• [email protected]
  • +971 507 888 742
Submit Manuscript
SciAlert
  • Home
  • Journals
  • Information
    • For Authors
    • For Referees
    • For Librarian
    • For Societies
  • Contact
  1. Research Journal of Information Technology
  2. Volume 5, Number 2, 2013
  • Online First
  • Current Issue
  • Previous Issues
  • More Information
    Aims and Scope Editorial Board Guide to Authors Article Processing Charges
    Submit a Manuscript

Research Journal of Information Technology

Publisher: Science International

Citations


Search


Most Cited


Role of Information Communication Technologies Adoption in SMES: Evidence from Botswana
49 Citations

Combined K-Nearest Neighbors and Fuzzy Logic Indoor Localization Technique for Wireless Sensor Network
34 Citations

Critical Factors of Implementing Knowledge Management in School Environment: A Qualitative Study in Hong Kong
29 Citations

Indexed In


  • ASCI-Database
  • Asian Digital Library
  • Google Scholar
Asian Digital Library

Volume 5, Number 2, 2013


SPECIAL ISSUE

Research Journal of Information Technology Volume 5, Number 2, 0-0, 2013

PDF

Steganography-Time to Time: A Review

Rengarajan Amirtharajan and J.B.B. Rayappan

Research Journal of Information Technology Volume 5, Number 2, 53-66, 2013

Abstract PDF Fulltext Citations XML References

A Review of Secret Sharing Schemes

K.N. Sandhya Sarma, Hemraj S. Lamkuche and S. Umamaheswari

Research Journal of Information Technology Volume 5, Number 2, 67-72, 2013

Abstract PDF Fulltext Citations XML References

Pixel Indicated User Indicator: A Muxed Stego

Rengarajan Amirtharajan, P. Shanmuga Priya and J.B.B. Rayappan

Research Journal of Information Technology Volume 5, Number 2, 73-86, 2013

Abstract PDF Fulltext Citations XML References

Pixel Indicated Triple Layer: A Way for Random Image Steganography

R. Amirtharajan, R. Subrahmanyam, Jasti Nithin Teja, Katkuri Mahendar Reddy and J.B.B. Rayappan

Research Journal of Information Technology Volume 5, Number 2, 87-99, 2013

Abstract PDF Fulltext Citations XML References

Bio-hiding for Smart Swipe Card: A Secret Security

Rengarajan Amirtharajan, G. Aishwarya, M. Sai Krishna Karthik, V. Thanikaiselvan and J.B.B. Rayappan

Research Journal of Information Technology Volume 5, Number 2, 100-112, 2013

Abstract PDF Fulltext Citations XML References

Short Message (Service) as Key for Steganography

Rengarajan Amirtharajan, Prasad Muralidharan, R. Rajesh, R. Sridevi and J.B.B. Rayappan

Research Journal of Information Technology Volume 5, Number 2, 113-124, 2013

Abstract PDF Fulltext Citations XML References

Performance Comparison of Context Aware Range Based Indoor Real Time Localization for UWB Applications

R. Jayabharathy, V. Prithiviraj and R. Varadarajan

Research Journal of Information Technology Volume 5, Number 2, 125-136, 2013

Abstract PDF Fulltext Citations XML References

Mind Game for Cover Steganography: A Refuge

Rengarajan Amirtharajan, S. Deepak Roy, Noel Nesakumar, M. Chandrasekar, R. Sridevi and J.B.B. Rayappan

Research Journal of Information Technology Volume 5, Number 2, 137-148, 2013

Abstract PDF Fulltext Citations XML References

Cryptanalysis of SHA-3 Candidates: A Survey

Shilpa Chauhan, Rajeev Sobti, G. Geetha and Sami Anand

Research Journal of Information Technology Volume 5, Number 2, 149-159, 2013

Abstract PDF Fulltext Citations XML References

Captivating CODEC Stego (CCS): A Cover on Camouflage

Siva Janakiraman, Sundararaman Rajagopalan, K. Thenmozhi, Har Narayan Upadhyay, Janani Ramanathan, Swetha Varadarajan, J.B.B. Rayappan and Rengarajan Amirtharajan

