• [email protected]
  • +971 507 888 742
Submit Manuscript
SciAlert
  • Home
  • Journals
  • Information
    • For Authors
    • For Referees
    • For Librarian
    • For Societies
  • Contact
  1. Research Journal of Information Technology
  2. Vol 5 (2), 2013
  3. 53-66
  • Online First
  • Current Issue
  • Previous Issues
  • More Information
    Aims and Scope Editorial Board Guide to Authors Article Processing Charges
    Submit a Manuscript

Research Journal of Information Technology

Year: 2013 | Volume: 5 | Issue: 2 | Page No.: 53-66

Facebook Twitter Digg Reddit Linkedin StumbleUpon E-mail

Article Trend



Total views 638

Authors


Rengarajan Amirtharajan

Country: India

J.B.B. Rayappan

Country: India

Keywords


  • steganography
  • information hiding
  • data hiding
  • Data security
  • steganalysis
Review Article

Steganography-Time to Time: A Review

Rengarajan Amirtharajan and J.B.B. Rayappan
PDF Abstract Fulltext XML References

Citations in impact factor journals

A survey on information hiding using video steganography
Artificial Intelligence Review
A robust and imperceptible steganography technique for SD and HD videos
Multimedia Tools and Applications
Evolving Generative Adversarial Networks to improve image steganography
Expert Systems with Applications
An integrated process for effective utilization of collagenous protein from raw hide trimmings: Valorization of tannery solid wastes
Journal of Cleaner Production

Citation to this article as recorded by ASCI logo

Aarthie, N. and R. Amirtharajan, 2014. Image encryption: An information security perceptive. J. Artif. Intell., 7: 123-135.
CrossRefDirect Link

Janakiraman, S., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Audio fingerprint indicator in embedded platform: A way for hardware steganography. J. Artif. Intell., 7: 82-93.
CrossRefDirect Link

Janakiraman, S., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Compiler optimization and plain text pre-processing to hoist the height of HIGHT in AVR platform. Res. J. Inform. Technol., 6: 356-367.
CrossRefDirect Link

Janakiraman, S., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Graphical password authentication scheme for embedded platform. J. Artif. Intell., 7: 161-171.
CrossRefDirect Link

Janakiraman, S., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2015. Light weight steganography on RISC platform-implementation and analysis. Asian J. Scient. Res., 8: 278-290.
CrossRefDirect Link

Janakiraman, S., K. Thenmozhi, S. Rajagopalan, H.N. Upadhyay, J.B.B. Rayappan and R. Amirtharajan, 2014. Space filling curve for data filling: An embedded security approach. Res. J. Inform. Technol., 6: 188-197.
CrossRefDirect Link

M. Padmaa, Y. Venkataramani 2014. Encrypted Secret Blend with Image Steganography for Enhanced Imperceptibility and Capacity Res. J. Inform. Technol., 6: 342-355.
CrossRef

M. Padmaa, Y. Venkataramani 2014. Random Image Steganography using Pixel Indicator to Enhance Hiding Capacity J. Applied Sci., 14: 1798-1808.
CrossRef

Padmaa, M. and Y. Venkataramani, 2014. Adaptive data hiding based on visual cryptography. J. Applied Sci., 14: 1674-1688.
CrossRefDirect Link

Praveenkumar, P., G. Ashwin, S.P.K. Agarwal, S.N. Bharathi, V.S. Venkatachalam, K. Thenmozhi and R. Amirtharajan, 2014. Rubik's cube blend with logistic map on RGB: A way for image encryption. Res. J. Inform. Technol., 6: 207-215.
CrossRefDirect Link

Praveenkumar, P., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Cryptic cover for covered writing: A pre-layered stego. Inform. Technol. J., 13: 2524-2533.
CrossRefDirect Link

Praveenkumar, P., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Why information security demands transform domain, compression and encryption? J. Artif. Intell., 7: 136-144.
CrossRefDirect Link

Praveenkumar, P., P. Rajalakshmi, G.U. Priyanga, K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Least significant bit but quantum bit: A Quasi stego. Inform. Technol. J., 13: 2544-2551.
CrossRefDirect Link

Praveenkumar, P., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2014. Coded crypted converted hiding (C3H)-a stego channel. J. Applied Sci., 14: 1786-1797.
CrossRefDirect Link

Praveenkumar, P., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2014. Double layer encoded encrypted data on multicarrier channel. J. Applied Sci., 14: 1689-1700.
CrossRefDirect Link

Praveenkumar, P., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2014. Sub carriers carry secret: An absolute stego approach. J. Applied Sci., 14: 1728-1735.
CrossRefDirect Link

Praveenkumar, P., R. Amirtharajan, R.S. Janani, K. Thenmozhi and J.B.B. Rayappan, 2014. Multi (Carrier+Modulator) adaptive system-an anti fading stego approach. J. Applied Sci., 14: 1836-1843.
CrossRefDirect Link

