OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A Study on Content Tampering in Multimedia Watermarking
Aditya Kumar Sahu, Krishnan Umachandran, Vaishali D. Biradar, et al.
SN Computer Science (2023) Vol. 4, Iss. 3
Closed Access | Times Cited: 25

Showing 25 citing articles:

Secure Reversible Data Hiding Using Block-Wise Histogram Shifting
Samar Kamil Khudhair, Monalisa Sahu, K. R. Raghunandan, et al.
Electronics (2023) Vol. 12, Iss. 5, pp. 1222-1222
Open Access | Times Cited: 43

Impact of Deepfake Technology on Social Media: Detection, Misinformation and Societal Implications
Samer Al-khazraji, Hassan Hadi Saleh, A. Khalid, et al.
The Eurasia Proceedings of Science Technology Engineering and Mathematics (2023) Vol. 23, pp. 429-441
Open Access | Times Cited: 18

Block mapping and dual-matrix-based watermarking for image authentication with self-recovery capability
X. Li, Qiancheng Chen, Runfu Chu, et al.
PLoS ONE (2024) Vol. 19, Iss. 2, pp. e0297632-e0297632
Open Access | Times Cited: 6

Hybrid Encrypted Watermarking Algorithm for Medical Images Based on DCT and Improved DarkNet53
Dekai Li, Jingbing Li, Uzair Aslam Bhatti, et al.
Electronics (2023) Vol. 12, Iss. 7, pp. 1554-1554
Open Access | Times Cited: 13

Robust manipulated media localization and detection based on high frequency and texture features
Qian Jiang, Shuai Liu, Shengfa Miao, et al.
Deleted Journal (2025) Vol. 28, Iss. 1
Open Access

Design of an academic document forgery detection system
Sirapat Boonkrong
International Journal of Information Technology (2024)
Open Access | Times Cited: 3

A secure video data streaming model using modified firefly and SVD technique
K. Muthulakshmi, K. Valarmathi
Multimedia Systems (2024) Vol. 30, Iss. 2
Closed Access | Times Cited: 2

Review of Image Forensic Techniques Based on Deep Learning
Chunyin Shi, Luan Chen, Chengyou Wang, et al.
Mathematics (2023) Vol. 11, Iss. 14, pp. 3134-3134
Open Access | Times Cited: 6

A novel image compression method using wavelet coefficients and Huffman coding
Shiju Thomas, Addepalli V. N. Krishna, Sabeen Govind, et al.
Journal of Engineering Research (2023)
Open Access | Times Cited: 6

An exhaustive review of authentication, tamper detection with localization and recovery techniques for medical images
B. Madhushree, Halaguru Basavarajappa Basanth Kumar, H. R. Chennamma
Multimedia Tools and Applications (2023) Vol. 83, Iss. 13, pp. 39779-39821
Closed Access | Times Cited: 6

Social Media Mining to Detect Online Violent Extremism using Machine Learning Techniques
Shynar Mussiraliyeva, Kalamkas Bagitova, Daniyar Sultan
International Journal of Advanced Computer Science and Applications (2023) Vol. 14, Iss. 6
Open Access | Times Cited: 5

AuSR3: A new block mapping technique for image authentication and self-recovery to avoid the tamper coincidence problem
Afrig Aminuddin, Ferda Ernawan
Journal of King Saud University - Computer and Information Sciences (2023) Vol. 35, Iss. 9, pp. 101755-101755
Open Access | Times Cited: 4

PermutEx: Feature-Extraction-Based Permutation — A New Diffusion Scheme for Image Encryption Algorithms
Muhammad Shahbaz Khan, Jawad Ahmad, Ahmed Al‐Dubai, et al.
(2023)
Open Access | Times Cited: 2

SRSS: A New Chaos-Based Single-Round Single S-Box Image Encryption Scheme for Highly Auto-Correlated Data
Muhammad Shahbaz Khan, Jawad Ahmad, Hesham Ali, et al.
2021 International Conference on Engineering and Emerging Technologies (ICEET) (2023), pp. 1-6
Open Access | Times Cited: 2

Improved protection for colour images via invertible colour‐to‐grey, image distortion, and visible‐imperceptible watermarking
Eduardo Fragoso‐Navarro, Francisco García-Ugalde, Manuel Cedillo‐Hernandez
IET Image Processing (2024) Vol. 18, Iss. 13, pp. 3854-3863
Open Access

Embedding Secret Data in a Vector Quantization Codebook Using a Novel Thresholding Scheme
Yijie Lin, Jui‐Chuan Liu, Ching‐Chun Chang, et al.
Mathematics (2024) Vol. 12, Iss. 9, pp. 1332-1332
Open Access

Enhancing quality measurement for visible and invisible watermarking based on M-SVD and DCT
Kusnawi Kusnawi, Joang Ipmawati, Dwi Puji Prabowo
Bulletin of Electrical Engineering and Informatics (2024) Vol. 13, Iss. 4, pp. 2537-2546
Open Access

Robust image tamper detection and recovery with self-embedding watermarking using SPIHT and LDPC
Priyanka Priyadarshini, Kshiramani Naik
International Journal of Computers and Applications (2024) Vol. 46, Iss. 8, pp. 580-603
Closed Access

Adaptive random-grid and progressive color secret sharing with CNN super-resolution on a many-core system
M. Raviraja Holla, D. Suma
International Journal of Computers and Applications (2024) Vol. 46, Iss. 10, pp. 830-839
Open Access

BWM: A Novel Blockchain-Watermarking Mechanism Utilizing Interplanetary File System and Fast Walsh Hadamard Transform
Tong Liu, Si-Nga Lai, Xiaochen Yuan, et al.
iScience (2024) Vol. 27, Iss. 9, pp. 110821-110821
Open Access

Research on Image Tampering Detection and Localization Based on Iterative GAN
Liang Chu
(2023), pp. 1552-1556
Closed Access | Times Cited: 1

A metaplastic neural network technique for human activity recognition for Alzheimer’s patients
Ahmed Zaghdoud, Olfa Jemai
2021 International Conference on INnovations in Intelligent SysTems and Applications (INISTA) (2023), pp. 1-6
Closed Access | Times Cited: 1

DMpDP: a Diagnostic Multiple-patient DermoFeature Profile store-and-forward teledermoscopy system
Amira S. Ashour, Basant S. Abd El-Wahab, Maram A. Wahba, et al.
Medical & Biological Engineering & Computing (2023) Vol. 62, Iss. 4, pp. 973-996
Open Access

Deep Shield: A Federated Learning Approach to Combat Online Pirated Content Using Deep Fakes
Anurag Sinha, Nitasha Rathore, Amar Nath Singh, et al.
2018 5th IEEE Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering (UPCON) (2023), pp. 876-881
Closed Access

Page 1

Scroll to top