SlideShare a Scribd company logo
1 of 13
Download to read offline
Abdul Monem S. Rahma, Wesam S.Bhaya, Dhamyaa A. Al-Nasrawi / International Journal of
Engineering Research and Applications (IJERA) ISSN: 2248-9622
www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.1153-1165
1153 | P a g e
Text Steganography Based On Unicode of Characters in
Multilingual
Prof. Abdul Monem S. Rahma1
, Wesam S.Bhaya2
, Dhamyaa A. Al-
Nasrawi3
1
(Computer Science Department, University of Technology, Iraq
2
(College of Computer Technology, University of Babylon, Iraq
3
(Computer Science Department, Kerbala University, Iraq
ABSTRACT
Network security, and secure
communications through public and private
channels are more important issue specially when
computer usage is increasing, for both social and
business areas. Data hiding is one of approach to
obtain a secure communication medium and
protecting the information during transmission.
Text steganography is most challenging because of
the presence of very less redundant information in
text documents as compared to the images and
audio. In this paper a novel method is proposed for
data hiding in English scripts using Unicode of
English alphabet in another languages. In this
method, 13 characters from English alphabet was
chosen for hiding process which have appearance
in another languages. Two bits embedded in one
time, using ASCII code for embedding 00, and
using Unicode of multilingual for embedding 01,
10, and 11. This method has a height hiding
capacity based on specific characters in each
document. As well as have very good perceptual
transparency and no changes in original text.
Keywords- Multilingual characters, Text hiding,
Unicode standard.
I. Introduction
One way of secure data transfer over the
Internet is steganography, which conceals the
existence of a message [1]. When information hiding
is used, even if an eavesdropper snoops the
transmitted object, he cannot surmise the
communication since it is carried out in a concealed
way. Steganography overcomes the limitation of
cryptography(that the third party is always aware of
the communication because of the unintelligible
nature of the text) by hiding message in an innocent
looking object called cover[2].
In modern steganography use electronic
media rather than physical objects and texts. The text
to be concealed is called embedded data. An
innocuous medium, such as text, image, audio, or
video file; which is used to hide embedded data is
called cover. The stego object is an object we get
after hiding the embedded data in a cover medium[1].
There are a number of researches had
already explored in new steganographic techniques in
texts, such as white spaces [3], Synonyms[4], Word
Shifting [5], and Line shifting [6]. This paper focused
on researches which used Unicode in data hiding, M.
H. Shirali-Shahreza, and Mohammad Shirali-
Shahreza proposed new method for hiding 
information in Persian and Arabic Unicode texts [7].
Also, they proposed another method for hiding data
in Persian (Farsi) and Arabic texts. They based on
characters of « ‫»ی‬ and « ‫»ک‬ have the same shape but
different codes [8]. Lip Yee Por and et al. proposed
method based on Unicode space characters with
respect to embedding efficiency [9].
In this paper, some letters of English
alphabet have appearance in another languages with
different codes, these letters used in the proposed
method for data hiding in English scripts using
Unicode of English alphabet in another
languages(multilingual).
The rest of the paper is organized as follows.
Section 2 explain the Unicode Standard. Section 3
presents the proposed method in detail. Section 4 and
5 demonstrate the results and concludes of the
proposed method.
II. Unicode Standard
The Unicode Standard is the universal
character encoding scheme for written characters and
text. It defines a consistent way of encoding
multilingual text that enables the exchange of text
data internationally and creates the foundation for
global software[10]. Unicode can be implemented by
different character encodings. The most commonly
used encodings are UTF-8, UTF-16. UTF-8 uses one
byte for any ASCII characters, which have the same
code values in both UTF-8 and ASCII encoding, and
up to four bytes for other characters. UCS-2 uses a
16-bit code unit (two 8-bit bytes) for each
character[11].
Unicode characters are distinguished by
code points, which are conventionally represented by
the letter U followed by four or five hexadecimal
digits, for example U+00AE or U+1D310. Unicode
characters can range in scalar values from 0 to over a
million. The entire range of Unicode characters is
divided into 17 blocks, each block is referred to as a
plane and is numbered starting from 0. Characters in
the Basic Multilingual Plane (BMP), containing
Abdul Monem S. Rahma, Wesam S.Bhaya, Dhamyaa A. Al-Nasrawi / International Journal of
Engineering Research and Applications (IJERA) ISSN: 2248-9622
www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.1153-1165
1154 | P a g e
modern scripts – including many Chinese and
Japanese characters – and many symbols, have a 4-
digit code. Historic scripts, but also many modern
symbols and pictographs (such as emoticons, many
CJK characters, and Egyptian Hieroglyphics) have 5-
digit codes[11].
Then, Unicode refer to the family of standards and
technologies associated with the Unicode Consortium
that can be utilized for working with a written
language in a computer environment[12].
III. Proposed Method
In this paper, a new method was presented
for text steganography in English scripts using
Unicode of multilingual characters. Many English
alphabet characters (called Latin alphabet) have a
good appearance in another languages, with different
codes and different glyphs, see Table 1.
Unfortunately, not all of these characters can
be used in hiding process, because the glyphs of them
dissimilar to original English scripts. Just 13
characters was chosen for hiding process based on
the following criteria:
1. Located in Plane 0: which contains U+0000 -
U+FFFF, this is known as the Basic Multilingual
Plane (BMP).
2. The glyphs: A glyph is a presentation of a
particular shape which a character may have when
rendered or displayed. The glyph of selected
characters must be similar to the original script.
3. Availability: depends on its presence in the
specified font (selected characters must be
supported by standard fonts)[11]. If a desired
character is not present in the available fonts(that
mean characters have no glyph), an empty box, a
question mark or another replacement will be shown:
�, see Table 1 .
Table 2 explain the selected characters in hiding
process.
In proposed method, two processes was
implemented, hiding process, and extracting process.
Hiding process based on the appearance of selected
characters in english script. In this method two bits
can be embedding at one time. Firstly, selected
characters must to be found in document, then
embedding process implemented by replacement
depending on secret message which can be hidden.
and replacement can be done based on secret
message as follows:
00 No change
If secret message = …(1)
{ 01,10,11} Replace with nicode of
Multilingual characters
based on Table 2
The document file must be has enough area
to hide data (secret message with two bytes represent
message length embedded in beginning). This
process called Checking capacity of hiding , see
Fig.1.
Figure 1. Hiding process
Hiding process (Embedding process)
summarized in the following algorithm:
English scripts written in (Latin letters), take
the range (U+0041-U+005A) for uppercase Latin
alphabet, and (U+0061-U+007A) for lowercase Latin
alphabet in hexadecimal. For example, there is Latin
capital "A" which is defined (U+0041) can be no
change if secret message is 00, but can be replaced by
one of Unicode of Multilingual characters in Table 2
, Based on secret message, replaced by (U+0391)
when secret message is 01 as example.
In another side, the extracting process Fig.2
is the opposite operation of the hiding process.
Figure 2. Extracting process
Embedding algorithm
Input : Document file, and secret message.
Output : Stego file.
1. Open cover document.
2. Scan cover document to find selected characters
in Table 2,
3. Compute number of selected characters to check
the capacity of hiding.
4. Get binary form of secret message.
5. For each two symbol in secret message
- if bit = 00, then no change (ASCII code) ,
else replace by Unicode of Multilingual
characters in Table 2.
6. Hide the message length in the beginning
of secret message.
7. Return stego document.
