• [email protected]
  • +971 507 888 742
Submit Manuscript
SciAlert
  • Home
  • Journals
  • Information
    • For Authors
    • For Referees
    • For Librarian
    • For Societies
  • Contact
  1. Journal of Applied Sciences
  2. Vol 10 (16), 2010
  3. 1825-1833
  • Online First
  • Current Issue
  • Previous Issues
  • More Information
    Aims and Scope Editorial Board Guide to Authors Article Processing Charges
    Submit a Manuscript

Journal of Applied Sciences

Year: 2010 | Volume: 10 | Issue: 16 | Page No.: 1825-1833
DOI: 10.3923/jas.2010.1825.1833

Facebook Twitter Digg Reddit Linkedin StumbleUpon E-mail

Article Trend



Total views 1029

Authors


Ali K. Hmood

Country: Malaysia

Hamid A. Jalab

Country: Malaysia

Z.M. Kasirun

Country: Malaysia

B.B. Zaidan

Country: Malaysia

A.A. Zaidan

Country: Malaysia

Keywords


  • video
  • text
  • image
  • steganography
  • Data hidden
Research Article

On the Capacity and Security of Steganography Approaches: An Overview

Ali K. Hmood, Hamid A. Jalab, Z.M. Kasirun, B.B. Zaidan and A.A. Zaidan
PDF Abstract Fulltext XML References

Citations in impact factor journals

Sensor-Based mHealth Authentication for Real-Time Remote Healthcare Monitoring System: A Multilayer Systematic Review
Journal of Medical Systems Vol. 43, Issue 2, , 2019
Smart Home-based IoT for Real-time and Secure Remote Health Monitoring of Triage and Priority System using Body Sensors: Multi-driven Systematic Review
Journal of Medical Systems Vol. 43, Issue 3, , 2019
Based Medical Systems for Patient’s Authentication: Towards a New Verification Secure Framework Using CIA Standard
Journal of Medical Systems Vol. 43, Issue 7, , 2019
PSO–Blockchain-based image steganography: towards a new method to secure updating and sharing COVID-19 data in decentralised hospitals intelligence architecture
Multimedia Tools and Applications
Comparative study on the evaluation and benchmarking information hiding approaches based multi-measurement analysis using TOPSIS method with different normalisation, separation and context techniques
Measurement
Secure Topology for Electronic Medical Record Transmissions
International Journal of Pharmacology Vol. 6, Issue 6, 954, 2010

Citation to this article as recorded by ASCI logo

Alanizi, H.O., M.L.M. Kiah, A.A. Zaidan, B.B. Zaidan and G.M. Alam, 2010. Secure topology for electronic medical record transmissions. Int. J. Pharmacol., 6: 954-958.
CrossRefDirect Link

Amirtharajan, R. and J.B.B. Rayappan, 2012. Brownian motion of binary and gray-binary and gray bits in image for stego. J. Applied Sci., 12: 428-439.
CrossRefDirect Link

Amirtharajan, R. and J.B.B. Rayappan, 2012. Inverted pattern in inverted time domain for icon steganography. Inform. Technol. J., 11: 587-595.
CrossRefDirect Link

Amirtharajan, R. and J.B.B. Rayappan, 2012. Pixel authorized by pixel to trace with SFC on image to sabotage data mugger: A comparative study on PI stego. Res. J. Inform. Technol., 4: 124-139.
CrossRefDirect Link

Amirtharajan, R. and J.B.B. Rayappan, 2013. Steganography-time to time: A review. Res. J. Inform. Technol., 5: 53-66.
CrossRefDirect Link

Amirtharajan, R., G. Aishwarya, M.S.K. Karthik, V. Thanikaiselvan and J.B.B. Rayappan, 2013. Bio-hiding for smart swipe card: A secret security. Res. J. Inform. Technol., 5: 100-112.
CrossRefDirect Link

