CFP last date
20 June 2024
Call for Paper
July Edition
IJCA solicits high quality original research papers for the upcoming July edition of the journal. The last date of research paper submission is 20 June 2024

Submit your paper
Know more
Reseach Article

Image Steganography using Two’s Complement

by Sushil Sharma, Ishpreet Singh Virk
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 145 - Number 10
Year of Publication: 2016
Authors: Sushil Sharma, Ishpreet Singh Virk
10.5120/ijca2016910798

Sushil Sharma, Ishpreet Singh Virk . Image Steganography using Two’s Complement. International Journal of Computer Applications. 145, 10 ( Jul 2016), 39-41. DOI=10.5120/ijca2016910798

@article{ 10.5120/ijca2016910798,
author = { Sushil Sharma, Ishpreet Singh Virk },
title = { Image Steganography using Two’s Complement },
journal = { International Journal of Computer Applications },
issue_date = { Jul 2016 },
volume = { 145 },
number = { 10 },
month = { Jul },
year = { 2016 },
issn = { 0975-8887 },
pages = { 39-41 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume145/number10/25318-2016910798/ },
doi = { 10.5120/ijca2016910798 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:48:28.526110+05:30
%A Sushil Sharma
%A Ishpreet Singh Virk
%T Image Steganography using Two’s Complement
%J International Journal of Computer Applications
%@ 0975-8887
%V 145
%N 10
%P 39-41
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Nowadays communication is being done through internet so it has become very important to secure the secret information. Steganography is one of the techniques used for secret communication to overcome such threats. This technique hides the secret information behind other information without revealing its existence. This paper presents an Image Steganography Technique using 2’s Complement. In this technique first 2’s complement is performed on the secret pixel and then it is concealed in the LSBs of the cover image.

References
  1. Moerland, T, "Steganography and Steganalysis", Leiden Institute of Advanced Computing Science, www.liacs.nl/home/ trnoerl/privtech.pdf.
  2. C.-C. Chang, T.D. Kieu, A reversible data hiding scheme using complementary embedding strategy, Inform. Sci. 180 (16) (2010) 3045-3058.
  3. C.-C. Chang, W.-L. Tai, c.-c. Lin, A reversible data hiding scheme based on side match vector quantization, IEEE Trans. Circ. Syst. Video Technol. 16 (10) (2006) 1301-1308.
  4. W. Luo, F. Huang, J. Huang, Edge adaptive image steganography based on Isb matching revisited, IEEE Trans. Inf. Forens. Security 5 (2) (2010) 201-214.
  5. J. Mielikainen, LSB Matching Revisited, IEEE Signal Process. Lett. 13 (5) (2006) 285-287.
  6. Chen, B. and G.W. Wornell, 2001. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. lEEE Trans. Inform. Theory. 47: 1423-1443. DOl: 10.1109118.923725.
  7. Amitava Nag, Saswati Ghosh, Sushanta Biswas, Debasree Sarkar, Partha Pratim Sarkar, An image steganography technique using x-box mapping, IEEE-International Conference On Advances In Engineering, Science And Management (ICAESM -2012) March 30, 31, 2012,709-713.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography Two’s Complement.