1. How to submit my research paper? What’s the process of publication of my paper?
The journal receives submitted manuscripts via email only. Please submit your research paper in .doc or .pdf format to the submission email: lnit@ejournal.net.
2. Can I submit an abstract?
The journal publishes full research papers....[Read More]

Utilization of Two Diacritics for Arabic Text Steganography to Enhance Performance

Esraa Mohammad Ahmadoh1 and Adnan Abdul-Aziz Gutub2
1.Collage of Computer & Information Systems, Umm Al-Qura University, Makkah, Saudi Arabia
2.Custodian of the Two Holy Mosques Institute of the Hajj & Omrah Research, Umm Al-Qura University, Saudi Arabia
Abstract—An improved Arabic text steganography method is proposed. It hides secret data into text cover media in two Diacritics chosen based on highest availability percentage among all Diacritics, which are eight in Arabic language. This utilization of Diacritics- or Harakat - for security purposes is benefiting from the natural existence of Diacritics as historical Characteristics of Arabic language, originated to just represent vowel sounds. The paper exploits the possibility of hiding data in two Diacritics, i.e. Fathah and Kasrah, adjusting the previously presented single (Fathah only) diacritic hiding scheme. This proposed two Diacritics stego-work is featuring higher capacity and security showing interesting promising results.

Index Terms—Arabic text steganography, information security, diacritics steganography

Cite: Christopher Nwosisi, "A Novel Definition of an Efficient Binary Decision Tree," Lecture Notes on Information Theory, Vol. 3, No. 1, pp. 42-47, June 2015. doi: 10.18178/lnit.3.1.42-47
Copyright © 2012-2015 Lecture Notes on Information Theory, All Rights Reserved