Volume 12, Number 2, December 2016 - DOI: http://dx.doi.org/10.21700/ijcis.2016.274


Computing and Information Sciences is a peer reviewed journal that is committed to timely publication of original research, surveying and tutorial contributions on the analysis and development of computing and information science. The journal is designed mainly to serve researchers and developers, dealing with information and computing. Papers that can provide both theoretical analysis, along with carefully designed computational experiments, are particularly welcome. The journal is published 2-3 times per year with distribution to librarians, universities, research centers, researchers in computing, mathematics, and information science. The journal maintains strict refereeing procedures through its editorial policies in order to publish papers of only the highest quality. The refereeing is done by anonymous Reviewers. Often, reviews take four months to six months to obtain, occasionally longer, and it takes an additional several months for the publication process.

DOI: http://dx.doi.org/10.21700/ijcis.2016.129

Comparison of Eight Proposed Security Methods using Linguistic Steganography Text

Hanaa M. Ahmed* email: 110113@uotechnology.edu.iq
Maisa’a A. A. Khodher

Department of Computer Science, Iraq University of Technology, Baghdad, Iraq


*Corresponding author

Received: 30 July 2016
Revised: 12 August 2016
Accepted: 10 September 2016
Published: 25 December 2016

Abstract: This paper compares eight proposed methods using steganography of Arabic language texts for different search algorithms to consider a secret key. All methods use random numbers to generate the secret key. The objectives are to evaluate each method and to select the best method that provides the best solution suitable to hide the Arabic language texts. Secret sharing is the fourth-best method in security, linear regression is the best method for transparency and capacity of secret message hiding, whereas singular value decomposition is the best method in terms of security and robustness, Huffman code provides secret message compression security and transparency, and steganography in Microsoft Word documents uses the protocol in layer one of single–double quote, which is weak in security. Conversely, the random subtraction of two images method is the best algorithm in terms of security, robustness, and capacity, while Kashida and Single–double quote are the best methods for security, transparency, and robustness, steganography of twice secret messages in layer one is the best method for security and robustness. Of all the aforementioned security methods, secret sharing is the best overall security method..

Keywords: Linguistic Steganography; Secret Sharing; Linear Regression, Singular Value, Subtraction Image; Huffman Code; Single–double Quote; Kashida.

  • PDF (524 KB)
  • ZIP (484 KB)



    Prof. Jihad Mohamad Alja'am 
    Email: journal.editor.ijcis@gmail.com

    The Journal Secretary
    Eng. Dana Bandok
    Ontario, Canada 
    Email: sec.ijcis@gmail.com 

    Home Page »