A linguistic steganography framework using Arabic calligraphy
Tài liệu tham khảo
Gutub, A.A., Awaideh Y.S.E.S., Alvi, A., 2008. Arabic text steganography using multiple diacritics. In: Proceedings of the 5th IEEE International Workshop on Signal Processing and its Applications (WoSPA 2008), Sharjah, UAE.
Aabed, M.A., Awaideh, S.M., Elshafei, A.-R.M., Gutub, A.A., 2007. Arabic diacritics based steganography. Paper presented at the Signal Processing and Communications, 2007. ICSPC 2007. IEEE International Conference on.
Ahmadoh, 2015, Utilization of two diacritics for Arabic text steganography to enhance performance, Lecture Notes Inform. Theory, 3, 10.18178/lnit.3.1.42-47
Aho, 1975, Efficient string matching: an aid to bibliographic search, Commun. ACM, 18, 333, 10.1145/360825.360855
Al-Haidari, F., Gutub, A., Al-Kahsah, K., Hamodi, J., 2009. Improving security and capacity for Arabic text steganography using ‘Kashida’extensions. Paper presented at the 2009 IEEE/ACS International Conference on Computer Systems and Applications.
Al-Nazer, A., Gutub, A., 2009. Exploit kashida adding to Arabic e-Text for high capacity steganography. Paper presented at the Network and System Security, 2009. NSS'09. Third International Conference on.
Al-Nofaie, 2016, Merging two steganography techniques adjusted to improve arabic text data security, J. Comput. Sci. Computat. Math. (JCSCM), 6, 59, 10.20967/jcscm.2016.03.004
Alaseri, K.A.G., Adnan., 2018. Merging Secret Sharing within Arabic Text Steganography for Practical Retrieval. 4, 1-17.
Alotaibi, N., Gutub, A., Khan, E., 2015. Stego-system for hiding text in images of personal computers. Paper presented at the The 12th Learning and Technology Conference: Wearable Tech/Wearable Learning.
Bhattacharyya, 2011, A survey of steganography and steganalysis technique in image, text, audio and video as cover carrier, Int. J. Global Res. Comput. Sci. (UGC Approved Journal), 2
Chang, C.-Y., Clark, S., 2010. Linguistic steganography using automatically generated paraphrases. Paper presented at the Human Language Technologies: The 2010 Annual Conference of the North American Chapter of the Association for Computational Linguistics.
Gutub, 2010, High capacity steganography tool for Arabic text using'Kashida', ISC Int. J. Inform. Security, 2, 107
Gutub, A., Fattani, M., 2007. A novel Arabic text steganography method using letter points and extensions. Paper presented at the WASET International Conference on Computer, Information and Systems Science and Engineering (ICCISSE).
Gutub, A., Ghouti, L., Amin, A., Al-Kharobi, T., Ibrahim, M. K., 2007. Utilizing extension character ‘Kashida’ with pointed letters for Arabic text digital watermarking. Paper presented at the International Conference on Security and Cryptography.
Gutub, 2010, Improved method of Arabic text steganography using the extension ‘Kashida’character, Bahria Univ. J. Inform. Commun. Technol., 3, 68
Gutub, A.A.-A., Al-Haidari, F., Al-Kahsah, K.M., Hamodi, J., 2010. e-Text watermarking: utilizing 'Kashida' extensions in Arabic language electronic writing.
Hakak, 2017, Approaches for preserving content integrity of sensitive online Arabic content: A survey and research challenges, Inform. Process. Manage.
Hamzah, 2013, resource allocation for antivirus cloud appliances, IOSR J. Computer Eng. (IOSR-JCE), 10
Hassanein, 2014
Odeh, A., Alzubi, A., Hani, Q.B., Elleithy, K., 2012. Steganography by multipoint Arabic letters. Paper presented at the Systems, Applications and Technology Conference (LISAT), 2012 IEEE Long Island.
Por, L.Y., Delina, B., 2008. Information hiding: A new approach in text steganography. Paper presented at the WSEAS International Conference. Proceedings. Mathematics and Computers in Science and Engineering.
Roslan, 2011, Sharp-edges method in Arabic text steganography, J. Theor. Appl. Inform. Technol
Sabrin, 2016
Sharma, S., Gupta, A., Trivedi, M.C., Yadav, V. K., 2016. Analysis of Different Text Steganography Techniques: A Survey. Paper presented at the Computational Intelligence & Communication Technology (CICT), 2016 Second International Conference on.
Shirali-Shahreza, 2008, A new Persian/Arabic text steganography using “La” Word, 339
Shirali-Shahreza, M.H., 2006. A new approach to Persian/Arabic text steganography. Paper presented at the 5th IEEE/ACIS International Conference on.
. Suffix tree. Retrieved 13/11/2017, 12:50 PM 2017, from http://www.geeksforgeeks.org/pattern-searching-set-8-suffix-tree-introduction/.
Taha, 2018, A high capacity algorithm for information hiding in Arabic text, J. King Saud Univ.-Comput. Inform. Sci.
Nagarhalli, 2016, A survey of hindi text steganography, Int. J. Sci. Eng. Res., 7
Topkara, M., Topkara, U., & Atallah, M.J., 2006. Words are not enough: sentence level natural language watermarking. Paper presented at the Proceedings of the 4th ACM international workshop on Contents protection and security.
Topkara, M., Topkara, U., Atallah, M.J., 2007. Information hiding through errors: a confusing approach. Paper presented at the Security, Steganography, and Watermarking of Multimedia Contents IX.
Uday Nazim Farman, 2015, Aesthetic theory of Arabic calligraphy in the Islamic Art, J. Nabo, 143
Wheeler, 2006
Wilson, 2016, Avoiding detection on twitter: embedding strategies for linguistic steganography, Electron. Imaging, 2016, 1, 10.2352/ISSN.2470-1173.2016.8.MWSF-074
Yang, Z., Jin, S., Huang, Y., Zhang, Y., Li, H., (2018). Automatically Generate Steganographic Text Based on Markov Model and Huffman Coding. arXiv preprint arXiv:1811.04720.
Zhou, Z., Mu, Y., Zhao, N., Wu, Q. J., Yang, C.-N., 2016. Coverless information hiding method based on multi-keywords. Paper presented at the International Conference on Cloud Computing and Security.