Skip to main content
Top
Published in: Arabian Journal for Science and Engineering 2/2022

20-11-2021 | Research Article-Computer Engineering and Computer Science

Novel Arabic e-Text Watermarking Supporting Partial Dishonesty Based on Counting-Based Secret Sharing

Authors: Esraa Almehmadi, Adnan Gutub

Published in: Arabian Journal for Science and Engineering | Issue 2/2022

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Nowadays, the proliferation done on information systems had led to an alarming increase in security breaches. This security trend is now viewed as an essential foundation in the success of the information systems platforms planning, development and administration stages. The ideal way to protect the integrity and ownership of information within the transmission are performed via watermarking. It generally embeds secret data in the intended e-text media for the user’s integrity proof purposes afterwards. The challenge comes in full verification as if parts of this watermarking data are corrupted. This work presents Arabic e-text watermarking supporting partial dishonesty situations benefiting from counting-based secret sharing. In this paper, we are utilizing the extension Arabic character "“Kashida” to serve for hiding the watermarking data. The process of hiding watermarking bits is considering full security, which is not to hide the secrets directly as previous references. This work uses the password to ignite counting-based secret sharing to generate the stream shares of watermarking hidden bits to be embedded. The research tests our proposed Arabic e-text watermarking approach using four existing methods of data hiding. The comparisons have been run on the Arabic benchmark of Imam Nawawi’s forty hadeeth as standard text statements (40 Prophet Hadiths) indicating interesting remarkable results and promising research contributions.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Appendix
Available only for authorised users
Literature
1.
go back to reference Sharma, R.: A study of latest emerging trends on cyber security and its challenges to society. Int. J. Sci. Eng. Res. 3(6), 1 (2012) Sharma, R.: A study of latest emerging trends on cyber security and its challenges to society. Int. J. Sci. Eng. Res. 3(6), 1 (2012)
2.
go back to reference Jang-Jaccard, J.; Nepal, S.: A survey of emerging threats in cybersecurity. J. Comput. Syst. Sci. 80(5), 973–993 (2014)MathSciNetCrossRef Jang-Jaccard, J.; Nepal, S.: A survey of emerging threats in cybersecurity. J. Comput. Syst. Sci. 80(5), 973–993 (2014)MathSciNetCrossRef
3.
go back to reference Kaur, S.; Bansal, S.; Bansal, R. K.: Steganography and classification of image steganography techniques. In: International Conference on Computing for Sustainable Global Development. 870–875 (2014) Kaur, S.; Bansal, S.; Bansal, R. K.: Steganography and classification of image steganography techniques. In: International Conference on Computing for Sustainable Global Development. 870–875 (2014)
5.
go back to reference Jalil, Z.; Mirza, A.M.: A review of digital watermarking techniques for text documents. In: International Conference on Information and Multimedia Technology, pp. 230–234, Korea (2009) Jalil, Z.; Mirza, A.M.: A review of digital watermarking techniques for text documents. In: International Conference on Information and Multimedia Technology, pp. 230–234, Korea (2009)
7.
go back to reference Lorigo, L.; Govindaraju, V.: Offline Arabic handwriting recognition: a survey. IEEE Trans. Pattern Anal. Mach. Intell. 28(5), 712–724 (2006)CrossRef Lorigo, L.; Govindaraju, V.: Offline Arabic handwriting recognition: a survey. IEEE Trans. Pattern Anal. Mach. Intell. 28(5), 712–724 (2006)CrossRef
8.
go back to reference Alginahi, Y.: A survey on arabic character segmentation. Int. J. Doc. Anal. Recognit. (IJDAR) 16(2), 105–126 (2012)CrossRef Alginahi, Y.: A survey on arabic character segmentation. Int. J. Doc. Anal. Recognit. (IJDAR) 16(2), 105–126 (2012)CrossRef
11.
go back to reference Agarwal, M.: Text steganographic approaches: a comparison. Int. J. Netw. Secur. Appl. (IJNSA) 5(1), 91–106 (2013) Agarwal, M.: Text steganographic approaches: a comparison. Int. J. Netw. Secur. Appl. (IJNSA) 5(1), 91–106 (2013)
12.
go back to reference Gutub, A.; Ghouti, L.; Elarian, Y.; Awaideh, S.; Alvi, A.: Utilizing diacritic marks for Arabic text steganography. Kuwait J. Sci. Eng. (KJSE) 37(1), 89–109 (2010) Gutub, A.; Ghouti, L.; Elarian, Y.; Awaideh, S.; Alvi, A.: Utilizing diacritic marks for Arabic text steganography. Kuwait J. Sci. Eng. (KJSE) 37(1), 89–109 (2010)
16.
go back to reference Gutub, A.; Al-Alwani, W.; Bin Mahfoodh, A.: Improved method of arabic text steganography using the extension “Kashida” character. Bahria Univ. J. Inf. Commun. Technol. (BUJICT) 3(1), 68–72 (2010) Gutub, A.; Al-Alwani, W.; Bin Mahfoodh, A.: Improved method of arabic text steganography using the extension “Kashida” character. Bahria Univ. J. Inf. Commun. Technol. (BUJICT) 3(1), 68–72 (2010)
19.
