
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Novel image encryption scheme based on chaotic signals with finite-precision error
Shuang Zhou, Xingyuan Wang, Yingqian Zhang
Information Sciences (2022) Vol. 621, pp. 782-798
Closed Access | Times Cited: 71
Shuang Zhou, Xingyuan Wang, Yingqian Zhang
Information Sciences (2022) Vol. 621, pp. 782-798
Closed Access | Times Cited: 71
Showing 26-50 of 71 citing articles:
CSENMT: A deep image compressed sensing encryption network via multi-color space and texture feature
Xiuli Chai, Shiping Song, Zhihua Gan, et al.
Expert Systems with Applications (2023) Vol. 241, pp. 122562-122562
Closed Access | Times Cited: 10
Xiuli Chai, Shiping Song, Zhihua Gan, et al.
Expert Systems with Applications (2023) Vol. 241, pp. 122562-122562
Closed Access | Times Cited: 10
Fully chaotic medical image encryption scheme based on dynamic DNA and block rotation
Jie Xiong, Musha Ji’e, Lidan Wang, et al.
Physica Scripta (2023) Vol. 98, Iss. 7, pp. 075234-075234
Closed Access | Times Cited: 9
Jie Xiong, Musha Ji’e, Lidan Wang, et al.
Physica Scripta (2023) Vol. 98, Iss. 7, pp. 075234-075234
Closed Access | Times Cited: 9
New image encryption algorithm based on hyperchaotic 3D-IHAL and a hybrid cryptosystem
Suo Gao, Songbo Liu, Xingyuan Wang, et al.
Applied Intelligence (2023) Vol. 53, Iss. 22, pp. 27826-27843
Closed Access | Times Cited: 9
Suo Gao, Songbo Liu, Xingyuan Wang, et al.
Applied Intelligence (2023) Vol. 53, Iss. 22, pp. 27826-27843
Closed Access | Times Cited: 9
Securing Dual-Channel Audio Communication With a 2-D Infinite Collapse and Logistic Map
Rui Wu, Suo Gao, Herbert Ho‐Ching Iu, et al.
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 6, pp. 10214-10223
Closed Access | Times Cited: 9
Rui Wu, Suo Gao, Herbert Ho‐Ching Iu, et al.
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 6, pp. 10214-10223
Closed Access | Times Cited: 9
An Effective Anti-Object-Detection Image Privacy Protection Scheme Based on Robust Chaos
Yuexi Peng, Zixin Lan, Zhijun Li, et al.
IEEE Transactions on Industrial Informatics (2024) Vol. 20, Iss. 5, pp. 7227-7237
Closed Access | Times Cited: 3
Yuexi Peng, Zixin Lan, Zhijun Li, et al.
IEEE Transactions on Industrial Informatics (2024) Vol. 20, Iss. 5, pp. 7227-7237
Closed Access | Times Cited: 3
MieWC: Medical image encryption using wavelet transform and multiple chaotic maps
Kunal Demla, Ashima Anand
Security and Privacy (2024) Vol. 7, Iss. 3
Closed Access | Times Cited: 2
Kunal Demla, Ashima Anand
Security and Privacy (2024) Vol. 7, Iss. 3
Closed Access | Times Cited: 2
Exploiting Size-Compatible-Match Block Technique for Arbitrary-Size Thumbnail-Preserving Encryption
Dezhi An, Dawei Hao, Jun Lu, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 10, pp. 17357-17371
Closed Access | Times Cited: 2
Dezhi An, Dawei Hao, Jun Lu, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 10, pp. 17357-17371
Closed Access | Times Cited: 2
Designing a novel image encryption algorithm based on a 2D-SCLC hyperchaotic map
Qianqian Chen, Xiaoying Lv
Multimedia Tools and Applications (2024) Vol. 83, Iss. 32, pp. 77137-77163
Closed Access | Times Cited: 2
Qianqian Chen, Xiaoying Lv
Multimedia Tools and Applications (2024) Vol. 83, Iss. 32, pp. 77137-77163
Closed Access | Times Cited: 2
Exploiting high-quality reconstruction image encryption strategy by optimized orthogonal compressive sensing
Heping Wen, Lincheng Yang, Chixin Bai, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 2
Heping Wen, Lincheng Yang, Chixin Bai, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 2
Chaotic image encryption algorithm based on bit-level feedback adjustment
Yining Su, Xingyuan Wang, Hao Gao
Information Sciences (2024) Vol. 679, pp. 121088-121088
Closed Access | Times Cited: 2
Yining Su, Xingyuan Wang, Hao Gao
Information Sciences (2024) Vol. 679, pp. 121088-121088
Closed Access | Times Cited: 2
A new image encryption algorithm with feedback key mechanism using two-dimensional dual discrete quadratic chaotic map
Fang Chen Yin, Ao Li, Chunyan Lv, et al.
Nonlinear Dynamics (2024) Vol. 112, Iss. 22, pp. 20417-20435
Closed Access | Times Cited: 2
Fang Chen Yin, Ao Li, Chunyan Lv, et al.
Nonlinear Dynamics (2024) Vol. 112, Iss. 22, pp. 20417-20435
Closed Access | Times Cited: 2
Image encryption algorithm based on the dynamic RNA computing and a new chaotic map
Shuang Zhou, Yi Wei, Yingqian Zhang, et al.
Integration (2024), pp. 102336-102336
Closed Access | Times Cited: 2
Shuang Zhou, Yi Wei, Yingqian Zhang, et al.
