ARABIC TEXT STEGANOGRAPHY USING MULTIPLE DIACRITICS Adnan Gutub Yousef Elarian Sameh Awaideh Aleem...

13
ARABIC TEXT ARABIC TEXT STEGANOGRAPHY USING STEGANOGRAPHY USING MULTIPLE DIACRITICS MULTIPLE DIACRITICS Adnan Adnan Gutub Gutub Yousef Yousef Elarian Elarian Sameh Sameh Awaideh Awaideh Aleem Aleem Alvi Alvi Computer Engineering Department Computer Engineering Department 1 1
  • date post

    20-Dec-2015
  • Category

    Documents

  • view

    221
  • download

    0

Transcript of ARABIC TEXT STEGANOGRAPHY USING MULTIPLE DIACRITICS Adnan Gutub Yousef Elarian Sameh Awaideh Aleem...

Page 1: ARABIC TEXT STEGANOGRAPHY USING MULTIPLE DIACRITICS Adnan Gutub Yousef Elarian Sameh Awaideh Aleem Alvi Computer Engineering Department King Fahd University.

ARABIC TEXT ARABIC TEXT STEGANOGRAPHY USING STEGANOGRAPHY USING

MULTIPLE DIACRITICSMULTIPLE DIACRITICS

Adnan Adnan Gutub Gutub

Yousef Yousef ElarianElarian

Sameh Sameh Awaideh Awaideh

Aleem Aleem AlviAlvi

Computer Engineering DepartmentComputer Engineering Department

King Fahd University of Petroleum & MineralsKing Fahd University of Petroleum & Minerals

Saudi ArabiaSaudi Arabia

11

Page 2: ARABIC TEXT STEGANOGRAPHY USING MULTIPLE DIACRITICS Adnan Gutub Yousef Elarian Sameh Awaideh Aleem Alvi Computer Engineering Department King Fahd University.

Steganographic modelBasic Steganography System

Page 3: ARABIC TEXT STEGANOGRAPHY USING MULTIPLE DIACRITICS Adnan Gutub Yousef Elarian Sameh Awaideh Aleem Alvi Computer Engineering Department King Fahd University.

Related WorkRelated Work

• Shirali-Shahreza: Shirali-Shahreza: – The position of dots is changed to render The position of dots is changed to render

robust, yet hidden, information. The robust, yet hidden, information. The method needs special fonts.method needs special fonts.

• Gutub: Gutub: – Secret-bit hiding after dotted letters by Secret-bit hiding after dotted letters by

inserting Kashidah’s. A small drop in inserting Kashidah’s. A small drop in capacity occurs due to restriction of capacity occurs due to restriction of script on Kashidah and due to the extra-script on Kashidah and due to the extra-Kashidahs.Kashidahs.

• Aabed et al.:Aabed et al.:– Redundancy in diacritics is used to hide Redundancy in diacritics is used to hide

information by omitting some diacritics.information by omitting some diacritics.

33

Page 4: ARABIC TEXT STEGANOGRAPHY USING MULTIPLE DIACRITICS Adnan Gutub Yousef Elarian Sameh Awaideh Aleem Alvi Computer Engineering Department King Fahd University.

The main idea: DiacriticsThe main idea: Diacritics

Notice the differences in levels of Notice the differences in levels of darkness (as to the right) or darkness (as to the right) or colors (as below) in the single colors (as below) in the single and the repeated diacritics.and the repeated diacritics.

44

Page 5: ARABIC TEXT STEGANOGRAPHY USING MULTIPLE DIACRITICS Adnan Gutub Yousef Elarian Sameh Awaideh Aleem Alvi Computer Engineering Department King Fahd University.

Hiding Scenario (1)Hiding Scenario (1)

• 11stst scenario ( scenario (Secret = 110001 Secret = 110001 ))– Direct Direct (block size = inf.)(block size = inf.)

For each block bFor each block bii = n = ndd

Repeat the iRepeat the ithth diacritic n diacritic nd d

times.times.

Repeat the 1Repeat the 1stst diacritic 49 extra times diacritic 49 extra times

55

Page 6: ARABIC TEXT STEGANOGRAPHY USING MULTIPLE DIACRITICS Adnan Gutub Yousef Elarian Sameh Awaideh Aleem Alvi Computer Engineering Department King Fahd University.

Hiding Scenario (2)Hiding Scenario (2)

• BlockedBlocked

• Block size=2Block size=2 – For For Secret = 110001Secret = 110001

Divide Secret into block of 2-bits Divide Secret into block of 2-bits

Repeat the first diacritic 3 times (3 = (11)Repeat the first diacritic 3 times (3 = (11)bb),),

the second one 0 times (0 = (00)the second one 0 times (0 = (00)bb), ),

and the third one 1 time (1 = (01)and the third one 1 time (1 = (01)bb).).

66

1 1 0 0 0 1

3 0 1

Page 7: ARABIC TEXT STEGANOGRAPHY USING MULTIPLE DIACRITICS Adnan Gutub Yousef Elarian Sameh Awaideh Aleem Alvi Computer Engineering Department King Fahd University.

