Publication:
Evaluating the Utilization of Grammatical Structures of Arabic Language in Hiding Bits

dc.authorscopusid59425853900
dc.authorscopusid36460529100
dc.authorscopusid59812289500
dc.authorscopusid56266264600
dc.contributor.authorRihan, Y.
dc.contributor.authorAltaweel, A.
dc.contributor.authorKhattab, K.
dc.contributor.authorKamel, I.
dc.date.accessioned2025-12-11T00:32:55Z
dc.date.issued2024
dc.departmentOndokuz Mayıs Üniversitesien_US
dc.department-temp[Rihan] Yazen, Department of Computer Engineering, University of Sharjah, Sharjah, Sharjah, United Arab Emirates; [Altaweel] Ala, Department of Computer Engineering, University of Sharjah, Sharjah, Sharjah, United Arab Emirates; [Khattab] Khattab, Faculty of Ilahiyat, Ondokuz Mayis Üniversitesi, Samsun, Turkey; [Kamel] Ibrahim H., Department of Computer Engineering, University of Sharjah, Sharjah, Sharjah, United Arab Emiratesen_US
dc.description.abstractNowadays, there is massive volume of data transmitted constantly through digital mediums. This data faces the risks of various cyber-attacks like eavesdropping, traffic analysis, packet injection, and packet dropping. There has been several security mechanisms to secure sensitive data and ensure their confidentiality, integrity, and availability. Indeed, Encryption, which is the process of converting the plain-text data into a non-understandable form known as the cipher-text, can secure the sensitive data. However, Encryption techniques are costly in terms of computational resources. Steganography, on the other hand, attempts to exploit the redundancy in data representation and structure to hide secret information within the data. Text steganography refers to the art of hiding secret information inside long passages of text. This paper proposes a new text steganography technique that exploits grammatical structures of Arabic language. Specifically, the paper exploits the redundancy in the language structure of Arabic grammar. The paper also presents the results of applying the proposed technique on a large dataset of articles from different categories such as politics, sports, and religion. The conducted experiments measure the number of secret bits that can be hidden in 1000 words for each category. The results show that some steganography rules can perform differently when annlied to different categories of text. © 2024 IEEE.en_US
dc.identifier.doi10.1109/ASET60340.2024.10708723
dc.identifier.isbn9798350344134
dc.identifier.issn2831-6886
dc.identifier.issn2831-6878
dc.identifier.scopus2-s2.0-85210232942
dc.identifier.urihttps://doi.org/10.1109/ASET60340.2024.10708723
dc.identifier.urihttps://hdl.handle.net/20.500.12712/37279
dc.language.isoenen_US
dc.publisherInstitute of Electrical and Electronics Engineers Inc.en_US
dc.relation.ispartofAdvances in Science and Engineering Technology International Conferences, ASET -- 2024 Advances in Science and Engineering Technology International Conferences, ASET 2024 -- 2024-06-03 through 2024-06-05 -- Abu Dhabi -- 203414en_US
dc.relation.publicationcategoryKonferans Öğesi - Uluslararası - Kurum Öğretim Elemanıen_US
dc.rightsinfo:eu-repo/semantics/closedAccessen_US
dc.subjectArabicen_US
dc.subjectLinguisticen_US
dc.subjectSteganographyen_US
dc.subjectText and Information Securityen_US
dc.titleEvaluating the Utilization of Grammatical Structures of Arabic Language in Hiding Bitsen_US
dc.typeConference Objecten_US
dspace.entity.typePublication

Files