Praveenkumar, P., R. Hemalatha, R. Uma, K. Madhunisha, K. Thenmozhi and R. Amirtharajan, 2014. Image Zoning→ encryption. Res. J. Inform. Technol., 6: 368-378.
CrossRefDirect Link

Rajagopalan, S., H.N. Upadhyay, J.B.B. Rayappan and R. Amirtharajan, 2014. Dual cellular automata on FPGA: An image encryptors chip. Res. J. Inform. Technol., 6: 223-236.
CrossRefDirect Link

Rajagopalan, S., H.N. Upadhyay, J.B.B. Rayappan and R. Amirtharajan, 2014. Galois field proficient product for secure image encryption on FPGA. Res. J. Inform. Technol., 6: 308-324.
CrossRefDirect Link

Rajagopalan, S., H.N. Upadhyay, J.B.B. Rayappan and R. Amirtharajan, 2014. Logic elements consumption analysis of cellular automata based image encryption on FPGA. Res. J. Inform. Technol., 6: 291-307.
CrossRefDirect Link

Rajagopalan, S., S. Janakiraman, B. Swaminath, H.N. Upadhyay, K. Thenmozhi and R. Amirtharajan, 2014. LabVIEW based PIN hider on ATM cards: A transform domain secret concealment approach. Res. J. Inform. Technol., 6: 154-165.
CrossRefDirect Link

Ramalingam, B., R. Amirtharajan and J.B.B. Rayappan, 2014. LCC-LSB-FPGA stego-A reconfigurable security. J. Applied Sci., 14: 2139-2148.
CrossRefDirect Link

Shaik, A., V. Thanikaiselvan and R. Amitharajan, 2017. Data security through data hiding in images: A review. J. Artif. Intell., 10: 1-21.
CrossRefDirect Link

Thanikaiselvan, V., P. Arulmozhivarman, S. Chakrabarty, A. Agarwa, S. Subashanthini and R. Amirtharajan, 2014. Comparative analysis of (5/3) and Haar IWT based steganography. Inform. Technol. J., 13: 2534-2543.
CrossRefDirect Link

Thanikaiselvan, V., S. Subashanthini and R. Amirtharajan, 2014. PVD based steganography on scrambled RGB cover images with pixel indicator. J. Artif. Intell., 7: 54-68.
CrossRefDirect Link

Citation to this article as recorded by Crossref logo

Ionic liquids in supercritical methanol greatly enhance transesterification reaction for high‐yield biodiesel production
AIChE Journal Vol. 62, Issue 11, 3842, 2016
Shadow Image Based Reversible Data Hiding Using Addition and Subtraction Logic on the LSB Planes
Sensing and Imaging Vol. 22, Issue 1, , 2021
Evaluating Hamming Distance as a CRC-based Side-channel Detection Measure in Wi-Fi Networks
Procedia Computer Science
Variation of PM2.5 and PM10 in emissions and chemical compositions in different seasons from a manure-belt laying hen house
Poultry Science
Effects of housing systems and feed additive on growth, carcass traits, liver function, oxidative status, thyroid function and immune parameters of broilers
Poultry Science
A robust image-based cryptology scheme based on cellular nonlinear network and local image descriptors
International Journal of Parallel, Emergent and Distributed Systems
Evaluation of orthogonal and biorthogonal wavelets for video steganography
Information Security Journal: A Global Perspective
Securing graph steganography by using Shamir’s secret sharing
IOP Conference Series: Materials Science and Engineering Vol. 830, Issue 3, 032022, 2020
Protective effect of crocetin on bovine spermatozoa against oxidative stress during in vitro fertilization
Andrology Vol. 4, Issue 6, 1138, 2016
Digital image steganography and steganalysis: A journey of the past three decades
Open Computer Science Vol. 10, Issue 1, 296, 2020
Data Security Through Data Hiding in Images: A Review
Journal of Artificial Intelligence Vol. 10, Issue 1, 1, 2016
A New Method to Estimate Peak Signal to Noise Ratio for Least Significant Bit Modification Audio Steganography
Pertanika Journal of Science and Technology Vol. 30, Issue 1, 497, 2022

How to cite this article

Rengarajan Amirtharajan and J.B.B. Rayappan, 2013. Steganography-Time to Time: A Review. Research Journal of Information Technology, 5: 53-66.

URL: https://scialert.net/abstract/?doi=rjit.2013.53.66

Useful Links

  • Journals
  • For Authors
  • For Referees
  • For Librarian
  • For Socities

Contact Us

Office Number 1128,
Tamani Arts Building,
Business Bay,
Deira, Dubai, UAE

Phone: +971 507 888 742
Email: [email protected]

About Science Alert

Science Alert is a technology platform and service provider for scholarly publishers, helping them to publish and distribute their content online. We provide a range of services, including hosting, design, and digital marketing, as well as analytics and other tools to help publishers understand their audience and optimize their content. Science Alert works with a wide variety of publishers, including academic societies, universities, and commercial publishers.

Follow Us
© Copyright Science Alert. All Rights Reserved