OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

TRLG: Fragile blind quad watermarking for image tamper detection and recovery by providing compact digests with optimized quality using LWT and GA
Behrouz Bolourian Haghighi, Amir Hossein Taherinia, Amir Hossein Mohajerzadeh
Information Sciences (2019) Vol. 486, pp. 204-230
Closed Access | Times Cited: 55

Showing 26-50 of 55 citing articles:

Gauss–Jordan elimination-based image tampering detection and self-recovery
Xiaochen Yuan, Xinhang Li, Tong Liu
Signal Processing Image Communication (2020) Vol. 90, pp. 116038-116038
Closed Access | Times Cited: 14

Digital image self-recovery using CNN networks
Mehdi Rezaei, Hassan Taheri
Optik (2022) Vol. 264, pp. 169345-169345
Closed Access | Times Cited: 9

A distortion-free authentication method for color images with tampering localization and self-recovery
Che-Wei Lee
Signal Processing Image Communication (2024) Vol. 124, pp. 117116-117116
Closed Access | Times Cited: 1

Trade-off independent image watermarking using enhanced structured matrix decomposition
Ahmed Khan, KokSheik Wong, Vishnu Monn Baskaran
Multimedia Tools and Applications (2024)
Open Access | Times Cited: 1

Integer wavelet transform based an effective fragile watermarking scheme for exact authentication and restoration
Durgesh Singh, Sandeep S. Udmale, Sanjay Kumar Singh
Journal of Ambient Intelligence and Humanized Computing (2022) Vol. 14, Iss. 5, pp. 4841-4852
Closed Access | Times Cited: 7

AuSR3: A new block mapping technique for image authentication and self-recovery to avoid the tamper coincidence problem
Afrig Aminuddin, Ferda Ernawan
Journal of King Saud University - Computer and Information Sciences (2023) Vol. 35, Iss. 9, pp. 101755-101755
Open Access | Times Cited: 4

An Imperceptible Watermarking Scheme for Medical Image Tamper Detection
Abdallah Soualmi, Adel Alti, Lamri Laouamer
International Journal of Information Security and Privacy (2021) Vol. 16, Iss. 1, pp. 1-18
Closed Access | Times Cited: 10

Adaptive Feature Calculation and Diagonal Mapping for Successive Recovery of Tampered Regions
Tong Liu, Xiaochen Yuan
IEEE Transactions on Circuits and Systems for Video Technology (2020) Vol. 31, Iss. 7, pp. 2617-2630
Closed Access | Times Cited: 9

A novel image tamper detection approach by blending forensic tools and optimized CNN: Sealion customized firefly algorithm
Mohassin Ahmad, Farida Khursheed
Multimedia Tools and Applications (2021) Vol. 81, Iss. 2, pp. 2577-2601
Closed Access | Times Cited: 9

Blind Dual Watermarking Scheme Using Stucki Kernel and SPIHT for Image Self-Recovery
Q. Y. Zhang, Xiaochen Yuan, Tong Liu
IEEE Access (2022) Vol. 10, pp. 96100-96111
Open Access | Times Cited: 6

Tampering localization and self-recovery using block labeling and adaptive significance
Q. Y. Zhang, Xiaochen Yuan, Tong Liu, et al.
Expert Systems with Applications (2023) Vol. 226, pp. 120228-120228
Closed Access | Times Cited: 3

Watermark Faker: Towards Forgery of Digital Image Watermarking
Ruowei Wang, Chenguo Lin, Qijun Zhao, et al.
2022 IEEE International Conference on Multimedia and Expo (ICME) (2021), pp. 1-6
Open Access | Times Cited: 8

Multimedia Security Through 1D Chaotic Systems
Achraf Daoui, Ahmed A. Abd El‐Latif
Advances in data mining and database management book series (2023), pp. 1-31
Closed Access | Times Cited: 2

A novel tamper detection watermarking approach for improving image integrity
Muath AlShaikh
Multimedia Tools and Applications (2022) Vol. 82, Iss. 7, pp. 10039-10060
Closed Access | Times Cited: 3

TCBR and TCBD: Evaluation metrics for tamper coincidence problem in fragile image watermarking
Afrig Aminuddin, Ferda Ernawan, Danakorn Nincarean, et al.
Engineering Science and Technology an International Journal (2024) Vol. 56, pp. 101790-101790
Open Access

Simple, robust and secure data hiding based on CRT feature extraction and closed-loop chaotic encryption system
Alireza Ghaemi, Habibollah Danyali, Kamran Kazemi
Journal of Real-Time Image Processing (2020) Vol. 18, Iss. 1, pp. 221-232
Closed Access | Times Cited: 3

Cryptanalysis of a Hamming Code and Logistic-Map based Pixel-Level Active Forgery Detection Scheme
Oussama Benrhouma
International Journal of Advanced Computer Science and Applications (2022) Vol. 13, Iss. 2
Open Access | Times Cited: 2

Multiple Digital Image Watermarking Using SWT, FWHT and R, G, B Channel
Anand Ghuli, Dayanand G. Savakar, Shivanand Pujar
Advances in intelligent systems and computing (2020), pp. 343-350
Closed Access | Times Cited: 1

Image Self-Recovery Based on Authentication Feature Extraction
Tong Liu, Xiaochen Yuan
2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) (2020), pp. 1222-1227
Closed Access | Times Cited: 1

Fragile watermarking for image authentication using dyadic walsh ordering
Prajanto Wahyu Adi, Adi Wibowo, Guruh Aryotejo, et al.
International Journal of Advances in Intelligent Informatics (2023) Vol. 9, Iss. 3, pp. 490-490
Open Access

Dlr: Adversarial Examples Detection and Label Recovery for Deep Neural Networks
Keji Han, Yao Ge, Ruchuan Wang, et al.
(2023)
Closed Access

WSMN: An optimized multipurpose blind watermarking in Shearlet domain using MLP and NSGA-II
Behrouz Bolourian Haghighi, Amir Hossein Taherinia, Ahad Harati, et al.
arXiv (Cornell University) (2020)
Closed Access

Region‐based scalable self‐recovery for salient‐object images
Navid Daneshmandpour, Habibollah Danyali, Mohammad Sadegh Helfroush
ETRI Journal (2020) Vol. 43, Iss. 1, pp. 109-119
Open Access

Scroll to top