+ All Categories
Home > Documents > Gh 3411531165

Gh 3411531165

Date post: 03-Apr-2018
Category:
Upload: anonymous-7vppkws8o
View: 216 times
Download: 0 times
Share this document with a friend
13
7/28/2019 Gh 3411531165 http://slidepdf.com/reader/full/gh-3411531165 1/13 Abdul Monem S. Rahma, Wesam S.Bhaya, Dhamyaa A. Al-Nasrawi / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.1153-1165 1153 | P age Text Steganography Based On Unicode of Characters in Multilingual  Prof. Abdul Monem S. Rahma 1 , Wesam S.Bhaya 2 , Dhamyaa A. Al- Nasrawi 3  1 (Computer Science Department, University of Technology, Iraq 2 (College of Computer Technology, University of Babylon, Iraq 3 (Computer Science Department, Kerbala University, Iraq ABSTRACT Network security, and secure communications through public and private channels are more important issue specially when computer usage is increasing, for both social and business areas. Data hiding is one of approach to obtain a secure communication medium and protecting the information during transmission. Text steganography is most challenging because of the presence of very less redundant information in text documents as compared to the images and audio. In this paper a novel method is proposed for data hiding in English scripts using Unicode of English alphabet in another languages. In this method, 13 characters from English alphabet was chosen for hiding process which have appearance in another languages. Two bits embedded in one time, using ASCII code for embedding 00, and using Unicode of multilingual for embedding 01, 10, and 11. This method has a height hiding capacity based on specific characters in each document. As well as have very good perceptual transparency and no changes in original text. Keywords - Multilingual characters, Text hiding, Unicode standard. I. Introduction One way of secure data transfer over the Internet is steganography, which conceals the existence of a message [1]. When information hiding is used, even if an eavesdropper snoops the transmitted object, he cannot surmise the communication since it is carried out in a concealed way. Steganography overcomes the limitation of cryptography(that the third party is always aware of the communication because of the unintelligible nature of the text) by hiding message in an innocent looking object called cover[2]. In modern steganography use electronic media rather than physical objects and texts. The text to be concealed is called embedded data. An innocuous medium, such as text, image, audio, or video file; which is used to hide embedded data is called cover. The stego object is an object we get after hiding the embedded data in a cover medium[1]. There are a number of researches had already explored in new steganographic techniques in texts, such as white spaces [3], Synonyms[4], Word Shifting [5], and Line shifting [6]. This paper focused on researches which used Unicode in data hiding, M. H. Shirali-Shahreza, and Mohammad Shirali- Shahreza proposed new method for hiding \ information in Persian and Arabic Unicode texts [7]. Also, they proposed another method for hiding data in Persian (Farsi) and Arabic texts. They based on characters of « » and « » have the same shape but different codes [8]. Lip Yee Por and et al. proposed method based on Unicode space characters with respect to embedding efficiency [9]. In this paper, some letters of English alphabet have appearance in another languages with different codes, these letters used in the proposed method for data hiding in English scripts using Unicode of English alphabet in another languages(multilingual). The rest of the paper is organized as follows. Section 2 explain the Unicode Standard. Section 3  presents the proposed method in detail. Section 4 and 5 demonstrate the results and concludes of the  proposed method. II. Unicode Standard The Unicode Standard is the universal character encoding scheme for written characters and text. It defines a consistent way of encoding multilingual text that enables the exchange of text data internationally and creates the foundation for global software[10]. Unicode can be implemented by different character encodings. The most commonly used encodings are UTF-8, UTF-16. UTF-8 uses one  byte for any ASCII characters, which have the same code values in both UTF-8 and ASCII encoding, and up to four bytes for other characters. UCS-2 uses a 16-bit code unit (two 8-bit bytes) for each character[11]. Unicode characters are distinguished by code points, which are conventionally represented by the letter U followed by four or five hexadecimal digits, for example U+00AE or U+1D310. Unicode characters can range in scalar values from 0 to over a million. The entire range of Unicode characters is divided into 17 blocks, each block is referred to as a  plane and is numbered starting from 0. Characters in the Basic Multilingual Plane (BMP), containing
Transcript
  • 7/28/2019 Gh 3411531165

    1/13

    Abdul Monem S. Rahma, Wesam S.Bhaya, Dhamyaa A. Al-Nasrawi / International Journal of

    Engineering Research and Applications (IJERA) ISSN: 2248-9622

    www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.1153-1165

    1153 | P a g e

    Text Steganography Based On Unicode of Characters in

    Multilingual

    Prof. Abdul Monem S. Rahma1, Wesam S.Bhaya

    2, Dhamyaa A. Al-

    Nasrawi3

    1(Computer Science Department, University of Technology, Iraq

    2(College of Computer Technology, University of Babylon, Iraq

    3(Computer Science Department, Kerbala University, Iraq

    ABSTRACTNetwork security, and secure

    communications through public and private

    channels are more important issue specially when

    computer usage is increasing, for both social and

    business areas. Data hiding is one of approach to

    obtain a secure communication medium and

    protecting the information during transmission.

