
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
AEA-NCS: An audio encryption algorithm based on a nested chaotic system
Rui Wu, Suo Gao, Xingyuan Wang, et al.
Chaos Solitons & Fractals (2022) Vol. 165, pp. 112770-112770
Closed Access | Times Cited: 65
Rui Wu, Suo Gao, Xingyuan Wang, et al.
Chaos Solitons & Fractals (2022) Vol. 165, pp. 112770-112770
Closed Access | Times Cited: 65
Showing 26-50 of 65 citing articles:
Chaos-based audio encryption algorithm using biometric image and SHA-256 hash algorithm
B. Rahul, K. Kuppusamy, A. Senthilrajan
Multimedia Tools and Applications (2023) Vol. 82, Iss. 28, pp. 43729-43758
Closed Access | Times Cited: 10
B. Rahul, K. Kuppusamy, A. Senthilrajan
Multimedia Tools and Applications (2023) Vol. 82, Iss. 28, pp. 43729-43758
Closed Access | Times Cited: 10
A Lossless Audio Encryption Method based on Chebyshev Map
Mehmet Demirtaş
Orclever Proceedings of Research and Development (2023) Vol. 2, Iss. 1, pp. 28-38
Open Access | Times Cited: 10
Mehmet Demirtaş
Orclever Proceedings of Research and Development (2023) Vol. 2, Iss. 1, pp. 28-38
Open Access | Times Cited: 10
Modelling and dynamic analysis of a novel seven-dimensional Hamilton conservative hyperchaotic systems with wide range of parameter
Si Wu, Guodong Li, Wenxia Xu, et al.
Physica Scripta (2023) Vol. 98, Iss. 5, pp. 055218-055218
Closed Access | Times Cited: 10
Si Wu, Guodong Li, Wenxia Xu, et al.
Physica Scripta (2023) Vol. 98, Iss. 5, pp. 055218-055218
Closed Access | Times Cited: 10
A Robust Chaotic Map and Its Application to Speech Encryption in Dual Frequency Domain
Yibo Huang, Peng-Wei Xie, Junbin Gao, et al.
International Journal of Bifurcation and Chaos (2023) Vol. 33, Iss. 08
Closed Access | Times Cited: 9
Yibo Huang, Peng-Wei Xie, Junbin Gao, et al.
International Journal of Bifurcation and Chaos (2023) Vol. 33, Iss. 08
Closed Access | Times Cited: 9
A novel lorenz-sine coupling chaotic system and its application on color image encryption
Ning Zhang, Jie Liu, Xiaojun Tong, et al.
Physica Scripta (2023) Vol. 98, Iss. 9, pp. 095217-095217
Closed Access | Times Cited: 9
Ning Zhang, Jie Liu, Xiaojun Tong, et al.
Physica Scripta (2023) Vol. 98, Iss. 9, pp. 095217-095217
Closed Access | Times Cited: 9
New image encryption algorithm based on hyperchaotic 3D-IHAL and a hybrid cryptosystem
Suo Gao, Songbo Liu, Xingyuan Wang, et al.
Applied Intelligence (2023) Vol. 53, Iss. 22, pp. 27826-27843
Closed Access | Times Cited: 9
Suo Gao, Songbo Liu, Xingyuan Wang, et al.
Applied Intelligence (2023) Vol. 53, Iss. 22, pp. 27826-27843
Closed Access | Times Cited: 9
Securing Dual-Channel Audio Communication With a 2-D Infinite Collapse and Logistic Map
Rui Wu, Suo Gao, Herbert Ho‐Ching Iu, et al.
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 6, pp. 10214-10223
Closed Access | Times Cited: 9
Rui Wu, Suo Gao, Herbert Ho‐Ching Iu, et al.
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 6, pp. 10214-10223
Closed Access | Times Cited: 9
Analyzing the Probability of Key Recovery in the Differential Attacks Against ChaCha
Nitin Kumar Sharma, Sabyasachi Dey
IEEE Access (2024) Vol. 12, pp. 37000-37011
Open Access | Times Cited: 3
Nitin Kumar Sharma, Sabyasachi Dey
IEEE Access (2024) Vol. 12, pp. 37000-37011
Open Access | Times Cited: 3
An n-Dimensional Chaotic Map with Application in Reversible Data Hiding for Medical Images
Yuli Yang, Rui-yun Chang, Xiufang Feng, et al.