Abdul Monem S. Rahma, Wesam S.Bhaya, Dhamyaa A. Al-Nasrawi / International Journal of
Engineering Research and Applications (IJERA) ISSN: 2248-9622
www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.1153-1165
1155 | P a g e
In order to find selected characters, we must
check the code of current characters, by the following
statement:
In range of ( U+0041 - U+005A)
or ( U+0061 - U+007A), then
Secret message = 0
If Code of …(2)
Selected characters
Else Secret message = {01,10,11}
based on Table 2
The first 16-characters represent the secret
message length. Extracting process summarized in
the following algorithm:
IV. Results
In this paper, the proposed method of data
hiding is tested by taking different cover documents
with different sizes and hiding the same secret
message in some of them, sees the corresponding
GUI for the proposed method in Fig. 3.
Figure 3. GUI of proposed method
The payload of bits can be hidden based on
selected characters number. If the cover file contains,
for example, 200 selected characters, we can hiding
400 bits in it(because two bits can be embedded in
one character). Fig. 4 and Fig. 5 represent cover
document and stego document respectively.
Figure 4. Cover document
Figure 5. Stego document
The results that are got from these
experiments can be summarized in the Table 3. Note
the average of size for stego document (after hiding)
is increased about (11.1 %) from original size,
because using Unicode instead of ASCII code in
embedding process, which use UTF-16 encodings for
each character.
V. Conclusions
In data hiding method, the main goals of
steganography are (perceptual transparency, capacity,
and robustness). Proposed method has an excellent
perceptual transparency because the stego text is
similar to the original text using characters in
multilingual which their glyphs more similar and
suitable to glyphs of original script. The hiding
capacity of proposed method is very high, depending
on selected characters frequency shown in Table 2. In
addition, this method is robust to digital copy-past
operation, which means that copying and pasting the
text between computer programs preserve hidden
information. In other side, there is an increasing in
stego document size, result from Unicode which use
2-bytes for each character. Huffman code for data
compression can be suggested to overcome this
drawback. Thus, the proposed method provide an
efficient text steganography method by Unicode, and
an excellent way to obtain safe and secure
information transformation.
References
[1] M. Agarwal, Application Text
Steganographic Approaches: A Comparison,
Extracting algorithm
Input : Stego file .
Output : Secret message.
1. Open stego document.
2. Extract secret message length
3. Scan stego document to find ligatures characters,
4. Check code of selected characters based on equation (2)
- if code in uppercase or lowercase English Latin letters
then secret message=00
- else secret message=01,or 10, or 11 based on Table 2.
Abdul Monem S. Rahma, Wesam S.Bhaya, Dhamyaa A. Al-Nasrawi / International Journal of
Engineering Research and Applications (IJERA) ISSN: 2248-9622
www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.1153-1165
1156 | P a g e
International Journal of Network Security &
Its Applications, 5(1), 2013, 91-106.
[2] K. Rabah, Steganography-the art of hiding
data, Information Technology Journal, 3(3),
2004, 245-269.
[3] W. Bender, D. Gruhl, N. Morimoto, and A.
Lu, Techniques for data hiding, IBM System
Journal 35(3-4), 1996, 313-336.
[4] H. Shirali-Shahreza, M. Shirali-Shahreza, A
new synonym text steganography. Proc. 8th
International Conf. on Intelligent
Information Hiding and Multimedia Signal
Processing, Harbin, China, 2008, 1524-
1526.
[5] Y. Kim, K. Moon, I. Oh, A text
watermarking algorithm based on word
classification and inter-word space statistics,
Proc. 7th International Conf. on Document
Analysis and Recognition, Edinburgh,
Scotland: IEEE,2003, 775-779.
[6] S. Low, N. Maxemchuk, J. Brassil, L.
O’Gorman, Document marking and
identification using both line and word
shifting, Proc.14th Annual Joint Conf. of the
IEEE Computer and Communications
Societies, Boston, MA, USA: IEEE, 1995,
853- 860.
[7] H. Shirali-Shahreza, M. Shirali-Shahreza,
Steganography in Persian and Arabic
unicode texts using pseudo-space and
pseudo-connection characters, Journal of
Theoretical and Applied Information
Technology, 4(8), 2008, 682-687.
[8] H. Shirali-Shahreza, M. Shirali-Shahreza,
Arabic/Persian text steganography utilizing
similar letters with different codes, The
Arabian Journal for Science and
Engineering, 35(1B), 2010, 213-222.
[9] L. Por, K. Wong, K. Chee, UniSpaCh: A
text-based data hiding method using unicode
space characters, The Journal of Systems
and Software 85(5), 2012, 1075– 1082.
[10] The Unicode Consortium, The Unicode
Standard, http://www.unicode.org.
[11] J. Korpela, Unicode explained (United
States of America., O'Reilly Media , 2006).
[12] D. Yacob, Unicode for Under-Resourced
Languages, 2006, 33-38. From http://mt-
archive.info/LREC-2006-Jacob.pdf
.
Abdul Monem S. Rahma, Wesam S.Bhaya, Dhamyaa A. Al-Nasrawi / International Journal of
Engineering Research and Applications (IJERA) ISSN: 2248-9622
www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.1153-1165
1157 | P a g e
Table 1: Unicode of Characters in Multilingual
Multilingual, Glyphs, and Unicode
(ASCII)
Latin Alphabets
Unified
Canadian
Aboriginal
Syllabics
Unified
Canadian
Aboriginal
Syllabics
Unified
Canadian
Aboriginal
Syllabics
CherokeeCherokeeCyrillic
Greek and
Coptic
C0 Control and
Basic Latin
A
0041
ᗋᗩᗅᎯᎪАΑ
15CB15E915C513AF13AA04100391
Halfwidth
and
Fullwidth
Form
Phonetic
Extensions
Phonetic
Extensions
Aᴬᴀ
FF211D2C1D00
Unified
Canadian
Aboriginal
Syllabics
CherokeeCyrillicCyrillic
Greek and
Coptic
IPA
Extensions
Latin
Extended-B
B
0042
ᗷᏴВвΒʙƁ
15F713F404120432039202990181
Coptic
Letterlike
symbols
Phonetic
Extensions
Coptic
Halfwidth
and
Fullwidth
Form
Vai
ⲂℬᴮⲃBꕗ
2C82212C1D2E2C83FF22A557
Halfwidth
and
Fullwidth
Form
Numbers
Form
Phonetic
Extensions
CherokeeGeorgianCyrillic
Greek and
Coptic
C
0043
CⅭᴄᏟႺСϹ
FF23216D1D0413DF10BA042103F9
Yi RadicalsYi RadicalsCopticKayah Li
Mathematical
Operators
꒟꒝ꕗꕗ∁
A49FA49D2CA4A90D2201
Numbers
Form
Phonetic
Extensions
Phonetic
Extensions
Unified
Canadian
Aboriginal
Syllabics
Unified
Canadian
Aboriginal
Syllabics
Cherokee
Latin
Extended-B
D
0044
ⅮᴅᴰᗪᗞᎠƊ
216E1D051D3015EA15DE13A0018A
Halfwidth
and
Fullwidth
Form
Letterlike
symbols
Dⅅ
FF242145
Hangul
Compatibility
Jamo
Phonetic
Extensions
Tifinagh
Phonetic
Extensions
CherokeeCyrillic
Greek and
CopticE
0045
ㅌᴇꕗᴱᎬЕΕ
314C1D072D391D3113AC04150395
Abdul Monem S. Rahma, Wesam S.Bhaya, Dhamyaa A. Al-Nasrawi / International Journal of
Engineering Research and Applications (IJERA) ISSN: 2248-9622
www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.1153-1165
1158 | P a g e
Vai
Halfwidth
and
Fullwidth
Form
ꕗE
A5CBFF25
Latin
Extended-D
Halfwidth
and
Fullwidth
Form
Unified
Canadian
Aboriginal
Syllabics
Letterlike
symbols
Greek and
CopticF
0046
ꕗFᖴℱϜ
A730FF2615B4213103DC
Phonetic
Extensions
CherokeeCherokeeCherokee
Cyrillic
Supplement
Cyrillic
Supplement
IPA
Extensions
G
0047
ᴳᏩᎶᏀԍԌɢ
1D3313E913B613C0050D050C0262
Halfwidth
and
Fullwidth
Form
G
FF27
Phonetic
Extensions
Unified
Canadian
Aboriginal
Syllabics
CherokeeCyrillicCyrillic
Greek and
Coptic
IPA
Extensions
H
0048
ᴴᕼᎻнНΗʜ
1D34157C13BB043D041D0397029C
Yi Syllables
Halfwidth
and
Fullwidth
Form
Letterlike
symbols
RunicCopticCopticEthiopic
ꀿHℍᚺⲂꕗዘ
A03FFF28210D16BA2C8F2C8E12D8
Letterlike
symbols
Phonetic
Extensions
ℋᵸ
210B1D78
Numbers
Form
Phonetic
Extensions
CherokeeCyrillicCyrillic
Greek and
Coptic
IPA
Extensions
I
0049
ⅠᴵᏆІӀΙɪ
21601D3513C6040604C00399026A
Yi SyllablesVAI
Latin
Extended-D
Coptic
Halfwidth
and
Fullwidth
Form
Halfwidth
and
Fullwidth
Form
Halfwidth
and
Fullwidth
Form
ꀤꕗꕗꕗエェI
A024A56FA7FE2C92FF74FF6AFF29
Bopomofo
Extended
Tifinagh
ㆲꕗ
31B22D4A
Halfwidth
and
Fullwidth
Form
Phonetic
Extensions
Phonetic
Extensions
Unified
Canadian
Aboriginal
Syllabics
CherokeeMyanmarCyrillic
J
004A
Abdul Monem S. Rahma, Wesam S.Bhaya, Dhamyaa A. Al-Nasrawi / International Journal of
Engineering Research and Applications (IJERA) ISSN: 2248-9622
www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.1153-1165
1159 | P a g e
JᴊᴶᒍᎫ၂Ј
FF2A1D0A1D36148D13AB10420408
Letterlike
symbols
ℐ
2110
Letterlike
symbols
Phonetic
Extensions
Phonetic
Extensions
CherokeeCyrillic
Greek and
Coptic
Latin
Extended-B
K
004B
KᴋᴷᏦКΚƘ
212A1D0B1D3713E6041A039A0198
RunicCoptic
Halfwidth
and
Fullwidth
Form
ᛕⲂK
16D52C94FF2B
Phonetic
Extensions
Tai Le
Unified
Canadian
