Citations in impact factor journals
A Secure Steganographic Algorithm Based on Frequency Domain for
the Transmission of Hidden Information Security and Communication Networks |
Citation to this article as recorded by
Amirtharajan, R. and J.B.B. Rayappan, 2012. Brownian motion of binary and gray-binary and gray bits in image for stego. J. Applied Sci., 12: 428-439. CrossRefDirect Link |
Amirtharajan, R. and J.B.B. Rayappan, 2012. Inverted pattern in inverted time domain for icon steganography. Inform. Technol. J., 11: 587-595. CrossRefDirect Link |
Amirtharajan, R. and J.B.B. Rayappan, 2013. Steganography-time to time: A review. Res. J. Inform. Technol., 5: 53-66. CrossRefDirect Link |
Amirtharajan, R., G. Aishwarya, M.S.K. Karthik, V. Thanikaiselvan and J.B.B. Rayappan, 2013. Bio-hiding for smart swipe card: A secret security. Res. J. Inform. Technol., 5: 100-112. CrossRefDirect Link |
Amirtharajan, R., G. Devipriya, V. Thanikaiselvan and J.B.B. Rayappan, 2013. High capacity triple plane embedding: A colour stego. Res. J. Inform. Technol., 5: 373-382. CrossRefDirect Link |
Amirtharajan, R., I. Rosaline, R. Swamy, S. Pavan and R. Sridevi et al., 2014. Cover G for 3 and 4 G-A Stego Product Inf. Technol. J., 13: 1977-1984. CrossRefDirect Link |
Amirtharajan, R., J. Qin and J.B.B. Rayappan, 2012. Random image steganography and steganalysis: Present status and future directions. Inform. Technol. J., 11: 566-576. CrossRefDirect Link |
Amirtharajan, R., J.H.S. Karthikesh, M.N. Reddy, C.S.H. Kaushik and J.B.B. Rayappan, 2013. Compressed and encrypted secret hides in image for rugged stego. Res. J. Inform. Technol., 5: 234-241. CrossRefDirect Link |
Amirtharajan, R., K. Karthikeyan, M. Malleswaran and J.B.B. Rayappan, 2013. Kubera kolam: A way for random image steganography. Res. J. Inform. Technol., 5: 304-316. CrossRefDirect Link |
Amirtharajan, R., K.M. Ashfaaq, A.K. Infant and J.B.B. Rayappan, 2013. High performance pixel indicator for colour image steganography. Res. J. Inform. Technol., 5: 277-290. CrossRefDirect Link |
Amirtharajan, R., M.V. Abhiram, G. Revathi, J.B. Reddy, V. Thanikaiselvan and J.B.B. Rayappan, 2013. Rubik's cube: A way for random image steganography. Res. J. Inform. Technol., 5: 329-340. CrossRefDirect Link |
Amirtharajan, R., P.S. Priya and J.B.B. Rayappan, 2013. Pixel indicated user indicator: A muxed stego. Res. J. Inform. Technol., 5: 73-86. CrossRefDirect Link |
Amirtharajan, R., R. Anushiadevi, V. Meena, V. Kalpana and J.B.B. Rayappan, 2013. Concealed to protect and protect to conceal: A conserved stego image. Res. J. Inform. Technol., 5: 209-217. CrossRefDirect Link |
Amirtharajan, R., R. Anushiadevi, V. Meena, V. Kalpana and J.B.B. Rayappan, 2013. Image hides image: A secret stego tri-layer approach. Res. J. Inform. Technol., 5: 249-255. CrossRefDirect Link |
Amirtharajan, R., R. Subrahmanyam, J.N. Teja, K.M. Reddy and J.B.B. Rayappan, 2013. Pixel indicated triple layer: A way for random image steganography. Res. J. Inform. Technol., 5: 87-99. CrossRefDirect Link |
Amirtharajan, R., S.D. Roy, N. Nesakumar, M. Chandrasekar, R. Sridevi and J.B.B. Rayappan, 2013. Mind game for cover steganography: A refuge. Res. J. Inform. Technol., 5: 137-148. CrossRefDirect Link |
Amirtharajan, R., V. Mahalakshmi, J. Nandhini, R. Kavitha and J.B.B. Rayappan, 2013. Key decided cover for random image steganography. Res. J. Inform. Technol., 5: 171-180. CrossRefDirect Link |
Amirtharajan, R., V. Rajesh, P. Archana and J.B.B. Rayappan, 2013. Pixel indicates, standard deviates: A way for random image steganography. Res. J. Inform. Technol., 5: 383-392. CrossRefDirect Link |
Janakiraman, S., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2012. Pixel forefinger for gray in color: A layer by layer stego. Inform. Technol. J., 11: 9-19. CrossRefDirect Link |
