Research Article
Rubiks Cube Blend with Logistic Map on RGB: A Way for Image Encryption
Padmapriya Praveenkumar,
G. Ashwin,
S.P. Kartavya Agarwal,
S. Naveen Bharathi,
V. Suraj Venkatachalam,
K. Thenmozhi and Rengarajan Amirtharajan
A Secure Steganographic Algorithm Based on Frequency Domain for
the Transmission of Hidden Information Security and Communication Networks |
Aarthie, N. and R. Amirtharajan, 2014. Image encryption: An information security perceptive. J. Artif. Intell., 7: 123-135. CrossRefDirect Link |
Janakiraman, S., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Graphical password authentication scheme for embedded platform. J. Artif. Intell., 7: 161-171. CrossRefDirect Link |
Janakiraman, S., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2015. Light weight steganography on RISC platform-implementation and analysis. Asian J. Scient. Res., 8: 278-290. CrossRefDirect Link |
Praveenkumar, P., G.U. Priyanga, K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2015. Chain of shuffling and chaos: A tied encryptic approach. Asian J. Scient. Res., 8: 359-366. CrossRefDirect Link |
Praveenkumar, P., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Cryptic cover for covered writing: A pre-layered stego. Inform. Technol. J., 13: 2524-2533. CrossRefDirect Link |
Praveenkumar, P., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Why information security demands transform domain, compression and encryption? J. Artif. Intell., 7: 136-144. CrossRefDirect Link |
Praveenkumar, P., P. Rajalakshmi, G.U. Priyanga, K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Least significant bit but quantum bit: A Quasi stego. Inform. Technol. J., 13: 2544-2551. CrossRefDirect Link |
Praveenkumar, P., P. Rajalakshmi, K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2016. Horse DNA runs on image: A novel road to image encryption. Res. J. Inform. Technol., 8: 1-9. CrossRefDirect Link |
Praveenkumar, P., R. Nisha, K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2016. Image merger encryptor: A chaotic and chebyshev key approach. Res. J. Inform. Technol., 8: 10-16. CrossRefDirect Link |
Efficient Transmission of an Encrypted Image Through a MIMO–OFDM System with Different Encryption Schemes Sensing and Imaging Vol. 21, Issue 1, , 2020 |
3-D Image Encryption Based on Rubik’s Cube and RC6
Algorithm 3D Research Vol. 8, Issue 4, , 2017 |
Adaptive Window-Size Based SDSA Image Steganography for High-Level Data Security 2018 International Conference on Advances in Computing, Communication Control and Networking (ICACCCN) |