OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A robust coverless video steganography based on maximum DC coefficients against video attacks
Laijin Meng, Xinghao Jiang, Zhenzhen Zhang, et al.
Multimedia Tools and Applications (2023) Vol. 83, Iss. 5, pp. 13427-13461
Closed Access | Times Cited: 17

Showing 17 citing articles:

A comprehensive survey on stegomalware detection in digital media, research challenges and future directions
Laila Tul Badar, Barbara Carminati, Elena Ferrari
Signal Processing (2025), pp. 109888-109888
Open Access

DeepSteg: Integerating new paradigms of cascaded deep video steganography for securing digital data
Sahar Magdy, Sherin M. Youssef, Karma M. Fathalla, et al.
Alexandria Engineering Journal (2025) Vol. 116, pp. 483-501
Closed Access

A review of coverless steganography
Laijin Meng, Xinghao Jiang, Tanfeng Sun
Neurocomputing (2023) Vol. 566, pp. 126945-126945
Closed Access | Times Cited: 11

Robust coverless video steganography based on inter-frame keypoint matching
Nan Li, Jiaohua Qin, Xuyu Xiang, et al.
Journal of Information Security and Applications (2023) Vol. 79, pp. 103653-103653
Closed Access | Times Cited: 8

A Robust Coverless Video Steganography Based on the Similarity of Inter-Frames
Laijin Meng, Xinghao Jiang, Tanfeng Sun, et al.
IEEE Transactions on Multimedia (2023) Vol. 26, pp. 5996-6011
Closed Access | Times Cited: 5

An adaptive approach for multi-media steganography using improved chaotic map and discrete cosine transform
Shyla Nagarajegowda, K. Kalimuthu
Signal Image and Video Processing (2024) Vol. 18, Iss. 10, pp. 6695-6711
Closed Access | Times Cited: 1

Novel Self-sufficient Coverless Video Steganography for Secured Internet of Things (IoT) Communication
Al–Monte Vince M. Calo, Fredilyn B. Calanda, Ruji P. Medina
(2024), pp. 133-138
Closed Access | Times Cited: 1

Robust coverless image steganography based on DenseUNet with multi-scale feature fusion and attention mechanism
Xiaopeng Li, Qiuyu Zhang, Zhe Li
Signal Image and Video Processing (2024) Vol. 18, Iss. 11, pp. 8251-8266
Closed Access | Times Cited: 1

Hybrid video steganography and cryptography techniques: Review paper
Noor Dheyaa Majeed, Ali Al-Askery, Fadhil Sahib Hasan
AIP conference proceedings (2024) Vol. 3232, pp. 020013-020013
Closed Access | Times Cited: 1

Detecting Malicious Devices in IPSEC Traffic with IPv4 Steganography
Gabriel Jekateryńczuk, Damian Jankowski, René Veyland, et al.
Applied Sciences (2024) Vol. 14, Iss. 9, pp. 3934-3934
Open Access

AI‐generated video steganography based on semantic segmentation
Yangping Lin, Peng Luo, Zhuo Zhang, et al.
IET Image Processing (2024) Vol. 18, Iss. 11, pp. 3042-3054
Open Access

A robust coverless image-synthesized video steganography based on asymmetric structure
Yueshuang Jiao, Zhenzhen Zhang, Zhenzhen Li, et al.
Journal of Visual Communication and Image Representation (2024) Vol. 104, pp. 104303-104303
Closed Access

A robust secret data sharing through coverless video steganography based on average DC coefficient on bit plane segmentation
Sourabh Debnath, Ramesh Kumar Mohapatra, Ratnakar Dash
Computers & Electrical Engineering (2024) Vol. 120, pp. 109766-109766
Closed Access

Generative Text Steganography with Large Language Model
Jiaxuan Wu, Zhengxian Wu, Yiming Xue, et al.
(2024), pp. 10345-10353
Closed Access

Robust coverless video steganography based on pose estimation and object tracking
Nan Li, Jiaohua Qin, Xuyu Xiang, et al.
Journal of Information Security and Applications (2024) Vol. 87, pp. 103912-103912
Closed Access

Page 1

Scroll to top