• [email protected]
  • +971 507 888 742
Submit Manuscript
SciAlert
  • Home
  • Journals
  • Information
    • For Authors
    • For Referees
    • For Librarian
    • For Societies
  • Contact
  1. Information Technology Journal
  2. Vol 10 (5), 2011
  3. 992-1000
  • Online First
  • Current Issue
  • Previous Issues
  • More Information
    Aims and Scope Editorial Board Guide to Authors Article Processing Charges
    Submit a Manuscript

Information Technology Journal

Year: 2011 | Volume: 10 | Issue: 5 | Page No.: 992-1000
DOI: 10.3923/itj.2011.992.1000

Facebook Twitter Digg Reddit Linkedin StumbleUpon E-mail

Article Trend



Total views 61

Authors


Lingyun Xiang

Country: China

Xingming Sun

Country: China

Yuling Liu

Country: China

Hengfu Yang

Country: China

Keywords


  • embedding bit rate
  • linguistic steganography
  • multiple choice questions
  • steganalysis
  • Steganography
Research Article

A Secure Steganographic Method via Multiple Choice Questions

Lingyun Xiang, Xingming Sun, Yuling Liu and Hengfu Yang
PDF Abstract Fulltext XML References

Citations in impact factor journals

Preparation and characterization of mucilage polysaccharide for biomedical applications
Carbohydrate Polymers Vol. 98, Issue 1, 89, 2013
Extended FEM modelling of crack propagation using the semi-circular bending test
Construction and Building Materials
A review on human health perspective of air pollution with respect to allergies and asthma
Environment International
Development and application of a predictive model of Aspergillus candidus growth as a tool to improve shelf life of bakery products
Food Microbiology Vol. 36, Issue 2, 254, 2013
Line shape analysis of the Raman spectra from pure and mixed biofuels esters compounds
Fuel
Open-cell cavity-integrated injection-molded acoustic polypropylene foams
Materials & Design
Glycerol production and its applications as a raw material: A review
Renewable and Sustainable Energy Reviews
Mass propagation of Dendrobium ‘Zahra FR 62’, a new hybrid used for cut flowers, using bioreactor culture
Scientia Horticulturae
Sweetpotato plant regeneration via an improved somatic embryogenesis protocol
Scientia Horticulturae
Effect of aminoethoxyvinylglycine and 1-methylcyclopropene on leaf abscission and root formation in Corymbia and Eucalyptus cuttings
Scientia Horticulturae
Enrichment implication of froth flotation kinetics in the separation and recovery of metal values from printed circuit boards
Separation and Purification Technology
Extraction of lane markings using orientation and vanishing point constraints in structured road scenes
International Journal of Computer Mathematics
An Optimized EMA-RAPD-PCR for a Reliable Detection of Viable Salmonella spp. in Chicken Products
Journal of Food Safety Vol. 33, Issue 3, 247, 2013
Prevalence of Escherichia coli  O157 : H7 and Their Verotoxins and Salmonella spp. in Processed Poultry Products
Journal of Food Safety Vol. 33, Issue 3, 313, 2013
Sequencing and Homological Analysis of Silver Fox TYR Gene
Asian Journal of Animal and Veterinary Advances Vol. 8, Issue 5, 754, 2013
The Pros and Cons of the In-silico Pharmaco-toxicology in Drug Discovery and Development
International Journal of Pharmacology Vol. 9, Issue 3, 176, 2013
Presence of Laxative and Antidiarrheal Activities in Periploca aphylla: A Saudi Medicinal Plant
International Journal of Pharmacology Vol. 9, Issue 3, 190, 2013
Centratherum anthelminticum (L.) Kuntze a Potential Medicinal Plant with Pleiotropic Pharmacological and Biological Activities
International Journal of Pharmacology Vol. 9, Issue 3, 211, 2013

Citation to this article as recorded by ASCI logo

Ab Aziz, M.J. and A.M. Hendr, 2012. Translation of classical arabic language to English. J. Applied Sci., 12: 781-786.
CrossRef

Amirtharajan, R. and J.B.B. Rayappan, 2012. Brownian motion of binary and gray-binary and gray bits in image for stego. J. Applied Sci., 12: 428-439.
CrossRefDirect Link

