OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

An efficient general data hiding scheme based on image interpolation
Yongqing Chen, Wei-jiao Sun, Liyao Li, et al.
Journal of Information Security and Applications (2020) Vol. 54, pp. 102584-102584
Closed Access | Times Cited: 59

Showing 26-50 of 59 citing articles:

A novel data hiding by image interpolation using edge quad-tree block complexity
R. Roselinkiruba, T. Sree Sharmila
The Visual Computer (2021) Vol. 39, Iss. 1, pp. 59-72
Closed Access | Times Cited: 13

Interpolation-based reversible data hiding in the transform domain for fingerprint images
Mohamed Lamine Benseddik, Khalil Zebbiche, Mohamed Salah Azzaz, et al.
Multimedia Tools and Applications (2022) Vol. 81, Iss. 14, pp. 20329-20356
Closed Access | Times Cited: 9

Reversible data hiding scheme exploiting center folding with fuzzy weight strategy
Sharmistha Jana, Biswapati Jana, Tzu-Chuen Lu, et al.
Journal of Information Security and Applications (2022) Vol. 69, pp. 103276-103276
Closed Access | Times Cited: 6

A Large Payload Data Hiding Scheme Using Scalable Secret Reference Matrix
Jason Lin, Chia‐Wei Tsai, Chun‐Wei Yang, et al.
Symmetry (2022) Vol. 14, Iss. 4, pp. 828-828
Open Access | Times Cited: 5

Reversible data hiding scheme based on improved interpolation and three-in-one intelligent strategy
Hua Zhang, Huiying Sun, Fanli Meng
Journal of Information Security and Applications (2023) Vol. 77, pp. 103573-103573
Closed Access | Times Cited: 2

New Steganography Method of Reversible Data Hiding With Priority to Visual Quality of Image
Ababil Naghiyeva, Kamran Akbarzadeh, Sakit Verdiyev
(2021), pp. 329-333
Closed Access | Times Cited: 5

Adaptive Reversible Data Hiding Scheme Based on Difference Division Interpolation
Hua Zhang, Huiying Sun, Fanli Meng
(2024)
Closed Access

Data Hiding System Based on Variations in Image Interpolation Algorithms
Vijaya Lakshmi Adluri, Sai Akshith Guddeti, Preethi Kanagandula, et al.
Algorithms for intelligent systems (2024), pp. 51-60
Closed Access

Covert Communication for Dual Images with Two-Tier Bits Flipping
Shuying Xu, Jui‐Chuan Liu, Ching‐Chun Chang, et al.
Mathematics (2024) Vol. 12, Iss. 14, pp. 2219-2219
Open Access

Block-based optimization for enhancing reversible watermarking using reduce difference expansion
Aulia Arham, Hanung Adi Nugroho
Communications in Science and Technology (2024) Vol. 9, Iss. 1, pp. 57-64
Open Access

Secure Image Messaging Platform Utilizing Image Stenography and AES Encryption
Aaren Sherwin S, Immanuel Simeon E, Subasini C. A, et al.
Kalpa publications in computing (2024) Vol. 19, pp. 394-377
Open Access

RADH-A Reversible and Authenticable Data Hiding Scheme in Encrypted Domain Based on Image Interpolation and Substitution
Chia‐Chen Lin, R.-J. Chen, Wei‐Liang Tai, et al.
Applied Sciences (2024) Vol. 14, Iss. 23, pp. 11083-11083
Open Access

Reversible Data Hiding Algorithm in Encrypted Domain Based on Image Interpolation and Substitution
Chia‐Chen Lin, R.-J. Chen, Aristophane Nshimiyimana, et al.
(2024), pp. 102-109
Closed Access

Multiple Perspective of Multipredictor Mechanism and Multihistogram Modification for High-Fidelity Reversible Data Hiding
Kai Gao, Chin‐Chen Chang, Chia‐Chen Lin
Computer Systems Science and Engineering (2024) Vol. 48, Iss. 3, pp. 813-833
Open Access

Adaptive Reversible Data Hiding Scheme Based on Difference Division Interpolation
Hua Zhang, Huiying Sun, Fanli Meng
(2023)
Closed Access | Times Cited: 1

Interpolation based reversible hiding scheme by using center folding strategy and adjusting hiding operator
Thanh Nhân Vo, Tzu-Chuen Lu, Somya Agrawal, et al.
(2021), pp. 90-95
Closed Access | Times Cited: 2

Improved Lossless Data Hiding for JPEG Images Based on Optimized VLC Mapping
Yang Zheng, Junhui He
Security and Communication Networks (2022) Vol. 2022, pp. 1-15
Open Access | Times Cited: 1

Reversible steganographic method of hiding information based on image interpolation
Ababil Naghiyeva, Sakit Verdiyev
Computer Optics (2022) Vol. 46, Iss. 3
Open Access | Times Cited: 1

High Capacity Reversible Data Hiding Scheme based on Interpolation and Tetris Matrix
Fei-Fei Qian, Nuo Xu, Wanli Lyu
2022 41st Chinese Control Conference (CCC) (2022), pp. 7471-7478
Closed Access | Times Cited: 1

Scaling & fuzzing: Personal image privacy from automated attacks in mobile cloud computing
Shweta Saharan, Vijay Laxmi, Bruhadeshwar Bezawada, et al.
Journal of Information Security and Applications (2021) Vol. 60, pp. 102850-102850
Closed Access | Times Cited: 1

RESEARCH AND IMPLEMENTATION OF EMBEDDING HIDDEN INFORMATION IN IMAGES BASED ON INTERPOLATION
Э.Н. Дайырбаева, А.С. Еримбетова
XVIII Всероссийская научно-практическая конференция молодых ученых, аспирантов и студентов в г. Нерюнгри, с международным участием, посвященной 25-летию со дня образования Технического института (филиала) СВФУ (2023), pp. 45-48
Closed Access

Dynamic Information-Hiding Method with High Capacity Based on Image Interpolating and Bit Flipping
Cheng-Ta Huang, Cheng-Yi Lin, Chi-Yao Weng
Entropy (2023) Vol. 25, Iss. 5, pp. 744-744
Open Access

Visually meaningful image encryption combining with reversible data hiding in encrypted images
Zhaoyang Liu, Ru Xue
Physica Scripta (2023) Vol. 98, Iss. 6, pp. 065225-065225
Closed Access

Experimental study of a novel technique of data hiding with high PSNR
Sakit Verdiyev, Ababil Naghiyeva, Ajay Kumar
(2023), pp. 77-80
Closed Access

Scroll to top