Review Article

Citations for "A Review on Detection of LSB Matching Steganography"


Citation to this article as recorded by ASCI logo


Amirtharajan, R. and J.B.B. Rayappan, 2012. Brownian motion of binary and gray-binary and gray bits in image for stego. J. Applied Sci., 12: 428-439.
CrossRef  |  Direct Link  |  

Amirtharajan, R. and J.B.B. Rayappan, 2012. Inverted pattern in inverted time domain for icon steganography. Inform. Technol. J., 11: 587-595.
CrossRef  |  Direct Link  |  

Amirtharajan, R. and J.B.B. Rayappan, 2012. Pixel authorized by pixel to trace with SFC on image to sabotage data mugger: A comparative study on PI stego. Res. J. Inform. Technol., 4: 124-139.
CrossRef  |  Direct Link  |  

Amirtharajan, R. and J.B.B. Rayappan, 2013. Steganography-time to time: A review. Res. J. Inform. Technol., 5: 53-66.
CrossRef  |  Direct Link  |  

Amirtharajan, R., G. Devipriya, V. Thanikaiselvan and J.B.B. Rayappan, 2013. High capacity triple plane embedding: A colour stego. Res. J. Inform. Technol., 5: 373-382.
CrossRef  |  Direct Link  |  

Amirtharajan, R., J. Qin and J.B.B. Rayappan, 2012. Random image steganography and steganalysis: Present status and future directions. Inform. Technol. J., 11: 566-576.
CrossRef  |  Direct Link  |  

Amirtharajan, R., J.H.S. Karthikesh, M.N. Reddy, C.S.H. Kaushik and J.B.B. Rayappan, 2013. Compressed and encrypted secret hides in image for rugged stego. Res. J. Inform. Technol., 5: 234-241.
CrossRef  |  Direct Link  |  

Amirtharajan, R., K. Karthikeyan, M. Malleswaran and J.B.B. Rayappan, 2013. Kubera kolam: A way for random image steganography. Res. J. Inform. Technol., 5: 304-316.
CrossRef  |  Direct Link  |  

Amirtharajan, R., K.M. Ashfaaq, A.K. Infant and J.B.B. Rayappan, 2013. High performance pixel indicator for colour image steganography. Res. J. Inform. Technol., 5: 277-290.
CrossRef  |  Direct Link  |  

Amirtharajan, R., M.V. Abhiram, G. Revathi, J.B. Reddy, V. Thanikaiselvan and J.B.B. Rayappan, 2013. Rubik's cube: A way for random image steganography. Res. J. Inform. Technol., 5: 329-340.
CrossRef  |  Direct Link  |  

Amirtharajan, R., P.S. Priya and J.B.B. Rayappan, 2013. Pixel indicated user indicator: A muxed stego. Res. J. Inform. Technol., 5: 73-86.
CrossRef  |  Direct Link  |  

Amirtharajan, R., R. Anushiadevi, V. Meena, V. Kalpana and J.B.B. Rayappan, 2013. Concealed to protect and protect to conceal: A conserved stego image. Res. J. Inform. Technol., 5: 209-217.
CrossRef  |  Direct Link  |  

Amirtharajan, R., R. Subrahmanyam, J.N. Teja, K.M. Reddy and J.B.B. Rayappan, 2013. Pixel indicated triple layer: A way for random image steganography. Res. J. Inform. Technol., 5: 87-99.
CrossRef  |  Direct Link  |  

Amirtharajan, R., V. Mahalakshmi, J. Nandhini, R. Kavitha and J.B.B. Rayappan, 2013. Key decided cover for random image steganography. Res. J. Inform. Technol., 5: 171-180.
CrossRef  |  Direct Link  |  

Janakiraman, S., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2012. Pixel forefinger for gray in color: A layer by layer stego. Inform. Technol. J., 11: 9-19.
CrossRef  |  Direct Link  |  

Jiaohua Qin, Xuyu Xiang, Yu Deng, Youyun Li, Lili Pan 2014. Steganalysis of Highly Undetectable Steganography Using Convolution Filtering Inform. Technol. J., 13: 2588-2592.
CrossRef  |  

M. Padmaa, Y. Venkataramani 2014. Random Image Steganography using Pixel Indicator to Enhance Hiding Capacity J. Applied Sci., 14: 1798-1808.
CrossRef  |  

Padmaa, M., Y. Venkataramani and R. Amirtharajan, 2011. Stego on 2n: 1 Platform for users and embedding. Inform. Technol. J., 10: 1896-1907.
CrossRef  |  Direct Link  |  

Praveenkumar, P., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Data puncturing in OFDM channel: A multicarrier stego. Inform. Technol. J., 13: 2037-2041.
CrossRef  |  Direct Link  |  

Praveenkumar, P., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Inserted embedding in OFDM channel: A multicarrier stego. Inform. Technol. J., 13: 2017-2021.
CrossRef  |  Direct Link  |  

Rajagopalan, S., R. Amirtharajan, H.N. Upadhyay and J.B.B. Rayappan, 2012. Survey and analysis of hardware cryptographic and steganographic systems on FPGA. J. Applied Sci., 12: 201-210.
CrossRef  |  Direct Link  |  

Thanikaiselvan, V., P. Arulmozhivarman, J.B.B. Rayappan and R. Amirtharajan, 2012. Graceful graph for graceful security-towards a STE (G) Raph. Res. J. Inform. Technol., 4: 220-227.
CrossRef  |  Direct Link  |  

Xia, B., X. Sun, L. Xiang, H. Luo and H. Yang, 2011. Detection of LSB matching steganography using neighborhood node degree characteristics. Inform. Technol. J., 10: 1601-1607.
CrossRef  |  Direct Link  |  


Citations in impact factor journal as recorded by Crossref logo


LSB steganography detection in monochromatic still images using artificial neural networks
Multimedia Tools and Applications


Citation to this article as recorded by Crossref logo


Dual-Layer Barcodes
Lecture Notes in Computer Science

A Hybrid Secured Approach Combining LSB Steganography and AES Using Mosaic Images for Ensuring Data Security
SN Computer Science Vol. 3, Issue 2, , 2022

Detection of LSB Matching Steganography using Neighborhood Node Degree Characteristics
Information Technology Journal Vol. 10, Issue 8, 1601, 2011

Stego on 2n:1 Platform for Users and Embedding
Information Technology Journal Vol. 10, Issue 10, 1896, 2011

Random Image Steganography and Steganalysis: Present Status and Future Directions
Information Technology Journal Vol. 11, Issue 5, 566, 2012

Inverted Pattern in Inverted Time Domain for Icon Steganography
Information Technology Journal Vol. 11, Issue 5, 587, 2012

Pixel Forefinger for Gray in Color: A Layer by Layer Stego
Information Technology Journal Vol. 11, Issue 1, 9, 2012

Survey and Analysis of Hardware Cryptographic and Steganographic Systems on FPGA
Journal of Applied Sciences Vol. 12, Issue 3, 201, 2012

Services
Related Articles in ASCI
Search in Google Scholar
View Citation
Report Citation

 
©  2022 Science Alert. All Rights Reserved