Citations in impact factor journals
Sensor-Based mHealth Authentication for Real-Time Remote
Healthcare Monitoring System: A Multilayer Systematic Review Journal of Medical Systems Vol. 43, Issue 2, , 2019 |
Smart Home-based IoT for Real-time and Secure Remote
Health Monitoring of Triage and Priority System using Body Sensors:
Multi-driven Systematic Review Journal of Medical Systems Vol. 43, Issue 3, , 2019 |
Based Medical Systems for Patient’s Authentication: Towards a New
Verification Secure Framework Using CIA Standard Journal of Medical Systems Vol. 43, Issue 7, , 2019 |
PSO–Blockchain-based image steganography: towards a new method to secure updating and sharing COVID-19 data in decentralised hospitals intelligence architecture Multimedia Tools and Applications |
Comparative study on the evaluation and benchmarking information
hiding approaches based multi-measurement analysis using TOPSIS method with
different normalisation, separation and context techniques Measurement |
Secure Topology for Electronic Medical Record Transmissions International Journal of Pharmacology Vol. 6, Issue 6, 954, 2010 |
Citation to this article as recorded by
Alanizi, H.O., M.L.M. Kiah, A.A. Zaidan, B.B. Zaidan and G.M. Alam, 2010. Secure topology for electronic medical record transmissions. Int. J. Pharmacol., 6: 954-958. CrossRefDirect Link |
Amirtharajan, R. and J.B.B. Rayappan, 2012. Brownian motion of binary and gray-binary and gray bits in image for stego. J. Applied Sci., 12: 428-439. CrossRefDirect Link |
Amirtharajan, R. and J.B.B. Rayappan, 2012. Inverted pattern in inverted time domain for icon steganography. Inform. Technol. J., 11: 587-595. CrossRefDirect Link |
Amirtharajan, R. and J.B.B. Rayappan, 2012. Pixel authorized by pixel to trace with SFC on image to sabotage data mugger: A comparative study on PI stego. Res. J. Inform. Technol., 4: 124-139. CrossRefDirect Link |
Amirtharajan, R. and J.B.B. Rayappan, 2013. Steganography-time to time: A review. Res. J. Inform. Technol., 5: 53-66. CrossRefDirect Link |
Amirtharajan, R., G. Aishwarya, M.S.K. Karthik, V. Thanikaiselvan and J.B.B. Rayappan, 2013. Bio-hiding for smart swipe card: A secret security. Res. J. Inform. Technol., 5: 100-112. CrossRefDirect Link |
Amirtharajan, R., I. Rosaline, R. Swamy, S. Pavan and R. Sridevi et al., 2014. Cover G for 3 and 4 G-A Stego Product Inf. Technol. J., 13: 1977-1984. CrossRefDirect Link |
Amirtharajan, R., J. Qin and J.B.B. Rayappan, 2012. Random image steganography and steganalysis: Present status and future directions. Inform. Technol. J., 11: 566-576. CrossRefDirect Link |
Amirtharajan, R., J.H.S. Karthikesh, M.N. Reddy, C.S.H. Kaushik and J.B.B. Rayappan, 2013. Compressed and encrypted secret hides in image for rugged stego. Res. J. Inform. Technol., 5: 234-241. CrossRefDirect Link |
Amirtharajan, R., K.M. Ashfaaq, A.K. Infant and J.B.B. Rayappan, 2013. High performance pixel indicator for colour image steganography. Res. J. Inform. Technol., 5: 277-290. CrossRefDirect Link |
Amirtharajan, R., M.V. Abhiram, G. Revathi, J.B. Reddy, V. Thanikaiselvan and J.B.B. Rayappan, 2013. Rubik's cube: A way for random image steganography. Res. J. Inform. Technol., 5: 329-340. CrossRefDirect Link |
Amirtharajan, R., P. Archana and J.B.B. Rayappan, 2013. Why image encryption for better steganography. Res. J. Inform. Technol., 5: 341-351. CrossRefDirect Link |
Amirtharajan, R., P.S. Priya and J.B.B. Rayappan, 2013. Pixel indicated user indicator: A muxed stego. Res. J. Inform. Technol., 5: 73-86. CrossRefDirect Link |
Amirtharajan, R., R. Anushiadevi, V. Meena, V. Kalpana and J.B.B. Rayappan, 2013. Concealed to protect and protect to conceal: A conserved stego image. Res. J. Inform. Technol., 5: 209-217. CrossRefDirect Link |
Amirtharajan, R., R. Anushiadevi, V. Meena, V. Kalpana and J.B.B. Rayappan, 2013. Image hides image: A secret stego tri-layer approach. Res. J. Inform. Technol., 5: 249-255. CrossRefDirect Link |