Aboriginal
Syllabics
CherokeeArmenianArmenian
IPA
Extensions
L
004C
ᴸꕗᒪᏞլԼʟ
1D38196814AA13DE056C053C029F
Halfwidth
and
Fullwidth
Form
Halfwidth
and
Fullwidth
Form
Letterlike
symbols
Yi Radicals
Phonetic
Extensions
Supplement
CopticCoptic
Lᄂℒ꒒ᶫꕗꕗ
FF2CFFA42112A4921DAB2CD12CD0
Bopomofo
Numbers
Form
ㄥⅬ
3125216C
Phonetic
Extensions
Phonetic
Extensions
CherokeeCyrillicCyrillic
Greek and
Coptic
Greek and
Coptic
M
004D
ᴍᴹᎷмМΜϺ
1D0D1D3913B7043C041C039C03FA
Coptic
Halfwidth
and
Fullwidth
Form
Numbers
Form
Coptic
Letterlike
symbols
Runic
ꕗMⅯꕗℳᛖ
2C98FF2D216F2C99213316D6
CopticCoptic
Halfwidth
and
Fullwidth
Form
Phonetic
Extensions
Greek and
Coptic
IPA
Extensions
Latin
Extended-B
N
004E
ⲃⲃNᴺΝɴƝ
2C9B2C9AFF2E1D3A039D0274019D
Letterlike
symbols
Phonetic
Extensions
Supplement
ℕᶰ
21151DB0
Yi RadicalsYi SyllablesOriyaNkoArmenianCyrillic
Greek and
CopticO
004F
꒨ꄲଠ߀ՕОΟ
Abdul Monem S. Rahma, Wesam S.Bhaya, Dhamyaa A. Al-Nasrawi / International Journal of
Engineering Research and Applications (IJERA) ISSN: 2248-9622
www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.1153-1165
1160 | P a g e
A4A8A1320B2007C00555041E039F
OriyaCoptic
Halfwidth
and
Fullwidth
Form
Limbu
୦ⲃOⲃ
0B662C9EFF2F1946
Phonetic
Extensions
Phonetic
Extensions
Phonetic
Extensions
CherokeeCyrillic
Greek and
Coptic
Latin
Extended-B
P
0050
ᴾᴩᴘᏢРΡƤ
1D3E1D291D1813E2042003A101A4
Letterlike
symbols
Coptic
Halfwidth
and
Fullwidth
Form
ℙⲃP
21192CA2FF30
Letterlike
symbols
Tifinagh
Halfwidth
and
Fullwidth
Form
Cyrillic
SupplementQ
0051
ℚꕗQⲂ
211A2D55FF31051A
Phonetic
Extensions
Unified
Canadian
Aboriginal
Syllabics
CherokeeCherokee
IPA
Extensions
Latin
Extended-B
Latin
Extended-B
R
0052
ᴿᖇᏒᎡʀɌƦ
1D3F158713D213A10280024C01A6
Letterlike
symbols
Halfwidth
and
Fullwidth
Form
Letterlike
symbols
ℝRℛ
211DFF32211B
VaiYi RadicalsYi SyllablesCherokeeGeorgianArmenianCyrillic
S
0053
ꕗ꒚ꇙᏚႽՏЅ
A576A49AA1D913DA10BD054F0405
Malayalam
Halfwidth
and
Fullwidth
Form
ടS
0D1FFF33
NkoCyrillicCyrillic
Greek and
Coptic
Greek and
Coptic
Greek and
Coptic
Latin
Extended-B
T
0054
߀тТⲃⲃΤƬ
07E0044204220373037203A401AC
CopticCopticEthiopic
Halfwidth
and
Fullwidth
Form
VaiYi Radicals
Hangul
Compatibility
Jamo
ⲃⲃፐTꕗ꓄ㅜ
2CA72CA61350FF34A50BA4C4315C
Abdul Monem S. Rahma, Wesam S.Bhaya, Dhamyaa A. Al-Nasrawi / International Journal of
Engineering Research and Applications (IJERA) ISSN: 2248-9622
www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.1153-1165
1161 | P a g e
Bopomofo
Phonetic
Extensions
Phonetic
Extensions
Cherokee
ㄒᴛᵀᎢ
31121D1B1D4013A2
Halfwidth
and
Fullwidth
Form
Yi Radicals
Phonetic
Extensions
Phonetic
Extensions
Unified
Canadian
Aboriginal
Syllabics
Armenian
U
0055
U꒤ᴜᵁᑌՍ
FF35A4A41D1C1D41144C054D
Unified
Canadian
Aboriginal
Syllabics
Halfwidth
and
Fullwidth
Form
Numbers
Form
Cherokee
V
0056
ᐯVⅤᏤ
142FFF36216413E4
Halfwidth
and
Fullwidth
Form
CherokeeCherokee
Cyrillic
Supplement
Cyrillic
W
0057
WᏔᎳⲂѠ
FF3713D413B3051C0460
CopticCoptic
Halfwidth
and
Fullwidth
Form
Yi Radicals
Numbers
Form
Cyrillic
Greek and
Coptic
X
0058
ⲃⲃX꒼ⅩХΧ
2CAD2CACFF38A4BC2169042503A7
Runic
ᚷ
16B7
Halfwidth
and
Fullwidth
Form
CyrillicCyrillic
Greek and
Coptic
IPA
ExtensionsY
0059
YүҮΥʏ
FF3904AF04AE03A5028F
Coptic
Halfwidth
and
Fullwidth
Form
CherokeeMyanmar
Greek and
Coptic
Latin
Extended-B
Latin
Extended-B
Z
005A
ⲃZᏃⲃΖƵȤ
2C8CFF3A13C31097039601B50224
Letterlike
symbols
Limbu
ℤⲃ
21241901
Halfwidth
and
Fullwidth
Form
Phonetic
Extensions
Phonetic
Extensions
Tai LeCyrillic
IPA
Extensionsa
0061
aᵅᵃꕗаɑ
FF411D451D43197204300251
Unified
Canadian
CherokeeNkoCyrillicCyrillic
Latin
Extended-B
Latin
Extended-B
b
0062
Abdul Monem S. Rahma, Wesam S.Bhaya, Dhamyaa A. Al-Nasrawi / International Journal of
Engineering Research and Applications (IJERA) ISSN: 2248-9622
www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.1153-1165
1162 | P a g e
Aboriginal
Syllabics
ᖯᏏ߀ьЬƄƅ
15AF13CF07D5044C042C01840185
Halfwidth
and
Fullwidth
Form
Phonetic
Extensions
bᵇ
FF421D47
CyrillicCoptic
Halfwidth
and
Fullwidth
Form
Numbers
Form
Tai LeMyanmar
Greek and
Copticc
0063
сⲃcⅽꕗⲃϲ
04412CA5FF43217D1974100403F2
Yi RadicalsYi Radicals
Numbers
Form
Phonetic
Extensions
Unified
Canadian
Aboriginal
Syllabics
Cyrillic
Supplement
Cyrillic
Supplement
d
0064
꒯꒭ⅾᵈᑯԁԀ
A4AFA4AD217E1D48146F05010500
Letterlike
symbols
Halfwidth
and
Fullwidth
Form
ⅆd
2146FF44
Halfwidth
and
Fullwidth
Form
Letterlike
symbols
Letterlike
symbols
Phonetic
Extensions
Tai LeMyanmarCyrillic
e
0065
eℯ℮ᵉꕗⲃе
FF45212F212E1D49197110540435
Phonetic
Extensions
Halfwidth
and
Fullwidth
Form
f
0066
ᶠf
1DA0FF46
Phonetic
Extensions
Supplement
Halfwidth
and
Fullwidth
Form
Letterlike
symbols
Phonetic
Extensions
IPA
Extensionsg
0067
ᶢgℊᵍɡ
1DA2FF47210A1D4D0261
Halfwidth
and
Fullwidth
Form
Letterlike
symbols
CherokeeGeorgianCyrillicCyrillic
Spacing
Modifier
Lettersh
0068
hℎᏂႹһҺʰ
FF48210E13C210B904BB04BA02B0
Letterlike
symbols
Halfwidth
and
Fullwidth
Form
Numbers
Form
Phonetic
Extensions
CherokeeCyrillic
i
0069
Abdul Monem S. Rahma, Wesam S.Bhaya, Dhamyaa A. Al-Nasrawi / International Journal of
Engineering Research and Applications (IJERA) ISSN: 2248-9622
www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.1153-1165
1163 | P a g e
ⅈiⅰᵢᎥі
2148FF4921701D6213A50456
Letterlike
symbols
Halfwidth
and
Fullwidth
Form
Unified
Canadian
Aboriginal
Syllabics
Cyrillic
Greek and
Coptic
Spacing
Modifier
Letters
IPA
Extensionsj
006A
ⅉjᒎјϳʲʝ
2149FF4A148E045803F302B2029D
Coptic
Halfwidth
and
Fullwidth
Form
Phonetic
Extensions
Cyrillic
k
006B
ⲃkᵏк
2C95FF4B1D4F043A
VaiTifinagh
Numbers
Form
Tai LeTeluguCyrillic
Spacing
Modifier
Letters
l
006C
ꕗꕗⅼꕗ౹ӏˡ
A6212D4F217C19630C7904CF02E1
Yi Radicals
Halfwidth
and
Fullwidth
Form
꒐l
A490FF4C
Halfwidth
and
Fullwidth
Form
Numbers
Form
Phonetic
Extensionsm
006D
mⅿᵐ
FF4D217F1D50
Halfwidth
and
Fullwidth
Form
Tai Le
n
006E
nꕗ
FF4E1952
MyanmarTeluguTamilLaoArmenianCyrillic
Greek and
Coptic
o
006F
၂౦௦໐օоο
10400C660BE60ED00585043E03BF
New Tai LueMyanmar
Phonetic
Extensions
CopticEthiopic
Halfwidth
and
Fullwidth
Form
Phonetic
Extensions
ꕗⲃᴼⲃዐoᴏ
19D0101D1D3C2C9F12D0FF4F1D0F
Coptic
Halfwidth
and
Fullwidth
Form
Phonetic
Extensions
Cyrillic
p
0070
ⲃpᵖр
2CA3FF501D560440
HalfwidthCyrillicq
Abdul Monem S. Rahma, Wesam S.Bhaya, Dhamyaa A. Al-Nasrawi / International Journal of
Engineering Research and Applications (IJERA) ISSN: 2248-9622
www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.1153-1165
1164 | P a g e
and
Fullwidth
Form
Supplement0071
qⲂ
FF51051B
Halfwidth
and
Fullwidth
Form
Phonetic
Extensions
Spacing
Modifier
Letters
IPA
Extensionsr
0072
rᵣʳɼ
FF521D6302B3027C
Limbu
Latin
Extended-D
Unified
Canadian
Aboriginal
Syllabics
Halfwidth
and
Fullwidth
Form
Cyrillic
Spacing
Modifier
Letterss
0073
ⲃⲃᔆsѕˢ
1949A7311506FF53045502E2
Halfwidth
and
Fullwidth
Form
Phonetic
Extensions
IPA
Extensionst
0074
tᵗʈ
FF541D570288
Phonetic
Extensions
Halfwidth
and
Fullwidth
Form
Phonetic
Extensionsu
0075
ᵘuᵤ
1D58FF551D64
Halfwidth
and
Fullwidth
Form
Tifinagh
Number
Form
Limbu
Phonetic
Extensions
Phonetic
Extensions
Greek and
Copticv
0076
vꕗⅴⲃᵥᴠν
FF562D382174194E1D651D2003BD
Phonetic
Extensions
Halfwidth
and
Fullwidth
Form
Phonetic
Extensions
Cyrillic
Supplement
Spacing
Modifier
Lettersw
0077
ᵂwᴡⲂʷ
1D42FF571D21051D02B7
Limbu
Halfwidth
and
Fullwidth
Form
Bopomofo
Number
Form
Cyrillic
Spacing
Modifier
Lettersx
0078
ⲃxㄨⅹхˣ
194AFF5831282179044502E3
Halfwidth
and
Fullwidth
Form
BopomofoCherokeeGeorgianCyrillicCyrillic
Spacing
Modifier
Lettersy
0079
yㄚᎩႸуУʸ
FF59311A13A910B80443042302B8
Phonetic
Extensions
Latin
Extended-B
Coptic
Unified
Canadian
Halfwidth
and
Phonetic
Extensions
Latin
Extended-B
z
007A
Abdul Monem S. Rahma, Wesam S.Bhaya, Dhamyaa A. Al-Nasrawi / International Journal of
Engineering Research and Applications (IJERA) ISSN: 2248-9622
www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.1153-1165
1165 | P a g e
Table2: Selected English alphabets for hiding process
Symbols ASCII Unicode
Secret message 00 Secret message 01 Secret message 10 Secret message 11
A 0041 0391 0410 13AA
B 0042 0392 0412 0181
E 0045 0395 0415 13AC
G 0047 050C 13C0 13B6
H 0048 0397 041D 13BB
I 0049 0399 04C0 0406
M 004D 039C 041C 216F
O 004F 039F 041E 0555
P 0050 0420 03A1 01A4
S 0053 0405 054F 13DA
T 0054 0422 03A4 01AC
j 006A 0458 03F3 029D
o 006F 03BF 1D0F 043E
SupplementAboriginal
Syllabics
Fullwidth
Form
ᶻƶⲃᙆzᴢȥ
1DBB01B62C8D1646FF5A1D220225
Table 3: Experimental results of proposed method
Experiment #. Selected Char.#
in Cover
Max.# of bits Can be
Embedded in Cover
Ratio of Stego-Doc. Size
increasing (%)
1 1313 2626 1.11
2 1465 2930 27.6
3 379 758 17.7
4 1602 3204 0.8
5 4091 8182 2.8
6 3681 7362 2.3
7 672 1344 23
8 268 536 4.2
9 6515 13030 31.7
10 902 1804 0.7
Avrg. 11.1

