Research Article

Citations for "High Capacity Persian/Arabic Text Steganography"


Citation to this article as recorded by ASCI logo


Al-Frajat, A.K., H.A. Jalab, Z.M. Kasirun, A.A. Zaidan and B.B. Zaidan, 2010. Hiding data in video file: An overview. J. Applied Sci., 10: 1644-1649.
CrossRef  |  Direct Link  |  

Amirtharajan, R. and J.B.B. Rayappan, 2012. Inverted pattern in inverted time domain for icon steganography. Inform. Technol. J., 11: 587-595.
CrossRef  |  Direct Link  |  

Amirtharajan, R. and J.B.B. Rayappan, 2012. Pixel authorized by pixel to trace with SFC on image to sabotage data mugger: A comparative study on PI stego. Res. J. Inform. Technol., 4: 124-139.
CrossRef  |  Direct Link  |  

Amirtharajan, R. and J.B.B. Rayappan, 2013. Steganography-time to time: A review. Res. J. Inform. Technol., 5: 53-66.
CrossRef  |  Direct Link  |  

Amirtharajan, R., I. Rosaline, R. Swamy, S. Pavan and R. Sridevi et al., 2014. Cover G for 3 and 4 G-A Stego Product Inf. Technol. J., 13: 1977-1984.
CrossRef  |  Direct Link  |  

Amirtharajan, R., J. Qin and J.B.B. Rayappan, 2012. Random image steganography and steganalysis: Present status and future directions. Inform. Technol. J., 11: 566-576.
CrossRef  |  Direct Link  |  

Amirtharajan, R., P. Muralidharan, R. Rajesh, R. Sridevi and J.B.B. Rayappan, 2013. Short message (service) as key for steganography. Res. J. Inform. Technol., 5: 113-124.
CrossRef  |  Direct Link  |  

Amirtharajan, R., P.S. Priya and J.B.B. Rayappan, 2013. Pixel indicated user indicator: A muxed stego. Res. J. Inform. Technol., 5: 73-86.
CrossRef  |  Direct Link  |  

Amirtharajan, R., R. Anushiadevi, V. Meena, V. Kalpana and J.B.B. Rayappan, 2013. Concealed to protect and protect to conceal: A conserved stego image. Res. J. Inform. Technol., 5: 209-217.
CrossRef  |  Direct Link  |  

Amirtharajan, R., S.D. Roy, N. Nesakumar, M. Chandrasekar, R. Sridevi and J.B.B. Rayappan, 2013. Mind game for cover steganography: A refuge. Res. J. Inform. Technol., 5: 137-148.
CrossRef  |  Direct Link  |  

Hmood, A.K., B.B. Zaidan, A.A. Zaidan and H.A. Jalab, 2010. An overview on hiding information technique in images. J. Applied Sci., 10: 2094-2100.
CrossRef  |  Direct Link  |  

Hmood, A.K., H.A. Jalab, Z.M. Kasirun, B.B. Zaidan and A.A. Zaidan, 2010. On the capacity and security of steganography approaches: An overview. J. Applied Sci., 10: 1825-1833.
CrossRef  |  Direct Link  |  

Janakiraman, S., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2012. Pixel forefinger for gray in color: A layer by layer stego. Inform. Technol. J., 11: 9-19.
CrossRef  |  Direct Link  |  

Jiang, M.F., 2012. A new adaptive visible watermarking algorithm for document images. Inform. Technol. J., 11: 1322-1326.
CrossRef  |  

Padmaa, M., Y. Venkataramani and R. Amirtharajan, 2011. Stego on 2n: 1 Platform for users and embedding. Inform. Technol. J., 10: 1896-1907.
CrossRef  |  Direct Link  |  

Zaidan, A.A., B.B. Zaidan, A.K. Al-Fraja and H.A. Jalab, 2010. Investigate the capability of applying hidden data in text file: An overview. J. Applied Sci., 10: 1916-1922.
CrossRef  |  Direct Link  |  

Zaidan, B.B., A.A. Zaidan, A.K. Al-Frajat and H.A. Jalab, 2010. On the differences between hiding information and cryptography techniques: An overview. J. Applied Sci., 10: 1650-1655.
CrossRef  |  Direct Link  |  


Citations in impact factor journal as recorded by Crossref logo


Utilizing pseudo-spaces to improve Arabic text steganography for multimedia data communications
Multimedia Tools and Applications


Citation to this article as recorded by Crossref logo


Securing Data via Cryptography and Arabic Text Steganography
SN Computer Science Vol. 2, Issue 1, , 2021

A Survey on Different Arabic Text Steganography Techniques
2021 1st International Conference on Emerging Smart Technologies and Applications (eSmarTA)

Stego on 2n:1 Platform for Users and Embedding
Information Technology Journal Vol. 10, Issue 10, 1896, 2011

Random Image Steganography and Steganalysis: Present Status and Future Directions
Information Technology Journal Vol. 11, Issue 5, 566, 2012

Inverted Pattern in Inverted Time Domain for Icon Steganography
Information Technology Journal Vol. 11, Issue 5, 587, 2012

Pixel Forefinger for Gray in Color: A Layer by Layer Stego
Information Technology Journal Vol. 11, Issue 1, 9, 2012

Hiding data in video file: An overview.
Journal of Applied Sciences Vol. 10, Issue 15, 1644, 2010

On the Differences between Hiding Information and Cryptography Techniques: An Overview
Journal of Applied Sciences Vol. 10, Issue 15, 1650, 2010

On the Capacity and Security of Steganography Approaches: An Overview
Journal of Applied Sciences Vol. 10, Issue 16, 1825, 2010

Investigate the Capability of Applying Hidden Data in Text File: An Overview
Journal of Applied Sciences Vol. 10, Issue 17, 1916, 2010

An Overview on Hiding Information Technique in Images
Journal of Applied Sciences Vol. 10, Issue 18, 2094, 2010

Services
Related Articles in ASCI
Search in Google Scholar
View Citation
Report Citation

 
©  2022 Science Alert. All Rights Reserved