Hiding Negative of an Image using Steganography Even Odd Algorithm for Security Purposes

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 1

Abstract

 with the advancement of technology, the threats dealt by user have increased exponentially. Hence security of data is required during storage and transmission of data. Image Steganography is best popular techniques now a day. The Image hiding in cover image gives us a choice to hide different planes of image in different planes of cover image. In this paper, Negative of original image is hidden in cover image for security purposes. In our implementation pixels of negative image to be substituted in cover image pixels. In our paperEven Odd algorithm is proposed for hiding image in cover image using existing modified LSB algorithm.

Authors and Affiliations

Ajay Kumar

Keywords

Related Articles

Heart Disease Detection using EKSTRAP Clustering with Statistical and Distance based Classifiers

Abstract : The heart is the most important organ in the human body which pumps blood to various parts of the body. If there is inefficient circulation of blood in body organs like brain will suffer. If heart stops pumpin...

 Snmp Implementaton on Hp Routers with Ovpi (Openview Performance Insight) and Network Management

This study is a practical application of the informatics laboratory applied and gives us the score about how the SNMP protocol is brought together with OVPI (OpenView Performance Insight) in traffic protocol packets with...

 Evolution of Sha-176 Algorithm

 To maintain data integrity hash functions are generally used. Hash function is one type of cryptographic primitives, which provide an assurance for data integrity. NAS has designed SHA hash functions which are th...

 A Portable Content Management System

 Abstract: This report describes the design, implementation and usage of an efficient Content Management System.The aimof content management systems is to store and organize files, and provide version-controlled and...

 Comparative Study of PEGASIS Protocols inWireless Sensor Network

Abstract: The area of Wireless Sensor Networks (WSNs) is one of the fast growing and emerging field in the scientific and engineering world. It is an ad-hoc network that consists of small nodes with sensing, computing an...

Download PDF file
  • EP ID EP146978
  • DOI -
  • Views 113
  • Downloads 0

How To Cite

Ajay Kumar (2014).  Hiding Negative of an Image using Steganography Even Odd Algorithm for Security Purposes. IOSR Journals (IOSR Journal of Computer Engineering), 16(1), 70-75. https://www.europub.co.uk/articles/-A-146978