
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Optical image encryption and authentication scheme with computational ghost imaging
Zhe Guo, Suhua Chen, Ling Zhou, et al.
Applied Mathematical Modelling (2024) Vol. 131, pp. 49-66
Closed Access | Times Cited: 38
Zhe Guo, Suhua Chen, Ling Zhou, et al.
Applied Mathematical Modelling (2024) Vol. 131, pp. 49-66
Closed Access | Times Cited: 38
Showing 1-25 of 38 citing articles:
Extended fractional transformation based S-box and applications in medical image encryption
Javed Ali, Muhammad Kamran Jamil, Rashad Ali, et al.
Multimedia Tools and Applications (2025)
Closed Access | Times Cited: 1
Javed Ali, Muhammad Kamran Jamil, Rashad Ali, et al.
Multimedia Tools and Applications (2025)
Closed Access | Times Cited: 1
Image encryption algorithm based on butterfly module and chaos
Yong Zhang
Mathematics and Computers in Simulation (2025)
Closed Access | Times Cited: 1
Yong Zhang
Mathematics and Computers in Simulation (2025)
Closed Access | Times Cited: 1
Delayed chaotic image encryption algorithm using cross-layer and DNA coding techniques
Chaofeng Zhao, Zhibo Zhai, Bo Zeng
Computer Standards & Interfaces (2025) Vol. 93, pp. 103974-103974
Closed Access | Times Cited: 1
Chaofeng Zhao, Zhibo Zhai, Bo Zeng
Computer Standards & Interfaces (2025) Vol. 93, pp. 103974-103974
Closed Access | Times Cited: 1
Adaptive reversible image-data hiding algorithm based on blockchain and zero watermarking
Guodong Ye, Zhuozhao Chen, Xiaoling Huang
Optics & Laser Technology (2024) Vol. 179, pp. 111380-111380
Closed Access | Times Cited: 7
Guodong Ye, Zhuozhao Chen, Xiaoling Huang
Optics & Laser Technology (2024) Vol. 179, pp. 111380-111380
Closed Access | Times Cited: 7
A novel 2D Log-Logistic–Sine chaotic map for image encryption
Mengmeng Wang, Xin-guang Song, Si-hang Liu, et al.
Nonlinear Dynamics (2024)
Closed Access | Times Cited: 5
Mengmeng Wang, Xin-guang Song, Si-hang Liu, et al.
Nonlinear Dynamics (2024)
Closed Access | Times Cited: 5
Model construction and image encryption application of chaotic system under the influence of memristor and unknown parameters
Jingfeng Jie, Qiyao Wang, Ping Zhang, et al.
Nonlinear Dynamics (2025)
Closed Access
Jingfeng Jie, Qiyao Wang, Ping Zhang, et al.
Nonlinear Dynamics (2025)
Closed Access
Encryption of a large-sized image with single exposure in the scattering-imaging-based encryption scheme
Yi Qin, Y Li, Qiong Gong, et al.
Optics & Laser Technology (2025) Vol. 184, pp. 112498-112498
Closed Access
Yi Qin, Y Li, Qiong Gong, et al.
Optics & Laser Technology (2025) Vol. 184, pp. 112498-112498
Closed Access
A quantum reversible color-to-grayscale conversion scheme via image encryption based on true random numbers and two-dimensional quantum walks
Nianqiao Li, Zhenjun Tang
Signal Processing (2025) Vol. 233, pp. 109949-109949
Closed Access
Nianqiao Li, Zhenjun Tang
Signal Processing (2025) Vol. 233, pp. 109949-109949
Closed Access
Invisible and robust watermarking model based on hierarchical residual fusion multi-scale convolution
Jiale Zou, Mingxuan Chen, Li‐Hua Gong
Neurocomputing (2024) Vol. 614, pp. 128834-128834
Closed Access | Times Cited: 4
Jiale Zou, Mingxuan Chen, Li‐Hua Gong
Neurocomputing (2024) Vol. 614, pp. 128834-128834
Closed Access | Times Cited: 4
Visually secure multiple image encryption scheme based on the newly chaotic map and compression sensing
Yifan Wang, Xiaoli Qin, Yanzhao Tian
Physica Scripta (2025) Vol. 100, Iss. 3, pp. 035211-035211
Closed Access
Yifan Wang, Xiaoli Qin, Yanzhao Tian
Physica Scripta (2025) Vol. 100, Iss. 3, pp. 035211-035211
Closed Access
A chaotic digital signature algorithm based on a dynamic substitution box
Rolando Flores-Carapia, Víctor Manuel Silva-García, Manuel Alejandro Cardona-López, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Rolando Flores-Carapia, Víctor Manuel Silva-García, Manuel Alejandro Cardona-López, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
A novel multi-color image compression encryption algorithm based on the reconstruction coefficient matrix and DNA point mutation operation
Meng Tang, Guo Du, Yanping Lin
Expert Systems with Applications (2025) Vol. 270, pp. 126620-126620
Closed Access
Meng Tang, Guo Du, Yanping Lin
Expert Systems with Applications (2025) Vol. 270, pp. 126620-126620
Closed Access
Facial image encryption scheme based on improved 4-D hyperchaotic system
Xuncai Zhang, Min Liu, Ying Niu
The Journal of Supercomputing (2025) Vol. 81, Iss. 3
Closed Access
Xuncai Zhang, Min Liu, Ying Niu
The Journal of Supercomputing (2025) Vol. 81, Iss. 3
Closed Access
A High‐Security Chaotic Encryption Model for Biomedical Image Protection
K V Sudheesh, S. Benaka Santhosha, Kiran Kiran, et al.