Integration (2024), pp. 102336-102336
Closed Access | Times Cited: 2
Color Image Encryption Algorithm Based on Cross-Spiral Transformation and Zone Diffusion
Xiaoqiang Zhang, Mi Liu, Xiaochang Yang
Mathematics (2023) Vol. 11, Iss. 14, pp. 3228-3228
Open Access | Times Cited: 6
Xiaoqiang Zhang, Mi Liu, Xiaochang Yang
Mathematics (2023) Vol. 11, Iss. 14, pp. 3228-3228
Open Access | Times Cited: 6
Research on wheat image encryption based on different chaotic systems
Yi Shao, Huiru Zhu, Xuefeng Deng, et al.
Systems Science & Control Engineering (2024) Vol. 12, Iss. 1
Open Access | Times Cited: 1
Yi Shao, Huiru Zhu, Xuefeng Deng, et al.
Systems Science & Control Engineering (2024) Vol. 12, Iss. 1
Open Access | Times Cited: 1
A multi-image encryption scheme based on a new n -dimensional chaotic model and eight-base DNA
Mingjie Zhao, Lixiang Li, Zheng Yuan
Chaos Solitons & Fractals (2024) Vol. 186, pp. 115332-115332
Closed Access | Times Cited: 1
Mingjie Zhao, Lixiang Li, Zheng Yuan
Chaos Solitons & Fractals (2024) Vol. 186, pp. 115332-115332
Closed Access | Times Cited: 1
Robust Color Image Encryption Using 3D Chaotic Maps and S-Box Algorithms
Jenan Ayad, Mustafa A. Jalil
Deleted Journal (2024) Vol. 2024, pp. 148-161
Open Access | Times Cited: 1
Jenan Ayad, Mustafa A. Jalil
Deleted Journal (2024) Vol. 2024, pp. 148-161
Open Access | Times Cited: 1
Z-Crypt: Chirp Z-Transform-Based Image Encryption Leveraging Chaotic Logistic Maps and Substitution Permutation Network
Abdullah Alaklabi, Arslan Munir, Muhammad Asfand Hafeez, et al.
IEEE Access (2024) Vol. 12, pp. 123401-123422
Open Access | Times Cited: 1
Abdullah Alaklabi, Arslan Munir, Muhammad Asfand Hafeez, et al.
IEEE Access (2024) Vol. 12, pp. 123401-123422
Open Access | Times Cited: 1
A multi-medical image encryption algorithm based on ROI and DNA coding
Lin Teng, Yang Liu, Yafei Wang
Physica Scripta (2024) Vol. 99, Iss. 11, pp. 115280-115280
Closed Access | Times Cited: 1
Lin Teng, Yang Liu, Yafei Wang
Physica Scripta (2024) Vol. 99, Iss. 11, pp. 115280-115280
Closed Access | Times Cited: 1
A fast color image encryption scheme based on the new chaotic structure and dynamic strong S-boxes
Mingjie Zhao, Yi‐Bo Luo, Zheng Yuan, et al.
Nonlinear Dynamics (2024)
Closed Access | Times Cited: 1
Mingjie Zhao, Yi‐Bo Luo, Zheng Yuan, et al.
Nonlinear Dynamics (2024)
Closed Access | Times Cited: 1
Novel chaotic image cryptosystem based on dynamic RNA and DNA computing
Shuang Zhou, Yi Wei, Shiyu Wang, et al.
Journal of Applied Physics (2024) Vol. 136, Iss. 18
Closed Access | Times Cited: 1
Shuang Zhou, Yi Wei, Shiyu Wang, et al.
Journal of Applied Physics (2024) Vol. 136, Iss. 18
Closed Access | Times Cited: 1
Generation of ideal chaotic sequences by reducing the dynamical degradation of digital chaotic maps
Shijie Zhang, Lingfeng Liu
Soft Computing (2023) Vol. 28, Iss. 5, pp. 4471-4487
Closed Access | Times Cited: 3
Shijie Zhang, Lingfeng Liu
Soft Computing (2023) Vol. 28, Iss. 5, pp. 4471-4487
Closed Access | Times Cited: 3
Multiple-image encryption algorithm based on the stereo Zigzag transformation
Xiaoqiang Zhang, Mi Liu
Multimedia Tools and Applications (2023) Vol. 83, Iss. 8, pp. 22701-22726
Closed Access | Times Cited: 3
Xiaoqiang Zhang, Mi Liu
Multimedia Tools and Applications (2023) Vol. 83, Iss. 8, pp. 22701-22726
Closed Access | Times Cited: 3
The Probabilistic Image Encryption Algorithm Based on Galois Field GF(257)
Yong Zhang, Ruiyou Li, Yuwen Shi, et al.
IETE Journal of Research (2023), pp. 1-14
Closed Access | Times Cited: 3
Yong Zhang, Ruiyou Li, Yuwen Shi, et al.
IETE Journal of Research (2023), pp. 1-14
Closed Access | Times Cited: 3
A Novel Image Cryptosystem Inspired by the Generation of Biological Protein Sequences
Mohammad Nassef, Monagi H. Alkinani, Ahmed Shafik
IEEE Access (2023) Vol. 11, pp. 29101-29115
Open Access | Times Cited: 2
Mohammad Nassef, Monagi H. Alkinani, Ahmed Shafik
IEEE Access (2023) Vol. 11, pp. 29101-29115
Open Access | Times Cited: 2
Application of high performance one-dimensional chaotic map in key expansion algorithm
Yuxuan Li
Research Square (Research Square) (2023)
Open Access | Times Cited: 2
Yuxuan Li
Research Square (Research Square) (2023)
Open Access | Times Cited: 2