Merging Secret Sharing within Arabic Text Steganography for Practical Retrieval

  • Khaled Aydh Alaseri Computer Engineering Department, Umm Al-Qura University, Makkah, Saudi Arabia
  • Adnan Abdul-Aziz Gutub Computer Engineering Department, Umm Al-Qura University, Makkah, Saudi Arabia
Keywords: security, Steganography, Kashida Steganography, secret bit sharing


Secret sharing is becoming famous technique in cases where access to important resources has to be saved by many authorized persons. Steganography is another method used to hide information for personal usage whenever required.

This paper improves modeling a steganography tool to hide shares generated from target access within texts, helping in the retrieval process. The work has built its model on an Arabic data set of Prophet Haddiths utilizing known Kashida Arabic text steganography, which is considered acceptable methods for hiding information. The suggested new approach merged the secret shares via steganography showing increase in capacity promising for research interesting direction of higher security.



Download data is not yet available.


[1] Adnan Gutub, Nouf Al-Juaid, and Esam Khan. "Counting-based secret sharing technique for multimedia applications." Multimedia Tools and Applications (2017): 1-29.‏
[2] Adnan Gutub, Alexandre Ferreira Tenca. "Efficient scalable VLSI architecture for Montgomery inversion in GF (p)." Integration, the VLSI journal, 37.2 (2004): 103-120.‏
[3] Adnan Gutub. "Area flexible GF (2k) elliptic curve cryptography coprocessor." International Arab Journal of Information Technology (IAJIT) 4.1 (2007): 1-10.‏
[4] Esraa Ahmadoh, and Adnan Gutub. "Utilization of two diacritics for Arabic text steganography to enhance performance." Lecture Notes on Information Theory Vol 3.1 (2015).‏
[5] Adnan Gutub. "High speed hardware architecture to compute galois fields GF (p) montgomery inversion with scalability features." IET Computers & Digital Techniques 1.4 (2007): 389-396.‏
[6] Adi Shamir. "How to share a secret." Communications of the ACM 22.11 (1979): 612-613.‏
[7] Blakley, George Robert. "Safeguarding cryptographic keys." Proceedings of the national computer conference. Vol. 48. 1979.‏
[8] Kai Wang, Xukai Zou, and Yan Sui. "A multiple secret sharing scheme based on matrix projection." Computer Software and Applications Conference, 2009. COMPSAC'09. 33rd Annual IEEE International. Vol. 1. IEEE, 2009.‏
[9] Jessica Fridrich, Steganography in digital media: principles, algorithms, and applications. Cambridge University Press, 2009.‏
[10] Adnan Gutub. "Efficient utilization of scalable multipliers in parallel to compute GF (p) elliptic curve cryptographic operations." Kuwait Journal of Science & Engineering (KJSE), December 2007 34.2 (2007): 165-182.‏
[11] Ahmed Al-Nazer and Adnan Gutub, "Exploit Kashida Adding to Arabic e-Text for High Capacity Steganography", International Workshop on Frontiers of Information Assurance & Security (FIAS 2009) in conjunction with the IEEE 3rd International Conference on Network & System Security (NSS 2009), Gold Coast, Queensland, AUSTRALIA, 19-21 October 2009.
[12] Safia Al-Nofaie, Manal Fattani, Adnan Gutub, “Capacity Improved Arabic Text Steganography Technique Utilizing ‘Kashida’ with Whitespaces”, The 3rd International Conference on Mathematical Sciences and Computer Engineering (ICMSCE2016), pp. 38-44, Langkawi, Malaysia, February 2016.
[13] Fahd Al-Haidari, Adnan Gutub, Khalid Al-Kahsah, and Jameel Hamodi, "Improving Security and Capacity for Arabic Text Steganography Using 'Kashida' Extensions", AICCSA-2009 - The 7th ACS/IEEE International Conference on Computer Systems and Applications, Pages: 396-399, Rabat, Morocco, 10-13 May 2009.‏
[14] Ammar Odeh , Khaled Elleithy, and Miad Faezipour. "Steganography in Arabic text using Kashida variation algorithm (KVA)." Systems, Applications and Technology Conference (LISAT), 2013 IEEE Long Island. IEEE, 2013.‏
[15] Tayana Morkel , Jan HP Eloff, and Martin S. Olivier. "An overview of image steganography." ISSA. 2005.‏
[16] Abbas Cheddad, et al. "Digital image steganography: Survey and analysis of current methods." Signal processing 90.3 (2010): 727-752.‏
[17] , 25/5/2018 20:30 P.M.‏
[18] Adnan Gutub and Manal Fattani. “A Novel Arabic Text Steganography Method Using Letter Points and Extensions”, WASET International Conference on Computer, Information and Systems Science and Engineering (ICCISSE), Pages: 28-31, Vienna, Austria, May 25-27, 2007.
[19] Mohammed Aabed, Sameh Awaideh, Abdul-Rahman Elshafei, and Adnan Gutub, “Arabic Diacritics Based Steganography”, IEEE International Conference on Signal Processing and Communications (ICSPC 2007), Pages: 756-759, Dubai, UAE, 24-27 November 2007.