    Text steganography is most challenging because of

    the presence of very less redundant information in

    text documents as compared to the images and

    audio. In this paper a novel method is proposed for

    data hiding in English scripts using Unicode of

    English alphabet in another languages. In this

    method, 13 characters from English alphabet was

    chosen for hiding process which have appearance

    in another languages. Two bits embedded in one

    time, using ASCII code for embedding 00, and

    using Unicode of multilingual for embedding 01,

    10, and 11. This method has a height hiding

    capacity based on specific characters in each

    document. As well as have very good perceptual

    transparency and no changes in original text.

    Keywords- Multilingual characters, Text hiding,Unicode standard.

    I. IntroductionOne way of secure data transfer over the

    Internet is steganography, which conceals the

    existence of a message [1].When information hiding

    is used, even if an eavesdropper snoops the

    transmitted object, he cannot surmise thecommunication since it is carried out in a concealed

    way. Steganography overcomes the limitation of

    cryptography(that the third party is always aware of

    the communication because of the unintelligible

    nature of the text) by hiding message in an innocent

    looking object called cover[2].In modern steganography use electronic

    media rather than physical objects and texts. The text

    to be concealed is called embedded data. An

    innocuous medium, such as text, image, audio, or

    video file; which is used to hide embedded data is

    called cover. The stego object is an object we get

    after hiding the embedded data in a cover medium[1].There are a number of researches had

    already explored in new steganographic techniques in

    texts, such as white spaces [3], Synonyms[4], Word

    Shifting [5], and Line shifting [6]. This paper focused

    on researches which used Unicode in data hiding, M.

    H. Shirali-Shahreza, and Mohammad Shirali-

    Shahreza proposed new method for hiding \

    information in Persian and Arabic Unicode texts [7].

    Also, they proposed another method for hiding datain Persian (Farsi) and Arabic texts. They based on

    characters of and have the same shape but

    different codes [8]. Lip Yee Por and et al. proposed

    method based on Unicode space characters with

    respect to embedding efficiency [9].

    In this paper, some letters of English

    alphabet have appearance in another languages with

    different codes, these letters used in the proposed

    method for data hiding in English scripts using

    Unicode of English alphabet in anotherlanguages(multilingual).

    The rest of the paper is organized as follows.

    Section 2 explain the Unicode Standard. Section 3

    presents the proposed method in detail. Section 4 and

    5 demonstrate the results and concludes of theproposed method.

    II. Unicode StandardThe Unicode Standard is the universal

    character encoding scheme for written characters and

    text. It defines a consistent way of encoding

    multilingual text that enables the exchange of text

    data internationally and creates the foundation for

    global software[10]. Unicode can be implemented by

    different character encodings. The most commonlyused encodings are UTF-8, UTF-16. UTF-8 uses one

    byte for any ASCII characters, which have the same

    code values in both UTF-8 and ASCII encoding, and

    up to four bytes for other characters. UCS-2 uses a

    16-bit code unit (two 8-bit bytes) for each

    character[11].

    Unicode characters are distinguished by

    code points, which are conventionally representedby

    the letter U followed by four or five hexadecimal

    digits, for example U+00AE or U+1D310. Unicode

    characters can range in scalar values from 0 to over amillion. The entire range of Unicode characters is

    divided into 17 blocks, each block is referred to as aplane and is numbered starting from 0. Characters in

    the Basic Multilingual Plane (BMP), containing

    http://en.wikipedia.org/wiki/Code_pointhttp://en.wikipedia.org/wiki/Unicode#Upluslinkhttp://en.wikipedia.org/wiki/Hexadecimal_digithttp://en.wikipedia.org/wiki/Hexadecimal_digithttp://en.wikipedia.org/wiki/Basic_Multilingual_Planehttp://en.wikipedia.org/wiki/Basic_Multilingual_Planehttp://en.wikipedia.org/wiki/Hexadecimal_digithttp://en.wikipedia.org/wiki/Hexadecimal_digithttp://en.wikipedia.org/wiki/Unicode#Upluslinkhttp://en.wikipedia.org/wiki/Code_point
  • 7/28/2019 Gh 3411531165

    2/13

    Abdul Monem S. Rahma, Wesam S.Bhaya, Dhamyaa A. Al-Nasrawi / International Journal of

    Engineering Research and Applications (IJERA) ISSN: 2248-9622

    www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.1153-1165

    1154 | P a g e

    modern scripts including many Chinese andJapanese characters and many symbols, have a 4-digit code. Historic scripts, but also many modern

    symbols and pictographs (such as emoticons, many

    CJK characters, and Egyptian Hieroglyphics) have 5-

    digit codes[11].Then, Unicode refer to the family of standards and

    technologies associated with the Unicode Consortium

    that can be utilized for working with a written

    language in a computer environment[12].

