
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A chaotic image encryption algorithm based on a counting system and the semi-tensor product
Xingyuan Wang, Suo Gao
Multimedia Tools and Applications (2020) Vol. 80, Iss. 7, pp. 10301-10322
Closed Access | Times Cited: 48
Xingyuan Wang, Suo Gao
Multimedia Tools and Applications (2020) Vol. 80, Iss. 7, pp. 10301-10322
Closed Access | Times Cited: 48
Showing 26-50 of 48 citing articles:
Color image encryption algorithm based on 3D spiral transform and radial diffusion
Xiaoqiang Zhang, Xiaochang Yang
Physica Scripta (2022) Vol. 97, Iss. 9, pp. 095210-095210
Closed Access | Times Cited: 8
Xiaoqiang Zhang, Xiaochang Yang
Physica Scripta (2022) Vol. 97, Iss. 9, pp. 095210-095210
Closed Access | Times Cited: 8
A Combination of Decimal- and Bit-Level Secure Multimedia Transmission
Mohamed Gabr, Hisham H. Hussein, Wassim Alexan
(2022), pp. 177-182
Closed Access | Times Cited: 8
Mohamed Gabr, Hisham H. Hussein, Wassim Alexan
(2022), pp. 177-182
Closed Access | Times Cited: 8
A Novel RGB Image Obfuscation Technique Using Dynamically Generated All Order-4 Magic Squares
Mahmood ul Hassan, Asaad Alzayed, Amin A. Al-Awady, et al.
IEEE Access (2023) Vol. 11, pp. 46382-46398
Open Access | Times Cited: 4
Mahmood ul Hassan, Asaad Alzayed, Amin A. Al-Awady, et al.
IEEE Access (2023) Vol. 11, pp. 46382-46398
Open Access | Times Cited: 4
Enhancing visual security: An image encryption scheme based on parallel compressive sensing and edge detection embedding
Yiming Wang, Shufeng Huang, Chen Huang, et al.
Chinese Physics B (2023) Vol. 33, Iss. 1, pp. 010502-010502
Closed Access | Times Cited: 4
Yiming Wang, Shufeng Huang, Chen Huang, et al.
Chinese Physics B (2023) Vol. 33, Iss. 1, pp. 010502-010502
Closed Access | Times Cited: 4
On a Symmetric Image Cryptosystem Based on a Novel One-Dimensional Chaotic System and Banyan Network
Qingye Huang, Linqing Huang, Shuting Cai, et al.
Mathematics (2023) Vol. 11, Iss. 21, pp. 4411-4411
Open Access | Times Cited: 4
Qingye Huang, Linqing Huang, Shuting Cai, et al.
Mathematics (2023) Vol. 11, Iss. 21, pp. 4411-4411
Open Access | Times Cited: 4
Cryptanalysis on a permutation–rewriting– diffusion (PRD) structure image encryption scheme
Ruijie Chen, Lidong Liu, Zhaolun Zhang
Multimedia Tools and Applications (2022) Vol. 82, Iss. 3, pp. 4289-4317
Closed Access | Times Cited: 7
Ruijie Chen, Lidong Liu, Zhaolun Zhang
Multimedia Tools and Applications (2022) Vol. 82, Iss. 3, pp. 4289-4317
Closed Access | Times Cited: 7
Fuzzy Support Tensor Product Adaptive Image Classification for the Internet of Things
Zhongrong Shi, Yun Ma, Maosheng Fu
Computational Intelligence and Neuroscience (2022) Vol. 2022, pp. 1-11
Open Access | Times Cited: 6
Zhongrong Shi, Yun Ma, Maosheng Fu
Computational Intelligence and Neuroscience (2022) Vol. 2022, pp. 1-11
Open Access | Times Cited: 6
A Lossless Compression and Encryption Method for Remote Sensing Image Using LWT, Rubik’s Cube and 2D-CCM
Xiufang Feng, Shi-xian Nan, Ruiqing Ma, et al.
International Journal of Bifurcation and Chaos (2022) Vol. 32, Iss. 10
Closed Access | Times Cited: 6
Xiufang Feng, Shi-xian Nan, Ruiqing Ma, et al.
International Journal of Bifurcation and Chaos (2022) Vol. 32, Iss. 10
Closed Access | Times Cited: 6
1D Sine-Map-Coupling-Logistic-Map for 3D model encryption
Yongsheng Hu, Xiaolin Wang, Liyi Zhang
Frontiers in Physics (2022) Vol. 10
Open Access | Times Cited: 6
Yongsheng Hu, Xiaolin Wang, Liyi Zhang
Frontiers in Physics (2022) Vol. 10
Open Access | Times Cited: 6
Secure chaotic image encryption method using random graph traversal and three step diffusion
Varun Agarwal, Dhirendra Kumar
Multimedia Tools and Applications (2023) Vol. 83, Iss. 16, pp. 46799-46824
Closed Access | Times Cited: 3
Varun Agarwal, Dhirendra Kumar
Multimedia Tools and Applications (2023) Vol. 83, Iss. 16, pp. 46799-46824
Closed Access | Times Cited: 3
A Novel Internet of Medical Thing Cryptosystem Based on Jigsaw Transformation and Ikeda Chaotic Map
Sultan Almakdi, Mohammed S. Alshehri, Yousef Asiri, et al.