Amirtharajan, R., I. Rosaline, R. Swamy, S. Pavan and R. Sridevi et al., 2014. Cover G for 3 and 4 G-A Stego Product Inf. Technol. J., 13: 1977-1984.
CrossRefDirect Link

Amirtharajan, R., J. Qin and J.B.B. Rayappan, 2012. Random image steganography and steganalysis: Present status and future directions. Inform. Technol. J., 11: 566-576.
CrossRefDirect Link

Amirtharajan, R., J.H.S. Karthikesh, M.N. Reddy, C.S.H. Kaushik and J.B.B. Rayappan, 2013. Compressed and encrypted secret hides in image for rugged stego. Res. J. Inform. Technol., 5: 234-241.
CrossRefDirect Link

Amirtharajan, R., K.M. Ashfaaq, A.K. Infant and J.B.B. Rayappan, 2013. High performance pixel indicator for colour image steganography. Res. J. Inform. Technol., 5: 277-290.
CrossRefDirect Link

Amirtharajan, R., M.V. Abhiram, G. Revathi, J.B. Reddy, V. Thanikaiselvan and J.B.B. Rayappan, 2013. Rubik's cube: A way for random image steganography. Res. J. Inform. Technol., 5: 329-340.
CrossRefDirect Link

Amirtharajan, R., P. Archana and J.B.B. Rayappan, 2013. Why image encryption for better steganography. Res. J. Inform. Technol., 5: 341-351.
CrossRefDirect Link

Amirtharajan, R., P.S. Priya and J.B.B. Rayappan, 2013. Pixel indicated user indicator: A muxed stego. Res. J. Inform. Technol., 5: 73-86.
CrossRefDirect Link

Amirtharajan, R., R. Anushiadevi, V. Meena, V. Kalpana and J.B.B. Rayappan, 2013. Concealed to protect and protect to conceal: A conserved stego image. Res. J. Inform. Technol., 5: 209-217.
CrossRefDirect Link

Amirtharajan, R., R. Anushiadevi, V. Meena, V. Kalpana and J.B.B. Rayappan, 2013. Image hides image: A secret stego tri-layer approach. Res. J. Inform. Technol., 5: 249-255.
CrossRefDirect Link

Amirtharajan, R., R. Anushiadevi, V. Meena, V. Kalpana and J.B.B. Rayappan, 2013. Random abrasion on image for security magnification. Res. J. Inform. Technol., 5: 317-328.
CrossRefDirect Link

Amirtharajan, R., R. Subrahmanyam, J.N. Teja, K.M. Reddy and J.B.B. Rayappan, 2013. Pixel indicated triple layer: A way for random image steganography. Res. J. Inform. Technol., 5: 87-99.
CrossRefDirect Link

Amirtharajan, R., S.D. Roy, N. Nesakumar, M. Chandrasekar, R. Sridevi and J.B.B. Rayappan, 2013. Mind game for cover steganography: A refuge. Res. J. Inform. Technol., 5: 137-148.
CrossRefDirect Link

Amirtharajan, R., V. Mahalakshmi, J. Nandhini, R. Kavitha and J.B.B. Rayappan, 2013. Key decided cover for random image steganography. Res. J. Inform. Technol., 5: 171-180.
CrossRefDirect Link

Amirtharajan, R., V. Rajesh, P. Archana and J.B.B. Rayappan, 2013. Pixel indicates, standard deviates: A way for random image steganography. Res. J. Inform. Technol., 5: 383-392.
CrossRefDirect Link

Hmood, A.K., B.B. Zaidan, A.A. Zaidan and H.A. Jalab, 2010. An overview on hiding information technique in images. J. Applied Sci., 10: 2094-2100.
CrossRefDirect Link

Hmood, A.K., Z.M. Kasirun, H.A. Jalab, G.M. Alam, A.A. Zaidan and B.B. Zaidan, 2010. On the accuracy of hiding information metrics: Counterfeit protection for education and important certificates. Int. J. Phys. Sci., 5: 1054-1062.
Direct Link

