Search. Read. Cite.

Easy to search. Easy to read. Easy to cite with credible sources.

Research Article
High Capacity Persian/Arabic Text Steganography

M. Shirali-Shahreza and S. Shirali-Shahreza

Journal of Applied Sciences, 2008, 8(22), 4173-4179.


One of the methods introduced for establishing hidden communication is steganography. Steganography is the art of hiding information in a cover media without attracting attention. Text documents are one of the common cover media used for steganography in past. Steganography in text is more difficult than other media because there is a little redundant information in text documents. In this study, we propose a high capacity text steganography method. Our method can hide about 400 bits in each kilobyte of text. In Persian and Arabic, each letter can have four different shapes regarding to its position in the word. In this method this feature of Persian and Arabic languages is used for information hiding. In the Unicode Standard, there are different codes for different forms of each letter in addition to the code for letter presentation. This method has a high hiding capacity, because it hides one bit in each letter. Also, this method does not make any apparent changes in the original text and has a perfect perceptual transparency.

ASCI-ID: 35-2647

Cited References Fulltext

Related Articles

Arabic Text Steganography using Kashida Extensions with Huffman Code

Journal of Applied Sciences, 2010, 10(5), 436-439.

Cited By

On the Capacity and Security of Steganography Approaches: An Overview

Journal of Applied Sciences, 2010, 10(16), 1825. DOI: 10.3923/jas.2010.1825.1833

Investigate the Capability of Applying Hidden Data in Text File: An Overview

Journal of Applied Sciences, 2010, 10(17), 1916. DOI: 10.3923/jas.2010.1916.1922

On the Differences between Hiding Information and Cryptography Techniques: An Overview

Journal of Applied Sciences, 2010, 10(15), 1650. DOI: 10.3923/jas.2010.1650.1655

An Overview on Hiding Information Technique in Images

Journal of Applied Sciences, 2010, 10(18), 2094. DOI: 10.3923/jas.2010.2094.2100

Hiding data in video file: An overview.

Journal of Applied Sciences, 2010, 10(15), 1644. DOI: 10.3923/jas.2010.1644.1649

Stego on 2n:1 Platform for Users and Embedding

Information Technology Journal, 2011, 10(10), 1896. DOI: 10.3923/itj.2011.1896.1907

Pixel Forefinger for Gray in Color: A Layer by Layer Stego

Information Technology Journal, 2012, 11(1), 9. DOI: 10.3923/itj.2012.9.19

Inverted Pattern in Inverted Time Domain for Icon Steganography

Information Technology Journal, 2012, 11(5), 587. DOI: 10.3923/itj.2012.587.595

Random Image Steganography and Steganalysis: Present Status and Future Directions

Information Technology Journal, 2012, 11(5), 566. DOI: 10.3923/itj.2012.566.576

Utilizing pseudo-spaces to improve Arabic text steganography for multimedia data communications

Multimedia Tools and Applications, 2019, (), . DOI: 10.1007/s11042-019-08025-x

Securing Data via Cryptography and Arabic Text Steganography

SN Computer Science, 2021, 2(1), . DOI: 10.1007/s42979-020-00438-y

A Survey on Different Arabic Text Steganography Techniques

2021 1st International Conference on Emerging Smart Technologies and Applications (eSmarTA), 2021, (), 1. DOI: 10.1109/eSmarTA52612.2021.9515740