Int
ern
at
i
onal
Journ
al of Ele
ctrical
an
d
Co
mput
er
En
gin
eeri
ng
(IJ
E
C
E)
Vo
l.
9
, No
.
3
,
J
un
e
201
9
, pp.
1910
~
19
18
IS
S
N: 20
88
-
8708
,
DOI: 10
.11
591/
ijece
.
v9
i
3
.
pp1910
-
19
18
1910
Journ
al h
om
e
page
:
http:
//
ia
es
core
.c
om/
journa
ls
/i
ndex.
ph
p/IJECE
Novel
s
t
eganog
raph
y
s
ch
eme
u
sin
g Arabic
t
ext
f
eat
ures
in Hol
y Qur
an
Hud
a
K
adhi
m
Ta
yy
e
h
1
,
Mohamme
d Sali
h
M
ah
di
2
,
Ahm
ed S
abah
Ahm
ed A
L
-
Jum
aili
3
1
Depa
rt
m
ent
of
I
nform
at
ic
s S
y
s
tem
s Mana
gement
(ISM
),
Coll
ege
of
Business Info
rm
at
ic
s
,
Univer
sit
y
of
Inf
orm
at
ion
T
ec
hn
olog
y
&
Com
m
u
nic
a
ti
ons
,
Ira
q
2,3
Depa
rt
m
ent of
Business Infor
m
at
ion
T
ec
hnolo
g
y
(BIT)
,
Col
le
g
e
of
Busin
ess Inf
orm
at
ic
s
,
Univer
sit
y
of
Inf
orm
at
ion
T
e
chn
olog
y
&
Com
m
u
nic
a
ti
ons
,
Ira
q
Art
ic
le
In
f
o
ABSTR
A
CT
Art
ic
le
history:
Re
cei
ved
Dec
8
, 2
01
8
Re
vised
Feb
16
, 2
01
9
Accepte
d
Ma
r
4
, 2
01
9
W
it
h
the
rap
id
g
rowth
of
th
e
Int
e
rne
t
and
m
obil
e
devi
c
es,
th
e
n
eed
for
hidd
en
comm
unic
at
ions
has
signifi
c
ant
l
y
in
creased.
St
e
ganogr
aph
y
is
a
te
chn
ique
int
roduc
ed
for
esta
bli
shing
hid
den
comm
unic
a
ti
on,
Mos
t
st
eg
anogr
ap
h
y
te
chn
ique
s
hav
e
bee
n
applied
t
o
audi
o
,
imag
e
s,
vide
os,
and
te
xt
.
Man
y
rese
arc
h
ers
used
stega
nogr
aph
y
i
n
Arabi
c
te
x
ts
t
o
ta
k
e
adv
antag
e
of
addi
ng
,
edi
ti
ng
or
ch
ang
ing
le
tters
or
dia
critic
s,
bu
t
le
a
d
to
no
ta
ble
an
d
sus
pic
ious
te
xt
.
In
thi
s
p
a
per
,
we
propos
e
two
novel
st
ega
nogra
ph
y
algorithms
f
or
Arabi
c
te
x
t
using
the
Hol
y
Qura
n
as
cove
r
te
xt.
The
fact
tha
t
i
t
i
s
forbidde
n
to
add,
edi
t
or
c
hange
an
y
le
t
te
r
or
dia
cr
it
i
cs
in
t
he
Hol
y
Qur
an
provide
s
the
val
uab
le
feature
of
it
s
robustness
and
diffi
cul
t
y
a
s
a
cove
r
in
stega
nogra
p
h
y
.
The
al
gor
it
hm
s
hi
de
sec
ret
m
essage
s
el
ements
withi
n
Arabi
c
l
et
t
ers
bene
fi
ti
ng
fro
m
the
exi
st
enc
e
of
sun
lett
ers
(
Ar
abi
c
:
ḥurūf
sham
sīy
ah)
and
m
oon
le
tt
e
rs
(
ḥurūf
qamarī
y
a
h).
Also,
we
conside
r
the
exi
sten
ce
of
som
e
Arabi
c
l
anguage
ch
ara
c
te
r
isti
c
s
rep
rese
nt
ed
as
sm
al
l
vowel
le
tters
(Arabi
c
Diac
ri
ti
cs)
.
O
ur
expe
rimen
ts
using
the
pr
oposed
two
al
gorit
hm
s
demo
nstrat
e
high
ca
p
ac
i
t
y
for
te
xt
files.
Th
e
propose
d
al
gori
thms
are
robust
against
attac
k
sin
ce
th
e
ch
anges
in
the
cover
te
xt
ar
e
imperc
eptible,
s
o
our
cont
ribu
t
ion
offe
rs
a
m
ore
sec
ure
al
go
rit
hm
tha
t
provide
s good c
apa
c
ity
.
Ke
yw
or
d
s
:
Ar
a
bic lan
guag
e
D
ia
crit
ic
s
I
nfo
rm
at
ion
secur
it
y
Qura
n
Stegan
ogra
phy
Copyright
©
201
9
Instit
ut
e
o
f Ad
vanc
ed
Engi
n
ee
r
ing
and
S
cienc
e
.
Al
l
rights re
serv
ed
.
Corres
pond
in
g
Aut
h
or
:
Huda Ka
dh
im
Tayy
eh,
Dep
a
rtm
ent o
f Info
rm
at
ic
s Sy
stem
s Manag
e
m
ent,
Un
i
ver
sit
y o
f I
nfor
m
at
ion
Te
chnolo
gy &
C
omm
un
ic
at
ion
s,
Ba
ghda
d,
Ir
a
q.
Em
a
il
:
haljo
bo
ri@uoit
c.e
du.iq
1.
INTROD
U
CTION
An
im
po
rtant
issue
to
day
as
well
as
f
or
ce
nturie
s
is
the
hidde
n
exch
a
nge
a
nd
secu
rity
of
inf
or
m
at
ion
,and
the
I
nter
net
has
giv
e
n
t
his
need
s
pecial
sign
i
ficance
[
1].
Dif
fer
e
nt
m
eth
ods
are
us
e
d
in
da
t
a
hid
in
g
s
uc
h
a
s
waterm
ark
in
g,
ste
gano
gr
a
phy,
a
nd
crypt
ogra
ph
y
[2
]
.
A
key
co
ntr
ols
the
e
ncr
y
ption
of
inf
or
m
at
ion
in
crypto
gr
a
phy,
so
that
no
one
can
dec
rypt
and
acce
ss
the
inform
at
ion
excep
t
the
pe
rs
on
w
h
o
knows
the
ke
y.
Stegan
ogra
ph
y
is
one
of
the
best
m
eth
ods
for
sec
ure
com
m
un
ic
at
ion
[
3].
T
he
word
ste
gano
gr
a
ph
y
or
i
gin
at
es
fro
m
the
Gr
ee
k
l
angua
ge,
w
hich
m
eans
hidde
n
wr
it
ing.
‘‘
St
egano”
m
eans
hidde
n
and
‘
‘
grapt
os
”
m
eans
wr
it
in
g
[
4].
T
he
goa
l
in
ste
ga
nogra
p
hy
is
t
o
c
on
c
eal
secret
in
form
ation
under
cov
e
r
m
edia,
so
una
uthorise
d
per
s
on
s
can
not
di
sco
ver
t
he
co
ntained
inf
or
m
at
ion
.
This
cov
e
r
m
edia
appr
oach
diff
e
re
ntiat
es
ste
ganogra
ph
y
f
ro
m
oth
er
m
eth
ods
for
e
xch
a
ng
i
ng
hidde
n
inf
or
m
at
ion
.
A
f
te
r
data
the
hid
i
ng
,
the
te
xt
c
on
ta
i
ning
the
secret
inf
or
m
at
ion
re
ferred
to
as
the
ste
go
-
te
xt
,
is
s
ent
f
ro
m
sen
de
r
to
receive
r
vi
a
the
In
te
r
net.
Evaluation Warning : The document was created with Spire.PDF for Python.
Int
J
Elec
&
C
om
p
En
g
IS
S
N: 20
88
-
8708
Novel
steg
anograp
hy
sc
he
me
u
si
ng Ar
ab
ic
t
ext
features i
n Ho
ly
Q
ur
an
(
H
uda
K
adhi
m
T
ayyeh
)
1911
The
goal
o
f
the
secur
it
y i
s that
n
o
one can
not
ic
e the secret i
nfor
m
at
ion
e
m
bedde
d
into th
e
ste
go
-
te
xt
easi
ly
by
us
ing
a
var
ie
ty
of
de
te
ct
ion
te
ch
niq
ue
s.
T
hr
ee
c
rite
ria
for
desi
gning
ste
gano
gr
a
ph
y
syst
em
s
in
cl
ud
e
rob
us
tness
,
pe
r
ceptual
tra
nspa
ren
cy
,
a
nd
hi
di
ng
ca
pacit
y
[5]
.
Robustnes
s
is
the
abili
ty
to
protect
the
hi
dd
e
n
inf
or
m
at
ion
from
da
m
age
wh
en
t
ran
sm
it
ted
f
ro
m
the
sen
der
t
o
receive
r
.
Perce
ptu
al
tr
ans
par
e
ncy
m
e
ans
the
abili
ty
of
the
at
ta
cker
s
to
no
ti
ce
the
hidde
n
in
form
at
ion
easi
ly
.