Research Journal of Information Technology Volume 5, Number 2, 160-170, 2013

Abstract PDF Fulltext Citations XML References

Key Decided Cover for Random Image Steganography

Rengarajan Amirtharajan, V. Mahalakshmi, J. Nandhini, R. Kavitha and J.B.B. Rayappan

Research Journal of Information Technology Volume 5, Number 2, 171-180, 2013

Abstract PDF Fulltext Citations XML References

Graceful Labeling of Assignable Information Hiding in Image

G. Sathiamoorthy, T.N. Janakiraman, N. Sairam, N.R. Raajan, K.S. Mathavan, P. Praveenkumar, R. Krishnakumar, M. Malligaraj and K. Karthikeyan

Research Journal of Information Technology Volume 5, Number 2, 181-190, 2013

Abstract PDF Fulltext Citations XML References

Investigation of ISAMP Protocol for Multimedia Streaming Services via VoIP Coexisting of IEEE 802.11.b with Mobile Wimax standard

K. Sakthisudhan, P. Thangaraj and D. Mohanageetha

Research Journal of Information Technology Volume 5, Number 2, 191-199, 2013

Abstract PDF Fulltext Citations XML References

AAAM-face Based Authentication System for Information Security

N.R. Raajan, M.V. Priya, S. Shiva Prasad and R. Rakesh

Research Journal of Information Technology Volume 5, Number 2, 200-208, 2013

Abstract PDF Fulltext Citations XML References

Concealed to Protect and Protect to Conceal: A Conserved Stego Image

Rengarajan Amirtharajan, R. Anushiadevi, V. Meena, V. Kalpana and J.B.B. Rayappan

Research Journal of Information Technology Volume 5, Number 2, 209-217, 2013

Abstract PDF Fulltext Citations XML References

Hash Encrypted Synchronized OFDM

N.R. Raajan, A. Jenifer Philomina, M. Ramkumar, G.N. Jayabhavani and C. Nishanthini

Research Journal of Information Technology Volume 5, Number 2, 218-225, 2013

Abstract PDF Fulltext Citations XML References

Envisioning Smart Hotels Through Spontaneous Device Integration

Veeramuthu Venkatesh, V. Vaithayanathan, Pethuru Raj, Kaushik Gopalan and Rengarajan Amirtharajan

Research Journal of Information Technology Volume 5, Number 2, 226-233, 2013

Abstract PDF Fulltext Citations XML References

Compressed and Encrypted Secret Hides in Image for Rugged Stego

Rengarajan Amirtharajan, J.H.S. Karthikesh, M. Nirup Reddy, Ch. Sri Harsha Kaushik and J.B.B. Rayappan

Research Journal of Information Technology Volume 5, Number 2, 234-241, 2013

Abstract PDF Fulltext Citations XML References

A Secure Cryptosystem for Transmission

M. Baritha Begum and Y. Venkataramani

Research Journal of Information Technology Volume 5, Number 2, 242-248, 2013

Abstract PDF Fulltext Citations XML References

Image Hides Image: A Secret Stego Tri-layer Approach

Rengarajan Amirtharajan, R. Anushiadevi, V. Meena, V. Kalpana and J.B.B. Rayappan

Research Journal of Information Technology Volume 5, Number 2, 249-255, 2013

Abstract PDF Fulltext Citations XML References

Augmented Reality in Security Systems

S. Suganya, N.R. Raajan, M.V. Priya, A.J. Philomina and G. Shiva

Research Journal of Information Technology Volume 5, Number 2, 256-261, 2013

Abstract PDF Fulltext Citations XML References

ACKNOWLEDGEMENT TO THE REVIEWERS

Research Journal of Information Technology Volume 5, Number 2, 262-262, 2013

PDF

Useful Links

  • Journals
  • For Authors
  • For Referees
  • For Librarian
  • For Socities

Contact Us

Office Number 1128,
Tamani Arts Building,
Business Bay,
Deira, Dubai, UAE

Phone: +971 507 888 742
Email: [email protected]

About Science Alert

Science Alert is a technology platform and service provider for scholarly publishers, helping them to publish and distribute their content online. We provide a range of services, including hosting, design, and digital marketing, as well as analytics and other tools to help publishers understand their audience and optimize their content. Science Alert works with a wide variety of publishers, including academic societies, universities, and commercial publishers.

Follow Us
© Copyright Science Alert. All Rights Reserved