Skip to main content
Erschienen in: Arabian Journal for Science and Engineering 4/2020

04.07.2019 | Research Article - Special Issue - Intelligent Computing and Interdisciplinary Applications

Hiding Shares of Counting-Based Secret Sharing via Arabic Text Steganography for Personal Usage

verfasst von: Adnan Gutub, Khaled Alaseri

Erschienen in: Arabian Journal for Science and Engineering | Ausgabe 4/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This paper presented new models to hide sensitive data via Arabic text steganography. The models are structured to serve personal remembrance of secret shares to be used within counting-based secret sharing technique. This research hides secret shares adopting humanized remembrance tool to serve uncontrolled assigned shares, which are generated from the security system via automatically authentic target key generation process. The shares in their original secret sharing process are challenging to be memorized unlike normal password assignment that is enjoying the full personal selection. Therefore, our models for hiding secret shares are proposed to be hidden inside the personally chosen texts utilizing improved Arabic text steganography. This steganography models study is based on Kashida extension character used redundant within Arabic writing text. The research tests our two proposed modifications to original Arabic text steganography all serving secret sharing on the same text database. The comparisons examined the different models on the same benchmark of Imam Nawawi’s forty hadeeth collected by Islamic Scholar: Yahya ibn Sharaf an-Nawawi as standard text statements (40 Prophet Hadiths) showing interesting results and promising research contributions.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Blakley, G.R.: Safeguarding cryptographic keys. In: Proceedings of the National Computer Conference, vol. 48 (1979)‏ Blakley, G.R.: Safeguarding cryptographic keys. In: Proceedings of the National Computer Conference, vol. 48 (1979)‏
3.
Zurück zum Zitat Almazrooie, M.; Samsudin, A.; Gutub, A.; Salleh, M.S.; Omar, M.A.; Hassan S.A.: Integrity verification for digital Holy Quran verses using cryptographic hash function and compression. J. King Saud Univ. Comput. Inf. Sci. (2018) Almazrooie, M.; Samsudin, A.; Gutub, A.; Salleh, M.S.; Omar, M.A.; Hassan S.A.: Integrity verification for digital Holy Quran verses using cryptographic hash function and compression. J. King Saud Univ. Comput. Inf. Sci. (2018)
5.
Zurück zum Zitat Gutub, A.; Tenca, A.F.: Efficient scalable VLSI architecture for Montgomery inversion in GF (p). Integr. VLSI J. 37(2), 103–120 (2004)CrossRef Gutub, A.; Tenca, A.F.: Efficient scalable VLSI architecture for Montgomery inversion in GF (p). Integr. VLSI J. 37(2), 103–120 (2004)CrossRef
6.
Zurück zum Zitat Al-Otaibi, N.; Gutub, A.: 2-Layer security system for hiding sensitive text data on personal computers. Lect. Notes Inf. Theory 2(2), 151–157 (2014) Al-Otaibi, N.; Gutub, A.: 2-Layer security system for hiding sensitive text data on personal computers. Lect. Notes Inf. Theory 2(2), 151–157 (2014)
7.
Zurück zum Zitat Al-Juaid, N.; Gutub, A.; Khan, E.: Enhancing PC Data Security via combining RSA cryptography and video based steganography. JISCR 1(1), 8–18 (2018) Al-Juaid, N.; Gutub, A.; Khan, E.: Enhancing PC Data Security via combining RSA cryptography and video based steganography. JISCR 1(1), 8–18 (2018)