Entropy (2024) Vol. 26, Iss. 3, pp. 254-254
Open Access | Times Cited: 3
Yuli Yang, Rui-yun Chang, Xiufang Feng, et al.
Entropy (2024) Vol. 26, Iss. 3, pp. 254-254
Open Access | Times Cited: 3
Cryptanalysis of 2D-SCMCI Hyperchaotic Map Based Image Encryption Algorithm
Mohammed S. Alshehri, Sultan Almakdi, Mimonah Al Qathrady, et al.
Computer Systems Science and Engineering (2023) Vol. 46, Iss. 2, pp. 2401-2414
Open Access | Times Cited: 7
Mohammed S. Alshehri, Sultan Almakdi, Mimonah Al Qathrady, et al.
Computer Systems Science and Engineering (2023) Vol. 46, Iss. 2, pp. 2401-2414
Open Access | Times Cited: 7
A novel image encryption scheme based on ccnn
Xiangzi Zhang, Lina Sun, Xicong Geng, et al.
Physica Scripta (2024) Vol. 99, Iss. 2, pp. 025253-025253
Open Access | Times Cited: 2
Xiangzi Zhang, Lina Sun, Xicong Geng, et al.
Physica Scripta (2024) Vol. 99, Iss. 2, pp. 025253-025253
Open Access | Times Cited: 2
Secure multimedia communication: advanced asymmetric key authentication with grayscale visual cryptography
Tao Liu, Shubhangi Vairagar, Sushadevi Shamrao Adagale, et al.
Mathematical Biosciences & Engineering (2024) Vol. 21, Iss. 3, pp. 4762-4778
Open Access | Times Cited: 2
Tao Liu, Shubhangi Vairagar, Sushadevi Shamrao Adagale, et al.
Mathematical Biosciences & Engineering (2024) Vol. 21, Iss. 3, pp. 4762-4778
Open Access | Times Cited: 2
An Efficient and Secure Cryptographic Algorithm Using Elliptic Curves and Max-Plus Algebra-Based Wavelet Transform
Kanza Abdul Sattar, Takreem Haider, Umar Hayat, et al.
Applied Sciences (2023) Vol. 13, Iss. 14, pp. 8385-8385
Open Access | Times Cited: 6
Kanza Abdul Sattar, Takreem Haider, Umar Hayat, et al.
Applied Sciences (2023) Vol. 13, Iss. 14, pp. 8385-8385
Open Access | Times Cited: 6
Securing Transmitted Color Images Using Zero Watermarking and Advanced Encryption Standard on Raspberry Pi
Doaa Sami Khafaga, Sarah M. Alhammad, Amal Magdi, et al.
Computer Systems Science and Engineering (2023) Vol. 47, Iss. 2, pp. 1967-1986
Open Access | Times Cited: 6
Doaa Sami Khafaga, Sarah M. Alhammad, Amal Magdi, et al.
Computer Systems Science and Engineering (2023) Vol. 47, Iss. 2, pp. 1967-1986
Open Access | Times Cited: 6
Image encryption algorithm based on 1D-SFACF with cross-cyclic shift and adaptive diffusion
Yongsheng Hu, Liyong Nan
Physica Scripta (2023) Vol. 98, Iss. 5, pp. 055209-055209
Closed Access | Times Cited: 5
Yongsheng Hu, Liyong Nan
Physica Scripta (2023) Vol. 98, Iss. 5, pp. 055209-055209
Closed Access | Times Cited: 5
A Novel RGB Image Obfuscation Technique Using Dynamically Generated All Order-4 Magic Squares
Mahmood ul Hassan, Asaad Alzayed, Amin A. Al-Awady, et al.
IEEE Access (2023) Vol. 11, pp. 46382-46398
Open Access | Times Cited: 4
Mahmood ul Hassan, Asaad Alzayed, Amin A. Al-Awady, et al.
