SPECIAL ISSUE
Research Journal of Information Technology Volume 5, Number 2, 0-0, 2013
PDF
Steganography-Time to Time: A Review
Rengarajan Amirtharajan and J.B.B. Rayappan
Research Journal of Information Technology Volume 5, Number 2, 53-66, 2013
Abstract PDF Fulltext Citations XML References
A Review of Secret Sharing Schemes
K.N. Sandhya Sarma, Hemraj S. Lamkuche and S. Umamaheswari
Research Journal of Information Technology Volume 5, Number 2, 67-72, 2013
Abstract PDF Fulltext Citations XML References
Pixel Indicated User Indicator: A Muxed Stego
Rengarajan Amirtharajan, P. Shanmuga Priya and J.B.B. Rayappan
Research Journal of Information Technology Volume 5, Number 2, 73-86, 2013
Abstract PDF Fulltext Citations XML References
Pixel Indicated Triple Layer: A Way for Random Image Steganography
R. Amirtharajan, R. Subrahmanyam, Jasti Nithin Teja, Katkuri Mahendar Reddy and J.B.B. Rayappan
Research Journal of Information Technology Volume 5, Number 2, 87-99, 2013
Abstract PDF Fulltext Citations XML References
Bio-hiding for Smart Swipe Card: A Secret Security
Rengarajan Amirtharajan, G. Aishwarya, M. Sai Krishna Karthik, V. Thanikaiselvan and J.B.B. Rayappan
Research Journal of Information Technology Volume 5, Number 2, 100-112, 2013
Abstract PDF Fulltext Citations XML References
Short Message (Service) as Key for Steganography
Rengarajan Amirtharajan, Prasad Muralidharan, R. Rajesh, R. Sridevi and J.B.B. Rayappan
Research Journal of Information Technology Volume 5, Number 2, 113-124, 2013
Abstract PDF Fulltext Citations XML References
Performance Comparison of Context Aware Range Based Indoor Real Time Localization for UWB Applications
R. Jayabharathy, V. Prithiviraj and R. Varadarajan
Research Journal of Information Technology Volume 5, Number 2, 125-136, 2013
Abstract PDF Fulltext Citations XML References
Mind Game for Cover Steganography: A Refuge
Rengarajan Amirtharajan, S. Deepak Roy, Noel Nesakumar, M. Chandrasekar, R. Sridevi and J.B.B. Rayappan
Research Journal of Information Technology Volume 5, Number 2, 137-148, 2013
Abstract PDF Fulltext Citations XML References
Cryptanalysis of SHA-3 Candidates: A Survey
Shilpa Chauhan, Rajeev Sobti, G. Geetha and Sami Anand
Research Journal of Information Technology Volume 5, Number 2, 149-159, 2013
Abstract PDF Fulltext Citations XML References
Captivating CODEC Stego (CCS): A Cover on Camouflage
Siva Janakiraman, Sundararaman Rajagopalan, K. Thenmozhi, Har Narayan Upadhyay, Janani Ramanathan, Swetha Varadarajan, J.B.B. Rayappan and Rengarajan Amirtharajan
Research Journal of Information Technology Volume 5, Number 2, 160-170, 2013
Abstract PDF Fulltext Citations XML References
Key Decided Cover for Random Image Steganography
Rengarajan Amirtharajan, V. Mahalakshmi, J. Nandhini, R. Kavitha and J.B.B. Rayappan
Research Journal of Information Technology Volume 5, Number 2, 171-180, 2013
Abstract PDF Fulltext Citations XML References
Graceful Labeling of Assignable Information Hiding in Image
G. Sathiamoorthy, T.N. Janakiraman, N. Sairam, N.R. Raajan, K.S. Mathavan, P. Praveenkumar, R. Krishnakumar, M. Malligaraj and K. Karthikeyan
Research Journal of Information Technology Volume 5, Number 2, 181-190, 2013
Abstract PDF Fulltext Citations XML References
Investigation of ISAMP Protocol for Multimedia Streaming Services via VoIP Coexisting of IEEE 802.11.b with Mobile Wimax standard
K. Sakthisudhan, P. Thangaraj and D. Mohanageetha
Research Journal of Information Technology Volume 5, Number 2, 191-199, 2013
Abstract PDF Fulltext Citations XML References
AAAM-face Based Authentication System for Information Security
N.R. Raajan, M.V. Priya, S. Shiva Prasad and R. Rakesh
Research Journal of Information Technology Volume 5, Number 2, 200-208, 2013
Abstract PDF Fulltext Citations XML References
Concealed to Protect and Protect to Conceal: A Conserved Stego Image
Rengarajan Amirtharajan, R. Anushiadevi, V. Meena, V. Kalpana and J.B.B. Rayappan
Research Journal of Information Technology Volume 5, Number 2, 209-217, 2013
Abstract PDF Fulltext Citations XML References
Hash Encrypted Synchronized OFDM
N.R. Raajan, A. Jenifer Philomina, M. Ramkumar, G.N. Jayabhavani and C. Nishanthini
Research Journal of Information Technology Volume 5, Number 2, 218-225, 2013
Abstract PDF Fulltext Citations XML References
Envisioning Smart Hotels Through Spontaneous Device Integration
Veeramuthu Venkatesh, V. Vaithayanathan, Pethuru Raj, Kaushik Gopalan and Rengarajan Amirtharajan
Research Journal of Information Technology Volume 5, Number 2, 226-233, 2013
Abstract PDF Fulltext Citations XML References
Compressed and Encrypted Secret Hides in Image for Rugged Stego
Rengarajan Amirtharajan, J.H.S. Karthikesh, M. Nirup Reddy, Ch. Sri Harsha Kaushik and J.B.B. Rayappan
Research Journal of Information Technology Volume 5, Number 2, 234-241, 2013
Abstract PDF Fulltext Citations XML References
A Secure Cryptosystem for Transmission
M. Baritha Begum and Y. Venkataramani
Research Journal of Information Technology Volume 5, Number 2, 242-248, 2013
Abstract PDF Fulltext Citations XML References
Image Hides Image: A Secret Stego Tri-layer Approach
Rengarajan Amirtharajan, R. Anushiadevi, V. Meena, V. Kalpana and J.B.B. Rayappan
Research Journal of Information Technology Volume 5, Number 2, 249-255, 2013
Abstract PDF Fulltext Citations XML References
Augmented Reality in Security Systems
S. Suganya, N.R. Raajan, M.V. Priya, A.J. Philomina and G. Shiva
Research Journal of Information Technology Volume 5, Number 2, 256-261, 2013
Abstract PDF Fulltext Citations XML References
ACKNOWLEDGEMENT TO THE REVIEWERS
Research Journal of Information Technology Volume 5, Number 2, 262-262, 2013
PDF