    III. Proposed MethodIn this paper, a new method was presented

    for text steganography in English scripts using

    Unicode of multilingual characters. Many English

    alphabet characters (called Latin alphabet) have a

    good appearance in another languages, with different

    codes and different glyphs, see Table 1.

    Unfortunately, not all of these characters canbe used in hiding process, because the glyphs of them

    dissimilar to original English scripts. Just 13characters was chosen for hiding process based on

    the following criteria:

    1. Located in Plane 0: which contains U+0000 -

    U+FFFF, this is known as the Basic Multilingual

    Plane (BMP).

    2. The glyphs: A glyph is a presentation of aparticular shape which a character may have when

    rendered or displayed. The glyph of selected

    characters must be similar to the original script.

    3. Availability: depends on its presence in the

    specified font (selected characters must besupported by standard fonts)[11]. If a desired

    character is not present in the available fonts(that

    mean characters have no glyph), an empty box, a

    question mark or another replacement will be shown:

    , see Table 1 .

    Table 2 explain the selected characters in hidingprocess.

    In proposed method, two processes was

    implemented, hiding process, and extracting process.

    Hiding process based on the appearance of selected

    characters in english script. In this method two bits

    can be embedding at one time. Firstly, selectedcharacters must to be found in document, then

    embedding process implemented by replacement

    depending on secret message which can be hidden.

    and replacement can be done based on secret

    message as follows:

    00 No change

    If secret message = (1)

    { 01,10,11} Replace with nicode of

    Multilingual characters

    based on Table 2

    The document file must be has enough areato hide data (secret message with two bytes represent

    message length embedded in beginning). This

    process called Checking capacity of hiding , see

    Fig.1.

    Figure 1. Hiding process

    Hiding process (Embedding process)

    summarized in the following algorithm:

    English scripts written in (Latin letters), takethe range (U+0041-U+005A) for uppercase Latin

    alphabet, and (U+0061-U+007A) for lowercase Latin

    alphabet in hexadecimal. For example, there is Latin

    capital "A" which is defined (U+0041) can be no

    change if secret message is 00, but can be replaced by

    one of Unicode of Multilingual characters in Table 2, Based on secret message, replaced by (U+0391)

    when secret message is 01 as example.

    In another side, the extracting process Fig.2

    is the opposite operation of the hiding process.

    Figure 2. Extracting process

    Embedding algorithm

    Input: Document file, and secret message.

    Output: Stego file.

    1. Open cover document.

    2. Scan cover document to find selected characters

    in Table 2,

    3. Compute number of selected characters to check

    the capacity of hiding.

    4. Get binary form of secret message.

    5. For each two symbol in secret message

    - if bit = 00, then no change (ASCII code) ,else replace by Unicode of Multilingual

    characters in Table 2.

    6. Hide the message length in the beginning

    of secret message.

    7. Return stego document.

    http://en.wikipedia.org/wiki/Writing_systemhttp://en.wikipedia.org/wiki/Emoticonhttp://en.wikipedia.org/wiki/CJK_charactershttp://en.wikipedia.org/wiki/CJK_charactershttp://en.wikipedia.org/wiki/Emoticonhttp://en.wikipedia.org/wiki/Writing_system
  • 7/28/2019 Gh 3411531165

    3/13

    Abdul Monem S. Rahma, Wesam S.Bhaya, Dhamyaa A. Al-Nasrawi / International Journal of

    Engineering Research and Applications (IJERA) ISSN: 2248-9622

    www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.1153-1165

    1155 | P a g e

    In order to find selected characters, we mustcheck the code of current characters, by the following

    statement:

    In range of ( U+0041 - U+005A)

    or ( U+0061 - U+007A), thenSecret message = 0

    If Code of (2)Selected characters

    Else Secret message = {01,10,11}

    based on Table 2

    The first 16-characters represent the secret

    message length. Extracting process summarized in

    the following algorithm:

    IV. ResultsIn this paper, the proposed method of data

    hiding is tested by taking different cover documentswith different sizes and hiding the same secret

    message in some of them, sees the corresponding

    GUI for the proposed method in Fig. 3.

    Figure 3. GUI of proposed method

    The payload of bits can be hidden based on

    selected characters number. If the cover file contains,

    for example, 200 selected characters, we can hiding

    400 bits in it(because two bits can be embedded in

    one character). Fig. 4 and Fig. 5 represent coverdocument and stego document respectively.

