
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Improving grayscale steganography to protect personal information disclosure within hotel services
Aditya Kumar Sahu, Adnan Gutub
Multimedia Tools and Applications (2022) Vol. 81, Iss. 21, pp. 30663-30683
Closed Access | Times Cited: 44
Aditya Kumar Sahu, Adnan Gutub
Multimedia Tools and Applications (2022) Vol. 81, Iss. 21, pp. 30663-30683
Closed Access | Times Cited: 44
Showing 1-25 of 44 citing articles:
Digital image steganography survey and investigation (goal, assessment, method, development, and dataset)
De Rosal Ignatius Moses Setiadi, Supriadi Rustad, Pulung Nurtantio Andono, et al.
Signal Processing (2022) Vol. 206, pp. 108908-108908
Closed Access | Times Cited: 83
De Rosal Ignatius Moses Setiadi, Supriadi Rustad, Pulung Nurtantio Andono, et al.
Signal Processing (2022) Vol. 206, pp. 108908-108908
Closed Access | Times Cited: 83
Analysis of community question‐answering issues via machine learning and deep learning: State‐of‐the‐art review
Pradeep Kumar Roy, Sunil Saumya, Jyoti Prakash Singh, et al.
CAAI Transactions on Intelligence Technology (2022) Vol. 8, Iss. 1, pp. 95-117
Open Access | Times Cited: 71
Pradeep Kumar Roy, Sunil Saumya, Jyoti Prakash Singh, et al.
CAAI Transactions on Intelligence Technology (2022) Vol. 8, Iss. 1, pp. 95-117
Open Access | Times Cited: 71
Students’ adoption towards behavioral intention of digital learning platform
Noawanit Songkram, Suparoek Chootongchai, Hathaiphat Osuwan, et al.
Education and Information Technologies (2023) Vol. 28, Iss. 9, pp. 11655-11677
Open Access | Times Cited: 48
Noawanit Songkram, Suparoek Chootongchai, Hathaiphat Osuwan, et al.
Education and Information Technologies (2023) Vol. 28, Iss. 9, pp. 11655-11677
Open Access | Times Cited: 48
Secure Reversible Data Hiding Using Block-Wise Histogram Shifting
Samar Kamil Khudhair, Monalisa Sahu, K. R. Raghunandan, et al.
Electronics (2023) Vol. 12, Iss. 5, pp. 1222-1222
Open Access | Times Cited: 43
Samar Kamil Khudhair, Monalisa Sahu, K. R. Raghunandan, et al.
Electronics (2023) Vol. 12, Iss. 5, pp. 1222-1222
Open Access | Times Cited: 43
The Cybersecurity Applied by Online Travel Agencies and Hotels to Protect Users’ Private Data in Smart Cities
Lázaro Florido-Benítez
Smart Cities (2024) Vol. 7, Iss. 1, pp. 475-495
Open Access | Times Cited: 17
Lázaro Florido-Benítez
Smart Cities (2024) Vol. 7, Iss. 1, pp. 475-495
Open Access | Times Cited: 17
Towards improving the performance of blind image steganalyzer using third-order SPAM features and ensemble classifier
J. Hemalatha, M. Sekar, Chandan Kumar, et al.
Journal of Information Security and Applications (2023) Vol. 76, pp. 103541-103541
Closed Access | Times Cited: 33
J. Hemalatha, M. Sekar, Chandan Kumar, et al.
Journal of Information Security and Applications (2023) Vol. 76, pp. 103541-103541
Closed Access | Times Cited: 33
A Study on Content Tampering in Multimedia Watermarking
Aditya Kumar Sahu, Krishnan Umachandran, Vaishali D. Biradar, et al.
SN Computer Science (2023) Vol. 4, Iss. 3
Closed Access | Times Cited: 25
Aditya Kumar Sahu, Krishnan Umachandran, Vaishali D. Biradar, et al.
SN Computer Science (2023) Vol. 4, Iss. 3
Closed Access | Times Cited: 25
Reversible data hiding based on prediction-error value ordering and multiple-embedding
Wenfa Qi, Tong Zhang, Xiaolong Li, et al.
Signal Processing (2023) Vol. 207, pp. 108956-108956
Closed Access | Times Cited: 16
Wenfa Qi, Tong Zhang, Xiaolong Li, et al.
Signal Processing (2023) Vol. 207, pp. 108956-108956
Closed Access | Times Cited: 16
Offline Efficient Signature Authentication Using Octave Convolution Neural Network
Adnan Gutub, Sahar Altalhi, Budur Ghazwani
Arabian Journal for Science and Engineering (2025)
Closed Access
Adnan Gutub, Sahar Altalhi, Budur Ghazwani
Arabian Journal for Science and Engineering (2025)
Closed Access
FuzConvSteganalysis: Steganalysis via fuzzy logic and convolutional neural network
Ntivuguruzwa Jean De La Croix, Tohari Ahmad
SoftwareX (2024) Vol. 26, pp. 101713-101713
Open Access | Times Cited: 5
Ntivuguruzwa Jean De La Croix, Tohari Ahmad
SoftwareX (2024) Vol. 26, pp. 101713-101713
Open Access | Times Cited: 5
A novel and efficient digital image steganography technique using least significant bit substitution
Shahid Rahman, Jamal Uddin, Hameed Hussain, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Shahid Rahman, Jamal Uddin, Hameed Hussain, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Duple Color Image Encryption System Based on 3-D Nonequilateral Arnold Transform for IIoT
Huiqing Huang, Zhanchuan Cai
IEEE Transactions on Industrial Informatics (2022) Vol. 19, Iss. 7, pp. 8285-8294
Closed Access | Times Cited: 20
Huiqing Huang, Zhanchuan Cai
IEEE Transactions on Industrial Informatics (2022) Vol. 19, Iss. 7, pp. 8285-8294
Closed Access | Times Cited: 20
Dynamic smart random preference for higher medical image confidentiality
Adnan Gutub
Journal of Engineering Research (2022)
Open Access | Times Cited: 19
Adnan Gutub
Journal of Engineering Research (2022)
Open Access | Times Cited: 19
Is blind image steganalysis practical using feature-based classification?