By
m
ini
m
isi
ng
the
dif
fer
e
nce
be
twe
en
the
cov
e
r
te
xt
a
nd
ste
go
-
te
xt,
high
sec
ur
it
y
can
be
ac
hieve
d
.
T
he
ca
pacit
y
rep
rese
nts
the
siz
e
of
i
nfor
m
at
i
on
bit
s
that
can
be
c
onceal
ed
by
the
co
ver
te
xt.
Pic
tures
[6
]
,
vid
e
o
cl
ips
[7
]
,
m
us
ic
,
an
d
s
ound
s
[8
]
a
re
ty
pica
l
cov
e
r
m
edia, or ca
rr
i
er, for ste
gano
gr
a
phy m
et
ho
ds.
The
m
os
t
challen
gi
ng
a
ppr
oa
ch
is
te
xt
ste
gan
og
raphy
due
to
the
shorta
ge
of
re
dunda
nt
inf
or
m
at
ion
avail
able
in
te
xt
file
s
com
pared
to
oth
e
r
c
ov
er
m
edia
ty
pes
[9
]
,
[
10
]
.
T
he
structu
re
of
t
he
te
xt
file
s
is
us
ually
j
ust
as
how
it
is
seen
,
wh
e
rea
s
the
st
ru
ct
ur
e
for
oth
e
r
ca
rr
ie
r
ty
pes
is
entir
el
y
diff
e
ren
t
from
ho
w
the
m
edia
is
ob
s
er
ved
.
T
hi
s
m
akes
the
i
nfor
m
at
ion
hid
in
g
i
n
non
-
te
xt
co
ve
r
m
edia
easi
er
a
nd
m
or
e
diff
ic
ult
to
b
e
disco
ver
e
d
c
om
par
ed
to
hi
di
ng
i
nfor
m
at
ion
in
te
xt
file
s.
A
n
ad
va
ntage
of
te
xt
ste
ga
nograph
y
is
it
s
sim
plici
t
y
in
com
m
un
ic
ation
an
d
occupi
es
le
ss
m
e
m
or
y
reso
urces
[
4]
.
So
,
differe
nt
ste
gano
gr
a
ph
ic
te
chn
iq
ues
are
us
ed
for diffe
re
nt langua
ges de
pendin
g on t
he st
r
uctu
re [1
0].
The
tw
o
ste
ga
nograp
hy
al
gor
it
h
m
s
reco
m
m
end
e
d
i
n
this
pa
per
a
re
us
ed
gram
m
ar
ru
le
of
the
de
finite
arti
cl
e
al
fo
ll
owed
by
s
un
le
tt
ers
(
Ar
a
bic:
ḥur
ūf
sh
am
sīy
a
h)
an
d
m
oon
le
tt
ers
(
ḥu
rūf
qa
m
arīy
ah)
al
on
g
with
the
Ar
a
bic
dia
crit
ic
s
(H
ara
ka
t
)
to
hid
e
data
in
Ar
a
bic
te
xt
us
in
g
H
oly
Q
ur
a
n
as
c
ov
e
r.
The
fact
that
Ho
ly
Qura
n
co
ns
ist
s
of
A
ra
bic
ch
aracte
rs
an
d
Ar
a
bic
diacrit
ic
s
(H
a
rak
at
)
pro
vid
es
t
he
va
luable
feat
ur
e
of
it
s
rob
us
tness
as
a
co
ver
in
ste
gano
gr
a
phy.Th
e
hi
ding
in
f
orm
at
ion
in
co
ve
r
m
edi
a
does
not
at
tract
the
hu
m
an
at
te
ntion
beca
use
the i
nfor
m
ation
is
h
i
dd
e
n w
it
ho
ut a
ny
per
c
eptible
c
hange
in the o
rigin
al
word
.
2.
RELATE
D
W
ORK IN
A
R
A
BIC TE
X
T
S
TE
GANOG
R
APH
Y
Most
te
xt
ste
ga
nograp
hy
m
eth
ods
a
re
use
d
for
E
ng
li
sh
te
xt
s,
an
d
only
a
few
a
re
ap
plied
to
Ar
a
bic
te
xt
[
11
]
-
[
14
]
.
The
A
rab
ic
la
ngua
ge
is
the
sixth
m
os
t
s
poken
la
ng
uag
e
with
m
or
e
t
ha
n
420
m
i
ll
ion
people
sp
ea
ker
s
w
or
l
dwide
[15]. T
he
Qur
a
n
is t
he H
oly b
ook for m
or
e t
ha
n
one t
hi
rd
t
he
po
pu
la
ti
on of the
w
orl
d
an
d
is
wr
it
te
n
in
t
he
cl
assic
Ar
a
bic
la
ngua
ge
[
16]
.
So
m
e
featur
es
of
the
A
ra
bic
la
ngua
ge
do
not
m
at
ch
to
oth
e
r
la
nguag
e
s,
incl
ud
i
ng
E
ngli
sh
[15].
Wr
it
ing
i
n
the
A
ra
bic
la
ngua
ge
us
e
s
a
cur
si
ve
sty
le
with
a
rig
ht
to
le
ft
directi
on.
Als
o,
the
s
hap
e
of
eac
h
A
rab
i
c
char
act
er
is
diff
e
ren
t
de
pe
nd
i
n
g
on
it
s
po
sit
io
n
in
th
e
word.
The
A
rab
ic
la
ngua
ge
is
char
a
ct
erised
by
m
a
ny
do
tt
ed
le
tt
er
s
with
so
m
e
hav
in
g
one
dot
on
top
or
bo
tt
om
of
a
le
tt
er
and
oth
er
s
with
tw
o
or
t
hr
ee
dots
on
to
p
of
a
le
tt
er
[
16]
.
The
re
e
xist
add
it
io
nal
m
ar
ks
posit
io
ned
on
the
top
o
r
bott
om
of
Ara
bic let
te
r
s call
ed
“Diacrit
ic
s
”
or
H
araka
t, as it
is
k
nown
in Ara
bic. Th
ere ar
e eig
ht
sh
ap
e
s
of
Diac
riti
cs
rep
rese
ntin
g
on
ly
the
vo
wel
so
un
ds
[
17
]
a
nd
ar
e
cal
le
d
Fathah,
Kasrah,
Dam
ah,
S
ukun,
Tan
winF
at
hah,
Tanw
i
nK
as
ra
h,
Ta
nw
i
nD
am
ah,
an
d
S
had
da
h,
as
sho
wn
i
n
Fig
ur
e
1.
Th
e
com
pu
te
r
represents
each
Diacrit
ic
dig
it
al
ly
as
sep
arate
cha
racter
.
T
hese
Diacrit
ic
s
are
fun
dam
ental
f
or
the
H
oly
Q
ur
a
n
a
nd
othe
r
reli
gious
an
d
histor
ic
al
scri
pt
s,
bu
t
non
-
co
m
pu
lsory
in
m
od
e
r
n
sta
ndar
d
Ar
a
bic
w
riti
ng
an
d
pr
ac
ti
ce
[17].
The follo
wing
su
m
m
arises
var
io
us
a
ppr
oaches f
or Arabic t
ext stega
nogra
ph
y.
َ
ـ
Fath
ah
َ
ـ
Kasrah
َ
ـ
Da
m
m
a
h
َ
ـ
Su
k
o
o
n
َ
ـ
Tanween
Fathah
َ
ـ
Tanween
Kas
rah
َ
ـ
Tanween
Da
m
m
a
h
َ
ـ
Sh
ad
d
ah
Figure
1. A
rab
i
c text diac
riti
cs
2.1.
K
as
hid
a
-
ba
sed
ste
gan
ogra
ph
y
Ther
e
is
a
pos
sibil
it
y
us
ing
Ar
a
bic
le
tt
ers
to
ad
d
a
n
exte
ns
io
n
in
w
ords
,
an
d
this
feat
ur
e
is
cal
le
d
“Kas
hid
a”,
w
hi
ch
does
not
af
fect
the
m
eaning
of
the
w
ord
s.
S
o,
w
ords
w
it
h
an
e
xten
sio
n
“
Kash
i
da”
c
an
be
us
e
d
t
o
hid
e
i
nfor
m
at
ion
a
nd
w
ords
wi
th
out
a
n
exte
ns
io
n
will
hi
de
no
ne
[
13
]
,
[
17]
,
[18]
.
Alth
ough
,
in
this
m
et
ho
d,
the
m
essage
c
onte
nt
will
no
t
be
a
f
fected,
but
has
the
disa
dvant
age
that
it
can
no
t
be
a
dd
e
d
t
o
the
beg
i
nn
i
ng
or
e
nd
of
wor
ds
and only
in
the m
idd
le
of con
ne
ct
ed
le
tt
ers
within a w
ord.
T
hi
s r
est
rict
ion
m
akes it
m
or
e n
o
ta
ble
to the
r
ea
ders a
s it
obv
i
ou
sly
c
hanges
the te
xt whil
e it
also i
ncr
ease
s the
size o
f
the
f
il
e.
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
2088
-
8708
In
t J
Elec
&
C
om
p
En
g,
V
ol.
9
, N
o.
3
,
June
2019
:
1910
-
1918
1912
2.2.
