Mohammed Aabed Sameh Awaideh Abdul-Rahman Elshafei.

Slides:



Advertisements
Similar presentations
Don’t Type it! OCR it! How to use an online OCR..
Advertisements

Classical Encryption Techniques Week 6-wend. One-Time Pad if a truly random key as long as the message is used, the cipher will be secure called a One-Time.
Standard Grade Notes General Purpose Packages. These are Software packages which allow the user to solve a range of problems.
Data Compression CS 147 Minh Nguyen.
Michael Alves, Patrick Dugan, Robert Daniels, Carlos Vicuna
Lecture # 20 Image and Data Compression. Data Compression.
ACOT Intro/Copyright Succeeding in Business with Microsoft Excel 2010: Chapter1.
The Binary Numbering Systems
Programming Types of Testing.
1 Adnan Gutub Computer Engineering King Fahd University of Petroleum & Minerals Saudi Arabia A Novel Arabic Text Steganography Method Using Letter Points.
Mohammed Aabed Sameh Awaideh Abdul-Rahman Elshafei.
ARABIC TEXT STEGANOGRAPHY USING MULTIPLE DIACRITICS Adnan Gutub Yousef Elarian Sameh Awaideh Aleem Alvi Computer Engineering Department King Fahd University.
CSCI 3 Chapter 1.8 Data Compression. Chapter 1.8 Data Compression  For the purpose of storing or transferring data, it is often helpful to reduce the.
Connecting with Computer Science, 2e
Chapter 8_2 Bits and the "Why" of Bytes: Representing Information Digitally.
Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible.
Document and Query Forms Chapter 2. 2 Document & Query Forms Q 1. What is a document? A document is a stored data record in any form A document is a stored.
1/25 Writing Character sets Unicode Input methods.
S OFTWARE AND M ULTIMEDIA Chapter 6 Created by S. Cox.
Improving Security and Capacity for Arabic Text Steganography Using 'Kashida' Extensions By : Fahd Al-Haidari Adnan Gutub Khalid Al-Kahsah Jamil Hamodi.
Using Multiple Diacritics in Arabic Scripts for Steganography By Yousef Salem Elarian Aleem Khalid Alvi 1.
Connecting with Computer Science 2 Objectives Learn why numbering systems are important to understand Refresh your knowledge of powers of numbers Learn.
Lesson 15 Getting Started with PowerPoint Essentials
Computational Methods to Vocalize Arabic Texts H. Safadi*, O. Al Dakkak** & N. Ghneim**
Topics Introduction Hardware and Software How Computers Store Data
1 Lab Session-III CSIT-120 Fall 2000 Revising Previous session Data input and output While loop Exercise Limits and Bounds Session III-B (starts on slide.
Steganography Steganography refers to any methodology used to hide a message (including text, sound, or picture) in a separate file. Most commonly text.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
General Computer Science for Engineers CISC 106 Lecture 02 Dr. John Cavazos Computer and Information Sciences 09/03/2010.
Foundations of Computer Science Computing …it is all about Data Representation, Storage, Processing, and Communication of Data 10/4/20151CS 112 – Foundations.
Hill Cipher Developed by the mathematician Lester Hill in The encryption algorithm takes m successive plain text and substitute for them m cipher.
Chapter 4 Test.  Drive Organize  Folder Name or Rename  File Move or Copy  Save As Delete  Extension s Save As or Copy  Shortcut.
 2008 Pearson Education, Inc. All rights reserved Introduction to XHTML.
Digital Logic Lecture 4 Binary Codes The Hashemite University Computer Engineering Department.
STATISTIC & INFORMATION THEORY (CSNB134) MODULE 8 INTRODUCTION TO INFORMATION THEORY.
Module :MA3036NI Cryptography and Number Theory Lecture Week 3 Symmetric Encryption-2.
Understand business uses of presentation software and methods of distribution.
CS 111 – Sept. 10 Quiz Data compression –text –images –sounds Commitment: –Please read rest of chapter 1. –Department picnic next Wednesday.
The LZ family LZ77 LZ78 LZR LZSS LZB LZH – used by zip and unzip
Huffman coding Content 1 Encoding and decoding messages Fixed-length coding Variable-length coding 2 Huffman coding.
Reversible hiding in DCT-based compressed images Authors:Chin-Chen Chang, Chia-Chen Lin, Chun-Sen Tseng and Wei-Liang Tai Adviser: Jui-Che Teng Speaker:
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Fourth Quarter.
Chapter 4. Drive – The largest storage area. The C: Drive is usually the hard drive, but you can have other drives on your network or on a separate device.
Work with Tables and Database Records Lesson 3. NAVIGATING AMONG RECORDS Access users who prefer using the keyboard to navigate records can press keys.
Several Steganography Techniques 1. Write secret messages using invisible ink. 2.The hidden message in the body of delegates: also in ancient Greece.
Using Multiple Diacritics in Arabic Scripts for Steganography By Yousef Salem Elarian Aleem Khalid Alvi.
Computer Literacy BASICS: A Comprehensive Guide to IC 3, 5 th Edition Lesson 3 Windows File Management 1 Morrison / Wells / Ruffolo.
 Image based Steganography  Previous Work  Message Concealment Techniques  Using Punctuation Marks  Using modified Scytale Cipher  S-Tools Software.
Implementation of Steganographic Techniques Danny Friedheim pd. 2.
Skill Area 311 Part B. Lecture Overview Assembly Code Assembler Format of Assembly Code Advantages Assembly Code Disadvantages Assembly Code High-Level.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Third Quarter.
Keyboarding Mastery. Proofreader’s Marks What are “Proofreader’s Marks”? Proofreader’s Marks are used by writers to indicate changes they think should.
CS 101 – Sept. 11 Review linear vs. non-linear representations. Text representation Compression techniques Image representation –grayscale –File size issues.
MANAGEMENT OF STEGANOGRAPHY OLALEKAN A. ALABI COSC 454.
Information Technology (IT). Information Technology – technology used to create, store, exchange, and use information in its various forms (business data,
Binary Representation in Text
Binary Representation in Text
Basic Computer Vocabulary
ENCODING AND SENDING FORMATTED TEXT
Procedure for Developing a Multimedia Presentation
Procedure for Developing a Multimedia Presentation
Welcome
Steganography Example
Adnan Abdul-Aziz Gutub* and Ahmed Ali Al-Nazer
National 5 Computing Science Specimen Question Paper
Procedure for Developing a Multimedia Presentation
Chapter 9: Huffman Codes
Visit for more Learning Resources
Topics Introduction Hardware and Software How Computers Store Data
COMS 161 Introduction to Computing
Presentation transcript:

