Steganography in Arabic Text Using Zero Width and Kashidha Letters

  title={Steganography in Arabic Text Using Zero Width and Kashidha Letters},
  author={A. Odeh},
  journal={International Journal of Computer Science and Information Technology},
  • A. Odeh
  • Published 2012
  • Computer Science
  • International Journal of Computer Science and Information Technology
The need for secure communication methods has significantly increased with the explosive growth of the internet and mobile communications. The usage of text documents has doubled several times over the past years especially with mobile devices. In this paper we propose a new steganography algorithm for Arabic text. The algorithm employs some letters that can be joined with other letters. These letters are the extension letter, Kashida and Zero width character. The extension letter, Kashida… Expand
22 Citations
Information hiding: Arabic text steganography by using Unicode characters to hide secret data
  • 6
  • PDF
Arabic Text Steganography in Smartphone
  • 4
An Efficient Approach to Hide Compressed Voice Data in Arabic Text using Kashida and "La"
Utilizing pseudo-spaces to improve Arabic text steganography for multimedia data communications
  • 11
Traid-bit embedding process on arabic text steganography method
Hybrid Arabic text steganography
  • 3
  • PDF
Utilization of Two Diacritics for Arabic Text Steganography to Enhance Performance
  • 28
  • PDF
Highly efficient novel text steganography algorithms
  • 5
Primitive structural method for high capacity text steganography
  • 4
  • PDF


An Improved Version of Persian/Arabic Text Steganography Using "La" Word
  • 22
A New Approach to Persian/Arabic Text Steganography
  • M. Shirali-Shahreza, M. Shirali-Shahreza
  • Computer Science
  • 5th IEEE/ACIS International Conference on Computer and Information Science and 1st IEEE/ACIS International Workshop on Component-Based Software Engineering,Software Architecture and Reuse (ICIS-COMSAR'06)
  • 2006
  • 214
  • PDF
Arabic Diacritics based Steganography
  • 84
  • PDF
Image Steganography by Mapping Pixels to Letters
  • 57
  • PDF
An Overview of Steganography
  • 54
  • PDF
Text Steganography in chat
  • 60
Steganography in TeX documents
  • 15
Visibly Invisible: Ciphertext as a Steganographic Carrier
  • 20