
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A robust coverless video steganography based on maximum DC coefficients against video attacks
Laijin Meng, Xinghao Jiang, Zhenzhen Zhang, et al.
Multimedia Tools and Applications (2023) Vol. 83, Iss. 5, pp. 13427-13461
Closed Access | Times Cited: 17
Laijin Meng, Xinghao Jiang, Zhenzhen Zhang, et al.
Multimedia Tools and Applications (2023) Vol. 83, Iss. 5, pp. 13427-13461
Closed Access | Times Cited: 17
Showing 17 citing articles:
A comprehensive survey on stegomalware detection in digital media, research challenges and future directions
Laila Tul Badar, Barbara Carminati, Elena Ferrari
Signal Processing (2025), pp. 109888-109888
Open Access
Laila Tul Badar, Barbara Carminati, Elena Ferrari
Signal Processing (2025), pp. 109888-109888
Open Access
DeepSteg: Integerating new paradigms of cascaded deep video steganography for securing digital data
Sahar Magdy, Sherin M. Youssef, Karma M. Fathalla, et al.
Alexandria Engineering Journal (2025) Vol. 116, pp. 483-501
Closed Access
Sahar Magdy, Sherin M. Youssef, Karma M. Fathalla, et al.
Alexandria Engineering Journal (2025) Vol. 116, pp. 483-501
Closed Access
A review of coverless steganography
Laijin Meng, Xinghao Jiang, Tanfeng Sun
Neurocomputing (2023) Vol. 566, pp. 126945-126945
Closed Access | Times Cited: 11
Laijin Meng, Xinghao Jiang, Tanfeng Sun
Neurocomputing (2023) Vol. 566, pp. 126945-126945
Closed Access | Times Cited: 11
Robust coverless video steganography based on inter-frame keypoint matching
Nan Li, Jiaohua Qin, Xuyu Xiang, et al.
Journal of Information Security and Applications (2023) Vol. 79, pp. 103653-103653
Closed Access | Times Cited: 8
Nan Li, Jiaohua Qin, Xuyu Xiang, et al.
Journal of Information Security and Applications (2023) Vol. 79, pp. 103653-103653
Closed Access | Times Cited: 8
A Robust Coverless Video Steganography Based on the Similarity of Inter-Frames
Laijin Meng, Xinghao Jiang, Tanfeng Sun, et al.
IEEE Transactions on Multimedia (2023) Vol. 26, pp. 5996-6011
Closed Access | Times Cited: 5
Laijin Meng, Xinghao Jiang, Tanfeng Sun, et al.
IEEE Transactions on Multimedia (2023) Vol. 26, pp. 5996-6011
Closed Access | Times Cited: 5
Hiding Data Within Thumbnail Videos: An Adaptive Downsampling-Resilient Video Steganography Method
Yongzhi Wang
IEEE Access (2024) Vol. 12, pp. 52963-52977
Open Access | Times Cited: 1
Yongzhi Wang
IEEE Access (2024) Vol. 12, pp. 52963-52977
Open Access | Times Cited: 1
An adaptive approach for multi-media steganography using improved chaotic map and discrete cosine transform
Shyla Nagarajegowda, K. Kalimuthu
Signal Image and Video Processing (2024) Vol. 18, Iss. 10, pp. 6695-6711
Closed Access | Times Cited: 1
Shyla Nagarajegowda, K. Kalimuthu
Signal Image and Video Processing (2024) Vol. 18, Iss. 10, pp. 6695-6711
Closed Access | Times Cited: 1
Novel Self-sufficient Coverless Video Steganography for Secured Internet of Things (IoT) Communication
Al–Monte Vince M. Calo, Fredilyn B. Calanda, Ruji P. Medina
(2024), pp. 133-138
Closed Access | Times Cited: 1
Al–Monte Vince M. Calo, Fredilyn B. Calanda, Ruji P. Medina
