 Dr. Chin-Chen Chang
網路環境中通訊安全技術之研究 Secure Communication Schemes in Network Environments
A Secret Information Hiding Scheme Based on Switching Tree Coding
An Information Hiding Scheme Using Sudoku
Information Steganography Using Magic Matrix
Model-based Steganography
Chair Professor Chin-Chen Chang Feng Chia University Aug. 2008
Information Steganography Using Magic Matrix
A Data Hiding Scheme Based Upon Block Truncation Coding
EFFICIENT ADDERS TO SPEEDUP MODULAR MULTIPLICATION FOR CRYPTOGRAPHY
Modern Digital System Design Using VHDL: A Practical Introduction
Esam Ali Khan M.S. Thesis Defense
Embedding Secrets Using Magic Matrices
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
Reversible Data Hiding Scheme Using Two Steganographic Images
Information Steganography Using Magic Matrix
A Data Hiding Method for Text Documents Using Multiple-Base Encoding
A High Embedding Capacity Approach to Adaptive Steganography
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Data hiding method using image interpolation
一種兼顧影像壓縮與資訊隱藏之技術 張 真 誠 國立中正大學資訊工程學系 講座教授
A Data Hiding Scheme Based Upon Block Truncation Coding
Information Hiding Techniques Using Magic Matrix
Steganographic Systems for Secret Messages
Wave Propagation In Amplifying Media
Rich QR Codes With Three-Layer Information Using Hamming Code
Reversible data hiding in encrypted binary images by pixel prediction
Presentation transcript:

Adnan Abdul-Aziz Gutub* and Ahmed Ali Al-Nazer MAXIMIZING STEGANOGRAPHY CAPACITY USING “KASHIDA” IN ARABIC TEXT (MSCUKAT) Adnan Abdul-Aziz Gutub* and Ahmed Ali Al-Nazer Computer Engineering Department King Fahd University of Petroleum & Minerals (KFUPM) Dhahran 31261, Saudi Arabia Report:Chun-Cheng Wang 2009/10/24

Outline INTRODUCTION BACKGROUND PROPOSED APPROACH IMPROVEMENTS EXPERIMENTS AND COMPARISONS SECURED MSCUKAT FUTURE WORK CONCLUSION

INTRODUCTION Hiding secret information in text is more challenging. Arabic characters are joined when writing words contain more than one character. Depending on the joined characters, an extension character “Kashida” may be embedded between two Arabic characters.

BACKGROUND

When the letter Lam is followed directly by four formats of the letter Alif , they are written in well known look: We exclude “Kashida” to come between those letters.

PROPOSED APPROACH

IMPROVEMENTS First, the capacity of cover media is increased to hide more secret information. Second, the file size increase after hiding the secret is reduced since we have less addition to the original cover media. Third, the security of the encoded cover media is enhanced.

EXPERIMENTS AND COMPARISONS P: the ratio of the applicable locations to hide 1s to the cover media length. Q: ration of the applicable locations to hide 0s to the cover media length.

Number of char is the number of first characters in the cover media that can hide the secret. Cover percentage is Number of char/Cover media length * 100; this gives the percentage of cover media that have been used to hide the secret. Secret ratio is the ratio between secret and cover media which equals to secret length/Number of char.

SECURED MSCUKAT

Skip-number = modular (cover-media-size, 5) Modular (current-location, skip-number) For example, if skip-number is 3, it means that it will hide the secret in all possible location for “Kashida” but it will skip the third possible from each five possible locations.

CONCLUSION The proposed approach is maximizing the use of “Kashida” to hide more information in Arabic text cover media. The improvements include increasing the capacity of cover media to hide more secret information, reducing the file size increase after hiding the secret and enhancing the security of the encoded cover media.