Research Article

Citations for "Steganography-The Art of Hiding Data"

Citation to this article as recorded by ASCI logo

Amirtharajan, R. and J.B.B. Rayappan, 2012. Inverted pattern in inverted time domain for icon steganography. Inform. Technol. J., 11: 587-595.
CrossRef  |  Direct Link  |  

Amirtharajan, R. and J.B.B. Rayappan, 2013. Steganography-time to time: A review. Res. J. Inform. Technol., 5: 53-66.
CrossRef  |  Direct Link  |  

Amirtharajan, R., J. Qin and J.B.B. Rayappan, 2012. Random image steganography and steganalysis: Present status and future directions. Inform. Technol. J., 11: 566-576.
CrossRef  |  Direct Link  |  

Amirtharajan, R., P. Muralidharan, R. Rajesh, R. Sridevi and J.B.B. Rayappan, 2013. Short message (service) as key for steganography. Res. J. Inform. Technol., 5: 113-124.
CrossRef  |  Direct Link  |  

Jaberi, A., R. Ayanzadeh and A.S.Z. Mousavi, 2012. Two-layer cellular automata based cryptography. Trends Applied Sci. Res., 7: 68-77.
CrossRef  |  Direct Link  |  

Janakiraman, S., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2012. Pixel forefinger for gray in color: A layer by layer stego. Inform. Technol. J., 11: 9-19.
CrossRef  |  Direct Link  |  

Li, C.H., Z.M. Lu and Y.X. Su, 2011. Reversible data hiding for btc-compressed Images based on bitplane flipping and histogram shifting of mean tables. Inform. Technol. J., 10: 1421-1426.
CrossRef  |  

Luo, G., X. Sun and L. Xiang, 2008. Multi-blogs steganographic algorithm based on directed hamiltonian path selection. Inform. Technol. J., 7: 450-457.
CrossRef  |  Direct Link  |  

Padmaa, M., Y. Venkataramani and R. Amirtharajan, 2011. Stego on 2n: 1 Platform for users and embedding. Inform. Technol. J., 10: 1896-1907.
CrossRef  |  Direct Link  |  

Rabah, K., 2005. Elliptic curve elgamal encryption and signature schemes. Inform. Technol. J., 4: 299-306.
CrossRef  |  Direct Link  |  

Rabah, K., 2005. Theory and implementation of data encryption standard: A review. Inform. Technol. J., 4: 307-325.
CrossRef  |  Direct Link  |  

Rabah, K., 2006. Implementing secure RSA cryptosystems using your own cryptographic JCE provider. J. Applied Sci., 6: 482-510.
CrossRef  |  Direct Link  |  

Rabah, K.V.O., 2005. Implementation of one-time pad cryptography. Inform. Technol. J., 4: 87-95.
CrossRef  |  Direct Link  |  

Rajagopalan, S., Y. Ravishankar, H.N. Upadhyay, J.B.B. Rayappan and R. Amirtharajan, 2014. Modeling combo PR generator for Stego Storage Self Test (SSST). Inform. Technol. J., 13: 1936-1944.
CrossRef  |  Direct Link  |  

Robert W. Buckheit Jr., Tracy L. Hartman, Karen M. Watson, Sun-Gan Chung, and Eui-Hwan Cho 2008. Comparative Evaluation of the Inhibitory Activities of a Series of Pyrimidinedione Congeners That Inhibit Human Immunodeficiency Virus Types 1 and 2. Antimicrobial Agents and Chemotherapy, 52: 225-236.
CrossRef  |  

Thenmozhi, K., P. Praveenkumar, R. Amirtharajan, V. Prithiviraj, R. Varadarajan and J.B.B. Rayappan, 2012. OFDM+CDMA+Stego = Secure communication: A review. Res. J. Inform. Technol., 4: 31-46.
CrossRef  |  Direct Link  |  

Yang, B., X. Sun, J. Zhang, L. Xiang and X. Chen et al., 2012. A novel reversible text data hiding scheme. Inform. Technol. J., 11: 1084-1090.
CrossRef  |  Direct Link  |  

Yang, B., X. Sun, L. Xiang, Z. Ruan and R. Wu, 2011. Steganography in Ms Excel document using text-rotation technique. Inform. Technol. J., 10: 889-893.
CrossRef  |  Direct Link  |  

Zhu, J., R.D. Wang, J. Li and D.Q. Yan, 2011. A huffman coding section-based steganography for AAC audio. Inform. Technol. J., 10: 1983-1988.
CrossRef  |  Direct Link  |  

