Hiding Negative of an Image using Steganography Even Odd Algorithm for Security Purposes

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 1

Abstract

 with the advancement of technology, the threats dealt by user have increased exponentially. Hence security of data is required during storage and transmission of data. Image Steganography is best popular techniques now a day. The Image hiding in cover image gives us a choice to hide different planes of image in different planes of cover image. In this paper, Negative of original image is hidden in cover image for security purposes. In our implementation pixels of negative image to be substituted in cover image pixels. In our paperEven Odd algorithm is proposed for hiding image in cover image using existing modified LSB algorithm.

Authors and Affiliations

Ajay Kumar

Keywords

Related Articles

 Study of Web Crawler and its Different Types

 Due to the current size of the Web and its dynamic nature, building an efficient search mechanism is very important. A vast number of web pages are continually being added every day, and information is constant...

 Documentaries use for the design of learning activities

 Documentaries used in the training field constitute the rich sources of information. They have the advantage to associate the elements of knowledge with events which request the episodic memory of the  learn...

Design and Development of an Integrated Platform for GSM, Web and Speech Based Device Controlling System

Abstract: In this modern era, as information technology is growing so far from the computing to communication, home automation is becoming a crucial area in research. In this proposed work, focus has been given on the de...

 Recapitulating the development initiatives of a robust information  security safeguard: RITSB-the proposed solution

 Most current information security systems performance vary with the nature of the filed its being operating. With an increased emphasizes on the adoption of security tools and technologies, the anomalies and &nb...

 A novel algorithm to protect and manage memory locations

 Abstract: Most of security vulnerabilities continue to be caused by memory errors, and long-running programsthat interact with untrusted components. While comprehensive solutions have been developed to handle memor...

Download PDF file
  • EP ID EP146978
  • DOI -
  • Views 100
  • Downloads 0

How To Cite

Ajay Kumar (2014).  Hiding Negative of an Image using Steganography Even Odd Algorithm for Security Purposes. IOSR Journals (IOSR Journal of Computer Engineering), 16(1), 70-75. https://europub.co.uk/articles/-A-146978