go back to reference Al-Nofaie, S.; Fattani, M.; Gutub, A.: Capacity improved Arabic text steganography technique utilizing “Kashida” with whitespaces. In: International Conference on Mathematical Sciences and Computer Engineering (ICMSCE), pp. 38–44, Langkawi, Malaysia (2016) Al-Nofaie, S.; Fattani, M.; Gutub, A.: Capacity improved Arabic text steganography technique utilizing “Kashida” with whitespaces. In: International Conference on Mathematical Sciences and Computer Engineering (ICMSCE), pp. 38–44, Langkawi, Malaysia (2016)
21.
go back to reference Blakley, G.R.: Safeguarding cryptographic keys, managing requirements knowledge. Int. Workshop (AFIPS) 48, 313–317 (1979) Blakley, G.R.: Safeguarding cryptographic keys, managing requirements knowledge. Int. Workshop (AFIPS) 48, 313–317 (1979)
22.
go back to reference Iftene, S.: Secret sharing schemes with applications in security protocols. Sci. Ann. Cuza Univ. 16, 63–96 (2006)MathSciNetMATH Iftene, S.: Secret sharing schemes with applications in security protocols. Sci. Ann. Cuza Univ. 16, 63–96 (2006)MathSciNetMATH
28.
go back to reference Alaseri, K.; Gutub, A.: Merging secret sharing within Arabic text steganography for practical retrieval. J. Comput. Sci. Eng. (IJRDO) 4(9), 1–17 (2018) Alaseri, K.; Gutub, A.: Merging secret sharing within Arabic text steganography for practical retrieval. J. Comput. Sci. Eng. (IJRDO) 4(9), 1–17 (2018)
29.
go back to reference Alkhudaydi, M.; Gutub, A.: Securing data via cryptography and arabic text steganography. SN Comput. Sci. 2, 46 (2021)CrossRef Alkhudaydi, M.; Gutub, A.: Securing data via cryptography and arabic text steganography. SN Comput. Sci. 2, 46 (2021)CrossRef
31.
go back to reference Gutub, A.; Ghouti, L.; Amin, A.; Alkharobi, T.; Ibrahim, M. K.: Utilizing extension character ‘kashida’ with pointed letters for arabic text digital watermarking. International Conference on Security and Cryptography (Secrypt), Spain (2007) Gutub, A.; Ghouti, L.; Amin, A.; Alkharobi, T.; Ibrahim, M. K.: Utilizing extension character ‘kashida’ with pointed letters for arabic text digital watermarking. International Conference on Security and Cryptography (Secrypt), Spain (2007)
32.
go back to reference Sharma, M.K.; Gupta, P.C.: A comparative study of steganography and watermarking. Int. J. Res. IT Manag. 2(2), 2231–4334 (2012) Sharma, M.K.; Gupta, P.C.: A comparative study of steganography and watermarking. Int. J. Res. IT Manag. 2(2), 2231–4334 (2012)
33.
go back to reference Gutub, A.; Al-Haidari, F.; Al-Kahsah, K.; Hamodi, J.: E-Text watermarking: utilizing “Kashida” extensions in arabic language electronic writing. J. Emerg. Technol. Web Intell. 2(1), 48–55 (2010) Gutub, A.; Al-Haidari, F.; Al-Kahsah, K.; Hamodi, J.: E-Text watermarking: utilizing “Kashida” extensions in arabic language electronic writing. J. Emerg. Technol. Web Intell. 2(1), 48–55 (2010)
34.
go back to reference Alginahi, Y. M..; Kabir, M. N.; Tayan, O.: An enhanced kashida-based watermarking approach for arabic text documents. In: International Conference on Electronics, Computer and Computation (ICECCO). 301–304, Turkey, (2013) Alginahi, Y. M..; Kabir, M. N.; Tayan, O.: An enhanced kashida-based watermarking approach for arabic text documents. In: International Conference on Electronics, Computer and Computation (ICECCO). 301–304, Turkey, (2013)
35.
go back to reference Alotaibi, R. A.; Elrefaei, L. A.: Utilizing word space with pointed and un-pointed letters for arabic text watermarking. In: Uksim-Amss International Conference on Computer Modelling and Simulation (UKSIM), 111–116, (2016) Alotaibi, R. A.; Elrefaei, L. A.: Utilizing word space with pointed and un-pointed letters for arabic text watermarking. In: Uksim-Amss International Conference on Computer Modelling and Simulation (UKSIM), 111–116, (2016)
37.
go back to reference Alotaibi, R.; Elrefaei, L.: Improved capacity arabic text watermarking methods based on open word space. J. King Saud Univ. Comput. Inf. Sci. 30(2), 236–248 (2018) Alotaibi, R.; Elrefaei, L.: Improved capacity arabic text watermarking methods based on open word space. J. King Saud Univ. Comput. Inf. Sci. 30(2), 236–248 (2018)
39.
go back to reference Por, L.; Wong, K.; Chee, K.: Unispach: a text-based data hiding method using unicode space characters. J. Syst. Softw. 85(5), 1075–1082 (2012)CrossRef Por, L.; Wong, K.; Chee, K.: Unispach: a text-based data hiding method using unicode space characters. J. Syst. Softw. 85(5), 1075–1082 (2012)CrossRef
Metadata
Title
Novel Arabic e-Text Watermarking Supporting Partial Dishonesty Based on Counting-Based Secret Sharing
Authors
Esraa Almehmadi
Adnan Gutub
Publication date
20-11-2021
Publisher
Springer Berlin Heidelberg
Published in
Arabian Journal for Science and Engineering / Issue 2/2022
Print ISSN: 2193-567X
Electronic ISSN: 2191-4281
DOI
https://doi.org/10.1007/s13369-021-06200-7

Other articles of this Issue 2/2022

Arabian Journal for Science and Engineering 2/2022 Go to the issue

Research Article-Computer Engineering and Computer Science

Augmenting Driver’s Situational Awareness using Smartphones in VANETs

Research Article-Computer Engineering and Computer Science

Thermal Comfort Model for HVAC Buildings Using Machine Learning

Research Article-Computer Engineering and Computer Science

The Role of Vertical Elastic Namenode in Handling Big Data in Small Files

Premium Partners