• [email protected]
  • +971 507 888 742
Submit Manuscript
SciAlert
  • Home
  • Journals
  • Information
    • For Authors
    • For Referees
    • For Librarian
    • For Societies
  • Contact
  1. Research Journal of Information Technology
  2. Vol 5 (2), 2013
  3. 137-148
  • Online First
  • Current Issue
  • Previous Issues
  • More Information
    Aims and Scope Editorial Board Guide to Authors Article Processing Charges
    Submit a Manuscript

Research Journal of Information Technology

Year: 2013 | Volume: 5 | Issue: 2 | Page No.: 137-148

Facebook Twitter Digg Reddit Linkedin StumbleUpon E-mail

Article Trend



Total views 564

Authors


Rengarajan Amirtharajan

Country: India

S. Deepak Roy

Country: India

Noel Nesakumar

Country: India

M. Chandrasekar

Country: India

R. Sridevi

Country: India

J.B.B. Rayappan

Country: India

Keywords


  • Information hiding
  • steganography
  • novel cover generation methods
Research Article

Mind Game for Cover Steganography: A Refuge

Rengarajan Amirtharajan, S. Deepak Roy, Noel Nesakumar, M. Chandrasekar, R. Sridevi and J.B.B. Rayappan
PDF Abstract Fulltext XML References

Citation to this article as recorded by ASCI logo

Aarthie, N. and R. Amirtharajan, 2014. Image encryption: An information security perceptive. J. Artif. Intell., 7: 123-135.
CrossRefDirect Link

Janakiraman, S., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Audio fingerprint indicator in embedded platform: A way for hardware steganography. J. Artif. Intell., 7: 82-93.
CrossRefDirect Link

Janakiraman, S., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Compiler optimization and plain text pre-processing to hoist the height of HIGHT in AVR platform. Res. J. Inform. Technol., 6: 356-367.
CrossRefDirect Link

Janakiraman, S., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Graphical password authentication scheme for embedded platform. J. Artif. Intell., 7: 161-171.
CrossRefDirect Link

Janakiraman, S., K. Thenmozhi, S. Rajagopalan, H.N. Upadhyay, J.B.B. Rayappan and R. Amirtharajan, 2014. Space filling curve for data filling: An embedded security approach. Res. J. Inform. Technol., 6: 188-197.
CrossRefDirect Link

M. Padmaa, Y. Venkataramani 2014. Encrypted Secret Blend with Image Steganography for Enhanced Imperceptibility and Capacity Res. J. Inform. Technol., 6: 342-355.
CrossRef

Praveenkumar, P., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Cryptic cover for covered writing: A pre-layered stego. Inform. Technol. J., 13: 2524-2533.
CrossRefDirect Link

Praveenkumar, P., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Why information security demands transform domain, compression and encryption? J. Artif. Intell., 7: 136-144.
CrossRefDirect Link

Praveenkumar, P., P. Rajalakshmi, G.U. Priyanga, K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Least significant bit but quantum bit: A Quasi stego. Inform. Technol. J., 13: 2544-2551.
CrossRefDirect Link

Praveenkumar, P., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2014. Coded crypted converted hiding (C3H)-a stego channel. J. Applied Sci., 14: 1786-1797.
CrossRefDirect Link

Praveenkumar, P., R. Amirtharajan, R.S. Janani, K. Thenmozhi and J.B.B. Rayappan, 2014. Multi (Carrier+Modulator) adaptive system-an anti fading stego approach. J. Applied Sci., 14: 1836-1843.
CrossRefDirect Link

Rajagopalan, S., H.N. Upadhyay, J.B.B. Rayappan and R. Amirtharajan, 2014. Dual cellular automata on FPGA: An image encryptors chip. Res. J. Inform. Technol., 6: 223-236.
CrossRefDirect Link

Rajagopalan, S., H.N. Upadhyay, J.B.B. Rayappan and R. Amirtharajan, 2014. Galois field proficient product for secure image encryption on FPGA. Res. J. Inform. Technol., 6: 308-324.
CrossRefDirect Link

Rajagopalan, S., H.N. Upadhyay, J.B.B. Rayappan and R. Amirtharajan, 2014. Logic elements consumption analysis of cellular automata based image encryption on FPGA. Res. J. Inform. Technol., 6: 291-307.
CrossRefDirect Link

Rajagopalan, S., S. Janakiraman, B. Swaminath, H.N. Upadhyay, K. Thenmozhi and R. Amirtharajan, 2014. LabVIEW based PIN hider on ATM cards: A transform domain secret concealment approach. Res. J. Inform. Technol., 6: 154-165.
CrossRefDirect Link

Thanikaiselvan, V., P. Arulmozhivarman, S. Chakrabarty, A. Agarwa, S. Subashanthini and R. Amirtharajan, 2014. Comparative analysis of (5/3) and Haar IWT based steganography. Inform. Technol. J., 13: 2534-2543.
CrossRefDirect Link

Thanikaiselvan, V., S. Subashanthini and R. Amirtharajan, 2014. PVD based steganography on scrambled RGB cover images with pixel indicator. J. Artif. Intell., 7: 54-68.
CrossRefDirect Link

How to cite this article

Rengarajan Amirtharajan, S. Deepak Roy, Noel Nesakumar, M. Chandrasekar, R. Sridevi and J.B.B. Rayappan, 2013. Mind Game for Cover Steganography: A Refuge. Research Journal of Information Technology, 5: 137-148.

URL: https://scialert.net/abstract/?doi=rjit.2013.137.148

Useful Links

  • Journals
  • For Authors
  • For Referees
  • For Librarian
  • For Socities

Contact Us

Office Number 1128,
Tamani Arts Building,
Business Bay,
Deira, Dubai, UAE

Phone: +971 507 888 742
Email: [email protected]

About Science Alert

Science Alert is a technology platform and service provider for scholarly publishers, helping them to publish and distribute their content online. We provide a range of services, including hosting, design, and digital marketing, as well as analytics and other tools to help publishers understand their audience and optimize their content. Science Alert works with a wide variety of publishers, including academic societies, universities, and commercial publishers.

Follow Us
© Copyright Science Alert. All Rights Reserved