
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A novel image encryption scheme based on Arnold cat map, Newton-Leipnik system and Logistic Gaussian map
Fawad Masood, Wadii Boulila, Abdullah Alsaeedi, et al.
Multimedia Tools and Applications (2022) Vol. 81, Iss. 21, pp. 30931-30959
Closed Access | Times Cited: 30
Fawad Masood, Wadii Boulila, Abdullah Alsaeedi, et al.
Multimedia Tools and Applications (2022) Vol. 81, Iss. 21, pp. 30931-30959
Closed Access | Times Cited: 30
Showing 1-25 of 30 citing articles:
An Efficient Semi-blind Watermarking Technique Based on ACM and DWT for Mitigating Integrity Attacks
Brahim Ferik, Lakhdar Laimeche, Abdallah Meraoumia, et al.
Arabian Journal for Science and Engineering (2025)
Closed Access | Times Cited: 1
Brahim Ferik, Lakhdar Laimeche, Abdallah Meraoumia, et al.
Arabian Journal for Science and Engineering (2025)
Closed Access | Times Cited: 1
A new RGB color image encryption scheme based on cross-channel pixel and bit scrambling using chaos
Mehmet Demirtaş
Optik (2022) Vol. 265, pp. 169430-169430
Closed Access | Times Cited: 44
Mehmet Demirtaş
Optik (2022) Vol. 265, pp. 169430-169430
Closed Access | Times Cited: 44
An image encryption algorithm based on multi-layered chaotic maps and its security analysis
Erdal Güvenoğlu
Connection Science (2024) Vol. 36, Iss. 1
Open Access | Times Cited: 11
Erdal Güvenoğlu
Connection Science (2024) Vol. 36, Iss. 1
Open Access | Times Cited: 11
A DNA Based Colour Image Encryption Scheme Using A Convolutional Autoencoder
Fawad Ahmed, Muneeb Ur Rehman, Jawad Ahmad, et al.
ACM Transactions on Multimedia Computing Communications and Applications (2022) Vol. 19, Iss. 3s, pp. 1-21
Open Access | Times Cited: 30
Fawad Ahmed, Muneeb Ur Rehman, Jawad Ahmad, et al.
ACM Transactions on Multimedia Computing Communications and Applications (2022) Vol. 19, Iss. 3s, pp. 1-21
Open Access | Times Cited: 30
Image Encryption Scheme Based on Orbital Shift Pixels Shuffling with ILM Chaotic System
Wajid Ali, Congxu Zhu, Rabia Latif, et al.
Entropy (2023) Vol. 25, Iss. 5, pp. 787-787
Open Access | Times Cited: 14
Wajid Ali, Congxu Zhu, Rabia Latif, et al.
Entropy (2023) Vol. 25, Iss. 5, pp. 787-787
Open Access | Times Cited: 14
Efficient and secure image encryption using key substitution process with discrete wavelet transform
Mujeeb Ur Rehman, Arslan Shafique, Kashif Hesham Khan, et al.
Journal of King Saud University - Computer and Information Sciences (2023) Vol. 35, Iss. 7, pp. 101613-101613
Open Access | Times Cited: 14
Mujeeb Ur Rehman, Arslan Shafique, Kashif Hesham Khan, et al.
Journal of King Saud University - Computer and Information Sciences (2023) Vol. 35, Iss. 7, pp. 101613-101613
Open Access | Times Cited: 14
An intelligent recommender system using machine learning association rules and rough set for disease prediction from incomplete symptom set
Kamakhya Narain Singh, Jibendu Kumar Mantri
Decision Analytics Journal (2024) Vol. 11, pp. 100468-100468
Open Access | Times Cited: 4
Kamakhya Narain Singh, Jibendu Kumar Mantri
Decision Analytics Journal (2024) Vol. 11, pp. 100468-100468
Open Access | Times Cited: 4
A Multilayer Encryption Scheme Using Vigenère Cipher and Chaotic Maps
Amit Paul, Rajwinder Singh, Deep Singh
SN Computer Science (2025) Vol. 6, Iss. 3
Closed Access
Amit Paul, Rajwinder Singh, Deep Singh
SN Computer Science (2025) Vol. 6, Iss. 3
Closed Access
Enhanced lightweight and compromised-resilient image encryption for resource constrained environments
Abid Mehmood, Abdul Nasir Khan, Iynkaran Natgunanathan, et al.