Amirtharajan, R. and J.B.B. Rayappan, 2012. Inverted pattern in inverted time domain for icon steganography. Inform. Technol. J., 11: 587-595.
CrossRefDirect Link

Amirtharajan, R. and J.B.B. Rayappan, 2012. Pixel authorized by pixel to trace with SFC on image to sabotage data mugger: A comparative study on PI stego. Res. J. Inform. Technol., 4: 124-139.
CrossRefDirect Link

Amirtharajan, R. and J.B.B. Rayappan, 2013. Steganography-time to time: A review. Res. J. Inform. Technol., 5: 53-66.
CrossRefDirect Link

Amirtharajan, R., G. Aishwarya, M.S.K. Karthik, V. Thanikaiselvan and J.B.B. Rayappan, 2013. Bio-hiding for smart swipe card: A secret security. Res. J. Inform. Technol., 5: 100-112.
CrossRefDirect Link

Amirtharajan, R., G. Devipriya, V. Thanikaiselvan and J.B.B. Rayappan, 2013. High capacity triple plane embedding: A colour stego. Res. J. Inform. Technol., 5: 373-382.
CrossRefDirect Link

Amirtharajan, R., I. Rosaline, R. Swamy, S. Pavan and R. Sridevi et al., 2014. Cover G for 3 and 4 G-A Stego Product Inf. Technol. J., 13: 1977-1984.
CrossRefDirect Link

Amirtharajan, R., J. Qin and J.B.B. Rayappan, 2012. Random image steganography and steganalysis: Present status and future directions. Inform. Technol. J., 11: 566-576.
CrossRefDirect Link

Amirtharajan, R., J.H.S. Karthikesh, M.N. Reddy, C.S.H. Kaushik and J.B.B. Rayappan, 2013. Compressed and encrypted secret hides in image for rugged stego. Res. J. Inform. Technol., 5: 234-241.
CrossRefDirect Link

Amirtharajan, R., K. Karthikeyan, M. Malleswaran and J.B.B. Rayappan, 2013. Kubera kolam: A way for random image steganography. Res. J. Inform. Technol., 5: 304-316.
CrossRefDirect Link

Amirtharajan, R., K.M. Ashfaaq, A.K. Infant and J.B.B. Rayappan, 2013. High performance pixel indicator for colour image steganography. Res. J. Inform. Technol., 5: 277-290.
CrossRefDirect Link

Amirtharajan, R., M.V. Abhiram, G. Revathi, J.B. Reddy, V. Thanikaiselvan and J.B.B. Rayappan, 2013. Rubik's cube: A way for random image steganography. Res. J. Inform. Technol., 5: 329-340.
CrossRefDirect Link

Amirtharajan, R., P. Muralidharan, R. Rajesh, R. Sridevi and J.B.B. Rayappan, 2013. Short message (service) as key for steganography. Res. J. Inform. Technol., 5: 113-124.
CrossRefDirect Link

Amirtharajan, R., P.S. Priya and J.B.B. Rayappan, 2013. Pixel indicated user indicator: A muxed stego. Res. J. Inform. Technol., 5: 73-86.
CrossRefDirect Link

Amirtharajan, R., R. Subrahmanyam, J.N. Teja, K.M. Reddy and J.B.B. Rayappan, 2013. Pixel indicated triple layer: A way for random image steganography. Res. J. Inform. Technol., 5: 87-99.
CrossRefDirect Link

Amirtharajan, R., S.D. Roy, N. Nesakumar, M. Chandrasekar, R. Sridevi and J.B.B. Rayappan, 2013. Mind game for cover steganography: A refuge. Res. J. Inform. Technol., 5: 137-148.
CrossRefDirect Link

Amirtharajan, R., V. Mahalakshmi, J. Nandhini, R. Kavitha and J.B.B. Rayappan, 2013. Key decided cover for random image steganography. Res. J. Inform. Technol., 5: 171-180.
CrossRefDirect Link

Amirtharajan, R., V. Rajesh, P. Archana and J.B.B. Rayappan, 2013. Pixel indicates, standard deviates: A way for random image steganography. Res. J. Inform. Technol., 5: 383-392.
CrossRefDirect Link

M. Padmaa, Y. Venkataramani 2014. Random Image Steganography using Pixel Indicator to Enhance Hiding Capacity J. Applied Sci., 14: 1798-1808.
CrossRef

