Call for Paper - May 2023 Edition
IJCA solicits original research papers for the May 2023 Edition. Last date of manuscript submission is April 20, 2023. Read More

Chinese Language Steganography using the Arabic Diacritics as a Covered Media

Print
PDF
International Journal of Computer Applications
© 2010 by IJCA Journal
Number 1 - Article 8
Year of Publication: 2010
Authors:
Ahmed Chalak Shakir
Gu Xuemai
Jia Min
10.5120/1543-2050

Ahmed Chalak Shakir, Gu Xuemai and Jia Min. Article:Chinese Language Steganography using the Arabic Diacritics as a Covered Media. International Journal of Computer Applications 11(1):43–46, December 2010. Published By Foundation of Computer Science. BibTeX

@article{key:article,
	author = {Ahmed Chalak Shakir and Gu Xuemai and Jia Min},
	title = {Article:Chinese Language Steganography using the Arabic Diacritics as a Covered Media},
	journal = {International Journal of Computer Applications},
	year = {2010},
	volume = {11},
	number = {1},
	pages = {43--46},
	month = {December},
	note = {Published By Foundation of Computer Science}
}

Abstract

Extensive use of digital media like text, image, audio, and video on the Interne generated a requirement for providing traffic security. For carrying out confidential communication over public networks, it was found that simply concealing the contents of a message using cryptography was not adequate. In this study the new procedure in steganography is developed by using the diacritics-Harakat- of Arabic language as a covered medium to hide the Chinese stroke text. So that in the Arabic language, the diacritics-Harakat- which are used to represent vowel sounds are not useful when writing and sending the documents because the receiver can clearly understand the text without needing the Harakat. The proposed approach uses eight different diacritical symbols in Arabic to hide binary bits in the original cover media. The embedded data are then extracted by reading diacritics from the document and translating them back to binary. Two diacritics are used to hide one Unicode character for strengthen the power of the security. The dictionary of English-Chinese and Chinese-English are stored in both sides. Finally the diacritics are saved in the covered media so that the receiver can use it for getting the original message.

Reference

  • Ahmed Ch. Shakir. “Stego Encrypted Message in any Language for Network Communication Using Quadratic Method”. Journal of Computer Science 6 (3): 320-322,. doi:10.1109/MC.1998.10029, (2010)
  • A. Gutub, Y. Elarian, S. Awaideh, and A. Alvi. “Arabic Text Steganography Using Multiple Diacritics”. Computer Engineering Department, King Fahd University of Petroleum & Minerals, Saudi Arabia.
  • Imed Zitouni *, Ruhi Sarikaya, “Arabic diacritic restoration approach basedon maximum entropy models”. IBM T.J. Watson Research Center, 1101 Kitchawan Road, Yorktown Heights, NY 10598, United States, doi:10.1016/j.csl.2008.06.001. (2008).
  • J. Memon, K. Khowaja, and H. Kazi. “Evaluation of Steganography for Urdo /Arabic Text”. Journal of Theoretical and Applied Information Technology.
  • L. Zengyin, A. Raymond, and B. Abdulhadi. “ A concise Course of Chinese”.Dar EL-CHIMAL printing publishing distributing, Tripoli, Lebanon- P.O.Box 57. Book, 1’st edition,
  • M. Aabed, S. Awaideh, A. Elshafei, and A. Gutub. “ Arabic Diacritics Based Steganography”. ICSPC. IEEE International Conference:756-759. doi:10.1109/.4728429(2007).