More Related Content

Viewers also liked (20)

Fh34985988
Fh34985988Fh34985988
Fh34985988
 
Fu3410741076
Fu3410741076Fu3410741076
Fu3410741076
 
Fi34989995
Fi34989995Fi34989995
Fi34989995
 
Fl3410191025
Fl3410191025Fl3410191025
Fl3410191025
 
Gk3411741178
Gk3411741178Gk3411741178
Gk3411741178
 
Fv3410771081
Fv3410771081Fv3410771081
Fv3410771081
 
Gg3411451152
Gg3411451152Gg3411451152
Gg3411451152
 
Gz3412811286
Gz3412811286Gz3412811286
Gz3412811286
 
Ey33907916
Ey33907916Ey33907916
Ey33907916
 
Et33879883
Et33879883Et33879883
Et33879883
 
P0460594100
P0460594100P0460594100
P0460594100
 
Hobby
HobbyHobby
Hobby
 
revista
revistarevista
revista
 
O Uso Da Tecnologia No Ensino De LíNguas Iii
O Uso Da Tecnologia No Ensino De LíNguas IiiO Uso Da Tecnologia No Ensino De LíNguas Iii
O Uso Da Tecnologia No Ensino De LíNguas Iii
 
Portifolio Carolina Oliveira
Portifolio Carolina OliveiraPortifolio Carolina Oliveira
Portifolio Carolina Oliveira
 
Caixa economica
Caixa economicaCaixa economica
Caixa economica
 
Ministrações
MinistraçõesMinistrações
Ministrações
 
Ciudades eternas
Ciudades eternas Ciudades eternas
Ciudades eternas
 
Alunos destaque manhã
Alunos destaque manhãAlunos destaque manhã
Alunos destaque manhã
 
Virus informáticos
Virus informáticosVirus informáticos
Virus informáticos
 

Similar to Gh3411531165

A Novel Approach of Text Steganography based on null spaces
A Novel Approach of Text Steganography based on null spacesA Novel Approach of Text Steganography based on null spaces
A Novel Approach of Text Steganography based on null spacesIOSR Journals
 
Traid-bit embedding process on Arabic text steganography method
Traid-bit embedding process on Arabic text steganography methodTraid-bit embedding process on Arabic text steganography method
Traid-bit embedding process on Arabic text steganography methodjournalBEEI
 
TEXT STEGANOGRAPHIC APPROACHES: A COMPARISON
TEXT STEGANOGRAPHIC APPROACHES: A COMPARISONTEXT STEGANOGRAPHIC APPROACHES: A COMPARISON
TEXT STEGANOGRAPHIC APPROACHES: A COMPARISONIJNSA Journal
 
A Review Paper On Steganography Techniques
A Review Paper On Steganography TechniquesA Review Paper On Steganography Techniques
A Review Paper On Steganography TechniquesAudrey Britton
 
A Novel Steganography Technique that Embeds Security along with Compression
A Novel Steganography Technique that Embeds Security along with CompressionA Novel Steganography Technique that Embeds Security along with Compression
A Novel Steganography Technique that Embeds Security along with CompressionCSCJournals
 
A Review paper on Steganography Techniques
A Review paper on Steganography TechniquesA Review paper on Steganography Techniques
A Review paper on Steganography TechniquesEditor IJMTER
 
TEXT STEGANOGRAPHIC APPROACHES: A COMPARISON
TEXT STEGANOGRAPHIC APPROACHES: A  COMPARISONTEXT STEGANOGRAPHIC APPROACHES: A  COMPARISON
TEXT STEGANOGRAPHIC APPROACHES: A COMPARISONIJNSA Journal
 