Security and Privacy (2025) Vol. 8, Iss. 2
Open Access
K V Sudheesh, S. Benaka Santhosha, Kiran Kiran, et al.
Security and Privacy (2025) Vol. 8, Iss. 2
Open Access
A Novel Lightweight Image Cryptographic Algorithm via Substitution‐Permutation Methods
T. C. S. M. Gupta, Arvind Selwal, Ajay Kumar Sharma
Security and Privacy (2025) Vol. 8, Iss. 2
Closed Access
T. C. S. M. Gupta, Arvind Selwal, Ajay Kumar Sharma
Security and Privacy (2025) Vol. 8, Iss. 2
Closed Access
New 2D hyperchaotic Cubic-Tent map and improved 3D Hilbert diffusion for image encryption
Xinli Xu, Xin-guang Song, Si-hang Liu, et al.
Applied Intelligence (2025) Vol. 55, Iss. 7
Closed Access
Xinli Xu, Xin-guang Song, Si-hang Liu, et al.
Applied Intelligence (2025) Vol. 55, Iss. 7
Closed Access
A data hiding scheme in encrypted images using non-degenerate chaotic system and hybrid coding
Chunhui Ye, Xiaojun Tong, Miao Zhang, et al.
Nonlinear Dynamics (2025)
Closed Access
Chunhui Ye, Xiaojun Tong, Miao Zhang, et al.
Nonlinear Dynamics (2025)
Closed Access
Enhanced quantum image encryption using DNA–QTRNG and Sattolo-RQFT shuffling
T. S. Gururaja, Padmapriya Pravinkumar
The Journal of Supercomputing (2025) Vol. 81, Iss. 5
Closed Access
T. S. Gururaja, Padmapriya Pravinkumar
The Journal of Supercomputing (2025) Vol. 81, Iss. 5
Closed Access
Image Encryption Algorithm Based on the Fractional Order Neural Network
Yinghong Cao, Linian Wang, Kaihua Wang, et al.
IEEE Access (2024) Vol. 12, pp. 128179-128186
Open Access | Times Cited: 3
Yinghong Cao, Linian Wang, Kaihua Wang, et al.
IEEE Access (2024) Vol. 12, pp. 128179-128186
Open Access | Times Cited: 3
A novel multi-layer image encryption algorithm based on 2D drop-wave function
Xingbin Liu, Jing Yang
Nonlinear Dynamics (2024)
Closed Access | Times Cited: 3
Xingbin Liu, Jing Yang
Nonlinear Dynamics (2024)
Closed Access | Times Cited: 3
Image encryption and authentication scheme based on computational ghost imaging and lifting wavelet transform
Meng-Ke Miao, Li-Hua Gong, Yu‐Jin Zhang, et al.
Optics and Lasers in Engineering (2024) Vol. 184, pp. 108560-108560
Closed Access | Times Cited: 2
Meng-Ke Miao, Li-Hua Gong, Yu‐Jin Zhang, et al.
Optics and Lasers in Engineering (2024) Vol. 184, pp. 108560-108560
Closed Access | Times Cited: 2
Multi-medical image protection: compression–encryption scheme based on TLNN and mask cubes
Linlin Tan, Yinghong Cao, Santo Banerjee, et al.
The Journal of Supercomputing (2024) Vol. 81, Iss. 1
Closed Access | Times Cited: 2
Linlin Tan, Yinghong Cao, Santo Banerjee, et al.
The Journal of Supercomputing (2024) Vol. 81, Iss. 1
Closed Access | Times Cited: 2
A fusion-domain intelligent blind color image watermarking scheme using graph-based transform
Qingtang Su, Fangxu Hu, Xiaojie Tian, et al.
Optics & Laser Technology (2024) Vol. 177, pp. 111191-111191
Closed Access | Times Cited: 1
Qingtang Su, Fangxu Hu, Xiaojie Tian, et al.
Optics & Laser Technology (2024) Vol. 177, pp. 111191-111191
Closed Access | Times Cited: 1
Cross-Channel Color Image Encryption Scheme Based on Discrete Memristive Coupled Neurons and DWT Compression
Yinghong Cao, Chang Cai, Xianying Xu, et al.
Electronics (2024) Vol. 13, Iss. 13, pp. 2647-2647
Open Access | Times Cited: 1
Yinghong Cao, Chang Cai, Xianying Xu, et al.
Electronics (2024) Vol. 13, Iss. 13, pp. 2647-2647
Open Access | Times Cited: 1
A lossless probabilistic image encryption algorithm based on QSD decomposition and matrix transformations
Oussama Harkati, Lemnouar Noui, Assia Beloucif
International Journal of Computers and Applications (2024) Vol. 46, Iss. 10, pp. 868-879
Closed Access | Times Cited: 1
Oussama Harkati, Lemnouar Noui, Assia Beloucif
International Journal of Computers and Applications (2024) Vol. 46, Iss. 10, pp. 868-879
Closed Access | Times Cited: 1