Skip to main content

A New Persian/Arabic Text Steganography Using “La” Word

  • Conference paper
Advances in Computer and Information Sciences and Engineering

Abstract

By expanding communication, in some cases there is a need for hidden communication. Steganography is one of the methods used for hidden exchange of information. Steganography is a method to hide the information under a cover media such as image or sound. In this paper a new method for Steganography in Persian and Arabic texts is presented. Here we use the special form of “La” word for hiding the data. This word is created by connecting “Lam” and “Alef” characters. For hiding bit 0 we use the normal form of word “La” (“لـا”) by inserting Arabic extension character between “Lam” and “Alef” characters. But for hiding bit 1 we use the special form of word “La” (“لا”) which has a unique code in Unicode standard texts. Its code is FEFB in Unicode hex notation. This method is not limited to electronic documents (E-documents) and also can be used on printed documents. This approach can be categorized under feature coding methods.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. N.J. Hopper, Toward a theory of Steganography, Ph.D. Dissertation, School of Computer Science, Carnegie Mellon University, Pittsburgh, PA, USA, July 2004.

    Google Scholar 

  2. W. Bender, D. Gruhl, N. Morimoto, and A. Lu, “Techniques for data hiding,” IBM Systems Journal, vol. 35, issues 3&4, 1996, pp. 313-336.

    Article  Google Scholar 

  3. M.H. Shirali-Shahreza and M. Shirali-Shahreza, “A New Approach to Persian/Arabic Text Steganography,” Proceedings of the 5th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2006), Honolulu, HI, USA, July 10-12, 2006, pp. 310-315.

    Google Scholar 

  4. A. Gutub and M. Fattani,. “A Novel Arabic Text Steganography Method Using Letter Points and Extensions,” Proceedings of the WASET International Conference on Computer, Information and Systems Science and Engineering (ICCISSE), vol. 21, Vienna, Austria, May 2007, pp. 28-31.

    Google Scholar 

  5. K. Rabah, “Steganography-The Art of Hiding Data,” Information Technology Journal, vol. 3, issue 3, 2004, pp. 245-269.

    Article  MathSciNet  Google Scholar 

  6. M.H. Shirali-Shahreza and M. Shirali-Shahreza, “Persian/Arabic CAPTCHA,” IADIS International Journal on Computer Science and Information Systems (IJCSIS), vol. 1, no. 2, October 2006, pp. 63-75.

    Google Scholar 

  7. The Unicode Standard, http://www.unicode.org

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer Science+Business Media B.V.

About this paper

Cite this paper

Shirali-Shahreza, M. (2008). A New Persian/Arabic Text Steganography Using “La” Word. In: Sobh, T. (eds) Advances in Computer and Information Sciences and Engineering. Springer, Dordrecht. https://doi.org/10.1007/978-1-4020-8741-7_61

Download citation

  • DOI: https://doi.org/10.1007/978-1-4020-8741-7_61

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-1-4020-8740-0

  • Online ISBN: 978-1-4020-8741-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics