Citations in impact factor journals
A survey on information hiding using video steganography Artificial Intelligence Review |
A robust and imperceptible steganography technique for SD and HD
videos Multimedia Tools and Applications |
Evolving Generative Adversarial Networks to improve image steganography Expert Systems with Applications |
An integrated process for effective utilization of collagenous protein from raw hide trimmings: Valorization of tannery solid wastes Journal of Cleaner Production |
Citation to this article as recorded by
Aarthie, N. and R. Amirtharajan, 2014. Image encryption: An information security perceptive. J. Artif. Intell., 7: 123-135. CrossRefDirect Link |
Janakiraman, S., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Audio fingerprint indicator in embedded platform: A way for hardware steganography. J. Artif. Intell., 7: 82-93. CrossRefDirect Link |
Janakiraman, S., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Compiler optimization and plain text pre-processing to hoist the height of HIGHT in AVR platform. Res. J. Inform. Technol., 6: 356-367. CrossRefDirect Link |
Janakiraman, S., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Graphical password authentication scheme for embedded platform. J. Artif. Intell., 7: 161-171. CrossRefDirect Link |
Janakiraman, S., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2015. Light weight steganography on RISC platform-implementation and analysis. Asian J. Scient. Res., 8: 278-290. CrossRefDirect Link |
Janakiraman, S., K. Thenmozhi, S. Rajagopalan, H.N. Upadhyay, J.B.B. Rayappan and R. Amirtharajan, 2014. Space filling curve for data filling: An embedded security approach. Res. J. Inform. Technol., 6: 188-197. CrossRefDirect Link |
M. Padmaa, Y. Venkataramani 2014. Encrypted Secret Blend with Image Steganography for Enhanced Imperceptibility and Capacity Res. J. Inform. Technol., 6: 342-355. CrossRef |
M. Padmaa, Y. Venkataramani 2014. Random Image Steganography using Pixel Indicator to Enhance Hiding Capacity J. Applied Sci., 14: 1798-1808. CrossRef |
Padmaa, M. and Y. Venkataramani, 2014. Adaptive data hiding based on visual cryptography. J. Applied Sci., 14: 1674-1688. CrossRefDirect Link |
Praveenkumar, P., G. Ashwin, S.P.K. Agarwal, S.N. Bharathi, V.S. Venkatachalam, K. Thenmozhi and R. Amirtharajan, 2014. Rubik's cube blend with logistic map on RGB: A way for image encryption. Res. J. Inform. Technol., 6: 207-215. CrossRefDirect Link |
Praveenkumar, P., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Cryptic cover for covered writing: A pre-layered stego. Inform. Technol. J., 13: 2524-2533. CrossRefDirect Link |
Praveenkumar, P., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Why information security demands transform domain, compression and encryption? J. Artif. Intell., 7: 136-144. CrossRefDirect Link |
Praveenkumar, P., P. Rajalakshmi, G.U. Priyanga, K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Least significant bit but quantum bit: A Quasi stego. Inform. Technol. J., 13: 2544-2551. CrossRefDirect Link |
Praveenkumar, P., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2014. Coded crypted converted hiding (C3H)-a stego channel. J. Applied Sci., 14: 1786-1797. CrossRefDirect Link |
Praveenkumar, P., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2014. Double layer encoded encrypted data on multicarrier channel. J. Applied Sci., 14: 1689-1700. CrossRefDirect Link |
Praveenkumar, P., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2014. Sub carriers carry secret: An absolute stego approach. J. Applied Sci., 14: 1728-1735. CrossRefDirect Link |
Praveenkumar, P., R. Amirtharajan, R.S. Janani, K. Thenmozhi and J.B.B. Rayappan, 2014. Multi (Carrier+Modulator) adaptive system-an anti fading stego approach. J. Applied Sci., 14: 1836-1843. CrossRefDirect Link |
Praveenkumar, P., R. Hemalatha, R. Uma, K. Madhunisha, K. Thenmozhi and R. Amirtharajan, 2014. Image Zoning→ encryption. Res. J. Inform. Technol., 6: 368-378. CrossRefDirect Link |
Rajagopalan, S., H.N. Upadhyay, J.B.B. Rayappan and R. Amirtharajan, 2014. Dual cellular automata on FPGA: An image encryptors chip. Res. J. Inform. Technol., 6: 223-236. CrossRefDirect Link |
Rajagopalan, S., H.N. Upadhyay, J.B.B. Rayappan and R. Amirtharajan, 2014. Galois field proficient product for secure image encryption on FPGA. Res. J. Inform. Technol., 6: 308-324. CrossRefDirect Link |
Rajagopalan, S., H.N. Upadhyay, J.B.B. Rayappan and R. Amirtharajan, 2014. Logic elements consumption analysis of cellular automata based image encryption on FPGA. Res. J. Inform. Technol., 6: 291-307. CrossRefDirect Link |
Rajagopalan, S., S. Janakiraman, B. Swaminath, H.N. Upadhyay, K. Thenmozhi and R. Amirtharajan, 2014. LabVIEW based PIN hider on ATM cards: A transform domain secret concealment approach. Res. J. Inform. Technol., 6: 154-165. CrossRefDirect Link |
Ramalingam, B., R. Amirtharajan and J.B.B. Rayappan, 2014. LCC-LSB-FPGA stego-A reconfigurable security. J. Applied Sci., 14: 2139-2148. CrossRefDirect Link |
Shaik, A., V. Thanikaiselvan and R. Amitharajan, 2017. Data security through data hiding in images: A review. J. Artif. Intell., 10: 1-21. CrossRefDirect Link |
Thanikaiselvan, V., P. Arulmozhivarman, S. Chakrabarty, A. Agarwa, S. Subashanthini and R. Amirtharajan, 2014. Comparative analysis of (5/3) and Haar IWT based steganography. Inform. Technol. J., 13: 2534-2543. CrossRefDirect Link |
Thanikaiselvan, V., S. Subashanthini and R. Amirtharajan, 2014. PVD based steganography on scrambled RGB cover images with pixel indicator. J. Artif. Intell., 7: 54-68. CrossRefDirect Link |
Citation to this article as recorded by
Ionic liquids in supercritical methanol greatly enhance transesterification reaction for high‐yield biodiesel production AIChE Journal Vol. 62, Issue 11, 3842, 2016 |
Shadow Image Based Reversible Data Hiding Using Addition and Subtraction Logic on the LSB Planes Sensing and Imaging Vol. 22, Issue 1, , 2021 |
Evaluating Hamming Distance as a CRC-based Side-channel Detection Measure in Wi-Fi Networks Procedia Computer Science |
Variation of PM2.5 and PM10 in emissions and chemical compositions in different seasons from a manure-belt laying hen house Poultry Science |
Effects of housing systems and feed additive on growth, carcass traits, liver function, oxidative status, thyroid function and immune parameters of broilers Poultry Science |
A robust image-based cryptology scheme based on cellular
nonlinear network and local image descriptors International Journal of Parallel, Emergent and Distributed Systems |
Evaluation of orthogonal and biorthogonal wavelets for video steganography Information Security Journal: A Global Perspective |
Securing graph steganography by using Shamir’s secret sharing IOP Conference Series: Materials Science and Engineering Vol. 830, Issue 3, 032022, 2020 |
Protective effect of crocetin on bovine spermatozoa against oxidative stress during in vitro fertilization Andrology Vol. 4, Issue 6, 1138, 2016 |
Digital image steganography and steganalysis: A journey of the past three decades Open Computer Science Vol. 10, Issue 1, 296, 2020 |
Data Security Through Data Hiding in Images: A
Review Journal of Artificial Intelligence Vol. 10, Issue 1, 1, 2016 |
A New Method to Estimate Peak Signal to Noise Ratio for Least Significant Bit Modification Audio Steganography Pertanika Journal of Science and Technology Vol. 30, Issue 1, 497, 2022 |
How to cite this article
Rengarajan Amirtharajan and J.B.B. Rayappan, 2013. Steganography-Time to Time: A Review. Research Journal of Information Technology, 5: 53-66.
URL: https://scialert.net/abstract/?doi=rjit.2013.53.66
URL: https://scialert.net/abstract/?doi=rjit.2013.53.66