S
t
eg
ano
gr
ap
h
y by
disp
lacement
of
p
oint
s
In
this
m
et
ho
d,
the
in
f
or
m
at
ion
is
em
bedded
as
bi
nar
y
value
s
in
t
he
d
ots
(
points)
of
t
he
le
tt
ers
of
t
he
la
nguag
e
,
s
uc
h
as
in
Ar
a
bic,
Urdu,
a
nd
Per
sia
n
[
11]
,
[
18]
.
Wh
e
n
the
po
int
posit
ion
is
sh
ifte
d
up,
the
n
the
value
of
the
hi
dd
e
n
bit
is
one.
Othe
rw
ise
,
t
he
dot
po
sit
io
n
is
un
c
ha
ng
e
d,
an
d
the
val
ue
is
zero
.
W
i
th
this
appr
oach,
it
is
possible
to
hi
de
a
la
r
ge
am
ount
of
i
nfor
m
at
ion
in
A
rab
i
c
te
xt
with
ou
t
br
i
ng
i
ng
at
te
ntion
t
o
changes
.
S
in
ce
the
A
ra
bic
la
ngua
ge
incl
udes
15
do
tt
ed
le
tt
ers
out
of
28,
t
he
ca
pacit
y
of
hid
i
ng
is
high
.
Howe
ver,
a
s
pe
ci
al
font
is
re
qu
i
red
t
o
acc
om
pl
ish
this
s
ubtl
e
var
ia
ti
on,
so
the
recei
ver
will
no
t
be
a
ble
to
retrieve
t
he
hidden
m
essage
if
the
sam
e
fo
nt
is
no
t
a
vaila
ble
.
I
n
a
dd
it
io
n
,
if
the
m
essage
is
re
-
ty
pi
ng
or
O
CR
scan
ning
is
perform
ed
, th
en
th
e d
et
ai
ls o
f
t
he hid
den in
form
a
ti
on
a
re likely
lost [5]
.
2.3.
U
nicode
-
ba
sed
st
e
gan
ogra
ph
y
In
acco
rd
a
nce
with
Un
ic
od
e
sta
nd
a
rds,
t
here
are
m
any
f
orm
s
of
A
rab
ic
l
et
te
rs
an
d
a
re
div
ide
d
i
nto
two
gro
up
s
wi
th
one
bein
g
t
he
re
presentat
i
ve
c
od
e
a
nd
t
he
ot
her
com
pr
ise
d
of
t
he
possi
ble
s
ha
pes
of
t
he
le
tt
ers.
W
it
h
this
m
e
tho
d,
it
is
po
ssible
to
us
e
va
rio
us
Un
ic
od
e
value
s
for
the
sam
e
le
tt
er
to
hid
e
bits
of
inf
or
m
at
ion
[5
]
,
[19].
T
his
m
et
ho
d
is
not
secu
re
en
ough
a
gainst
the
tradit
io
nal
intruders
as
so
m
e
Un
ic
od
e
-
based ste
ga
nogr
a
phy t
ec
hn
i
qu
e
s
ha
ve
a
high ca
pa
ci
ty
w
it
h
le
ss s
ecur
it
y [
14
]
a
nd
vice v
e
rsa.
2.4.
Ste
gan
og
raphy
using
Arabic di
acritic
s (
H
ar
akat)
As
previ
ously
def
ine
d,
the
diacrit
ic
s
are
extensi
on
c
harac
te
rs
us
e
d
op
ti
on
al
ly
at
the
top
an
d
the
bo
tt
om
of
Ar
a
bic
le
tt
ers.
Th
e
diac
riti
cs
sy
m
bo
ls
are
us
ed
to
dif
fer
e
ntiat
e
between
w
ords
com
po
se
d
of
t
he
sam
e
le
tt
ers
bu
t
pro
nounce
d
diff
e
re
ntly
.
In
Ar
a
bic
te
xt,
it
is
fo
un
d
that
“Fat
ha”
co
ve
rs
alm
os
t
half
th
e
us
ed
diacrit
ic
s,
w
hil
e
al
l
oth
e
r
diacrit
ic
s
cov
e
r
t
he
oth
e
r
half.
F
or
this
rea
so
n,
“
Fatha”
is
c
hos
en
to
hi
de
the
bin
a
ry
value
(
1)
an
d
the
othe
r
diac
riti
cs
are
cho
se
n
to
hid
e
(
0)
[12],
[20].
T
his
m
et
ho
d’s
key
disad
va
ntage
is
that
it
util
ise
so
bvio
us
cha
ng
e
s a
nd is easi
ly
recogn
i
sable
by the
re
ader.
2.5.
Li
ngui
sti
c
-
b
as
ed s
te
ganograph
y
This
te
ch
niqu
e
is
cl
assifi
ed
int
o
the
three
ty
pes,
i
nclu
ding
le
xi
cal
-
base
d
ste
gano
gr
a
phy
,
translat
ion
-
bas
ed
ste
ga
nograp
hy,
an
d
the
no
i
se
-
ba
sed
a
ppr
oa
ch.
Lin
guist
ic
ste
ganogra
ph
y
ref
er
s
to
the
use
of
word
sy
nonym
s
to
hid
e
sec
ret
m
essages
in
ordi
nar
y
la
ngua
g
e
te
xt
[
21
]
.
T
he
co
ver
i
ng
te
xt
is
ver
y
nat
ural
an
d
ordina
ry
re
gardin
g
the
la
ngua
ge
a
nd
giv
e
s
a
reas
on
a
ble
a
ccur
acy
for
the
sel
ect
ed
syn
onym
.
It
is
i
m
p
or
ta
nt
to
ens
ur
e
t
her
e
is
no
rep
et
it
ion
of
the
s
am
e
cov
er
te
xt
for
hid
in
g
a
m
essage
beca
us
e
t
his
would
bri
ng
it
to
th
e
at
te
ntion
of
r
e
ader
s
.
Als
o,
t
hi
s
m
et
ho
d
offe
rs
a
lo
w
capaci
ty
fo
r
hidden
i
nfor
m
at
ion
[
14]
,
[21].
The
m
essage
within
t
ran
sla
ti
on
-
based
ste
ga
nograp
hy
m
ay
be
hidden
in
e
r
rors,
or
noise
,
in
the
te
xt,
whic
h
ty
pical
ly
occu
r
s
durin
g
m
achin
e
translat
i
on
(
MT).
T
he
co
nf
i
den
ti
al
m
es
sage
is
hi
dd
e
n
by
perform
i
ng
the
substi
tuti
on
proce
dure
on
the
translat
ed
te
xt
us
in
g
translat
ion
dif
fer
e
nce
s
f
ro
m
sever
al
MT
syst
e
m
s
[1
4].
In
the
no
ise
-
ba
sed
a
ppr
oac
h,
ty
pograph
ic
al
an
d
ab
br
e
viati
on
e
rro
rs
are
us
e
d
to
hid
e
data
in
te
xt,
su
c
h
as
e
-
m
ai
ls,
blogs,
and
for
um
s.
Ho
we
ver, t
his a
ppro
ac
h d
epends
on m
istak
es m
ade th
r
ough
hum
an
wr
i
ti
ng
[21].
3.
T
HE
PR
OPO
SED
ALGO
R
ITHMS
The
Ar
a
bic
al
phabet
c
onta
ins
28
le
tt
ers
with
conso
na
nts
di
vi
ded
i
nto
tw
o
gro
ups,
nam
ed
sun
le
t
ters
and
m
oon
le
t
t
ers
base
d
on
wh
et
her
t
hey
assim
il
a
te
the
l
et
te
r
lām
(
لا
)
of
a
pr
ece
ding
def
init
e
arti
cl
e
al
-
(
ـلا
).
Figure
2
li
sts t
he
s
un a
nd m
oo
n l
et
te
rs.
Figure
2. S
un a
nd
m
oo
n
le
tt
er
s
The
propose
d
al
gorithm
s
hid
e
secret
bin
a
r
y
data
into
A
r
abic
te
xt
us
i
ng
the
gr
am
m
a
r
r
ule
of
t
he
def
i
nite
arti
cl
e
al
al
ong
with
the
A
ra
bic
di
acrit
ic
s
(H
a
rakat
).
I
n
the
fir
s
t
al
go
rit
hm
,
the
secret
m
essage
is
hidden
i
n
w
or
ds
be
gi
nn
i
ng
with
al
-
(
ـلا
)
f
ollow
e
d
b
y
a
su
n
or
m
oo
n
le
tt
er.
In
th
e
Un
ic
od
e
sta
ndar
d,
Evaluation Warning : The document was created with Spire.PDF for Python.
Int
J
Elec
&
C
om
p
En
g
IS
S
N: 20
88
-
8708
Novel
steg
anograp
hy
sc
he
me
u
si
ng Ar
ab
ic
t
ext
features i
n Ho
ly
Q
ur
an
(
H
uda
K
adhi
m
T
ayyeh
)
1913
the
isolat
ed
le
tt
er (
ا
) has t
wo c
od
e
s b
e
cause
it
is a r
e
pr
e
senta
ti
ve
le
tt
er.
T
he first c
od
e
is u
s
ed on
ly
to
save
d
at
a
in
the
dig
it
al
m
edia
and
the
seco
nd
is
us
e
d
fo
r
the
c
orrec
t
sh
ape
f
or
eac
h
le
tt
er.
