ارسل ملاحظاتك

ارسل ملاحظاتك لنا







A Novel Steganography Method Using Transliteration Of Bengali Text

المصدر: مجلة جامعة الملك سعود - علوم الحاسب والمعلومات
الناشر: جامعة الملك سعود
المؤلف الرئيسي: Khairullah, Md (Author)
المجلد/العدد: مج31, ع3
محكمة: نعم
الدولة: السعودية
التاريخ الميلادي: 2019
الصفحات: 348 - 366
DOI: 10.33948/0584-031-003-008
ISSN: 1319-1578
رقم MD: 974695
نوع المحتوى: بحوث ومقالات
اللغة: الإنجليزية
قواعد المعلومات: science
مواضيع:
كلمات المؤلف المفتاحية:
Steganography | Transliteration | Phonetic Keyboard | Capacity | Steganalysis | SVM
رابط المحتوى:
صورة الغلاف QR قانون
حفظ في:
LEADER 02452nam a22002297a 4500
001 1717418
024 |3 10.33948/0584-031-003-008 
041 |a eng 
044 |b السعودية 
100 |9 525874  |a Khairullah, Md  |e Author 
245 |a A Novel Steganography Method Using Transliteration Of Bengali Text 
260 |b جامعة الملك سعود  |c 2019 
300 |a 348 - 366 
336 |a بحوث ومقالات  |b Article 
520 |b In this paper, we present a simple and novel approach for steganography through transliteration. A phonetic keyboard layout is very popular for writing languages having non-roman alphabets. Bengali, a language spoken by 230 million people, is a fair example and in this work we utilize Bengali digital text for data hiding by the proposed technique. For several characters in the Bengali alphabet, there are multiple options to represent a character in it’s equivalent roman form using a phonetic keyboard layout. The main idea of the proposed method is to exploit this special feature of Bengali phonetic keyboard layouts to hide secret information in form of bits. One of these options can be used to represent the bit ‘0’ and the other option can represent the bit ‘1’ in a document without any risk of understanding by any intermediate user. The results show that the proposed method is very prominent to be a successful steganography technique. Steganalysis results show that the capacity of the method is 1.2%, which is adequate for a text steganography system with very low risk of machine detection. This method can be easily adapted and applied for any other language having non-roman alphabet. ©2018 The Author. Production and hosting by Elsevier B.V. on behalf of King Saud University. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/). 
653 |a أمن المعلومات  |a التشفير  |a الحروف الهجائية  |a اللغة البنغالية 
692 |b Steganography  |b Transliteration  |b Phonetic Keyboard  |b Capacity  |b Steganalysis  |b SVM 
773 |c 008  |e Journal of King Saud University (Computer and Information Sciences)  |f Maǧalaẗ ǧamʼaẗ al-malīk Saud : ùlm al-ḥasib wa al-maʼlumat  |l 003  |m مج31, ع3  |o 0584  |s مجلة جامعة الملك سعود - علوم الحاسب والمعلومات  |v 031  |x 1319-1578 
856 |u 0584-031-003-008.pdf 
930 |d y  |p y 
995 |a science 
999 |c 974695  |d 974695 

عناصر مشابهة