Gh3411531165

206 views
126 views

Published on

International Journal of Engineering Research and Applications (IJERA) is a team of researchers not publication services or private publications running the journals for monetary benefits, we are association of scientists and academia who focus only on supporting authors who want to publish their work. The articles published in our journal can be accessed online, all the articles will be archived for real time access.

Our journal system primarily aims to bring out the research talent and the works done by sciaentists, academia, engineers, practitioners, scholars, post graduate students of engineering and science. This journal aims to cover the scientific research in a broader sense and not publishing a niche area of research facilitating researchers from various verticals to publish their papers. It is also aimed to provide a platform for the researchers to publish in a shorter of time, enabling them to continue further All articles published are freely available to scientific researchers in the Government agencies,educators and the general public. We are taking serious efforts to promote our journal across the globe in various ways, we are sure that our journal will act as a scientific platform for all researchers to publish their works online.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
206
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
1
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Gh3411531165

  1. 1. Abdul Monem S. Rahma, Wesam S.Bhaya, Dhamyaa A. Al-Nasrawi / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.1153-1165 1153 | P a g e Text Steganography Based On Unicode of Characters in Multilingual Prof. Abdul Monem S. Rahma1 , Wesam S.Bhaya2 , Dhamyaa A. Al- Nasrawi3 1 (Computer Science Department, University of Technology, Iraq 2 (College of Computer Technology, University of Babylon, Iraq 3 (Computer Science Department, Kerbala University, Iraq ABSTRACT Network security, and secure communications through public and private channels are more important issue specially when computer usage is increasing, for both social and business areas. Data hiding is one of approach to obtain a secure communication medium and protecting the information during transmission. Text steganography is most challenging because of the presence of very less redundant information in text documents as compared to the images and audio. In this paper a novel method is proposed for data hiding in English scripts using Unicode of English alphabet in another languages. In this method, 13 characters from English alphabet was chosen for hiding process which have appearance in another languages. Two bits embedded in one time, using ASCII code for embedding 00, and using Unicode of multilingual for embedding 01, 10, and 11. This method has a height hiding capacity based on specific characters in each document. As well as have very good perceptual transparency and no changes in original text. Keywords- Multilingual characters, Text hiding, Unicode standard. I. Introduction One way of secure data transfer over the Internet is steganography, which conceals the existence of a message [1]. When information hiding is used, even if an eavesdropper snoops the transmitted object, he cannot surmise the communication since it is carried out in a concealed way. Steganography overcomes the limitation of cryptography(that the third party is always aware of the communication because of the unintelligible nature of the text) by hiding message in an innocent looking object called cover[2]. In modern steganography use electronic media rather than physical objects and texts. The text to be concealed is called embedded data. An innocuous medium, such as text, image, audio, or video file; which is used to hide embedded data is called cover. The stego object is an object we get after hiding the embedded data in a cover medium[1]. There are a number of researches had already explored in new steganographic techniques in texts, such as white spaces [3], Synonyms[4], Word Shifting [5], and Line shifting [6]. This paper focused on researches which used Unicode in data hiding, M. H. Shirali-Shahreza, and Mohammad Shirali- Shahreza proposed new method for hiding information in Persian and Arabic Unicode texts [7]. Also, they proposed another method for hiding data in Persian (Farsi) and Arabic texts. They based on characters of « ‫»ی‬ and « ‫»ک‬ have the same shape but different codes [8]. Lip Yee Por and et al. proposed method based on Unicode space characters with respect to embedding efficiency [9]. In this paper, some letters of English alphabet have appearance in another languages with different codes, these letters used in the proposed method for data hiding in English scripts using Unicode of English alphabet in another languages(multilingual). The rest of the paper is organized as follows. Section 2 explain the Unicode