Mohammed Aabed Sameh Awaideh Abdul-Rahman Elshafei

Arabic Diacritics حركات Based Steganography Steganography is the ability of hiding information in redundant bits of any unremarkable cover media. This presentation will discuss new Arabic text steganography schemes. IntroductionBackgroundProposed ApproachResults & Analysis

Difficulties of Text Steganography In steganography, the cover media used to hide the message can be text, image, video or audio files. Using text media for this purpose is considered the hardest ! Text data does not have much needless information within the essential data. Fig. 1: Text Steganography Using Tex

Arabic Based Steganography Arabic language is the largest living member of the Semitic language family in terms of speakers. (270 million speakers). It contains 28 alphabet characters; 15 of which have points. اللٌّغَةُ Characters with no points Characters with one point Characters with two points Characters with three points أ ح د ر س ص ط ع ك ل م هـ و ب ج خ ذ ز ض ظ غف نب ج خ ذ ز ض ظ غف ن ت ق يت ق يث شث ش Fig. 2: Arabic Alphabet

Previous Approaches Vertical displacement of the points in the Arabic alphabet to hide information. Using letter points and extensions to hide data. Fig. 3: Using vertical displacement to hide data (M. Hassan Shirali-Shahreza, Mohammad Shirali-Shahreza ) Fig. 4: Using extensions to hide data (A. Gutub )

Diacritics (Harakat – حركات ) Arabic language uses eight symbols as diacritical marks. It is used to alter the pronunciation of a phoneme or to distinguish between words of similar spelling. The use of diacritics in the text is optional in written Standard Arabic. Diacritics َ Fatha ً Tanwin Fatha ُ Damma ٌ Tanwin Damma ِ Kasra ٍ Tanwin Kasra ْ Sukun ّ Shadda Fig. 5: Arabic Diacritics

Fig. 6: Statistics

Using Diacritics To Hide Data Analysis indicates that in standard Arabic the frequency of one diacritic, namely Fatha, is almost equal to the occurrence of the other seven diacritics. Assign a 1 to the diacritic Fatha and the remaining seven diacritics will represent a 0. Use a cover media that is empty of diacritics. Fig. 7: Diactrized and non-diactrized text

 To encode a value of 1 the algorithm looks for the first location where a Fatha can be placed and inserts the diacritic Fatha in the text.  Location determination is based on the rules defined by the Standard Arabic language grammar and syntax.  Or we can compare it to a copy of the cover media that is already diactrized (faster, and less complex) Syntactically Correct

Mix It Up! Next, the algorithm looks for the next location where a Fatha can be placed if another 1 needs to be inserted and adds the Fatha. Otherwise, to insert a bit value of 0 the algorithm locates the first next position where any of the other diacritics can be inserted and adds that diacritic. This process is repeated for as long as there are bits remaining to be hidden. Fig. 9: Encoding the sequence

Reusing The Cover Media The output file will have less diacritics than the original cover media (because of deletion). This means that reusing the same document more than once will mean less capacity. A research group at IBM has proposed techniques for restoration of Arabic diacritics based on maximum entropy. Fig. 10: Error rate in % for n-gram diacritic restoration

Results Compared to other techniques, capacity is the highest if a fully diactrized document is used as cover media. Ambiguity is dependent on the reader’s familiarity with Arabic language. Robustness is high since it can withstand: Printing Retyping Font changing OCR File Type File Size (Bytes) Cover Size (Bytes) Capacity (%).txt10,356318, %.wav43,4681,334, %.jpg23,796717, %.cpp10,356318, % Average3.27 % File Type File Size (Bytes) Cover Size (Bytes) Capacity (%).txt %.html %.cpp %.gif % Average1.22 % Table 1: Diacritics Technique Table 2: Kashida Technique

Analysis Advantages Approach is easily implemented using software. It produces high capacity. Can be modified for more ambiguity (Use one of the diacritics as dummy diacritic, or as a switching diacritic) Fairly robust. Can withstand OCR, retyping, printing and font changing. Disadvantages Medium to low ambiguity. Sending Arabic message with diacritics might raise suspicions nowadays. Arabic font has different encodings on different machines, can be computer dependant.