03.03.2015 Views

Steganography in Arabic Text Using Kashida ... - ResearchGate

Steganography in Arabic Text Using Kashida ... - ResearchGate

Steganography in Arabic Text Using Kashida ... - ResearchGate

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

[11] K. Bennett, "L<strong>in</strong>guistic steganography: Survey,<br />

analysis, and robustness concerns for hid<strong>in</strong>g<br />

<strong>in</strong>formation <strong>in</strong> text," CERIAS Tech Report p. 28,<br />

2004.<br />

[12] L. Yul<strong>in</strong>g, S. X<strong>in</strong>gm<strong>in</strong>g, G. Can, and W. Hong, "An<br />

efficient l<strong>in</strong>guistic steganography for Ch<strong>in</strong>ese text,"<br />

<strong>in</strong> IEEE International Conference on Multimedia and<br />

Expo, 2007, pp. 2094-2097.<br />

[13] S. H. Low, N. F. Maxemchuk, J. Brassil, and L.<br />

O'Gorman, "Document mark<strong>in</strong>g and identification<br />

us<strong>in</strong>g both l<strong>in</strong>e and word shift<strong>in</strong>g," <strong>in</strong> Proceed<strong>in</strong>gs of<br />

the Fourteenth Annual Jo<strong>in</strong>t Conference of the IEEE<br />

Computer and Communications Societies. Br<strong>in</strong>g<strong>in</strong>g<br />

Information to People, IEEE INFOCOM'9., 1995, pp.<br />

853-860.<br />

[14] W. Bender, D. Gruhl, N. Morimoto, and A. Lu,<br />

"Techniques for data hid<strong>in</strong>g," IBM systems journal,<br />

vol. 35, pp. 313-336, 1996.<br />

[15] Z. H. Wang, C. C. Chang, and M. C. Li, "Emoticonbased<br />

text steganography <strong>in</strong> chat," <strong>in</strong> Asia-Pacific<br />

Conference on Computational Intelligence and<br />

Industrial Applications, 2009. PACIIA, 2009, pp.<br />

457-460.<br />

[16] M. L. Bensaad and M. B. Yagoubi, "High capacity<br />

diacritics-based method for <strong>in</strong>formation hid<strong>in</strong>g <strong>in</strong><br />

<strong>Arabic</strong> text," <strong>in</strong> International Conference on<br />

Innovations <strong>in</strong> Information Technology (IIT), 2011,<br />

pp. 433-436.<br />

[17] M. A. Aabed, S. M. Awaideh, A. R. M. Elshafei, and<br />

A. A. Gutub, "<strong>Arabic</strong> diacritics based<br />

steganography," <strong>in</strong> IEEE International Conference on<br />

Signal Process<strong>in</strong>g and Communications, ICSPC,<br />

2007, pp. 756-759.<br />

[18] M. H. Shirali-Shahreza and M. Shirali-Shahreza, "A<br />

new approach to Persian/<strong>Arabic</strong> text steganography,"<br />

<strong>in</strong> 1st and 5th IEEE/ACIS International Workshop on<br />

Component-Based Software Eng<strong>in</strong>eer<strong>in</strong>g, Software<br />

Architecture and Reuse Computer and Information<br />

Science, ICIS-COMSAR and IEEE/ACIS, 2006, pp.<br />

310-315.<br />

[19] A. Odeh, A. Alzubi, Q. B. Hani, and K. Elleithy,<br />

"<strong>Steganography</strong> by multipo<strong>in</strong>t <strong>Arabic</strong> letters," <strong>in</strong><br />

IEEE Long Island Systems, Applications and<br />

Technology Conference (LISAT), 2012, pp. 1-7.<br />

[20] A. Azmi and A. Alsaiari, "<strong>Arabic</strong> Typography: A<br />

Survey," International Journal of Electrical &<br />

Computer Sciences, vol. 9, pp. 16-22, 2010.<br />

[21] M. Turner, "The world’s most widely spoken<br />

languages," ed: St. Ignatius High School. URL:<br />

http://www2.ignatius.edu/faculty/turner/languages.<br />

htm [viewed December 10, 2003], 2003.<br />

Ammar Odeh is a PhD. Student <strong>in</strong> University of Bridgeport.<br />

He earned the M.S. degree <strong>in</strong> Computer Science College of<br />

K<strong>in</strong>g Abdullah II School for Information Technology<br />

(KASIT) at the University of Jordan <strong>in</strong> Dec. 2005 and the<br />

B.Sc. <strong>in</strong> Computer Science from the Hashemite University. He<br />

has worked as a Lab Supervisor <strong>in</strong> Philadelphia University<br />

(Jordan) and Lecturer <strong>in</strong> Philadelphia University for the ICDL<br />

