
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
An Effective Semi-fragile Watermarking Method for Image Authentication Based on Lifting Wavelet Transform and Feed-Forward Neural Network
Behrouz Bolourian Haghighi, Amir Hossein Taherinia, Reza Monsefi
Cognitive Computation (2020) Vol. 12, Iss. 4, pp. 863-890
Closed Access | Times Cited: 28
Behrouz Bolourian Haghighi, Amir Hossein Taherinia, Reza Monsefi
Cognitive Computation (2020) Vol. 12, Iss. 4, pp. 863-890
Closed Access | Times Cited: 28
Showing 1-25 of 28 citing articles:
Digital image watermarking using deep learning: A survey
Khalid M. Hosny, Amal Magdi, Osama M. Elkomy, et al.
Computer Science Review (2024) Vol. 53, pp. 100662-100662
Closed Access | Times Cited: 10
Khalid M. Hosny, Amal Magdi, Osama M. Elkomy, et al.
Computer Science Review (2024) Vol. 53, pp. 100662-100662
Closed Access | Times Cited: 10
Hybrid optimisation-based robust watermarking using denoising convolutional neural network
Dhiran Kumar Mahto, Ashima Anand, Amit Kumar Singh
Soft Computing (2022) Vol. 26, Iss. 16, pp. 8105-8116
Closed Access | Times Cited: 30
Dhiran Kumar Mahto, Ashima Anand, Amit Kumar Singh
Soft Computing (2022) Vol. 26, Iss. 16, pp. 8105-8116
Closed Access | Times Cited: 30
ECH3 OA: An Enhanced Chimp-Harris Hawks Optimization Algorithm for copyright protection in Color Images using watermarking techniques
Hager Fahmy, Eman M. El-Gendy, Mustafa ALAS Hassan Idow Mohamed, et al.
Knowledge-Based Systems (2023) Vol. 269, pp. 110494-110494
Closed Access | Times Cited: 16
Hager Fahmy, Eman M. El-Gendy, Mustafa ALAS Hassan Idow Mohamed, et al.
Knowledge-Based Systems (2023) Vol. 269, pp. 110494-110494
Closed Access | Times Cited: 16
Methods for countering attacks on image watermarking schemes: Overview
Anna Melman, Oleg Evsutin
Journal of Visual Communication and Image Representation (2024) Vol. 99, pp. 104073-104073
Closed Access | Times Cited: 6
Anna Melman, Oleg Evsutin
Journal of Visual Communication and Image Representation (2024) Vol. 99, pp. 104073-104073
Closed Access | Times Cited: 6
Logistic-map based fragile image watermarking scheme for tamper detection and localization
Aditya Kumar Sahu, M. Hassaballah, Routhu Srinivasa Rao, et al.
Multimedia Tools and Applications (2022) Vol. 82, Iss. 16, pp. 24069-24100
Closed Access | Times Cited: 25
Aditya Kumar Sahu, M. Hassaballah, Routhu Srinivasa Rao, et al.
Multimedia Tools and Applications (2022) Vol. 82, Iss. 16, pp. 24069-24100
Closed Access | Times Cited: 25
WSOmark: An adaptive dual-purpose color image watermarking using white shark optimizer and Levenberg–Marquardt BPNN
Subodh Kumar, Neeraj Kumar Sharma, Naveen Kumar
Expert Systems with Applications (2023) Vol. 226, pp. 120137-120137
Closed Access | Times Cited: 14
Subodh Kumar, Neeraj Kumar Sharma, Naveen Kumar
Expert Systems with Applications (2023) Vol. 226, pp. 120137-120137
Closed Access | Times Cited: 14
Secure and effective color image tampering detection and self restoration using a dual watermarking approach✩
Hazem Munawer Al-Otum, Arwa Abdelnaser Ali Ellubani
Optik (2022) Vol. 262, pp. 169280-169280
Closed Access | Times Cited: 19
Hazem Munawer Al-Otum, Arwa Abdelnaser Ali Ellubani
Optik (2022) Vol. 262, pp. 169280-169280
Closed Access | Times Cited: 19
An adaptive reversible watermarking in IWT domain
Lingzhuang Meng, Lianshan Liu, Gang Tian, et al.
