Citations in impact factor journals
Preparation and characterization of mucilage polysaccharide for biomedical applications Carbohydrate Polymers Vol. 98, Issue 1, 89, 2013 |
Extended FEM modelling of crack propagation using the semi-circular bending test Construction and Building Materials |
A review on human health perspective of air pollution with respect to allergies and asthma Environment International |
Development and application of a predictive model of Aspergillus candidus growth as a tool to improve shelf life of bakery products Food Microbiology Vol. 36, Issue 2, 254, 2013 |
Line shape analysis of the Raman spectra from pure and mixed biofuels esters compounds Fuel |
Open-cell cavity-integrated injection-molded acoustic polypropylene foams Materials & Design |
Glycerol production and its applications as a raw material: A review Renewable and Sustainable Energy Reviews |
Mass propagation of Dendrobium ‘Zahra FR 62’, a new hybrid used for cut flowers, using bioreactor culture Scientia Horticulturae |
Sweetpotato plant regeneration via an improved somatic embryogenesis protocol Scientia Horticulturae |
Effect of aminoethoxyvinylglycine and 1-methylcyclopropene on leaf abscission and root formation in Corymbia and Eucalyptus cuttings Scientia Horticulturae |
Enrichment implication of froth flotation kinetics in the separation and recovery of metal values from printed circuit boards Separation and Purification Technology |
Extraction of lane markings using orientation and vanishing point constraints in structured road scenes International Journal of Computer Mathematics |
An Optimized EMA-RAPD-PCR for a Reliable Detection of Viable
Salmonella
spp. in Chicken Products Journal of Food Safety Vol. 33, Issue 3, 247, 2013 |
Prevalence of
Escherichia coli
O157 : H7 and Their Verotoxins and
Salmonella
spp. in Processed Poultry Products Journal of Food Safety Vol. 33, Issue 3, 313, 2013 |
Sequencing and Homological Analysis of Silver Fox TYR Gene Asian Journal of Animal and Veterinary Advances Vol. 8, Issue 5, 754, 2013 |
The Pros and Cons of the In-silico Pharmaco-toxicology in Drug Discovery and Development International Journal of Pharmacology Vol. 9, Issue 3, 176, 2013 |
Presence of Laxative and Antidiarrheal Activities in Periploca aphylla: A Saudi Medicinal Plant International Journal of Pharmacology Vol. 9, Issue 3, 190, 2013 |
Centratherum anthelminticum (L.) Kuntze a Potential Medicinal Plant with Pleiotropic Pharmacological and Biological Activities International Journal of Pharmacology Vol. 9, Issue 3, 211, 2013 |
Citation to this article as recorded by
Ab Aziz, M.J. and A.M. Hendr, 2012. Translation of classical arabic language to English. J. Applied Sci., 12: 781-786. CrossRef |
Amirtharajan, R. and J.B.B. Rayappan, 2012. Brownian motion of binary and gray-binary and gray bits in image for stego. J. Applied Sci., 12: 428-439. CrossRefDirect Link |
Amirtharajan, R. and J.B.B. Rayappan, 2012. Inverted pattern in inverted time domain for icon steganography. Inform. Technol. J., 11: 587-595. CrossRefDirect Link |
Amirtharajan, R. and J.B.B. Rayappan, 2012. Pixel authorized by pixel to trace with SFC on image to sabotage data mugger: A comparative study on PI stego. Res. J. Inform. Technol., 4: 124-139. CrossRefDirect Link |
Amirtharajan, R. and J.B.B. Rayappan, 2013. Steganography-time to time: A review. Res. J. Inform. Technol., 5: 53-66. CrossRefDirect Link |
Amirtharajan, R., G. Aishwarya, M.S.K. Karthik, V. Thanikaiselvan and J.B.B. Rayappan, 2013. Bio-hiding for smart swipe card: A secret security. Res. J. Inform. Technol., 5: 100-112. CrossRefDirect Link |
Amirtharajan, R., G. Devipriya, V. Thanikaiselvan and J.B.B. Rayappan, 2013. High capacity triple plane embedding: A colour stego. Res. J. Inform. Technol., 5: 373-382. CrossRefDirect Link |
Amirtharajan, R., I. Rosaline, R. Swamy, S. Pavan and R. Sridevi et al., 2014. Cover G for 3 and 4 G-A Stego Product Inf. Technol. J., 13: 1977-1984. CrossRefDirect Link |
Amirtharajan, R., J. Qin and J.B.B. Rayappan, 2012. Random image steganography and steganalysis: Present status and future directions. Inform. Technol. J., 11: 566-576. CrossRefDirect Link |
Amirtharajan, R., J.H.S. Karthikesh, M.N. Reddy, C.S.H. Kaushik and J.B.B. Rayappan, 2013. Compressed and encrypted secret hides in image for rugged stego. Res. J. Inform. Technol., 5: 234-241. CrossRefDirect Link |
Amirtharajan, R., K. Karthikeyan, M. Malleswaran and J.B.B. Rayappan, 2013. Kubera kolam: A way for random image steganography. Res. J. Inform. Technol., 5: 304-316. CrossRefDirect Link |