8.
Zurück zum Zitat Heri, N.; Rahim, R.: Enhanced pixel value differencing steganography with government standard algorithm. In: IEEE 3rd International Conference on Science in Information Technology (ICSITech) (2017)‏ Heri, N.; Rahim, R.: Enhanced pixel value differencing steganography with government standard algorithm. In: IEEE 3rd International Conference on Science in Information Technology (ICSITech) (2017)‏
9.
Zurück zum Zitat Aly, S.; Gutub, A.: Intelligent recognition system for identifying items and pilgrims. NED University Journal of Research Thematic Issue on Advances in Image and Video Processing, pp. 17–23 (2018). ISSN: 2304-716X Aly, S.; Gutub, A.: Intelligent recognition system for identifying items and pilgrims. NED University Journal of Research Thematic Issue on Advances in Image and Video Processing, pp. 17–23 (2018). ISSN: 2304-716X
12.
Zurück zum Zitat Aly, S.; AlGhamdi, T.; Salim, M.; Amin, H.; Gutub, A.: Information gathering schemes for collaborative sensor devices. Proc. Comput. Sci. 32, 1141–1146 (2014)CrossRef Aly, S.; AlGhamdi, T.; Salim, M.; Amin, H.; Gutub, A.: Information gathering schemes for collaborative sensor devices. Proc. Comput. Sci. 32, 1141–1146 (2014)CrossRef
13.
Zurück zum Zitat Kaysi, I.; Alshalalfah, B.; Shalaby, A.; Sayegh, A.; Sayour, M.; Gutub, A.: Users’ evaluation of rail systems in mass events: case study in Mecca, Saudi Arabia. Transp. Res. Rec. J. Transp. Res. Board 2350, 111–118 (2013)CrossRef Kaysi, I.; Alshalalfah, B.; Shalaby, A.; Sayegh, A.; Sayour, M.; Gutub, A.: Users’ evaluation of rail systems in mass events: case study in Mecca, Saudi Arabia. Transp. Res. Rec. J. Transp. Res. Board 2350, 111–118 (2013)CrossRef
16.
Zurück zum Zitat Aly, S.A.; Alghamdi, T.A.; Salim, M.; Gutub, A.: Data dissemination and collection algorithms for collaborative sensor devices using dynamic cluster heads. Trends Appl. Sci. Res. 8(2), 55–72 (2013)CrossRef Aly, S.A.; Alghamdi, T.A.; Salim, M.; Gutub, A.: Data dissemination and collection algorithms for collaborative sensor devices using dynamic cluster heads. Trends Appl. Sci. Res. 8(2), 55–72 (2013)CrossRef
17.
Zurück zum Zitat Gutub, A.; El-Shafe, A.-R.; Aabed, M.: Implementation of a pipelined modular multiplier architecture for GF(p) elliptic curve cryptography computation. KJSE 38(2B), 125–153 (2011) Gutub, A.; El-Shafe, A.-R.; Aabed, M.: Implementation of a pipelined modular multiplier architecture for GF(p) elliptic curve cryptography computation. KJSE 38(2B), 125–153 (2011)
18.
Zurück zum Zitat AlAssaf, N.; AlKazemi, B.; Gutub, A.: Applicable light-weight cryptography to secure medical data in IoT systems. JREAS 2(2), 50–58 (2017) AlAssaf, N.; AlKazemi, B.; Gutub, A.: Applicable light-weight cryptography to secure medical data in IoT systems. JREAS 2(2), 50–58 (2017)
19.
Zurück zum Zitat Gutub, A.; Khan, E.: Using subthreshold SRAM to design low-power crypto hardware. IJNCAA 1(2), 474–483 (2011) Gutub, A.; Khan, E.: Using subthreshold SRAM to design low-power crypto hardware. IJNCAA 1(2), 474–483 (2011)
20.
Zurück zum Zitat Alanizy, N.; Alanizy, A.; Baghoza, N.; AlGhamdi, M.; Gutub, A.: 3-Layer PC text security via combining compression, AES cryptography 2LSB image steganography. JREAS 3(4), 118–124 (2018) Alanizy, N.; Alanizy, A.; Baghoza, N.; AlGhamdi, M.; Gutub, A.: 3-Layer PC text security via combining compression, AES cryptography 2LSB image steganography. JREAS 3(4), 118–124 (2018)