Amirtharajan, R., R. Anushiadevi, V. Meena, V. Kalpana and J.B.B. Rayappan, 2013. Random abrasion on image for security magnification. Res. J. Inform. Technol., 5: 317-328. CrossRefDirect Link |
Amirtharajan, R., R. Subrahmanyam, J.N. Teja, K.M. Reddy and J.B.B. Rayappan, 2013. Pixel indicated triple layer: A way for random image steganography. Res. J. Inform. Technol., 5: 87-99. CrossRefDirect Link |
Amirtharajan, R., S.D. Roy, N. Nesakumar, M. Chandrasekar, R. Sridevi and J.B.B. Rayappan, 2013. Mind game for cover steganography: A refuge. Res. J. Inform. Technol., 5: 137-148. CrossRefDirect Link |
Amirtharajan, R., V. Mahalakshmi, J. Nandhini, R. Kavitha and J.B.B. Rayappan, 2013. Key decided cover for random image steganography. Res. J. Inform. Technol., 5: 171-180. CrossRefDirect Link |
Amirtharajan, R., V. Rajesh, P. Archana and J.B.B. Rayappan, 2013. Pixel indicates, standard deviates: A way for random image steganography. Res. J. Inform. Technol., 5: 383-392. CrossRefDirect Link |
Hmood, A.K., B.B. Zaidan, A.A. Zaidan and H.A. Jalab, 2010. An overview on hiding information technique in images. J. Applied Sci., 10: 2094-2100. CrossRefDirect Link |
Hmood, A.K., Z.M. Kasirun, H.A. Jalab, G.M. Alam, A.A. Zaidan and B.B. Zaidan, 2010. On the accuracy of hiding information metrics: Counterfeit protection for education and important certificates. Int. J. Phys. Sci., 5: 1054-1062. Direct Link |
Hmood, A.K., Z.M. Kasirun, H.A. Jalab, G.M. Alam, A.A. Zaidan and B.B. Zaidan, 2010. On the accuracy of hiding information metrics: Counterfeit protection for education and important certificates. Int. J. Phys. Sci., 5: 1054-1062. Direct Link |
Hmood, K.K. and F.N. Al-Madi, 2013. Impact of cloud computing on todays market: facilitating the move from local to international business. Res. J. Bus. Manage., 7: 28-40. CrossRefDirect Link |
Janakiraman, S., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Compiler optimization and plain text pre-processing to hoist the height of HIGHT in AVR platform. Res. J. Inform. Technol., 6: 356-367. CrossRefDirect Link |
Janakiraman, S., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2012. Pixel forefinger for gray in color: A layer by layer stego. Inform. Technol. J., 11: 9-19. CrossRefDirect Link |
M. Padmaa, Y. Venkataramani 2014. Random Image Steganography using Pixel Indicator to Enhance Hiding Capacity J. Applied Sci., 14: 1798-1808. CrossRef |
Nabi, M.S.A., M.L.M. Kiah, B.B. Zaidan, A.A. Zaidan and G.M. Alam, 2010. Suitability of using SOAP protocol to secure electronic medical record databases transmission. Int. J. Pharmacol., 6: 959-964. CrossRefDirect Link |
Padmaa, M. and Y. Venkataramani, 2014. Adaptive data hiding based on visual cryptography. J. Applied Sci., 14: 1674-1688. CrossRefDirect Link |
Padmaa, M., Y. Venkataramani and R. Amirtharajan, 2011. Stego on 2n: 1 Platform for users and embedding. Inform. Technol. J., 10: 1896-1907. CrossRefDirect Link |
Praveenkumar, P., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Inserted embedding in OFDM channel: A multicarrier stego. Inform. Technol. J., 13: 2017-2021. CrossRefDirect Link |
Rajagopalan, S., H.N. Upadhyay, S. Varadarajan, J.B.B. Rayappan and R. Amirtharajan, 2014. Gyratory assisted info hide-a nibble differencing for message embedding. Inform. Technol. J., 13: 2005-2010. CrossRefDirect Link |
Rajagopalan, S., R. Amirtharajan, H.N. Upadhyay and J.B.B. Rayappan, 2012. Survey and analysis of hardware cryptographic and steganographic systems on FPGA. J. Applied Sci., 12: 201-210. CrossRefDirect Link |
Rajagopalan, S., Y. Ravishankar, H.N. Upadhyay, J.B.B. Rayappan and R. Amirtharajan, 2014. Modeling combo PR generator for Stego Storage Self Test (SSST). Inform. Technol. J., 13: 1936-1944. CrossRefDirect Link |
Salem, Y., M. Abomhara, O.O. Khalifa, A.A. Zaidan and B.B. Zaidan, 2011. A review on multimedia communications cryptography. Res. J. Inform. Technol., 3: 146-152. CrossRefDirect Link |
