OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Reversible data hiding based on Shamir’s secret sharing for color images over cloud
Priyanka Singh, Balasubramanian Raman
Information Sciences (2017) Vol. 422, pp. 77-97
Closed Access | Times Cited: 49

Showing 26-50 of 49 citing articles:

SecMed: A Secure Approach for Proving Rightful Ownership of Medical Images in Encrypted Domain over Cloud
Aishwary K. Pandey, Priyanka Singh, Nishant Agarwal, et al.
2019 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR) (2018), pp. 390-395
Closed Access | Times Cited: 4

A High-Capacity Reversible Data-Hiding Scheme for Medical Image Transmission Using Modified Elias Gamma Encoding
V. M. Manikandan, Kandala Sree Rama Murthy, Bhavana Siddineni, et al.
Electronics (2022) Vol. 11, Iss. 19, pp. 3101-3101
Open Access | Times Cited: 3

Decentralized Key Management for Digital Identity Wallets
Abylay Satybaldy, Anushka Subedi, Sheikh Mohammad Idrees
Signals and communication technology (2024), pp. 47-58
Closed Access

Integer wavelet transform‐based secret image sharing using rook polynomial and hamming code with authentication
Sara Charoghchi, Zahra Saeidi, Samaneh Mashhadi
CAAI Transactions on Intelligence Technology (2024)
Open Access

A Hierarchical Authorization Reversible Data Hiding in Encrypted Image Based on Secret Sharing
Chao Jiang, Minqing Zhang, Yongjun Kong, et al.
Mathematics (2024) Vol. 12, Iss. 14, pp. 2262-2262
Open Access

High-capacity reversible data hiding using quotient multi pixel value differencing scheme in encrypted images by fuzzy based encryption
Asha Jose, Kamalraj Subramanian
Multimedia Tools and Applications (2021) Vol. 80, Iss. 19, pp. 29453-29479
Closed Access | Times Cited: 4

Steganographic embedding in containers-images
Arina Nikishova, Tatyana Omelchenko, S A Makedonskij
Journal of Physics Conference Series (2018) Vol. 1015, pp. 042041-042041
Open Access | Times Cited: 3

A novel conditional anonymity scheme for vehicular communication networks
Xiaoliang Wang, Liang Bai, Brandon Mausler, et al.
International Journal of Communication Systems (2019) Vol. 35, Iss. 12
Closed Access | Times Cited: 3

A reversible and lossless secret image sharing scheme with authentication for color images
Wendan Li, Changgen Peng, Weijie Tan, et al.
Journal of King Saud University - Computer and Information Sciences (2023) Vol. 35, Iss. 10, pp. 101854-101854
Open Access | Times Cited: 1

ANT COLONY OPTIMIZATION BASED OPTIMAL STEGANOGRAPHY TECHNIQUE FOR SECRET IMAGE SHARING SCHEME
K. Shankar, Eswaran Perumal
Advances in Mathematics Scientific Journal (2021) Vol. 10, Iss. 1, pp. 453-461
Closed Access | Times Cited: 3

Revisiting group oriented secret sharing schemes
Rui Xu, Xu Wang, Kirill Morozov, et al.
Information Sciences (2022) Vol. 589, pp. 751-769
Closed Access | Times Cited: 2

Network intrusion detection based on DNA spatial information
Tianhao Hou, Hongyan Xing, Xinyi Liang, et al.
Computer Networks (2022) Vol. 217, pp. 109318-109318
Closed Access | Times Cited: 2

Threshold‐based key management scheme for space network
Xiaojun Tong, Jie Liu, Zhu Wang, et al.
International Journal of Communication Systems (2021) Vol. 34, Iss. 11
Closed Access | Times Cited: 2

SecureCMerge: Secure PDF Merging over Untrusted Servers
Neha Sharma, Priyanka Singh, Pradeep K. Atrey
2019 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR) (2018), pp. 402-407
Closed Access | Times Cited: 1

Progressive and hierarchical share-in-share scheme over cloud
Tapasi Bhattacharjee, Santi P. Maity
Journal of Information Security and Applications (2019) Vol. 46, pp. 108-120
Closed Access | Times Cited: 1

Improved Search Pattern with Discrete Wavelet Transform for Video Steganography
Hayfaa Abdulzahra Atee, Abidulkarim K. I. Yasari, Dalal Abdulmohsin Hammood
Lecture notes in networks and systems (2021), pp. 465-481
Closed Access | Times Cited: 1

Medical Image Authentication and Restoration Based on mCloud Computing: Towards Reliant Medical Digitization Era
Fatma Hassan Al-Rubbiay, Asraa Y. Youssef, Sawsan. D. Mahmood
Lecture notes in networks and systems (2023), pp. 487-500
Closed Access

Secure One-time Password Generation using Shamir's Secret Sharing
Uday Jain -, Sanya Bahl -, Sonam Kumari -, et al.
International Journal For Multidisciplinary Research (2023) Vol. 5, Iss. 6
Open Access

Reversible Information Hiding in Ciphertext of Any Digital Media
Zimi Liu, Yulin Wang
(2020) Vol. 7809, pp. 35-38
Closed Access

Research on Secret Image Threshold Sharing Information Hiding Algorithm Based on Asmuth-Bloom
维启 陈
Computer Science and Application (2021) Vol. 11, Iss. 04, pp. 975-982
Closed Access

Previous Page - Page 2

Scroll to top