Information Hiding in CSS: A Secure Scheme Text-Steganography Using Public Ke...
Information Hiding in CSS: A Secure Scheme Text-Steganography Using Public Ke...Information Hiding in CSS: A Secure Scheme Text-Steganography Using Public Ke...
Information Hiding in CSS: A Secure Scheme Text-Steganography Using Public Ke...ijcisjournal
 
Text Steganography Using Compression and Random Number Generators
Text Steganography Using Compression and Random Number GeneratorsText Steganography Using Compression and Random Number Generators
Text Steganography Using Compression and Random Number GeneratorsEditor IJCATR
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Improving Hiding Security of Arabic Text Steganography by Hybrid AES Cryptogr...
Improving Hiding Security of Arabic Text Steganography by Hybrid AES Cryptogr...Improving Hiding Security of Arabic Text Steganography by Hybrid AES Cryptogr...
Improving Hiding Security of Arabic Text Steganography by Hybrid AES Cryptogr...IJERA Editor
 
Novel Algorithm For Encryption:Hybrid of Transposition and Substitution Method
Novel Algorithm For Encryption:Hybrid of Transposition and Substitution MethodNovel Algorithm For Encryption:Hybrid of Transposition and Substitution Method
Novel Algorithm For Encryption:Hybrid of Transposition and Substitution MethodIDES Editor
 
EXPERIMENTING WITH THE NOVEL APPROACHES IN TEXT STEGANOGRAPHY
EXPERIMENTING WITH THE NOVEL APPROACHES IN TEXT STEGANOGRAPHYEXPERIMENTING WITH THE NOVEL APPROACHES IN TEXT STEGANOGRAPHY
EXPERIMENTING WITH THE NOVEL APPROACHES IN TEXT STEGANOGRAPHYIJNSA Journal
 
A0 ad276c eacf-6f38-e32efa1adf1e36cc
A0 ad276c eacf-6f38-e32efa1adf1e36ccA0 ad276c eacf-6f38-e32efa1adf1e36cc
A0 ad276c eacf-6f38-e32efa1adf1e36ccPrabhu Prabhu
 
New text steganography method using the arabic letters dots
New text steganography method using the arabic letters dotsNew text steganography method using the arabic letters dots
New text steganography method using the arabic letters dotsnooriasukmaningtyas
 
Drubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) MethodDrubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) MethodIOSRJECE
 
Utilisation of l-Diversity and Differential Privacy in the Anonymisation of N...
Utilisation of l-Diversity and Differential Privacy in the Anonymisation of N...Utilisation of l-Diversity and Differential Privacy in the Anonymisation of N...
Utilisation of l-Diversity and Differential Privacy in the Anonymisation of N...Shankar Lal
 

Similar to Gh3411531165 (20)

A Novel Approach of Text Steganography based on null spaces
A Novel Approach of Text Steganography based on null spacesA Novel Approach of Text Steganography based on null spaces
A Novel Approach of Text Steganography based on null spaces
 
Traid-bit embedding process on Arabic text steganography method
Traid-bit embedding process on Arabic text steganography methodTraid-bit embedding process on Arabic text steganography method
Traid-bit embedding process on Arabic text steganography method
 
TEXT STEGANOGRAPHIC APPROACHES: A COMPARISON
TEXT STEGANOGRAPHIC APPROACHES: A COMPARISONTEXT STEGANOGRAPHIC APPROACHES: A COMPARISON
TEXT STEGANOGRAPHIC APPROACHES: A COMPARISON
 
A Review Paper On Steganography Techniques
A Review Paper On Steganography TechniquesA Review Paper On Steganography Techniques
A Review Paper On Steganography Techniques
 
I017377074
I017377074I017377074
I017377074
 
A Novel Steganography Technique that Embeds Security along with Compression
A Novel Steganography Technique that Embeds Security along with CompressionA Novel Steganography Technique that Embeds Security along with Compression
A Novel Steganography Technique that Embeds Security along with Compression
 
A Review paper on Steganography Techniques
A Review paper on Steganography TechniquesA Review paper on Steganography Techniques
A Review paper on Steganography Techniques
 
TEXT STEGANOGRAPHIC APPROACHES: A COMPARISON
TEXT STEGANOGRAPHIC APPROACHES: A  COMPARISONTEXT STEGANOGRAPHIC APPROACHES: A  COMPARISON
TEXT STEGANOGRAPHIC APPROACHES: A COMPARISON
 
Information Hiding in CSS: A Secure Scheme Text-Steganography Using Public Ke...
Information Hiding in CSS: A Secure Scheme Text-Steganography Using Public Ke...Information Hiding in CSS: A Secure Scheme Text-Steganography Using Public Ke...
Information Hiding in CSS: A Secure Scheme Text-Steganography Using Public Ke...
 
Text Steganography Using Compression and Random Number Generators
Text Steganography Using Compression and Random Number GeneratorsText Steganography Using Compression and Random Number Generators
Text Steganography Using Compression and Random Number Generators
 
C0341117
C0341117C0341117
C0341117
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Coding Instead of Encryption
Coding Instead of EncryptionCoding Instead of Encryption
Coding Instead of Encryption
 
Improving Hiding Security of Arabic Text Steganography by Hybrid AES Cryptogr...
Improving Hiding Security of Arabic Text Steganography by Hybrid AES Cryptogr...Improving Hiding Security of Arabic Text Steganography by Hybrid AES Cryptogr...
Improving Hiding Security of Arabic Text Steganography by Hybrid AES Cryptogr...
 
Novel Algorithm For Encryption:Hybrid of Transposition and Substitution Method
Novel Algorithm For Encryption:Hybrid of Transposition and Substitution MethodNovel Algorithm For Encryption:Hybrid of Transposition and Substitution Method
Novel Algorithm For Encryption:Hybrid of Transposition and Substitution Method
 
EXPERIMENTING WITH THE NOVEL APPROACHES IN TEXT STEGANOGRAPHY
EXPERIMENTING WITH THE NOVEL APPROACHES IN TEXT STEGANOGRAPHYEXPERIMENTING WITH THE NOVEL APPROACHES IN TEXT STEGANOGRAPHY
EXPERIMENTING WITH THE NOVEL APPROACHES IN TEXT STEGANOGRAPHY
 
A0 ad276c eacf-6f38-e32efa1adf1e36cc
A0 ad276c eacf-6f38-e32efa1adf1e36ccA0 ad276c eacf-6f38-e32efa1adf1e36cc
A0 ad276c eacf-6f38-e32efa1adf1e36cc
 
New text steganography method using the arabic letters dots
New text steganography method using the arabic letters dotsNew text steganography method using the arabic letters dots
New text steganography method using the arabic letters dots
 
Drubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) MethodDrubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) Method
 
Utilisation of l-Diversity and Differential Privacy in the Anonymisation of N...
Utilisation of l-Diversity and Differential Privacy in the Anonymisation of N...Utilisation of l-Diversity and Differential Privacy in the Anonymisation of N...
Utilisation of l-Diversity and Differential Privacy in the Anonymisation of N...
 