This
f
eat
ur
e
is
us
e
d
in
our
al
gorithm
s
to
ind
ic
at
e
t
he
hi
ding
l
ocati
on
in
eac
h
w
ord
that
sta
rts
wit
h
t
he
de
finite
arti
cl
e
al
-
(
ـلا
).
S
o,
the secret m
essage ca
n
be hid
den
in t
he
c
ove
r
te
xt
with
ou
t a
ny p
e
rce
ptible
chan
ge
i
n
th
e
ori
gin
al
w
ord.
3.1.
Hidi
n
g
p
rocess
The
t
wo prop
ose
d hidi
ng alg
ori
thm
s
are il
lustrate
d
in
the
f
ollow
in
g sec
ti
ons.
3.1.1. Hi
din
g process
for
pr
oposed
A
lg
ori
th
m
1
In
this
al
gorith
m
,
on
e
bit
is
hi
dd
e
n
us
i
ng
th
e
isolat
ed
le
tt
er
(
ا
)
in
any
w
ord
be
gi
nn
i
ng
with
al
-
(
ـلا
)
fo
ll
owe
d by a s
un or m
oon
le
tt
er.
T
he f
ollow
i
ng alg
or
it
hm
1
ou
tl
ine t
he
hid
i
ng
pr
ocess
3.1.2. Hi
din
g process
for
pr
oposed
A
lg
ori
th
m
2
W
it
h
this
al
gorithm
,
the
e
m
b
edd
i
ng
ca
pacit
y
is
increased
by
hid
in
g
tw
o
bits
in
each
word.
So,
a
secret
m
essage
is
hidde
n
in
t
he
co
ver
te
xt
by
us
in
g
the
is
olate
d
le
tt
er
“
ا
”
in
s
un
or
m
oon
le
tt
er
w
ords
an
d
include
s
diacrit
ic
s w
it
hout a
ny
p
e
rcep
ti
ble c
ha
ng
e
in
t
he ori
gin
al
wor
d.
3.2.
Ex
tra
c
tio
n p
r
ocess
A
se
pa
rate
al
gorithm
is
utilised
to
e
xtract
the
hi
dd
e
n
m
essage
ge
nerat
ed
from
Algorithm
1
or
A
lg
or
it
hm
2
.
3.2.1.
Ex
tra
c
t
ion
fro
m
A
l
gori
th
m
1
The
fo
ll
owin
g
al
gorithm
sh
ow
s
ho
w
to
e
xtract
a
hidde
n
m
essage
fro
m
s
te
go
-
te
xt
gen
e
rated
by
A
lg
or
it
hm
1
.
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
2088
-
8708
In
t J
Elec
&
C
om
p
En
g,
V
ol.
9
, N
o.
3
,
June
2019
:
1910
-
1918
1914
3.2.2.
Ex
tra
c
t
ion
fro
m
A
l
gori
th
m
2
The
fo
ll
owin
g
al
gorithm
sh
ow
s
ho
w
to
e
xtract
a
hidde
n
m
essage
fro
m
s
te
go
-
te
xt
gen
e
rated
by
Algorithm
2
.
4.
E
X
PERI
MEN
TAL
RES
UL
TS
First,
this
sec
ti
on
furthe
r
e
xp
la
in
s
the
two
pr
opos
e
d
al
gorithm
s
thro
ug
h
e
xam
ples.
T
hen,
t
he
perform
ance o
f
the algorit
hm
s
is exam
ined
ba
sed
on thei
r
e
m
bed
din
g rati
o fact
or.
I
n
the
pro
po
se
d
al
go
r
it
h
m
s,
the
secret
m
ess
age
is
hidde
n
in
A
rab
ic
te
xts
us
in
g
the
Ho
ly
Quran
s
urahs
as
cov
e
r.
T
he
diacrit
ic
s
in
th
e
Ho
ly
Qura
n
s
ur
a
hs
a
re c
om
pu
lsory
resu
lt
in
g
in
lar
ge
c
ov
e
r fil
e size
.
4.1.
Ex
peri
ment 1
Fo
r
the
first
ex
per
im
ent,
we
use
d
t
he
c
ov
e
r
m
edia
of
S
ur
at
Al
-
Fati
ha
(i
n
plain
te
xt)
to
hi
de
the
secre
t
cod
e
‘0
01110
’ wit
hin
t
his
Ar
a
bic text
fo
ll
owi
ng A
l
gorithm
1
, w
hich ge
nerat
es:
ِ
م
ي
ِ
ح
ه
ر
ل
ا
ِ
ن
م
ْ
ح
ه
ر
ل
ا
ِ
ه
ِ
م
ْ
س
ِ
ب
(
1)
(
ن
ي
ِ
م
ل
ا
ع
ْ
ل
ا
ِ
ب
ر
ِ
ه
ِ
ُ
د
ْ
م
ح
ْ
ل
ا
2
(
ِ
م
ي
ِ
ح
ه
ر
ل
ا
ِ
ن
م
ْ
ح
ه
ر
ل
ا
)
3
(
ِ
ن
ي
ِ
د
ل
ا
ِ
م
ْ
و
ي
ِ
ك
ِ
ل
ا
م
)
4
(
ُ
ن
ي
ِ
ع
ت
ْ
س
ن
ك
ا
ه
ي
ِ
إ
و
ُ
د
ُ
ب
ْ
ع
ن
ك
ا
ه
ي
ِ
إ
)
5
)
(
م
ي
ِ
ق
ت
ْ
س
ُ
م
ْ
ل
ا
ط
ا
ر
ِ
ص
ل
ا
ا
ن
ِ
د
ْ
ه
ا
6
ط
ا
ر
ِ
ص
)
(
ن
ي
ِ
ل
ا
ه
ض
ل
ا
و
ْ
م
ِ
ه
ْ
ي
ل
ع
ِ
ب
و
ُ
ض
ْ
غ
م
ْ
ل
ا
ِ
ر
ْ
ي
غ
ْ
م
ِ
ه
ْ
ي
ل
ع
ت
ْ
م
ع
ْ
ن
أ
ن
ي
ِ
ذ
ه
ل
ا
7
(
Accor
ding
to
t
he
hi
ding
pr
oc
ess
of
Al
gorith
m
1,
we
sea
rc
h
f
or
t
he
m
oo
n
le
tt
er
w
ords
in
the
co
ve
r
te
xt
to
hid
e
bit
0.
To
hi
de
1,
we
searc
h
f
or
a
su
n
le
tt
er
word
in
the
c
ov
e
r
te
xt
and
cha
nge
the
co
de
of
isolat
ed
le
tt
er
“
ا
”
to
m
ark
the
hi
di
ng
of
bit
1
.
Figure
3
dem
on
st
rates
how
to
hid
e
‘00
1110
’
in
A
ra
bic
te
xt
(
Surat
Al
-
Fati
ha
).
Evaluation Warning : The document was created with Spire.PDF for Python.
Int
J
Elec
&
C
om
p
En
g
IS
S
N: 20
88
-
8708
Novel
steg
anograp
hy
sc
he
me
u
si
ng Ar
ab
ic
t
ext
features i
n Ho
ly
Q
ur
an
(
H
uda
K
adhi
m
T
ayyeh
)
1915
Cov
e
r
te
xt
(1)
َ
ن
ي
م
ل
ا
ع
ل
ا
َ
ب
ر
َ
ه
َ
د
م
ح
ل
ا
َ
(
2
(
َ
م
ي
ح
ه
ر
ل
ا
َ
ن
م
ح
ه
ر
ل
ا
َ
)
3
(
َ
ن
ي
د
ل
ا
َ
م
و
ي
َ
ك
ل
ا
م
َ
)
4
(
َ
ن
ي
ع
ت
س
ن
َ
ك
ا
ه
ي
إ
و
َ
د
ب
ع
ن
َ
ك
ا
ه
ي
إ
َ
)
5
َ
ا
ن
د
ه
ا
َ
)
(
َ
م
ي
ق
ت
س
م
ل
ا
َ
ط
ا
ر
ص
ل
ا
6
(
َ
ن
ي
ل
ا
ه
ض
ل
ا
َ
و
َ
م
ه
ي
ل
ع
َ
ب
و
ض
غ
م
ل
ا
َ
ر
ي
غ
َ
م
ه
ي
ل
ع
َ
ت
م
ع
ن
أ
َ
ن
ي
ذ
ه
ل
ا
َ
ط
ا
ر
ص
َ
)
7
(
Sun/m
oo
n
le
tt
er w
ord
s
َ
ل
ا
ه
ض
ل
ا
ني
َ
ب
و
ض
غ
م
ل
ا
ا
ي
ق
ت
س
م
ل
َ
م
َ
ط
ا
ر
ص
ل
ا
ا
َ
ن
ي
د
ل
ا
َ
م
ي
ح
ه
ر
ل
ا
َ
ن
م
ح
ه
ر
ل
ا
َ
ن
ي
م
ل
ا
ع
ل
ا
َ
د
م
ح
ل
The
c
ha
ng
e
d
words
Hidden
b
it
s
0
1
1
1
0
0
Stego
-
te
xt
(1)
(
َ
ن
ي
م
ل
ا
ع
ل
ا
َ
ب
ر
َ
ه
َ
د
م
ح
ل
ا
2
َ
ن
م
ح
ه
ر
ل
ا
َ
)
َ
(
َ
م
ي
ح
ه
ر
ل
ا
3
(
َ
ن
ي
د
ل
ا
َ
م
و
ي
َ
ك
ل
ا
م
َ
)
4
(
َ
ن
ي
ع
ت
س
ن
َ
ك
ا
ه
ي
إ
و
َ
د
ب
ع
ن
َ
ك
ا
ه
ي
إ
َ
)
5
َ
ا
ن
د
ه
ا
َ
)
(
َ
م
ي
ق
ت
س
م
ل
ا
َ
ط
ا
ر
ص
ل
ا
6
(
َ
ن
ي
ل
ا
ه
ض
ل
ا
َ
و
َ
م
ه
ي
ل
ع
َ
ب
و
ض
غ
م
ل
ا
َ
ر
ي
غ
َ
م
ه
ي
ل
ع
َ
ت
م
ع
ن
أ
َ
ن
ي
ذ
ه
ل
ا
َ
ط
ا
ر
ص
َ
)
7
(
Figure
3
.
