Citations in impact factor journals
LSB steganography detection in monochromatic still images using artificial neural networks Multimedia Tools and Applications |
Citation to this article as recorded by
Amirtharajan, R. and J.B.B. Rayappan, 2012. Brownian motion of binary and gray-binary and gray bits in image for stego. J. Applied Sci., 12: 428-439. CrossRefDirect Link |
Amirtharajan, R. and J.B.B. Rayappan, 2012. Inverted pattern in inverted time domain for icon steganography. Inform. Technol. J., 11: 587-595. CrossRefDirect Link |
Amirtharajan, R. and J.B.B. Rayappan, 2012. Pixel authorized by pixel to trace with SFC on image to sabotage data mugger: A comparative study on PI stego. Res. J. Inform. Technol., 4: 124-139. CrossRefDirect Link |
Amirtharajan, R. and J.B.B. Rayappan, 2013. Steganography-time to time: A review. Res. J. Inform. Technol., 5: 53-66. CrossRefDirect Link |
Amirtharajan, R., G. Devipriya, V. Thanikaiselvan and J.B.B. Rayappan, 2013. High capacity triple plane embedding: A colour stego. Res. J. Inform. Technol., 5: 373-382. CrossRefDirect Link |
Amirtharajan, R., J. Qin and J.B.B. Rayappan, 2012. Random image steganography and steganalysis: Present status and future directions. Inform. Technol. J., 11: 566-576. CrossRefDirect Link |
Amirtharajan, R., J.H.S. Karthikesh, M.N. Reddy, C.S.H. Kaushik and J.B.B. Rayappan, 2013. Compressed and encrypted secret hides in image for rugged stego. Res. J. Inform. Technol., 5: 234-241. CrossRefDirect Link |
Amirtharajan, R., K. Karthikeyan, M. Malleswaran and J.B.B. Rayappan, 2013. Kubera kolam: A way for random image steganography. Res. J. Inform. Technol., 5: 304-316. CrossRefDirect Link |
Amirtharajan, R., K.M. Ashfaaq, A.K. Infant and J.B.B. Rayappan, 2013. High performance pixel indicator for colour image steganography. Res. J. Inform. Technol., 5: 277-290. CrossRefDirect Link |
Amirtharajan, R., M.V. Abhiram, G. Revathi, J.B. Reddy, V. Thanikaiselvan and J.B.B. Rayappan, 2013. Rubik's cube: A way for random image steganography. Res. J. Inform. Technol., 5: 329-340. CrossRefDirect Link |
Amirtharajan, R., P.S. Priya and J.B.B. Rayappan, 2013. Pixel indicated user indicator: A muxed stego. Res. J. Inform. Technol., 5: 73-86. CrossRefDirect Link |
Amirtharajan, R., R. Anushiadevi, V. Meena, V. Kalpana and J.B.B. Rayappan, 2013. Concealed to protect and protect to conceal: A conserved stego image. Res. J. Inform. Technol., 5: 209-217. CrossRefDirect Link |
Amirtharajan, R., R. Subrahmanyam, J.N. Teja, K.M. Reddy and J.B.B. Rayappan, 2013. Pixel indicated triple layer: A way for random image steganography. Res. J. Inform. Technol., 5: 87-99. CrossRefDirect Link |
Amirtharajan, R., V. Mahalakshmi, J. Nandhini, R. Kavitha and J.B.B. Rayappan, 2013. Key decided cover for random image steganography. Res. J. Inform. Technol., 5: 171-180. CrossRefDirect Link |
Janakiraman, S., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2012. Pixel forefinger for gray in color: A layer by layer stego. Inform. Technol. J., 11: 9-19. CrossRefDirect Link |
Jiaohua Qin, Xuyu Xiang, Yu Deng, Youyun Li, Lili Pan 2014. Steganalysis of Highly Undetectable Steganography Using Convolution Filtering Inform. Technol. J., 13: 2588-2592. CrossRef |
M. Padmaa, Y. Venkataramani 2014. Random Image Steganography using Pixel Indicator to Enhance Hiding Capacity J. Applied Sci., 14: 1798-1808. CrossRef |
Padmaa, M., Y. Venkataramani and R. Amirtharajan, 2011. Stego on 2n: 1 Platform for users and embedding. Inform. Technol. J., 10: 1896-1907. CrossRefDirect Link |
Praveenkumar, P., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Data puncturing in OFDM channel: A multicarrier stego. Inform. Technol. J., 13: 2037-2041. CrossRefDirect Link |
Praveenkumar, P., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Inserted embedding in OFDM channel: A multicarrier stego. Inform. Technol. J., 13: 2017-2021. CrossRefDirect Link |
Rajagopalan, S., R. Amirtharajan, H.N. Upadhyay and J.B.B. Rayappan, 2012. Survey and analysis of hardware cryptographic and steganographic systems on FPGA. J. Applied Sci., 12: 201-210. CrossRefDirect Link |
Thanikaiselvan, V., P. Arulmozhivarman, J.B.B. Rayappan and R. Amirtharajan, 2012. Graceful graph for graceful security-towards a STE (G) Raph. Res. J. Inform. Technol., 4: 220-227. CrossRefDirect Link |
Xia, B., X. Sun, L. Xiang, H. Luo and H. Yang, 2011. Detection of LSB matching steganography using neighborhood node degree characteristics. Inform. Technol. J., 10: 1601-1607. CrossRefDirect Link |
Citation to this article as recorded by
Computer Vision – ECCV 2018 Lecture Notes in Computer Science |
Dual-Layer Barcodes Lecture Notes in Computer Science |
A Hybrid Secured Approach Combining LSB Steganography and AES Using Mosaic Images for Ensuring Data Security SN Computer Science Vol. 3, Issue 2, , 2022 |
Detection of LSB Matching Steganography using Neighborhood Node Degree Characteristics Information Technology Journal Vol. 10, Issue 8, 1601, 2011 |
Stego on 2n:1 Platform for Users and Embedding Information Technology Journal Vol. 10, Issue 10, 1896, 2011 |
Random Image Steganography and Steganalysis: Present Status and Future Directions Information Technology Journal Vol. 11, Issue 5, 566, 2012 |
Inverted Pattern in Inverted Time Domain for Icon Steganography Information Technology Journal Vol. 11, Issue 5, 587, 2012 |
Pixel Forefinger for Gray in Color: A Layer by Layer Stego Information Technology Journal Vol. 11, Issue 1, 9, 2012 |
Survey and Analysis of Hardware Cryptographic and Steganographic Systems on FPGA Journal of Applied Sciences Vol. 12, Issue 3, 201, 2012 |
How to cite this article
Jiaohua Qin, Xuyu Xiang and Meng Xian Wang, 2010. A Review on Detection of LSB Matching Steganography. Information Technology Journal, 9: 1725-1738.
DOI: 10.3923/itj.2010.1725.1738
URL: https://scialert.net/abstract/?doi=itj.2010.1725.1738
DOI: 10.3923/itj.2010.1725.1738
URL: https://scialert.net/abstract/?doi=itj.2010.1725.1738