OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

IWT and RSA based asymmetric image encryption algorithm
Simin Du, Guodong Ye
Alexandria Engineering Journal (2022) Vol. 66, pp. 979-991
Open Access | Times Cited: 35

Showing 1-25 of 35 citing articles:

A comprehensive survey on image encryption: Taxonomy, challenges, and future directions
Morteza SaberiKamarposhti, Amirabbas Ghorbani, Mehdi Yadollahi
Chaos Solitons & Fractals (2023) Vol. 178, pp. 114361-114361
Closed Access | Times Cited: 52

A visual meaningful encryption and hiding algorithm for multiple images
Guodong Ye, Liming Guo
Nonlinear Dynamics (2024) Vol. 112, Iss. 16, pp. 14593-14616
Closed Access | Times Cited: 16

Quantum-enhanced Chaotic Image Encryption: Strengthening Digital Data Security With 1-D Sine-based Chaotic Maps and Quantum Coding
Mujeeb Ur Rehman
Journal of King Saud University - Computer and Information Sciences (2024) Vol. 36, Iss. 3, pp. 101980-101980
Open Access | Times Cited: 15

Color image encryption algorithm based on novel 2D hyper-chaotic system and DNA crossover and mutation
Quanyv Wang, Xiaoqiang Zhang, Xiaohu Zhao
Nonlinear Dynamics (2023) Vol. 111, Iss. 24, pp. 22679-22705
Closed Access | Times Cited: 21

Image encryption based on 2DNA encoding and chaotic 2D logistic map
Asmaa Hasan Alrubaie, Maisa’a Abid Ali Khodher, Ahmed Talib Abdulameer
Journal of Engineering and Applied Science (2023) Vol. 70, Iss. 1
Open Access | Times Cited: 17

Combining Semi-Tensor Product Compressed Sensing and Session Keys for Low-Cost Encryption of Batch Information in WBANs
Jun Mou, Zheyi Zhang, Santo Banerjee, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 20, pp. 33565-33576
Closed Access | Times Cited: 6

Protected memristive implementations of cryptographic functions
Ziang Chen, Li-Wei Chen, Xianyue Zhao, et al.
Philosophical Transactions of the Royal Society A Mathematical Physical and Engineering Sciences (2025) Vol. 383, Iss. 2288
Closed Access

A novel image cipher system based on hybrid vigenere-affine approach
Hamid El Bourakkadi, Abdelhakim Chemlal, Hassan Tabti, et al.
Multimedia Tools and Applications (2025)
Closed Access

CHAINS: CHAIN-Based Fusion Safety System Framework for Intelligent Connected Vehicle
Shichun Yang, Bin Sun, Haoran Guang, et al.
Deleted Journal (2024) Vol. 1, Iss. 1, pp. 2-45
Closed Access | Times Cited: 4

Efficient and secure image encryption algorithm using 2D LIM map and Latin square matrix
Xingfan Huang, Jianeng Tang, Zezong Zhang
Nonlinear Dynamics (2024)
Closed Access | Times Cited: 4

Introduction to Network Sensing Systems in Society 5.0
Ankit Kumar, Anurag Kumar Kanojiya, D Subitha
(2025), pp. 1-29
Closed Access

Improved RSA with Enhanced Security on STM32 @ 84MHz
Ankita Sarkar, Mansi Jhamb
Journal of Circuits Systems and Computers (2024) Vol. 33, Iss. 15
Closed Access | Times Cited: 3

Performance of Cipher Image Transmission in Free Space Optics Under Foggy Weather
Somia A. Abd El-Mottaleb, Amira G. Mohamed, Abdellah Chehri, et al.
IEEE Access (2023) Vol. 11, pp. 139478-139497
Open Access | Times Cited: 7

MieWC: Medical image encryption using wavelet transform and multiple chaotic maps
Kunal Demla, Ashima Anand
Security and Privacy (2024) Vol. 7, Iss. 3
Closed Access | Times Cited: 2

A color image encryption scheme based on a 2D coupled chaotic system and diagonal scrambling algorithm
Jingming 静明 Su 苏, Shihui 士辉 Fang 方, Shihui Fang, et al.
Chinese Physics B (2024) Vol. 33, Iss. 7, pp. 070502-070502
Open Access | Times Cited: 2

A privacy-preserving deep learning framework for highly authenticated blockchain secure storage system
Sheikh Moeen Ul Haque, Shabir Ahamd Sofi, Sahil Sholla
Multimedia Tools and Applications (2024) Vol. 83, Iss. 36, pp. 84299-84329
Closed Access | Times Cited: 2

Performance Comparison between RSA and El-Gamal Algorithms for Speech Data Encryption and Decryption
Sura F. Yousif
Diyala Journal of Engineering Sciences (2023), pp. 123-137
Open Access | Times Cited: 5

Satellite image encryption based on RNA and 7D complex chaotic system
Lijiang Zhao, Lilong Zhao, Fenping Cui, et al.
The Visual Computer (2023) Vol. 40, Iss. 8, pp. 5659-5679
Closed Access | Times Cited: 5

A Hybrid Cryptosystem Incorporating a New Algorithm for Improved Entropy
Víctor Manuel Silva-García, Rolando Flores-Carapia, Manuel Alejandro Cardona-López
Entropy (2024) Vol. 26, Iss. 2, pp. 154-154
Open Access | Times Cited: 1

A robust medical image cryptosystem based on hyperbolic chaotic system and circular bit-shifting-flipping techniques
Sujarani Rajendran, Chanthini Baskar, G. Gugapriya, et al.
Alexandria Engineering Journal (2024) Vol. 97, pp. 169-183
Open Access | Times Cited: 1

Asymmetric Image Encryption Based on Singular Cubic Curve with Chaotic Map
Mohammed Jabbar Obaid, Najlae Falah Hameed Al Saffar
Iraqi Journal of Science (2024), pp. 2605-2618
Open Access | Times Cited: 1

A lossless probabilistic image encryption algorithm based on QSD decomposition and matrix transformations
Oussama Harkati, Lemnouar Noui, Assia Beloucif
International Journal of Computers and Applications (2024) Vol. 46, Iss. 10, pp. 868-879
Closed Access | Times Cited: 1

The Variant of Digital Signature Algorithm for Constant Message
Kritsanapong Somsuk, Sarutte Atsawaraungsuk, Chanwit Suwannapong, et al.
Journal of Internet Services and Information Security (2023) Vol. 13, Iss. 2, pp. 81-95
Open Access | Times Cited: 2

A double encryption protection algorithm for stem cell bank privacy data based on improved AES and chaotic encryption technology
Li Wang, Xinyi Wei, Yuan Zhang, et al.
PLoS ONE (2023) Vol. 18, Iss. 10, pp. e0293418-e0293418
Open Access | Times Cited: 2

Page 1 - Next Page

Scroll to top