Recently uploaded

APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 

Gh3411531165

  • 1. Abdul Monem S. Rahma, Wesam S.Bhaya, Dhamyaa A. Al-Nasrawi / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.1153-1165 1153 | P a g e Text Steganography Based On Unicode of Characters in Multilingual Prof. Abdul Monem S. Rahma1 , Wesam S.Bhaya2 , Dhamyaa A. Al- Nasrawi3 1 (Computer Science Department, University of Technology, Iraq 2 (College of Computer Technology, University of Babylon, Iraq 3 (Computer Science Department, Kerbala University, Iraq ABSTRACT Network security, and secure communications through public and private channels are more important issue specially when computer usage is increasing, for both social and business areas. Data hiding is one of approach to obtain a secure communication medium and protecting the information during transmission. Text steganography is most challenging because of the presence of very less redundant information in text documents as compared to the images and audio. In this paper a novel method is proposed for data hiding in English scripts using Unicode of English alphabet in another languages. In this method, 13 characters from English alphabet was chosen for hiding process which have appearance in another languages. Two bits embedded in one time, using ASCII code for embedding 00, and using Unicode of multilingual for embedding 01, 10, and 11. This method has a height hiding capacity based on specific characters in each document. As well as have very good perceptual transparency and no changes in original text. Keywords- Multilingual characters, Text hiding, Unicode standard. I. Introduction One way of secure data transfer over the Internet is steganography, which conceals the existence of a message [1]. When information hiding is used, even if an eavesdropper snoops the transmitted object, he cannot surmise the communication since it is carried out in a concealed way. Steganography overcomes the limitation of cryptography(that the third party is always aware of the communication because of the unintelligible nature of the text) by hiding message in an innocent looking object called cover[2]. In modern steganography use electronic media rather than physical objects and texts. The text to be concealed is called embedded data. An innocuous medium, such as text, image, audio, or video file; which is used to hide embedded data is called cover. The stego object is an object we get after hiding the embedded data in a cover medium[1]. There are a number of researches had already explored in new steganographic techniques in texts, such as white spaces [3], Synonyms[4], Word Shifting [5], and Line shifting [6]. This paper focused on researches which used Unicode in data hiding, M. H. Shirali-Shahreza, and Mohammad Shirali- Shahreza proposed new method for hiding information in Persian and Arabic Unicode texts [7]. Also, they proposed another method for hiding data in Persian (Farsi) and Arabic texts. They based on characters of « ‫»ی‬ and « ‫»ک‬ have the same shape but different codes [8]. Lip Yee Por and et al. proposed method based on Unicode space characters with respect to embedding efficiency [9]. In this paper, some letters of English alphabet have appearance in another languages with different codes, these letters used in the proposed method for data hiding in English scripts using Unicode of English alphabet in another languages(multilingual). The rest of the paper is organized as follows. Section 2 explain the Unicode Standard. Section 3 presents the proposed method in detail. Section 4 and 5 demonstrate the results and concludes of the proposed method. II. Unicode Standard The Unicode Standard is the universal character encoding scheme for written characters and text. It defines a consistent way of encoding multilingual text that enables the exchange of text data internationally and creates the foundation for global software[10]. Unicode can be implemented by different character encodings. The most commonly used encodings are UTF-8, UTF-16. UTF-8 uses one byte for any ASCII characters, which have the same code values in both UTF-8 and ASCII encoding, and up to four bytes for other characters. UCS-2 uses a 16-bit code unit (two 8-bit bytes) for each character[11]. Unicode characters are distinguished by code points, which are conventionally represented by the letter U followed by four or five hexadecimal digits, for example U+00AE or U+1D310. Unicode characters can range in scalar values from 0 to over a million. The entire range of Unicode characters is divided into 17 blocks, each block is referred to as a plane and is numbered starting from 0. Characters in the Basic Multilingual Plane (BMP), containing
  • 2. Abdul Monem S. Rahma, Wesam S.Bhaya, Dhamyaa A. Al-Nasrawi / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.1153-1165 1154 | P a g e modern scripts – including many Chinese and Japanese characters – and many symbols, have a 4- digit code. Historic scripts, but also many modern symbols and pictographs (such as emoticons, many CJK characters, and Egyptian Hieroglyphics) have 5- digit codes[11]. Then, Unicode refer to the family of standards and technologies associated with the Unicode Consortium that can be utilized for working with a written language in a computer environment[12]. III. Proposed Method In this paper, a new method was presented for text steganography in English scripts using Unicode of multilingual characters. Many English alphabet characters (called Latin alphabet) have a good appearance in another languages, with different codes and different glyphs, see Table 1. Unfortunately, not all of these characters can be used in hiding process, because the glyphs of them dissimilar to original English scripts. Just 13 characters was chosen for hiding process based on the following criteria: 1. Located in Plane 0: which contains U+0000 - U+FFFF, this is known as the Basic Multilingual Plane (BMP). 2. The glyphs: A glyph is a presentation of a particular shape which a character may have when rendered or displayed. The glyph of selected characters must be similar to the original script. 3. Availability: depends on its presence in the specified font (selected characters must be supported by standard fonts)[11]. If a desired character is not present in the available fonts(that mean characters have no glyph), an empty box, a question mark or another replacement will be shown: �, see Table 1 . Table 2 explain the selected characters in hiding process. In proposed method, two processes was implemented, hiding process, and extracting process. Hiding process based on the appearance of selected characters in english script. In this method two bits can be embedding at one time. Firstly, selected characters must to be found in document, then embedding process implemented by replacement depending on secret message which can be hidden. and replacement can be done based on secret message as follows: 00 No change If secret message = …(1) { 01,10,11} Replace with nicode of Multilingual characters based on Table 2 The document file must be has enough area to hide data (secret message with two bytes represent message length embedded in beginning). This process called Checking capacity of hiding , see Fig.1. Figure 1. Hiding process Hiding process (Embedding process) summarized in the following algorithm: English scripts written in (Latin letters), take the range (U+0041-U+005A) for uppercase Latin alphabet, and (U+0061-U+007A) for lowercase Latin alphabet in hexadecimal. For example, there is Latin capital "A" which is defined (U+0041) can be no change if secret message is 00, but can be replaced by one of Unicode of Multilingual characters in Table 2 , Based on secret message, replaced by (U+0391) when secret message is 01 as example. In another side, the extracting process Fig.2 is the opposite operation of the hiding process. Figure 2. Extracting process Embedding algorithm Input : Document file, and secret message. Output : Stego file. 1. Open cover document. 2. Scan cover document to find selected characters in Table 2, 3. Compute number of selected characters to check the capacity of hiding. 4. Get binary form of secret message. 5. For each two symbol in secret message - if bit = 00, then no change (ASCII code) , else replace by Unicode of Multilingual characters in Table 2. 6. Hide the message length in the beginning of secret message. 7. Return stego document.
