{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T11:28:43Z","timestamp":1764588523097,"version":"3.40.2"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2024,4,4]],"date-time":"2024-04-04T00:00:00Z","timestamp":1712188800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,4,4]],"date-time":"2024-04-04T00:00:00Z","timestamp":1712188800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-024-18946-x","type":"journal-article","created":{"date-parts":[[2024,4,4]],"date-time":"2024-04-04T05:01:56Z","timestamp":1712206916000},"page":"5457-5490","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Regulating Kashida Arabic steganography to improve security and capacity performance"],"prefix":"10.1007","volume":"84","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0923-202X","authenticated-orcid":false,"given":"Adnan","family":"Gutub","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,4]]},"reference":[{"issue":"9","key":"18946_CR1","doi-asserted-by":"publisher","first-page":"8869","DOI":"10.1007\/s13369-021-05605-8","volume":"46","author":"N Alanazi","year":"2021","unstructured":"Alanazi N et al (2021) Involving spaces of Unicode standard within irreversible arabic text steganography for practical implementations. Arab J Sci Eng (AJSE) 46(9):8869\u20138885. https:\/\/doi.org\/10.1007\/s13369-021-05605-8","journal-title":"Arab J Sci Eng (AJSE)"},{"issue":"4","key":"18946_CR2","doi-asserted-by":"publisher","first-page":"2433","DOI":"10.1007\/s13369-019-04010-6","volume":"45","author":"A Gutub","year":"2020","unstructured":"Gutub A, Alaseri K (2020) Hiding shares of counting-based secret sharing via Arabic text steganography for personal usage. Arab J Sci Eng (AJSE) 45(4):2433\u20132458. https:\/\/doi.org\/10.1007\/s13369-019-04010-6","journal-title":"Arab J Sci Eng (AJSE)"},{"doi-asserted-by":"publisher","unstructured":"AlJarf A et al (2024) Is blind image steganalysis practical using feature-based classification?. Multimed Tools Appl (MTAP) 83(2):4579\u20134612. https:\/\/doi.org\/10.1007\/s11042-023-15682-6","key":"18946_CR3","DOI":"10.1007\/s11042-023-15682-6"},{"issue":"30","key":"18946_CR4","doi-asserted-by":"publisher","first-page":"46577","DOI":"10.1007\/s11042-023-15586-5","volume":"82","author":"A Gutub","year":"2023","unstructured":"Gutub A, Kheshaifaty N (2023) Practicality analysis of utilizing text-based CAPTCHA vs. graphic-based CAPTCHA authentication. Multimed Tools Appl (MTAP) 82(30):46577\u201346609. https:\/\/doi.org\/10.1007\/s11042-023-15586-5","journal-title":"Multimed Tools Appl (MTAP)"},{"issue":"11","key":"18946_CR5","doi-asserted-by":"publisher","first-page":"10209","DOI":"10.1007\/s12652-020-02789-z","volume":"12","author":"S Altalhi","year":"2021","unstructured":"Altalhi S et al (2021) A survey on predictions of cyber-attacks utilizing real-time twitter tracing recognition. J Ambient Intell Humaniz Comput 12(11):10209\u201310221. https:\/\/doi.org\/10.1007\/s12652-020-02789-z","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"2","key":"18946_CR6","doi-asserted-by":"publisher","first-page":"2455","DOI":"10.1007\/s13369-022-07250-1","volume":"48","author":"F Sufi","year":"2023","unstructured":"Sufi F et al (2023) Automating global threat-maps generation via advancements of news sensors and AI. Arab J Sci Eng (AJSE) 48(2):2455\u20132472. https:\/\/doi.org\/10.1007\/s13369-022-07250-1","journal-title":"Arab J Sci Eng (AJSE)"},{"issue":"3A","key":"18946_CR7","doi-asserted-by":"publisher","first-page":"100","DOI":"10.36909\/jer.18943","volume":"11","author":"A Gutub","year":"2023","unstructured":"Gutub A, Almehmadi E (2023) Arabic text watermarking tuned for medical e-record semi-authentication. J Eng Res (JER) 11(3A):100\u2013111. https:\/\/doi.org\/10.36909\/jer.18943","journal-title":"J Eng Res (JER)"},{"issue":"2","key":"18946_CR8","doi-asserted-by":"publisher","first-page":"2585","DOI":"10.1007\/s13369-021-06200-7","volume":"47","author":"E