Citation to this article as recorded by
Aarthie, N. and R. Amirtharajan, 2014. Image encryption: An information security perceptive. J. Artif. Intell., 7: 123-135. CrossRefDirect Link |
Janakiraman, S., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Audio fingerprint indicator in embedded platform: A way for hardware steganography. J. Artif. Intell., 7: 82-93. CrossRefDirect Link |
Janakiraman, S., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Compiler optimization and plain text pre-processing to hoist the height of HIGHT in AVR platform. Res. J. Inform. Technol., 6: 356-367. CrossRefDirect Link |
Janakiraman, S., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Graphical password authentication scheme for embedded platform. J. Artif. Intell., 7: 161-171. CrossRefDirect Link |
Janakiraman, S., K. Thenmozhi, S. Rajagopalan, H.N. Upadhyay, J.B.B. Rayappan and R. Amirtharajan, 2014. Space filling curve for data filling: An embedded security approach. Res. J. Inform. Technol., 6: 188-197. CrossRefDirect Link |
M. Padmaa, Y. Venkataramani 2014. Encrypted Secret Blend with Image Steganography for Enhanced Imperceptibility and Capacity Res. J. Inform. Technol., 6: 342-355. CrossRef |
Praveenkumar, P., G. Ashwin, S.P.K. Agarwal, S.N. Bharathi, V.S. Venkatachalam, K. Thenmozhi and R. Amirtharajan, 2014. Rubik's cube blend with logistic map on RGB: A way for image encryption. Res. J. Inform. Technol., 6: 207-215. CrossRefDirect Link |
Praveenkumar, P., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Cryptic cover for covered writing: A pre-layered stego. Inform. Technol. J., 13: 2524-2533. CrossRefDirect Link |
Praveenkumar, P., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Why information security demands transform domain, compression and encryption? J. Artif. Intell., 7: 136-144. CrossRefDirect Link |
Praveenkumar, P., P. Rajalakshmi, G.U. Priyanga, K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Least significant bit but quantum bit: A Quasi stego. Inform. Technol. J., 13: 2544-2551. CrossRefDirect Link |
Praveenkumar, P., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2014. Coded crypted converted hiding (C3H)-a stego channel. J. Applied Sci., 14: 1786-1797. CrossRefDirect Link |
Praveenkumar, P., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2014. Double layer encoded encrypted data on multicarrier channel. J. Applied Sci., 14: 1689-1700. CrossRefDirect Link |
Praveenkumar, P., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2014. Sub carriers carry secret: An absolute stego approach. J. Applied Sci., 14: 1728-1735. CrossRefDirect Link |
Praveenkumar, P., R. Hemalatha, R. Uma, K. Madhunisha, K. Thenmozhi and R. Amirtharajan, 2014. Image Zoning→ encryption. Res. J. Inform. Technol., 6: 368-378. CrossRefDirect Link |
Rajagopalan, S., H.N. Upadhyay, J.B.B. Rayappan and R. Amirtharajan, 2014. Dual cellular automata on FPGA: An image encryptors chip. Res. J. Inform. Technol., 6: 223-236. CrossRefDirect Link |
Rajagopalan, S., H.N. Upadhyay, J.B.B. Rayappan and R. Amirtharajan, 2014. Galois field proficient product for secure image encryption on FPGA. Res. J. Inform. Technol., 6: 308-324. CrossRefDirect Link |
Rajagopalan, S., H.N. Upadhyay, J.B.B. Rayappan and R. Amirtharajan, 2014. Logic elements consumption analysis of cellular automata based image encryption on FPGA. Res. J. Inform. Technol., 6: 291-307. CrossRefDirect Link |
Rajagopalan, S., S. Janakiraman, B. Swaminath, H.N. Upadhyay, K. Thenmozhi and R. Amirtharajan, 2014. LabVIEW based PIN hider on ATM cards: A transform domain secret concealment approach. Res. J. Inform. Technol., 6: 154-165. CrossRefDirect Link |
Ramalingam, B., R. Amirtharajan and J.B.B. Rayappan, 2014. LCC-LSB-FPGA stego-A reconfigurable security. J. Applied Sci., 14: 2139-2148. CrossRefDirect Link |
Thanikaiselvan, V., P. Arulmozhivarman, S. Chakrabarty, A. Agarwa, S. Subashanthini and R. Amirtharajan, 2014. Comparative analysis of (5/3) and Haar IWT based steganography. Inform. Technol. J., 13: 2534-2543. CrossRefDirect Link |
Thanikaiselvan, V., S. Subashanthini and R. Amirtharajan, 2014. PVD based steganography on scrambled RGB cover images with pixel indicator. J. Artif. Intell., 7: 54-68. CrossRefDirect Link |
Citation to this article as recorded by
Secure Communication Using Scramble Phase Assisting
WFRFT IEICE Transactions on Communications Vol. E102.B, Issue 4, 779, 2019 |
How to cite this article
Padmapriya Praveenkumar, K. Thenmozhi, John Bosco Balaguru Rayappan and Rengarajan Amirtharajan, 2014. Stego in Multicarrier: A Phase Hidden Communication. Information Technology Journal, 13: 2011-2016.
DOI: 10.3923/itj.2014.2011.2016
URL: https://scialert.net/abstract/?doi=itj.2014.2011.2016
DOI: 10.3923/itj.2014.2011.2016
URL: https://scialert.net/abstract/?doi=itj.2014.2011.2016