
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Reversible data hiding based on Shamir’s secret sharing for color images over cloud
Priyanka Singh, Balasubramanian Raman
Information Sciences (2017) Vol. 422, pp. 77-97
Closed Access | Times Cited: 49
Priyanka Singh, Balasubramanian Raman
Information Sciences (2017) Vol. 422, pp. 77-97
Closed Access | Times Cited: 49
Showing 26-50 of 49 citing articles:
SecMed: A Secure Approach for Proving Rightful Ownership of Medical Images in Encrypted Domain over Cloud
Aishwary K. Pandey, Priyanka Singh, Nishant Agarwal, et al.
2019 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR) (2018), pp. 390-395
Closed Access | Times Cited: 4
Aishwary K. Pandey, Priyanka Singh, Nishant Agarwal, et al.
2019 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR) (2018), pp. 390-395
Closed Access | Times Cited: 4
A High-Capacity Reversible Data-Hiding Scheme for Medical Image Transmission Using Modified Elias Gamma Encoding
V. M. Manikandan, Kandala Sree Rama Murthy, Bhavana Siddineni, et al.
Electronics (2022) Vol. 11, Iss. 19, pp. 3101-3101
Open Access | Times Cited: 3
V. M. Manikandan, Kandala Sree Rama Murthy, Bhavana Siddineni, et al.
Electronics (2022) Vol. 11, Iss. 19, pp. 3101-3101
Open Access | Times Cited: 3
Decentralized Key Management for Digital Identity Wallets
Abylay Satybaldy, Anushka Subedi, Sheikh Mohammad Idrees
Signals and communication technology (2024), pp. 47-58
Closed Access
Abylay Satybaldy, Anushka Subedi, Sheikh Mohammad Idrees
Signals and communication technology (2024), pp. 47-58
Closed Access
Integer wavelet transform‐based secret image sharing using rook polynomial and hamming code with authentication
Sara Charoghchi, Zahra Saeidi, Samaneh Mashhadi
CAAI Transactions on Intelligence Technology (2024)
Open Access
Sara Charoghchi, Zahra Saeidi, Samaneh Mashhadi
CAAI Transactions on Intelligence Technology (2024)
Open Access
A Hierarchical Authorization Reversible Data Hiding in Encrypted Image Based on Secret Sharing
Chao Jiang, Minqing Zhang, Yongjun Kong, et al.
Mathematics (2024) Vol. 12, Iss. 14, pp. 2262-2262
Open Access
Chao Jiang, Minqing Zhang, Yongjun Kong, et al.
Mathematics (2024) Vol. 12, Iss. 14, pp. 2262-2262
Open Access
High-capacity reversible data hiding using quotient multi pixel value differencing scheme in encrypted images by fuzzy based encryption
Asha Jose, Kamalraj Subramanian
Multimedia Tools and Applications (2021) Vol. 80, Iss. 19, pp. 29453-29479
Closed Access | Times Cited: 4
Asha Jose, Kamalraj Subramanian
Multimedia Tools and Applications (2021) Vol. 80, Iss. 19, pp. 29453-29479
Closed Access | Times Cited: 4
Steganographic embedding in containers-images
Arina Nikishova, Tatyana Omelchenko, S A Makedonskij
Journal of Physics Conference Series (2018) Vol. 1015, pp. 042041-042041
Open Access | Times Cited: 3
Arina Nikishova, Tatyana Omelchenko, S A Makedonskij
Journal of Physics Conference Series (2018) Vol. 1015, pp. 042041-042041
Open Access | Times Cited: 3
A novel conditional anonymity scheme for vehicular communication networks
Xiaoliang Wang, Liang Bai, Brandon Mausler, et al.
International Journal of Communication Systems (2019) Vol. 35, Iss. 12
Closed Access | Times Cited: 3
Xiaoliang Wang, Liang Bai, Brandon Mausler, et al.
International Journal of Communication Systems (2019) Vol. 35, Iss. 12
Closed Access | Times Cited: 3
Verifiable Privacy Preservation Scheme for Outsourcing Medical Image to Cloud Through ROI Based Crypto-Watermarking
Chuan Zhou, Yi Zhou, Xiang‐Zhi Liu
(2023)
Open Access | Times Cited: 1
Chuan Zhou, Yi Zhou, Xiang‐Zhi Liu
(2023)
Open Access | Times Cited: 1
Verifiable Privacy Preservation Scheme for Outsourcing Medical Image to Cloud Through ROI Based Crypto-Watermarking
Chuan Zhou, Yi Zhou, Xinghan An, et al.
(2023)
Open Access | Times Cited: 1
Chuan Zhou, Yi Zhou, Xinghan An, et al.
(2023)
Open Access | Times Cited: 1
A reversible and lossless secret image sharing scheme with authentication for color images
Wendan Li, Changgen Peng, Weijie Tan, et al.
Journal of King Saud University - Computer and Information Sciences (2023) Vol. 35, Iss. 10, pp. 101854-101854
Open Access | Times Cited: 1
Wendan Li, Changgen Peng, Weijie Tan, et al.