    Figure 4. Cover document

    Figure 5. Stego document

    The results that are got from these

    experiments can be summarized in the Table 3. Note

    the average of size for stego document (after hiding)

    is increased about (11.1 %) from original size,

    because using Unicode instead of ASCII code in

    embedding process, which use UTF-16 encodings foreach character.

    V. ConclusionsIn data hiding method, the main goals of

    steganography are (perceptual transparency, capacity,

    and robustness). Proposed method has an excellent

    perceptual transparency because the stego text is

    similar to the original text using characters in

    multilingual which their glyphs more similar and

    suitable to glyphs of original script. The hidingcapacity of proposed method is very high, depending

    on selected characters frequency shown in Table 2. In

    addition, this method is robust to digital copy-pastoperation, which means that copying and pasting the

    text between computer programs preserve hidden

    information. In other side, there is an increasing instego document size, result from Unicode which use

    2-bytes for each character. Huffman code for data

    compression can be suggested to overcome this

    drawback. Thus, the proposed method provide an

    efficient text steganography method by Unicode, and

    an excellent way to obtain safe and secure

    information transformation.

    References[1] M. Agarwal, Application Text

    Steganographic Approaches: A Comparison,

    Extracting algorithm

    Input: Stego file .Output: Secret message.

    1. Open stego document.

    2. Extract secret message length

    3. Scan stego document to find ligatures characters,

    4. Check code of selected characters based on equation (2)

    - if code in uppercase or lowercase English Latin letters

    then secret message=00

    - else secret message=01,or 10, or 11 based on Table 2.

  • 7/28/2019 Gh 3411531165

    4/13

    Abdul Monem S. Rahma, Wesam S.Bhaya, Dhamyaa A. Al-Nasrawi / International Journal of

    Engineering Research and Applications (IJERA) ISSN: 2248-9622

    www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.1153-1165

    1156 | P a g e

    International Journal of Network Security &Its Applications, 5(1), 2013, 91-106.

    [2] K. Rabah, Steganography-the art of hidingdata, Information Technology Journal, 3(3),

    2004, 245-269.

    [3] W. Bender, D. Gruhl, N. Morimoto, and A.Lu, Techniques for data hiding, IBM SystemJournal 35(3-4), 1996, 313-336.

    [4] H. Shirali-Shahreza, M. Shirali-Shahreza, Anew synonym text steganography. Proc. 8th

    International Conf. on Intelligent

    Information Hiding and Multimedia SignalProcessing, Harbin, China, 2008, 1524-

    1526.

    [5] Y. Kim, K. Moon, I. Oh, A textwatermarking algorithm based on word

    classification and inter-word space statistics,

    Proc. 7th International Conf. on Document

    Analysis and Recognition, Edinburgh,Scotland: IEEE,2003, 775-779.

    [6] S. Low, N. Maxemchuk, J. Brassil, L.OGorman, Document marking andidentification using both line and word

    shifting,Proc.14th Annual Joint Conf. of theIEEE Computer and Communications

    Societies, Boston, MA, USA: IEEE, 1995,

    853- 860.

    [7] H. Shirali-Shahreza, M. Shirali-Shahreza,Steganography in Persian and Arabicunicode texts using pseudo-space and

    pseudo-connection characters, Journal of

    Theoretical and Applied InformationTechnology, 4(8), 2008, 682-687.

    [8] H. Shirali-Shahreza, M. Shirali-Shahreza,Arabic/Persian text steganography utilizingsimilar letters with different codes, The

    Arabian Journal for Science and

    Engineering, 35(1B), 2010, 213-222.

    [9] L. Por, K. Wong, K. Chee, UniSpaCh: Atext-based data hiding method using unicode

    space characters, The Journal of Systemsand Software 85(5), 2012, 10751082.

    [10] The Unicode Consortium, The UnicodeStandard,http://www.unicode.org.

    [11] J. Korpela, Unicode explained (UnitedStates of America., O'Reilly Media , 2006).

    [12] D. Yacob, Unicode for Under-ResourcedLanguages, 2006, 33-38. From http://mt-

    archive.info/LREC-2006-Jacob.pdf

    .

    http://www.unicode.org/http://www.unicode.org/http://www.unicode.org/http://mt-archive.info/LREC-2006-Jacob.pdfhttp://mt-archive.info/LREC-2006-Jacob.pdfhttp://mt-archive.info/LREC-2006-Jacob.pdfhttp://mt-archive.info/LREC-2006-Jacob.pdfhttp://www.unicode.org/
  • 7/28/2019 Gh 3411531165

    5/13

    Abdul Monem S. Rahma, Wesam S.Bhaya, Dhamyaa A. Al-Nasrawi / International Journal of

