Research Article
Steganalysis Based on Difference Statistics for LSB Matching Steganography

Citation to this article as recorded by ASCI
. : -.

Amirtharajan, R. and J.B.B. Rayappan, 2012. Brownian motion of binary and gray-binary and gray bits in image for stego. J. Applied Sci., 12: 428-439.
CrossRef  |  Direct Link  |  

Amirtharajan, R. and J.B.B. Rayappan, 2012. Inverted pattern in inverted time domain for icon steganography. Inform. Technol. J., 11: 587-595.
CrossRef  |  Direct Link  |  

Amirtharajan, R. and J.B.B. Rayappan, 2012. Pixel authorized by pixel to trace with SFC on image to sabotage data mugger: A comparative study on PI stego. Res. J. Inform. Technol., 4: 124-139.
CrossRef  |  Direct Link  |  

Amirtharajan, R. and J.B.B. Rayappan, 2013. Steganography-time to time: A review. Res. J. Inform. Technol., 5: 53-66.
CrossRef  |  Direct Link  |  

Amirtharajan, R., J. Qin and J.B.B. Rayappan, 2012. Random image steganography and steganalysis: Present status and future directions. Inform. Technol. J., 11: 566-576.
CrossRef  |  Direct Link  |  

Amirtharajan, R., K.M. Ashfaaq, A.K. Infant and J.B.B. Rayappan, 2013. High performance pixel indicator for colour image steganography. Res. J. Inform. Technol., 5: 277-290.
CrossRef  |  Direct Link  |  

Cai, Z., H. Zhao and M. Jia, 2011. Spectrum sensing in cognitive radio based on adaptive optimal SVM. Inform. Technol. J., 10: 1427-1431.
CrossRef  |  

Janakiraman, S., J. Chakravarthy, B. Radhakrishnan, K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Cover as key and key as data: An inborn stego. Inform. Technol. J., 13: 1969-1976.
CrossRef  |  Direct Link  |  

Janakiraman, S., S. Rajagopalan, K. Thenmozhi, H.N. Upadhyay and J. Ramanathan et al., 2013. Captivating CODEC Stego (CCS): A cover on camouflage. Res. J. Inform. Technol., 5: 160-170.
CrossRef  |  Direct Link  |  

Jiaohua Qin, Xuyu Xiang, Yu Deng, Youyun Li, Lili Pan 2014. Steganalysis of Highly Undetectable Steganography Using Convolution Filtering Inform. Technol. J., 13: 2588-2592.
CrossRef  |  

M. Padmaa, Y. Venkataramani 2014. Random Image Steganography using Pixel Indicator to Enhance Hiding Capacity J. Applied Sci., 14: 1798-1808.
CrossRef  |  

Qin, J., X. Xiang and M.X. Wang, 2010. A review on detection of LSB matching steganography. Inform. Technol. J., 9: 1725-1738.
CrossRef  |  Direct Link  |  

Rajagopalan, S., R. Amirtharajan, H.N. Upadhyay and J.B.B. Rayappan, 2012. Survey and analysis of hardware cryptographic and steganographic systems on FPGA. J. Applied Sci., 12: 201-210.
CrossRef  |  Direct Link  |  

Thanikaiselvan, V., P. Arulmozhivarman, J.B.B. Rayappan and R. Amirtharajan, 2012. Graceful graph for graceful security-towards a STE (G) Raph. Res. J. Inform. Technol., 4: 220-227.
CrossRef  |  Direct Link  |  

Xia, B., X. Sun, L. Xiang, H. Luo and H. Yang, 2011. Detection of LSB matching steganography using neighborhood node degree characteristics. Inform. Technol. J., 10: 1601-1607.
CrossRef  |  Direct Link  |  

Services
Related Articles in ASCI
Search in Google Scholar
View Citation
Report Citation

 
©  2021 Science Alert. All Rights Reserved