22.
Zurück zum Zitat Gutub, A.; Aly, S.: Trialing a smart face-recognition computer system to recognize lost people visiting the two holy mosques. AJFSFM 1(8), 1120–1132 (2018)CrossRef Gutub, A.; Aly, S.: Trialing a smart face-recognition computer system to recognize lost people visiting the two holy mosques. AJFSFM 1(8), 1120–1132 (2018)CrossRef
25.
Zurück zum Zitat Gutub, A.; Fattani, M.: A novel Arabic text steganography method using letter points and extensions. Int. J. Comput. Electr. Autom. Control Inf. Eng. 1(3), 502–505 (2007) Gutub, A.; Fattani, M.: A novel Arabic text steganography method using letter points and extensions. Int. J. Comput. Electr. Autom. Control Inf. Eng. 1(3), 502–505 (2007)
27.
Zurück zum Zitat Fridrich, J.: Steganography in Digital Media: Principles, Algorithms, and Applications. Cambridge University Press, Cambridge (2009)CrossRef Fridrich, J.: Steganography in Digital Media: Principles, Algorithms, and Applications. Cambridge University Press, Cambridge (2009)CrossRef
28.
Zurück zum Zitat Al-Shatnawi, A.M.; AlFawwaz, B.M.: An integrated image steganography system with improved image quality. Appl. Math. Sci. 7(71), 3545–3553 (2013) Al-Shatnawi, A.M.; AlFawwaz, B.M.: An integrated image steganography system with improved image quality. Appl. Math. Sci. 7(71), 3545–3553 (2013)
29.
Zurück zum Zitat Ahmadoh, E.; Gutub, A.: Utilization of two diacritics for Arabic text steganography to enhance performance. Lect. Notes Inf. Theory 3(1), 42–47 (2015) Ahmadoh, E.; Gutub, A.: Utilization of two diacritics for Arabic text steganography to enhance performance. Lect. Notes Inf. Theory 3(1), 42–47 (2015)
30.
Zurück zum Zitat Gutub, A.; Al-Haidari, F.; Al-Kahsah, K.; Hamodi, J.: e-Text watermarking: utilizing ‘Kashida’ extensions in Arabic language electronic writing. JETWI 2(1), 48–55 (2010) Gutub, A.; Al-Haidari, F.; Al-Kahsah, K.; Hamodi, J.: e-Text watermarking: utilizing ‘Kashida’ extensions in Arabic language electronic writing. JETWI 2(1), 48–55 (2010)
31.
Zurück zum Zitat Al-Nazer, A.; Gutub, A.: Exploit Kashida adding to Arabic e-text for high capacity steganography. In: International Workshop on Frontiers of Information Assurance & Security (FIAS 2009) in Conjunction with the IEEE 3rd International Conference on Network & System Security (NSS 2009), Gold Coast, Queensland, Australia, 19–21 October (2009) Al-Nazer, A.; Gutub, A.: Exploit Kashida adding to Arabic e-text for high capacity steganography. In: International Workshop on Frontiers of Information Assurance & Security (FIAS 2009) in Conjunction with the IEEE 3rd International Conference on Network & System Security (NSS 2009), Gold Coast, Queensland, Australia, 19–21 October (2009)
32.
Zurück zum Zitat Al-Khodaidi, T.; Gutub, A.: Scalable shares generation to increase participants of counting-based secret sharing technique. Int. J. Inf. Comput. Secur. (2019) (in press) Al-Khodaidi, T.; Gutub, A.: Scalable shares generation to increase participants of counting-based secret sharing technique. Int. J. Inf. Comput. Secur. (2019) (in press)
34.
Zurück zum Zitat Alaseri, K.; Gutub, A.: Merging secret sharing within Arabic text steganography for practical retrieval. IJRDO 4(9), 1–17 (2018) Alaseri, K.; Gutub, A.: Merging secret sharing within Arabic text steganography for practical retrieval. IJRDO 4(9), 1–17 (2018)