Standard. Section 3 presents the proposed method in detail. Section 4 and 5 demonstrate the results and concludes of the proposed method. II. Unicode Standard The Unicode Standard is the universal character encoding scheme for written characters and text. It defines a consistent way of encoding multilingual text that enables the exchange of text data internationally and creates the foundation for global software[10]. Unicode can be implemented by different character encodings. The most commonly used encodings are UTF-8, UTF-16. UTF-8 uses one byte for any ASCII characters, which have the same code values in both UTF-8 and ASCII encoding, and up to four bytes for other characters. UCS-2 uses a 16-bit code unit (two 8-bit bytes) for each character[11]. Unicode characters are distinguished by code points, which are conventionally represented by the letter U followed by four or five hexadecimal digits, for example U+00AE or U+1D310. Unicode characters can range in scalar values from 0 to over a million. The entire range of Unicode characters is divided into 17 blocks, each block is referred to as a plane and is numbered starting from 0. Characters in the Basic Multilingual Plane (BMP), containing
  2. 2. Abdul Monem S. Rahma, Wesam S.Bhaya, Dhamyaa A. Al-Nasrawi / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.1153-1165 1154 | P a g e modern scripts – including many Chinese and Japanese characters – and many symbols, have a 4- digit code. Historic scripts, but also many modern symbols and pictographs (such as emoticons, many CJK characters, and Egyptian Hieroglyphics) have 5- digit codes[11]. Then, Unicode refer to the family of standards and technologies associated with the Unicode Consortium that can be utilized for working with a written language in a computer environment[12]. III. Proposed Method In this paper, a new method was presented for text steganography in English scripts using Unicode of multilingual characters. Many English alphabet characters (called Latin alphabet) have a good appearance in another languages, with different codes and different glyphs, see Table 1. Unfortunately, not all of these characters can be used in hiding process, because the glyphs of them dissimilar to original English scripts. Just 13 characters was chosen for hiding process based on the following criteria: 1. Located in Plane 0: which contains U+0000 - U+FFFF, this is known as the Basic Multilingual Plane (BMP). 2. The glyphs: A glyph is a presentation of a particular shape which a character may have when rendered or displayed. The glyph of selected characters must be similar to the original script. 3. Availability: depends on its presence in the specified font (selected characters must be supported by standard fonts)[11]. If a desired character is not present in the available fonts(that mean characters have no glyph), an empty box, a question mark or another replacement will be shown: �, see Table 1 . Table 2 explain the selected characters in hiding process. In proposed method, two processes was implemented, hiding process, and extracting process. Hiding process based on the appearance of selected characters in english script. In this method two bits can be embedding at one time. Firstly, selected characters must to be found in document, then embedding process implemented by replacement depending on secret message which can be hidden. and replacement can be done based on secret message as follows: 00 No change If secret message = …(1) { 01,10,11} Replace with nicode of Multilingual characters based on Table 2 The document file must be has enough area to hide data (secret message with two bytes represent message length embedded in beginning). This process called Checking capacity of hiding , see Fig.1. Figure 1. Hiding process Hiding process (Embedding process) summarized in the following algorithm: English scripts written in (Latin letters), take the range (U+0041-U+005A) for uppercase Latin alphabet, and (U+0061-U+007A) for lowercase Latin alphabet in hexadecimal. For example, there is Latin capital "A" which is defined (U+0041) can be no change if secret message is 00, but can be replaced by one of Unicode of Multilingual characters in Table 2 , Based on secret message, replaced by (U+0391) when secret message is 01 as example. In another side, the extracting process Fig.2 is the opposite operation of the hiding process. Figure 2. Extracting process Embedding algorithm Input : Document file, and secret message. Output : Stego file. 1. Open cover document. 2. Scan cover document to find selected characters in Table 2, 3. Compute number of selected characters to check the capacity of hiding. 4. Get binary form of secret message. 5. For each two symbol in secret message - if bit = 00, then no change (ASCII code) , else replace by Unicode of Multilingual characters in Table 2. 6. Hide the message length in the beginning of secret message. 7. Return stego document.