PLoS ONE (2025) Vol. 20, Iss. 3, pp. e0320046-e0320046
Open Access
Abid Mehmood, Abdul Nasir Khan, Iynkaran Natgunanathan, et al.
PLoS ONE (2025) Vol. 20, Iss. 3, pp. e0320046-e0320046
Open Access
An unrestricted Arnold’s cat map transformation
Mehmet Turan, Erhan Gökçay, Hakan Tora
Multimedia Tools and Applications (2024) Vol. 83, Iss. 28, pp. 70921-70935
Open Access | Times Cited: 3
Mehmet Turan, Erhan Gökçay, Hakan Tora
Multimedia Tools and Applications (2024) Vol. 83, Iss. 28, pp. 70921-70935
Open Access | Times Cited: 3
An efficient and compromise-resilient image encryption scheme for resource-constrained environments
Abdul Nasir Khan, Abid Mehmood, Muhammad Nasir Mumtaz Bhutta, et al.
PLoS ONE (2024) Vol. 19, Iss. 4, pp. e0297534-e0297534
Open Access | Times Cited: 3
Abdul Nasir Khan, Abid Mehmood, Muhammad Nasir Mumtaz Bhutta, et al.
PLoS ONE (2024) Vol. 19, Iss. 4, pp. e0297534-e0297534
Open Access | Times Cited: 3
An efficient chaos-based image encryption algorithm using real-time object detection for smart city applications
Kedar Nath Singh, Om Prakash Singh, Naman Baranwal, et al.
Sustainable Energy Technologies and Assessments (2022) Vol. 53, pp. 102566-102566
Closed Access | Times Cited: 14
Kedar Nath Singh, Om Prakash Singh, Naman Baranwal, et al.
Sustainable Energy Technologies and Assessments (2022) Vol. 53, pp. 102566-102566
Closed Access | Times Cited: 14
Extreme multistability and amplitude modulation in memristive chaotic system and application to image encryption
Minghong Qin, Qiang Lai
Optik (2022) Vol. 272, pp. 170407-170407
Closed Access | Times Cited: 13
Minghong Qin, Qiang Lai
Optik (2022) Vol. 272, pp. 170407-170407
Closed Access | Times Cited: 13
Optimization of Image Encryption Algorithm Based on Henon Mapping and Arnold Transformation of Chaotic Systems
Yuebo Wu, Shiwei Chu, Huifang Bao, et al.
IEEE Access (2024) Vol. 12, pp. 116905-116916
Open Access | Times Cited: 2
Yuebo Wu, Shiwei Chu, Huifang Bao, et al.
IEEE Access (2024) Vol. 12, pp. 116905-116916
Open Access | Times Cited: 2
A Novel Dynamic S-Box Generation Scheme Based on Quantum Random Walks Controlled by a Hyper-Chaotic Map
Lijun Zhang, Caochuan Ma, Yuxiang Zhao, et al.
Mathematics (2023) Vol. 12, Iss. 1, pp. 84-84
Open Access | Times Cited: 6
Lijun Zhang, Caochuan Ma, Yuxiang Zhao, et al.
Mathematics (2023) Vol. 12, Iss. 1, pp. 84-84
Open Access | Times Cited: 6
A comparative analysis of prognostic regression models and machine learning algorithms in surgical decision-making of cardial submucosal tumors
Zihan Geng, Yan Zhu, Pei‐Yao Fu, et al.
Gastroenterology & Endoscopy (2024) Vol. 2, Iss. 1, pp. 19-24
Open Access | Times Cited: 1
Zihan Geng, Yan Zhu, Pei‐Yao Fu, et al.