Ahd Aljarf, Haneen Zamzami, Adnan Gutub
Multimedia Tools and Applications (2023) Vol. 83, Iss. 2, pp. 4579-4612
Closed Access | Times Cited: 11
Ahd Aljarf, Haneen Zamzami, Adnan Gutub
Multimedia Tools and Applications (2023) Vol. 83, Iss. 2, pp. 4579-4612
Closed Access | Times Cited: 11
Regulating Kashida Arabic steganography to improve security and capacity performance
Adnan Gutub
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 3
Adnan Gutub
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 3
Improving the robustness of steganalysis in the adversarial environment with Generative Adversarial Network
Peng Ye, Qi Yu, Guobin Fu, et al.
Journal of Information Security and Applications (2024) Vol. 82, pp. 103743-103743
Closed Access | Times Cited: 2
Peng Ye, Qi Yu, Guobin Fu, et al.
Journal of Information Security and Applications (2024) Vol. 82, pp. 103743-103743
Closed Access | Times Cited: 2
A Blind Digital Watermarking Approach Using Palmprint-Embedded Local Binary Patterns and Arnold Cat Map Transformations
Brahim Ferik, Lakhdar Laimeche, Abdallah Meraoumia, et al.
(2024) Vol. 4, pp. 1-8
Closed Access | Times Cited: 2
Brahim Ferik, Lakhdar Laimeche, Abdallah Meraoumia, et al.
(2024) Vol. 4, pp. 1-8
Closed Access | Times Cited: 2
Cybersecurity Risks Analysis in the Hospitality Industry: A Stakeholder Perspective on Sustainable Service Systems
Saliha Karadayı-Usta
Systems (2024) Vol. 12, Iss. 10, pp. 397-397
Open Access | Times Cited: 2
Saliha Karadayı-Usta
Systems (2024) Vol. 12, Iss. 10, pp. 397-397
Open Access | Times Cited: 2
Steganography in IoT: Information Hiding with Joystick and Touch Sensors
Katarzyna Koptyra, Marek R. Ogiela
Sensors (2023) Vol. 23, Iss. 6, pp. 3288-3288
Open Access | Times Cited: 6
Katarzyna Koptyra, Marek R. Ogiela
Sensors (2023) Vol. 23, Iss. 6, pp. 3288-3288
Open Access | Times Cited: 6
Randomly-based Stepwise Multi-Level Distributed Medical Image Steganography
Asmaa Munshi
Engineering Technology & Applied Science Research (2023) Vol. 13, Iss. 3, pp. 10922-10930
Open Access | Times Cited: 6
Asmaa Munshi
Engineering Technology & Applied Science Research (2023) Vol. 13, Iss. 3, pp. 10922-10930
Open Access | Times Cited: 6
Fuzzy logic approach in salt and pepper noise
M. Ganjeh-Alamdari, R. Alikhani, Irina Perfilieva
Computers & Electrical Engineering (2022) Vol. 102, pp. 108264-108264
Closed Access | Times Cited: 10
M. Ganjeh-Alamdari, R. Alikhani, Irina Perfilieva
Computers & Electrical Engineering (2022) Vol. 102, pp. 108264-108264
Closed Access | Times Cited: 10
Advancing Partial Verification of Watermarking for Arabic Text via Utilization of Innovative Counting-Based Secret Sharing
Adnan Gutub, Esraa Almehmadi
Arabian Journal for Science and Engineering (2022) Vol. 48, Iss. 8, pp. 9963-9989
Closed Access | Times Cited: 9
Adnan Gutub, Esraa Almehmadi
Arabian Journal for Science and Engineering (2022) Vol. 48, Iss. 8, pp. 9963-9989
Closed Access | Times Cited: 9
Upgrading script watermarking robustness of unusual-to-tolerate functional confirmation by secret-sharing
Adnan Gutub, Esraa Almehmadi
Journal of Engineering Research (2023) Vol. 11, Iss. 4, pp. 392-403
Open Access | Times Cited: 5
Adnan Gutub, Esraa Almehmadi
Journal of Engineering Research (2023) Vol. 11, Iss. 4, pp. 392-403
Open Access | Times Cited: 5
Low distortion and adaptive image steganography by enhancing DBSCAN, Sobel operator, and XOR coding
Aref Rezaei, Yasaman Ahmadiadli, Leili Farzinvash, et al.
Journal of Information Security and Applications (2022) Vol. 70, pp. 103343-103343
Closed Access | Times Cited: 8
Aref Rezaei, Yasaman Ahmadiadli, Leili Farzinvash, et al.
Journal of Information Security and Applications (2022) Vol. 70, pp. 103343-103343
Closed Access | Times Cited: 8
A recent approach based on inspired crows behavior in steganography
Taha E. Rashad, Soheir M. Khamis, Hatem M. Bahig, et al.
Evolutionary Intelligence (2024) Vol. 17, Iss. 4, pp. 2617-2636
Closed Access | Times Cited: 1
Taha E. Rashad, Soheir M. Khamis, Hatem M. Bahig, et al.
Evolutionary Intelligence (2024) Vol. 17, Iss. 4, pp. 2617-2636
Closed Access | Times Cited: 1