International Journal of Advancements in Technology

International Journal of Advancements in Technology
Open Access

ISSN: 0976-4860

+44 7456035580

Citations Report

Citations Report - International Journal of Advancements in Technology [101 Articles]

The articles published in International Journal of Advancements in Technology have been cited 101 times by eminent researchers all around the world. Following is the list of articles that have cited the articles published in International Journal of Advancements in Technology.

Kang AS, Sharma V (2012) Effect of Group Delay in WCDMA based Pulse Shaping Filter using Discrete-Time Eye Scope. International Journal of Computer Applications 40: 1-9.

Kang AS, Sharma V (2011) Data communication using pulse shaping techniques in wireless signal processing approach–In depth review. Int. J. of Computational Engineering and Management, 22: 24-33.

Sandhu M, Kaur J, Kaur S. Encoding and Decoding of Image using Steganography Technique.

Job D, Paul V (2016) An efficient video Steganography technique for secured data transmission. International Conference on Data Mining and Advanced Computing (SAPIENCE).

Mathivanan P, Shrikalaa M, Jasmine JL (2013) Conversion of 2D Stegano Images into a 3D Stereo Image using RANSAC. Digital Image Processing 5: 291-294.

Borse D. New robust LSB steganographic technique for increased security.

Srinivas PVS. Reliable data transmission over wireless network using image steganography.

Rajagopal P, Austalakshmi S (2013) Patient Safety Automation Using Secured Steganography and DSP Automatic Control. ICBSII-2013  302.

Nehra I, Sharma R. Review Paper On Image Based Steganography.

Chithra B, Harinath D, Murthy MR, Babu KR. Enhancing Security through Steganography by using Sudoku Puzzle and ECC Algorithm.

Kumar KS, Raja KB, Chhotaray RK, Pattnaik S (2011) Integration of Spatial and Transform Domain in LSB Steganography. In International Conference on Advances in Communication, Network, and Computing 400-402. 

Mahmood AF (2012) FPGA Implementation of Reversible Medical Image Watermarking. Al-Rafadain Engineering Journal 20: 4.

Yadav S, Yadav R(2012) JPEG Steganography using Quantization Error Table. Recent Trends in Computer Science & Information Technology 80.

Koduri N. Information Security through Image Steganography using Least Significant Bit Algorithm. Master's Thesis, Information Security and Computer Forensics, University of East London.

Palimkar A, Patil SH (2014) Using SBR Algorithm To Hide The Data Into The JPEG Image. International Journal of Security (IJS) 8: 15.

Job D, Paul V (2014) Image steganography technique using sudoku puzzle and ECC algorithm for secured data transmission. Journal of Theoretical & Applied Information Technology 66: 1.

Diwan PB, Bhagat VB (2013) A Steganography Approach to Protect Secret Information in Computer Network.

Lakkshmanan A, Dharia PU, Gandhi F (2013) An Adaptive Image Steganography Technique Using LSB and MSB. IARS'International Research Journal 3:1.

Borse D, Patil S (2015) Review and Analysis of Multifarious Spatial Domain Steganography Techniques. International Journal of Engineering Research & Technology (IJERT) 2278: 181.

Shrikalaa M, Mathivanan P, Jasmine JL (2013) Conversion of 2D stegano images into a 3D stereo iniage using RANSAC. IEEE Conference on Information & Communication Technologies (ICT).

Relevant Topics