35.
Zurück zum Zitat Carpentieri, B.; Castiglione, A.; De Santis, A.; Palmieri, F.; Pizzolante, R.: One-pass lossless data hiding and compression of remote sensing data. Future Gen. Comput. Syst. 90, 222–239 (2019)CrossRef Carpentieri, B.; Castiglione, A.; De Santis, A.; Palmieri, F.; Pizzolante, R.: One-pass lossless data hiding and compression of remote sensing data. Future Gen. Comput. Syst. 90, 222–239 (2019)CrossRef
39.
Zurück zum Zitat Gutub, A.; Al-Nazer, A.: High capacity steganography tool for Arabic text using ‘Kashida’. ISeCure 2(2), 109–120 (2010) Gutub, A.; Al-Nazer, A.: High capacity steganography tool for Arabic text using ‘Kashida’. ISeCure 2(2), 109–120 (2010)
40.
Zurück zum Zitat Gutub, A.; Al-Alwani, W.; Mahfoodh, A.B.: Improved method of Arabic text steganography using the extension ‘Kashida’ character. BUJICT 3(1), 68–72 (2010) Gutub, A.; Al-Alwani, W.; Mahfoodh, A.B.: Improved method of Arabic text steganography using the extension ‘Kashida’ character. BUJICT 3(1), 68–72 (2010)
41.
Zurück zum Zitat Morkel, T.; Eloff, J.H.P.; Olivier, M.S.: An overview of image steganography. In ISSA (2005)‏ Morkel, T.; Eloff, J.H.P.; Olivier, M.S.: An overview of image steganography. In ISSA (2005)‏
42.
Zurück zum Zitat Agarwal, M.: Text steganographic approaches: a comparison. IJNSA 5(1), 91–106 (2013)CrossRef Agarwal, M.: Text steganographic approaches: a comparison. IJNSA 5(1), 91–106 (2013)CrossRef
43.
Zurück zum Zitat Gutub, A.; Ghouti, L.; Elarian, Y.; Awaideh, S.; Alvi, A.: Utilizing diacritic marks for Arabic text steganography. KJSE 37(1), 89–109 (2010) Gutub, A.; Ghouti, L.; Elarian, Y.; Awaideh, S.; Alvi, A.: Utilizing diacritic marks for Arabic text steganography. KJSE 37(1), 89–109 (2010)
44.
Zurück zum Zitat Aabed, M.; Awaideh, S.; Elshafei, A.-R.; Gutub, A.: Arabic diacritics based steganography. In: IEEE International Conference on Signal Processing and Communications (ICSPC 2007), pp. 756–759, Dubai, UAE, 24–27 November (2007) Aabed, M.; Awaideh, S.; Elshafei, A.-R.; Gutub, A.: Arabic diacritics based steganography. In: IEEE International Conference on Signal Processing and Communications (ICSPC 2007), pp. 756–759, Dubai, UAE, 24–27 November (2007)
45.
Zurück zum Zitat Al-Nofaie, S.; Fattani, M.; Gutub, A.: Capacity improved Arabic text steganography technique utilizing ‘Kashida’ with whitespaces. In: The 3rd International Conference on Mathematical Sciences and Computer Engineering (ICMSCE 2016), pp. 38–44, Langkawi, Malaysia, February (2016) Al-Nofaie, S.; Fattani, M.; Gutub, A.: Capacity improved Arabic text steganography technique utilizing ‘Kashida’ with whitespaces. In: The 3rd International Conference on Mathematical Sciences and Computer Engineering (ICMSCE 2016), pp. 38–44, Langkawi, Malaysia, February (2016)
46.
Zurück zum Zitat Al-Haidari, F.; Gutub, A.; Al-Kahsah, K.; Hamodi, J.: Improving security and capacity for Arabic text steganography using ‘Kashida’ extensions. In: AICCSA-2009—The 7th ACS/IEEE International Conference on Computer Systems and Applications, pp. 396–399, Rabat, Morocco, 10–13 May (2009) Al-Haidari, F.; Gutub, A.; Al-Kahsah, K.; Hamodi, J.: Improving security and capacity for Arabic text steganography using ‘Kashida’ extensions. In: AICCSA-2009—The 7th ACS/IEEE International Conference on Computer Systems and Applications, pp. 396–399, Rabat, Morocco, 10–13 May (2009)
