
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Image encryption algorithm based on the matrix semi-tensor product with a compound secret key produced by a Boolean network
Xingyuan Wang, Suo Gao
Information Sciences (2020) Vol. 539, pp. 195-214
Closed Access | Times Cited: 291
Xingyuan Wang, Suo Gao
Information Sciences (2020) Vol. 539, pp. 195-214
Closed Access | Times Cited: 291
Showing 26-50 of 291 citing articles:
Stereoscopic Image Description With Trinion Fractional-Order Continuous Orthogonal Moments
Chunpeng Wang, Bin Ma, Zhiqiu Xia, et al.
IEEE Transactions on Circuits and Systems for Video Technology (2021) Vol. 32, Iss. 4, pp. 1998-2012
Closed Access | Times Cited: 70
Chunpeng Wang, Bin Ma, Zhiqiu Xia, et al.
IEEE Transactions on Circuits and Systems for Video Technology (2021) Vol. 32, Iss. 4, pp. 1998-2012
Closed Access | Times Cited: 70
Dynamical Properties of Ion-Acoustic Waves in Space Plasma and Its Application to Image Encryption
Jharna Tamang, Jean De Dieu Nkapkop, Muhammad Fazal Ijaz, et al.
IEEE Access (2021) Vol. 9, pp. 18762-18782
Open Access | Times Cited: 67
Jharna Tamang, Jean De Dieu Nkapkop, Muhammad Fazal Ijaz, et al.
IEEE Access (2021) Vol. 9, pp. 18762-18782
Open Access | Times Cited: 67
Image encryption scheme based on blind signature and an improved Lorenz system
Guodong Ye, Huishan Wu, Min Liu, et al.
Expert Systems with Applications (2022) Vol. 205, pp. 117709-117709
Closed Access | Times Cited: 63
Guodong Ye, Huishan Wu, Min Liu, et al.
Expert Systems with Applications (2022) Vol. 205, pp. 117709-117709
Closed Access | Times Cited: 63
An efficient double-image encryption and hiding algorithm using a newly designed chaotic system and parallel compressive sensing
Xingyuan Wang, Cheng Liu, Donghua Jiang
Information Sciences (2022) Vol. 610, pp. 300-325
Closed Access | Times Cited: 57
Xingyuan Wang, Cheng Liu, Donghua Jiang
Information Sciences (2022) Vol. 610, pp. 300-325
Closed Access | Times Cited: 57
An efficient chaos based image encryption algorithm using enhanced thorp shuffle and chaotic convolution function
C. Madan Kumar, R. Vidhya, M. Brindha
Applied Intelligence (2021) Vol. 52, Iss. 3, pp. 2556-2585
Closed Access | Times Cited: 56
C. Madan Kumar, R. Vidhya, M. Brindha
Applied Intelligence (2021) Vol. 52, Iss. 3, pp. 2556-2585
Closed Access | Times Cited: 56
A survey of image encryption algorithms based on chaotic system
Pengfei Fang, Han Liu, Chengmao Wu, et al.
The Visual Computer (2022) Vol. 39, Iss. 5, pp. 1975-2003
Closed Access | Times Cited: 52
Pengfei Fang, Han Liu, Chengmao Wu, et al.
The Visual Computer (2022) Vol. 39, Iss. 5, pp. 1975-2003
Closed Access | Times Cited: 52
Multiple medical image encryption algorithm based on scrambling of region of interest and diffusion of odd-even interleaved points
Xingyuan Wang, Yafei Wang
Expert Systems with Applications (2022) Vol. 213, pp. 118924-118924
Closed Access | Times Cited: 52
Xingyuan Wang, Yafei Wang
Expert Systems with Applications (2022) Vol. 213, pp. 118924-118924
Closed Access | Times Cited: 52
A New 5-D Multistable Hyperchaotic System With Three Positive Lyapunov Exponents: Bifurcation Analysis, Circuit Design, FPGA Realization and Image Encryption
Khaled Benkouider, Sundarapandian Vaidyanathan, Aceng Sambas, et al.