  • 3. Abdul Monem S. Rahma, Wesam S.Bhaya, Dhamyaa A. Al-Nasrawi / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.1153-1165 1155 | P a g e In order to find selected characters, we must check the code of current characters, by the following statement: In range of ( U+0041 - U+005A) or ( U+0061 - U+007A), then Secret message = 0 If Code of …(2) Selected characters Else Secret message = {01,10,11} based on Table 2 The first 16-characters represent the secret message length. Extracting process summarized in the following algorithm: IV. Results In this paper, the proposed method of data hiding is tested by taking different cover documents with different sizes and hiding the same secret message in some of them, sees the corresponding GUI for the proposed method in Fig. 3. Figure 3. GUI of proposed method The payload of bits can be hidden based on selected characters number. If the cover file contains, for example, 200 selected characters, we can hiding 400 bits in it(because two bits can be embedded in one character). Fig. 4 and Fig. 5 represent cover document and stego document respectively. Figure 4. Cover document Figure 5. Stego document The results that are got from these experiments can be summarized in the Table 3. Note the average of size for stego document (after hiding) is increased about (11.1 %) from original size, because using Unicode instead of ASCII code in embedding process, which use UTF-16 encodings for each character. V. Conclusions In data hiding method, the main goals of steganography are (perceptual transparency, capacity, and robustness). Proposed method has an excellent perceptual transparency because the stego text is similar to the original text using characters in multilingual which their glyphs more similar and suitable to glyphs of original script. The hiding capacity of proposed method is very high, depending on selected characters frequency shown in Table 2. In addition, this method is robust to digital copy-past operation, which means that copying and pasting the text between computer programs preserve hidden information. In other side, there is an increasing in stego document size, result from Unicode which use 2-bytes for each character. Huffman code for data compression can be suggested to overcome this drawback. Thus, the proposed method provide an efficient text steganography method by Unicode, and an excellent way to obtain safe and secure information transformation. References [1] M. Agarwal, Application Text Steganographic Approaches: A Comparison, Extracting algorithm Input : Stego file . Output : Secret message. 1. Open stego document. 2. Extract secret message length 3. Scan stego document to find ligatures characters, 4. Check code of selected characters based on equation (2) - if code in uppercase or lowercase English Latin letters then secret message=00 - else secret message=01,or 10, or 11 based on Table 2.
  • 4. Abdul Monem S. Rahma, Wesam S.Bhaya, Dhamyaa A. Al-Nasrawi / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.1153-1165 1156 | P a g e International Journal of Network Security & Its Applications, 5(1), 2013, 91-106. [2] K. Rabah, Steganography-the art of hiding data, Information Technology Journal, 3(3), 2004, 245-269. [3] W. Bender, D. Gruhl, N. Morimoto, and A. Lu, Techniques for data hiding, IBM System Journal 35(3-4), 1996, 313-336. [4] H. Shirali-Shahreza, M. Shirali-Shahreza, A new synonym text steganography. Proc. 8th International Conf. on Intelligent Information Hiding and Multimedia Signal Processing, Harbin, China, 2008, 1524- 1526. [5] Y. Kim, K. Moon, I. Oh, A text watermarking algorithm based on word classification and inter-word space statistics, Proc. 7th International Conf. on Document Analysis and Recognition, Edinburgh, Scotland: IEEE,2003, 775-779. [6] S. Low, N. Maxemchuk, J. Brassil, L. O’Gorman, Document marking and identification using both line and word shifting, Proc.14th Annual Joint Conf. of the IEEE Computer and Communications Societies, Boston, MA, USA: IEEE, 1995, 853- 860. [7] H. Shirali-Shahreza, M. Shirali-Shahreza, Steganography in Persian and Arabic unicode texts using pseudo-space and pseudo-connection characters, Journal of Theoretical and Applied Information Technology, 4(8), 2008, 682-687. [8] H. Shirali-Shahreza, M. Shirali-Shahreza, Arabic/Persian text steganography utilizing similar letters with different codes, The Arabian Journal for Science and Engineering, 35(1B), 2010, 213-222. [9] L. Por, K. Wong, K. Chee, UniSpaCh: A text-based data hiding method using unicode space characters, The Journal of Systems and Software 85(5), 2012, 1075– 1082. [10] The Unicode Consortium, The Unicode Standard, http://www.unicode.org. [11] J. Korpela, Unicode explained (United States of America., O'Reilly Media , 2006). [12] D. Yacob, Unicode for Under-Resourced Languages, 2006, 33-38. From http://mt- archive.info/LREC-2006-Jacob.pdf .
  • 5. Abdul Monem S. Rahma, Wesam S.Bhaya, Dhamyaa A. Al-Nasrawi / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.1153-1165 1157 | P a g e Table 1: Unicode of Characters in Multilingual Multilingual, Glyphs, and Unicode (ASCII) Latin Alphabets Unified Canadian Aboriginal Syllabics Unified Canadian Aboriginal Syllabics Unified Canadian Aboriginal Syllabics CherokeeCherokeeCyrillic Greek and Coptic C0 Control and Basic Latin A 0041 ᗋᗩᗅᎯᎪАΑ 15CB15E915C513AF13AA04100391 Halfwidth and Fullwidth Form Phonetic Extensions Phonetic Extensions Aᴬᴀ FF211D2C1D00 Unified Canadian Aboriginal Syllabics CherokeeCyrillicCyrillic Greek and Coptic IPA Extensions Latin Extended-B B 0042 ᗷᏴВвΒʙƁ 15F713F404120432039202990181 Coptic Letterlike symbols Phonetic Extensions Coptic Halfwidth and Fullwidth Form Vai ⲂℬᴮⲃBꕗ 2C82212C1D2E2C83FF22A557 Halfwidth and Fullwidth Form Numbers Form Phonetic Extensions CherokeeGeorgianCyrillic Greek and Coptic C 0043 CⅭᴄᏟႺСϹ FF23216D1D0413DF10BA042103F9 Yi RadicalsYi RadicalsCopticKayah Li Mathematical Operators ꒟꒝ꕗꕗ∁ A49FA49D2CA4A90D2201 Numbers Form Phonetic Extensions Phonetic Extensions Unified Canadian Aboriginal Syllabics Unified Canadian Aboriginal Syllabics Cherokee Latin Extended-B D 0044 ⅮᴅᴰᗪᗞᎠƊ 216E1D051D3015EA15DE13A0018A Halfwidth and Fullwidth Form Letterlike symbols Dⅅ FF242145 Hangul Compatibility Jamo Phonetic Extensions Tifinagh Phonetic Extensions CherokeeCyrillic Greek and CopticE 0045 ㅌᴇꕗᴱᎬЕΕ 314C1D072D391D3113AC04150395
  • 6. Abdul Monem S. Rahma, Wesam S.Bhaya, Dhamyaa A. Al-Nasrawi / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.1153-1165 1158 | P a g e Vai Halfwidth and Fullwidth Form ꕗE A5CBFF25 Latin Extended-D Halfwidth and Fullwidth Form Unified Canadian Aboriginal Syllabics Letterlike symbols Greek and CopticF 0046 ꕗFᖴℱϜ A730FF2615B4213103DC Phonetic Extensions CherokeeCherokeeCherokee Cyrillic Supplement Cyrillic Supplement IPA Extensions G 0047 ᴳᏩᎶᏀԍԌɢ 1D3313E913B613C0050D050C0262 Halfwidth and Fullwidth Form G FF27 Phonetic Extensions Unified Canadian Aboriginal Syllabics CherokeeCyrillicCyrillic Greek and Coptic IPA Extensions H 0048 ᴴᕼᎻнНΗʜ 1D34157C13BB043D041D0397029C Yi Syllables Halfwidth and Fullwidth Form Letterlike symbols RunicCopticCopticEthiopic ꀿHℍᚺⲂꕗዘ A03FFF28210D16BA2C8F2C8E12D8 Letterlike symbols Phonetic Extensions ℋᵸ 210B1D78 Numbers Form Phonetic Extensions CherokeeCyrillicCyrillic Greek and Coptic IPA Extensions I 0049 ⅠᴵᏆІӀΙɪ 21601D3513C6040604C00399026A Yi SyllablesVAI Latin Extended-D Coptic Halfwidth and Fullwidth Form Halfwidth and Fullwidth Form Halfwidth and Fullwidth Form ꀤꕗꕗꕗエェI A024A56FA7FE2C92FF74FF6AFF29 Bopomofo Extended Tifinagh ㆲꕗ 31B22D4A Halfwidth and Fullwidth Form Phonetic Extensions Phonetic Extensions Unified Canadian Aboriginal Syllabics CherokeeMyanmarCyrillic J 004A