Journal of King Saud University - Computer and Information Sciences (2023) Vol. 35, Iss. 10, pp. 101854-101854
Open Access | Times Cited: 1
ANT COLONY OPTIMIZATION BASED OPTIMAL STEGANOGRAPHY TECHNIQUE FOR SECRET IMAGE SHARING SCHEME
K. Shankar, Eswaran Perumal
Advances in Mathematics Scientific Journal (2021) Vol. 10, Iss. 1, pp. 453-461
Closed Access | Times Cited: 3
K. Shankar, Eswaran Perumal
Advances in Mathematics Scientific Journal (2021) Vol. 10, Iss. 1, pp. 453-461
Closed Access | Times Cited: 3
Revisiting group oriented secret sharing schemes
Rui Xu, Xu Wang, Kirill Morozov, et al.
Information Sciences (2022) Vol. 589, pp. 751-769
Closed Access | Times Cited: 2
Rui Xu, Xu Wang, Kirill Morozov, et al.
Information Sciences (2022) Vol. 589, pp. 751-769
Closed Access | Times Cited: 2
Network intrusion detection based on DNA spatial information
Tianhao Hou, Hongyan Xing, Xinyi Liang, et al.
Computer Networks (2022) Vol. 217, pp. 109318-109318
Closed Access | Times Cited: 2
Tianhao Hou, Hongyan Xing, Xinyi Liang, et al.
Computer Networks (2022) Vol. 217, pp. 109318-109318
Closed Access | Times Cited: 2
Threshold‐based key management scheme for space network
Xiaojun Tong, Jie Liu, Zhu Wang, et al.
International Journal of Communication Systems (2021) Vol. 34, Iss. 11
Closed Access | Times Cited: 2
Xiaojun Tong, Jie Liu, Zhu Wang, et al.
International Journal of Communication Systems (2021) Vol. 34, Iss. 11
Closed Access | Times Cited: 2
A Novel Prediction Error Histogram Shifting-based Reversible Data Hiding Scheme for Medical Image Transmission
B. Padmaja, V. M. Manikandan
(2021), pp. 1-6
Closed Access | Times Cited: 2
B. Padmaja, V. M. Manikandan
(2021), pp. 1-6
Closed Access | Times Cited: 2
SecureCMerge: Secure PDF Merging over Untrusted Servers
Neha Sharma, Priyanka Singh, Pradeep K. Atrey
2019 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR) (2018), pp. 402-407
Closed Access | Times Cited: 1
Neha Sharma, Priyanka Singh, Pradeep K. Atrey
2019 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR) (2018), pp. 402-407
Closed Access | Times Cited: 1
Progressive and hierarchical share-in-share scheme over cloud
Tapasi Bhattacharjee, Santi P. Maity
Journal of Information Security and Applications (2019) Vol. 46, pp. 108-120
Closed Access | Times Cited: 1
Tapasi Bhattacharjee, Santi P. Maity
Journal of Information Security and Applications (2019) Vol. 46, pp. 108-120
Closed Access | Times Cited: 1
Improved Search Pattern with Discrete Wavelet Transform for Video Steganography
Hayfaa Abdulzahra Atee, Abidulkarim K. I. Yasari, Dalal Abdulmohsin Hammood
Lecture notes in networks and systems (2021), pp. 465-481
Closed Access | Times Cited: 1
Hayfaa Abdulzahra Atee, Abidulkarim K. I. Yasari, Dalal Abdulmohsin Hammood
Lecture notes in networks and systems (2021), pp. 465-481
Closed Access | Times Cited: 1
Medical Image Authentication and Restoration Based on mCloud Computing: Towards Reliant Medical Digitization Era
Fatma Hassan Al-Rubbiay, Asraa Y. Youssef, Sawsan. D. Mahmood
Lecture notes in networks and systems (2023), pp. 487-500
Closed Access
Fatma Hassan Al-Rubbiay, Asraa Y. Youssef, Sawsan. D. Mahmood
Lecture notes in networks and systems (2023), pp. 487-500
Closed Access
Secure One-time Password Generation using Shamir's Secret Sharing
Uday Jain -, Sanya Bahl -, Sonam Kumari -, et al.
International Journal For Multidisciplinary Research (2023) Vol. 5, Iss. 6
Open Access
Uday Jain -, Sanya Bahl -, Sonam Kumari -, et al.
International Journal For Multidisciplinary Research (2023) Vol. 5, Iss. 6
Open Access
Verifiable Privacy Preservation Scheme for Outsourcing Medi-cal Image to Cloud Through ROI Based Crypto-Watermarking
Chuan Zhou, Yi Zhou, XingHan An, et al.
(2023), pp. 196-204
Open Access
Chuan Zhou, Yi Zhou, XingHan An, et al.
(2023), pp. 196-204
Open Access
Reversible Information Hiding in Ciphertext of Any Digital Media
Zimi Liu, Yulin Wang
(2020) Vol. 7809, pp. 35-38
Closed Access
Zimi Liu, Yulin Wang
(2020) Vol. 7809, pp. 35-38
Closed Access
Research on Secret Image Threshold Sharing Information Hiding Algorithm Based on Asmuth-Bloom
维启 陈
Computer Science and Application (2021) Vol. 11, Iss. 04, pp. 975-982
Closed Access
维启 陈
Computer Science and Application (2021) Vol. 11, Iss. 04, pp. 975-982
Closed Access