Citations in impact factor journal as recorded by Crossref logo

ILSBMR: improved LSBMR (ILSBMR) method
Multimedia Tools and Applications Vol. 76, Issue 2, 1857, 2017

Adaptive PVD and LSB based high capacity data hiding scheme
Multimedia Tools and Applications

A forward email based high capacity text steganography technique using a randomized and indexed word dictionary
Multimedia Tools and Applications

Advanced security and privacy technique for digital text in smart grid communications
Computers & Electrical Engineering

Citation to this article as recorded by Crossref logo

New Frontiers in Cryptography
New Frontiers in Cryptography

Basic Framework of Different Steganography Techniques for Security Applications
Advances in Intelligent Systems and Computing

Image Steganography Capacity Improvement Using Cohort Intelligence and Modified Multi-Random Start Local Search Methods
Arabian Journal for Science and Engineering

Improved Cohort Intelligence—A high capacity, swift and secure approach on JPEG image steganography
Journal of Information Security and Applications

A novel steganography method using transliteration of Bengali text
Journal of King Saud University - Computer and Information Sciences

A secure and size efficient algorithm to enhance data hiding capacity and security of cover text by using unicode
Journal of King Saud University - Computer and Information Sciences

A Novel Approach for Text Steganography: Generating Text Summary Using Reflection Symmetry
Procedia Technology

A Text based Steganography Technique with Indian Root
Procedia Technology

Comprehensive study on Inconel 718 surface topography after grinding
Tribology International

A Survey of Automated Assessment Approaches for Programming Assignments
Computer Science Education Vol. 15, Issue 2, 83, 2005

The role of intellectual capital and service agility in banking service provision: the perspective of Brazilian export companies
International Journal of Emerging Markets

A Dynamic Three-Bit Image Steganography Algorithm for Medical and e-Healthcare Systems
IEEE Access

A Generalized Model of Text Steganography by Summary Generation using Frequency Analysis
2018 7th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)

A stegnography implementation
2008 International Symposium on Biometrics and Security Technologies

Toward agent-based LSB image steganography system
Journal of Intelligent Systems Vol. 30, Issue 1, 903, 2021

Hiding Stealth Optical CDMA Signals in Public BPSK Channels for Optical Wireless Communication
Applied Sciences Vol. 8, Issue 10, 1731, 2018

Elliptic curve elgamal encryption and signature schemes.
Information Technology Journal Vol. 4, Issue 3, 299, 2005

Implementation of One-Time Pad Cryptography
Information Technology Journal Vol. 4, Issue 1, 87, 2005

Multi-Blogs Steganographic Algorithm Based on Directed Hamiltonian Path Selection
Information Technology Journal Vol. 7, Issue 3, 450, 2008

Reversible Data Hiding for Btc-compressed Images Based on Bitplane Flipping and Histogram Shifting of Mean Tables
Information Technology Journal Vol. 10, Issue 7, 1421, 2011

Stego on 2n:1 Platform for Users and Embedding
Information Technology Journal Vol. 10, Issue 10, 1896, 2011

A Huffman Coding Section-based Steganography for AAC Audio
Information Technology Journal Vol. 10, Issue 10, 1983, 2011

Steganography in Ms Excel Document using Text-rotation Technique
Information Technology Journal Vol. 10, Issue 4, 889, 2011

Random Image Steganography and Steganalysis: Present Status and Future Directions
Information Technology Journal Vol. 11, Issue 5, 566, 2012

Inverted Pattern in Inverted Time Domain for Icon Steganography
Information Technology Journal Vol. 11, Issue 5, 587, 2012

Pixel Forefinger for Gray in Color: A Layer by Layer Stego
Information Technology Journal Vol. 11, Issue 1, 9, 2012

Implementing Secure RSA Cryptosystems Using Your Own Cryptographic JCE Provider
Journal of Applied Sciences Vol. 6, Issue 3, 482, 2006

OFDM+CDMA+Stego = Secure Communication: A Review
Research Journal of Information Technology Vol. 4, Issue 2, 31, 2012

Two-layer Cellular Automata Based Cryptography
Trends in Applied Sciences Research Vol. 7, Issue 1, 68, 2012

Methods, Implementation, and Application of Cyber Security Intelligence and Analytics
Advances in Information Security, Privacy, and Ethics

Block-Based Steganographic Algorithm Using Modulus Function and Pixel-Value Differencing
Journal of Software Engineering and Applications Vol. 10, Issue 01, 56, 2017

Related Articles in ASCI
Search in Google Scholar
View Citation
Report Citation

©  2022 Science Alert. All Rights Reserved