The
hi
din
g
pr
ocess f
or
the sec
ret m
essage
‘
001110’
in
t
he Ara
bic text
w
he
re me
ans
t
he Un
ic
ode
of
le
tt
er “
ا
” is cha
ng
e
d
a
nd m
eans
the
w
ord
is
not u
sed
To
ext
ract
the
hidden
m
essag
e
fr
om
the
ste
go
-
te
xt
pro
du
ce
d
from
the
pr
e
vious
exam
ple,
we
perf
or
m
the
f
ollo
wing:The
first
w
ord
in
the
ste
go
-
te
xt
is
ide
ntifie
d
that
sta
rts
wit
h
al
-
(
ـ
لا
)
fo
ll
owed
by
a
s
un
or
m
oon
le
tt
er
in
w
hich
the
co
de
of
t
he
le
tt
er
(
ا
)
is
c
ha
ng
e
d
(i.e
.,
the
w
ord
“
ُ
د
ْ
م
ح
ْ
ل
ا
”
ha
s
a
m
oon
le
tt
er
).
S
o,
this
de
fines
a
bit
0,
w
hich
in
it
ia
te
s
the
extr
act
ing
strin
g
w
it
h
a
0.
This
pr
ocess
is
rep
eat
ed
unti
l
the
entire
secret
m
essage
is
extracte
d
. F
i
gure
4 dem
on
stra
te
s how to e
xtr
act
a secret m
essage
from
ste
go
-
te
xt.
Stego
-
te
xt
(1)
َ
ه
َ
د
م
ح
ل
ا
(
َ
ن
ي
م
ل
ا
ع
ل
ا
َ
ب
ر
2
(
َ
م
ي
ح
ه
ر
ل
ا
َ
ن
م
ح
ه
ر
ل
ا
َ
)
3
(
َ
ن
ي
د
ل
ا
َ
م
و
ي
َ
ك
ل
ا
م
َ
)
4
(
َ
ن
ي
ع
ت
س
ن
َ
ك
ا
ه
ي
إ
و
َ
د
ب
ع
ن
َ
ك
ا
ه
ي
إ
َ
)
5
َ
ا
ن
د
ه
ا
َ
)
(
َ
م
ي
ق
ت
س
م
ل
ا
َ
ط
ا
ر
ص
ل
ا
6
(
َ
ن
ي
ل
ا
ه
ض
ل
ا
َ
و
َ
م
ه
ي
ل
ع
َ
ب
و
ض
غ
م
ل
ا
َ
ر
ي
غ
َ
م
ه
ي
ل
ع
َ
ت
م
ع
ن
أ
َ
ن
ي
ذ
ه
ل
ا
َ
ط
ا
ر
ص
َ
)
7
(
Sun/m
oo
n
le
tt
er w
ord
s
ن
ي
ل
ا
ه
ض
ل
ا
َ
ب
و
ض
غ
م
ل
ا
ا
ي
ق
ت
س
م
ل
َ
م
َ
ط
ا
ر
ص
ل
ا
ا
َ
ن
ي
د
ل
ا
َ
م
ي
ح
ه
ر
ل
ا
َ
ن
م
ح
ه
ر
ل
ا
َ
ن
ي
م
ل
ا
ع
ل
ا
َ
د
م
ح
ل
The
c
ha
ng
e
d
words
Hidden
b
it
s
0
1
1
1
0
0
Secret
m
essage
001110
Figure
4
.
The
e
xtracti
on
proce
ss of a se
cret
m
essage fro
m
ste
go
-
te
xt
wh
e
re m
eans
the
U
nico
de of
let
te
r
“
ا
”
was
c
ha
ng
e
d
a
nd m
eans
the
word
wa
s
no
t
use
d
4.2.
Ex
peri
ment 2
The
sam
e
Ar
abic
te
xt
cov
e
r
m
edia
(
Su
rat
Al
-
Fati
ha
)
is
us
ed
to
hid
e
the
secret
co
de
‘
001110
’
f
ollo
wing
Algo
rithm
2
r
es
ulti
ng in:
ِ
م
ي
ِ
ح
ه
ر
ل
ا
ِ
ن
م
ْ
ح
ه
ر
ل
ا
ِ
ه
ِ
م
ْ
س
ِ
ب
(1)
(
ن
ي
ِ
م
ل
ا
ع
ْ
ل
ا
ِ
ب
ر
ِ
ه
ِ
ُ
د
ْ
م
ح
ْ
ل
ا
2
(
ِ
م
ي
ِ
ح
ه
ر
ل
ا
ِ
ن
م
ْ
ح
ه
ر
ل
ا
)
3
(
ِ
ن
ي
ِ
د
ل
ا
ِ
م
ْ
و
ي
ِ
ك
ِ
ل
ا
م
)
4
(
ُ
ن
ي
ِ
ع
ت
ْ
س
ن
ك
ا
ه
ي
ِ
إ
و
ُ
د
ُ
ب
ْ
ع
ن
ك
ا
ه
ي
ِ
إ
)
5
م
ي
ِ
ق
ت
ْ
س
ُ
م
ْ
ل
ا
ط
ا
ر
ِ
ص
ل
ا
ا
ن
ِ
د
ْ
ه
ا
)
(
6
ط
ا
ر
ِ
ص
)
(
ن
ي
ِ
ل
ا
ه
ض
ل
ا
و
ْ
م
ِ
ه
ْ
ي
ل
ع
ِ
ب
و
ُ
ض
ْ
غ
م
ْ
ل
ا
ِ
ر
ْ
ي
غ
ْ
م
ِ
ه
ْ
ي
ل
ع
ت
ْ
م
ع
ْ
ن
أ
ن
ي
ِ
ذ
ه
ل
ا
7
(
Accor
ding
to
this
hid
i
ng
proc
ess,
we
sea
rch
the
cover
f
or
the
first
m
oo
n
le
tt
er
wo
r
d
c
onta
inin
g
th
e
diacrit
ic
‘‘Fat
ha
”
an
d
c
hange
the
c
od
e
on
t
he
le
tt
er
a
fter
(
لا
).
I
n
this
c
as
e,
the
w
ord
“
ُ
د
ْ
م
ح
ْ
ل
ا
”
sat
isfie
s
t
he
tw
o
conditi
ons,
s
o
we
can
c
hange
the
c
od
e
of
t
he
isolat
ed
le
tt
er
“
ا
”
to
m
ark
t
he
hi
ding
of
bi
t
00.T
o
hid
e
11,
w
e
search
f
or
the
nex
t
sun
le
tt
er
word
c
on
ta
ini
ng
the
diac
riti
c
‘‘
Fat
ha
”
on
the
le
tt
er
after
(
لا
)
to
cha
nge
it
s
cod
e
.
In
t
his
case,
t
he
w
ord
“
ِ
ن
م
ْ
ح
ه
ر
ل
ا
”
has
the
s
un
le
tt
er
“
ر
”
an
d
diacrit
ic
‘‘
Fat
ha,
”
s
o
we
ch
ang
e
t
he
c
od
e
of
t
he
isolat
ed
le
tt
er
“
ا
.”
The
la
st
t
wo
bits
10
are
hidde
n
in
t
he
word
“
ِ
ن
ي
ِ
د
ل
ا
”
since
it
co
ntains
t
he
s
un
le
tt
er
“
د
”
an
d
diacrit
ic
“Kas
r
ah.
”
Fig
ur
e
5
dem
on
strat
es
how
t
o
hid
e
‘00
1110’
i
n
A
rab
ic
te
xt
(
S
urat
Al
-
Fati
ha
)
us
in
g
A
lg
or
it
hm
2
.
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
2088
-
8708
In
t J
Elec
&
C
om
p
En
g,
V
ol.
9
, N
o.