Padmaa, M. and Y. Venkataramani, 2014. Adaptive data hiding based on visual cryptography. J. Applied Sci., 14: 1674-1688.
CrossRefDirect Link

Praveenkumar, P., G.S. Hemalatha, B. Reddy, K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Secret link through simulink: A stego on OFDM channel. Inform. Technol. J., 13: 1999-2004.
CrossRefDirect Link

Citation to this article as recorded by Crossref logo

Capparis spinosa L. (Caper) fruit extract in treatment of type 2 diabetic patients: A randomized double-blind placebo-controlled clinical trial
Complementary Therapies in Medicine
Tourism–growth nexus in Pakistan: Evidence from ARDL bounds tests
Economic Modelling
New phospho-silicate and niobo-phospho-silicate MCF materials modified with MPTMS – Structure, surface and catalytic properties
Microporous and Mesoporous Materials
IDENTIFICATION OF GRANULAR SOILS STRENGTH AND STIFFNESS PARAMETERS BY MATCHING FINITE ELEMENT RESULTS TO PMT DATA
International Journal of Computational Methods
Random Image Steganography and Steganalysis: Present Status and Future Directions
Information Technology Journal Vol. 11, Issue 5, 566, 2012
Inverted Pattern in Inverted Time Domain for Icon Steganography
Information Technology Journal Vol. 11, Issue 5, 587, 2012
Automatic Verification of Security Properties of OAuth 2.0 Protocol with Cryptoverif in Computational Model
Information Technology Journal Vol. 12, Issue 12, 2273, 2013
Efficient Data Gathering based on Linear Regression in Wireless Multivariate Monitoring Sensor Networks
Information Technology Journal Vol. 12, Issue 12, 2286, 2013
A Survey of Techniques for VLSI IP Protection
Information Technology Journal Vol. 12, Issue 12, 2324, 2013
A Novel Multi Pursuers-one Evader Game based on Quantum Game Theory
Information Technology Journal Vol. 12, Issue 12, 2358, 2013
Topology Control Research of Monitor Network Based on PID of Self-adaptive Hierarchical Genetic Algorithm
Information Technology Journal Vol. 12, Issue 12, 2374, 2013
Research on Resource Scheduling Algorithm Based on ForCES Network
Information Technology Journal Vol. 12, Issue 12, 2419, 2013
Central Limit Theorem based Cellular Automata for Generating Normal Random Numbers
Information Technology Journal Vol. 12, Issue 12, 2440, 2013
Theobromine Toxicity and Remediation of Cocoa By-products: An Overview
Journal of Biological Sciences Vol. 13, Issue 7, 570, 2013
Fish Assemblage of Majidun Creek, Lagos, Nigeria
Journal of Biological Sciences Vol. 13, Issue 7, 577, 2013
Isolation and Characterization of Unidentified Listeria Strains Showing Phenotypic and Genetic Similarities to a Novel Group of Listeria Species from Malaysian Pekin Ducks
Journal of Biological Sciences Vol. 13, Issue 7, 614, 2013
Relationships Between Site Factors and Bark Beetle Attack on Pine Trees
Journal of Biological Sciences Vol. 13, Issue 7, 621, 2013
Prospective Analysis of Poisoning Cases in a Super Specialty Hospital in India
Journal of Pharmacology and Toxicology Vol. 8, Issue 2, 60, 2013
Bio-hiding for Smart Swipe Card: A Secret Security
Research Journal of Information Technology Vol. 5, Issue 2, 100, 2013
Short Message (Service) as Key for Steganography
Research Journal of Information Technology Vol. 5, Issue 2, 113, 2013
Mind Game for Cover Steganography: A Refuge
Research Journal of Information Technology Vol. 5, Issue 2, 137, 2013
Captivating CODEC Stego (CCS): A Cover on Camouflage
Research Journal of Information Technology Vol. 5, Issue 2, 160, 2013
Key Decided Cover for Random Image Steganography
Research Journal of Information Technology Vol. 5, Issue 2, 171, 2013
Graceful Labeling of Assignable Information Hiding in Image
Research Journal of Information Technology Vol. 5, Issue 2, 181, 2013
AAAM-face Based Authentication System for Information Security
Research Journal of Information Technology Vol. 5, Issue 2, 200, 2013
Concealed to Protect and Protect to Conceal: A Conserved Stego Image
