Research Article

Citations for "An Overview on Hiding Information Technique in Images"


Citation to this article as recorded by ASCI logo


Alanizi, H.O., M.L.M. Kiah, A.A. Zaidan, B.B. Zaidan and G.M. Alam, 2010. Secure topology for electronic medical record transmissions. Int. J. Pharmacol., 6: 954-958.
CrossRef  |  Direct Link  |  

Amirtharajan, R. and J.B.B. Rayappan, 2012. Brownian motion of binary and gray-binary and gray bits in image for stego. J. Applied Sci., 12: 428-439.
CrossRef  |  Direct Link  |  

Amirtharajan, R. and J.B.B. Rayappan, 2012. Inverted pattern in inverted time domain for icon steganography. Inform. Technol. J., 11: 587-595.
CrossRef  |  Direct Link  |  

Amirtharajan, R. and J.B.B. Rayappan, 2012. Pixel authorized by pixel to trace with SFC on image to sabotage data mugger: A comparative study on PI stego. Res. J. Inform. Technol., 4: 124-139.
CrossRef  |  Direct Link  |  

Amirtharajan, R. and J.B.B. Rayappan, 2013. Steganography-time to time: A review. Res. J. Inform. Technol., 5: 53-66.
CrossRef  |  Direct Link  |  

Amirtharajan, R., G. Aishwarya, M.S.K. Karthik, V. Thanikaiselvan and J.B.B. Rayappan, 2013. Bio-hiding for smart swipe card: A secret security. Res. J. Inform. Technol., 5: 100-112.
CrossRef  |  Direct Link  |  

Amirtharajan, R., I. Rosaline, R. Swamy, S. Pavan and R. Sridevi et al., 2014. Cover G for 3 and 4 G-A Stego Product Inf. Technol. J., 13: 1977-1984.
CrossRef  |  Direct Link  |  

Amirtharajan, R., J. Qin and J.B.B. Rayappan, 2012. Random image steganography and steganalysis: Present status and future directions. Inform. Technol. J., 11: 566-576.
CrossRef  |  Direct Link  |  

Amirtharajan, R., J.H.S. Karthikesh, M.N. Reddy, C.S.H. Kaushik and J.B.B. Rayappan, 2013. Compressed and encrypted secret hides in image for rugged stego. Res. J. Inform. Technol., 5: 234-241.
CrossRef  |  Direct Link  |  

Amirtharajan, R., K.M. Ashfaaq, A.K. Infant and J.B.B. Rayappan, 2013. High performance pixel indicator for colour image steganography. Res. J. Inform. Technol., 5: 277-290.
CrossRef  |  Direct Link  |  

Amirtharajan, R., M.V. Abhiram, G. Revathi, J.B. Reddy, V. Thanikaiselvan and J.B.B. Rayappan, 2013. Rubik's cube: A way for random image steganography. Res. J. Inform. Technol., 5: 329-340.
CrossRef  |  Direct Link  |  

Amirtharajan, R., P. Archana and J.B.B. Rayappan, 2013. Why image encryption for better steganography. Res. J. Inform. Technol., 5: 341-351.
CrossRef  |  Direct Link  |  

Amirtharajan, R., P.S. Priya and J.B.B. Rayappan, 2013. Pixel indicated user indicator: A muxed stego. Res. J. Inform. Technol., 5: 73-86.
CrossRef  |  Direct Link  |  

Amirtharajan, R., R. Anushiadevi, V. Meena, V. Kalpana and J.B.B. Rayappan, 2013. Concealed to protect and protect to conceal: A conserved stego image. Res. J. Inform. Technol., 5: 209-217.
CrossRef  |  Direct Link  |  

Amirtharajan, R., R. Anushiadevi, V. Meena, V. Kalpana and J.B.B. Rayappan, 2013. Image hides image: A secret stego tri-layer approach. Res. J. Inform. Technol., 5: 249-255.
CrossRef  |  Direct Link  |  

Amirtharajan, R., R. Anushiadevi, V. Meena, V. Kalpana and J.B.B. Rayappan, 2013. Random abrasion on image for security magnification. Res. J. Inform. Technol., 5: 317-328.
CrossRef  |  Direct Link  |  

Amirtharajan, R., R. Subrahmanyam, J.N. Teja, K.M. Reddy and J.B.B. Rayappan, 2013. Pixel indicated triple layer: A way for random image steganography. Res. J. Inform. Technol., 5: 87-99.
CrossRef  |  Direct Link  |  

