Using Multiple Diacritics in Arabic Scripts for Steganography By Yousef Salem Elarian Aleem Khalid Alvi.

Slides:



Advertisements
Similar presentations
The Arabic Alphabet By Bryce Casper.
Advertisements

Classical Encryption Techniques Week 6-wend. One-Time Pad if a truly random key as long as the message is used, the cipher will be secure called a One-Time.
Queen’s University, Kingston, Canada
BMP Hide ‘n’ Seek What is BMP Hide ‘n’ Seek ? –It’s a tool that lets you hide text messages in BMP files without much visible change in the picture. –Change.
Segmentation of Touching Characters in Devnagari & Bangla Scripts Using Fuzzy MultiFactorial Analysis Presented By: Sanjeev Maharjan St. Xavier’s College.
Mohammed Aabed Sameh Awaideh Abdul-Rahman Elshafei.
1 Adnan Gutub Computer Engineering King Fahd University of Petroleum & Minerals Saudi Arabia A Novel Arabic Text Steganography Method Using Letter Points.
ARABIC TEXT STEGANOGRAPHY USING MULTIPLE DIACRITICS Adnan Gutub Yousef Elarian Sameh Awaideh Aleem Alvi Computer Engineering Department King Fahd University.
1 of 30 1 st Derivative The formula for the 1 st derivative of a function is as follows: It’s just the difference between subsequent values and measures.
Adnan Gutub Mahmoud Ankeer Muhammad AbuGhalioun
Improving Security and Capacity for Arabic Text Steganography Using 'Kashida' Extensions By : Fahd Al-Haidari Adnan Gutub Khalid Al-Kahsah Jamil Hamodi.
Using Multiple Diacritics in Arabic Scripts for Steganography By Yousef Salem Elarian Aleem Khalid Alvi 1.
Chapter 2 – Classical Encryption Techniques
Development of Written Language
Dale & Lewis Chapter 3 Data Representation
TYPOGRAPHY - DFP b6 Typeface Classifications. What is a font? Complete set of type of a particular face, style, and point size. Question: How many are.
A Method for Protecting Digital Images from Being Copied Illegally Chin-Chen Chang, Jyh-Chiang Yeh, and Ju-Yuan Hsiao.
Three Novel Algorithms for Hiding Data in PDF Files Based on Incremental Updates Li Lei School of Information Science and Technology Sun Yat-Sen University.
Hill Cipher Developed by the mathematician Lester Hill in The encryption algorithm takes m successive plain text and substitute for them m cipher.
Basics of Typography. Typography (“type”) concerns the appearance of characters (letters), words, paragraphs, columns, etc. By comparison, the term “text”
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Module :MA3036NI Cryptography and Number Theory Lecture Week 3 Symmetric Encryption-2.
1 影像偽裝術的最新發展 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
1 Intrusion Detection Auditing, Watermarking Dec 7, 2006 Lecture 10 IS 2150 / TEL 2810 Introduction to Security.
XP Tutorial 8 Adding Interactivity with ActionScript.
Mutual Information, Joint Entropy & Conditional Entropy
Designing an Embedded Algorithm for Data Hiding using Steganographic Technique by File Hybridization G. Sahoo1 and R. K. Tiwari2 Presented by Pan Meng.
Date of download: 6/2/2016 Copyright © 2016 SPIE. All rights reserved. The Ottoman alphabet without diacritics and dots. Letters in the rectangles are.
A NOVEL STEGANOGRAPHY METHOD VIA VARIOUS ANIMATION EFFECTS IN POWERPOINT FILES Internal guide Mrs. Hilda By Syed Ashraf ( ) Sushil sharma ( )
Print the sample banner slides or customize with your own message. Click on the letter and type your own text. Use one character per slide. Cut along dotted.
Print the sample banner slides or customize with your own message. Click on the letter and type your own text. Use one character per slide. C.
Working with Cascading Style Sheets
The Invention of Writing
3.3 Fundamentals of data representation
Information Hiding Technology: Current Research and Future Trend
Adnan Abdul-Aziz Gutub* and Ahmed Ali Al-Nazer
An Information Hiding Scheme Using Sudoku
Information Steganography Using Magic Matrix
Chair Professor Chin-Chen Chang Feng Chia University Aug. 2008
Information Steganography Using Magic Matrix
Handwriting Analysis Like Fingerprints, every person’s handwriting is unique and personalized Handwriting is difficult to disguise or forge Questioned.
Presenting information as bit patterns
Steganography Techniques and their use in Anonymity
Dots 5 × TABLES MULTIPLICATION.
Dots 5 × TABLES MULTIPLICATION.
Dots 2 × TABLES MULTIPLICATION.
Embedding Secrets Using Magic Matrices
5 × 7 = × 7 = 70 9 × 7 = CONNECTIONS IN 7 × TABLE
5 × 8 = 40 4 × 8 = 32 9 × 8 = CONNECTIONS IN 8 × TABLE
Dots 3 × TABLES MULTIPLICATION.
Dots 6 × TABLES MULTIPLICATION.
4 × 6 = 24 8 × 6 = 48 7 × 6 = CONNECTIONS IN 6 × TABLE
5 × 6 = 30 2 × 6 = 12 7 × 6 = CONNECTIONS IN 6 × TABLE
Reversible Data Hiding Scheme Using Two Steganographic Images
Information Steganography Using Magic Matrix
Dots 2 × TABLES MULTIPLICATION.
Dots 4 × TABLES MULTIPLICATION.
10 × 8 = 80 5 × 8 = 40 6 × 8 = CONNECTIONS IN 8 × TABLE MULTIPLICATION.
3 × 12 = 36 6 × 12 = 72 7 × 12 = CONNECTIONS IN 12 × TABLE
Do Now: Brainstorm and Write your Ideas in your Notebook
一種兼顧影像壓縮與資訊隱藏之技術 張 真 誠 國立中正大學資訊工程學系 講座教授
The Scarlet Letter Project
5 × 12 = × 12 = × 12 = CONNECTIONS IN 12 × TABLE MULTIPLICATION.
Information Hiding Techniques Using Magic Matrix
5 × 9 = 45 6 × 9 = 54 7 × 9 = CONNECTIONS IN 9 × TABLE
Steganographic Systems for Secret Messages
3 × 7 = 21 6 × 7 = 42 7 × 7 = CONNECTIONS IN 7 × TABLE
Dots 3 × TABLES MULTIPLICATION.
Presentation transcript:

Using Multiple Diacritics in Arabic Scripts for Steganography By Yousef Salem Elarian Aleem Khalid Alvi

Contents Introduction The classification tree of steganography Characteristics of the Arabic Script Related Work ApproachesEvaluation

Introduction Stenography is the approach of hiding the very existence of secret messages.

The classification tree of steganography

Characteristics of the Arabic Script The Arabic alphabet has Semitic origins derived from the Aramaic writing system Arabic diacritic marks decorate consonant letters to specify (short) vowels Dots and connectivity are two inherent characteristics of Arabic characters Arabic basic alphabet of 28 letters, 15 have from one to three points, four letters can have a Hamzah, and one, ALEF, can be adorned by the elongation stroke, the Maddah

Related Work Little has been proposed for Arabic script steganography Two inherent properties of Arabic writing, however, have been proposed: dots and connectability. First work reveals their need for new fonts by introducing kashidah’s before/after such characters The second suggestion would be to use Hamzated characters along with dotted ones.

Approaches ScenarioApproachExtradiacritics 1 st scenario (stream) Repeat the first diacritic 49 times. (49 = (110001) b ) st scenario block size=2 Repeat the first diacritic 3 times (3 = (11) b ), the second one 0 times (0 = (00) b ), and the third one 1 time (1 = (01) b ) = 4. 2 nd scenario (RLEstart=1) Repeat the first diacritic 2 times (2 = number of 1’s in (11) b ), the second one 3 times (3 = number of 0’s in (000) b ), and the third one 1 time (for 1). (2-1) + (3-1) + (1-1) = 3.

Figure 1: The degree of brightness of the diacritic marks repeated 1, 2, 3, 4 and 5 times each Approaches cont..

ApproachCapacityrobustnesssecurity Text + softcopy High, up to infinity in 1 st scenario. Not robust to printing. Invisible, but in the code. Image + softcopy Very low, due to image overhead. Robust to printing. Slightly visible. Sizeable. Image + hardcopy Moderate, 1 st scenario, blocks of 2. Robust to printing. Slightly visible. Approaches cont.. Table 2: Comparison between the two approaches in terms of capacity, robustness and security.

Evaluation Kashidahposition Dots exclude hamzahs Dotted include hamzahs Before dotted character After dotted character Table 2: The ratio of maximum usable to total characters in CCA, according four variations of the kashidh approach

The End