Citation to this article as recorded by
Amirtharajan, R. and J.B.B. Rayappan, 2012. Brownian motion of binary and gray-binary and gray bits in image for stego. J. Applied Sci., 12: 428-439. CrossRefDirect Link |
Amirtharajan, R. and J.B.B. Rayappan, 2012. Inverted pattern in inverted time domain for icon steganography. Inform. Technol. J., 11: 587-595. CrossRefDirect Link |
Amirtharajan, R. and J.B.B. Rayappan, 2012. Pixel authorized by pixel to trace with SFC on image to sabotage data mugger: A comparative study on PI stego. Res. J. Inform. Technol., 4: 124-139. CrossRefDirect Link |
Amirtharajan, R. and J.B.B. Rayappan, 2013. Steganography-time to time: A review. Res. J. Inform. Technol., 5: 53-66. CrossRefDirect Link |
Amirtharajan, R., J. Qin and J.B.B. Rayappan, 2012. Random image steganography and steganalysis: Present status and future directions. Inform. Technol. J., 11: 566-576. CrossRefDirect Link |
Amirtharajan, R., K.M. Ashfaaq, A.K. Infant and J.B.B. Rayappan, 2013. High performance pixel indicator for colour image steganography. Res. J. Inform. Technol., 5: 277-290. CrossRefDirect Link |
Cai, Z., H. Zhao and M. Jia, 2011. Spectrum sensing in cognitive radio based on adaptive optimal SVM. Inform. Technol. J., 10: 1427-1431. CrossRef |
Janakiraman, S., J. Chakravarthy, B. Radhakrishnan, K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Cover as key and key as data: An inborn stego. Inform. Technol. J., 13: 1969-1976. CrossRefDirect Link |
Janakiraman, S., S. Rajagopalan, K. Thenmozhi, H.N. Upadhyay and J. Ramanathan et al., 2013. Captivating CODEC Stego (CCS): A cover on camouflage. Res. J. Inform. Technol., 5: 160-170. CrossRefDirect Link |
Jiaohua Qin, Xuyu Xiang, Yu Deng, Youyun Li, Lili Pan 2014. Steganalysis of Highly Undetectable Steganography Using Convolution Filtering Inform. Technol. J., 13: 2588-2592. CrossRef |
M. Padmaa, Y. Venkataramani 2014. Random Image Steganography using Pixel Indicator to Enhance Hiding Capacity J. Applied Sci., 14: 1798-1808. CrossRef |
Qin, J., X. Xiang and M.X. Wang, 2010. A review on detection of LSB matching steganography. Inform. Technol. J., 9: 1725-1738. CrossRefDirect Link |
Rajagopalan, S., R. Amirtharajan, H.N. Upadhyay and J.B.B. Rayappan, 2012. Survey and analysis of hardware cryptographic and steganographic systems on FPGA. J. Applied Sci., 12: 201-210. CrossRefDirect Link |
Thanikaiselvan, V., P. Arulmozhivarman, J.B.B. Rayappan and R. Amirtharajan, 2012. Graceful graph for graceful security-towards a STE (G) Raph. Res. J. Inform. Technol., 4: 220-227. CrossRefDirect Link |
Xia, B., X. Sun, L. Xiang, H. Luo and H. Yang, 2011. Detection of LSB matching steganography using neighborhood node degree characteristics. Inform. Technol. J., 10: 1601-1607. CrossRefDirect Link |
Citation to this article as recorded by
A review on detection of LSB matching steganography. Information Technology Journal Vol. 9, Issue 8, 1725, 2010 |
Spectrum Sensing in Cognitive Radio Based on Adaptive Optimal SVM Information Technology Journal Vol. 10, Issue 7, 1427, 2011 |
Detection of LSB Matching Steganography using Neighborhood Node Degree Characteristics Information Technology Journal Vol. 10, Issue 8, 1601, 2011 |
Random Image Steganography and Steganalysis: Present Status and Future Directions Information Technology Journal Vol. 11, Issue 5, 566, 2012 |
Inverted Pattern in Inverted Time Domain for Icon Steganography Information Technology Journal Vol. 11, Issue 5, 587, 2012 |
Survey and Analysis of Hardware Cryptographic and Steganographic Systems on FPGA Journal of Applied Sciences Vol. 12, Issue 3, 201, 2012 |
How to cite this article
Jiaohua Qin, Xingming Sun, Xuyu Xiang and Zhihua Xia, 2009. Steganalysis Based on Difference Statistics for LSB Matching Steganography. Information Technology Journal, 8: 1281-1286.
DOI: 10.3923/itj.2009.1281.1286
URL: https://scialert.net/abstract/?doi=itj.2009.1281.1286
DOI: 10.3923/itj.2009.1281.1286
URL: https://scialert.net/abstract/?doi=itj.2009.1281.1286