  3. 3. Abdul Monem S. Rahma, Wesam S.Bhaya, Dhamyaa A. Al-Nasrawi / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.1153-1165 1155 | P a g e In order to find selected characters, we must check the code of current characters, by the following statement: In range of ( U+0041 - U+005A) or ( U+0061 - U+007A), then Secret message = 0 If Code of …(2) Selected characters Else Secret message = {01,10,11} based on Table 2 The first 16-characters represent the secret message length. Extracting process summarized in the following algorithm: IV. Results In this paper, the proposed method of data hiding is tested by taking different cover documents with different sizes and hiding the same secret message in some of them, sees the corresponding GUI for the proposed method in Fig. 3. Figure 3. GUI of proposed method The payload of bits can be hidden based on selected characters number. If the cover file contains, for example, 200 selected characters, we can hiding 400 bits in it(because two bits can be embedded in one character). Fig. 4 and Fig. 5 represent cover document and stego document respectively. Figure 4. Cover document Figure 5. Stego document The results that are got from these experiments can be summarized in the Table 3. Note the average of size for stego document (after hiding) is increased about (11.1 %) from original size, because using Unicode instead of ASCII code in embedding process, which use UTF-16 encodings for each character. V. Conclusions In data hiding method, the main goals of steganography are (perceptual transparency, capacity, and robustness). Proposed method has an excellent perceptual transparency because the stego text is similar to the original text using characters in multilingual which their glyphs more similar and suitable to glyphs of original script. The hiding capacity of proposed method is very high, depending on selected characters frequency shown in Table 2. In addition, this method is robust to digital copy-past operation, which means that copying and pasting the text between computer programs preserve hidden information. In other side, there is an increasing in stego document size, result from Unicode which use 2-bytes for each character. Huffman code for data compression can be suggested to overcome this drawback. Thus, the proposed method provide an efficient text steganography method by Unicode, and an excellent way to obtain safe and secure information transformation. References [1] M. Agarwal, Application Text Steganographic Approaches: A Comparison, Extracting algorithm Input : Stego file . Output : Secret message. 1. Open stego document. 2. Extract secret message length 3. Scan stego document to find ligatures characters, 4. Check code of selected characters based on equation (2) - if code in uppercase or lowercase English Latin letters then secret message=00 - else secret message=01,or 10, or 11 based on Table 2.
  4. 4. Abdul Monem S. Rahma, Wesam S.Bhaya, Dhamyaa A. Al-Nasrawi / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.1153-1165 1156 | P a g e International Journal of Network Security & Its Applications, 5(1), 2013, 91-106. [2] K. Rabah, Steganography-the art of hiding data, Information Technology Journal, 3(3), 2004, 245-269. [3] W. Bender, D. Gruhl, N. Morimoto, and A. Lu, Techniques for data hiding, IBM System Journal 35(3-4), 1996, 313-336. [4] H. Shirali-Shahreza, M. Shirali-Shahreza, A new synonym text steganography. Proc. 8th International Conf. on Intelligent Information Hiding and Multimedia Signal Processing, Harbin, China, 2008, 1524- 1526. [5] Y. Kim, K. Moon, I. Oh, A text watermarking algorithm based on word classification and inter-word space statistics, Proc. 7th International Conf. on Document Analysis and Recognition, Edinburgh, Scotland: IEEE,2003, 775-779. [6] S. Low, N. Maxemchuk, J. Brassil, L. O’Gorman, Document marking and identification using both line and word shifting, Proc.14th Annual Joint Conf. of the IEEE Computer and Communications Societies, Boston, MA, USA: IEEE, 1995, 853- 860. [7] H. Shirali-Shahreza, M. Shirali-Shahreza, Steganography in Persian and Arabic unicode texts using pseudo-space and pseudo-connection characters, Journal of Theoretical and Applied Information Technology, 4(8), 2008, 682-687. [8] H. Shirali-Shahreza, M. Shirali-Shahreza, Arabic/Persian text steganography utilizing similar letters with different codes, The Arabian Journal for Science and Engineering, 35(1B), 2010, 213-222. [9] L. Por, K. Wong, K. Chee, UniSpaCh: A text-based data hiding method using unicode space characters, The Journal of Systems and Software 85(5), 2012, 1075– 1082. [10] The Unicode Consortium, The Unicode Standard, http://www.unicode.org. [11] J. Korpela, Unicode explained (United States of America., O'Reilly Media , 2006). [12] D. Yacob, Unicode for Under-Resourced Languages, 2006, 33-38. From http://mt- archive.info/LREC-2006-Jacob.pdf .