    Engineering Research and Applications (IJERA) ISSN: 2248-9622

    www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.1153-1165

    1157 | P a g e

    Table 1: Unicode of Characters in Multilingual

    Multilingual, Glyphs, and Unicode(ASCII)

    Latin Alphabets

    Unified

    CanadianAboriginal

    Syllabics

    Unified

    CanadianAboriginal

    Syllabics

    Unified

    CanadianAboriginal

    Syllabics

    CherokeeCherokeeCyrillicGreek andCoptic

    C0 Control and

    Basic Latin

    A

    0041

    15CB15E915C513AF13AA04100391

    Halfwidthand

    Fullwidth

    Form

    Phonetic

    Extensions

    Phonetic

    Extensions

    FF211D2C1D00

    Unified

    CanadianAboriginal

    Syllabics

    CherokeeCyrillicCyrillicGreek andCoptic

    IPAExtensions

    LatinExtended-B

    B0042

    15F713F404120432039202990181

    CopticLetterlike

    symbols

    Phonetic

    ExtensionsCoptic

    Halfwidth

    and

    Fullwidth

    Form

    Vai

    2C82212C1D2E2C83FF22A557

    Halfwidth

    andFullwidth

    Form

    NumbersForm

    PhoneticExtensions

    CherokeeGeorgianCyrillicGreek andCoptic

    C

    0043

    FF23216D1D0413DF10BA042103F9

    Yi RadicalsYi RadicalsCopticKayah LiMathematical

    Operators

    A49FA49D2CA4A90D2201

    Numbers

    Form

    Phonetic

    Extensions

    Phonetic

    Extensions

    Unified

    Canadian

    Aboriginal

    Syllabics

    Unified

    Canadian

    Aboriginal

    Syllabics

    CherokeeLatin

    Extended-B

    D

    0044

    216E1D051D3015EA15DE13A0018A

    Halfwidth

    and

    Fullwidth

    Form

    Letterlike

    symbols

    FF242145

    Hangul

    Compatibility

    Jamo

    Phonetic

    ExtensionsTifinagh

    Phonetic

    ExtensionsCherokeeCyrillic

    Greek and

    CopticE

    0045

    314C1D072D391D3113AC04150395

  • 7/28/2019 Gh 3411531165

    6/13

    Abdul Monem S. Rahma, Wesam S.Bhaya, Dhamyaa A. Al-Nasrawi / International Journal of

    Engineering Research and Applications (IJERA) ISSN: 2248-9622

    www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.1153-1165

    1158 | P a g e

    Vai

    Halfwidth

    andFullwidth

    Form

    A5CBFF25

    Latin

    Extended-D

    Halfwidth

    and

    Fullwidth

    Form

    Unified

    Canadian

    Aboriginal

    Syllabics

    Letterlike

    symbols

    Greek and

    CopticF

    0046

    A730FF2615B4213103DC

    Phonetic

    ExtensionsCherokeeCherokeeCherokee

    Cyrillic

    Supplement

    Cyrillic

    Supplement

    IPA

    Extensions

    G

    0047

    1D3313E913B613C0050D050C0262

    Halfwidth

    andFullwidth

    Form

    FF27

    Phonetic

    Extensions

    Unified

    Canadian

    Aboriginal

    Syllabics

    CherokeeCyrillicCyrillicGreek and

    Coptic

    IPA

    Extensions

    H

    0048

    1D34157C13BB043D041D0397029C

    Yi Syllables

    Halfwidth

    and

    FullwidthForm

    Letterlike

    symbolsRunicCopticCopticEthiopic

    A03FFF28210D16BA2C8F2C8E12D8

    Letterlike

    symbols

    Phonetic

    Extensions

    210B1D78

    Numbers

    Form

    Phonetic

    ExtensionsCherokeeCyrillicCyrillic

    Greek and

    Coptic

    IPA

    Extensions

    I

    0049

    21601D3513C6040604C00399026A

    Yi SyllablesVAILatin

    Extended-DCoptic

    Halfwidthand

    FullwidthForm

    Halfwidthand

    FullwidthForm

    Halfwidthand

    FullwidthForm

    A024A56FA7FE2C92FF74FF6AFF29

    Bopomofo

    ExtendedTifinagh

    31B22D4A

    Halfwidthand

    FullwidthForm

    Phonetic

    Extensions

    Phonetic

    Extensions

    UnifiedCanadian

    AboriginalSyllabics

    CherokeeMyanmarCyrillic

    J

    004A

  • 7/28/2019 Gh 3411531165

    7/13

    Abdul Monem S. Rahma, Wesam S.Bhaya, Dhamyaa A. Al-Nasrawi / International Journal of