47.
Zurück zum Zitat Odeh, A.; Elleithy, K.; Faezipour, M.: Steganography in Arabic text using Kashida variation algorithm (KVA). In: IEEE Long Island Systems, Applications and Technology Conference (LISAT) (2013)‏ Odeh, A.; Elleithy, K.; Faezipour, M.: Steganography in Arabic text using Kashida variation algorithm (KVA). In: IEEE Long Island Systems, Applications and Technology Conference (LISAT) (2013)‏
48.
Zurück zum Zitat Gutub, A.: High speed hardware architecture to compute galois fields GF(p) montgomery inversion with scalability features. IET Comput. Digit. Tech. 1(4), 389–396 (2007)CrossRef Gutub, A.: High speed hardware architecture to compute galois fields GF(p) montgomery inversion with scalability features. IET Comput. Digit. Tech. 1(4), 389–396 (2007)CrossRef
49.
Zurück zum Zitat Cheddad, A.; et al.: Digital image steganography: survey and analysis of current methods. Sig. Process. 90(3), 727–752 (2010)CrossRef Cheddad, A.; et al.: Digital image steganography: survey and analysis of current methods. Sig. Process. 90(3), 727–752 (2010)CrossRef
50.
Zurück zum Zitat Gutub, A.: Efficient utilization of scalable multipliers in parallel to compute GF(p) elliptic curve cryptographic operations. KJSE 34(2), 165–182 (2007) Gutub, A.: Efficient utilization of scalable multipliers in parallel to compute GF(p) elliptic curve cryptographic operations. KJSE 34(2), 165–182 (2007)
51.
Zurück zum Zitat Gutub, A.: Area flexible GF (2k) elliptic curve cryptography coprocessor. IAJIT 4(1), 1–10 (2007) Gutub, A.: Area flexible GF (2k) elliptic curve cryptography coprocessor. IAJIT 4(1), 1–10 (2007)
52.
Zurück zum Zitat Wang, K.; Zou, X.; Sui, Y.: A multiple secret sharing scheme based on matrix projection. In: 33rd IEEE International Computer Software and Applications Conference, COMPSAC’09, vol. 1 (2009)‏ Wang, K.; Zou, X.; Sui, Y.: A multiple secret sharing scheme based on matrix projection. In: 33rd IEEE International Computer Software and Applications Conference, COMPSAC’09, vol. 1 (2009)‏
Metadaten
Titel
Hiding Shares of Counting-Based Secret Sharing via Arabic Text Steganography for Personal Usage
verfasst von
Adnan Gutub
Khaled Alaseri
Publikationsdatum
04.07.2019
Verlag
Springer Berlin Heidelberg
Erschienen in
Arabian Journal for Science and Engineering / Ausgabe 4/2020
Print ISSN: 2193-567X
Elektronische ISSN: 2191-4281
DOI
https://doi.org/10.1007/s13369-019-04010-6

Weitere Artikel der Ausgabe 4/2020

Arabian Journal for Science and Engineering 4/2020 Zur Ausgabe

Research article - Special Issue - Intelligent Computing and Interdisciplinary Applications

On Stability Analysis of Particle Swarm Optimization Algorithm

Research Article - Computer Engineering and Computer Science

A Novel Short Text Clustering Model Based on Grey System Theory

Research Article-Computer Engineering and Computer Science

Trustworthy Target Key Alteration Helping Counting-Based Secret Sharing Applicability

Research Article - Computer Engineering and Computer Science

An Enhanced Eye-Tracking Approach Using Pipeline Computation

    Marktübersichten

    Die im Laufe eines Jahres in der „adhäsion“ veröffentlichten Marktübersichten helfen Anwendern verschiedenster Branchen, sich einen gezielten Überblick über Lieferantenangebote zu verschaffen.