Alanazi et al., 2021 - Google Patents
Involving spaces of unicode standard within irreversible Arabic text steganography for practical implementationsAlanazi et al., 2021
- Document ID
- 17114941278758496195
- Author
- Alanazi N
- Khan E
- Gutub A
- Publication year
- Publication venue
- Arabian Journal for Science and Engineering
External Links
Snippet
This paper introduces a novel method for Arabic text steganography for irreversible practical usage that involves using the spaces in Unicode standard. The method also benefits from several characters in the Arabic language that can be changed based on their locations …
- 230000002427 irreversible 0 title abstract description 25
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
- G06F17/21—Text processing
- G06F17/211—Formatting, i.e. changing of presentation of document
- G06F17/214—Font handling; Temporal and kinetic typography
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
- G06F17/21—Text processing
- G06F17/22—Manipulating or registering by use of codes, e.g. in sequence of text characters
- G06F17/2217—Character encodings
- G06F17/2223—Handling non-latin characters, e.g. kana-to-kanji conversion
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
- G06F17/21—Text processing
- G06F17/22—Manipulating or registering by use of codes, e.g. in sequence of text characters
- G06F17/2205—Storage facilities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
- G06F17/21—Text processing
- G06F17/24—Editing, e.g. insert/delete
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
- G06F17/28—Processing or translating of natural language
- G06F17/2863—Processing of non-latin text
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
- G06F17/27—Automatic analysis, e.g. parsing
- G06F17/2765—Recognition
- G06F17/277—Lexical analysis, e.g. tokenisation, collocates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30908—Information retrieval; Database structures therefor; File system structures therefor of semistructured data, the undelying structure being taken into account, e.g. mark-up language structure data
- G06F17/30914—Mapping or conversion
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Taha et al. | A high capacity algorithm for information hiding in Arabic text | |
| Rizzo et al. | Content-preserving text watermarking through unicode homoglyph substitution | |
| Shirali-Shahreza et al. | A new approach to Persian/Arabic text steganography | |
| Alanazi et al. | Efficient security and capacity techniques for Arabic text steganography via engaging Unicode standard encoding | |
| Al-Nofaie et al. | Utilizing pseudo-spaces to improve Arabic text steganography for multimedia data communications | |
| Alanazi et al. | Inclusion of unicode standard seamless characters to expand Arabic text steganography for secure individual uses | |
| Satir et al. | A Huffman compression based text steganography method | |
| Khairullah | A novel steganography method using transliteration of Bengali text | |
| Alanazi et al. | Involving spaces of unicode standard within irreversible Arabic text steganography for practical implementations | |
| Tayyeh et al. | Novel steganography scheme using Arabic text features in Holy Quran | |
| Taleby Ahvanooey et al. | An innovative technique for web text watermarking (AITW) | |
| Thabit et al. | CSNTSteg: Color spacing normalization text steganography model to improve capacity and invisibility of hidden data | |
| Dulera et al. | Experimenting with the novel approaches in text steganography | |
| Alanazi et al. | Functionality-improved Arabic text steganography based on unicode features | |
| Singh et al. | A survey on text based steganography | |
| Domain | A review and open issues of diverse text watermarking techniques in spatial domain | |
| Ramakrishnan et al. | Text steganography: a novel character‐level embedding algorithm using font attribute | |
| Memon et al. | EVALUATION OF STEGANOGRAPHY FOR URDU/ARABIC TEXT. | |
| Shirali-Shahreza et al. | Arabic/Persian text steganography utilizing similar letters with different codes | |
| Kaushik et al. | Zero-width text steganography in cybercrime attacks | |
| Baawi et al. | New text steganography technique based on a set of two-letter words | |
| Mandal et al. | A new approach of text Steganography based on mathematical model of number system | |
| Jalil et al. | A novel text watermarking algorithm using image watermark | |
| Yaghobi et al. | Text steganography in webometrics | |
| Khairullah et al. | Steganography in bengali unicode text |