Easy to search. Easy to read. Easy to cite with credible sources.
M. Shirali-Shahreza and S. Shirali-Shahreza
Journal of Applied Sciences, 2008, 8(22), 4173-4179.
One of the methods introduced for establishing hidden communication is steganography. Steganography is the art of hiding information in a cover media without attracting attention. Text documents are one of the common cover media used for steganography in past. Steganography in text is more difficult than other media because there is a little redundant information in text documents. In this study, we propose a high capacity text steganography method. Our method can hide about 400 bits in each kilobyte of text. In Persian and Arabic, each letter can have four different shapes regarding to its position in the word. In this method this feature of Persian and Arabic languages is used for information hiding. In the Unicode Standard, there are different codes for different forms of each letter in addition to the code for letter presentation. This method has a high hiding capacity, because it hides one bit in each letter. Also, this method does not make any apparent changes in the original text and has a perfect perceptual transparency.
ASCI-ID: 35-2647
Journal of Applied Sciences, 2010, 10(5), 436-439.
Journal of Applied Sciences, 2010, 10(16), 1825. DOI: 10.3923/jas.2010.1825.1833
Investigate the Capability of Applying Hidden Data in Text File: An OverviewJournal of Applied Sciences, 2010, 10(17), 1916. DOI: 10.3923/jas.2010.1916.1922
On the Differences between Hiding Information and Cryptography Techniques: An OverviewJournal of Applied Sciences, 2010, 10(15), 1650. DOI: 10.3923/jas.2010.1650.1655
An Overview on Hiding Information Technique in ImagesJournal of Applied Sciences, 2010, 10(18), 2094. DOI: 10.3923/jas.2010.2094.2100
Hiding data in video file: An overview.Journal of Applied Sciences, 2010, 10(15), 1644. DOI: 10.3923/jas.2010.1644.1649
Stego on 2n:1 Platform for Users and EmbeddingInformation Technology Journal, 2011, 10(10), 1896. DOI: 10.3923/itj.2011.1896.1907
Pixel Forefinger for Gray in Color: A Layer by Layer StegoInformation Technology Journal, 2012, 11(1), 9. DOI: 10.3923/itj.2012.9.19
Inverted Pattern in Inverted Time Domain for Icon SteganographyInformation Technology Journal, 2012, 11(5), 587. DOI: 10.3923/itj.2012.587.595
Random Image Steganography and Steganalysis: Present Status and Future DirectionsInformation Technology Journal, 2012, 11(5), 566. DOI: 10.3923/itj.2012.566.576
Utilizing pseudo-spaces to improve Arabic text steganography for multimedia data communicationsMultimedia Tools and Applications, 2019, (), . DOI: 10.1007/s11042-019-08025-x
Securing Data via Cryptography and Arabic Text SteganographySN Computer Science, 2021, 2(1), . DOI: 10.1007/s42979-020-00438-y
A Survey on Different Arabic Text Steganography Techniques2021 1st International Conference on Emerging Smart Technologies and Applications (eSmarTA), 2021, (), 1. DOI: 10.1109/eSmarTA52612.2021.9515740