  5. 5. Abdul Monem S. Rahma, Wesam S.Bhaya, Dhamyaa A. Al-Nasrawi / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.1153-1165 1157 | P a g e Table 1: Unicode of Characters in Multilingual Multilingual, Glyphs, and Unicode (ASCII) Latin Alphabets Unified Canadian Aboriginal Syllabics Unified Canadian Aboriginal Syllabics Unified Canadian Aboriginal Syllabics CherokeeCherokeeCyrillic Greek and Coptic C0 Control and Basic Latin A 0041 ᗋᗩᗅᎯᎪАΑ 15CB15E915C513AF13AA04100391 Halfwidth and Fullwidth Form Phonetic Extensions Phonetic Extensions Aᴬᴀ FF211D2C1D00 Unified Canadian Aboriginal Syllabics CherokeeCyrillicCyrillic Greek and Coptic IPA Extensions Latin Extended-B B 0042 ᗷᏴВвΒʙƁ 15F713F404120432039202990181 Coptic Letterlike symbols Phonetic Extensions Coptic Halfwidth and Fullwidth Form Vai ⲂℬᴮⲃBꕗ 2C82212C1D2E2C83FF22A557 Halfwidth and Fullwidth Form Numbers Form Phonetic Extensions CherokeeGeorgianCyrillic Greek and Coptic C 0043 CⅭᴄᏟႺСϹ FF23216D1D0413DF10BA042103F9 Yi RadicalsYi RadicalsCopticKayah Li Mathematical Operators ꒟꒝ꕗꕗ∁ A49FA49D2CA4A90D2201 Numbers Form Phonetic Extensions Phonetic Extensions Unified Canadian Aboriginal Syllabics Unified Canadian Aboriginal Syllabics Cherokee Latin Extended-B D 0044 ⅮᴅᴰᗪᗞᎠƊ 216E1D051D3015EA15DE13A0018A Halfwidth and Fullwidth Form Letterlike symbols Dⅅ FF242145 Hangul Compatibility Jamo Phonetic Extensions Tifinagh Phonetic Extensions CherokeeCyrillic Greek and CopticE 0045 ㅌᴇꕗᴱᎬЕΕ 314C1D072D391D3113AC04150395
  6. 6. Abdul Monem S. Rahma, Wesam S.Bhaya, Dhamyaa A. Al-Nasrawi / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.1153-1165 1158 | P a g e Vai Halfwidth and Fullwidth Form ꕗE A5CBFF25 Latin Extended-D Halfwidth and Fullwidth Form Unified Canadian Aboriginal Syllabics Letterlike symbols Greek and CopticF 0046 ꕗFᖴℱϜ A730FF2615B4213103DC Phonetic Extensions CherokeeCherokeeCherokee Cyrillic Supplement Cyrillic Supplement IPA Extensions G 0047 ᴳᏩᎶᏀԍԌɢ 1D3313E913B613C0050D050C0262 Halfwidth and Fullwidth Form G FF27 Phonetic Extensions Unified Canadian Aboriginal Syllabics CherokeeCyrillicCyrillic Greek and Coptic IPA Extensions H 0048 ᴴᕼᎻнНΗʜ 1D34157C13BB043D041D0397029C Yi Syllables Halfwidth and Fullwidth Form Letterlike symbols RunicCopticCopticEthiopic ꀿHℍᚺⲂꕗዘ A03FFF28210D16BA2C8F2C8E12D8 Letterlike symbols Phonetic Extensions ℋᵸ 210B1D78 Numbers Form Phonetic Extensions CherokeeCyrillicCyrillic Greek and Coptic IPA Extensions I 0049 ⅠᴵᏆІӀΙɪ 21601D3513C6040604C00399026A Yi SyllablesVAI Latin Extended-D Coptic Halfwidth and Fullwidth Form Halfwidth and Fullwidth Form Halfwidth and Fullwidth Form ꀤꕗꕗꕗエェI A024A56FA7FE2C92FF74FF6AFF29 Bopomofo Extended Tifinagh ㆲꕗ 31B22D4A Halfwidth and Fullwidth Form Phonetic Extensions Phonetic Extensions Unified Canadian Aboriginal Syllabics CherokeeMyanmarCyrillic J 004A
