2012
DOI: 10.5121/ijcsit.2012.4301
|View full text |Cite
|
Sign up to set email alerts
|

Steganography in Arabic Text Using Zero Width and Kashidha Letters

Abstract: ABSTRACT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
22
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 18 publications
(22 citation statements)
references
References 7 publications
0
22
0
Order By: Relevance
“…Two weaknesses of ZKA are: (1) the retyping problem, and (2) the clear format problem. These deficiencies reduce the algorithm robustness [9]. Table 2 illustrates the changes in the carrier text and secret data when applying the ZKA algorithm.…”
Section: Zero Width Character and Kashida Algorithm (Zka) (A3)mentioning
confidence: 99%
“…Two weaknesses of ZKA are: (1) the retyping problem, and (2) the clear format problem. These deficiencies reduce the algorithm robustness [9]. Table 2 illustrates the changes in the carrier text and secret data when applying the ZKA algorithm.…”
Section: Zero Width Character and Kashida Algorithm (Zka) (A3)mentioning
confidence: 99%
“…The capacity issue is resolved and as compared with other approaches, the proposed method provides high capacity of hiding secret bits. Odeh and Elleithy (2012) proposed new Arabic text steganography algorithm. They approach the connected letter through adding kashida and zero width character.…”
Section: Introductionmentioning
confidence: 99%
“…In contrast with [8], we do not need to add another character beside the kashida to represent two bits. Each single existing kashida using the proposed method hides two bits by its own without merging it with a zero-width character which is used in this study just to distinguish between the original kashida and the kashida used to store secret bits.…”
Section: Capacitymentioning
confidence: 99%
“…Odeh and Elleithy [8], proposed a letter connectivity and extension to hide one bit approach. Moreover, they used zero-width letter, which is a letter used to connect two letters with a small effect on the shape of the two connected letters and no effect on the meaning of the word, to hide two bits in each connective character.…”
Section: Literature Reviewmentioning
confidence: 99%