3
,
June
2019
:
1910
-
1918
1916
Cov
e
r
te
xt
(1)
(
َ
ن
ي
م
ل
ا
ع
ل
ا
َ
ب
ر
َ
ه
َ
د
م
ح
ل
ا
2
(
َ
م
ي
ح
ه
ر
ل
ا
َ
ن
م
ح
ه
ر
ل
ا
َ
)
3
(
َ
ن
ي
د
ل
ا
َ
م
و
ي
َ
ك
ل
ا
م
َ
)
4
َ)
(
َ
ن
ي
ع
ت
س
ن
َ
ك
ا
ه
ي
إ
و
َ
د
ب
ع
ن
َ
ك
ا
ه
ي
إ
5
َ
ا
ن
د
ه
ا
َ
)
(
َ
م
ي
ق
ت
س
م
ل
ا
َ
ط
ا
ر
ص
ل
ا
6
(
َ
ن
ي
ل
ا
ه
ض
ل
ا
َ
و
َ
م
ه
ي
ل
ع
َ
ب
و
ض
غ
م
ل
ا
َ
ر
ي
غ
َ
م
ه
ي
ل
ع
َ
ت
م
ع
ن
أ
َ
ن
ي
ذ
ه
ل
ا
َ
ط
ا
ر
ص
َ
)
7
(
Sun/m
oo
n
le
tt
er w
ord
s
ن
ي
ل
ا
ه
ض
ل
ا
َ
ب
و
ض
غ
م
ل
ا
ا
ي
ق
ت
س
م
ل
َ
م
َ
ط
ا
ر
ص
ل
ا
ا
َ
د
ل
َ
ن
ي
َ
م
ي
ح
ه
ر
ل
ا
ا
َ
ن
م
ح
ه
ر
ل
َ
ن
ي
م
ل
ا
ع
ل
ا
ا
َ
د
م
ح
ل
The
c
ha
ng
e
d
words
Hidden
b
it
s
10
11
00
Stego
-
te
xt
(1)
(
َ
ن
ي
م
ل
ا
ع
ل
ا
َ
ب
ر
َ
ه
َ
د
م
ح
ل
ا
2
(
َ
م
ي
ح
ه
ر
ل
ا
َ
ن
م
ح
ه
ر
ل
ا
َ
)
3
(
َ
ن
ي
د
ل
ا
َ
م
و
ي
َ
ك
ل
ا
م
َ
)
4
َ
د
ب
ع
ن
َ
ك
ا
ه
ي
إ
َ
)
(
َ
ن
ي
ع
ت
س
ن
َ
ك
ا
ه
ي
إ
و
5
َ
ا
ن
د
ه
ا
َ
)
(
َ
م
ي
ق
ت
س
م
ل
ا
َ
ط
ا
ر
ص
ل
ا
6
(
َ
ن
ي
ل
ا
ه
ض
ل
ا
َ
و
َ
م
ه
ي
ل
ع
َ
ب
و
ض
غ
م
ل
ا
َ
ر
ي
غ
َ
م
ه
ي
ل
ع
َ
ت
م
ع
ن
أ
َ
ن
ي
ذ
ه
ل
ا
َ
ط
ا
ر
ص
َ
)
7
(
Figure
5
.
The
hid
in
g
proces
s
for
the
secret
m
essage ‘0
01110’ i
n Ar
a
bic text
w
he
re m
ea
ns
t
hat
the
U
nicod
e
of
le
tt
er “
ا
” is cha
ng
e
d
a
nd m
eans
the
w
ord
was
not use
d
The
fo
ll
owin
g
is
pe
rfor
m
ed
to
ext
ract
the
hidden
m
essage
from
the
ste
go
-
te
xt
pro
du
c
ed
f
r
om
this
exam
ple:
W
e id
entify
the f
i
rst
word in the
ste
go
-
te
xt starti
ng
w
it
h
al
-
(
ـ
لا
)
f
ol
lowed b
y a
s
un or m
oo
n l
et
te
r
an
d
the
co
de
of
the
le
tt
er
(
ا
)
was
c
hange
d
.
If
f
ound,
c
heck
the
diacrit
ic
on
the
le
tt
er.
Since
t
he
word
“
ُ
د
ْ
م
ح
ْ
ل
ا
”
has
a
m
oo
n
le
tt
er,
t
he
c
od
e
of
le
t
te
r
(
ا
)
was
c
ha
ng
e
d
,
an
d
the
diacrit
ic
is
‘
‘Fa
tha,”
we
e
xtr
act
two
bits
00
.
This
process
is
re
pe
at
ed
unti
l
the
e
ntire
sec
ret
m
e
ssage
is
e
xtract
ed
.
Fig
ur
e
6
de
m
on
strat
es
ho
w
to
e
xtract
a
secret
m
essage fro
m
ste
go
-
te
xt
util
isi
ng
this a
ppr
oa
ch.
Stego
-
te
xt
(1)
(
َ
ن
ي
م
ل
ا
ع
ل
ا
َ
ب
ر
َ
ه
َ
د
م
ح
ل
ا
2
(
َ
م
ي
ح
ه
ر
ل
ا
َ
ن
م
ح
ه
ر
ل
ا
َ
)
3
َ)
(
َ
ن
ي
د
ل
ا
َ
م
و
ي
َ
ك
ل
ا
م
4
(
َ
ن
ي
ع
ت
س
ن
َ
ك
ا
ه
ي
إ
و
َ
د
ب
ع
ن
َ
ك
ا
ه
ي
إ
َ
)
5
َ
ا
ن
د
ه
ا
َ
)
(
َ
م
ي
ق
ت
س
م
ل
ا
َ
ط
ا
ر
ص
ل
ا
6
(
َ
ن
ي
ل
ا
ه
ض
ل
ا
َ
و
َ
م
ه
ي
ل
ع
َ
ب
و
ض
غ
م
ل
ا
َ
ر
ي
غ
َ
م
ه
ي
ل
ع
َ
ت
م
ع
ن
أ
َ
ن
ي
ذ
ه
ل
ا
َ
ط
ا
ر
ص
َ
)
7
(
Sun/m
oo
n
le
tt
er
words
ن
ي
ل
ا
ه
ض
ل
ا
و
ض
غ
م
ل
ا
َ
ب
ا
ي
ق
ت
س
م
ل
َ
م
َ
ط
ا
ر
ص
ل
ا
ا
َ
ن
ي
د
ل
ا
َ
م
ي
ح
ه
ر
ل
ا
َ
ن
م
ح
ه
ر
ل
ا
َ
ن
ي
م
ل
ا
ع
ل
ا
َ
د
م
ح
ل
The
c
ha
ng
e
d
words
Hidden
b
it
s
10
11
00
Secret m
essage
001110
Figure
6
.
The
e
xtracti
on
proce
ss for a sec
ret
m
essage fro
m
ste
go
-
te
xt
wh
e
re m
eans
that t
he Un
ic
od
e
of
le
tt
er
“
ا
” w
as c
hange
d
a
nd m
eans
th
e wor
d
was n
ot u
se
d
4.3.
Res
ults
and
Analysis
The
goal
s
of
a
good
ste
ga
no
grap
hic
sc
hem
e
are
hi
gh
em
bed
di
ng
payl
oa
d
and
hi
gh
im
pe
rcep
ti
bili
ty
.
Tom
easur
e
the
pe
rfor
m
ance
of
the
pro
pose
d
al
go
rithm
s
,
s
eve
n
Ar
a
bic
t
ext
file
s
(Holy
Q
ur
a
n
s
urahs
)
we
re
sel
ect
ed
for
co
m
pu
ti
ng
i
m
per
cepti
bili
ty
and
payl
oad
.
The
f
il
e
siz
e
of
the
Ho
ly
Q
ur
a
n
surah
is
la
rg
e
be
cause
the
Ar
a
bic
te
xt
su
ra
h
incl
ud
es
diacrit
ic
s
and
m
any
sp
eci
al
char
act
er
s.
T
hes
e
char
act
er
s
ar
e
com
pu
lsor
y,
and
it
is
no
t
acce
p
ta
bl
e
to
ad
d,
c
ha
nge
or
delet
e
an
y
char
act
er
.
S
o,
m
os
t
ste
ga
nogra
ph
y
m
et
hods
,
s
uc
h
as
sh
i
fting
po
i
nts,
Kas
hida
-
base
d,
a
nd
li
nguisti
c
-
ba
sed
ste
gano
gr
a
ph
y
are
not
app
li
ed
to
the
Ho
ly
Q
ur
a
n
A
rab
ic
te
xt.
The
pro
po
se
d
al
gor
it
h
m
s
eff
ect
ive
ly
counter
visu
al
at
ta
ck
bec
ause
they
do
no
t
raise
any
doubt
from
app
are
nt
changes
i
n
the
te
xt.
This
is
not
the
case
for
ot
her
f
orm
at
-
based
al
gorithm
s
that
m
od
ify
th
e
te
xt
to
hid
e
s
ecret
inf
or
m
at
ion
. T
he hidin
g
ca
pa
ci
ty
o
f
the
alg
ori
thm
s
is cal
culat
ed
f
or eval
ua
ti
on
us
in
g
t
he
f
or
m
ula:
hid
in
g
ca
pacit
y = bit
s
of secre
t
m
essage/bit
s
of
ste
go
-
te
xt
(1)
Table
1
sho
w
s
the
com
pu
te
d
res
ults
f
o
r
the
hi
ding
ca
pa
ci
ty
of
the
pro
posed
al
gori
thm
s,
wh
ic
h
su
ggest
t
he
ca
pa
ci
ty
fo
r
t
he
m
et
hods
is a
de
quat
e.
Evaluation Warning : The document was created with Spire.PDF for Python.