M. Padmaa, Y. Venkataramani 2014. Random Image Steganography using Pixel Indicator to Enhance Hiding Capacity J. Applied Sci., 14: 1798-1808. CrossRef |
Padmaa, M. and Y. Venkataramani, 2014. Adaptive data hiding based on visual cryptography. J. Applied Sci., 14: 1674-1688. CrossRefDirect Link |
Padmaa, M., Y. Venkataramani and R. Amirtharajan, 2011. Stego on 2n: 1 Platform for users and embedding. Inform. Technol. J., 10: 1896-1907. CrossRefDirect Link |
Praveenkumar, P., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Data puncturing in OFDM channel: A multicarrier stego. Inform. Technol. J., 13: 2037-2041. CrossRefDirect Link |
Praveenkumar, P., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Inserted embedding in OFDM channel: A multicarrier stego. Inform. Technol. J., 13: 2017-2021. CrossRefDirect Link |
Praveenkumar, P., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Reversible steganography on OFDM channel-a role of RS coding. Inform. Technol. J., 13: 2052-2056. CrossRefDirect Link |
Praveenkumar, P., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2013. Can we reduce PAPR? OFDM+PTS+SLM+STEGO: A novel approach. Asian J. Sci. Res., 6: 38-52. CrossRefDirect Link |
Rajagopalan, S., H.N. Upadhyay, S. Varadarajan, J.B.B. Rayappan and R. Amirtharajan, 2014. Gyratory assisted info hide-a nibble differencing for message embedding. Inform. Technol. J., 13: 2005-2010. CrossRefDirect Link |
Rajagopalan, S., K. Pravallika, R. Radha, H.N. Upadhyay, J.B.B. Rayappan and R. Amirtharajan, 2014. Stego on song-an amalgam of VI and FPGA for hardware info hide. Inform. Technol. J., 13: 1992-1998. CrossRefDirect Link |
Rajagopalan, S., P.J.S. Prabhakar, M.S. Kumar, N.V.M. Nikhil, H.N. Upadhyay, J.B.B. Rayappan and R. Amirtharajan, 2014. MSB based embedding with integrity: An adaptive RGB Stego on FPGA platform. Inform. Technol. J., 13: 1945-1952. CrossRefDirect Link |
Rajagopalan, S., Y. Ravishankar, H.N. Upadhyay, J.B.B. Rayappan and R. Amirtharajan, 2014. Modeling combo PR generator for Stego Storage Self Test (SSST). Inform. Technol. J., 13: 1936-1944. CrossRefDirect Link |
Thanikaiselvan, V. and P. Arulmozhivarman, 2013. Horse communication against harsh attack: A stego ride. Res. J. Inf. Technol., 5: 263-276. CrossRefDirect Link |
Thanikaiselvan, V., K. Santosh, D. Manikanta and R. Amirtharajan, 2013. A new steganography algorithm against chi square attack. Res. J. Inform. Technol., 5: 363-372. CrossRefDirect Link |
Thanikaiselvan, V., P. Arulmozhivarman, J.B.B. Rayappan and R. Amirtharajan, 2012. Graceful graph for graceful security-towards a STE (G) Raph. Res. J. Inform. Technol., 4: 220-227. CrossRefDirect Link |
Wang Li, Gang Luo, Lingyun Xiang 2014. An Automatically Changing Feature Method based on Chaotic Encryption Inform. Technol. J., 13: 2404-2410. CrossRef |
Citation to this article as recorded by
Image steganography using exploiting modification direction for compressed encrypted data Journal of King Saud University - Computer and Information Sciences |
Stego on 2n:1 Platform for Users and Embedding Information Technology Journal Vol. 10, Issue 10, 1896, 2011 |
Random Image Steganography and Steganalysis: Present Status and Future Directions Information Technology Journal Vol. 11, Issue 5, 566, 2012 |
Inverted Pattern in Inverted Time Domain for Icon Steganography Information Technology Journal Vol. 11, Issue 5, 587, 2012 |
Pixel Forefinger for Gray in Color: A Layer by Layer Stego Information Technology Journal Vol. 11, Issue 1, 9, 2012 |
How to cite this article
Omid Zanganeh and Subariah Ibrahim, 2011. Adaptive Image Steganography Based on Optimal Embedding and Robust Against Chi-square Attack. Information Technology Journal, 10: 1285-1294.
DOI: 10.3923/itj.2011.1285.1294
URL: https://scialert.net/abstract/?doi=itj.2011.1285.1294
DOI: 10.3923/itj.2011.1285.1294
URL: https://scialert.net/abstract/?doi=itj.2011.1285.1294