V. Venkatesh, V. Vaithayana, P. Raj, K. Gopalan, R. Amirtharaj
{"title":"Envisioning Smart Hotels Through Spontaneous Device Integration","authors":"V. Venkatesh, V. Vaithayana, P. Raj, K. Gopalan, R. Amirtharaj","doi":"10.3923/RJIT.2013.226.233","DOIUrl":"https://doi.org/10.3923/RJIT.2013.226.233","url":null,"abstract":"","PeriodicalId":235687,"journal":{"name":"Research Journal of Information Technology","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127527818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Janakirama, S. Rajagopala, K. Thenmozhi, H. Upadhyay, J. Ramanathan, Swetha Varadaraja, J. Rayappan, R. Amirtharaj
{"title":"Captivating CODEC Stego (CCS): A Cover on Camouflage","authors":"S. Janakirama, S. Rajagopala, K. Thenmozhi, H. Upadhyay, J. Ramanathan, Swetha Varadaraja, J. Rayappan, R. Amirtharaj","doi":"10.3923/RJIT.2013.160.170","DOIUrl":"https://doi.org/10.3923/RJIT.2013.160.170","url":null,"abstract":"","PeriodicalId":235687,"journal":{"name":"Research Journal of Information Technology","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128687200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. Sathiamoor, T. N. Janakirama, N. Sairam, N. R. Raajan, K. S. Mathavan, P. Praveenkum, R. Krishnakum, M. Malligaraj, K. Karthikeya
{"title":"Graceful Labeling of Assignable Information Hiding in Image","authors":"G. Sathiamoor, T. N. Janakirama, N. Sairam, N. R. Raajan, K. S. Mathavan, P. Praveenkum, R. Krishnakum, M. Malligaraj, K. Karthikeya","doi":"10.3923/RJIT.2013.181.190","DOIUrl":"https://doi.org/10.3923/RJIT.2013.181.190","url":null,"abstract":"","PeriodicalId":235687,"journal":{"name":"Research Journal of Information Technology","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130449713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. R. Raajan, A. Philomina, M. Ramkumar, G. N. Jayabhavan, C. Nishanthin
{"title":"Hash Encrypted Synchronized OFDM","authors":"N. R. Raajan, A. Philomina, M. Ramkumar, G. N. Jayabhavan, C. Nishanthin","doi":"10.3923/RJIT.2013.218.225","DOIUrl":"https://doi.org/10.3923/RJIT.2013.218.225","url":null,"abstract":"","PeriodicalId":235687,"journal":{"name":"Research Journal of Information Technology","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121405578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cryptanalysis of SHA-3 Candidates: A Survey","authors":"S. Chauhan, R. Sobti, G. Geetha, S. Anand","doi":"10.3923/RJIT.2013.149.159","DOIUrl":"https://doi.org/10.3923/RJIT.2013.149.159","url":null,"abstract":"","PeriodicalId":235687,"journal":{"name":"Research Journal of Information Technology","volume":"187 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134241836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Amirtharaj, G. Aishwarya, M. S. Karthik, V. Thanikaise, J. Rayappan
{"title":"Bio-hiding for Smart Swipe Card: A Secret Security","authors":"R. Amirtharaj, G. Aishwarya, M. S. Karthik, V. Thanikaise, J. Rayappan","doi":"10.3923/RJIT.2013.100.112","DOIUrl":"https://doi.org/10.3923/RJIT.2013.100.112","url":null,"abstract":"","PeriodicalId":235687,"journal":{"name":"Research Journal of Information Technology","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114172672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Amirtharaj, R. Subrahmany, Jasti Nithin Teja, K. M. Reddy, J. Rayappan
{"title":"Pixel Indicated Triple Layer: A Way for Random Image Steganography","authors":"R. Amirtharaj, R. Subrahmany, Jasti Nithin Teja, K. M. Reddy, J. Rayappan","doi":"10.3923/RJIT.2013.87.99","DOIUrl":"https://doi.org/10.3923/RJIT.2013.87.99","url":null,"abstract":"","PeriodicalId":235687,"journal":{"name":"Research Journal of Information Technology","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126369701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Secure Cryptosystem for Transmission","authors":"M. Begum, Y. Venkataram","doi":"10.3923/RJIT.2013.242.248","DOIUrl":"https://doi.org/10.3923/RJIT.2013.242.248","url":null,"abstract":"","PeriodicalId":235687,"journal":{"name":"Research Journal of Information Technology","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128791114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Amirtharaj, S. Roy, N. Nesakumar, M. Chandrasek, R. Sridevi, J. Rayappan
{"title":"Mind Game for Cover Steganography: A Refuge","authors":"R. Amirtharaj, S. Roy, N. Nesakumar, M. Chandrasek, R. Sridevi, J. Rayappan","doi":"10.3923/RJIT.2013.137.148","DOIUrl":"https://doi.org/10.3923/RJIT.2013.137.148","url":null,"abstract":"","PeriodicalId":235687,"journal":{"name":"Research Journal of Information Technology","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132062737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Pixel Indicated User Indicator: A Muxed Stego","authors":"R. Amirtharaj, P. Priya, J. Rayappan","doi":"10.3923/RJIT.2013.73.86","DOIUrl":"https://doi.org/10.3923/RJIT.2013.73.86","url":null,"abstract":"","PeriodicalId":235687,"journal":{"name":"Research Journal of Information Technology","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127644533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}