This paper presents a new steganography approach suitable for Arabic texts. It can be classified under steganography feature coding methods. The approach hides secret information bits within the letters benefiting from their inherited points. To note the specific letters holding secret bits, the scheme considers the two features, the existence of the points in the letters and the redundant Arabic extension character. We use the pointed letters with extension to hold the secret bit 'one' and the un-pointed letters with extension to hold 'zero'. This steganography technique is found attractive to other languages having similar texts to Arabic such as Persian and Urdu., {"references":["B. Chen and G.W. Wornell, \"Quantization Index Modulation: A Class of\nProvably Good Methods for Digital Watermarking and Information\nEmbedding,\" IEEE Trans. Information Theory, Vol. 47, No. 4, pp. 1423-\n1443, 2001.","M. Hassan Shirali-Shahreza, Mohammad Shirali-Shahreza, \"A New\nApproach to Persian/Arabic Text Steganography,\" 5th IEEE/ACIS\nInternational Conference on Computer and Information Science (ICISCOMSAR\n06), pp. 310- 315, July 2006.","J.C. Judge, \"Steganography: Past, Present, Future\", SANS white paper,\nhttp://www.sans.org/rr/papers/, November 30, 2001.","R. Chandramouli, and N. Memon, \"Analysis of LSB based image\nsteganography techniques\", Proceedings of the International Conference\non Image Processing, Vol. 3, pp. 1019 - 1022, Oct. 2001.","G. Doërr and J.L. Dugelay, \"A Guide Tour of Video Watermarking\",\nSignal Processing: Image Communication, Vol. 18, No 4, pp. 263-282,\n2003.","K. Gopalan, \"Audio steganography using bit modification\", Proceedings\nof the IEEE International Conference on Acoustics, Speech, and Signal\nProcessing, (ICASSP '03), Vol. 2, pp. 421-424, April 2003.","W. Bender, D. Gruhl, N. Morimoto, and A. Lu, \"Techniques for data\nhiding\", IBM Systems Journal, Vol. 35, No 4, pp. 313-336, 1996.","K. Bennett, \"Linguistic Steganography: Survey, Analysis, and Robustness Concerns for Hiding Information in Text\", Purdue\nUniversity, CERIAS Tech. Report 2004-13, 2004.","S.H. Low, N.F. Maxemchuk, J.T. Brassil, and L. O'Gorman, \"Document\nmarking and identification using both line and word shifting\",\nProceedings of the Fourteenth Annual Joint Conference of the IEEE\nComputer and Communications Societies (INFOCOM '95), April 1995.\n[10] K. Rabah, \"Steganography-The Art of Hiding Data\", Information\nTechnology Journal, vol. 3, Issue 3, pp. 245-269, 2004.\n[11] M. H. Shirali-Shahreza, and S. Shirali-Shahreza, \"A Robust Page\nSegmentation Method for Persian/Arabic Document\", WSEAS\nTransactions on Computers, vol. 4, Issue 11, Nov. 2005, pp. 1692-1698.\n[12] N. Provos and P. Honeyman, \"Hide and Seek: An Introduction to\nSteganography\", IEEE Security & Privacy, pp. 32-44, May/June 2003."]}