
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Improved Chaos-Based Cryptosystem for Medical Image Encryption and Decryption
Mohamed Gafsi, Nessrine Abbassi, Mohamed Ali Hajjaji, et al.
Scientific Programming (2020) Vol. 2020, pp. 1-22
Open Access | Times Cited: 56
Mohamed Gafsi, Nessrine Abbassi, Mohamed Ali Hajjaji, et al.
Scientific Programming (2020) Vol. 2020, pp. 1-22
Open Access | Times Cited: 56
Showing 26-50 of 56 citing articles:
Crypto-Watermarking Algorithm Using Weber’s Law and AES: A View to Transfer Safe Medical Image
Sondes Ajili, Mohamed Ali Hajjaji, Abdellatif Mtibaa
Scientific Programming (2021) Vol. 2021, pp. 1-22
Open Access | Times Cited: 10
Sondes Ajili, Mohamed Ali Hajjaji, Abdellatif Mtibaa
Scientific Programming (2021) Vol. 2021, pp. 1-22
Open Access | Times Cited: 10
Hardware implementation of a strong pseudorandom number generator based block‐cipher system for color image encryption and decryption
Mohamed Gafsi, Rim Amdouni, Mohamed Ali Hajjaji, et al.
International Journal of Circuit Theory and Applications (2022) Vol. 51, Iss. 1, pp. 410-436
Closed Access | Times Cited: 7
Mohamed Gafsi, Rim Amdouni, Mohamed Ali Hajjaji, et al.
International Journal of Circuit Theory and Applications (2022) Vol. 51, Iss. 1, pp. 410-436
Closed Access | Times Cited: 7
Rating of Modern Color Image Cryptography: A Next-Generation Computing Perspective
Muhammad Sami Ullah, Waqar Aslam, Muhammad Asghar Khan, et al.
Wireless Communications and Mobile Computing (2022) Vol. 2022, pp. 1-20
Open Access | Times Cited: 6
Muhammad Sami Ullah, Waqar Aslam, Muhammad Asghar Khan, et al.
Wireless Communications and Mobile Computing (2022) Vol. 2022, pp. 1-20
Open Access | Times Cited: 6
Improved chaos‐RSA‐based hybrid cryptosystem for image encryption and authentication
Mohamed Gafsi, Rim Amdouni, Mohamed Ali Hajjaji, et al.
Concurrency and Computation Practice and Experience (2022) Vol. 34, Iss. 23
Closed Access | Times Cited: 5
Mohamed Gafsi, Rim Amdouni, Mohamed Ali Hajjaji, et al.
Concurrency and Computation Practice and Experience (2022) Vol. 34, Iss. 23
Closed Access | Times Cited: 5
Hardware implementation of a strong pseudo-random numbers generator with an application to image encryption
Mohamed Gafsi, Nessrine Abbassi, Rim Amdouni, et al.
(2022)
Closed Access | Times Cited: 5
Mohamed Gafsi, Nessrine Abbassi, Rim Amdouni, et al.
(2022)
Closed Access | Times Cited: 5
A New Medical Image Encryption Algorithm for IoMT Applications
Renjith V. Ravi, S. B. Goyal, Chawki Djeddi
Communications in computer and information science (2022), pp. 145-157
Closed Access | Times Cited: 4
Renjith V. Ravi, S. B. Goyal, Chawki Djeddi
Communications in computer and information science (2022), pp. 145-157
Closed Access | Times Cited: 4
Advanced 5D logistic and DNA encoding for medical images
Bharti Ahuja, Rajesh Doriya, Sharad Salunke, et al.
The Imaging Science Journal (2023) Vol. 71, Iss. 2, pp. 142-160
Open Access | Times Cited: 2
Bharti Ahuja, Rajesh Doriya, Sharad Salunke, et al.
