
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Separable reversible data hiding in homomorphic encrypted domain using POB number system
Hua Ren, Shaozhang Niu
Multimedia Tools and Applications (2021) Vol. 81, Iss. 2, pp. 2161-2187
Closed Access | Times Cited: 12
Hua Ren, Shaozhang Niu
Multimedia Tools and Applications (2021) Vol. 81, Iss. 2, pp. 2161-2187
Closed Access | Times Cited: 12
Showing 12 citing articles:
Designing an Image Encryption Algorithm Based on Hyperchaotic System and DCT
Jiangjian Xu, Bing Zhao
International Journal of Bifurcation and Chaos (2023) Vol. 33, Iss. 02
Closed Access | Times Cited: 10
Jiangjian Xu, Bing Zhao
International Journal of Bifurcation and Chaos (2023) Vol. 33, Iss. 02
Closed Access | Times Cited: 10
Selective bin model for reversible data hiding in encrypted images
Ruchi Agarwal, Sara Ahmed, Manoj Kumar
Pattern Analysis and Applications (2024) Vol. 27, Iss. 1
Closed Access | Times Cited: 2
Ruchi Agarwal, Sara Ahmed, Manoj Kumar
Pattern Analysis and Applications (2024) Vol. 27, Iss. 1
Closed Access | Times Cited: 2
A novel reversible data hiding method in encrypted images using efficient parametric binary tree labeling
Hua Ren, Zhen Yue, Feng Gu, et al.
Knowledge-Based Systems (2024) Vol. 300, pp. 112198-112198
Closed Access | Times Cited: 2
Hua Ren, Zhen Yue, Feng Gu, et al.
Knowledge-Based Systems (2024) Vol. 300, pp. 112198-112198
Closed Access | Times Cited: 2
Reversible attack based on local visible adversarial perturbation
Li Chen, Shaowei Zhu, Abel Andrew, et al.
Multimedia Tools and Applications (2023) Vol. 83, Iss. 4, pp. 11215-11227
Closed Access | Times Cited: 5
Li Chen, Shaowei Zhu, Abel Andrew, et al.
Multimedia Tools and Applications (2023) Vol. 83, Iss. 4, pp. 11215-11227
Closed Access | Times Cited: 5
A Comprehensive Analysis Method for Reversible Data Hiding in Stream-Cipher-Encrypted Images
Mingji Yu, Heng Yao, Chuan Qin, et al.
IEEE Transactions on Circuits and Systems for Video Technology (2022) Vol. 32, Iss. 10, pp. 7241-7254
Closed Access | Times Cited: 6
Mingji Yu, Heng Yao, Chuan Qin, et al.
IEEE Transactions on Circuits and Systems for Video Technology (2022) Vol. 32, Iss. 10, pp. 7241-7254
Closed Access | Times Cited: 6
An Improved Certificateless Partial Blind Signature Scheme Based on Homomorphic Encryption
Pengfei Tan, Z. Qin, Wunan Wan, et al.
Communications in computer and information science (2022), pp. 207-221
Closed Access | Times Cited: 3
Pengfei Tan, Z. Qin, Wunan Wan, et al.
Communications in computer and information science (2022), pp. 207-221
Closed Access | Times Cited: 3
High-capacity medical information hiding scheme with P-tensor product secret image sharing for wireless body area networks
Lanlan Wang, Haipeng Peng, Lixiang Li, et al.
Digital Signal Processing (2024) Vol. 146, pp. 104365-104365
Closed Access
Lanlan Wang, Haipeng Peng, Lixiang Li, et al.
Digital Signal Processing (2024) Vol. 146, pp. 104365-104365
Closed Access
A multipermutation superposition coding-based fragile watermarking for probabilistic encryption
Jiang Li, Hao Zheng, Haoyuan Wang, et al.
Multimedia Tools and Applications (2022) Vol. 81, Iss. 21, pp. 30025-30048
Closed Access | Times Cited: 2
Jiang Li, Hao Zheng, Haoyuan Wang, et al.
Multimedia Tools and Applications (2022) Vol. 81, Iss. 21, pp. 30025-30048
Closed Access | Times Cited: 2
Reversible Data Hiding for JPEG Image Based on Paillier Encryption
Bin Ma, Baona Zhang, Chunpeng Wang, et al.
Communications in computer and information science (2022), pp. 473-486
Closed Access | Times Cited: 1
Bin Ma, Baona Zhang, Chunpeng Wang, et al.
Communications in computer and information science (2022), pp. 473-486
Closed Access | Times Cited: 1
An Anti-printing Scanning Watermarking Algorithm Based on Fusion Fonts
He Wang, Qiang Zuo, Xiaodong Cao, et al.
Communications in computer and information science (2022), pp. 450-463
Closed Access | Times Cited: 1
He Wang, Qiang Zuo, Xiaodong Cao, et al.
Communications in computer and information science (2022), pp. 450-463
Closed Access | Times Cited: 1
Detecting Double JPEG Compressed Color Images via an Improved Approach
Xiaojie Zhao, Xiankui Meng, Ruyong Ren, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2023) Vol. 75, Iss. 1, pp. 1765-1781
Open Access
Xiaojie Zhao, Xiankui Meng, Ruyong Ren, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2023) Vol. 75, Iss. 1, pp. 1765-1781
Open Access
Fidelity-Preserved Reversible Data Hiding in JPEG Images Based on Adaptive Position Selection
Zhen Yue, Hua Ren, Ming Li, et al.
Communications in computer and information science (2022), pp. 17-34
Closed Access
Zhen Yue, Hua Ren, Ming Li, et al.
Communications in computer and information science (2022), pp. 17-34
Closed Access