SPECIAL ISSUE
Research Journal of Information Technology Volume 5, Number 3, 0-0, 2013
PDF
Horse Communication against Harsh Attack: A Stego Ride
V. Thanikaiselvan and P. Arulmozhivarman
Research Journal of Information Technology Volume 5, Number 3, 263-276, 2013
Abstract PDF Fulltext Citations XML References
High Performance Pixel indicator For Colour Image Steganography
Rengarajan Amirtharajan, K. Mohamed Ashfaaq, A. Kingsly Infant and J.B.B. Rayappan
Research Journal of Information Technology Volume 5, Number 3, 277-290, 2013
Abstract PDF Fulltext Citations XML References
Admission Control Scheme for QoS Support in IEEE 802.11e Wireless LAN
Rathnakar Achary, V. Vaithiyanathan and Pethuru Raj
Research Journal of Information Technology Volume 5, Number 3, 291-303, 2013
Abstract PDF Fulltext Citations XML References
Kubera Kolam: A Way for Random Image Steganography
Rengarajan Amirtharajan, Krishnamourthy Karthikeyan, Malligaraj Malleswaran and J.B.B. Rayappan
Research Journal of Information Technology Volume 5, Number 3, 304-316, 2013
Abstract PDF Fulltext Citations XML References
Random Abrasion on Image for Security Magnification
Amirtharajan , R. Anushiadevi, V. Meena, V. Kalpana and J.B.B. Rayappan
Research Journal of Information Technology Volume 5, Number 3, 317-328, 2013
Abstract PDF Fulltext Citations XML References
Rubiks Cube: A Way for Random Image Steganography
Rengarajan Amirtharajan, M. Venkata Abhiram, G. Revathi, J. Bharathsimha Reddy, V. Thanikaiselvan and J.B.B. Rayappan
Research Journal of Information Technology Volume 5, Number 3, 329-340, 2013
Abstract PDF Fulltext Citations XML References
Why Image Encryption for Better Steganography
Rengarajan Amirtharajan, P. Archana and J.B.B. Rayappan
Research Journal of Information Technology Volume 5, Number 3, 341-351, 2013
Abstract PDF Fulltext Citations XML References
A Smart Train Using the DPWS-based Sensor Integration
V. Venkatesh, V. Vaithayanathan, Pethuru Raj, K. Gopalan and R. Amirtharajan
Research Journal of Information Technology Volume 5, Number 3, 352-362, 2013
Abstract PDF Fulltext Citations XML References
A New Steganography Algorithm against Chi Square Attack
V. Thanikaiselvan, K. Santosh, D. Manikanta and Rengarajan Amirtharajan
Research Journal of Information Technology Volume 5, Number 3, 363-372, 2013
Abstract PDF Fulltext Citations XML References
High Capacity Triple Plane Embedding: A Colour Stego
Rengarajan Amirtharajan, G. Devipriya, V. Thanikaiselvan and J.B.B. Rayappan
Research Journal of Information Technology Volume 5, Number 3, 373-382, 2013
Abstract PDF Fulltext Citations XML References
Pixel Indicates, Standard Deviates: A Way for Random Image Steganography
R. Amirtharajan, V. Rajesh, P. Archana and J.B.B. Rayappan
Research Journal of Information Technology Volume 5, Number 3, 383-392, 2013
Abstract PDF Fulltext Citations XML References
Comparison of Wavelet Filters in Hybrid Domain Watermarking
V. Elamaran, K. Narasimhan, P.V.M. Vijayabhaskar and G. Shiva
Research Journal of Information Technology Volume 5, Number 3, 393-401, 2013
Abstract PDF Fulltext Citations XML References
NIZKP to Achieve Authentication in Ad-hoc Networks
S. Samundeeswari and V.S. Shankar Sriram
Research Journal of Information Technology Volume 5, Number 3, 402-410, 2013
Abstract PDF Fulltext Citations XML References
Humanoid as a Sensor Node
A. Ranjit, Amit Raj and J.B.B. Rayappan
Research Journal of Information Technology Volume 5, Number 3, 411-418, 2013
Abstract PDF Fulltext Citations XML References
MPLS Based Adaptive Concurrent Multipath Packet Dispersion Architecture for VoIP Networks
J. Faritha Banu and V. Ramachandran
Research Journal of Information Technology Volume 5, Number 3, 419-426, 2013
Abstract PDF Fulltext Citations XML References
A Smarter E-currency Management System
G. Manikanta Chaitanya, Pinjerla Sandeep and Rengarajan Amirtharajan
Research Journal of Information Technology Volume 5, Number 3, 427-434, 2013
Abstract PDF Fulltext Citations XML References
Seeing and Believing is a Threat: A Visual Cryptography Schemes
Rengarajan Amirtharajan, Sumaiya Sulthana and J.B.B. Rayappan
Research Journal of Information Technology Volume 5, Number 3, 435-441, 2013
Abstract PDF Fulltext Citations XML References
Elucidating the Robust and Resilient Cloud Security Solution Approaches
Pethuru Raj, C. Nithya, A. Parvathy, K. Thenmozhi, J.B.B. Rayappan and Rengarajan Amirtharajan
Research Journal of Information Technology Volume 5, Number 3, 442-448, 2013
Abstract PDF Fulltext Citations XML References
Chaotic Interleaving for Secured OFDM
N.R. Raajan, B. Monisha, R. Vishnupriya, Niranjana Rangarajan, G.N. Jayabhavani and C. Nishanthini
Research Journal of Information Technology Volume 5, Number 3, 449-455, 2013
Abstract PDF Fulltext Citations XML References
An Efficient Steganographic Method by using Image Fragments With High Security
Research Journal of Information Technology Volume 5, Number 3, 456-461, 2013
Abstract PDF Fulltext Citations XML References
Secured Login System
N.R. Raajan, G. Shiva, P.V.M. Vijayabhaskar, P. Mithun and J. Peter Raj
Research Journal of Information Technology Volume 5, Number 3, 462-467, 2013
Abstract PDF Fulltext Citations XML References
Unsupervised Neural Network for Content Based Image Retrieval by Utilizing Content and Model Annotations
Research Journal of Information Technology Volume 5, Number 3, 468-472, 2013
Abstract PDF Fulltext Citations XML References
ACKNOWLEDGEMENT TO THE REVIEWERS
Research Journal of Information Technology Volume 5, Number 3, 473-473, 2013
PDF