The Imaging Science Journal (2023) Vol. 71, Iss. 2, pp. 142-160
Open Access | Times Cited: 2
Securing High-Resolution Images From Unmanned Aerial Vehicles With DNA Encoding and Bit-Plane Extraction Method
Arslan Shafique, Mujeeb Ur Rehman, Kashif Hesham Khan, et al.
IEEE Access (2023) Vol. 11, pp. 44559-44577
Open Access | Times Cited: 2
Arslan Shafique, Mujeeb Ur Rehman, Kashif Hesham Khan, et al.
IEEE Access (2023) Vol. 11, pp. 44559-44577
Open Access | Times Cited: 2
A Novel Medical Image Encryption Using R鰏sler System
K. Sundara Krishnan, S. Suhaila, S. P. Raja
Intelligent Automation & Soft Computing (2022) Vol. 33, Iss. 2, pp. 1081-1101
Open Access | Times Cited: 3
K. Sundara Krishnan, S. Suhaila, S. P. Raja
Intelligent Automation & Soft Computing (2022) Vol. 33, Iss. 2, pp. 1081-1101
Open Access | Times Cited: 3
Key-Independent Image Encryption using DNA Encoding and Chaotic Dynamics
V Maharaja Vannia Moorthi, Megha R Krishna, Gopika Anil Kumar, et al.
(2024)
Closed Access
V Maharaja Vannia Moorthi, Megha R Krishna, Gopika Anil Kumar, et al.
(2024)
Closed Access
Secure Transmission of Medical Images using Improved Hybrid Cryptosystem: Authentication, Confidentiality and Integrity
Amal Hafsa, Jihene Malek, Mohsen Machhout
(2021), pp. 262-269
Closed Access | Times Cited: 4
Amal Hafsa, Jihene Malek, Mohsen Machhout
(2021), pp. 262-269
Closed Access | Times Cited: 4
Cloud Computing Storage Data Access Control Method Based on Dynamic Re-Encryption
Xiaodan Chen, Desheng Zeng, Shuanglong Pang, et al.
Security and Communication Networks (2021) Vol. 2021, pp. 1-10
Open Access | Times Cited: 4
Xiaodan Chen, Desheng Zeng, Shuanglong Pang, et al.
Security and Communication Networks (2021) Vol. 2021, pp. 1-10
Open Access | Times Cited: 4
Secure Medical Image Transmission Using 2‐D Tent Cascade Logistic Map
L. R. Jonisha Miriam, A. Lenin Fred, S. N. Kumar, et al.
(2024), pp. 133-147
Closed Access
L. R. Jonisha Miriam, A. Lenin Fred, S. N. Kumar, et al.
(2024), pp. 133-147
Closed Access
An efficient secure cryptosystem using improved identity based encryption with multimodal biometric authentication and authorization in cloud environments
R. Megiba Jasmine, J. Jasper, M. R. Geetha
Wireless Networks (2024)
Closed Access
R. Megiba Jasmine, J. Jasper, M. R. Geetha
Wireless Networks (2024)
Closed Access
A software model to generate permutation keys through a square matrix
Emil Faure, Anatoly Shcherba, Artem Skutskyi, et al.
Вісник Черкаського державного технологічного університету (2024) Vol. 29, Iss. 2, pp. 10-23
Open Access
Emil Faure, Anatoly Shcherba, Artem Skutskyi, et al.
Вісник Черкаського державного технологічного університету (2024) Vol. 29, Iss. 2, pp. 10-23
Open Access
A New Data Coding Algorithm for Secure Communication of Image
Hidayet Oğraş
Chaos Theory and Applications (2024)
Open Access
Hidayet Oğraş
Chaos Theory and Applications (2024)
Open Access
Chaotic Encryption Algorithm Based on Gingerbreadman Map with Adaptive Symmetry
Petr Fedoseev, Dmitriy O. Pesterev, Vitalii Rozhkov, et al.
Chaos Theory and Applications (2024) Vol. 7, Iss. 1, pp. 31-41
Open Access
Petr Fedoseev, Dmitriy O. Pesterev, Vitalii Rozhkov, et al.