IEEE Access (2022) Vol. 10, pp. 90111-90132
Open Access | Times Cited: 48
Khaled Benkouider, Sundarapandian Vaidyanathan, Aceng Sambas, et al.
IEEE Access (2022) Vol. 10, pp. 90111-90132
Open Access | Times Cited: 48
An image encryption scheme based on chaotic logarithmic map and key generation using deep CNN
Uğur Erkan, Abdurrahim Toktaş, Serdar Enginoğlu, et al.
Multimedia Tools and Applications (2022) Vol. 81, Iss. 5, pp. 7365-7391
Open Access | Times Cited: 45
Uğur Erkan, Abdurrahim Toktaş, Serdar Enginoğlu, et al.
Multimedia Tools and Applications (2022) Vol. 81, Iss. 5, pp. 7365-7391
Open Access | Times Cited: 45
An image encryption algorithm based on discrete fractional wavelet transform and quantum chaos
Chunmeng Li, Xiaozhong Yang
Optik (2022) Vol. 260, pp. 169042-169042
Closed Access | Times Cited: 44
Chunmeng Li, Xiaozhong Yang
Optik (2022) Vol. 260, pp. 169042-169042
Closed Access | Times Cited: 44
Uniform non-degeneracy discrete chaotic system and its application in image encryption
Xudong Liu, Xiaojun Tong, Zhu Wang, et al.
Nonlinear Dynamics (2022) Vol. 108, Iss. 1, pp. 653-682
Closed Access | Times Cited: 42
Xudong Liu, Xiaojun Tong, Zhu Wang, et al.
Nonlinear Dynamics (2022) Vol. 108, Iss. 1, pp. 653-682
Closed Access | Times Cited: 42
Cross-plane multi-image encryption using chaos and blurred pixels
Xingyuan Wang, Huipeng Liu
Chaos Solitons & Fractals (2022) Vol. 164, pp. 112586-112586
Closed Access | Times Cited: 40
Xingyuan Wang, Huipeng Liu
Chaos Solitons & Fractals (2022) Vol. 164, pp. 112586-112586
Closed Access | Times Cited: 40
Analysis and implementation of no-equilibrium chaotic system with application in image encryption
Qiang Lai, Hui Zhang, Paul Didier Kamdem Kuate, et al.
Applied Intelligence (2022) Vol. 52, Iss. 10, pp. 11448-11471
Closed Access | Times Cited: 37
Qiang Lai, Hui Zhang, Paul Didier Kamdem Kuate, et al.
Applied Intelligence (2022) Vol. 52, Iss. 10, pp. 11448-11471
Closed Access | Times Cited: 37
Color image encryption algorithm based on hyperchaotic system and improved quantum revolving gate
Xingyuan Wang, Yining Su, Chao Luo, et al.
Multimedia Tools and Applications (2022) Vol. 81, Iss. 10, pp. 13845-13865
Closed Access | Times Cited: 37
Xingyuan Wang, Yining Su, Chao Luo, et al.
Multimedia Tools and Applications (2022) Vol. 81, Iss. 10, pp. 13845-13865
Closed Access | Times Cited: 37
Efficient S-box construction based on quantum-inspired quantum walks with PSO algorithm and its application to image cryptosystem
Bassem Abd-El-Atty
Complex & Intelligent Systems (2023) Vol. 9, Iss. 5, pp. 4817-4835
Open Access | Times Cited: 26
Bassem Abd-El-Atty
Complex & Intelligent Systems (2023) Vol. 9, Iss. 5, pp. 4817-4835
Open Access | Times Cited: 26
A novel devaney chaotic map with uniform trajectory for color image encryption
Xudong Liu, Xiaojun Tong, Zhu Wang, et al.
Applied Mathematical Modelling (2023) Vol. 120, pp. 153-174
Closed Access | Times Cited: 24
Xudong Liu, Xiaojun Tong, Zhu Wang, et al.
Applied Mathematical Modelling (2023) Vol. 120, pp. 153-174
Closed Access | Times Cited: 24
An image encryption method based on multi-space confusion using hyperchaotic 2D Vincent map derived from optimization benchmark function
Uğur Erkan, Abdurrahim Toktaş, Samet Memiş, et al.