Amirtharajan, R., S.D. Roy, N. Nesakumar, M. Chandrasekar, R. Sridevi and J.B.B. Rayappan, 2013. Mind game for cover steganography: A refuge. Res. J. Inform. Technol., 5: 137-148.
CrossRef  |  Direct Link  |  

Amirtharajan, R., V. Mahalakshmi, J. Nandhini, R. Kavitha and J.B.B. Rayappan, 2013. Key decided cover for random image steganography. Res. J. Inform. Technol., 5: 171-180.
CrossRef  |  Direct Link  |  

Amirtharajan, R., V. Rajesh, P. Archana and J.B.B. Rayappan, 2013. Pixel indicates, standard deviates: A way for random image steganography. Res. J. Inform. Technol., 5: 383-392.
CrossRef  |  Direct Link  |  

Hmood, K.K. and F.N. Al-Madi, 2013. Impact of cloud computing on today’s market: facilitating the move from local to international business. Res. J. Bus. Manage., 7: 28-40.
CrossRef  |  Direct Link  |  

Janakiraman, S., J. Chakravarthy, B. Radhakrishnan, K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Cover as key and key as data: An inborn stego. Inform. Technol. J., 13: 1969-1976.
CrossRef  |  Direct Link  |  

Janakiraman, S., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2012. Pixel forefinger for gray in color: A layer by layer stego. Inform. Technol. J., 11: 9-19.
CrossRef  |  Direct Link  |  

Janakiraman, S., S. Rajagopalan, K. Thenmozhi, H.N. Upadhyay and J. Ramanathan et al., 2013. Captivating CODEC Stego (CCS): A cover on camouflage. Res. J. Inform. Technol., 5: 160-170.
CrossRef  |  Direct Link  |  

Li, Y.W. and W. Hong, 2012. An improved reversible data hiding method using alternative location map embedment strategy. Inform. Technol. J., 11: 1109-1114.
CrossRef  |  Direct Link  |  

M. Padmaa, Y. Venkataramani 2014. Random Image Steganography using Pixel Indicator to Enhance Hiding Capacity J. Applied Sci., 14: 1798-1808.
CrossRef  |  

Nabi, M.S.A., M.L.M. Kiah, B.B. Zaidan, A.A. Zaidan and G.M. Alam, 2010. Suitability of using SOAP protocol to secure electronic medical record databases transmission. Int. J. Pharmacol., 6: 959-964.
CrossRef  |  Direct Link  |  

Padmaa, M. and Y. Venkataramani, 2014. Adaptive data hiding based on visual cryptography. J. Applied Sci., 14: 1674-1688.
CrossRef  |  Direct Link  |  

Padmaa, M., Y. Venkataramani and R. Amirtharajan, 2011. Stego on 2n: 1 Platform for users and embedding. Inform. Technol. J., 10: 1896-1907.
CrossRef  |  Direct Link  |  

Praveenkumar, P., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Inserted embedding in OFDM channel: A multicarrier stego. Inform. Technol. J., 13: 2017-2021.
CrossRef  |  Direct Link  |  

Rajagopalan, S., H.N. Upadhyay, S. Varadarajan, J.B.B. Rayappan and R. Amirtharajan, 2014. Gyratory assisted info hide-a nibble differencing for message embedding. Inform. Technol. J., 13: 2005-2010.
CrossRef  |  Direct Link  |  

Rajagopalan, S., Y. Ravishankar, H.N. Upadhyay, J.B.B. Rayappan and R. Amirtharajan, 2014. Modeling combo PR generator for Stego Storage Self Test (SSST). Inform. Technol. J., 13: 1936-1944.
CrossRef  |  Direct Link  |  

Salem, Y., M. Abomhara, O.O. Khalifa, A.A. Zaidan and B.B. Zaidan, 2011. A review on multimedia communications cryptography. Res. J. Inform. Technol., 3: 146-152.
CrossRef  |  Direct Link  |  

Thanikaiselvan, V., P. Arulmozhivarman, J.B.B. Rayappan and R. Amirtharajan, 2012. Graceful graph for graceful security-towards a STE (G) Raph. Res. J. Inform. Technol., 4: 220-227.
CrossRef  |  Direct Link  |  

Thenmozhi, K., P. Praveenkumar, R. Amirtharajan, V. Prithiviraj, R. Varadarajan and J.B.B. Rayappan, 2012. OFDM+CDMA+Stego = Secure communication: A review. Res. J. Inform. Technol., 4: 31-46.
CrossRef  |  Direct Link  |  

