|
Aarthie, N. and R. Amirtharajan, 2014. Image encryption: An information security perceptive. J. Artif. Intell., 7: 123-135. CrossRef | Direct Link |
Janakiraman, S., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Audio fingerprint indicator in embedded platform: A way for hardware steganography. J. Artif. Intell., 7: 82-93. CrossRef | Direct Link |
Janakiraman, S., K. Thenmozhi, S. Rajagopalan, H.N. Upadhyay, J.B.B. Rayappan and R. Amirtharajan, 2014. Space filling curve for data filling: An embedded security approach. Res. J. Inform. Technol., 6: 188-197. CrossRef | Direct Link |
M. Padmaa, Y. Venkataramani 2014. Encrypted Secret Blend with Image Steganography for Enhanced Imperceptibility and Capacity Res. J. Inform. Technol., 6: 342-355. CrossRef |
Praveenkumar, P., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Cryptic cover for covered writing: A pre-layered stego. Inform. Technol. J., 13: 2524-2533. CrossRef | Direct Link |
Praveenkumar, P., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Why information security demands transform domain, compression and encryption? J. Artif. Intell., 7: 136-144. CrossRef | Direct Link |
Praveenkumar, P., P. Rajalakshmi, G.U. Priyanga, K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Least significant bit but quantum bit: A Quasi stego. Inform. Technol. J., 13: 2544-2551. CrossRef | Direct Link |
Rajagopalan, S., H.N. Upadhyay, J.B.B. Rayappan and R. Amirtharajan, 2014. Galois field proficient product for secure image encryption on FPGA. Res. J. Inform. Technol., 6: 308-324. CrossRef | Direct Link |
Rajagopalan, S., H.N. Upadhyay, J.B.B. Rayappan and R. Amirtharajan, 2014. Logic elements consumption analysis of cellular automata based image encryption on FPGA. Res. J. Inform. Technol., 6: 291-307. CrossRef | Direct Link |
Rajagopalan, S., S. Janakiraman, B. Swaminath, H.N. Upadhyay, K. Thenmozhi and R. Amirtharajan, 2014. LabVIEW based PIN hider on ATM cards: A transform domain secret concealment approach. Res. J. Inform. Technol., 6: 154-165. CrossRef | Direct Link |
Thanikaiselvan, V., P. Arulmozhivarman, S. Chakrabarty, A. Agarwa, S. Subashanthini and R. Amirtharajan, 2014. Comparative analysis of (5/3) and Haar IWT based steganography. Inform. Technol. J., 13: 2534-2543. CrossRef | Direct Link |
Thanikaiselvan, V., S. Subashanthini and R. Amirtharajan, 2014. PVD based steganography on scrambled RGB cover images with pixel indicator. J. Artif. Intell., 7: 54-68. CrossRef | Direct Link |
|
|
Citation to this article as recorded by
|
Improved chaos-based video steganography using DNA
alphabets |
ICT Express
|
|
|
|
|
|