IEEE Access (2023) Vol. 11, pp. 46382-46398
Open Access | Times Cited: 4
<i>N</i>-dimensional discrete hyperchaotic system and its application in audio encryption
Shuang Zhou, Yin Yan-li, Shiyu Wang, et al.
Acta Physica Sinica (2024)
Open Access | Times Cited: 1
Shuang Zhou, Yin Yan-li, Shiyu Wang, et al.
Acta Physica Sinica (2024)
Open Access | Times Cited: 1
Enhanced security in lossless audio encryption using zigzag scrambling, DNA coding, SHA-256, and hopfield networks: a practical vlc system implementation
S. B. Nono Fotso, William Nodem Atchoffo, Armand Nzeukou, et al.
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 1
S. B. Nono Fotso, William Nodem Atchoffo, Armand Nzeukou, et al.
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 1
Dynamic time-delay perturbation: a strategy for enhancing chaotic system performance and its applications
Y. J. Qian, Jun Zheng, Hanping Hu
Nonlinear Dynamics (2024)
Closed Access | Times Cited: 1
Y. J. Qian, Jun Zheng, Hanping Hu
Nonlinear Dynamics (2024)
Closed Access | Times Cited: 1
Designing pair of nonlinear components of a block cipher over quaternion integers
Muhammad Sajjad, Tariq Shah, Huda Alsaud, et al.
AIMS Mathematics (2023) Vol. 8, Iss. 9, pp. 21089-21105
Open Access | Times Cited: 4
Muhammad Sajjad, Tariq Shah, Huda Alsaud, et al.
AIMS Mathematics (2023) Vol. 8, Iss. 9, pp. 21089-21105
Open Access | Times Cited: 4
Asymmetric Key Cryptosystem for Image Encryption by Elliptic Curve over Galois Field
Mohammad Mazyad Hazzazi, Hafeez ur Rehman, Tariq Shah, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2023) Vol. 76, Iss. 2, pp. 2033-2060
Open Access | Times Cited: 4
Mohammad Mazyad Hazzazi, Hafeez ur Rehman, Tariq Shah, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2023) Vol. 76, Iss. 2, pp. 2033-2060
Open Access | Times Cited: 4
Securing image-based document transmission in logistics and supply chain management through cheating-resistant visual cryptographic protocols
Qi Wang, John Blesswin, T. Manoranjitham, et al.
Mathematical Biosciences & Engineering (2023) Vol. 20, Iss. 11, pp. 19983-20001
Open Access | Times Cited: 4
Qi Wang, John Blesswin, T. Manoranjitham, et al.
Mathematical Biosciences & Engineering (2023) Vol. 20, Iss. 11, pp. 19983-20001
Open Access | Times Cited: 4
A Multi-Stream Scrambling and DNA Encoding Method Based Image Encryption
Nashat Salih Abdulkarim Alsandi, Dilovan Asaad Zebari, Adel Al-Zebari, et al.
Computer Systems Science and Engineering (2023) Vol. 47, Iss. 2, pp. 1321-1347
Open Access | Times Cited: 3
Nashat Salih Abdulkarim Alsandi, Dilovan Asaad Zebari, Adel Al-Zebari, et al.
Computer Systems Science and Engineering (2023) Vol. 47, Iss. 2, pp. 1321-1347
Open Access | Times Cited: 3
A Novel Internet of Medical Thing Cryptosystem Based on Jigsaw Transformation and Ikeda Chaotic Map
Sultan Almakdi, Mohammed S. Alshehri, Yousef Asiri, et al.
Computer Systems Science and Engineering (2023) Vol. 46, Iss. 3, pp. 3017-3036
Open Access | Times Cited: 2
Sultan Almakdi, Mohammed S. Alshehri, Yousef Asiri, et al.
Computer Systems Science and Engineering (2023) Vol. 46, Iss. 3, pp. 3017-3036
Open Access | Times Cited: 2
Discovery of New Chaotic Systems: Based on Existing Systems
Tuncay Cigal, Erkan Tanyıldızı
(2024), pp. 1-4
Closed Access
Tuncay Cigal, Erkan Tanyıldızı
(2024), pp. 1-4
Closed Access