Almehmadi","year":"2022","unstructured":"Almehmadi E et al (2022) Novel arabic e-text watermarking supporting partial dishonesty based on counting-based secret sharing. Arab J Sci Eng (AJSE) 47(2):2585\u20132609. https:\/\/doi.org\/10.1007\/s13369-021-06200-7","journal-title":"Arab J Sci Eng (AJSE)"},{"key":"18946_CR9","doi-asserted-by":"publisher","first-page":"32633","DOI":"10.1007\/s11042-018-6801-z","volume":"78","author":"N Alassaf","year":"2019","unstructured":"Alassaf N et al (2019) Enhancing speed of SIMON: a light-weight-cryptographic algorithm for IoT Applications. Multimed Tools Appl (MTAP) 78:32633\u201332657. https:\/\/doi.org\/10.1007\/s11042-018-6801-z","journal-title":"Multimed Tools Appl (MTAP)"},{"issue":"14","key":"18946_CR10","doi-asserted-by":"publisher","first-page":"21243","DOI":"10.1007\/s11042-022-14006-4","volume":"82","author":"A Singh","year":"2023","unstructured":"Singh A et al (2023) Redefining food safety traceability system through blockchain: findings, challenges and open issues. Multimed Tools Appl (MTAP) 82(14):21243\u201321277. https:\/\/doi.org\/10.1007\/s11042-022-14006-4","journal-title":"Multimed Tools Appl (MTAP)"},{"key":"18946_CR11","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1007\/s42979-020-00438-y","volume":"2","author":"M Alkhudaydi","year":"2021","unstructured":"Alkhudaydi M et al (2021) Securing data via cryptography and arabic text steganography. SN Comput Sci 2:46. https:\/\/doi.org\/10.1007\/s42979-020-00438-y","journal-title":"SN Comput Sci"},{"issue":"21","key":"18946_CR12","doi-asserted-by":"publisher","first-page":"30663","DOI":"10.1007\/s11042-022-13015-7","volume":"81","author":"AK Sahu","year":"2022","unstructured":"Sahu AK et al (2022) Improving grayscale steganography to protect personal information disclosure within hotel services. Multimed Tools Appl (MTAP) 81(21):30663\u201330683. https:\/\/doi.org\/10.1007\/s11042-022-13015-7","journal-title":"Multimed Tools Appl (MTAP)"},{"issue":"18","key":"18946_CR13","doi-asserted-by":"publisher","first-page":"28521","DOI":"10.1007\/s11042-021-11051-3","volume":"80","author":"B Al-Roithy","year":"2021","unstructured":"Al-Roithy B et al (2021) Remodeling randomness prioritization to Boost-Up Security of RGB image encryption. Multimedia Tools Appl (MTAP) 80(18):28521\u201328581. https:\/\/doi.org\/10.1007\/s11042-021-11051-3","journal-title":"Multimedia Tools Appl (MTAP)"},{"issue":"39","key":"18946_CR14","doi-asserted-by":"publisher","first-page":"30087","DOI":"10.1007\/s11042-020-09513-1","volume":"79","author":"F Hassan","year":"2020","unstructured":"Hassan F et al (2020) Efficient reversible data hiding multimedia technique based on smart image interpolation. Multimedia Tools and Applications (MTAP) 79(39):30087\u201330109. https:\/\/doi.org\/10.1007\/s11042-020-09513-1","journal-title":"Multimedia Tools and Applications (MTAP)"},{"issue":"12","key":"18946_CR15","doi-asserted-by":"publisher","first-page":"16283","DOI":"10.1007\/s11042-018-6977-2","volume":"78","author":"M Al-Ghamdi","year":"2019","unstructured":"Al-Ghamdi M et al (2019) Security enhancement of shares generation process for multimedia counting-based secret-sharing technique. Multimedia Tools Appl (MTAP) 78(12):16283\u201316310. https:\/\/doi.org\/10.1007\/s11042-018-6977-2","journal-title":"Multimedia Tools Appl (MTAP)"},{"unstructured":"Gutub A, Al-Alwani W, Bin-Mahfoodh A (2010) Improved method of arabic text steganography using the extension \u2018Kashida\u2019 character. Bahria Univ J Inform Communication Technol (BUJICT) 3(1):68\u201372. http:\/\/ojs.bahria.edu.pk\/index.php\/bujict\/article\/view\/33","key":"18946_CR16"},{"key":"18946_CR17","doi-asserted-by":"publisher","first-page":"65439","DOI":"10.1109\/ACCESS.2022.3182712","volume":"10","author":"R Thabit","year":"2022","unstructured":"Thabit R et al (2022) CSNTSteg: Color Spacing normalization text Steganography model to improve capacity and invisibility of hidden data. IEEE Access 10:65439\u201365458. https:\/\/doi.org\/10.1109\/ACCESS.2022.3182712","journal-title":"IEEE Access"},{"unstructured":"Dmitri V (2007) Digital security and privacy for human rights defenders. The International Foundation for Human Right Defenders, Feb. 2007, Manual, European Union, Ireland. https:\/\/aarhusclearinghouse.unece.org\/resources\/digital-security-and-privacy-human-rights-defenders","key":"18946_CR18"},{"issue":"4","key":"18946_CR19","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1016\/j.eij.2022.10.003","volume":"23","author":"NA Roslan","year":"2022","unstructured":"Roslan NA et al (2022) Systematic literature review and analysis for arabic text steganography method practically. Egypt Inf J 23(4):177\u2013191. https:\/\/doi.org\/10.1016\/j.eij.2022.10.003","journal-title":"Egypt Inf J"},{"doi-asserted-by":"crossref","unstructured":"Shirali-Shahreza MH, Shirali-Shahreza M (2006) A new approach to Persian\/Arabic text steganography. IEEE\/ACIS International Conference on Computer and Information Science, Honolulu, pp 310\u2013315","key":"18946_CR20","DOI":"10.1109\/ICIS-COMSAR.2006.10"},{"doi-asserted-by":"publisher","unstructured":"Aabed M et al (2007) Arabic diacritics based steganography. IEEE International Conference on Signal Processing and Communications (ICSPC), Dubai, UAE, pp 756\u2013759. https:\/\/doi.org\/10.1109\/ICSPC.2007.4728429","key":"18946_CR21","DOI":"10.1109\/ICSPC.2007.4728429"},{"issue":"3","key":"18946_CR22","doi-asserted-by":"publisher","first-page":"502","DOI":"10.5281\/zenodo.1061621","volume":"1","author":"A Gutub","year":"2007","unstructured":"Gutub A, Fattani M (2007) A novel arabic text steganography method using letter points and extensions. Int J Comput Electr Autom Control Inform Eng 1(3):502\u2013505. https:\/\/doi.org\/10.5281\/zenodo.1061621","journal-title":"Int J Comput Electr Autom Control Inform Eng"},{"issue":"8","key":"18946_CR23","doi-asserted-by":"publisher","first-page":"963","DOI":"10.1016\/j.jksuci.2019.06.010","volume":"33","author":"S Al-Nofaie","year":"2021","unstructured":"Al-Nofaie S et al (2021) Enhancing arabic text steganography for personal usage utilizing pseudo-spaces. J King Saud Univ - Comput Inform Sci 33(8):963\u2013974. https:\/\/doi.org\/10.1016\/j.jksuci.2019.06.010","journal-title":"J King Saud Univ - Comput Inform Sci"},{"issue":"12","key":"18946_CR24","doi-asserted-by":"publisher","first-page":"11037","DOI":"10.1007\/s13369-020-04917-5","volume":"45","author":"N Alanazi","year":"2020","unstructured":"Alanazi N et al (2020) Functionality-improved arabic text steganography based on Unicode features. Arab J Sci Eng (AJSE) 45(12):11037\u201311050. https:\/\/doi.org\/10.1007\/s13369-020-04917-5","journal-title":"Arab J Sci Eng (AJSE)"},{"issue":"1","key":"18946_CR25","doi-asserted-by":"publisher","first-page":"13","DOI":"10.26735\/FMIT1649","volume":"3","author":"M Alkhudaydi","year":"2020","unstructured":"Alkhudaydi M et al (2020) Integrating light-weight cryptography with diacritics arabic text steganography improved for practical security applications. J Inform Secur Cybercrimes Res (JISCR) 3(1):13\u201330. https:\/\/doi.org\/10.26735\/FMIT1649","journal-title":"J Inform Secur Cybercrimes Res (JISCR)"},{"issue":"8","key":"18946_CR26","doi-asserted-by":"publisher","first-page":"9963","DOI":"10.1007\/s13369-022-07387-z","volume":"48","author":"A Gutub","year":"2023","unstructured":"Gutub A, Almehmadi E (2023) Advancing partial verification of watermarking for arabic text via utilization of innovative counting-based secret sharing. Arab J Sci Eng (AJSE) 48(8):9963\u20139989. https:\/\/doi.org\/10.1007\/s13369-022-07387-z","journal-title":"Arab J Sci Eng (AJSE)"},{"doi-asserted-by":"publisher","unstructured":"Samphaiboon N, Dailey M (2008) Steganography in thai text. IEEE international conference on electrical engineering\/electronics, computer, Telecommunications and Information Technology, Krabi, Thailand, pp 133\u2013136. https:\/\/doi.org\/10.1109\/ECTICON.2008.4600390","key":"18946_CR27","DOI":"10.1109\/ECTICON.2008.4600390"},{"doi-asserted-by":"crossref","unstructured":"Amano T, Misaki D (1999) A feature calibration method for watermarking of document images. Proceedings of the Fifth International Conference on Document Analysis and Recognition (ICDAR 1999), vol 2. Bangalore, pp 91\u201394","key":"18946_CR28","DOI":"10.1109\/ICDAR.1999.791732"},{"doi-asserted-by":"publisher","unstructured":"Kim YW, Oh IS (2004) Watermarking text document images using Edge Direction histograms. Pattern Recognit Lett 25:1243\u20131251. https:\/\/doi.org\/10.1016\/j.patrec.2004.04.002","key":"18946_CR29","DOI":"10.1016\/j.patrec.2004.04.002"},{"unstructured":"Alghamdi M, Muzaffar Z (2007) KACST Arabic diacritizer. First International Symposium on Computers and Arabic Language. Citeseer, KACST, Riyadh, Saudi Arabia, pp 25\u201328","key":"18946_CR30"},{"doi-asserted-by":"publisher","unstructured":"Gutub A et al (2007) Utilizing extension character \u2018Kashida\u2019 with pointed letters for Arabic text digital watermarking. International Conference on Security and Cryptography (SECRYPT), pp 329\u2013332, Barcelona, Spain. https:\/\/doi.org\/10.5220\/0002116903290332","key":"18946_CR31","DOI":"10.5220\/0002116903290332"},{"key":"18946_CR32","doi-asserted-by":"publisher","first-page":"1403","DOI":"10.1007\/s11042-020-09667-y","volume":"80","author":"N Alanazi","year":"2021","unstructured":"Alanazi N et al (2021) Efficient security and capacity techniques for arabic text steganography via engaging Unicode standard encoding. Multimedia Tools Appl (MTAP) 80:1403\u20131431. https:\/\/doi.org\/10.1007\/s11042-020-09667-y","journal-title":"Multimedia Tools Appl (MTAP)"},{"issue":"1","key":"18946_CR33","first-page":"165","volume":"31","author":"G Abandah","year":"2004","unstructured":"Abandah G, Khundakjie F (2004) Issues concerning code system for arabic letters. Dirasat Eng Sci J 31(1):165\u2013177","journal-title":"Dirasat Eng Sci J"},{"issue":"4","key":"18946_CR34","doi-asserted-by":"publisher","first-page":"1343","DOI":"10.1016\/j.jksuci.2020.04.011","volume":"34","author":"N Alanazi","year":"2022","unstructured":"Alanazi N et al (2022) Inclusion of Unicode standard seamless characters to expand arabic text steganography for secure individual uses. J King Saud Univ - Comput Inform Sci 34(4):1343\u20131356. https:\/\/doi.org\/10.1016\/j.jksuci.2020.04.011","journal-title":"J King Saud Univ - Comput Inform Sci"},{"issue":"1","key":"18946_CR35","doi-asserted-by":"publisher","first-page":"42","DOI":"10.18178\/lnit.3.1.42-47","volume":"3","author":"E Ahmadoh","year":"2015","unstructured":"Ahmadoh E et al (2015) Utilization of two diacritics for arabic text steganography to enhance performance. Lecture Notes Inform Theory 3(1):42\u201347. https:\/\/doi.org\/10.18178\/lnit.3.1.42-47","journal-title":"Lecture Notes Inform Theory"},{"key":"18946_CR36","doi-asserted-by":"publisher","first-page":"830","DOI":"10.1007\/s42452-019-0875-8","volume":"1","author":"N Al-Juaid","year":"2019","unstructured":"Al-Juaid N et al (2019) Combining RSA and audio steganography on personal computers for enhancing security. SN Appl Sci 1:830. https:\/\/doi.org\/10.1007\/s42452-019-0875-8","journal-title":"SN Appl Sci"},{"issue":"9","key":"18946_CR37","doi-asserted-by":"publisher","first-page":"1108","DOI":"10.1016\/j.jksuci.2019.06.014","volume":"33","author":"A Gutub","year":"2021","unstructured":"Gutub A, Alaseri K (2021) Refining arabic text stego-techniques for shares memorization of counting-based secret sharing. J King Saud Univ - Comput Inform Sci 33(9):1108\u20131120. https:\/\/doi.org\/10.1016\/j.jksuci.2019.06.014","journal-title":"J