  • 7. Abdul Monem S. Rahma, Wesam S.Bhaya, Dhamyaa A. Al-Nasrawi / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.1153-1165 1159 | P a g e JᴊᴶᒍᎫ၂Ј FF2A1D0A1D36148D13AB10420408 Letterlike symbols ℐ 2110 Letterlike symbols Phonetic Extensions Phonetic Extensions CherokeeCyrillic Greek and Coptic Latin Extended-B K 004B KᴋᴷᏦКΚƘ 212A1D0B1D3713E6041A039A0198 RunicCoptic Halfwidth and Fullwidth Form ᛕⲂK 16D52C94FF2B Phonetic Extensions Tai Le Unified Canadian Aboriginal Syllabics CherokeeArmenianArmenian IPA Extensions L 004C ᴸꕗᒪᏞլԼʟ 1D38196814AA13DE056C053C029F Halfwidth and Fullwidth Form Halfwidth and Fullwidth Form Letterlike symbols Yi Radicals Phonetic Extensions Supplement CopticCoptic Lᄂℒ꒒ᶫꕗꕗ FF2CFFA42112A4921DAB2CD12CD0 Bopomofo Numbers Form ㄥⅬ 3125216C Phonetic Extensions Phonetic Extensions CherokeeCyrillicCyrillic Greek and Coptic Greek and Coptic M 004D ᴍᴹᎷмМΜϺ 1D0D1D3913B7043C041C039C03FA Coptic Halfwidth and Fullwidth Form Numbers Form Coptic Letterlike symbols Runic ꕗMⅯꕗℳᛖ 2C98FF2D216F2C99213316D6 CopticCoptic Halfwidth and Fullwidth Form Phonetic Extensions Greek and Coptic IPA Extensions Latin Extended-B N 004E ⲃⲃNᴺΝɴƝ 2C9B2C9AFF2E1D3A039D0274019D Letterlike symbols Phonetic Extensions Supplement ℕᶰ 21151DB0 Yi RadicalsYi SyllablesOriyaNkoArmenianCyrillic Greek and CopticO 004F ꒨ꄲଠ߀ՕОΟ
  • 8. Abdul Monem S. Rahma, Wesam S.Bhaya, Dhamyaa A. Al-Nasrawi / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.1153-1165 1160 | P a g e A4A8A1320B2007C00555041E039F OriyaCoptic Halfwidth and Fullwidth Form Limbu ୦ⲃOⲃ 0B662C9EFF2F1946 Phonetic Extensions Phonetic Extensions Phonetic Extensions CherokeeCyrillic Greek and Coptic Latin Extended-B P 0050 ᴾᴩᴘᏢРΡƤ 1D3E1D291D1813E2042003A101A4 Letterlike symbols Coptic Halfwidth and Fullwidth Form ℙⲃP 21192CA2FF30 Letterlike symbols Tifinagh Halfwidth and Fullwidth Form Cyrillic SupplementQ 0051 ℚꕗQⲂ 211A2D55FF31051A Phonetic Extensions Unified Canadian Aboriginal Syllabics CherokeeCherokee IPA Extensions Latin Extended-B Latin Extended-B R 0052 ᴿᖇᏒᎡʀɌƦ 1D3F158713D213A10280024C01A6 Letterlike symbols Halfwidth and Fullwidth Form Letterlike symbols ℝRℛ 211DFF32211B VaiYi RadicalsYi SyllablesCherokeeGeorgianArmenianCyrillic S 0053 ꕗ꒚ꇙᏚႽՏЅ A576A49AA1D913DA10BD054F0405 Malayalam Halfwidth and Fullwidth Form ടS 0D1FFF33 NkoCyrillicCyrillic Greek and Coptic Greek and Coptic Greek and Coptic Latin Extended-B T 0054 ߀тТⲃⲃΤƬ 07E0044204220373037203A401AC CopticCopticEthiopic Halfwidth and Fullwidth Form VaiYi Radicals Hangul Compatibility Jamo ⲃⲃፐTꕗ꓄ㅜ 2CA72CA61350FF34A50BA4C4315C
  • 9. Abdul Monem S. Rahma, Wesam S.Bhaya, Dhamyaa A. Al-Nasrawi / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.1153-1165 1161 | P a g e Bopomofo Phonetic Extensions Phonetic Extensions Cherokee ㄒᴛᵀᎢ 31121D1B1D4013A2 Halfwidth and Fullwidth Form Yi Radicals Phonetic Extensions Phonetic Extensions Unified Canadian Aboriginal Syllabics Armenian U 0055 U꒤ᴜᵁᑌՍ FF35A4A41D1C1D41144C054D Unified Canadian Aboriginal Syllabics Halfwidth and Fullwidth Form Numbers Form Cherokee V 0056 ᐯVⅤᏤ 142FFF36216413E4 Halfwidth and Fullwidth Form CherokeeCherokee Cyrillic Supplement Cyrillic W 0057 WᏔᎳⲂѠ FF3713D413B3051C0460 CopticCoptic Halfwidth and Fullwidth Form Yi Radicals Numbers Form Cyrillic Greek and Coptic X 0058 ⲃⲃX꒼ⅩХΧ 2CAD2CACFF38A4BC2169042503A7 Runic ᚷ 16B7 Halfwidth and Fullwidth Form CyrillicCyrillic Greek and Coptic IPA ExtensionsY 0059 YүҮΥʏ FF3904AF04AE03A5028F Coptic Halfwidth and Fullwidth Form CherokeeMyanmar Greek and Coptic Latin Extended-B Latin Extended-B Z 005A ⲃZᏃⲃΖƵȤ 2C8CFF3A13C31097039601B50224 Letterlike symbols Limbu ℤⲃ 21241901 Halfwidth and Fullwidth Form Phonetic Extensions Phonetic Extensions Tai LeCyrillic IPA Extensionsa 0061 aᵅᵃꕗаɑ FF411D451D43197204300251 Unified Canadian CherokeeNkoCyrillicCyrillic Latin Extended-B Latin Extended-B b 0062
  • 10. Abdul Monem S. Rahma, Wesam S.Bhaya, Dhamyaa A. Al-Nasrawi / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.1153-1165 1162 | P a g e Aboriginal Syllabics ᖯᏏ߀ьЬƄƅ 15AF13CF07D5044C042C01840185 Halfwidth and Fullwidth Form Phonetic Extensions bᵇ FF421D47 CyrillicCoptic Halfwidth and Fullwidth Form Numbers Form Tai LeMyanmar Greek and Copticc 0063 сⲃcⅽꕗⲃϲ 04412CA5FF43217D1974100403F2 Yi RadicalsYi Radicals Numbers Form Phonetic Extensions Unified Canadian Aboriginal Syllabics Cyrillic Supplement Cyrillic Supplement d 0064 ꒯꒭ⅾᵈᑯԁԀ A4AFA4AD217E1D48146F05010500 Letterlike symbols Halfwidth and Fullwidth Form ⅆd 2146FF44 Halfwidth and Fullwidth Form Letterlike symbols Letterlike symbols Phonetic Extensions Tai LeMyanmarCyrillic e 0065 eℯ℮ᵉꕗⲃе FF45212F212E1D49197110540435 Phonetic Extensions Halfwidth and Fullwidth Form f 0066 ᶠf 1DA0FF46 Phonetic Extensions Supplement Halfwidth and Fullwidth Form Letterlike symbols Phonetic Extensions IPA Extensionsg 0067 ᶢgℊᵍɡ 1DA2FF47210A1D4D0261 Halfwidth and Fullwidth Form Letterlike symbols CherokeeGeorgianCyrillicCyrillic Spacing Modifier Lettersh 0068 hℎᏂႹһҺʰ FF48210E13C210B904BB04BA02B0 Letterlike symbols Halfwidth and Fullwidth Form Numbers Form Phonetic Extensions CherokeeCyrillic i 0069
  • 11. Abdul Monem S. Rahma, Wesam S.Bhaya, Dhamyaa A. Al-Nasrawi / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.1153-1165 1163 | P a g e ⅈiⅰᵢᎥі 2148FF4921701D6213A50456 Letterlike symbols Halfwidth and Fullwidth Form Unified Canadian Aboriginal Syllabics Cyrillic Greek and Coptic Spacing Modifier Letters IPA Extensionsj 006A ⅉjᒎјϳʲʝ 2149FF4A148E045803F302B2029D Coptic Halfwidth and Fullwidth Form Phonetic Extensions Cyrillic k 006B ⲃkᵏк 2C95FF4B1D4F043A VaiTifinagh Numbers Form Tai LeTeluguCyrillic Spacing Modifier Letters l 006C ꕗꕗⅼꕗ౹ӏˡ A6212D4F217C19630C7904CF02E1 Yi Radicals Halfwidth and Fullwidth Form ꒐l A490FF4C Halfwidth and Fullwidth Form Numbers Form Phonetic Extensionsm 006D mⅿᵐ FF4D217F1D50 Halfwidth and Fullwidth Form Tai Le n 006E nꕗ FF4E1952 MyanmarTeluguTamilLaoArmenianCyrillic Greek and Coptic o 006F ၂౦௦໐օоο 10400C660BE60ED00585043E03BF New Tai LueMyanmar Phonetic Extensions CopticEthiopic Halfwidth and Fullwidth Form Phonetic Extensions ꕗⲃᴼⲃዐoᴏ 19D0101D1D3C2C9F12D0FF4F1D0F Coptic Halfwidth and Fullwidth Form Phonetic Extensions Cyrillic p 0070 ⲃpᵖр 2CA3FF501D560440 HalfwidthCyrillicq
  • 12. Abdul Monem S. Rahma, Wesam S.Bhaya, Dhamyaa A. Al-Nasrawi / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.1153-1165 1164 | P a g e and Fullwidth Form Supplement0071 qⲂ FF51051B Halfwidth and Fullwidth Form Phonetic Extensions Spacing Modifier Letters IPA Extensionsr 0072 rᵣʳɼ FF521D6302B3027C Limbu Latin Extended-D Unified Canadian Aboriginal Syllabics Halfwidth and Fullwidth Form Cyrillic Spacing Modifier Letterss 0073 ⲃⲃᔆsѕˢ 1949A7311506FF53045502E2 Halfwidth and Fullwidth Form Phonetic Extensions IPA Extensionst 0074 tᵗʈ FF541D570288 Phonetic Extensions Halfwidth and Fullwidth Form Phonetic Extensionsu 0075 ᵘuᵤ 1D58FF551D64 Halfwidth and Fullwidth Form Tifinagh Number Form Limbu Phonetic Extensions Phonetic Extensions Greek and Copticv 0076 vꕗⅴⲃᵥᴠν FF562D382174194E1D651D2003BD Phonetic Extensions Halfwidth and Fullwidth Form Phonetic Extensions Cyrillic Supplement Spacing Modifier Lettersw 0077 ᵂwᴡⲂʷ 1D42FF571D21051D02B7 Limbu Halfwidth and Fullwidth Form Bopomofo Number Form Cyrillic Spacing Modifier Lettersx 0078 ⲃxㄨⅹхˣ 194AFF5831282179044502E3 Halfwidth and Fullwidth Form BopomofoCherokeeGeorgianCyrillicCyrillic Spacing Modifier Lettersy 0079 yㄚᎩႸуУʸ FF59311A13A910B80443042302B8 Phonetic Extensions Latin Extended-B Coptic Unified Canadian Halfwidth and Phonetic Extensions Latin Extended-B z 007A
  • 13. Abdul Monem S. Rahma, Wesam S.Bhaya, Dhamyaa A. Al-Nasrawi / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.1153-1165 1165 | P a g e Table2: Selected English alphabets for hiding process Symbols ASCII Unicode Secret message 00 Secret message 01 Secret message 10 Secret message 11 A 0041 0391 0410 13AA B 0042 0392 0412 0181 E 0045 0395 0415 13AC G 0047 050C 13C0 13B6 H 0048 0397 041D 13BB I 0049 0399 04C0 0406 M 004D 039C 041C 216F O 004F 039F 041E 0555 P 0050 0420 03A1 01A4 S 0053 0405 054F 13DA T 0054 0422 03A4 01AC j 006A 0458 03F3 029D o 006F 03BF 1D0F 043E SupplementAboriginal Syllabics Fullwidth Form ᶻƶⲃᙆzᴢȥ 1DBB01B62C8D1646FF5A1D220225 Table 3: Experimental results of proposed method Experiment #. Selected Char.# in Cover Max.# of bits Can be Embedded in Cover Ratio of Stego-Doc. Size increasing (%) 1 1313 2626 1.11 2 1465 2930 27.6 3 379 758 17.7 4 1602 3204 0.8 5 4091 8182 2.8 6 3681 7362 2.3 7 672 1344 23 8 268 536 4.2 9 6515 13030 31.7 10 902 1804 0.7 Avrg. 11.1