  7. 7. Abdul Monem S. Rahma, Wesam S.Bhaya, Dhamyaa A. Al-Nasrawi / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.1153-1165 1159 | P a g e JᴊᴶᒍᎫ၂Ј FF2A1D0A1D36148D13AB10420408 Letterlike symbols ℐ 2110 Letterlike symbols Phonetic Extensions Phonetic Extensions CherokeeCyrillic Greek and Coptic Latin Extended-B K 004B KᴋᴷᏦКΚƘ 212A1D0B1D3713E6041A039A0198 RunicCoptic Halfwidth and Fullwidth Form ᛕⲂK 16D52C94FF2B Phonetic Extensions Tai Le Unified Canadian Aboriginal Syllabics CherokeeArmenianArmenian IPA Extensions L 004C ᴸꕗᒪᏞլԼʟ 1D38196814AA13DE056C053C029F Halfwidth and Fullwidth Form Halfwidth and Fullwidth Form Letterlike symbols Yi Radicals Phonetic Extensions Supplement CopticCoptic Lᄂℒ꒒ᶫꕗꕗ FF2CFFA42112A4921DAB2CD12CD0 Bopomofo Numbers Form ㄥⅬ 3125216C Phonetic Extensions Phonetic Extensions CherokeeCyrillicCyrillic Greek and Coptic Greek and Coptic M 004D ᴍᴹᎷмМΜϺ 1D0D1D3913B7043C041C039C03FA Coptic Halfwidth and Fullwidth Form Numbers Form Coptic Letterlike symbols Runic ꕗMⅯꕗℳᛖ 2C98FF2D216F2C99213316D6 CopticCoptic Halfwidth and Fullwidth Form Phonetic Extensions Greek and Coptic IPA Extensions Latin Extended-B N 004E ⲃⲃNᴺΝɴƝ 2C9B2C9AFF2E1D3A039D0274019D Letterlike symbols Phonetic Extensions Supplement ℕᶰ 21151DB0 Yi RadicalsYi SyllablesOriyaNkoArmenianCyrillic Greek and CopticO 004F ꒨ꄲଠ߀ՕОΟ
  8. 8. Abdul Monem S. Rahma, Wesam S.Bhaya, Dhamyaa A. Al-Nasrawi / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.1153-1165 1160 | P a g e A4A8A1320B2007C00555041E039F OriyaCoptic Halfwidth and Fullwidth Form Limbu ୦ⲃOⲃ 0B662C9EFF2F1946 Phonetic Extensions Phonetic Extensions Phonetic Extensions CherokeeCyrillic Greek and Coptic Latin Extended-B P 0050 ᴾᴩᴘᏢРΡƤ 1D3E1D291D1813E2042003A101A4 Letterlike symbols Coptic Halfwidth and Fullwidth Form ℙⲃP 21192CA2FF30 Letterlike symbols Tifinagh Halfwidth and Fullwidth Form Cyrillic SupplementQ 0051 ℚꕗQⲂ 211A2D55FF31051A Phonetic Extensions Unified Canadian Aboriginal Syllabics CherokeeCherokee IPA Extensions Latin Extended-B Latin Extended-B R 0052 ᴿᖇᏒᎡʀɌƦ 1D3F158713D213A10280024C01A6 Letterlike symbols Halfwidth and Fullwidth Form Letterlike symbols ℝRℛ 211DFF32211B VaiYi RadicalsYi SyllablesCherokeeGeorgianArmenianCyrillic S 0053 ꕗ꒚ꇙᏚႽՏЅ A576A49AA1D913DA10BD054F0405 Malayalam Halfwidth and Fullwidth Form ടS 0D1FFF33 NkoCyrillicCyrillic Greek and Coptic Greek and Coptic Greek and Coptic Latin Extended-B T 0054 ߀тТⲃⲃΤƬ 07E0044204220373037203A401AC CopticCopticEthiopic Halfwidth and Fullwidth Form VaiYi Radicals Hangul Compatibility Jamo ⲃⲃፐTꕗ꓄ㅜ 2CA72CA61350FF34A50BA4C4315C
