Steganography in Arabic Text Using Kashida ... - ResearchGate
Steganography in Arabic Text Using Kashida ... - ResearchGate
Steganography in Arabic Text Using Kashida ... - ResearchGate
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
[11] K. Bennett, "L<strong>in</strong>guistic steganography: Survey,<br />
analysis, and robustness concerns for hid<strong>in</strong>g<br />
<strong>in</strong>formation <strong>in</strong> text," CERIAS Tech Report p. 28,<br />
2004.<br />
[12] L. Yul<strong>in</strong>g, S. X<strong>in</strong>gm<strong>in</strong>g, G. Can, and W. Hong, "An<br />
efficient l<strong>in</strong>guistic steganography for Ch<strong>in</strong>ese text,"<br />
<strong>in</strong> IEEE International Conference on Multimedia and<br />
Expo, 2007, pp. 2094-2097.<br />
[13] S. H. Low, N. F. Maxemchuk, J. Brassil, and L.<br />
O'Gorman, "Document mark<strong>in</strong>g and identification<br />
us<strong>in</strong>g both l<strong>in</strong>e and word shift<strong>in</strong>g," <strong>in</strong> Proceed<strong>in</strong>gs of<br />
the Fourteenth Annual Jo<strong>in</strong>t Conference of the IEEE<br />
Computer and Communications Societies. Br<strong>in</strong>g<strong>in</strong>g<br />
Information to People, IEEE INFOCOM'9., 1995, pp.<br />
853-860.<br />
[14] W. Bender, D. Gruhl, N. Morimoto, and A. Lu,<br />
"Techniques for data hid<strong>in</strong>g," IBM systems journal,<br />
vol. 35, pp. 313-336, 1996.<br />
[15] Z. H. Wang, C. C. Chang, and M. C. Li, "Emoticonbased<br />
text steganography <strong>in</strong> chat," <strong>in</strong> Asia-Pacific<br />
Conference on Computational Intelligence and<br />
Industrial Applications, 2009. PACIIA, 2009, pp.<br />
457-460.<br />
[16] M. L. Bensaad and M. B. Yagoubi, "High capacity<br />
diacritics-based method for <strong>in</strong>formation hid<strong>in</strong>g <strong>in</strong><br />
<strong>Arabic</strong> text," <strong>in</strong> International Conference on<br />
Innovations <strong>in</strong> Information Technology (IIT), 2011,<br />
pp. 433-436.<br />
[17] M. A. Aabed, S. M. Awaideh, A. R. M. Elshafei, and<br />
A. A. Gutub, "<strong>Arabic</strong> diacritics based<br />
steganography," <strong>in</strong> IEEE International Conference on<br />
Signal Process<strong>in</strong>g and Communications, ICSPC,<br />
2007, pp. 756-759.<br />
[18] M. H. Shirali-Shahreza and M. Shirali-Shahreza, "A<br />
new approach to Persian/<strong>Arabic</strong> text steganography,"<br />
<strong>in</strong> 1st and 5th IEEE/ACIS International Workshop on<br />
Component-Based Software Eng<strong>in</strong>eer<strong>in</strong>g, Software<br />
Architecture and Reuse Computer and Information<br />
Science, ICIS-COMSAR and IEEE/ACIS, 2006, pp.<br />
310-315.<br />
[19] A. Odeh, A. Alzubi, Q. B. Hani, and K. Elleithy,<br />
"<strong>Steganography</strong> by multipo<strong>in</strong>t <strong>Arabic</strong> letters," <strong>in</strong><br />
IEEE Long Island Systems, Applications and<br />
Technology Conference (LISAT), 2012, pp. 1-7.<br />
[20] A. Azmi and A. Alsaiari, "<strong>Arabic</strong> Typography: A<br />
Survey," International Journal of Electrical &<br />
Computer Sciences, vol. 9, pp. 16-22, 2010.<br />
[21] M. Turner, "The world’s most widely spoken<br />
languages," ed: St. Ignatius High School. URL:<br />
http://www2.ignatius.edu/faculty/turner/languages.<br />
htm [viewed December 10, 2003], 2003.<br />
Ammar Odeh is a PhD. Student <strong>in</strong> University of Bridgeport.<br />
He earned the M.S. degree <strong>in</strong> Computer Science College of<br />
K<strong>in</strong>g Abdullah II School for Information Technology<br />
(KASIT) at the University of Jordan <strong>in</strong> Dec. 2005 and the<br />
B.Sc. <strong>in</strong> Computer Science from the Hashemite University. He<br />