Xia, B., X. Sun, L. Xiang, H. Luo and H. Yang, 2011. Detection of LSB matching steganography using neighborhood node degree characteristics. Inform. Technol. J., 10: 1601-1607.
CrossRef  |  Direct Link  |  

Zanganeh, O. and S. Ibrahim, 2011. Adaptive image steganography based on optimal embedding and robust against chi-square attack. Inform. Technol. J., 10: 1285-1294.
CrossRef  |  Direct Link  |  


Citations in impact factor journal as recorded by Crossref logo


Real-Time Medical Systems Based on Human Biometric Steganography: a Systematic Review
Journal of Medical Systems Vol. 42, Issue 12, , 2018

Sensor-Based mHealth Authentication for Real-Time Remote Healthcare Monitoring System: A Multilayer Systematic Review
Journal of Medical Systems Vol. 43, Issue 2, , 2019

Based Medical Systems for Patient’s Authentication: Towards a New Verification Secure Framework Using CIA Standard
Journal of Medical Systems Vol. 43, Issue 7, , 2019

PSO–Blockchain-based image steganography: towards a new method to secure updating and sharing COVID-19 data in decentralised hospitals intelligence architecture
Multimedia Tools and Applications

A new high capacity and secure image realization steganography based on ASCII code matching
Multimedia Tools and Applications

Comparative Study on the Evaluation and Benchmarking Information Hiding Approaches Based Multi-Measurement Analysis Using TOPSIS Method with Different Normalisation, Separation and Context Techniques
Measurement

Secure Topology for Electronic Medical Record Transmissions
International Journal of Pharmacology Vol. 6, Issue 6, 954, 2010


Citation to this article as recorded by Crossref logo


A Hybrid Secured Approach Combining LSB Steganography and AES Using Mosaic Images for Ensuring Data Security
SN Computer Science Vol. 3, Issue 2, , 2022

Based blockchain-PSO-AES techniques in finger vein biometrics: A novel verification secure framework for patient authentication
Computer Standards & Interfaces

Assesment of the Image Distortion in Using Various Bit Lengths of Steganographic LSB
ITM Web of Conferences

New Method of Image Steganography Based on Particle Swarm Optimization Algorithm in Spatial Domain for High Embedding Capacity
IEEE Access

Finger Vein Biometrics: Taxonomy Analysis, Open Challenges, Future Directions, and Recommended Solution for Decentralised Network Architectures
IEEE Access

LSB Based Text and Image Steganography Using AES Algorithm
2018 3rd International Conference on Communication and Electronics Systems (ICCES)

A Systematic Review on Smartphone Skin Cancer Apps: Coherent Taxonomy, Motivations, Open Challenges and Recommendations, and New Research Direction
Journal of Circuits, Systems and Computers

A New Approach based on Multi-Dimensional Evaluation and Benchmarking for Data Hiding Techniques
International Journal of Information Technology & Decision Making

MODIFIED APPROACH USING LSB IN IMAGE STEGANOGRAPHY
International Journal of Research -GRANTHAALAYAH Vol. 3, Issue 5, 88, 2015

Adaptive Image Steganography Based on Optimal Embedding and Robust Against Chi-square Attack
Information Technology Journal Vol. 10, Issue 7, 1285, 2011

Detection of LSB Matching Steganography using Neighborhood Node Degree Characteristics
Information Technology Journal Vol. 10, Issue 8, 1601, 2011

Stego on 2n:1 Platform for Users and Embedding
Information Technology Journal Vol. 10, Issue 10, 1896, 2011

Random Image Steganography and Steganalysis: Present Status and Future Directions
Information Technology Journal Vol. 11, Issue 5, 566, 2012

Inverted Pattern in Inverted Time Domain for Icon Steganography
Information Technology Journal Vol. 11, Issue 5, 587, 2012

Pixel Forefinger for Gray in Color: A Layer by Layer Stego
Information Technology Journal Vol. 11, Issue 1, 9, 2012

A Review on Multimedia Communications Cryptography
Research Journal of Information Technology Vol. 3, Issue 3, 146, 2011

OFDM+CDMA+Stego = Secure Communication: A Review
Research Journal of Information Technology Vol. 4, Issue 2, 31, 2012

Secured Online Payment Using Biometric Identification System
Advanced Materials Research

Services
Related Articles in ASCI
Search in Google Scholar
View Citation
Report Citation

 
©  2022 Science Alert. All Rights Reserved