Main Navigation
Main Content
Sidebar
Register
Login
International Journal on Recent and Innovation Trends in Computing and Communication
Toggle navigation
Home
Editorial Board
Call For Papers
Upcoming Issue
Ethics Policy
Special Issue Proposals
For Authors
Guideline for Authors
Submit Manuscript
Downloads
FAQ
Special Issue
Archives
Peer Review
Peer Review
Guide to Reviewing
Reviewer's FAQ
About Us
About the Journal
Privacy Statement
Contact Us
Search
Search
Search articles for
Advanced filters
Published After
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
January
February
March
April
May
June
July
August
September
October
November
December
01
02
03
04
05
06
07
08
09
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
Published Before
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
January
February
March
April
May
June
July
August
September
October
November
December
01
02
03
04
05
06
07
08
09
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
By Author
Search Results
An Android-based Image Steganography Approach to Data Communication Security using LSB and Password-based Encryption
Esther Hannah M, J. Jerusalin Carol, R.Saravanan, A.Shamila Ebenezer, V.Pandarinathan, T.A. Mohanaprakash, A.Anbarasa Pandian
1563 - 1571
A Review on Combined Techniques of Cryptography and Steganography using Color QR code
Monika Pipalde, Dr. Sanjay Agrawal
673 - 677
Secure Image Transmission using Visual Steganography
Prof. Manoj Dhande, Pooja Jaiswal, Saloni Barvalia, Smit Shah, Krishma Shah
145 - 147
Lagrangian Recurrent Steganalysis and Hyper Elliptic Certificateless Signcryption for Secure Image Transmission
J. Shaik Dawood Ansari, P. Tamilselvan
527 - 537
Image Steganography with Dual Layer Security Using Fragment and Unite Technique
Mr. Umesh Mohite, Prof. Vaishali Londhe
01 - 06
Secure Framework for Cyber Data Using Cryptographic and Steganographic Algorithms
Bhawna, Sanjay Malik
1618-1626
Web Service Deployment for Selecting a Right Steganography Scheme for Optimizing Both the Capacity and the Detectable Distortion
R. Pavithra, R. Srinivasan, V. Saravanan
267 - 277
Hybrid Cryptography and Steganography-Based Security System for IoT Networks
T. Suguna, C. Padma, M. Janaki Rani, G.Padma Priya
415 - 421
1 - 8 of 8 items