  9. 9. Abdul Monem S. Rahma, Wesam S.Bhaya, Dhamyaa A. Al-Nasrawi / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.1153-1165 1161 | P a g e Bopomofo Phonetic Extensions Phonetic Extensions Cherokee ㄒᴛᵀᎢ 31121D1B1D4013A2 Halfwidth and Fullwidth Form Yi Radicals Phonetic Extensions Phonetic Extensions Unified Canadian Aboriginal Syllabics Armenian U 0055 U꒤ᴜᵁᑌՍ FF35A4A41D1C1D41144C054D Unified Canadian Aboriginal Syllabics Halfwidth and Fullwidth Form Numbers Form Cherokee V 0056 ᐯVⅤᏤ 142FFF36216413E4 Halfwidth and Fullwidth Form CherokeeCherokee Cyrillic Supplement Cyrillic W 0057 WᏔᎳⲂѠ FF3713D413B3051C0460 CopticCoptic Halfwidth and Fullwidth Form Yi Radicals Numbers Form Cyrillic Greek and Coptic X 0058 ⲃⲃX꒼ⅩХΧ 2CAD2CACFF38A4BC2169042503A7 Runic ᚷ 16B7 Halfwidth and Fullwidth Form CyrillicCyrillic Greek and Coptic IPA ExtensionsY 0059 YүҮΥʏ FF3904AF04AE03A5028F Coptic Halfwidth and Fullwidth Form CherokeeMyanmar Greek and Coptic Latin Extended-B Latin Extended-B Z 005A ⲃZᏃⲃΖƵȤ 2C8CFF3A13C31097039601B50224 Letterlike symbols Limbu ℤⲃ 21241901 Halfwidth and Fullwidth Form Phonetic Extensions Phonetic Extensions Tai LeCyrillic IPA Extensionsa 0061 aᵅᵃꕗаɑ FF411D451D43197204300251 Unified Canadian CherokeeNkoCyrillicCyrillic Latin Extended-B Latin Extended-B b 0062
  10. 10. Abdul Monem S. Rahma, Wesam S.Bhaya, Dhamyaa A. Al-Nasrawi / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.1153-1165 1162 | P a g e Aboriginal Syllabics ᖯᏏ߀ьЬƄƅ 15AF13CF07D5044C042C01840185 Halfwidth and Fullwidth Form Phonetic Extensions bᵇ FF421D47 CyrillicCoptic Halfwidth and Fullwidth Form Numbers Form Tai LeMyanmar Greek and Copticc 0063 сⲃcⅽꕗⲃϲ 04412CA5FF43217D1974100403F2 Yi RadicalsYi Radicals Numbers Form Phonetic Extensions Unified Canadian Aboriginal Syllabics Cyrillic Supplement Cyrillic Supplement d 0064 ꒯꒭ⅾᵈᑯԁԀ A4AFA4AD217E1D48146F05010500 Letterlike symbols Halfwidth and Fullwidth Form ⅆd 2146FF44 Halfwidth and Fullwidth Form Letterlike symbols Letterlike symbols Phonetic Extensions Tai LeMyanmarCyrillic e 0065 eℯ℮ᵉꕗⲃе FF45212F212E1D49197110540435 Phonetic Extensions Halfwidth and Fullwidth Form f 0066 ᶠf 1DA0FF46 Phonetic Extensions Supplement Halfwidth and Fullwidth Form Letterlike symbols Phonetic Extensions IPA Extensionsg 0067 ᶢgℊᵍɡ 1DA2FF47210A1D4D0261 Halfwidth and Fullwidth Form Letterlike symbols CherokeeGeorgianCyrillicCyrillic Spacing Modifier Lettersh 0068 hℎᏂႹһҺʰ FF48210E13C210B904BB04BA02B0 Letterlike symbols Halfwidth and Fullwidth Form Numbers Form Phonetic Extensions CherokeeCyrillic i 0069
  11. 11. Abdul Monem S. Rahma, Wesam S.Bhaya, Dhamyaa A. Al-Nasrawi / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.1153-1165 1163 | P a g e ⅈiⅰᵢᎥі 2148FF4921701D6213A50456 Letterlike symbols Halfwidth and Fullwidth Form Unified Canadian Aboriginal Syllabics Cyrillic Greek and Coptic Spacing Modifier Letters IPA Extensionsj 006A ⅉjᒎјϳʲʝ 2149FF4A148E045803F302B2029D Coptic Halfwidth and Fullwidth Form Phonetic Extensions Cyrillic k 006B ⲃkᵏк 2C95FF4B1D4F043A VaiTifinagh Numbers Form Tai LeTeluguCyrillic Spacing Modifier Letters l 006C ꕗꕗⅼꕗ౹ӏˡ A6212D4F217C19630C7904CF02E1 Yi Radicals Halfwidth and Fullwidth