Nonlinear Dynamics (2023) Vol. 111, Iss. 21, pp. 20377-20405
Closed Access | Times Cited: 23
Uğur Erkan, Abdurrahim Toktaş, Samet Memiş, et al.
Nonlinear Dynamics (2023) Vol. 111, Iss. 21, pp. 20377-20405
Closed Access | Times Cited: 23
Development of a video encryption algorithm for critical areas using 2D extended Schaffer function map and neural networks
Suo Gao, Jiafeng Liu, Herbert Ho‐Ching Iu, et al.
Applied Mathematical Modelling (2024) Vol. 134, pp. 520-537
Closed Access | Times Cited: 14
Suo Gao, Jiafeng Liu, Herbert Ho‐Ching Iu, et al.
Applied Mathematical Modelling (2024) Vol. 134, pp. 520-537
Closed Access | Times Cited: 14
Quantum image encryption algorithm via optimized quantum circuit and parity bit-plane permutation
Jinwen He, Hegui Zhu, Xv Zhou
Journal of Information Security and Applications (2024) Vol. 81, pp. 103698-103698
Closed Access | Times Cited: 11
Jinwen He, Hegui Zhu, Xv Zhou
Journal of Information Security and Applications (2024) Vol. 81, pp. 103698-103698
Closed Access | Times Cited: 11
Deep learning-based encryption for secure transmission digital images: A survey
Soniya Rohhila, Amit Kumar Singh
Computers & Electrical Engineering (2024) Vol. 116, pp. 109236-109236
Closed Access | Times Cited: 8
Soniya Rohhila, Amit Kumar Singh
Computers & Electrical Engineering (2024) Vol. 116, pp. 109236-109236
Closed Access | Times Cited: 8
Simple colour image cryptosystem with very high level of security
Shuang Zhou, Xingyuan Wang, Mingxu Wang, et al.
Chaos Solitons & Fractals (2020) Vol. 141, pp. 110225-110225
Closed Access | Times Cited: 66
Shuang Zhou, Xingyuan Wang, Mingxu Wang, et al.
Chaos Solitons & Fractals (2020) Vol. 141, pp. 110225-110225
Closed Access | Times Cited: 66
Image encryption algorithm based on Tent-Dynamics coupled map lattices and diffusion of Household
Xingyuan Wang, Wenhua Xue, Jubai An
Chaos Solitons & Fractals (2020) Vol. 141, pp. 110309-110309
Closed Access | Times Cited: 56
Xingyuan Wang, Wenhua Xue, Jubai An
Chaos Solitons & Fractals (2020) Vol. 141, pp. 110309-110309
Closed Access | Times Cited: 56
Improved Chaos-Based Cryptosystem for Medical Image Encryption and Decryption
Mohamed Gafsi, Nessrine Abbassi, Mohamed Ali Hajjaji, et al.
Scientific Programming (2020) Vol. 2020, pp. 1-22
Open Access | Times Cited: 56
Mohamed Gafsi, Nessrine Abbassi, Mohamed Ali Hajjaji, et al.
Scientific Programming (2020) Vol. 2020, pp. 1-22
Open Access | Times Cited: 56
Chaos and compressive sensing based novel image encryption scheme
Jan Sher Khan, Sema Koç Kayhan
Journal of Information Security and Applications (2021) Vol. 58, pp. 102711-102711
Closed Access | Times Cited: 54
Jan Sher Khan, Sema Koç Kayhan
Journal of Information Security and Applications (2021) Vol. 58, pp. 102711-102711
Closed Access | Times Cited: 54
Pixel-level and bit-level image encryption method based on Logistic-Chebyshev dynamic coupled map lattices
Xingyuan Wang, Xiaohui Du
Chaos Solitons & Fractals (2021) Vol. 155, pp. 111629-111629
Closed Access | Times Cited: 54
Xingyuan Wang, Xiaohui Du
Chaos Solitons & Fractals (2021) Vol. 155, pp. 111629-111629
Closed Access | Times Cited: 54