Amirtharajan, R., K.M. Ashfaaq, A.K. Infant and J.B.B. Rayappan, 2013. High performance pixel indicator for colour image steganography. Res. J. Inform. Technol., 5: 277-290. CrossRefDirect Link |
Amirtharajan, R., M.V. Abhiram, G. Revathi, J.B. Reddy, V. Thanikaiselvan and J.B.B. Rayappan, 2013. Rubik's cube: A way for random image steganography. Res. J. Inform. Technol., 5: 329-340. CrossRefDirect Link |
Amirtharajan, R., P. Muralidharan, R. Rajesh, R. Sridevi and J.B.B. Rayappan, 2013. Short message (service) as key for steganography. Res. J. Inform. Technol., 5: 113-124. CrossRefDirect Link |
Amirtharajan, R., P.S. Priya and J.B.B. Rayappan, 2013. Pixel indicated user indicator: A muxed stego. Res. J. Inform. Technol., 5: 73-86. CrossRefDirect Link |
Amirtharajan, R., R. Subrahmanyam, J.N. Teja, K.M. Reddy and J.B.B. Rayappan, 2013. Pixel indicated triple layer: A way for random image steganography. Res. J. Inform. Technol., 5: 87-99. CrossRefDirect Link |
Amirtharajan, R., S.D. Roy, N. Nesakumar, M. Chandrasekar, R. Sridevi and J.B.B. Rayappan, 2013. Mind game for cover steganography: A refuge. Res. J. Inform. Technol., 5: 137-148. CrossRefDirect Link |
Amirtharajan, R., V. Mahalakshmi, J. Nandhini, R. Kavitha and J.B.B. Rayappan, 2013. Key decided cover for random image steganography. Res. J. Inform. Technol., 5: 171-180. CrossRefDirect Link |
Amirtharajan, R., V. Rajesh, P. Archana and J.B.B. Rayappan, 2013. Pixel indicates, standard deviates: A way for random image steganography. Res. J. Inform. Technol., 5: 383-392. CrossRefDirect Link |
M. Padmaa, Y. Venkataramani 2014. Random Image Steganography using Pixel Indicator to Enhance Hiding Capacity J. Applied Sci., 14: 1798-1808. CrossRef |
Padmaa, M. and Y. Venkataramani, 2014. Adaptive data hiding based on visual cryptography. J. Applied Sci., 14: 1674-1688. CrossRefDirect Link |
Praveenkumar, P., G.S. Hemalatha, B. Reddy, K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Secret link through simulink: A stego on OFDM channel. Inform. Technol. J., 13: 1999-2004. CrossRefDirect Link |
Citation to this article as recorded by
Capparis spinosa L. (Caper) fruit extract in treatment of type 2 diabetic patients: A randomized double-blind placebo-controlled clinical trial Complementary Therapies in Medicine |
Tourism–growth nexus in Pakistan: Evidence from ARDL bounds tests Economic Modelling |
New phospho-silicate and niobo-phospho-silicate MCF materials modified with MPTMS – Structure, surface and catalytic properties Microporous and Mesoporous Materials |
IDENTIFICATION OF GRANULAR SOILS STRENGTH AND STIFFNESS PARAMETERS BY MATCHING FINITE ELEMENT RESULTS TO PMT DATA International Journal of Computational Methods |
Random Image Steganography and Steganalysis: Present Status and Future Directions Information Technology Journal Vol. 11, Issue 5, 566, 2012 |
Inverted Pattern in Inverted Time Domain for Icon Steganography Information Technology Journal Vol. 11, Issue 5, 587, 2012 |
Automatic Verification of Security Properties of OAuth 2.0 Protocol with Cryptoverif in Computational Model Information Technology Journal Vol. 12, Issue 12, 2273, 2013 |
Efficient Data Gathering based on Linear Regression in Wireless Multivariate Monitoring Sensor Networks Information Technology Journal Vol. 12, Issue 12, 2286, 2013 |
A Survey of Techniques for VLSI IP Protection Information Technology Journal Vol. 12, Issue 12, 2324, 2013 |
A Novel Multi Pursuers-one Evader Game based on Quantum Game Theory Information Technology Journal Vol. 12, Issue 12, 2358, 2013 |
Topology Control Research of Monitor Network Based on PID of Self-adaptive Hierarchical Genetic Algorithm Information Technology Journal Vol. 12, Issue 12, 2374, 2013 |
Research on Resource Scheduling Algorithm Based on ForCES Network Information Technology Journal Vol. 12, Issue 12, 2419, 2013 |
Central Limit Theorem based Cellular Automata for Generating Normal Random Numbers Information Technology Journal Vol. 12, Issue 12, 2440, 2013 |
Theobromine Toxicity and Remediation of Cocoa By-products: An Overview Journal of Biological Sciences Vol. 13, Issue 7, 570, 2013 |
Fish Assemblage of Majidun Creek, Lagos, Nigeria Journal of Biological Sciences Vol. 13, Issue 7, 577, 2013 |
Isolation and Characterization of Unidentified Listeria Strains Showing Phenotypic and Genetic Similarities to a Novel Group of Listeria Species from Malaysian Pekin Ducks Journal of Biological Sciences Vol. 13, Issue 7, 614, 2013 |
