Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2013, Article ID 464107, 7 pages
http://dx.doi.org/10.1155/2013/464107
Research Article

A Graph Theory Practice on Transformed Image: A Random Image Steganography

1School of Electronics Engineering, VIT University, Vellore 632014, India
2School of Information Technology, VIT University, Vellore 632014, India
3School of Electrical & Electronics Engineering, SASTRA University, Thanjavur 613401, India

Received 15 August 2013; Accepted 3 October 2013

Academic Editors: R. Lu and G. Z. Zhao

Copyright © 2013 V. Thanikaiselvan et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Citations to this Article [30 citations]

The following is the list of published articles that have cited the current article.

  • Fatema Akhter, “A secured word by word Graph Steganography using Huffman encoding,” 2016 International Conference on Computer Communication and Informatics (ICCCI), pp. 1–4, . View at Publisher · View at Google Scholar
  • Pulkit Khandelwal, Neha Bisht, and Thanikaiselvan V, “Randomly hiding secret data using dynamic programming for image steganography,” 2015 International Conference on Computing and Network Communications (CoCoNet), pp. 777–783, . View at Publisher · View at Google Scholar
  • Padmapriya Praveenkumar, L Kala, R Nisha, K Thenmozhi, J.B.B Rayappan, and Rengarajan Amirtharajan, “Hungarian sculptured Discrete Gould transformed bit planes-a double puzzled image,” 2015 International Conference on Computer Communication and Informatics (ICCCI), pp. 1–4, . View at Publisher · View at Google Scholar
  • Padmapriya Praveenkumar, Gu Priyanga, P Rajalakshmi, K Thenmozhi, J.B.B Rayappan, and Rengarajan Amirtharajan, “2π rotated Key2 shuffling and scrambling - a cryptic track,” 2015 International Conference on Computer Communication and Informatics (ICCCI), pp. 1–4, . View at Publisher · View at Google Scholar
  • Padmapriya Praveenkumar, C. Swathi, K. Thenmozhi, J.B.B. Rayappan, and Rengarajan Amirtharajan, “Chaotic & partial encrypted image on XOR bus - an unidentified carrier approach,” 2016 International Conference on Computer Communication and Informatics (ICCCI), pp. 1–5, . View at Publisher · View at Google Scholar
  • Padmapriya Praveenkumar, Thenmozhi, Alfaaz Zami, and Rengarajan Amirtharajan, “Blend of error control codes in OFDM - Effect of channel - A comparative approach,” International Conference on Communication and Signal Processing, ICCSP 2014 - Proceedings, pp. 223–226, 2014. View at Publisher · View at Google Scholar
  • Padmapriya Praveenkumar, Thenmozhi, Parvatha, Ganapriya, and Rengarajan Amirtharajan, “Encrypted RS and cyclic doubles in OFDM - A channel variable approach,” International Conference on Communication and Signal Processing, ICCSP 2014 - Proceedings, pp. 232–236, 2014. View at Publisher · View at Google Scholar
  • Padmapriya Praveenkumar, Thenmozhi, Ramya, Kavitha, and Rengarajan Amirtharajan, “Race among error control codes in OFDM - Role of modulation techniques,” International Conference on Communication and Signal Processing, ICCSP 2014 - Proceedings, pp. 237–241, 2014. View at Publisher · View at Google Scholar
  • Rengarajan Amirtharajan, Gnana Prasad Reddy, Chandramowliswaran, Hemamalini, Rajalakshmi, Priyanga Gu, and Pavithra Raman, “A novel audio steg for secret communication,” International Conference on Communication and Signal Processing, ICCSP 2014 - Proceedings, pp. 251–254, 2014. View at Publisher · View at Google Scholar
  • Guang Ren, Yejin Lin, Baozhu Jia, Hui Cao, Jundong Zhang, Shubin Zhang, and Aiping Zhang, “Detecting Community Structures in Networks by Label Propagation with Prediction of Percolation Transition,” The Scientific World Journal, vol. 2014, pp. 1–14, 2014. View at Publisher · View at Google Scholar
  • Balakrishnan Ramalingam, and John Bosco Balaguru Rayappan, “Stego on FPGA: An IWT Approach,” Scientific World Journal, 2014. View at Publisher · View at Google Scholar
  • Padmapriya Praveenkumar, Thenmozhi, John Bosco Balaguru Rayappan, and Rengarajan Amirtharajan, “Cryptic cover for covered writing: A pre-layered stego,” Information Technology Journal, vol. 13, no. 16, pp. 2524–2533, 2014. View at Publisher · View at Google Scholar
  • Thanikaiselvan, Arulmozhivarman, Siddhanta Chakrabarty, Ashutosh Agarwal, Subashanthini, and Rengarajan Amirtharajan, “Comparative analysis of (5/3) and Haar IWT based steganography,” Information Technology Journal, vol. 13, no. 16, pp. 2534–2543, 2014. View at Publisher · View at Google Scholar
