In the field of data security, the critical challenge of preserving sensitive information during its transmission through public channels takes centre stage. Steganography, a method employed to conceal data within various carrier objects such as text, can be proposed to address these security challenges. Text, owing to its extensive usage and constrained bandwidth, stands out as an optimal medium for this purpose. Despite the richness of the Arabic language in its linguistic features, only a small number of studies have explored Arabic text steganography. Arabic text, characterized by its distinctive script and linguistic features, has gained notable attention as a promising domain for steganographic ventures. Arabic text steganography harnesses the unique attributes of this language, encompassing its complex character designs, diacritical marks, and ligatures, to effectively protect information. In this work, we propose a new text steganography method based on Arabic language characteristics concealment, where the proposed method has two levels of security which are: Arabic encoding and word shifting. In the first step, build a new Arabic encoding mapping table to convert an English plaintext to Arabic characters, then use a word shifting process to add an authentication phase for the sending message and add another level of security to the achieved ciphertext. The proposed method showed that Arabic language characteristics steganography achieved 0.15 ms for 1 k, 1.0033 ms for 3 k, 2.331 ms for 5 k, and 5.22 ms for 10 k file sizes respectively.
Abstract
The perpetuity of the Quranic discourse required being suitable for all ages.
Accordingly, the method of the Glorious Quran a pre request for the conscious
investigation and realization in order to detect the core of the texts, as the Quranic
discourse is considered a general address for the humanity as a whole. For this
reason, the progress of the concerned studies neceiated that it should cope with the
current development in the age requirements and its cultural changes within ages.
The texts of the Glorious Quran lightened the human reason as being the
Creator’s miracle for it is characterized by certain merits that makes it different from
poetry and prose. It is a unique texture in its rheto
... Show MoreMetadiscourse markers are means for organizing a writer’s information and create a connection with her/his readers. When students write, they usually focus on one type of these markers that is the interactive markers and belittling the use of the other type which is the interactional markers. That is to say, they emphasize on presenting and organizing their information only. Therefore, this study is conducted to bridge this gap. The researchers have selected 18 thesis abstracts. Nine of them are written by Iraqi students of English and the rest by American students. The aims of the study are to examine the types and sub-types of metadiscourse markers used by American and Iraqi students; investigate comparatively the impact of the metad
... Show MoreThe research discusses the issue of attribution to the verb, because the Arab scholars are unanimous in preventing attribution of the verb, because it is always informed of it, and does not inform about it, but this consensus violates the linguistic use. The research discusses this matter.
The text has many connotations in the Arabic language, such as vowel points, designation, completion, etc., and the original meaning of the text is to show. The Western text has its owen independent semantic unit .The biblical texts are a mixture of what was reported by the Prophet Moses (peace be upon him) and what the authors described in terms of texts over many centuries.The meaning of the text is guidance and payment, and it is a natural connotation. The religious text for Muslims is divided into peremptory texts that are national proof. The evidence for the meaning of the text is proven by language, and it is not required that the researcher be a jurist. The approach is a factual questionnaire by the researcher according to a speci
... Show MoreThe widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch
... Show MoreThis paper presents a new algorithm in an important research field which is the semantic word similarity estimation. A new feature-based algorithm is proposed for measuring the word semantic similarity for the Arabic language. It is a highly systematic language where its words exhibit elegant and rigorous logic. The score of sematic similarity between two Arabic words is calculated as a function of their common and total taxonomical features. An Arabic knowledge source is employed for extracting the taxonomical features as a set of all concepts that subsumed the concepts containing the compared words. The previously developed Arabic word benchmark datasets are used for optimizing and evaluating the proposed algorithm. In this paper,
... Show MoreFace recognition is a crucial biometric technology used in various security and identification applications. Ensuring accuracy and reliability in facial recognition systems requires robust feature extraction and secure processing methods. This study presents an accurate facial recognition model using a feature extraction approach within a cloud environment. First, the facial images undergo preprocessing, including grayscale conversion, histogram equalization, Viola-Jones face detection, and resizing. Then, features are extracted using a hybrid approach that combines Linear Discriminant Analysis (LDA) and Gray-Level Co-occurrence Matrix (GLCM). The extracted features are encrypted using the Data Encryption Standard (DES) for security
... Show MoreThe reciprocal relationship between the text and the mask in the printed product is one of the most important relationships that frame the level of communication between the appearance and the interior, although it is not cared for by some designers and publishing institutions. Therefore, the problem of research is determined by the following question (What is the dialectical relationship between the text and the mask in the literary books covers design?). The research aims to shed light on this problematic relationship at the level of reception and aesthetics at the same moment. The theoretical framework included two sections: the first (mask and text ... the concept and the mutual relationship), while the second section (trends in the
... Show More