A Comparative Study on Steganography Digital Images: A Case Study of Scalable Vector Graphics (SVG) and Portable Network Graphics (PNG) Images Formats
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2018, Vol 9, Issue 1
Abstract
Today image steganography plays a key role for exchanging a secret data through the internet. However, the optimal choice of images formats for processing steganography is still an open issue; therefore, this research comes into a table. This research conducts a comparative study between Scalable Vector Graphics (SVG) image format and Portable Network Graphics (PNG) image format. As results show, SVG image format is more efficient than PNG image format in terms of capacity and scalability before and after processing steganography. As well, SVG image format helps to increase simplicity and performance for processing steganography, since it is an XML text file. Our comparative study provides significant results between SVG and PNG images, which have not been seen in the previous related studies.
Authors and Affiliations
Abdulgader Almutairi
Feature Selection Based on Minimum Overlap Probability (MOP) in Identifying Beef and Pork
Feature selection is one of the most important techniques in image processing for classifying. In classifying beef and pork based on texture feature, feature overlaps are difficult issues. This paper proposed feature sel...
Bioinspired Immune System for Intrusions Detection System in Self Configurable Networks
In the last couple of years, the computer frameworks have become more vulnerable to external attacks. The PC security has become the prime cause of concern for every organization. To achieve this objective Intrusion Dete...
Enhancing Business Intelligence in a Smarter Computing Environment through Cost Analysis
The paper aims at improving Business Intelligence in a Smarter Computing Environment through Cost Analysis. Smarter Computing is a new approach to designing IT infrastructures to create new opportunities like...
For an Independent Spell-Checking System from the Arabic Language Vocabulary
In this paper, we propose a new approach for spell-checking errors committed in Arabic language. This approach is almost independent of the used dictionary, of the fact that we introduced the concept of morphological ana...
Improvement of Secret Image Invisibility in Circulation Image with Dyadic Wavelet Based Data Hiding with Run-Length Coded Secret Images of Which Location of Codes are Determined with Random Number
An attempt is made for improvement of secret image invisibility in circulation images with dyadic wavelet based data hiding with run-length coded secret images of which location of codes are determined by random number....