    Engineering Research and Applications (IJERA) ISSN: 2248-9622

    www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.1153-1165

    1159 | P a g e

    FF2A1D0A1D36148D13AB10420408

    Letterlike

    symbols

    2110

    Letterlike

    symbols

    Phonetic

    Extensions

    Phonetic

    ExtensionsCherokeeCyrillic

    Greek and

    Coptic

    Latin

    Extended-B

    K

    004B

    212A1D0B1D3713E6041A039A0198

    RunicCoptic

    Halfwidth

    and

    Fullwidth

    Form

    16D52C94FF2B

    PhoneticExtensions

    Tai Le

    Unified

    CanadianAboriginal

    Syllabics

    CherokeeArmenianArmenianIPAExtensions

    L

    004C

    1D38196814AA13DE056C053C029F

    Halfwidth

    and

    Fullwidth

    Form

    Halfwidth

    and

    Fullwidth

    Form

    Letterlike

    symbolsYi Radicals

    Phonetic

    Extensions

    Supplement

    CopticCoptic

    FF2CFFA42112A4921DAB2CD12CD0

    BopomofoNumbers

    Form

    3125216C

    Phonetic

    Extensions

    Phonetic

    ExtensionsCherokeeCyrillicCyrillic

    Greek and

    Coptic

    Greek and

    Coptic

    M

    004D

    1D0D1D3913B7043C041C039C03FA

    Coptic

    Halfwidth

    and

    Fullwidth

    Form

    Numbers

    FormCoptic

    Letterlike

    symbolsRunic

    2C98FF2D216F2C99213316D6

    CopticCoptic

    Halfwidth

    and

    Fullwidth

    Form

    Phonetic

    Extensions

    Greek and

    Coptic

    IPA

    Extensions

    Latin

    Extended-B

    N

    004E

    2C9B2C9AFF2E1D3A039D0274019D

    Letterlike

    symbols

    Phonetic

    Extensions

    Supplement

    21151DB0

    Yi RadicalsYi SyllablesOriyaNkoArmenianCyrillicGreek and

    CopticO004F

  • 7/28/2019 Gh 3411531165

    8/13

    Abdul Monem S. Rahma, Wesam S.Bhaya, Dhamyaa A. Al-Nasrawi / International Journal of

    Engineering Research and Applications (IJERA) ISSN: 2248-9622

    www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.1153-1165

    1160 | P a g e

    A4A8A1320B2007C00555041E039F

    OriyaCoptic

    Halfwidth

    andFullwidth

    Form

    Limbu

    0B662C9EFF2F1946

    Phonetic

    Extensions

    Phonetic

    Extensions

    Phonetic

    ExtensionsCherokeeCyrillic

    Greek and

    Coptic

    Latin

    Extended-B

    P

    0050

    1D3E1D291D1813E2042003A101A4

    Letterlike

    symbolsCoptic

    Halfwidth

    and

    Fullwidth

    Form

    21192CA2FF30

    Letterlike

    symbolsTifinagh

    Halfwidth

    and

    Fullwidth

    Form

    Cyrillic

    SupplementQ

    0051

    211A2D55FF31051A

    Phonetic

    Extensions

    Unified

    Canadian

    Aboriginal

    Syllabics

    CherokeeCherokeeIPA

    Extensions

    Latin

    Extended-B

    Latin

    Extended-B

    R

    0052

    1D3F158713D213A10280024C01A6

    Letterlike

    symbols

    Halfwidthand

    Fullwidth

    Form

    Letterlike

    symbols

    211DFF32211B

    VaiYi RadicalsYi SyllablesCherokeeGeorgianArmenianCyrillic

    S

    0053

    A576A49AA1D913DA10BD054F0405

    Malayalam

    Halfwidth

    and

    Fullwidth

    Form

    0D1FFF33

    NkoCyrillicCyrillicGreek and

    Coptic

    Greek and

    Coptic

    Greek and

    Coptic

    Latin

    Extended-B

    T

    0054

    07E0044204220373037203A401AC

    CopticCopticEthiopic

    Halfwidth

    and

    FullwidthForm

    VaiYi Radicals

    Hangul

    Compatibility

    Jamo

    2CA72CA61350FF34A50BA4C4315C

  • 7/28/2019 Gh 3411531165

    9/13

    Abdul Monem S. Rahma, Wesam S.Bhaya, Dhamyaa A. Al-Nasrawi / International Journal of

