OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Multiple Robustness Enhancements for Image Adaptive Steganography in Lossy Channels
Yi Zhang, Xiangyang Luo, Yanqing Guo, et al.
IEEE Transactions on Circuits and Systems for Video Technology (2019) Vol. 30, Iss. 8, pp. 2750-2764
Closed Access | Times Cited: 69

Showing 26-50 of 69 citing articles:

Robust video steganography for social media sharing based on principal component analysis
Pingan Fan, Hong Zhang, Xianfeng Zhao
EURASIP Journal on Information Security (2022) Vol. 2022, Iss. 1
Open Access | Times Cited: 13

Double-Layered Dual-Syndrome Trellis Codes Utilizing Channel Knowledge for Robust Steganography
Qingxiao Guan, Peng Liu, Weiming Zhang, et al.
IEEE Transactions on Information Forensics and Security (2022) Vol. 18, pp. 501-516
Closed Access | Times Cited: 13

Robust Image Steganography: Hiding Messages in Frequency Coefficients
Yuhang Lan, Fei Shang, Jianhua Yang, et al.
Proceedings of the AAAI Conference on Artificial Intelligence (2023) Vol. 37, Iss. 12, pp. 14955-14963
Open Access | Times Cited: 7

AFcIHNet: Attention feature-constrained network for single image information hiding
Xingwang Jia, Huamei Xin, Lingchen Gu, et al.
Engineering Applications of Artificial Intelligence (2023) Vol. 126, pp. 107105-107105
Closed Access | Times Cited: 7

Robust image hiding network with Frequency and Spatial Attentions
Xiaobin Zeng, Bingwen Feng, Zhihua Xia, et al.
Pattern Recognition (2024) Vol. 155, pp. 110691-110691
Closed Access | Times Cited: 2

Large capacity generative image steganography via image style transfer and feature-wise deep fusion
Youqiang Sun, Jianyi Liu, Ru Zhang
Applied Intelligence (2023) Vol. 53, Iss. 23, pp. 28675-28693
Closed Access | Times Cited: 6

Inverse Interpolation and Its Application in Robust Image Steganography
Liyan Zhu, Xiangyang Luo, Yi Zhang, et al.
IEEE Transactions on Circuits and Systems for Video Technology (2021) Vol. 32, Iss. 6, pp. 4052-4064
Closed Access | Times Cited: 15

Toward Steganographic Payload Location via Neighboring Weight Algorithm
Tong Qiao, Xiangyang Luo, Binmin Pan, et al.
Security and Communication Networks (2022) Vol. 2022, pp. 1-17
Open Access | Times Cited: 9

Detecting Steganography in JPEG Images Recompressed With the Same Quantization Matrix
Qingxiao Guan, Kaimeng Chen, Hefeng Chen, et al.
IEEE Transactions on Circuits and Systems for Video Technology (2022) Vol. 32, Iss. 9, pp. 6002-6016
Closed Access | Times Cited: 9

Robust JPEG steganography based on DCT and SVD in nonsubsampled shearlet transform domain
Xiaofeng Song, Chunfang Yang, Kun Han, et al.
Multimedia Tools and Applications (2022) Vol. 81, Iss. 25, pp. 36453-36472
Closed Access | Times Cited: 9

Improved JPEG Phase-Aware Steganalysis Features Using Multiple Filter Sizes and Difference Images
Chao Xia, Qingxiao Guan, Xianfeng Zhao, et al.
IEEE Transactions on Circuits and Systems for Video Technology (2019) Vol. 30, Iss. 11, pp. 4100-4113
Closed Access | Times Cited: 15

Integer wavelet transform based high performance secure steganography scheme QVD-LSB
Pratap Chandra Mandal, Imon Mukherjee, Β.N. Chatterji
Multimedia Tools and Applications (2024) Vol. 83, Iss. 23, pp. 62651-62675
Closed Access | Times Cited: 1

Diverse Batch Steganography using Model-based Selection and Double-layered Payload Assignment
Jiang Yu, Fengyong Li, Zichi Wang, et al.
IEEE Transactions on Circuits and Systems for Video Technology (2024) Vol. 34, Iss. 8, pp. 7785-7800
Closed Access | Times Cited: 1

A Novel XOR-Based Threshold Visual Cryptography with Adjustable Pixel Expansion
Yusheng Guo, Xingxing Jia, Qimeng Chu, et al.
Applied Sciences (2020) Vol. 10, Iss. 4, pp. 1321-1321
Open Access | Times Cited: 11

Novel Hidden Bit Location Method towards JPEG Steganography
Binmin Pan, Tong Qiao, Jiaming Li, et al.
Security and Communication Networks (2022) Vol. 2022, pp. 1-13
Open Access | Times Cited: 6

Invisible and Steganalysis-resistant Deep Image Hiding Based on One-way Adversarial Invertible Networks
Xinjue Hu, Zhangjie Fu, Xiang Zhang, et al.
IEEE Transactions on Circuits and Systems for Video Technology (2023) Vol. 34, Iss. 7, pp. 6128-6143
Closed Access | Times Cited: 3

On the Sharing-Based Model of Steganography
Xianfeng Zhao, Chunfang Yang, Fenlin Liu
Lecture notes in computer science (2021), pp. 94-105
Closed Access | Times Cited: 7

Improving Multi-Histogram-Based Reversible Watermarking Using Optimized Features and Adaptive Clustering Number
Weili Wang, Chuntao Wang, Junxiang Wang, et al.
IEEE Access (2020) Vol. 8, pp. 134334-134350
Open Access | Times Cited: 6

Stego key recovery method for F5 steganography with matrix encoding
Jiufen Liu, Chunfang Yang, Junchao Wang, et al.
EURASIP Journal on Image and Video Processing (2020) Vol. 2020, Iss. 1
Open Access | Times Cited: 6

Learning attention for object tracking with adversarial learning network
Xu Cheng, Chen Song, Yongxiang Gu, et al.
EURASIP Journal on Image and Video Processing (2020) Vol. 2020, Iss. 1
Open Access | Times Cited: 6

Extracting embedded messages using adaptive steganography based on optimal syndrome-trellis decoding paths
Jialin Li, Xiangyang Luo, Yi Zhang, et al.
Digital Communications and Networks (2021) Vol. 8, Iss. 4, pp. 455-465
Open Access | Times Cited: 6

Optical steganography with sign-based keys and video as vessel medium
He Yin, Xi Zhou, Nian Xin, et al.
Optics Communications (2022) Vol. 526, pp. 128829-128829
Open Access | Times Cited: 4

Robust Image Steganography Against General Downsampling Operations With Lossless Secret Recovery
Sheng Li, Zichi Wang, Xiudong Zhang, et al.
IEEE Transactions on Dependable and Secure Computing (2023) Vol. 21, Iss. 1, pp. 340-352
Closed Access | Times Cited: 2

Image steganalysis feature selection based on the improved Fisher criterion
Yuanyuan Ma, Jinwei Wang, Xiangyang Luo, et al.
Mathematical Biosciences & Engineering (2019) Vol. 17, Iss. 2, pp. 1355-1371
Open Access | Times Cited: 4

A Robust Color Image Watermarking Scheme in the Fusion Domain Based on Lu Factorization
Qingtang Su, Yehan Sun, Yu Xia, et al.
(2024)
Closed Access

Scroll to top