has worked as a Lab Supervisor <strong>in</strong> Philadelphia University<br />
(Jordan) and Lecturer <strong>in</strong> Philadelphia University for the ICDL<br />
Courses and as technical support for onl<strong>in</strong>e exam<strong>in</strong>ations for<br />
two years. He served as a Lecturer at the IT, (ACS,CIS ,CS)<br />
Department of Philadelphia University <strong>in</strong> Jordan, and also<br />
worked at the M<strong>in</strong>istry of Higher Education (Oman, Sur<br />
College of Applied Science) for two years. Ammar jo<strong>in</strong>ed the<br />
University of Bridgeport as a PhD student of Computer<br />
Science and Eng<strong>in</strong>eer<strong>in</strong>g <strong>in</strong> August 2011. His area of<br />
concentration is reverse software eng<strong>in</strong>eer<strong>in</strong>g, computer<br />
security, and wireless networks. Specifically, he is work<strong>in</strong>g on<br />
the enhancement of computer security for data transmission<br />
over wireless networks. He is also actively <strong>in</strong>volved <strong>in</strong><br />
academic community, outreach activities and student<br />
recruit<strong>in</strong>g and advis<strong>in</strong>g.<br />
Dr. Khaled Elleithy is the Associate Dean for Graduate<br />
Studies <strong>in</strong> the School of Eng<strong>in</strong>eer<strong>in</strong>g at the University of<br />
Bridgeport. He has research <strong>in</strong>terests are <strong>in</strong> the areas of<br />
network security, mobile communications, and formal<br />
approaches for design and verification. He has published more<br />
than two hundred research papers <strong>in</strong> <strong>in</strong>ternational journals and<br />
conferences <strong>in</strong> his areas of expertise. Dr. Elleithy is the cochair<br />
of the International Jo<strong>in</strong>t Conferences on Computer,<br />
Information, and Systems Sciences, and Eng<strong>in</strong>eer<strong>in</strong>g (CISSE).<br />
CISSE is the first Eng<strong>in</strong>eer<strong>in</strong>g/Comput<strong>in</strong>g and Systems<br />
Research E-Conference <strong>in</strong> the world to be completely<br />
conducted onl<strong>in</strong>e <strong>in</strong> real-time via the <strong>in</strong>ternet and was<br />
successfully runn<strong>in</strong>g for six years. Dr. Elleithy is the editor or<br />
co-editor of 12 books published by Spr<strong>in</strong>ger for advances on<br />
Innovations and Advanced Techniques <strong>in</strong> Systems, Comput<strong>in</strong>g<br />
Sciences and Software.<br />
Dr. Miad Faezipour is an Assistant Professor <strong>in</strong> the<br />
Computer Science and Eng<strong>in</strong>eer<strong>in</strong>g program at the University<br />
of Bridgeport and the director of the Digital/Biomedical<br />
Embedded Systems & Technology (D-BEST) Lab s<strong>in</strong>ce July<br />
2011. Prior to jo<strong>in</strong><strong>in</strong>g UB, she has been a Post-Doctoral<br />
Research Associate at the University of Texas at Dallas<br />
collaborat<strong>in</strong>g with the Center for Integrated Circuits and<br />
Systems and the Quality of Life Technology laboratories. She<br />
received the B.Sc. <strong>in</strong> Electrical Eng<strong>in</strong>eer<strong>in</strong>g from the<br />
University of Tehran, Tehran, Iran and the M.Sc. and Ph.D. <strong>in</strong><br />
Electrical Eng<strong>in</strong>eer<strong>in</strong>g from the University of Texas at Dallas.<br />
Her research <strong>in</strong>terests lie <strong>in</strong> the broad area of biomedical<br />
signal process<strong>in</strong>g and behavior analysis techniques, highspeed<br />
packet process<strong>in</strong>g architectures, and digital/embedded<br />
systems. Dr. Faezipour is a member of IEEE, EMBS and IEEE<br />
women <strong>in</strong> eng<strong>in</strong>eer<strong>in</strong>g.