Int
J
Elec
&
C
om
p
En
g
IS
S
N: 20
88
-
8708
Novel
steg
anograp
hy
sc
he
me
u
si
ng Ar
ab
ic
t
ext
features i
n Ho
ly
Q
ur
an
(
H
uda
K
adhi
m
T
ayyeh
)
1917
Table
1
.
T
he
C
om
pu
te
d
E
m
bed
di
ng
Ra
ti
os
Be
cause
the
pro
po
se
d
a
ppr
oach
is
a
hy
br
i
d
betwee
n
diacrit
ic
s
,
gra
m
m
ar
ru
le
s,
and
Un
ic
ode
a
ppr
oach
es
t
he
refor
e
,
it
is
diff
ic
ult
to
com
par
e
it
with
sim
il
ar
appro
ac
hes
.
The
sec
ond
pro
posed
al
gorithm
is
com
par
ed
to
two
diacrit
ic
s
appr
oach
es
.
Ta
ble
2
sho
ws
th
e
aver
a
ge
capa
ci
ty
of
the
two
appro
ac
hes
us
ing
the
data
set
pu
bli
sh
e
d
in
[12].
Fo
r
h
ara
kat
a
ppr
oach
[
22]
,
the
aver
a
ge
c
apacit
yi
s
3.
27
wh
ere
it
is
6.4
for
d
ia
crit
ic
s
-
ba
se
d
ap
proac
h
[12
]
.
The
re
su
lt
s
s
how
that
t
he
a
ver
a
ge
ca
pacit
y
of
pro
po
se
d
appr
oach
is
m
or
e
t
han
h
ara
kat
a
ppro
a
ch
[
22]
an
d
le
ss
tha
n
d
ia
c
riti
cs
-
base
d
a
ppr
oach
[
12
]
.
Ac
cordin
g
to
im
per
ce
ptibil
it
y
,
al
l
the
diacrit
ic
s
ap
proach
e
s
ha
ve
l
ow
im
per
cepti
bili
ty
du
e
to
the
cha
nge
of
co
ver
file
s.
No
ti
ce
that
t
he
two
al
gorithm
s p
re
sented
h
e
r
e
ha
ve hig
h
im
per
cepti
bili
ty
and
a
re
desig
ned f
or r
el
igio
us
docu
m
ents as cove
r
.
Table
2.
C
om
par
iso
n
b
et
wee
n
Diacrit
ic
s
M
et
hods
Ap
p
roach
Av
erage Cap
acit
y
%
I
m
p
er
cept
ib
ility
Evalu
atio
n
Hara
k
at app
roach
3
.27
Low
-
The
ap
p
roach
attr
acts
th
e
atten
tio
n
o
f
th
e
reader
b
ecaus
e the d
iacrit
ics are
ins
erted to
t
h
e cov
er.
-
It
is n
o
t su
i
tab
le
f
o
r
religio
u
s d
o
cu
m
e
n
ts as co
v
er.
Hig
h
Cap
acity
D
ia
critics
-
b
ased
Metho
d
Fo
r
Inf
o
rm
a
tio
n
Hid
in
g
in Arabic T
ex
t
6
.4
Low
-
So
m
e
Diac
ritics
a
re
d
eleted
f
ro
m
t
h
e
co
v
er
to
h
id
e 0.
-
The app
roach
raise
s th
e attentio
n
of
the rea
d
er
.
-
It
is n
o
t su
i
tab
le
f
o
r
religio
u
s d
o
cu
m
e
n
ts as co
v
er.
5.
CONCL
US
I
O
N
AND
F
UT
U
RE W
ORK
This
pa
per
pr
e
sents
a
novel
ste
gano
gr
a
ph
y
schem
e
us
eful
fo
r
Ar
a
bic
la
ngua
ge
el
ect
ronic
wr
it
in
g.
The
pro
pose
d
al
gorithm
s
are
new
because
they
are
the
fir
st
to
us
e
Ho
ly
Qura
n
su
ra
h'
s
as
cov
e
r
m
edia
al
on
g
with
com
bin
in
g
Ar
a
bic
gram
m
ar,
diacrit
ic
s,
and
U
nico
de
ru
le
s
to
hi
de
s
ecret
inform
at
i
on.
The
refor
e
,
this
m
et
ho
d
is
robu
st wit
h
a
v
e
ry low p
os
si
bili
ty
of d
eci
ph
e
rin
g.
The
e
xperim
ental
r
esults
of
t
he
algorit
hm
s de
m
on
strat
e t
he follo
wing:
1.
The
in
form
at
i
on
is
hidden
with
m
ini
m
u
m
changes
in
t
he
cov
e
r
te
xt,
s
o
the
per
ce
ptua
l
transp
a
re
nc
y
is
sat
isfie
d.
2.
The
pr
opos
e
d
al
gorithm
s
are
robust
against
tradit
ion
al
at
ta
ck
since
th
e
secret
m
essage
is
hid
de
n
in
t
he
cov
e
r
te
xt u
si
ng m
ini
m
u
m
ch
ang
e
s a
nd in di
ff
e
ren
t
posit
ions.
3.
The hidi
ng proc
ess u
s
es
diacr
it
ic
s w
it
hout a
dd
i
ng,
s
hiftin
g or delet
in
g
the
m
.
4.
The pr
opose
d
m
et
ho
ds d
o n
ot
n
eed
the
co
ve
r
file
to
ex
t
ract t
he
m
essage.
5.
The
pro
po
se
d
m
et
ho
ds
do
not
change
t
he
c
ov
e
r
file
siz
e
and
do
no
t
requ
ire
the
a
vaila
bi
li
ty
of
a
sp
eci
f
ic
font.
6.
The
ca
pacit
y r
at
ios for t
he pr
opos
e
d
al
gorit
hm
s ar
e not ve
ry h
i
gh due t
o
t
he
ty
pe o
f
the
cov
e
r.
REFERE
NCE
S
[1]
E
.
A
.
Abbood,
e
t
al
.
,
“
Te
xt
in
I
m
age
Hiding
using
Deve
lope
d
LSB
and
Random
Method
,
”
Inter
nati
onal
Journ
al
of
E
le
c
tric
al
and
Computer
Eng
i
nee
ring (
IJE
C
E)
,
v
ol
/i
ss
ue:
8
(
4
)
,
pp.
2091
-
2097
,
2018.
[2]
R
.
Din,
et
a
l
.
,
“
A
Com
par
at
ive
Review
on
D
at
a
Hid
ing
Sch
emes,
”
Int
ernational
Journal
of
El
e
ct
rica
l
and
Computer
Engi
n
ee
ring (
IJE
C
E)
,
v
ol
/i
ss
ue:
11
(
2
)
,
pp.
768
-
774
,
20
18.
[3]
R
.
S
.
Sabri,
e
t
al
.
,
“
Anal
y
sis
Revi
ew
on
Perfor
m
anc
e
Metrics
for
Ext
racti
on
Sc
hemes
in
Te
xt
Stega
nogra
ph
y
,
”
Inte
rnational
Jo
urnal
of El
e
ct
ri
c
al
and
Comput
er
Engi
n
ee
ring
(
IJE
CE)
,
v
ol
/
issue:
11
(
2
)
,
pp
.
761
-
7
67
,
2018
.
[4]
N.
Provos
and
P.
Hone
y
m
an,
“
Hide
and
Seek:
An
Introduc
ti
on
to
Stega
nogra
ph
y
,
”
IEEE
Secur
it
y
&
Priv
acy,
pp.
32
-
44
,
200
3.
[5]
Shahre
za
M
.
S
.
and
Shahre
z
a
M
.
H
.
,
“
An
improved
ver
sion
of
Persian/
Arabi
c
te
x
t
stega
nogr
aph
y
using
‘‘L
a
”
word,
”
Proce
ed
i
ngs of
IE
EE 6t
h
nati
onal conf
ere
nce
on
t
el
e
communic
ati
on
t
ec
hno
logi
es
,
pp.
372
–
6
,
2008
.
[6]
R.
Chandr
amouli
and
N.
Mem
on,
‘
Anal
y
sis
of
LSB
base
d
ima
ge
stega
nog
rap
h
y
te
chn
ique
s,
”
P
roce
edi
ngs
of
th
e
Inte
rnational
Co
nfe
renc
eon
Imag
e
Proc
essing
,
v
o
l.
3
,
pp
.
1019
–
10
22
,
2001
.
Filen
a
m
e
Co
v
er
size
in
kb
Alg
o
rith
m
1
Cap
acity
(bit )
Cap
acity
ratio (b/k
B)
Alg
o
rith
m
2
capacity
Cap
acity
ratio (b/k
B)
AlFatih
ah
2
.5
11
4
.4
22
8
.8
AlBaq
arah
4
3
7
.6
853
1
.94
1670
3
.8
Al'I
m
r
an
2
5
1
.5
546
2
.17
1092
4
.3
'An
Nisa
2
6
9
.5
505
1
.87
1010
3
.74
AlMa'idah
2
0
1
.7
424
2
.1
848
4
.2
AlAn
'a
m
2
1
5
.7
343
1
.59
686
3
.18
Yu
su
f
2
4
2
.3
367
1
.51
734
3
.02
Total Av
erage
Cap
acity
=
2
.23
Total Av
erage
Cap
acity
=
4
.43
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
2088
-
8708
In
t J
Elec
&
C
om
p
En
g,
V
ol.
