dc.contributor.author | Alshamsi, Adeel | |
dc.contributor.author | Albaloushi, Salem | |
dc.contributor.author | Alkhoor, Mohammed | |
dc.contributor.author | Almheiri, Hamed | |
dc.contributor.author | Ababneh, Nedal | |
dc.date.accessioned | 2021-08-12T14:51:00Z | |
dc.date.available | 2021-08-12T14:51:00Z | |
dc.date.issued | 2021-08-12 | |
dc.identifier.issn | 2210-142X | |
dc.identifier.uri | https://journal.uob.edu.bh:443/handle/123456789/4411 | |
dc.description.abstract | Steganography is a technique used for hiding secret information or data in a text, image, audio, or video to make it harder for the attackers to detect the hidden information. Many techniques were developed that target the English language but only few Arabic text steganography techniques exist. In this paper, we explore steganography and its types, presented multiple techniques for Arabic steganography, discuss advantages and disadvantages of each technique and described the main functions in our implemented code, after that, we evaluate each technique and suggested improvements that can benefit each technique to enhance their capacity and minimize any problems that can face them to reach our main goal, which is to improve this field to be able to implement its without worrying about any disadvantages that the techniqeus may have. | en_US |
dc.language.iso | en | en_US |
dc.publisher | University of Bahrain | en_US |
dc.rights | Attribution-NonCommercial-NoDerivatives 4.0 International | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/4.0/ | * |
dc.subject | Steganography | en_US |
dc.subject | Cover text | en_US |
dc.subject | Stego text | en_US |
dc.subject | Non-printable letters | en_US |
dc.subject | La | en_US |
dc.title | Enhancing Arabic Text Steganography Based on Unicode Features | en_US |
dc.identifier.doi | https://dx.doi.org/10.12785/ijcds/110155 | |
dc.contributor.authorcountry | Abu Dhabi, UAE | en_US |
dc.contributor.authorcountry | Abu Dhabi, UAE | en_US |
dc.contributor.authorcountry | Abu Dhabi, UAE | en_US |
dc.contributor.authorcountry | Abu Dhabi, UAE | en_US |
dc.contributor.authorcountry | Abu Dhabi, UAE | en_US |
dc.contributor.authoraffiliation | Department of Information Security Engineering Technology (ISET), Abu Dhabi Polytechnic | en_US |
dc.contributor.authoraffiliation | Department of Information Security Engineering Technology (ISET), Abu Dhabi Polytechnic | en_US |
dc.contributor.authoraffiliation | Department of Information Security Engineering Technology (ISET), Abu Dhabi Polytechnic | en_US |
dc.contributor.authoraffiliation | Department of Information Security Engineering Technology (ISET), Abu Dhabi Polytechnic | en_US |
dc.contributor.authoraffiliation | Department of Information Security Engineering Technology (ISET), Abu Dhabi Polytechnic | en_US |
dc.source.title | International Journal of Computing and Digital System | en_US |
dc.abbreviatedsourcetitle | IJCDS | en_US |
The following license files are associated with this item: