
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A hybrid algorithm for robust image steganography
Rajwinder Kaur, Butta Singh
Multidimensional Systems and Signal Processing (2020) Vol. 32, Iss. 1, pp. 1-23
Closed Access | Times Cited: 28
Rajwinder Kaur, Butta Singh
Multidimensional Systems and Signal Processing (2020) Vol. 32, Iss. 1, pp. 1-23
Closed Access | Times Cited: 28
Showing 1-25 of 28 citing articles:
Digital image steganography survey and investigation (goal, assessment, method, development, and dataset)
De Rosal Ignatius Moses Setiadi, Supriadi Rustad, Pulung Nurtantio Andono, et al.
Signal Processing (2022) Vol. 206, pp. 108908-108908
Closed Access | Times Cited: 83
De Rosal Ignatius Moses Setiadi, Supriadi Rustad, Pulung Nurtantio Andono, et al.
Signal Processing (2022) Vol. 206, pp. 108908-108908
Closed Access | Times Cited: 83
A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques
Mohamed Abdel Hameed, Omar A. Abdel-Aleem, M. Hassaballah
Journal of Ambient Intelligence and Humanized Computing (2022) Vol. 14, Iss. 5, pp. 4639-4657
Closed Access | Times Cited: 45
Mohamed Abdel Hameed, Omar A. Abdel-Aleem, M. Hassaballah
Journal of Ambient Intelligence and Humanized Computing (2022) Vol. 14, Iss. 5, pp. 4639-4657
Closed Access | Times Cited: 45
Double layer security using crypto-stego techniques: a comprehensive review
Aiman Jan, Shabir A. Parah, Muzamil Hussan, et al.
Health and Technology (2021) Vol. 12, Iss. 1, pp. 9-31
Open Access | Times Cited: 34
Aiman Jan, Shabir A. Parah, Muzamil Hussan, et al.
Health and Technology (2021) Vol. 12, Iss. 1, pp. 9-31
Open Access | Times Cited: 34
A survey of recent advances in image steganography
Akshay Kumar, Rajneesh Rani, Samayveer Singh
Security and Privacy (2022) Vol. 6, Iss. 3
Closed Access | Times Cited: 17
Akshay Kumar, Rajneesh Rani, Samayveer Singh
Security and Privacy (2022) Vol. 6, Iss. 3
Closed Access | Times Cited: 17
Image steganography for securing secret data using hybrid hiding model
Sumeet Kaur, Savina Bansal, Rakesh Kumar Bansal
Multimedia Tools and Applications (2020) Vol. 80, Iss. 5, pp. 7749-7769
Closed Access | Times Cited: 22
Sumeet Kaur, Savina Bansal, Rakesh Kumar Bansal
Multimedia Tools and Applications (2020) Vol. 80, Iss. 5, pp. 7749-7769
Closed Access | Times Cited: 22
Hybrid image steganography method using Lempel Ziv Welch and genetic algorithms for hiding confidential data
Abdulkarem H. M. Almawgani, Adam R. H. Alhawari, Ayman Taher Hindi, et al.
Multidimensional Systems and Signal Processing (2022) Vol. 33, Iss. 2, pp. 561-578
Closed Access | Times Cited: 11
Abdulkarem H. M. Almawgani, Adam R. H. Alhawari, Ayman Taher Hindi, et al.
Multidimensional Systems and Signal Processing (2022) Vol. 33, Iss. 2, pp. 561-578
Closed Access | Times Cited: 11
Secure blind watermarking using Fractional-Order Lorenz system in the frequency domain
Sherif H. AbdElHaleem, Salwa K. Abd–El–Hafiz, Ahmed G. Radwan
AEU - International Journal of Electronics and Communications (2023) Vol. 173, pp. 154998-154998
Closed Access | Times Cited: 6
Sherif H. AbdElHaleem, Salwa K. Abd–El–Hafiz, Ahmed G. Radwan
AEU - International Journal of Electronics and Communications (2023) Vol. 173, pp. 154998-154998
Closed Access | Times Cited: 6
Hybrid video steganography and cryptography techniques: Review paper
Noor Dheyaa Majeed, Ali Al-Askery, Fadhil Sahib Hasan
AIP conference proceedings (2024) Vol. 3232, pp. 020013-020013
Closed Access | Times Cited: 1
Noor Dheyaa Majeed, Ali Al-Askery, Fadhil Sahib Hasan
AIP conference proceedings (2024) Vol. 3232, pp. 020013-020013
Closed Access | Times Cited: 1
Low distortion and adaptive image steganography by enhancing DBSCAN, Sobel operator, and XOR coding
Aref Rezaei, Yasaman Ahmadiadli, Leili Farzinvash, et al.
Journal of Information Security and Applications (2022) Vol. 70, pp. 103343-103343
Closed Access | Times Cited: 8
Aref Rezaei, Yasaman Ahmadiadli, Leili Farzinvash, et al.
Journal of Information Security and Applications (2022) Vol. 70, pp. 103343-103343
Closed Access | Times Cited: 8
Advancements and challenges in coverless image steganography: A survey
Xuyu Xiang, Yang Tan, Jiaohua Qin, et al.
Signal Processing (2024) Vol. 228, pp. 109761-109761
Closed Access | Times Cited: 1
Xuyu Xiang, Yang Tan, Jiaohua Qin, et al.