Courses and as technical support for onl<strong>in</strong>e exam<strong>in</strong>ations for<br />

two years. He served as a Lecturer at the IT, (ACS,CIS ,CS)<br />

Department of Philadelphia University <strong>in</strong> Jordan, and also<br />

worked at the M<strong>in</strong>istry of Higher Education (Oman, Sur<br />

College of Applied Science) for two years. Ammar jo<strong>in</strong>ed the<br />

University of Bridgeport as a PhD student of Computer<br />

Science and Eng<strong>in</strong>eer<strong>in</strong>g <strong>in</strong> August 2011. His area of<br />

concentration is reverse software eng<strong>in</strong>eer<strong>in</strong>g, computer<br />

security, and wireless networks. Specifically, he is work<strong>in</strong>g on<br />

the enhancement of computer security for data transmission<br />

over wireless networks. He is also actively <strong>in</strong>volved <strong>in</strong><br />

academic community, outreach activities and student<br />

recruit<strong>in</strong>g and advis<strong>in</strong>g.<br />

Dr. Khaled Elleithy is the Associate Dean for Graduate<br />

Studies <strong>in</strong> the School of Eng<strong>in</strong>eer<strong>in</strong>g at the University of<br />

Bridgeport. He has research <strong>in</strong>terests are <strong>in</strong> the areas of<br />

network security, mobile communications, and formal<br />

approaches for design and verification. He has published more<br />

than two hundred research papers <strong>in</strong> <strong>in</strong>ternational journals and<br />

conferences <strong>in</strong> his areas of expertise. Dr. Elleithy is the cochair<br />

of the International Jo<strong>in</strong>t Conferences on Computer,<br />

Information, and Systems Sciences, and Eng<strong>in</strong>eer<strong>in</strong>g (CISSE).<br />

CISSE is the first Eng<strong>in</strong>eer<strong>in</strong>g/Comput<strong>in</strong>g and Systems<br />

Research E-Conference <strong>in</strong> the world to be completely<br />

conducted onl<strong>in</strong>e <strong>in</strong> real-time via the <strong>in</strong>ternet and was<br />

successfully runn<strong>in</strong>g for six years. Dr. Elleithy is the editor or<br />

co-editor of 12 books published by Spr<strong>in</strong>ger for advances on<br />

Innovations and Advanced Techniques <strong>in</strong> Systems, Comput<strong>in</strong>g<br />

Sciences and Software.<br />

Dr. Miad Faezipour is an Assistant Professor <strong>in</strong> the<br />

Computer Science and Eng<strong>in</strong>eer<strong>in</strong>g program at the University<br />

of Bridgeport and the director of the Digital/Biomedical<br />

Embedded Systems & Technology (D-BEST) Lab s<strong>in</strong>ce July<br />

2011. Prior to jo<strong>in</strong><strong>in</strong>g UB, she has been a Post-Doctoral<br />

Research Associate at the University of Texas at Dallas<br />

collaborat<strong>in</strong>g with the Center for Integrated Circuits and<br />

Systems and the Quality of Life Technology laboratories. She<br />

received the B.Sc. <strong>in</strong> Electrical Eng<strong>in</strong>eer<strong>in</strong>g from the<br />

University of Tehran, Tehran, Iran and the M.Sc. and Ph.D. <strong>in</strong><br />

Electrical Eng<strong>in</strong>eer<strong>in</strong>g from the University of Texas at Dallas.<br />

Her research <strong>in</strong>terests lie <strong>in</strong> the broad area of biomedical<br />

signal process<strong>in</strong>g and behavior analysis techniques, highspeed<br />

packet process<strong>in</strong>g architectures, and digital/embedded<br />

systems. Dr. Faezipour is a member of IEEE, EMBS and IEEE<br />

women <strong>in</strong> eng<strong>in</strong>eer<strong>in</strong>g.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!