    Engineering Research and Applications (IJERA) ISSN: 2248-9622

    www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.1153-1165

    1161 | P a g e

    BopomofoPhonetic

    Extensions

    Phonetic

    ExtensionsCherokee

    31121D1B1D4013A2

    Halfwidth

    andFullwidth

    Form

    Yi RadicalsPhoneticExtensions

    PhoneticExtensions

    Unified

    CanadianAboriginal

    Syllabics

    ArmenianU

    0055

    FF35A4A41D1C1D41144C054D

    Unified

    Canadian

    AboriginalSyllabics

    Halfwidth

    and

    FullwidthForm

    Numbers

    FormCherokee

    V

    0056

    142FFF36216413E4

    Halfwidth

    andFullwidth

    Form

    CherokeeCherokeeCyrillicSupplement

    CyrillicW

    0057

    FF3713D413B3051C0460

    CopticCoptic

    Halfwidth

    and

    Fullwidth

    Form

    Yi RadicalsNumbers

    FormCyrillic

    Greek and

    Coptic

    X

    0058

    2CAD2CACFF38A4BC2169042503A7

    Runic

    16B7

    Halfwidth

    and

    Fullwidth

    Form

    CyrillicCyrillicGreek and

    Coptic

    IPA

    ExtensionsY

    0059

    FF3904AF04AE03A5028F

    Coptic

    Halfwidth

    andFullwidth

    Form

    CherokeeMyanmarGreek and

    CopticLatin

    Extended-BLatin

    Extended-B

    Z

    005A

    2C8CFF3A13C31097039601B50224

    Letterlikesymbols

    Limbu

    21241901

    Halfwidth

    andFullwidth

    Form

    PhoneticExtensions

    PhoneticExtensions

    Tai LeCyrillicIPA

    Extensionsa

    0061

    FF411D451D43197204300251

    Unified

    CanadianCherokeeNkoCyrillicCyrillic

    Latin

    Extended-B

    Latin

    Extended-B

    b

    0062

  • 7/28/2019 Gh 3411531165

    10/13

    Abdul Monem S. Rahma, Wesam S.Bhaya, Dhamyaa A. Al-Nasrawi / International Journal of

    Engineering Research and Applications (IJERA) ISSN: 2248-9622

    www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.1153-1165

    1162 | P a g e

    Aboriginal

    Syllabics

    15AF13CF07D5044C042C01840185

    Halfwidth

    andFullwidth

    Form

    PhoneticExtensions

    FF421D47

    CyrillicCoptic

    Halfwidth

    and

    Fullwidth

    Form

    Numbers

    FormTai LeMyanmar

    Greek and

    Copticc

    0063

    04412CA5FF43217D1974100403F2

    Yi RadicalsYi RadicalsNumbersForm

    PhoneticExtensions

    Unified

    CanadianAboriginal

    Syllabics

    CyrillicSupplement

    CyrillicSupplement

    d

    0064

    A4AFA4AD217E1D48146F05010500

    Letterlike

    symbols

    Halfwidthand

    Fullwidth

    Form

    2146FF44

    Halfwidth

    andFullwidth

    Form

    Letterlikesymbols

    Letterlikesymbols

    PhoneticExtensions

    Tai LeMyanmarCyrillice

    0065

    FF45212F212E1D49197110540435

    Phonetic

    Extensions

    Halfwidthand

    Fullwidth

    Formf

    0066

    1DA0FF46

    Phonetic

    ExtensionsSupplement

    Halfwidth

    and

    Fullwidth

    Form

    Letterlike

    symbols

    Phonetic

    Extensions

    IPA

    Extensionsg

    0067

    1DA2FF47210A1D4D0261

    Halfwidth

    and

    Fullwidth

    Form

    Letterlike

    symbolsCherokeeGeorgianCyrillicCyrillic

    Spacing

    Modifier

    Lettersh

    0068

    FF48210E13C210B904BB04BA02B0

    Letterlikesymbols

    Halfwidth

    andFullwidth

    Form

    NumbersForm

    PhoneticExtensionsCherokeeCyrillic

    i0069

  • 7/28/2019 Gh 3411531165

    11/13

    Abdul Monem S. Rahma, Wesam S.Bhaya, Dhamyaa A. Al-Nasrawi / International Journal of