Relationships Between Site Factors and Bark Beetle Attack on Pine Trees Journal of Biological Sciences Vol. 13, Issue 7, 621, 2013 |
Prospective Analysis of Poisoning Cases in a Super Specialty Hospital in India Journal of Pharmacology and Toxicology Vol. 8, Issue 2, 60, 2013 |
Bio-hiding for Smart Swipe Card: A Secret Security Research Journal of Information Technology Vol. 5, Issue 2, 100, 2013 |
Short Message (Service) as Key for Steganography Research Journal of Information Technology Vol. 5, Issue 2, 113, 2013 |
Mind Game for Cover Steganography: A Refuge Research Journal of Information Technology Vol. 5, Issue 2, 137, 2013 |
Captivating CODEC Stego (CCS): A Cover on Camouflage Research Journal of Information Technology Vol. 5, Issue 2, 160, 2013 |
Key Decided Cover for Random Image Steganography Research Journal of Information Technology Vol. 5, Issue 2, 171, 2013 |
Graceful Labeling of Assignable Information Hiding in Image Research Journal of Information Technology Vol. 5, Issue 2, 181, 2013 |
AAAM-face Based Authentication System for Information Security Research Journal of Information Technology Vol. 5, Issue 2, 200, 2013 |
Concealed to Protect and Protect to Conceal: A Conserved Stego Image Research Journal of Information Technology Vol. 5, Issue 2, 209, 2013 |
Hash Encrypted Synchronized OFDM Research Journal of Information Technology Vol. 5, Issue 2, 218, 2013 |
Compressed and Encrypted Secret Hides in Image for Rugged Stego Research Journal of Information Technology Vol. 5, Issue 2, 234, 2013 |
Image Hides Image: A Secret Stego Tri-layer Approach Research Journal of Information Technology Vol. 5, Issue 2, 249, 2013 |
Augmented Reality in Security Systems Research Journal of Information Technology Vol. 5, Issue 2, 256, 2013 |
Horse Communication against Harsh Attack: A Stego Ride Research Journal of Information Technology Vol. 5, Issue 3, 263, 2013 |
High Performance Pixel indicator For Colour Image Steganography Research Journal of Information Technology Vol. 5, Issue 3, 277, 2013 |
Kubera Kolam: A Way for Random Image Steganography Research Journal of Information Technology Vol. 5, Issue 3, 304, 2013 |
Random Abrasion on Image for Security Magnification Research Journal of Information Technology Vol. 5, Issue 3, 317, 2013 |
Rubik's Cube: A Way for Random Image Steganography Research Journal of Information Technology Vol. 5, Issue 3, 329, 2013 |
Why Image Encryption for Better Steganography Research Journal of Information Technology Vol. 5, Issue 3, 341, 2013 |
A New Steganography Algorithm against Chi Square Attack Research Journal of Information Technology Vol. 5, Issue 3, 363, 2013 |
High Capacity Triple Plane Embedding: A Colour Stego Research Journal of Information Technology Vol. 5, Issue 3, 373, 2013 |
Pixel Indicates, Standard Deviates: A Way for Random Image Steganography Research Journal of Information Technology Vol. 5, Issue 3, 383, 2013 |
Comparison of Wavelet Filters in Hybrid Domain Watermarking Research Journal of Information Technology Vol. 5, Issue 3, 393, 2013 |
Humanoid as a Sensor Node Research Journal of Information Technology Vol. 5, Issue 3, 411, 2013 |
MPLS Based Adaptive Concurrent Multipath Packet Dispersion Architecture for VoIP Networks Research Journal of Information Technology Vol. 5, Issue 3, 419, 2013 |
A Smarter E-currency Management System Research Journal of Information Technology Vol. 5, Issue 3, 427, 2013 |
Elucidating the Robust and Resilient Cloud Security Solution Approaches Research Journal of Information Technology Vol. 5, Issue 3, 442, 2013 |
Chaotic Interleaving for Secured OFDM Research Journal of Information Technology Vol. 5, Issue 3, 449, 2013 |
An Efficient Steganographic Method by using Image Fragments With High Security Research Journal of Information Technology Vol. 5, Issue 3, 456, 2013 |
Steganography-Time to Time: A Review Research Journal of Information Technology Vol. 5, Issue 2, 53, 2013 |
Pixel Indicated User Indicator: A Muxed Stego Research Journal of Information Technology Vol. 5, Issue 2, 73, 2013 |
Pixel Indicated Triple Layer: A Way for Random Image Steganography Research Journal of Information Technology Vol. 5, Issue 2, 87, 2013 |
How to cite this article
Lingyun Xiang, Xingming Sun, Yuling Liu and Hengfu Yang, 2011. A Secure Steganographic Method via Multiple Choice Questions. Information Technology Journal, 10: 992-1000.
DOI: 10.3923/itj.2011.992.1000
URL: https://scialert.net/abstract/?doi=itj.2011.992.1000
DOI: 10.3923/itj.2011.992.1000
URL: https://scialert.net/abstract/?doi=itj.2011.992.1000