Multimedia Tools and Applications (2020) Vol. 80, Iss. 1, pp. 711-735
Closed Access | Times Cited: 28
Lingzhuang Meng, Lianshan Liu, Gang Tian, et al.
Multimedia Tools and Applications (2020) Vol. 80, Iss. 1, pp. 711-735
Closed Access | Times Cited: 28
Separable Reversible Data Hiding Based on Integer Mapping and MSB Prediction for Encrypted 3D Mesh Models
Na Xu, Jin Tang, Bin Luo, et al.
Cognitive Computation (2021) Vol. 14, Iss. 3, pp. 1172-1181
Closed Access | Times Cited: 23
Na Xu, Jin Tang, Bin Luo, et al.
Cognitive Computation (2021) Vol. 14, Iss. 3, pp. 1172-1181
Closed Access | Times Cited: 23
Three Layer Authentications with a Spiral Block Mapping to Prove Authenticity in Medical Images
Ferda Ernawan, Afrig Aminuddin, Danakorn Nincarean, et al.
International Journal of Advanced Computer Science and Applications (2022) Vol. 13, Iss. 4
Open Access | Times Cited: 18
Ferda Ernawan, Afrig Aminuddin, Danakorn Nincarean, et al.
International Journal of Advanced Computer Science and Applications (2022) Vol. 13, Iss. 4
Open Access | Times Cited: 18
A comprehensive survey on image authentication for tamper detection with localization
H. R. Chennamma, B. Madhushree
Multimedia Tools and Applications (2022) Vol. 82, Iss. 2, pp. 1873-1904
Closed Access | Times Cited: 17
H. R. Chennamma, B. Madhushree
Multimedia Tools and Applications (2022) Vol. 82, Iss. 2, pp. 1873-1904
Closed Access | Times Cited: 17
FuSIW: fusion-based secure RGB image watermarking using hashing
Dhiran Kumar Mahto, Om Prakash Singh, Amit Kumar Singh
Multimedia Tools and Applications (2022) Vol. 83, Iss. 22, pp. 61493-61509
Closed Access | Times Cited: 14
Dhiran Kumar Mahto, Om Prakash Singh, Amit Kumar Singh
Multimedia Tools and Applications (2022) Vol. 83, Iss. 22, pp. 61493-61509
Closed Access | Times Cited: 14
A semi-fragile watermarking tamper localization method based on QDFT and multi-view fusion
Junlin Ouyang, Jingtao Huang, Xingzi Wen, et al.
Multimedia Tools and Applications (2022) Vol. 82, Iss. 10, pp. 15113-15141
Closed Access | Times Cited: 11
Junlin Ouyang, Jingtao Huang, Xingzi Wen, et al.
Multimedia Tools and Applications (2022) Vol. 82, Iss. 10, pp. 15113-15141
Closed Access | Times Cited: 11
Chebyshev Chaotic Mapping and DWT-SVD-Based Dual Watermarking Scheme for Copyright and Integrity Authentication of Remote Sensing Images
Jie Zhang, Jinglong Du, Xi Xu, et al.
Symmetry (2024) Vol. 16, Iss. 8, pp. 969-969
Open Access | Times Cited: 1
Jie Zhang, Jinglong Du, Xi Xu, et al.
Symmetry (2024) Vol. 16, Iss. 8, pp. 969-969
Open Access | Times Cited: 1
Robust Blind Image Watermarking Using Coefficient Differences of Medium Frequency between Inter-Blocks
Bingbing Zhu, Xuefeng Fan, Tianshuo Zhang, et al.
Electronics (2023) Vol. 12, Iss. 19, pp. 4117-4117
Open Access | Times Cited: 3
Bingbing Zhu, Xuefeng Fan, Tianshuo Zhang, et al.
