OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A robust bit-level image encryption based on Bessel map
Abdurrahim Toktaş, Uğur Erkan, Suo Gao, et al.
Applied Mathematics and Computation (2023) Vol. 462, pp. 128340-128340
Closed Access | Times Cited: 41

Showing 1-25 of 41 citing articles:

A comprehensive survey on image encryption: Taxonomy, challenges, and future directions
Morteza SaberiKamarposhti, Amirabbas Ghorbani, Mehdi Yadollahi
Chaos Solitons & Fractals (2023) Vol. 178, pp. 114361-114361
Closed Access | Times Cited: 50

A discrete Chialvo–Rulkov neuron network coupled with a novel memristor model: Design, Dynamical analysis, DSP implementation and its application
Hongli Cao, Yu Wang, Santo Banerjee, et al.
Chaos Solitons & Fractals (2024) Vol. 179, pp. 114466-114466
Closed Access | Times Cited: 48

Design, Hardware Implementation, and Application in Video Encryption of the 2D Memristive Cubic Map
Suo Gao, Herbert Ho‐Ching Iu, Mengjiao Wang, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 12, pp. 21807-21815
Closed Access | Times Cited: 28

Cryptanalyzing a bit-level image encryption algorithm based on chaotic maps
Heping Wen, Yiting Lin, Zhaoyang Feng
Engineering Science and Technology an International Journal (2024) Vol. 51, pp. 101634-101634
Open Access | Times Cited: 22

Image privacy protection scheme based on high-quality reconstruction DCT compression and nonlinear dynamics
Yiting Lin, Zhiyu Xie, Tingting Chen, et al.
Expert Systems with Applications (2024) Vol. 257, pp. 124891-124891
Closed Access | Times Cited: 22

Development of a video encryption algorithm for critical areas using 2D extended Schaffer function map and neural networks
Suo Gao, Jiafeng Liu, Herbert Ho‐Ching Iu, et al.
Applied Mathematical Modelling (2024) Vol. 134, pp. 520-537
Closed Access | Times Cited: 14

A combinatory approach of non-chain ring and henon map for image encryption application
Salman Mohi, Ikram Ud Din, Tariq Shah, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access | Times Cited: 1

A multi-image encryption scheme based on block compressive sensing and nonlinear bifurcation diffusion
Long-Long Hu, M.-J. Chen, Meng-Meng Wang, et al.
Chaos Solitons & Fractals (2024) Vol. 188, pp. 115521-115521
Closed Access | Times Cited: 10

Frequency-domain image encryption based on IWT and 3D S-box
Heping Wen, Zhaoyang Feng, Chixin Bai, et al.
Physica Scripta (2024) Vol. 99, Iss. 5, pp. 055254-055254
Closed Access | Times Cited: 7

Improved vigenere using affine functions surrounded by two genetic crossovers for image encryption
Hamid El Bourakkadi, Abdelhakim Chemlal, Hassan Tabti, et al.
Indonesian Journal of Electrical Engineering and Computer Science (2024) Vol. 34, Iss. 3, pp. 1787-1787
Open Access | Times Cited: 6

Developing a secure image encryption technique using a novel S-box constructed through real-coded genetic algorithm’s crossover and mutation operators
Deniz Üstün, Serap Şahinkaya, Nurdan Atli
Expert Systems with Applications (2024) Vol. 256, pp. 124904-124904
Closed Access | Times Cited: 6

Novel hyperchaotic system: Implementation to audio encryption
Shuang Zhou, Yanli Yin, Uğur Erkan, et al.
Chaos Solitons & Fractals (2025) Vol. 193, pp. 116088-116088
Closed Access

Design and Practical Implementation of a Novel Hyperchaotic System Generator Based on Apéry's Constant
Ömer Koçak, Uğur Erkan, İsmail Babaoglu
Integration (2025), pp. 102399-102399
Closed Access

A hybrid approach for image encryption using Galois field and chaotic structures
Tanveer Qayyum, Tariq Shah
Optik (2025), pp. 172302-172302
Closed Access

Efficient speech encryption algorithm based on three-dimensional quadratic exponential robust chaos
Y Huang, Chong Li, Zhiyong Li, et al.
Applied Acoustics (2025) Vol. 235, pp. 110672-110672
Closed Access

Efficient and secure image encryption algorithm using 2D LIM map and Latin square matrix
Xingfan Huang, Jianeng Tang, Zezong Zhang
Nonlinear Dynamics (2024)
Closed Access | Times Cited: 4

Exploiting 2D-SDMCHM and matching embedding driven by flag-shaped hexagon prediction for visually meaningful medical image cryptosystem
Xiuli Chai, Guangyu Shang, Binjie Wang, et al.
Chaos Solitons & Fractals (2024) Vol. 185, pp. 115153-115153
Closed Access | Times Cited: 3

Grid Homogeneous Coexisting Hyperchaos and Hardware Encryption for 2-D HNN-Like Map
Han Bao, Yuanhui Su, Zhongyun Hua, et al.
IEEE Transactions on Circuits and Systems I Regular Papers (2024) Vol. 71, Iss. 9, pp. 4145-4155
Closed Access | Times Cited: 3

Image Encryption using Half-Inverted Cascading Chaos Cipheration
De Rosal Ignatius Moses Setiadi, Robet Robet, Octara Pribadi, et al.
Journal of Computing Theories and Applications (2023) Vol. 1, Iss. 2, pp. 61-77
Open Access | Times Cited: 8

A two-parameter extended logistic chaotic map for modern image cryptosystems
Abdelhakim Latoui, Mohamed El Hossine Daachi
Digital Signal Processing (2024) Vol. 148, pp. 104463-104463
Closed Access | Times Cited: 2

A new 3D robust chaotic mapping and its application to speech encryption
Y Huang, Ling Wang, Zhiyong Li, et al.
Chaos Solitons & Fractals (2024) Vol. 184, pp. 115038-115038
Closed Access | Times Cited: 2

Performance of Cipher Image Transmission in Free Space Optics Under Foggy Weather
Somia A. Abd El-Mottaleb, Amira G. Mohamed, Abdellah Chehri, et al.
IEEE Access (2023) Vol. 11, pp. 139478-139497
Open Access | Times Cited: 7

Local bit-level image encryption algorithm based on one dimensional zero excluded chaotic map
Xiaogang Feng, Guankai Han, Fengying Yan, et al.
Physica Scripta (2024) Vol. 99, Iss. 6, pp. 065214-065214
Open Access | Times Cited: 2

Enhancing image data security using the APFB model
Kousik Barik, Sanjay Misra, Luis Fernández Sanz, et al.
Connection Science (2024) Vol. 36, Iss. 1
Open Access | Times Cited: 2

Page 1 - Next Page

Scroll to top