(2024), pp. 133-138
Closed Access | Times Cited: 1
Robust coverless image steganography based on DenseUNet with multi-scale feature fusion and attention mechanism
Xiaopeng Li, Qiuyu Zhang, Zhe Li
Signal Image and Video Processing (2024) Vol. 18, Iss. 11, pp. 8251-8266
Closed Access | Times Cited: 1
Xiaopeng Li, Qiuyu Zhang, Zhe Li
Signal Image and Video Processing (2024) Vol. 18, Iss. 11, pp. 8251-8266
Closed Access | Times Cited: 1
Hybrid video steganography and cryptography techniques: Review paper
Noor Dheyaa Majeed, Ali Al-Askery, Fadhil Sahib Hasan
AIP conference proceedings (2024) Vol. 3232, pp. 020013-020013
Closed Access | Times Cited: 1
Noor Dheyaa Majeed, Ali Al-Askery, Fadhil Sahib Hasan
AIP conference proceedings (2024) Vol. 3232, pp. 020013-020013
Closed Access | Times Cited: 1
Detecting Malicious Devices in IPSEC Traffic with IPv4 Steganography
Gabriel Jekateryńczuk, Damian Jankowski, René Veyland, et al.
Applied Sciences (2024) Vol. 14, Iss. 9, pp. 3934-3934
Open Access
Gabriel Jekateryńczuk, Damian Jankowski, René Veyland, et al.
Applied Sciences (2024) Vol. 14, Iss. 9, pp. 3934-3934
Open Access
Enhancing secure communication: a QIM-based steganography approach for G.722.2 speech streams with Stable Roommate Index Division
Bekkar Laskar, Merouane Bouzid
Multimedia Tools and Applications (2024)
Closed Access
Bekkar Laskar, Merouane Bouzid
Multimedia Tools and Applications (2024)
Closed Access
AI‐generated video steganography based on semantic segmentation
Yangping Lin, Peng Luo, Zhuo Zhang, et al.
IET Image Processing (2024) Vol. 18, Iss. 11, pp. 3042-3054
Open Access
Yangping Lin, Peng Luo, Zhuo Zhang, et al.
IET Image Processing (2024) Vol. 18, Iss. 11, pp. 3042-3054
Open Access
A robust coverless image-synthesized video steganography based on asymmetric structure
Yueshuang Jiao, Zhenzhen Zhang, Zhenzhen Li, et al.
Journal of Visual Communication and Image Representation (2024) Vol. 104, pp. 104303-104303
Closed Access
Yueshuang Jiao, Zhenzhen Zhang, Zhenzhen Li, et al.
Journal of Visual Communication and Image Representation (2024) Vol. 104, pp. 104303-104303
Closed Access
A robust secret data sharing through coverless video steganography based on average DC coefficient on bit plane segmentation
Sourabh Debnath, Ramesh Kumar Mohapatra, Ratnakar Dash
Computers & Electrical Engineering (2024) Vol. 120, pp. 109766-109766
Closed Access
Sourabh Debnath, Ramesh Kumar Mohapatra, Ratnakar Dash
Computers & Electrical Engineering (2024) Vol. 120, pp. 109766-109766
Closed Access
Generative Text Steganography with Large Language Model
Jiaxuan Wu, Zhengxian Wu, Yiming Xue, et al.
(2024), pp. 10345-10353
Closed Access
Jiaxuan Wu, Zhengxian Wu, Yiming Xue, et al.
(2024), pp. 10345-10353
Closed Access
Robust coverless video steganography based on pose estimation and object tracking
Nan Li, Jiaohua Qin, Xuyu Xiang, et al.
Journal of Information Security and Applications (2024) Vol. 87, pp. 103912-103912
Closed Access
Nan Li, Jiaohua Qin, Xuyu Xiang, et al.
Journal of Information Security and Applications (2024) Vol. 87, pp. 103912-103912
Closed Access