Electronics (2023) Vol. 12, Iss. 19, pp. 4117-4117
Open Access | Times Cited: 3
Multiple Blind Watermarking Framework for Security and Integrity of Medical Images in E-Health Applications
Abdallah Soualmi, Adel Alti, Lamri Laouamer
International Journal of Computer Vision and Image Processing (2021) Vol. 11, Iss. 1, pp. 1-16
Closed Access | Times Cited: 7
Abdallah Soualmi, Adel Alti, Lamri Laouamer
International Journal of Computer Vision and Image Processing (2021) Vol. 11, Iss. 1, pp. 1-16
Closed Access | Times Cited: 7
Bearing fault diagnosis method based on EEMD and adaptive redundant lifting scheme packet
Hongtao Su, Mengmeng Song, Zicheng Xiong
Vibroengineering PROCEDIA (2020) Vol. 34, pp. 14-19
Open Access | Times Cited: 4
Hongtao Su, Mengmeng Song, Zicheng Xiong
Vibroengineering PROCEDIA (2020) Vol. 34, pp. 14-19
Open Access | Times Cited: 4
Protecting Tampered Images with Lossless Auto Recovery using improved INN
R. Bharathi, R. NaveenRaj, Syed Vakeel Zaid J, et al.
(2024), pp. 1-6
Closed Access
R. Bharathi, R. NaveenRaj, Syed Vakeel Zaid J, et al.
(2024), pp. 1-6
Closed Access
Cyber vaccinator for image tamper resilient and recovery using invertible neural network
Anchula Sathish, R. Aasha, P. Abinayasri, et al.
i-manager s Journal on Digital Forensics & Cyber Security (2024) Vol. 2, Iss. 1, pp. 27-27
Closed Access
Anchula Sathish, R. Aasha, P. Abinayasri, et al.
i-manager s Journal on Digital Forensics & Cyber Security (2024) Vol. 2, Iss. 1, pp. 27-27
Closed Access
ImageShield: a responsibility-to-person blind watermarking mechanism for image datasets protection
Zongwei Tang, Junyang Yu, Xiuli Chai, et al.
Applied Intelligence (2024) Vol. 55, Iss. 1
Closed Access
Zongwei Tang, Junyang Yu, Xiuli Chai, et al.
Applied Intelligence (2024) Vol. 55, Iss. 1
Closed Access
Robust Image Watermarking in Wavelet Domain using RDWT-HD-SVD and Whale Optimization Algorithm
Guang-Da Zhang, Zexin Zhang, Jing-You Li, et al.
Circuits Systems and Signal Processing (2024)
Closed Access
Guang-Da Zhang, Zexin Zhang, Jing-You Li, et al.
Circuits Systems and Signal Processing (2024)
Closed Access
Multiple Blind Watermarking Framework for Security and Integrity of Medical Images in E-Health Applications
Abdallah Soualmi, Adel Alti, Lamri Laouamer
IGI Global eBooks (2022), pp. 517-532
Closed Access | Times Cited: 2
Abdallah Soualmi, Adel Alti, Lamri Laouamer
IGI Global eBooks (2022), pp. 517-532
Closed Access | Times Cited: 2
A Review on Digital Watermarking-Based Image Forensic Technique
Sanjay Kumar, Binod Kumar Singh
Lecture notes in electrical engineering (2021), pp. 91-100
Closed Access | Times Cited: 2
Sanjay Kumar, Binod Kumar Singh
Lecture notes in electrical engineering (2021), pp. 91-100
Closed Access | Times Cited: 2
Color image copyright protection based on watermarking using machine learning in the wavelet-packets domain
Hazem Munawer Al-Otum
Research Square (Research Square) (2023)
Open Access
Hazem Munawer Al-Otum
Research Square (Research Square) (2023)
Open Access
Semi-Fragile Watermark for the Authentication and Recovery of Tampered Images
Mohammed H. Yacoub, Marwan A. Fetteha, Bishoy K. Sharobim, et al.
(2023), pp. 194-199
Closed Access
Mohammed H. Yacoub, Marwan A. Fetteha, Bishoy K. Sharobim, et al.
(2023), pp. 194-199
Closed Access