Chaos Theory and Applications (2024) Vol. 7, Iss. 1, pp. 31-41
Open Access
Medical Image Transmission Using a Secure Cryptographic Approach for IoMT Applications
Renjith V. Ravi, S. B. Goyal, Chawki Djeddi, et al.
Lecture notes in networks and systems (2023), pp. 27-38
Closed Access | Times Cited: 1
Renjith V. Ravi, S. B. Goyal, Chawki Djeddi, et al.
Lecture notes in networks and systems (2023), pp. 27-38
Closed Access | Times Cited: 1
Medical Image Encryption Method Using Cubic-Sin-Logistic-Tent Chaotic Pseudo-Random Number Sequence-Based Substitution
Subhajit Adhikari, Sunil Karforma
SN Computer Science (2023) Vol. 4, Iss. 4
Closed Access | Times Cited: 1
Subhajit Adhikari, Sunil Karforma
SN Computer Science (2023) Vol. 4, Iss. 4
Closed Access | Times Cited: 1
Adaptive Chaotic Maps in Cryptography Applications
Александра Тутуева, Erivelton G. Nepomuceno, Lazaros Moysis, et al.
Studies in big data (2022), pp. 193-205
Closed Access | Times Cited: 2
Александра Тутуева, Erivelton G. Nepomuceno, Lazaros Moysis, et al.
Studies in big data (2022), pp. 193-205
Closed Access | Times Cited: 2
Enhanced Fractional Order Lorenz System for Medical Image Encryption in Cloud-Based Healthcare Administration
P. Suhasini, S. Kanchana
International Journal of Computer Networks And Applications (2022) Vol. 9, Iss. 4, pp. 424-424
Open Access | Times Cited: 2
P. Suhasini, S. Kanchana
International Journal of Computer Networks And Applications (2022) Vol. 9, Iss. 4, pp. 424-424
Open Access | Times Cited: 2
Medical image cryptosystem using improved Quadratic Congruential Generator and logistic map
M. Y. Mohamed Parvees, T. Vijayakumar
Measurement Sensors (2022) Vol. 24, pp. 100502-100502
Closed Access | Times Cited: 2
M. Y. Mohamed Parvees, T. Vijayakumar
Measurement Sensors (2022) Vol. 24, pp. 100502-100502
Closed Access | Times Cited: 2
Biomedical Image Security Based on 2D and 3D Chaotic Systems
Nitin S. Goje, Renjith V. Ravi, Debasis Das, et al.
2022 3rd International Conference on Electronics and Sustainable Communication Systems (ICESC) (2022), pp. 28-34
Closed Access | Times Cited: 1
Nitin S. Goje, Renjith V. Ravi, Debasis Das, et al.
2022 3rd International Conference on Electronics and Sustainable Communication Systems (ICESC) (2022), pp. 28-34
Closed Access | Times Cited: 1
Double Encryption Algorithm for Massive Personal Biometric Authentication Images Based on Chaotic Mapping for Future Smart Cities
Lei Ma, Mingfei Qu, Pengfei He
Journal of Testing and Evaluation (2022) Vol. 51, Iss. 3, pp. 1447-1460
Closed Access | Times Cited: 1
Lei Ma, Mingfei Qu, Pengfei He
Journal of Testing and Evaluation (2022) Vol. 51, Iss. 3, pp. 1447-1460
Closed Access | Times Cited: 1
Adaptive Control of Chaotic Signals: Investigated by Simulation Software and Real Electronic Circuits
Cheng‐Hsiung Yang, Che‐Lun Chang, Shih-Yu Li
Actuators (2021) Vol. 10, Iss. 11, pp. 284-284
Open Access | Times Cited: 1
Cheng‐Hsiung Yang, Che‐Lun Chang, Shih-Yu Li
Actuators (2021) Vol. 10, Iss. 11, pp. 284-284
Open Access | Times Cited: 1