9
, N
o.
3
,
June
2019
:
1910
-
1918
1918
[7]
G.
Doërra
nd
a
nd
J.
L.
Duge
lay
,
“
A
Guide
Tour
of
Video
W
at
ermarki
ng,
”
Signa
l
Proce
ss
ing:
Image
Comm
unic
ati
on
,
v
ol
/i
ss
ue:
18
(
4
)
,
pp.
263
-
282,
20
03.
[8]
K.
Gopala
n,
“
Audio
stega
nogr
a
ph
y
using
bit
m
odifi
c
at
ion
,
”
Pr
oce
ed
ings
of
the
IEE
E
Int
ernati
o
nal
Confe
renc
e
on
Ac
ousti
cs,
Sp
ee
c
h,
and
Signal P
r
oce
ss
ing,
(
ICAS
SP
'03)
,
v
ol
.
2
,
p
p.
421
-
424
,
200
3.
[9]
M.
H
.
S
.
Shahre
za
and
M
.
S
.
Shahre
z
a,
“
A
New
Approac
h
to
Per
sian/
Arabi
c
Te
x
t
Stega
nogra
ph
y
,
”
5th
IEEE/A
CI
S
Inte
rnational
Co
nfe
renc
e
on
Co
mputer
and
Info
rm
ati
on
Scienc
e (
ICISCOMSAR
06)
,
pp.
310
-
31
5
,
2006
.
[10]
W
.
Bende
r
,
et al
.
,
“
Te
chni
qu
es
f
or
data
h
idi
ng,
”
IBM
Syst
ems J
o
urnal
,
v
ol
/i
ss
ue:
35
(
4
)
,
pp
.
313
-
3
36,
1996
.
[11]
O
.
Amm
ar,
et
al
.
,
“
Stega
nogr
aph
y
b
y
m
ult
ipo
int
Arabi
c
l
et
t
ers,
”
Syste
ms
,
applica
ti
ons
and
te
chno
logy
conference
(
LISAT
)
,
pp.
1
–
7
,
2012
.
[12]
B
.
M
.
La
hce
n
a
nd
Y
.
M
.
Bac
hir
,
“
High
ca
pac
i
t
y
diacri
t
ic
s
-
base
d
m
et
hod
for
in
form
at
ion
hidi
n
g
in
Arabi
c
te
xt
,
”
Inte
rnational
co
nfe
renc
e
on
inno
vat
ions
in
in
formation
t
ec
hnolo
gy,
pp
.
433
-
436
,
2011.
[13]
A.
F.
Al
-
Az
awi
and
M
.
A.
Fadh
il
,
“
Arabi
c
Te
x
t
Stega
nogr
aph
y
using
Kashida
E
xte
nsions
with
Huffm
an
Code,
”
Journal
of
Appli
ed
Sc
ie
n
ce
s,
vol. 10,
pp.
436
-
439
,
2010
.
[14]
A.
A.
Moham
ed
,
“
An
improved
al
gori
thm
for
i
nform
at
ion
hiding
base
d
on
fe
a
ture
s
of
Arabi
c
te
xt:
A
Unicode
appr
oac
h
,
”
Eg
yp
ti
an
In
formatic
s
Journal,
v
ol
/i
ss
u
e:
15
(
2
),
pp
.
79
–
87,
2014
.
[15]
ISTIZADA
,
“
C
om
ple
te
Li
st
of
Arabi
c
Speak
in
g
count
rie
s
201
7,
”
Avai
la
bl
e:
h
tt
p://istizada.
co
m/comple
t
e
-
li
st
-
of
-
arabic
-
speak
ing
-
count
ries
,
2018.
[16]
A.
G.
Ch
ej
n
e,
“
The
Arab
ic Lan
guage
:
i
ts Ro
le i
n
Histor
y
,
”
Univ
ersity
of
Minnes
ota
Press
,
Minne
apol
is
,
1969.
[17]
F.
Al
-
Haida
ri,
e
t
al
.
,
“
Im
proving
sec
urity
and
capac
i
t
y
for
Arabi
c
te
xt
stega
nogr
aph
y
using
'
K
ashida'
ext
ensions
,
”
Proc.
AICCS
A
2
009
-
The
7th
A
CS/IE
EE
Inte
rn
ati
onal
Conf
ere
nce
on
Compute
r
Syste
ms
and
Appl
ic
at
ions
,
Rab
at,
Morocc
o,
pp.
39
6
-
399
,
2009
.
[18]
Al
-
Naz
er
A
.
a
nd
G
.
Adnan
,
“
Expl
oit
Kashi
da
addi
ng
to
Arabi
c
e
-
te
x
t
f
or
high
c
a
pa
ci
t
y
st
ega
nogr
aph
y
,
”
Proce
ed
ings
of
the
th
ird
int
ern
ati
onal
conf
ere
n
ce
on
n
et
work
and
system
sec
u
rity
NSS
’09
,
IE
EE
,
pp
.
447
–
51
,
2009.
[19]
Shiral
i
S
.
M
.
an
d
S
.
S
.
S.
Persia
n,
“
Arabi
c
Unic
ode
te
xt
st
ega
no
gra
ph
y
,
”
The
fo
urth
int
ernati
on
al
conf
er
enc
e
o
n
inf
orm
ati
on
ass
urance
and
s
ec
uri
ty
,
IE
EE
,
pp.
62
–
6
,
2008
.
[20]
Aabe
d
M
.
A
.
,
et
al
.
,
“
Arabi
c
diac
rit
ic
s ba
s
ed
steg
anogr
aph
y
,
”
Pro
ce
ed
ings o
f
the
i
nte
rnational
con
fe
renc
e
on
signa
l
proce
ss
ing
and
c
omm
unic
ati
ons,
pp.
756
–
9
,
2007.
[21]
Li
steg
a
D
.
A
.
,
“
Li
st
-
base
d
st
eganog
rap
h
y
m
et
ho
dolog
y
,
”
In
te
rna
ti
onal
Journal
o
f
Information
Se
curit
y
,
v
ol
/
i
s
s
u
e
:
8
(
4
)
,
pp
.
2
4
7
–
2
6
1
,
2009.
[22]
M.
Aabe
d,
et
al
.
,
“
Arabi
c
dia
c
ritics
base
d
stega
n
ogra
ph
y
,
”
Signa
l
Proce
ss
ing
and
Comm
unic
ati
ons,
2007.
ICSP
C
2007.
IE
EE Int
e
rnational
Conf
ere
nce
,
pp
.
756
-
75
9
,
2007
.
BIOGR
AP
HI
ES OF
A
UTH
ORS
Dr.
Hud
a
Kadh
im
Tayyeh
PhD
in
computer
Sci
enc
e
and
Inform
at
ion
S
y
s
te
m
s
from
Univer
sit
y
of
Te
chno
log
y
,
Baghda
d
,
Ir
aq.
Hea
d
of
Inform
a
ti
cs
S
y
st
ems
M
ana
gement
(IS
M)
Depa
rt
m
ent
,
Coll
ege
of
Busi
ness
Inform
at
ics
/
Univer
sit
y
of
Inform
at
ion
T
echnolog
y
&
Co
m
m
unic
at
ions
.
Instruc
tor
in
I
nform
at
ic
s
S
y
st
ems
Mana
gement
(ISM
)
Depa
rtment
,
Coll
ege
of
Busine
s
s
Inform
at
ic
s
(BI
C)
,
Univer
si
t
y
of
Inform
at
ion
Tec
hnolog
y
&
Com
m
unic
at
ions
(U
OITC).
Mohamme
d
Salih
Mahdi
MS
c
in
a
s
ec
uri
t
y
of
cl
oud
computin
g
in
2012
from
Univer
sit
y
of
Te
chno
log
y
,
B
a
ghdad
,
Ir
aq.
Inst
ruc
tor
in
Busin
e
ss
Inform
at
ion
Te
chno
log
y
(BI
T)
Depa
rtmen
t
,
Coll
ege
of
B
usiness
Inform
at
i
cs
(BIC)
,
Univer
sit
y
of
Inform
at
ion
Te
chno
log
y
&
Com
m
unic
at
ions
(UO
ITC).
Dr.
Ah
me
d
Sab
ah
Ah
me
d
A
L
-
Jumaili
PhD
in
computer
Sc
ie
nc
e
and
Infor
m
at
ion
S
y
st
ems
from
Univer
sit
y
of
Technol
og
y
,
Baghd
ad
,
Ir
aq
.
Hea
d
of
Qual
ity
As
suranc
e
a
nd
Univer
si
t
y
Perform
anc
e
at
Business
Inform
at
i
cs
Coll
eg
e
(B
IC)
,
Univer
sit
y
of
Inform
at
ion
Te
chno
log
y
&
Co
m
m
unic
at
ions
(UO
ITC).
Inst
ruc
tor
in
Busine
ss
Infor
m
at
ion
Te
chno
log
y
(BI
T)
Depa
rtment
,
Coll
ege
of
B
usiness
Inform
at
i
cs
(BIC)
,
Univer
sit
y
of
Inform
at
ion
Te
chno
log
y
&
Com
m
unic
at
ions
(UO
ITC).
Evaluation Warning : The document was created with Spire.PDF for Python.