
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Security analysis of a chaos triggered image encryption scheme
Yong Zhang
Multimedia Tools and Applications (2019) Vol. 78, Iss. 22, pp. 31303-31318
Closed Access | Times Cited: 8
Yong Zhang
Multimedia Tools and Applications (2019) Vol. 78, Iss. 22, pp. 31303-31318
Closed Access | Times Cited: 8
Showing 8 citing articles:
Neural-assisted image-dependent encryption scheme for medical image cloud storage
C. Lakshmi, K. Thenmozhi, John Bosco Balaguru Rayappan, et al.
Neural Computing and Applications (2020) Vol. 33, Iss. 12, pp. 6671-6684
Closed Access | Times Cited: 48
C. Lakshmi, K. Thenmozhi, John Bosco Balaguru Rayappan, et al.
Neural Computing and Applications (2020) Vol. 33, Iss. 12, pp. 6671-6684
Closed Access | Times Cited: 48
An Efficient Lightweight Cryptographic Instructions Set Extension for IoT Device Security
Wajih El Hadj Youssef, Ali Abdelli, Fethi Dridi, et al.
Security and Communication Networks (2022) Vol. 2022, pp. 1-17
Open Access | Times Cited: 16
Wajih El Hadj Youssef, Ali Abdelli, Fethi Dridi, et al.
Security and Communication Networks (2022) Vol. 2022, pp. 1-17
Open Access | Times Cited: 16
Cryptanalysis of substitution-permutation network based image encryption schemes: a systematic review
Sakshi Dhall, Khushboo Yadav
Nonlinear Dynamics (2024) Vol. 112, Iss. 17, pp. 14719-14744
Closed Access | Times Cited: 2
Sakshi Dhall, Khushboo Yadav
Nonlinear Dynamics (2024) Vol. 112, Iss. 17, pp. 14719-14744
Closed Access | Times Cited: 2
Joint Optimization–Encryption Model Based on Auto Encoder Neural Network, Variable-Length Dynamic S-Box and New Stream Encryption
Anqi Hu, Xiaoxue Gong, Lei Guo
International Journal of Bifurcation and Chaos (2022) Vol. 32, Iss. 14
Open Access | Times Cited: 4
Anqi Hu, Xiaoxue Gong, Lei Guo
International Journal of Bifurcation and Chaos (2022) Vol. 32, Iss. 14
Open Access | Times Cited: 4
Breaking an image encryption scheme based on Arnold map and Lucas series
Imad El Hanouti, Hakim El Fadili, Khalid Zenkouar
Multimedia Tools and Applications (2020) Vol. 80, Iss. 4, pp. 4975-4997
Closed Access | Times Cited: 5
Imad El Hanouti, Hakim El Fadili, Khalid Zenkouar
Multimedia Tools and Applications (2020) Vol. 80, Iss. 4, pp. 4975-4997
Closed Access | Times Cited: 5
Implementation of Image Encryption based on Chaos-IWT– An Image security
Aashiq Banu S, Noorul Nilofer A., M. Harini, et al.
2022 International Conference on Computer Communication and Informatics (ICCCI) (2020), pp. 1-4
Closed Access | Times Cited: 5
Aashiq Banu S, Noorul Nilofer A., M. Harini, et al.
2022 International Conference on Computer Communication and Informatics (ICCCI) (2020), pp. 1-4
Closed Access | Times Cited: 5
Perspective Chapter: Lightweight Ciphers for IoT Data Protection
Wajih El Hadj Youssef, Ali Abdelli, Lazhar Khriji, et al.
IntechOpen eBooks (2024)
Open Access
Wajih El Hadj Youssef, Ali Abdelli, Lazhar Khriji, et al.
IntechOpen eBooks (2024)
Open Access
Robust Image Encryption in Transform Domain Using Duo Chaotic Maps—A Secure Communication
S. Aashiq Banu, M. S. Sucharita, Y. Leela Soundarya, et al.
Lecture notes on data engineering and communications technologies (2020), pp. 271-281
Closed Access | Times Cited: 1
S. Aashiq Banu, M. S. Sucharita, Y. Leela Soundarya, et al.
Lecture notes on data engineering and communications technologies (2020), pp. 271-281
Closed Access | Times Cited: 1