Research Article

Citations for "Steganalysis Based on Difference Statistics for LSB Matching Steganography"

Citation to this article as recorded by ASCI
Amirtharajan, R. and J.B.B. Rayappan, 2012. Brownian motion of binary and gray-binary and gray bits in image for stego. J. Applied Sci., 12: 428-439.
CrossRef  |  Direct Link  |  

Amirtharajan, R. and J.B.B. Rayappan, 2012. Inverted pattern in inverted time domain for icon steganography. Inform. Technol. J., 11: 587-595.
CrossRef  |  Direct Link  |  

Amirtharajan, R. and J.B.B. Rayappan, 2012. Pixel authorized by pixel to trace with SFC on image to sabotage data mugger: A comparative study on PI stego. Res. J. Inform. Technol., 4: 124-139.
CrossRef  |  Direct Link  |  

Amirtharajan, R. and J.B.B. Rayappan, 2013. Steganography-time to time: A review. Res. J. Inform. Technol., 5: 53-66.
CrossRef  |  Direct Link  |  

Amirtharajan, R., J. Qin and J.B.B. Rayappan, 2012. Random image steganography and steganalysis: Present status and future directions. Inform. Technol. J., 11: 566-576.
CrossRef  |  Direct Link  |  

Amirtharajan, R., K.M. Ashfaaq, A.K. Infant and J.B.B. Rayappan, 2013. High performance pixel indicator for colour image steganography. Res. J. Inform. Technol., 5: 277-290.
CrossRef  |  Direct Link  |  

Cai, Z., H. Zhao and M. Jia, 2011. Spectrum sensing in cognitive radio based on adaptive optimal SVM. Inform. Technol. J., 10: 1427-1431.
CrossRef  |  

Janakiraman, S., J. Chakravarthy, B. Radhakrishnan, K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Cover as key and key as data: An inborn stego. Inform. Technol. J., 13: 1969-1976.
CrossRef  |  Direct Link  |  

Janakiraman, S., S. Rajagopalan, K. Thenmozhi, H.N. Upadhyay and J. Ramanathan et al., 2013. Captivating CODEC Stego (CCS): A cover on camouflage. Res. J. Inform. Technol., 5: 160-170.
CrossRef  |  Direct Link  |  

Jiaohua Qin, Xuyu Xiang, Yu Deng, Youyun Li, Lili Pan 2014. Steganalysis of Highly Undetectable Steganography Using Convolution Filtering Inform. Technol. J., 13: 2588-2592.
CrossRef  |  

M. Padmaa, Y. Venkataramani 2014. Random Image Steganography using Pixel Indicator to Enhance Hiding Capacity J. Applied Sci., 14: 1798-1808.
CrossRef  |  

Qin, J., X. Xiang and M.X. Wang, 2010. A review on detection of LSB matching steganography. Inform. Technol. J., 9: 1725-1738.
CrossRef  |  Direct Link  |  

Rajagopalan, S., R. Amirtharajan, H.N. Upadhyay and J.B.B. Rayappan, 2012. Survey and analysis of hardware cryptographic and steganographic systems on FPGA. J. Applied Sci., 12: 201-210.
CrossRef  |  Direct Link  |  

Thanikaiselvan, V., P. Arulmozhivarman, J.B.B. Rayappan and R. Amirtharajan, 2012. Graceful graph for graceful security-towards a STE (G) Raph. Res. J. Inform. Technol., 4: 220-227.
CrossRef  |  Direct Link  |  

Xia, B., X. Sun, L. Xiang, H. Luo and H. Yang, 2011. Detection of LSB matching steganography using neighborhood node degree characteristics. Inform. Technol. J., 10: 1601-1607.
CrossRef  |  Direct Link  |  


Citation to this article as recorded by CrossRef

A review on detection of LSB matching steganography.
Information Technology Journal Vol. 9, Issue 8, 1725, 2010

Spectrum Sensing in Cognitive Radio Based on Adaptive Optimal SVM
Information Technology Journal Vol. 10, Issue 7, 1427, 2011

Detection of LSB Matching Steganography using Neighborhood Node Degree Characteristics
Information Technology Journal Vol. 10, Issue 8, 1601, 2011

Random Image Steganography and Steganalysis: Present Status and Future Directions
Information Technology Journal Vol. 11, Issue 5, 566, 2012

Inverted Pattern in Inverted Time Domain for Icon Steganography
Information Technology Journal Vol. 11, Issue 5, 587, 2012

Survey and Analysis of Hardware Cryptographic and Steganographic Systems on FPGA
Journal of Applied Sciences Vol. 12, Issue 3, 201, 2012

Services
Related Articles in ASCI
Search in Google Scholar
View Citation
Report Citation

 
©  2021 Science Alert. All Rights Reserved