Gastroenterology & Endoscopy (2024) Vol. 2, Iss. 1, pp. 19-24
Open Access | Times Cited: 1
An efficient confidentiality scheme based on quadratic chaotic map and Fibonacci sequence
Majid Khan, Hafiz Muhammad Waseem
AIMS Mathematics (2024) Vol. 9, Iss. 10, pp. 27220-27246
Open Access | Times Cited: 1
Majid Khan, Hafiz Muhammad Waseem
AIMS Mathematics (2024) Vol. 9, Iss. 10, pp. 27220-27246
Open Access | Times Cited: 1
Provably secure color image encryption algorithm based on FO 4D-HCS and ACM
Saeed Ullah, Xinge Liu, Adil Waheed, et al.
Soft Computing (2024)
Closed Access | Times Cited: 1
Saeed Ullah, Xinge Liu, Adil Waheed, et al.
Soft Computing (2024)
Closed Access | Times Cited: 1
High-Quality Evaluation for Invisible Watermarking Based on Discrete Cosine Transform (DCT) and Singular Value Decomposition (SVD)
Ega Adiasa Sofyan, Christy Atika Sari, Eko Hari Rachmawanto, et al.
Advance Sustainable Science Engineering and Technology (2023) Vol. 6, Iss. 1, pp. 0240101-0240101
Open Access | Times Cited: 4
Ega Adiasa Sofyan, Christy Atika Sari, Eko Hari Rachmawanto, et al.
Advance Sustainable Science Engineering and Technology (2023) Vol. 6, Iss. 1, pp. 0240101-0240101
Open Access | Times Cited: 4
Efficient Entropic Security with Joint Compression and Encryption Approach Based on Compressed Sensing with Multiple Chaotic Systems
Jingya Wang, Xianhua Song, Ahmed A. Abd El‐Latif
Entropy (2022) Vol. 24, Iss. 7, pp. 885-885
Open Access | Times Cited: 7
Jingya Wang, Xianhua Song, Ahmed A. Abd El‐Latif
Entropy (2022) Vol. 24, Iss. 7, pp. 885-885
Open Access | Times Cited: 7
An effective embedding algorithm for blind image watermarking technique based on Hessenberg decomposition
Phuong Thi Nha, Ta Minh Thanh, Nguyen Tuan Phong
Applied Intelligence (2023) Vol. 53, Iss. 21, pp. 25467-25489
Closed Access | Times Cited: 3
Phuong Thi Nha, Ta Minh Thanh, Nguyen Tuan Phong
Applied Intelligence (2023) Vol. 53, Iss. 21, pp. 25467-25489
Closed Access | Times Cited: 3
Advanced integrated segmentation approach for semi-supervised infrared ship target identification
Ting Zhang, Guanlun Jiang, Zhaoying Liu, et al.
Alexandria Engineering Journal (2023) Vol. 87, pp. 17-30
Open Access | Times Cited: 3
Ting Zhang, Guanlun Jiang, Zhaoying Liu, et al.
Alexandria Engineering Journal (2023) Vol. 87, pp. 17-30
Open Access | Times Cited: 3
Chaotic CS Encryption: An Efficient Image Encryption Algorithm Based on Chebyshev Chaotic System and Compressive Sensing
Mingliang Sun, Jie Yuan, Xiaoyong Li, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 79, Iss. 2, pp. 2625-2646
Open Access
Mingliang Sun, Jie Yuan, Xiaoyong Li, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 79, Iss. 2, pp. 2625-2646
Open Access
Robust and Recovery Watermarking Approach Based on SVD and OTP Encryption
Muath AlShaikh
Journal of Signal Processing Systems (2024) Vol. 96, Iss. 6-7, pp. 385-399
Closed Access
Muath AlShaikh
Journal of Signal Processing Systems (2024) Vol. 96, Iss. 6-7, pp. 385-399
Closed Access
Multi-Objective Region Encryption Algorithm Based on Adaptive Mechanism
Juan Wang, Boyong Gao, Xingchuang Xiong, et al.
Electronics (2024) Vol. 13, Iss. 13, pp. 2463-2463
Open Access
Juan Wang, Boyong Gao, Xingchuang Xiong, et al.
Electronics (2024) Vol. 13, Iss. 13, pp. 2463-2463
Open Access