Hiding Negative of an Image using Steganography Even Odd Algorithm for Security Purposes
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 1
Abstract
with the advancement of technology, the threats dealt by user have increased exponentially. Hence security of data is required during storage and transmission of data. Image Steganography is best popular techniques now a day. The Image hiding in cover image gives us a choice to hide different planes of image in different planes of cover image. In this paper, Negative of original image is hidden in cover image for security purposes. In our implementation pixels of negative image to be substituted in cover image pixels. In our paperEven Odd algorithm is proposed for hiding image in cover image using existing modified LSB algorithm.
Authors and Affiliations
Ajay Kumar
Study of Web Crawler and its Different Types
Due to the current size of the Web and its dynamic nature, building an efficient search mechanism is very important. A vast number of web pages are continually being added every day, and information is constant...
Documentaries use for the design of learning activities
Documentaries used in the training field constitute the rich sources of information. They have the advantage to associate the elements of knowledge with events which request the episodic memory of the learn...
Design and Development of an Integrated Platform for GSM, Web and Speech Based Device Controlling System
Abstract: In this modern era, as information technology is growing so far from the computing to communication, home automation is becoming a crucial area in research. In this proposed work, focus has been given on the de...
Recapitulating the development initiatives of a robust information security safeguard: RITSB-the proposed solution
Most current information security systems performance vary with the nature of the filed its being operating. With an increased emphasizes on the adoption of security tools and technologies, the anomalies and &nb...
A novel algorithm to protect and manage memory locations
Abstract: Most of security vulnerabilities continue to be caused by memory errors, and long-running programsthat interact with untrusted components. While comprehensive solutions have been developed to handle memor...