Signal Processing (2024) Vol. 228, pp. 109761-109761
Closed Access | Times Cited: 1
Image Steganography Using Fractal Cover and Combined Chaos-DNA Based Encryption
Asha Durafe, Vinod Patidar
Annals of Data Science (2022) Vol. 11, Iss. 3, pp. 855-885
Closed Access | Times Cited: 6
Asha Durafe, Vinod Patidar
Annals of Data Science (2022) Vol. 11, Iss. 3, pp. 855-885
Closed Access | Times Cited: 6
Double layer steganography technique using DNA sequences and images
Asia Othman Aljahdali, Omnia Abdullah Al-Harbi
PeerJ Computer Science (2023) Vol. 9, pp. e1379-e1379
Open Access | Times Cited: 3
Asia Othman Aljahdali, Omnia Abdullah Al-Harbi
PeerJ Computer Science (2023) Vol. 9, pp. e1379-e1379
Open Access | Times Cited: 3
An efficient image steganography approach based on QR factorization and singular value decomposition in non‐subsampled contourlet transform domain
Fauzia Yasmeen, Mohammad Shorif Uddin
Security and Privacy (2022) Vol. 5, Iss. 4
Closed Access | Times Cited: 3
Fauzia Yasmeen, Mohammad Shorif Uddin
Security and Privacy (2022) Vol. 5, Iss. 4
Closed Access | Times Cited: 3
HtStego as a Utility Used for Halftone Steganography
Sabyasachi Pramanik
Advances in IT standards and standardization research (AISSR) book series/Advances in IT standards and standardization research series (2024), pp. 159-169
Closed Access
Sabyasachi Pramanik
Advances in IT standards and standardization research (AISSR) book series/Advances in IT standards and standardization research series (2024), pp. 159-169
Closed Access
HtStego: A halftone steganography utility
Efe Çi̇ftci̇, Emre Sümer
SoftwareX (2024) Vol. 27, pp. 101780-101780
Open Access
Efe Çi̇ftci̇, Emre Sümer
SoftwareX (2024) Vol. 27, pp. 101780-101780
Open Access
A Mellin transform based video steganography with improved resistance to deep learning steganalysis for next generation networks
R B Sushma, G R Manjula, Manjula C. Belavagi
MethodsX (2024) Vol. 13, pp. 102887-102887
Open Access
R B Sushma, G R Manjula, Manjula C. Belavagi
MethodsX (2024) Vol. 13, pp. 102887-102887
Open Access
Image steganography techniques for resisting statistical steganalysis attacks: A systematic literature review
Richard Apau, Michael Asante, Frimpong Twum, et al.
PLoS ONE (2024) Vol. 19, Iss. 9, pp. e0308807-e0308807
Open Access
Richard Apau, Michael Asante, Frimpong Twum, et al.
PLoS ONE (2024) Vol. 19, Iss. 9, pp. e0308807-e0308807
Open Access
Image Encryption Technique Using S-Box and Discrete Cosine Transform
Kartik Verma, Butta Singh, Satveer Kour, et al.
Lecture notes in electrical engineering (2024), pp. 13-24
Closed Access
Kartik Verma, Butta Singh, Satveer Kour, et al.
Lecture notes in electrical engineering (2024), pp. 13-24
Closed Access
A Hybrid Image Steganography Method Based on Spectral and Spatial Domain with High Hiding Ratio
Dhanesh Kumar, V. K. Sudha
Lecture notes in networks and systems (2023), pp. 63-70
Closed Access | Times Cited: 1
Dhanesh Kumar, V. K. Sudha
Lecture notes in networks and systems (2023), pp. 63-70
Closed Access | Times Cited: 1
Blind Watermarking Using DCT and Fractional-Order Lorenz System
Sherif H. AbdElHaleem, Ahmed G. Radwan, Salwa K. Abd–El–Hafiz
(2022), pp. 94-97
Closed Access | Times Cited: 2
Sherif H. AbdElHaleem, Ahmed G. Radwan, Salwa K. Abd–El–Hafiz
(2022), pp. 94-97
Closed Access | Times Cited: 2
Image Steganography Using HBV And Padded RSA
Aswathy Krishna R, Narayanan Subramanian, Kurunandan Jain
(2023) Vol. 18, pp. 1-6
Closed Access
Aswathy Krishna R, Narayanan Subramanian, Kurunandan Jain
(2023) Vol. 18, pp. 1-6
Closed Access
Dual Level Security Scheme (DLSS) Using RGB Layer Cryptography and Audio Steganography for Secret Image Transmission in Unsecure Medium
P. L. Chithra, R. Aparna
Indian Journal of Science and Technology (2023) Vol. 16, Iss. 23, pp. 1733-1744
Open Access
P. L. Chithra, R. Aparna
Indian Journal of Science and Technology (2023) Vol. 16, Iss. 23, pp. 1733-1744
Open Access
Chaotic Maps and DCT-based Image Steganography-cum-encryption Hybrid Approach
Butta Singh, Manjit Singh, Himali Sarangal
Lecture notes in networks and systems (2023), pp. 181-193
Closed Access
Butta Singh, Manjit Singh, Himali Sarangal
Lecture notes in networks and systems (2023), pp. 181-193
Closed Access
Edge Detection and Huffman Encoding Based Image Steganography with High Data Embedding Capacity
Butta Singh, Rajwinder Kaur, Manjit Singh, et al.
IFIP advances in information and communication technology (2023), pp. 25-33
Closed Access
Butta Singh, Rajwinder Kaur, Manjit Singh, et al.
IFIP advances in information and communication technology (2023), pp. 25-33
Closed Access
Novel Steganography with Discrete Wavelet Transform for Copyright Protection and Performance Evaluation
Singh Arun Kumar, Juhi Singh
Research Square (Research Square) (2023)
Open Access
Singh Arun Kumar, Juhi Singh
Research Square (Research Square) (2023)
Open Access