Hiding Negative of an Image using Steganography Even Odd Algorithm for Security Purposes

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 1

Abstract

 with the advancement of technology, the threats dealt by user have increased exponentially. Hence security of data is required during storage and transmission of data. Image Steganography is best popular techniques now a day. The Image hiding in cover image gives us a choice to hide different planes of image in different planes of cover image. In this paper, Negative of original image is hidden in cover image for security purposes. In our implementation pixels of negative image to be substituted in cover image pixels. In our paperEven Odd algorithm is proposed for hiding image in cover image using existing modified LSB algorithm.

Authors and Affiliations

Ajay Kumar

Keywords

Related Articles

Enhancing Security and Fine-Grained Access Control for Personal Health Record in Cloud Computing

Now a days , personal health record become patient-centric model in which PHR service allows a patient to manage and control personal health data in one place through the web, which has made the storage, retrieval and sh...

 Uncompressed Image Steganography using BPCS: Survey and  Analysis

 Steganography is the art and science of hide secret information in some carrier data without leaving any apparent evidence of data alternation. In the past, people use hidden tattoos, invisible ink or punching on...

Microcontroller-Based Remote Temperature Monitoring System

Abstract: There is increase in death rate in hospitals due to inadequate attention to the patients, insufficient number of doctors as well as poor state of equipment make it difficult for the patients to receive proper...

A Brief Survey on Privacy Preserving Techniques in Data Mining

Abstract: Data mining is a process of extracting the required information from large datasets. Privacy preserving data mining deals with hiding a person’s sensitive identity without losing the usability of data. Sensitiv...

 Software Defined Networking (SDN): A Revolution in Computer  Network

 SDN creates a dynamic and flexible network architecture that can change as the business requirements change. The growth of the SDN market and cloud computing are very much connected. As the  applications cha...

Download PDF file
  • EP ID EP146978
  • DOI -
  • Views 109
  • Downloads 0

How To Cite

Ajay Kumar (2014).  Hiding Negative of an Image using Steganography Even Odd Algorithm for Security Purposes. IOSR Journals (IOSR Journal of Computer Engineering), 16(1), 70-75. https://europub.co.uk/articles/-A-146978