Hiding Scenario (3)Hiding Scenario (3)

• RLE (run-length enoding)RLE (run-length enoding) While(secret!=EOF & cover!=EOFWhile(secret!=EOF & cover!=EOF

b = b^b = b^

While(secret.b = b)While(secret.b = b)Type diacriticType diacritic

– For For Secret = 110001Secret = 110001

Repeat the 1Repeat the 1stst diacritic 2 times (1’s in ( diacritic 2 times (1’s in (1111))bb); );

the 2the 2ndnd one, 3 times (0’s in ( one, 3 times (0’s in (000000))bb); and); and

the 3the 3rdrd one, 1 time (for one, 1 time (for 11).).

77

1 1 0 0 0 1

2 3 1

Page 8: ARABIC TEXT STEGANOGRAPHY USING MULTIPLE DIACRITICS Adnan Gutub Yousef Elarian Sameh Awaideh Aleem Alvi Computer Engineering Department King Fahd University.

Summary of the three scenariosSummary of the three scenarios

ScenarioScenario ApproachApproach ExtraExtra diacriticsdiacritics

11stst scenario scenario (stream)(stream)

Repeat the first diacritic 49 times. (49 = Repeat the first diacritic 49 times. (49 = ((110001110001))bb))..

4949..

22ndnd scenario scenario

block size=2block size=2Repeat the first diacritic 3 times (3 = (Repeat the first diacritic 3 times (3 = (1111))bb), the), the

second one 0 times (0 = (second one 0 times (0 = (0000))bb), and the third one), and the third one

11 time (1 = (time (1 = (0101))bb))..

33 + + 00 + + 11 = = 44..

33rdrd scenario scenario ((RLE start=1RLE start=1 ) )

Repeat the first diacritic 2 times (2 = number ofRepeat the first diacritic 2 times (2 = number of 11’’s in (s in (1111))bb), the second one 3 times (3 = number), the second one 3 times (3 = number

of 0’s in (of 0’s in (000000))bb), and the third one 1 time (for ), and the third one 1 time (for 11))..

((2-12-1( + )( + )3-13-1 ) )( +( +1-11-1 = ) = )33..

The encodings of the binary value 110001 according to the scenarios of the first approach

88

Page 9: ARABIC TEXT STEGANOGRAPHY USING MULTIPLE DIACRITICS Adnan Gutub Yousef Elarian Sameh Awaideh Aleem Alvi Computer Engineering Department King Fahd University.

• The fixed-size scenario parses a stream of binary bits into blocks of fixed-size.

• The variable-size content-based scenario parses a stream of binary data based on runs, regardless of the number of bits they occupy.

contd..contd..

Mapping the Hidden MessageStudy Example: scenario 2 & 3Study Example: scenario 2 & 3

1 1 0 0 0 1 0 1

3 0 1 1

1 1 0 0 0 1 0 1

2 3 1 1 1

Page 10: ARABIC TEXT STEGANOGRAPHY USING MULTIPLE DIACRITICS Adnan Gutub Yousef Elarian Sameh Awaideh Aleem Alvi Computer Engineering Department King Fahd University.

Encodings of the binary value 11000101 according to two scenarios.

Study Example: scenario 2 & 3Study Example: scenario 2 & 3

Page 11: ARABIC TEXT STEGANOGRAPHY USING MULTIPLE DIACRITICS Adnan Gutub Yousef Elarian Sameh Awaideh Aleem Alvi Computer Engineering Department King Fahd University.

Approaches cont..Approaches cont..

The degree of brightness of the diacritic marks repeated 1, 2, 3, 4 and 5 times each

1111

Page 12: ARABIC TEXT STEGANOGRAPHY USING MULTIPLE DIACRITICS Adnan Gutub Yousef Elarian Sameh Awaideh Aleem Alvi Computer Engineering Department King Fahd University.

EvaluationEvaluation

Approach Avg

Dots 0.3689

Kashidah-Before 0.3676

Kashidah-After 0.2056

Diacritics 0.3633

The ratios of usable characters for hiding both binary levels according to the three studied approaches

1212

Page 13: ARABIC TEXT STEGANOGRAPHY USING MULTIPLE DIACRITICS Adnan Gutub Yousef Elarian Sameh Awaideh Aleem Alvi Computer Engineering Department King Fahd University.

RemarksRemarks• The text and image approaches are discussed which are The text and image approaches are discussed which are

used to hide information in Arabic diacritics for used to hide information in Arabic diacritics for steganographic.steganographic.

• This work presents a variety of scenarios that may achieve This work presents a variety of scenarios that may achieve up to arbitrary capacities. Sometimes tradeoffs between up to arbitrary capacities. Sometimes tradeoffs between capacity, security and robustness imply that a particular capacity, security and robustness imply that a particular scenario should be chosen. scenario should be chosen.

• The overhead of using diacritics was, experimentally, shown The overhead of using diacritics was, experimentally, shown very comparable to related works. very comparable to related works.

• The advantage of the method is that such overhead The advantage of the method is that such overhead decreases if more than one diacritical secret bit is used at decreases if more than one diacritical secret bit is used at once.once.

1313