Hmood, A.K., Z.M. Kasirun, H.A. Jalab, G.M. Alam, A.A. Zaidan and B.B. Zaidan, 2010. On the accuracy of hiding information metrics: Counterfeit protection for education and important certificates. Int. J. Phys. Sci., 5: 1054-1062.
Direct Link

Hmood, K.K. and F.N. Al-Madi, 2013. Impact of cloud computing on today’s market: facilitating the move from local to international business. Res. J. Bus. Manage., 7: 28-40.
CrossRefDirect Link

Janakiraman, S., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Compiler optimization and plain text pre-processing to hoist the height of HIGHT in AVR platform. Res. J. Inform. Technol., 6: 356-367.
CrossRefDirect Link

Janakiraman, S., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2012. Pixel forefinger for gray in color: A layer by layer stego. Inform. Technol. J., 11: 9-19.
CrossRefDirect Link

M. Padmaa, Y. Venkataramani 2014. Random Image Steganography using Pixel Indicator to Enhance Hiding Capacity J. Applied Sci., 14: 1798-1808.
CrossRef

Nabi, M.S.A., M.L.M. Kiah, B.B. Zaidan, A.A. Zaidan and G.M. Alam, 2010. Suitability of using SOAP protocol to secure electronic medical record databases transmission. Int. J. Pharmacol., 6: 959-964.
CrossRefDirect Link

Padmaa, M. and Y. Venkataramani, 2014. Adaptive data hiding based on visual cryptography. J. Applied Sci., 14: 1674-1688.
CrossRefDirect Link

Padmaa, M., Y. Venkataramani and R. Amirtharajan, 2011. Stego on 2n: 1 Platform for users and embedding. Inform. Technol. J., 10: 1896-1907.
CrossRefDirect Link

Praveenkumar, P., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Inserted embedding in OFDM channel: A multicarrier stego. Inform. Technol. J., 13: 2017-2021.
CrossRefDirect Link

Rajagopalan, S., H.N. Upadhyay, S. Varadarajan, J.B.B. Rayappan and R. Amirtharajan, 2014. Gyratory assisted info hide-a nibble differencing for message embedding. Inform. Technol. J., 13: 2005-2010.
CrossRefDirect Link

Rajagopalan, S., R. Amirtharajan, H.N. Upadhyay and J.B.B. Rayappan, 2012. Survey and analysis of hardware cryptographic and steganographic systems on FPGA. J. Applied Sci., 12: 201-210.
CrossRefDirect Link

Rajagopalan, S., Y. Ravishankar, H.N. Upadhyay, J.B.B. Rayappan and R. Amirtharajan, 2014. Modeling combo PR generator for Stego Storage Self Test (SSST). Inform. Technol. J., 13: 1936-1944.
CrossRefDirect Link

Salem, Y., M. Abomhara, O.O. Khalifa, A.A. Zaidan and B.B. Zaidan, 2011. A review on multimedia communications cryptography. Res. J. Inform. Technol., 3: 146-152.
CrossRefDirect Link

Thanikaiselvan, V., P. Arulmozhivarman, J.B.B. Rayappan and R. Amirtharajan, 2012. Graceful graph for graceful security-towards a STE (G) Raph. Res. J. Inform. Technol., 4: 220-227.
CrossRefDirect Link

Xia, B., X. Sun, L. Xiang, H. Luo and H. Yang, 2011. Detection of LSB matching steganography using neighborhood node degree characteristics. Inform. Technol. J., 10: 1601-1607.
CrossRefDirect Link

Zanganeh, O. and S. Ibrahim, 2011. Adaptive image steganography based on optimal embedding and robust against chi-square attack. Inform. Technol. J., 10: 1285-1294.
CrossRefDirect Link

Zeki, A.M., A.A. Manaf and S.S. Mahmod, 2011. High watermarking capacity based on spatial domain technique. Inform. Technol. J., 10: 1367-1373.
CrossRef

