Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2013 (2013), Article ID 464107, 7 pages
http://dx.doi.org/10.1155/2013/464107
Research Article

A Graph Theory Practice on Transformed Image: A Random Image Steganography

1School of Electronics Engineering, VIT University, Vellore 632014, India
2School of Information Technology, VIT University, Vellore 632014, India
3School of Electrical & Electronics Engineering, SASTRA University, Thanjavur 613401, India

Received 15 August 2013; Accepted 3 October 2013

Academic Editors: R. Lu and G. Z. Zhao

Copyright © 2013 V. Thanikaiselvan et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Citations to this Article [19 citations]

The following is the list of published articles that have cited the current article.

  • Guang Ren, Yejin Lin, Baozhu Jia, Hui Cao, Jundong Zhang, Shubin Zhang, and Aiping Zhang, “Detecting Community Structures in Networks by Label Propagation with Prediction of Percolation Transition,” The Scientific World Journal, vol. 2014, pp. 1–14, 2014. View at Publisher · View at Google Scholar
  • Balakrishnan Ramalingam, and John Bosco Balaguru Rayappan, “Stego on FPGA: An IWT Approach,” Scientific World Journal, 2014. View at Publisher · View at Google Scholar
  • Padmapriya Praveenkumar, Thenmozhi, John Bosco Balaguru Rayappan, and Rengarajan Amirtharajan, “Cryptic cover for covered writing: A pre-layered stego,” Information Technology Journal, vol. 13, no. 16, pp. 2524–2533, 2014. View at Publisher · View at Google Scholar
  • Thanikaiselvan, Arulmozhivarman, Siddhanta Chakrabarty, Ashutosh Agarwal, Subashanthini, and Rengarajan Amirtharajan, “Comparative analysis of (5/3) and Haar IWT based steganography,” Information Technology Journal, vol. 13, no. 16, pp. 2534–2543, 2014. View at Publisher · View at Google Scholar
  • Padmapriya Praveenkumar, Rajalakshmi, Priyanga, Thenmozhi, John Bosco Balaguru Rayappan, and Rengarajan Amirtharajan, “Least significant bit but quantum bit: A quasi stego,” Information Technology Journal, vol. 13, no. 16, pp. 2544–2551, 2014. View at Publisher · View at Google Scholar
  • Rengarajan Amirtharajan, and Arasimhan Aarthie, “Image encryption: An information security perceptive,” Journal of Artificial Intelligence, vol. 7, no. 3, pp. 123–135, 2014. View at Publisher · View at Google Scholar
  • Thenmozhi, Rengarajan Amirtharajan, John Bosco Balaguru Rayappan, and Padmapriya Praveenkumar, “Why information security demands transform domain, compression and encryption?,” Journal of Artificial Intelligence, vol. 7, no. 3, pp. 136–144, 2014. View at Publisher · View at Google Scholar
  • Rengarajan Amirtharajan, Siva Janakiraman, Thenmozhi, and John Bosco Balaguru Rayappan, “Graphical password authentication scheme for embedded platform,” Journal of Artificial Intelligence, vol. 7, no. 4, pp. 161–171, 2014. View at Publisher · View at Google Scholar
  • Thanikaiselvan, Subashanthini, and Rengarajan Amirtharajan, “PVD based steganography on scrambled RGB cover images with pixel indicator,” Journal of Artificial Intelligence, vol. 7, no. 2, pp. 54–68, 2014. View at Publisher · View at Google Scholar
  • Siva Janakiraman, Thenmozhi, John Bosco Balaguru Rayappan, and Rengarajan Amirtharajan, “Audio fingerprint indicator in embedded platform: A way for hardware steganography,” Journal of Artificial Intelligence, vol. 7, no. 2, pp. 82–93, 2014. View at Publisher · View at Google Scholar
  • Siva Janakiraman, Swaminath, Thenmozhi, Har Narayan Upadhyay, Rengarajan Amirtharajan, and Sundararaman Rajagopalan, “LabVIEW based PIN hider on ATM cards: A transform domain secret concealment approach,” Research Journal of Information Technology, vol. 6, no. 3, pp. 154–165, 2014. View at Publisher · View at Google Scholar
  • Thenmozhi, John Bosco Balaguru Rayappan, Har Narayan Upadhyay, Rengarajan Amirtharajan, Siva Janakiraman, and Sundararaman Rajagopalan, “Space filling curve for data filling: An embedded security approach,” Research Journal of Information Technology, vol. 6, no. 3, pp. 188–197, 2014. View at Publisher · View at Google Scholar
  • Ashwin, Padmapriya Praveenkumar, Naveen Bharathi, Suraj Venkatachalam, Kartavya Agarwal, Thenmozhi, and Rengarajan Amirtharajan, “Rubik's Cube Blend with logistic map on RGB: A way for image encryption,” Research Journal of Information Technology, vol. 6, no. 3, pp. 207–215, 2014. View at Publisher · View at Google Scholar
  • Har Narayan Upadhyay, John Bosco Balaguru Rayappan, Sundararaman Rajagopalan, and Rengarajan Amirtharajan, “Dual cellular automata on FPGA: An image encryptors chip,” Research Journal of Information Technology, vol. 6, no. 3, pp. 223–236, 2014. View at Publisher · View at Google Scholar
  • John Bosco Balagura Rayappan, Har Narayan Upadhyay, Rengarajan Amirtharajan, and Sundararaman Rajagopalan, “Logic elements consumption analysis of cellular automata based image encryption on FPGA,” Research Journal of Information Technology, vol. 6, no. 4, pp. 291–307, 2014. View at Publisher · View at Google Scholar
  • J. B. Balaguru Rayappan, Amirtharajan, Rajagopalan, and Upadhyay, “Galois field proficient product for secure image encryption on FPGA,” Research Journal of Information Technology, vol. 6, no. 4, pp. 308–324, 2014. View at Publisher · View at Google Scholar
  • Padmaa, and Venkataramani, “Encrypted secret blend with image steganography for enhanced imperceptibility and capacity,” Research Journal of Information Technology, vol. 6, no. 4, pp. 342–355, 2014. View at Publisher · View at Google Scholar
  • Uma, Hemalatha, Madhunisha, Thenmozhi, Padmapriya Praveenkumar, and Rengarajan Amirtharajan, “Image Zoning encryption,” Research Journal of Information Technology, vol. 6, no. 4, pp. 368–378, 2014. View at Publisher · View at Google Scholar
  • Thanikaiselvan, Rengarajan Amitharajan, and Ahmad Shaik, “Data security through data hiding in images: A review,” Journal of Artificial Intelligence, vol. 10, no. 1, pp. 1–21, 2017. View at Publisher · View at Google Scholar