Computer Systems Science and Engineering (2023) Vol. 46, Iss. 3, pp. 3017-3036
Open Access | Times Cited: 2
Sultan Almakdi, Mohammed S. Alshehri, Yousef Asiri, et al.
Computer Systems Science and Engineering (2023) Vol. 46, Iss. 3, pp. 3017-3036
Open Access | Times Cited: 2
A Novel Approach for Image Encryption with Chaos-RNA
Yan Hong, Shihui Fang, Jingming Su, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2023) Vol. 77, Iss. 1, pp. 139-160
Open Access | Times Cited: 2
Yan Hong, Shihui Fang, Jingming Su, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2023) Vol. 77, Iss. 1, pp. 139-160
Open Access | Times Cited: 2
A Novel Hyperchaotic 2D-SFCF with Simple Structure and Its Application in Image Encryption
Yongsheng Hu, Han Wu, Luoyu Zhou
Entropy (2022) Vol. 24, Iss. 9, pp. 1266-1266
Open Access | Times Cited: 3
Yongsheng Hu, Han Wu, Luoyu Zhou
Entropy (2022) Vol. 24, Iss. 9, pp. 1266-1266
Open Access | Times Cited: 3
Enhancing image encryption using chaotic maps: a multi-map approach for robust security and performance optimization
Mostafa Abodawood, Abeer T. Khalil, Hanan M. Amer, et al.
Cluster Computing (2024) Vol. 27, Iss. 10, pp. 14611-14635
Closed Access
Mostafa Abodawood, Abeer T. Khalil, Hanan M. Amer, et al.
Cluster Computing (2024) Vol. 27, Iss. 10, pp. 14611-14635
Closed Access
Research on Background Privacy Protection Algorithm Based on Image Fogging
Peirong Pan, Xiyin Liang
(2024), pp. 98-102
Closed Access
Peirong Pan, Xiyin Liang
(2024), pp. 98-102
Closed Access
Image encryption algorithm based on the Matryoshka transform and modular-inverse matrix
Xiaoqiang Zhang, Xue-Heng Zhang
Research Square (Research Square) (2023)
Open Access | Times Cited: 1
Xiaoqiang Zhang, Xue-Heng Zhang
Research Square (Research Square) (2023)
Open Access | Times Cited: 1
Designing a 1D extended logistic map for a secure image encryption
Qiying Ren, Zhipeng Wang
Physica Scripta (2023) Vol. 98, Iss. 8, pp. 085208-085208
Open Access | Times Cited: 1
Qiying Ren, Zhipeng Wang
Physica Scripta (2023) Vol. 98, Iss. 8, pp. 085208-085208
Open Access | Times Cited: 1
3D Model Encryption Algorithm by Parallel Bidirectional Diffusion and 1D Map with Sin and Logistic Coupling
Yongsheng Hu
Computer Systems Science and Engineering (2023) Vol. 47, Iss. 2, pp. 1819-1838
Open Access | Times Cited: 1
Yongsheng Hu
Computer Systems Science and Engineering (2023) Vol. 47, Iss. 2, pp. 1819-1838
Open Access | Times Cited: 1
Image Encryption Algorithm Based on Chaotic Mapping and Binary Bidirectional Zigzag Transform
Yan Hong, Yihang Wang, Jingming Su, et al.
IEEE Access (2023) Vol. 11, pp. 78498-78510
Open Access | Times Cited: 1
Yan Hong, Yihang Wang, Jingming Su, et al.
IEEE Access (2023) Vol. 11, pp. 78498-78510
Open Access | Times Cited: 1
Efficient image encryption using the Tinkerbell map in conjunction with linear feedback shift registers
Puneet Kumar Pal, Dhirendra Kumar, Varun Agarwal
Multimedia Tools and Applications (2023) Vol. 83, Iss. 15, pp. 44903-44932
Closed Access | Times Cited: 1
Puneet Kumar Pal, Dhirendra Kumar, Varun Agarwal
Multimedia Tools and Applications (2023) Vol. 83, Iss. 15, pp. 44903-44932
Closed Access | Times Cited: 1
Novel One-Dimensional Chaotic System and Its Application in Image Encryption
Zhiqiang Cheng, Wencheng Wang, Yuezhang Dai, et al.
Complexity (2022) Vol. 2022, Iss. 1
Open Access | Times Cited: 2
Zhiqiang Cheng, Wencheng Wang, Yuezhang Dai, et al.
Complexity (2022) Vol. 2022, Iss. 1
Open Access | Times Cited: 2
Image encryption algorithm based on semi-tensor product theory
Yi Xiao, Zhen-Rong Lin, Qian Xu, et al.
Journal of Modern Optics (2022) Vol. 69, Iss. 19, pp. 1063-1078
Closed Access | Times Cited: 2
Yi Xiao, Zhen-Rong Lin, Qian Xu, et al.
Journal of Modern Optics (2022) Vol. 69, Iss. 19, pp. 1063-1078
Closed Access | Times Cited: 2
A Novel 2D Hyperchaotic with a Complex Dynamic Behavior for Color Image Encryption
Yongsheng Hu, Liyong Nan
Computers, materials & continua/Computers, materials & continua (Print) (2022) Vol. 74, Iss. 3, pp. 6555-6571
Open Access | Times Cited: 1
Yongsheng Hu, Liyong Nan
Computers, materials & continua/Computers, materials & continua (Print) (2022) Vol. 74, Iss. 3, pp. 6555-6571
Open Access | Times Cited: 1