Citation to this article as recorded by Crossref logo

Electronic medical record systems: decision support examination framework for individual, security and privacy concerns using multi-perspective analysis
Health and Technology
A Hybrid Secured Approach Combining LSB Steganography and AES Using Mosaic Images for Ensuring Data Security
SN Computer Science Vol. 3, Issue 2, , 2022
Based blockchain-PSO-AES techniques in finger vein biometrics: A novel verification secure framework for patient authentication
Computer Standards & Interfaces
An innovative information hiding technique utilizing cumulative peak histogram regions
Journal of Systems and Information Technology Vol. 14, Issue 4, 336, 2012
New Method of Image Steganography Based on Particle Swarm Optimization Algorithm in Spatial Domain for High Embedding Capacity
IEEE Access
Finger Vein Biometrics: Taxonomy Analysis, Open Challenges, Future Directions, and Recommended Solution for Decentralised Network Architectures
IEEE Access
A Systematic Review on Smartphone Skin Cancer Apps: Coherent Taxonomy, Motivations, Open Challenges and Recommendations, and New Research Direction
Journal of Circuits, Systems and Computers
A New Approach based on Multi-Dimensional Evaluation and Benchmarking for Data Hiding Techniques
International Journal of Information Technology & Decision Making
Adaptive Image Steganography Based on Optimal Embedding and Robust Against Chi-square Attack
Information Technology Journal Vol. 10, Issue 7, 1285, 2011
High Watermarking Capacity Based on Spatial Domain Technique
Information Technology Journal Vol. 10, Issue 7, 1367, 2011
Detection of LSB Matching Steganography using Neighborhood Node Degree Characteristics
Information Technology Journal Vol. 10, Issue 8, 1601, 2011
Stego on 2n:1 Platform for Users and Embedding
Information Technology Journal Vol. 10, Issue 10, 1896, 2011
Random Image Steganography and Steganalysis: Present Status and Future Directions
Information Technology Journal Vol. 11, Issue 5, 566, 2012
Inverted Pattern in Inverted Time Domain for Icon Steganography
Information Technology Journal Vol. 11, Issue 5, 587, 2012
Pixel Forefinger for Gray in Color: A Layer by Layer Stego
Information Technology Journal Vol. 11, Issue 1, 9, 2012
An Overview on Hiding Information Technique in Images
Journal of Applied Sciences Vol. 10, Issue 18, 2094, 2010
Survey and Analysis of Hardware Cryptographic and Steganographic Systems on FPGA
Journal of Applied Sciences Vol. 12, Issue 3, 201, 2012
A Review on Multimedia Communications Cryptography
Research Journal of Information Technology Vol. 3, Issue 3, 146, 2011
Secured Online Payment Using Biometric Identification System
Advanced Materials Research

How to cite this article

Ali K. Hmood, Hamid A. Jalab, Z.M. Kasirun, B.B. Zaidan and A.A. Zaidan, 2010. On the Capacity and Security of Steganography Approaches: An Overview. Journal of Applied Sciences, 10: 1825-1833.

DOI: 10.3923/jas.2010.1825.1833

URL: https://scialert.net/abstract/?doi=jas.2010.1825.1833

Useful Links

  • Journals
  • For Authors
  • For Referees
  • For Librarian
  • For Socities

Contact Us

Office Number 1128,
Tamani Arts Building,
Business Bay,
Deira, Dubai, UAE

Phone: +971 507 888 742
Email: [email protected]

About Science Alert

Science Alert is a technology platform and service provider for scholarly publishers, helping them to publish and distribute their content online. We provide a range of services, including hosting, design, and digital marketing, as well as analytics and other tools to help publishers understand their audience and optimize their content. Science Alert works with a wide variety of publishers, including academic societies, universities, and commercial publishers.

Follow Us
© Copyright Science Alert. All Rights Reserved