    Engineering Research and Applications (IJERA) ISSN: 2248-9622

    www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.1153-1165

    1163 | P a g e

    2148FF4921701D6213A50456

    Letterlike

    symbols

    Halfwidth

    and

    Fullwidth

    Form

    Unified

    Canadian

    Aboriginal

    Syllabics

    CyrillicGreek and

    Coptic

    SpacingModifier

    Letters

    IPA

    Extensionsj

    006A

    2149FF4A148E045803F302B2029D

    Coptic

    Halfwidth

    and

    Fullwidth

    Form

    Phonetic

    ExtensionsCyrillic

    k

    006B

    2C95FF4B1D4F043A

    VaiTifinaghNumbers

    FormTai LeTeluguCyrillic

    Spacing

    Modifier

    Letters

    l

    006C

    A6212D4F217C19630C7904CF02E1

    Yi Radicals

    Halfwidthand

    Fullwidth

    Form

    A490FF4C

    Halfwidth

    and

    Fullwidth

    Form

    Numbers

    Form

    Phonetic

    Extensionsm

    006D

    FF4D217F1D50

    Halfwidth

    and

    Fullwidth

    Form

    Tai Len

    006E

    FF4E1952

    MyanmarTeluguTamilLaoArmenianCyrillicGreek and

    Coptic

    o

    006F

    10400C660BE60ED00585043E03BF

    New Tai LueMyanmarPhonetic

    ExtensionsCopticEthiopic

    Halfwidthand

    Fullwidth

    Form

    Phonetic

    Extensions

    19D0101D1D3C2C9F12D0FF4F1D0F

    Coptic

    Halfwidth

    and

    Fullwidth

    Form

    Phonetic

    ExtensionsCyrillic

    p

    0070

    2CA3FF501D560440HalfwidthCyrillicq

  • 7/28/2019 Gh 3411531165

    12/13

    Abdul Monem S. Rahma, Wesam S.Bhaya, Dhamyaa A. Al-Nasrawi / International Journal of

    Engineering Research and Applications (IJERA) ISSN: 2248-9622

    www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.1153-1165

    1164 | P a g e

    and

    FullwidthForm

    Supplement0071

    FF51051B

    Halfwidthand

    Fullwidth

    Form

    Phonetic

    Extensions

    Spacing

    Modifier

    Letters

    IPA

    Extensionsr

    0072

    FF521D6302B3027C

    LimbuLatin

    Extended-D

    Unified

    Canadian

    Aboriginal

    Syllabics

    Halfwidth

    and

    Fullwidth

    Form

    Cyrillic

    Spacing

    Modifier

    Letterss

    0073

    1949A7311506FF53045502E2

    Halfwidthand

    Fullwidth

    Form

    Phonetic

    Extensions

    IPA

    Extensionst

    0074

    FF541D570288

    Phonetic

    Extensions

    Halfwidth

    and

    Fullwidth

    Form

    Phonetic

    Extensionsu

    0075

    1D58FF551D64

    Halfwidthand

    Fullwidth

    Form

    TifinaghNumber

    FormLimbu

    Phonetic

    Extensions

    Phonetic

    Extensions

    Greek and

    Copticv

    0076

    FF562D382174194E1D651D2003BD

    Phonetic

    Extensions

    Halfwidth

    and

    Fullwidth

    Form

    Phonetic

    Extensions

    Cyrillic

    Supplement

    Spacing

    Modifier

    Lettersw

    0077

    1D42FF571D21051D02B7

    LimbuHalfwidth

    and

    FullwidthForm

    BopomofoNumber

    FormCyrillic

    SpacingModifier

    Lettersx0078

    194AFF5831282179044502E3

    Halfwidth

    andFullwidth

    Form

    BopomofoCherokeeGeorgianCyrillicCyrillic

    Spacing

    Modifier

    Lettersy

    0079

    FF59311A13A910B80443042302B8

    PhoneticExtensions

    LatinExtended-B

    CopticUnifiedCanadian

    Halfwidthand

    PhoneticExtensions

    LatinExtended-B

    z007A

  • 7/28/2019 Gh 3411531165

    13/13

    Abdul Monem S. Rahma, Wesam S.Bhaya, Dhamyaa A. Al-Nasrawi / International Journal of

    Engineering Research and Applications (IJERA) ISSN: 2248-9622

    www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.1153-1165

    1165 | P a g e

    Table2: Selected English alphabets for hiding process

    Symbols ASCII Unicode

    Secret message 00 Secret message 01 Secret message 10 Secret message 11

    A 0041 0391 0410 13AA

    B 0042 0392 0412 0181

    E 0045 0395 0415 13AC

    G 0047 050C 13C0 13B6

    H 0048 0397 041D 13BB

    I 0049 0399 04C0 0406

    M 004D 039C 041C 216F

    O 004F 039F 041E 0555

    P 0050 0420 03A1 01A4

    S 0053 0405 054F 13DA

    T 0054 0422 03A4 01AC

    j 006A 0458 03F3 029D

    o 006F 03BF 1D0F 043E

    SupplementAboriginal

    Syllabics

    Fullwidth

    Form

    1DBB01B62C8D1646FF5A1D220225

    Table 3: Experimental results of proposed method

    Experiment #. Selected Char.#

    in Cover

    Max.# of bits Can be

    Embedded in Cover

    Ratio of Stego-Doc. Size

    increasing (%)

    1 1313 2626 1.11

    2 1465 2930 27.6

    3 379 758 17.7

    4 1602 3204 0.85 4091 8182 2.8

    6 3681 7362 2.3

    7 672 1344 23

    8 268 536 4.2

    9 6515 13030 31.7

    10 902 1804 0.7

    Avrg. 11.1


Recommended