Research Journal of Information Technology Vol. 5, Issue 2, 209, 2013
Hash Encrypted Synchronized OFDM
Research Journal of Information Technology Vol. 5, Issue 2, 218, 2013
Compressed and Encrypted Secret Hides in Image for Rugged Stego
Research Journal of Information Technology Vol. 5, Issue 2, 234, 2013
Image Hides Image: A Secret Stego Tri-layer Approach
Research Journal of Information Technology Vol. 5, Issue 2, 249, 2013
Augmented Reality in Security Systems
Research Journal of Information Technology Vol. 5, Issue 2, 256, 2013
Horse Communication against Harsh Attack: A Stego Ride
Research Journal of Information Technology Vol. 5, Issue 3, 263, 2013
High Performance Pixel indicator For Colour Image Steganography
Research Journal of Information Technology Vol. 5, Issue 3, 277, 2013
Kubera Kolam: A Way for Random Image Steganography
Research Journal of Information Technology Vol. 5, Issue 3, 304, 2013
Random Abrasion on Image for Security Magnification
Research Journal of Information Technology Vol. 5, Issue 3, 317, 2013
Rubik's Cube: A Way for Random Image Steganography
Research Journal of Information Technology Vol. 5, Issue 3, 329, 2013
Why Image Encryption for Better Steganography
Research Journal of Information Technology Vol. 5, Issue 3, 341, 2013
A New Steganography Algorithm against Chi Square Attack
Research Journal of Information Technology Vol. 5, Issue 3, 363, 2013
High Capacity Triple Plane Embedding: A Colour Stego
Research Journal of Information Technology Vol. 5, Issue 3, 373, 2013
Pixel Indicates, Standard Deviates: A Way for Random Image Steganography
Research Journal of Information Technology Vol. 5, Issue 3, 383, 2013
Comparison of Wavelet Filters in Hybrid Domain Watermarking
Research Journal of Information Technology Vol. 5, Issue 3, 393, 2013
Humanoid as a Sensor Node
Research Journal of Information Technology Vol. 5, Issue 3, 411, 2013
MPLS Based Adaptive Concurrent Multipath Packet Dispersion Architecture for VoIP Networks
Research Journal of Information Technology Vol. 5, Issue 3, 419, 2013
A Smarter E-currency Management System
Research Journal of Information Technology Vol. 5, Issue 3, 427, 2013
Elucidating the Robust and Resilient Cloud Security Solution Approaches
Research Journal of Information Technology Vol. 5, Issue 3, 442, 2013
Chaotic Interleaving for Secured OFDM
Research Journal of Information Technology Vol. 5, Issue 3, 449, 2013
An Efficient Steganographic Method by using Image Fragments With High Security
Research Journal of Information Technology Vol. 5, Issue 3, 456, 2013
Steganography-Time to Time: A Review
Research Journal of Information Technology Vol. 5, Issue 2, 53, 2013
Pixel Indicated User Indicator: A Muxed Stego
Research Journal of Information Technology Vol. 5, Issue 2, 73, 2013
Pixel Indicated Triple Layer: A Way for Random Image Steganography
Research Journal of Information Technology Vol. 5, Issue 2, 87, 2013

How to cite this article

Lingyun Xiang, Xingming Sun, Yuling Liu and Hengfu Yang, 2011. A Secure Steganographic Method via Multiple Choice Questions. Information Technology Journal, 10: 992-1000.

DOI: 10.3923/itj.2011.992.1000

URL: https://scialert.net/abstract/?doi=itj.2011.992.1000

Useful Links

  • Journals
  • For Authors
  • For Referees
  • For Librarian
  • For Socities

Contact Us

Office Number 1128,
Tamani Arts Building,
Business Bay,
Deira, Dubai, UAE

Phone: +971 507 888 742
Email: [email protected]

About Science Alert

Science Alert is a technology platform and service provider for scholarly publishers, helping them to publish and distribute their content online. We provide a range of services, including hosting, design, and digital marketing, as well as analytics and other tools to help publishers understand their audience and optimize their content. Science Alert works with a wide variety of publishers, including academic societies, universities, and commercial publishers.

Follow Us
© Copyright Science Alert. All Rights Reserved