  • Padmapriya Praveenkumar, Rajalakshmi, Priyanga, Thenmozhi, John Bosco Balaguru Rayappan, and Rengarajan Amirtharajan, “Least significant bit but quantum bit: A quasi stego,” Information Technology Journal, vol. 13, no. 16, pp. 2544–2551, 2014. View at Publisher · View at Google Scholar
  • Rengarajan Amirtharajan, and Arasimhan Aarthie, “Image encryption: An information security perceptive,” Journal of Artificial Intelligence, vol. 7, no. 3, pp. 123–135, 2014. View at Publisher · View at Google Scholar
  • Thenmozhi, Rengarajan Amirtharajan, John Bosco Balaguru Rayappan, and Padmapriya Praveenkumar, “Why information security demands transform domain, compression and encryption?,” Journal of Artificial Intelligence, vol. 7, no. 3, pp. 136–144, 2014. View at Publisher · View at Google Scholar
  • Rengarajan Amirtharajan, Siva Janakiraman, Thenmozhi, and John Bosco Balaguru Rayappan, “Graphical password authentication scheme for embedded platform,” Journal of Artificial Intelligence, vol. 7, no. 4, pp. 161–171, 2014. View at Publisher · View at Google Scholar
  • Thanikaiselvan, Subashanthini, and Rengarajan Amirtharajan, “PVD based steganography on scrambled RGB cover images with pixel indicator,” Journal of Artificial Intelligence, vol. 7, no. 2, pp. 54–68, 2014. View at Publisher · View at Google Scholar
  • Siva Janakiraman, Thenmozhi, John Bosco Balaguru Rayappan, and Rengarajan Amirtharajan, “Audio fingerprint indicator in embedded platform: A way for hardware steganography,” Journal of Artificial Intelligence, vol. 7, no. 2, pp. 82–93, 2014. View at Publisher · View at Google Scholar
  • Siva Janakiraman, Swaminath, Thenmozhi, Har Narayan Upadhyay, Rengarajan Amirtharajan, and Sundararaman Rajagopalan, “LabVIEW based PIN hider on ATM cards: A transform domain secret concealment approach,” Research Journal of Information Technology, vol. 6, no. 3, pp. 154–165, 2014. View at Publisher · View at Google Scholar
  • Thenmozhi, John Bosco Balaguru Rayappan, Har Narayan Upadhyay, Rengarajan Amirtharajan, Siva Janakiraman, and Sundararaman Rajagopalan, “Space filling curve for data filling: An embedded security approach,” Research Journal of Information Technology, vol. 6, no. 3, pp. 188–197, 2014. View at Publisher · View at Google Scholar
  • Ashwin, Padmapriya Praveenkumar, Naveen Bharathi, Suraj Venkatachalam, Kartavya Agarwal, Thenmozhi, and Rengarajan Amirtharajan, “Rubik's Cube Blend with logistic map on RGB: A way for image encryption,” Research Journal of Information Technology, vol. 6, no. 3, pp. 207–215, 2014. View at Publisher · View at Google Scholar
  • Har Narayan Upadhyay, John Bosco Balaguru Rayappan, Sundararaman Rajagopalan, and Rengarajan Amirtharajan, “Dual cellular automata on FPGA: An image encryptors chip,” Research Journal of Information Technology, vol. 6, no. 3, pp. 223–236, 2014. View at Publisher · View at Google Scholar
  • John Bosco Balagura Rayappan, Har Narayan Upadhyay, Rengarajan Amirtharajan, and Sundararaman Rajagopalan, “Logic elements consumption analysis of cellular automata based image encryption on FPGA,” Research Journal of Information Technology, vol. 6, no. 4, pp. 291–307, 2014. View at Publisher · View at Google Scholar
  • J. B. Balaguru Rayappan, Amirtharajan, Rajagopalan, and Upadhyay, “Galois field proficient product for secure image encryption on FPGA,” Research Journal of Information Technology, vol. 6, no. 4, pp. 308–324, 2014. View at Publisher · View at Google Scholar
  • Padmaa, and Venkataramani, “Encrypted secret blend with image steganography for enhanced imperceptibility and capacity,” Research Journal of Information Technology, vol. 6, no. 4, pp. 342–355, 2014. View at Publisher · View at Google Scholar
  • Uma, Hemalatha, Madhunisha, Thenmozhi, Padmapriya Praveenkumar, and Rengarajan Amirtharajan, “Image Zoning encryption,” Research Journal of Information Technology, vol. 6, no. 4, pp. 368–378, 2014. View at Publisher · View at Google Scholar
  • Padmapriya Praveenkumar, Thenmozhi, N. Keerthana Devi, Rayappan, and Rengarajan Amirtharajan, “Yet another but an incremental reversible data hiding- for an irreversible data safety,” 2016 International Conference on Computer Communication and Informatics, ICCCI 2016, 2016. View at Publisher · View at Google Scholar
  • V. Thanikaiselvan, Shounak Shastri, and Shaik Ahmad, “Information Hiding: Steganography,” Intelligent Techniques in Signal Processing for Multimedia Security, vol. 660, pp. 65–91, 2016. View at Publisher · View at Google Scholar
  • Thanikaiselvan, Rengarajan Amitharajan, and Ahmad Shaik, “Data security through data hiding in images: A review,” Journal of Artificial Intelligence, vol. 10, no. 1, pp. 1–21, 2017. View at Publisher · View at Google Scholar