A New Modified Fatha Method For Arabic Text Steganography Hybrid With Aes Encryption
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 5
Abstract
Abstract: Growing the size of attacks that listed during the passing of data between the sending and the receiving has really demand to get high robust method for transfer information in secure manner. Both of cryptography and steganography are familiar and more utilized techniques which process data for encrypt and conceal the secret message, respectively. Two techniques are participating in the same aims and security services like: confidentiality, integrity and availability for secret message from not allowed access. In our paperwe focused on the strength of combination between two techniques and this paper presents a new modified fatha in Arabic text in steganography. This method is depend on the existence of Harakt in majority of Arabic alphabets. On this basis, information was hidden in text by modified Fatha which in same direction of original Fatha but with little oriented to be like original one and not be suspicious and observed as abnormal sign. We combined this new stego method with AES encryption.
Authors and Affiliations
Assist Prof. Dr. Suhad Malalla , PhD student Farah R. Shareef
Interfacing and Analysis of GPS data using VB
Abstract: Global Positioning System (GPS) provides location and time information anywhere on the earth. We can utilize GPS data to create new applications that can be very useful nowadays. If we want to build a new appli...
Using Artificial Intelligence Techniques For Epilepsy Treatment
Abstract: Epilepsy is a combination of neurological disorders that causes people to have seizure. Immediate seizures occurring might cause injuries of the patients or other. Recent studies of epilepsy are based on two ap...
Transforming XML into Object-Relational Schema
Abstract: Recently, there is a vast increase in the use of XML for describing and exchanging data. To manipulate efficiently these data, it would be wise to use database systems which represent an appropriate tool to sto...
A Survey of Recommendation Algorithms
Abstract: Recommender system can be defined as the subclass of information filtering system which attemptsto give the guidance to the users regarding the useful services based on their personalized preferences, pas...
An Enhanced Scheme for Hiding Text in Wave Files
Abstract: Steganography is a term applied to any number of processes that embed an object into another object in order to deceive any observer or adversary. An embedding algorithm for hiding messages into wave files or a...