King Saud Univ - Comput Inform Sci"},{"key":"18946_CR38","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/s11042-019-08025-x","volume":"79","author":"S Al-Nofaie","year":"2020","unstructured":"Al-Nofaie S et al (2020) Utilizing pseudo-spaces to improve arabic text steganography for multimedia data communications. Multimedia Tools Appl 79:19\u201367. https:\/\/doi.org\/10.1007\/s11042-019-08025-x","journal-title":"Multimedia Tools Appl"},{"key":"18946_CR39","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1147\/sj.353.0313","volume":"35","author":"W Bender","year":"1996","unstructured":"Bender W et al (1996) Techniques for data hiding. IBM Syst J 35:313\u2013336","journal-title":"IBM Syst J"},{"doi-asserted-by":"crossref","unstructured":"Alotaibi R, Elrefaei L (2016) Utilizing word space with pointed and un-pointed letters for Arabic text watermarking. IEEE UK Sim-AMSS 18th International Conference on Computer Modelling and Simulation (UKSim), Cambridge, UK, pp 111\u2013116","key":"18946_CR40","DOI":"10.1109\/UKSim.2016.34"},{"doi-asserted-by":"publisher","unstructured":"Alotaibi R, Elrefaei L (2018) Improved capacity Arabic text watermarking methods based on open word space. J King Saud Univ \u2013 Comput Inf Sci 30(2):236\u2013248. https:\/\/doi.org\/10.1016\/j.jksuci.2016.12.007","key":"18946_CR41","DOI":"10.1016\/j.jksuci.2016.12.007"},{"doi-asserted-by":"publisher","unstructured":"Al-Nofaie S et al (2016) Merging two steganography techniques adjusted to improve arabic text data security. J Comput Sci Comput Math (JCSCM) 6(3):59\u201365. https:\/\/doi.org\/10.20967\/jcscm.2016.03.004","key":"18946_CR42","DOI":"10.20967\/jcscm.2016.03.004"},{"doi-asserted-by":"publisher","unstructured":"Gutub A (2024) Emerging Arabic text watermarking utilizing combinations of different diacritics. Arab J Sci Eng (AJSE). https:\/\/doi.org\/10.1007\/s13369-023-08629-4","key":"18946_CR43","DOI":"10.1007\/s13369-023-08629-4"},{"doi-asserted-by":"publisher","unstructured":"Saeidi Z et al (2024) High performance image steganography integrating IWT and hamming code within secret sharing. IET Image Process 18(1):129\u2013139. https:\/\/doi.org\/10.1049\/ipr2.12938","key":"18946_CR44","DOI":"10.1049\/ipr2.12938"},{"doi-asserted-by":"publisher","unstructured":"Gutub A (2024) Adjusting counting-based secret-sharing via personalized passwords and email-authentic reliability. J Eng Res (JER). https:\/\/doi.org\/10.1016\/j.jer.2023.09.014","key":"18946_CR45","DOI":"10.1016\/j.jer.2023.09.014"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-18946-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-024-18946-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-18946-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,23]],"date-time":"2025-03-23T00:24:28Z","timestamp":1742689468000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-024-18946-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,4]]},"references-count":45,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2025,3]]}},"alternative-id":["18946"],"URL":"https:\/\/doi.org\/10.1007\/s11042-024-18946-x","relation":{},"ISSN":["1573-7721"],"issn-type":[{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2024,4,4]]},"assertion":[{"value":"4 December 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 February 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 March 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 April 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This work is original and not considered in other publication media.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Agreement"}},{"value":"This article does not contain any studies with human participants or animals.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"The authors declare that they have no conflict of interest.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}