Citations in impact factor journals
Adaptive reversible data hiding scheme for AMBTC compressed images Multimedia Tools and Applications Vol. 79, Issue 9-10, 6547, 2020 |
Citation to this article as recorded by
Amirtharajan, R. and J.B.B. Rayappan, 2013. Steganography-time to time: A review. Res. J. Inform. Technol., 5: 53-66. CrossRefDirect Link |
Amirtharajan, R., G. Aishwarya, M.S.K. Karthik, V. Thanikaiselvan and J.B.B. Rayappan, 2013. Bio-hiding for smart swipe card: A secret security. Res. J. Inform. Technol., 5: 100-112. CrossRefDirect Link |
Amirtharajan, R., G. Devipriya, V. Thanikaiselvan and J.B.B. Rayappan, 2013. High capacity triple plane embedding: A colour stego. Res. J. Inform. Technol., 5: 373-382. CrossRefDirect Link |
Amirtharajan, R., J. Qin and J.B.B. Rayappan, 2012. Random image steganography and steganalysis: Present status and future directions. Inform. Technol. J., 11: 566-576. CrossRefDirect Link |
Amirtharajan, R., J.H.S. Karthikesh, M.N. Reddy, C.S.H. Kaushik and J.B.B. Rayappan, 2013. Compressed and encrypted secret hides in image for rugged stego. Res. J. Inform. Technol., 5: 234-241. CrossRefDirect Link |
Amirtharajan, R., K. Karthikeyan, M. Malleswaran and J.B.B. Rayappan, 2013. Kubera kolam: A way for random image steganography. Res. J. Inform. Technol., 5: 304-316. CrossRefDirect Link |
Amirtharajan, R., K.M. Ashfaaq, A.K. Infant and J.B.B. Rayappan, 2013. High performance pixel indicator for colour image steganography. Res. J. Inform. Technol., 5: 277-290. CrossRefDirect Link |
Amirtharajan, R., M.V. Abhiram, G. Revathi, J.B. Reddy, V. Thanikaiselvan and J.B.B. Rayappan, 2013. Rubik's cube: A way for random image steganography. Res. J. Inform. Technol., 5: 329-340. CrossRefDirect Link |
Amirtharajan, R., P.S. Priya and J.B.B. Rayappan, 2013. Pixel indicated user indicator: A muxed stego. Res. J. Inform. Technol., 5: 73-86. CrossRefDirect Link |
Amirtharajan, R., R. Subrahmanyam, J.N. Teja, K.M. Reddy and J.B.B. Rayappan, 2013. Pixel indicated triple layer: A way for random image steganography. Res. J. Inform. Technol., 5: 87-99. CrossRefDirect Link |
Amirtharajan, R., V. Mahalakshmi, J. Nandhini, R. Kavitha and J.B.B. Rayappan, 2013. Key decided cover for random image steganography. Res. J. Inform. Technol., 5: 171-180. CrossRefDirect Link |
Amirtharajan, R., V. Rajesh, P. Archana and J.B.B. Rayappan, 2013. Pixel indicates, standard deviates: A way for random image steganography. Res. J. Inform. Technol., 5: 383-392. CrossRefDirect Link |
Janakiraman, S., K. Thenmozhi, S. Rajagopalan, H.N. Upadhyay, J.B.B. Rayappan and R. Amirtharajan, 2014. Space filling curve for data filling: An embedded security approach. Res. J. Inform. Technol., 6: 188-197. CrossRefDirect Link |
Li, Y.W. and W. Hong, 2012. An improved reversible data hiding method using alternative location map embedment strategy. Inform. Technol. J., 11: 1109-1114. CrossRefDirect Link |
M. Padmaa, Y. Venkataramani 2014. Encrypted Secret Blend with Image Steganography for Enhanced Imperceptibility and Capacity Res. J. Inform. Technol., 6: 342-355. CrossRef |
M. Padmaa, Y. Venkataramani 2014. Random Image Steganography using Pixel Indicator to Enhance Hiding Capacity J. Applied Sci., 14: 1798-1808. CrossRef |
Padmaa, M. and Y. Venkataramani, 2014. Adaptive data hiding based on visual cryptography. J. Applied Sci., 14: 1674-1688. CrossRefDirect Link |
Rajagopalan, S., H.N. Upadhyay, J.B.B. Rayappan and R. Amirtharajan, 2014. Dual cellular automata on FPGA: An image encryptors chip. Res. J. Inform. Technol., 6: 223-236. CrossRefDirect Link |
Rajagopalan, S., H.N. Upadhyay, J.B.B. Rayappan and R. Amirtharajan, 2014. Galois field proficient product for secure image encryption on FPGA. Res. J. Inform. Technol., 6: 308-324. CrossRefDirect Link |
Rajagopalan, S., H.N. Upadhyay, J.B.B. Rayappan and R. Amirtharajan, 2014. Logic elements consumption analysis of cellular automata based image encryption on FPGA. Res. J. Inform. Technol., 6: 291-307. CrossRefDirect Link |
Rajagopalan, S., H.N. Upadhyay, S. Varadarajan, J.B.B. Rayappan and R. Amirtharajan, 2014. Gyratory assisted info hide-a nibble differencing for message embedding. Inform. Technol. J., 13: 2005-2010. CrossRefDirect Link |
Rajagopalan, S., S. Janakiraman, B. Swaminath, H.N. Upadhyay, K. Thenmozhi and R. Amirtharajan, 2014. LabVIEW based PIN hider on ATM cards: A transform domain secret concealment approach. Res. J. Inform. Technol., 6: 154-165. CrossRefDirect Link |
Thanikaiselvan, V., S. Subashanthini and R. Amirtharajan, 2014. PVD based steganography on scrambled RGB cover images with pixel indicator. J. Artif. Intell., 7: 54-68. CrossRefDirect Link |
Yang, H. and J. Yin, 2012. An adaptive block truncation coding algorithm based on data hiding. Inform. Technol. J., 11: 647-650. CrossRefDirect Link |
Zhao, Z., G. Kang and R. Guo, 2012. Reversible data hiding based on orthogonal prediction error modification and multilevel histogram shifting. Inform. Technol. J., 11: 1077-1083. CrossRef |
How to cite this article
Nur Mohammad, Xingming Sun and Hengfu Yang, 2011. An Excellent Image Data Hiding Algorithm Based on BTC. Information Technology Journal, 10: 1415-1420.
DOI: 10.3923/itj.2011.1415.1420
URL: https://scialert.net/abstract/?doi=itj.2011.1415.1420
DOI: 10.3923/itj.2011.1415.1420
URL: https://scialert.net/abstract/?doi=itj.2011.1415.1420