Thanikaiselvan, V., P. Arulmozhivarman, J.B.B. Rayappan and R. Amirtharajan, 2012. Graceful graph for graceful security-towards a STE (G) Raph. Res. J. Inform. Technol., 4: 220-227. CrossRefDirect Link |
Xia, B., X. Sun, L. Xiang, H. Luo and H. Yang, 2011. Detection of LSB matching steganography using neighborhood node degree characteristics. Inform. Technol. J., 10: 1601-1607. CrossRefDirect Link |
Zanganeh, O. and S. Ibrahim, 2011. Adaptive image steganography based on optimal embedding and robust against chi-square attack. Inform. Technol. J., 10: 1285-1294. CrossRefDirect Link |
Zeki, A.M., A.A. Manaf and S.S. Mahmod, 2011. High watermarking capacity based on spatial domain technique. Inform. Technol. J., 10: 1367-1373. CrossRef |
Citation to this article as recorded by
Electronic medical record systems: decision support
examination framework for individual, security and privacy concerns using
multi-perspective analysis Health and Technology |
A Hybrid Secured Approach Combining LSB Steganography and AES Using Mosaic Images for Ensuring Data Security SN Computer Science Vol. 3, Issue 2, , 2022 |
Based blockchain-PSO-AES techniques in finger vein biometrics: A
novel verification secure framework for patient authentication Computer Standards & Interfaces |
An innovative information hiding technique utilizing cumulative peak histogram regions Journal of Systems and Information Technology Vol. 14, Issue 4, 336, 2012 |
New Method of Image Steganography Based on Particle Swarm Optimization Algorithm in Spatial Domain for High Embedding Capacity IEEE Access |
Finger Vein Biometrics: Taxonomy Analysis, Open Challenges, Future Directions, and Recommended Solution for Decentralised Network Architectures IEEE Access |
A Systematic Review on Smartphone Skin Cancer Apps: Coherent
Taxonomy, Motivations, Open Challenges and Recommendations, and New Research
Direction Journal of Circuits, Systems and Computers |
A New Approach based on Multi-Dimensional Evaluation and
Benchmarking for Data Hiding Techniques International Journal of Information Technology & Decision Making |
Adaptive Image Steganography Based on Optimal Embedding and Robust Against Chi-square Attack Information Technology Journal Vol. 10, Issue 7, 1285, 2011 |
High Watermarking Capacity Based on Spatial Domain Technique Information Technology Journal Vol. 10, Issue 7, 1367, 2011 |
Detection of LSB Matching Steganography using Neighborhood Node Degree Characteristics Information Technology Journal Vol. 10, Issue 8, 1601, 2011 |
Stego on 2n:1 Platform for Users and Embedding Information Technology Journal Vol. 10, Issue 10, 1896, 2011 |
Random Image Steganography and Steganalysis: Present Status and Future Directions Information Technology Journal Vol. 11, Issue 5, 566, 2012 |
Inverted Pattern in Inverted Time Domain for Icon Steganography Information Technology Journal Vol. 11, Issue 5, 587, 2012 |
Pixel Forefinger for Gray in Color: A Layer by Layer Stego Information Technology Journal Vol. 11, Issue 1, 9, 2012 |
An Overview on Hiding Information Technique in Images Journal of Applied Sciences Vol. 10, Issue 18, 2094, 2010 |
Survey and Analysis of Hardware Cryptographic and Steganographic Systems on FPGA Journal of Applied Sciences Vol. 12, Issue 3, 201, 2012 |
A Review on Multimedia Communications Cryptography Research Journal of Information Technology Vol. 3, Issue 3, 146, 2011 |
Secured Online Payment Using Biometric Identification
System Advanced Materials Research |
How to cite this article
Ali K. Hmood, Hamid A. Jalab, Z.M. Kasirun, B.B. Zaidan and A.A. Zaidan, 2010. On the Capacity and Security of Steganography Approaches: An Overview. Journal of Applied Sciences, 10: 1825-1833.
DOI: 10.3923/jas.2010.1825.1833
URL: https://scialert.net/abstract/?doi=jas.2010.1825.1833
DOI: 10.3923/jas.2010.1825.1833
URL: https://scialert.net/abstract/?doi=jas.2010.1825.1833