Form ꒐l A490FF4C Halfwidth and Fullwidth Form Numbers Form Phonetic Extensionsm 006D mⅿᵐ FF4D217F1D50 Halfwidth and Fullwidth Form Tai Le n 006E nꕗ FF4E1952 MyanmarTeluguTamilLaoArmenianCyrillic Greek and Coptic o 006F ၂౦௦໐օоο 10400C660BE60ED00585043E03BF New Tai LueMyanmar Phonetic Extensions CopticEthiopic Halfwidth and Fullwidth Form Phonetic Extensions ꕗⲃᴼⲃዐoᴏ 19D0101D1D3C2C9F12D0FF4F1D0F Coptic Halfwidth and Fullwidth Form Phonetic Extensions Cyrillic p 0070 ⲃpᵖр 2CA3FF501D560440 HalfwidthCyrillicq
  12. 12. Abdul Monem S. Rahma, Wesam S.Bhaya, Dhamyaa A. Al-Nasrawi / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.1153-1165 1164 | P a g e and Fullwidth Form Supplement0071 qⲂ FF51051B Halfwidth and Fullwidth Form Phonetic Extensions Spacing Modifier Letters IPA Extensionsr 0072 rᵣʳɼ FF521D6302B3027C Limbu Latin Extended-D Unified Canadian Aboriginal Syllabics Halfwidth and Fullwidth Form Cyrillic Spacing Modifier Letterss 0073 ⲃⲃᔆsѕˢ 1949A7311506FF53045502E2 Halfwidth and Fullwidth Form Phonetic Extensions IPA Extensionst 0074 tᵗʈ FF541D570288 Phonetic Extensions Halfwidth and Fullwidth Form Phonetic Extensionsu 0075 ᵘuᵤ 1D58FF551D64 Halfwidth and Fullwidth Form Tifinagh Number Form Limbu Phonetic Extensions Phonetic Extensions Greek and Copticv 0076 vꕗⅴⲃᵥᴠν FF562D382174194E1D651D2003BD Phonetic Extensions Halfwidth and Fullwidth Form Phonetic Extensions Cyrillic Supplement Spacing Modifier Lettersw 0077 ᵂwᴡⲂʷ 1D42FF571D21051D02B7 Limbu Halfwidth and Fullwidth Form Bopomofo Number Form Cyrillic Spacing Modifier Lettersx 0078 ⲃxㄨⅹхˣ 194AFF5831282179044502E3 Halfwidth and Fullwidth Form BopomofoCherokeeGeorgianCyrillicCyrillic Spacing Modifier Lettersy 0079 yㄚᎩႸуУʸ FF59311A13A910B80443042302B8 Phonetic Extensions Latin Extended-B Coptic Unified Canadian Halfwidth and Phonetic Extensions Latin Extended-B z 007A
  13. 13. Abdul Monem S. Rahma, Wesam S.Bhaya, Dhamyaa A. Al-Nasrawi / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.1153-1165 1165 | P a g e Table2: Selected English alphabets for hiding process Symbols ASCII Unicode Secret message 00 Secret message 01 Secret message 10 Secret message 11 A 0041 0391 0410 13AA B 0042 0392 0412 0181 E 0045 0395 0415 13AC G 0047 050C 13C0 13B6 H 0048 0397 041D 13BB I 0049 0399 04C0 0406 M 004D 039C 041C 216F O 004F 039F 041E 0555 P 0050 0420 03A1 01A4 S 0053 0405 054F 13DA T 0054 0422 03A4 01AC j 006A 0458 03F3 029D o 006F 03BF 1D0F 043E SupplementAboriginal Syllabics Fullwidth Form ᶻƶⲃᙆzᴢȥ 1DBB01B62C8D1646FF5A1D220225 Table 3: Experimental results of proposed method Experiment #. Selected Char.# in Cover Max.# of bits Can be Embedded in Cover Ratio of Stego-Doc. Size increasing (%) 1 1313 2626 1.11 2 1465 2930 27.6 3 379 758 17.7 4 1602 3204 0.8 5 4091 8182 2.8 6 3681 7362 2.3 7 672 1344 23 8 268 536 4.2 9 6515 13030 31.7 10 902 1804 0.7 Avrg. 11.1

×