
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Comparative study of metaheuristic optimization algorithms for image steganography based on discrete Fourier transform domain
Anna Melman, Oleg Evsutin
Applied Soft Computing (2022) Vol. 132, pp. 109847-109847
Closed Access | Times Cited: 22
Anna Melman, Oleg Evsutin
Applied Soft Computing (2022) Vol. 132, pp. 109847-109847
Closed Access | Times Cited: 22
Showing 22 citing articles:
Electric eel foraging optimization: A new bio-inspired optimizer for engineering applications
Weiguo Zhao, Liying Wang, Zhenxing Zhang, et al.
Expert Systems with Applications (2023) Vol. 238, pp. 122200-122200
Closed Access | Times Cited: 118
Weiguo Zhao, Liying Wang, Zhenxing Zhang, et al.
Expert Systems with Applications (2023) Vol. 238, pp. 122200-122200
Closed Access | Times Cited: 118
Black-winged kite algorithm: a nature-inspired meta-heuristic for solving benchmark functions and engineering problems
Jun Wang, Wenchuan Wang, Xiao-xue Hu, et al.
Artificial Intelligence Review (2024) Vol. 57, Iss. 4
Open Access | Times Cited: 83
Jun Wang, Wenchuan Wang, Xiao-xue Hu, et al.
Artificial Intelligence Review (2024) Vol. 57, Iss. 4
Open Access | Times Cited: 83
Hybrid beluga whale optimization algorithm with multi-strategy for functions and engineering optimization problems
Jiaxu Huang, Haiqing Hu
Journal Of Big Data (2024) Vol. 11, Iss. 1
Open Access | Times Cited: 23
Jiaxu Huang, Haiqing Hu
Journal Of Big Data (2024) Vol. 11, Iss. 1
Open Access | Times Cited: 23
Frequency-domain image encryption based on IWT and 3D S-box
Heping Wen, Zhaoyang Feng, Chixin Bai, et al.
Physica Scripta (2024) Vol. 99, Iss. 5, pp. 055254-055254
Closed Access | Times Cited: 7
Heping Wen, Zhaoyang Feng, Chixin Bai, et al.
Physica Scripta (2024) Vol. 99, Iss. 5, pp. 055254-055254
Closed Access | Times Cited: 7
Dynamic RNA Coding Color Image Cipher Based on Chain Feedback Structure
Heping Wen, S. H. Kang, Zhuxi Wu, et al.
Mathematics (2023) Vol. 11, Iss. 14, pp. 3133-3133
Open Access | Times Cited: 20
Heping Wen, S. H. Kang, Zhuxi Wu, et al.
Mathematics (2023) Vol. 11, Iss. 14, pp. 3133-3133
Open Access | Times Cited: 20
Exploring the future application of UAVs: Face image privacy protection scheme based on chaos and DNA cryptography
Heping Wen, Zhiyu Xie, Zhuxi Wu, et al.
Journal of King Saud University - Computer and Information Sciences (2023) Vol. 36, Iss. 1, pp. 101871-101871
Open Access | Times Cited: 15
Heping Wen, Zhiyu Xie, Zhuxi Wu, et al.
Journal of King Saud University - Computer and Information Sciences (2023) Vol. 36, Iss. 1, pp. 101871-101871
Open Access | Times Cited: 15
Optimal Control and Optimization of Grid-Connected PV and Wind Turbine Hybrid Systems Using Electric Eel Foraging Optimization Algorithms
Saad A. Mohamed Abdelwahab, Ali M. El‐Rifaie, Hossam Youssef Hegazy, et al.
Sensors (2024) Vol. 24, Iss. 7, pp. 2354-2354
Open Access | Times Cited: 6
Saad A. Mohamed Abdelwahab, Ali M. El‐Rifaie, Hossam Youssef Hegazy, et al.
Sensors (2024) Vol. 24, Iss. 7, pp. 2354-2354
Open Access | Times Cited: 6
Boosted Nutcracker optimizer and Chaos Game Optimization with Cross Vision Transformer for medical image classification
Ahmed F. Mohamed, Amal I. Saba, Mohamed K. Hassan, et al.
Egyptian Informatics Journal (2024) Vol. 26, pp. 100457-100457
Open Access | Times Cited: 5
Ahmed F. Mohamed, Amal I. Saba, Mohamed K. Hassan, et al.
Egyptian Informatics Journal (2024) Vol. 26, pp. 100457-100457
Open Access | Times Cited: 5
Metaheuristics for pruning convolutional neural networks: A comparative study
Vikas Palakonda, Jamshid Tursunboev, Jae‐Mo Kang, et al.
Expert Systems with Applications (2025), pp. 126326-126326
Closed Access
Vikas Palakonda, Jamshid Tursunboev, Jae‐Mo Kang, et al.
Expert Systems with Applications (2025), pp. 126326-126326
Closed Access
A secure image steganography based on LSB technique and 2D chaotic maps
Noura Khalil, Amany Sarhan, Mahmoud A. M. Alshewimy
Computers & Electrical Engineering (2024) Vol. 119, pp. 109566-109566
Closed Access | Times Cited: 3
Noura Khalil, Amany Sarhan, Mahmoud A. M. Alshewimy
Computers & Electrical Engineering (2024) Vol. 119, pp. 109566-109566
Closed Access | Times Cited: 3
Image watermarking based on a ratio of DCT coefficient sums using a gradient-based optimizer
Anna Melman, Oleg Evsutin
Computers & Electrical Engineering (2024) Vol. 117, pp. 109271-109271
Closed Access | Times Cited: 2
Anna Melman, Oleg Evsutin
Computers & Electrical Engineering (2024) Vol. 117, pp. 109271-109271
Closed Access | Times Cited: 2
Secure information embedding in images with hybrid firefly algorithm
Sahil Nokhwal, Chandrasekharan Manoj, Ankit Chaudhary
Neural Computing and Applications (2024)
Closed Access | Times Cited: 2
Sahil Nokhwal, Chandrasekharan Manoj, Ankit Chaudhary
Neural Computing and Applications (2024)
Closed Access | Times Cited: 2
A fusion-domain intelligent blind color image watermarking scheme using graph-based transform
Qingtang Su, Fangxu Hu, Xiaojie Tian, et al.
Optics & Laser Technology (2024) Vol. 177, pp. 111191-111191
Closed Access | Times Cited: 1
Qingtang Su, Fangxu Hu, Xiaojie Tian, et al.
Optics & Laser Technology (2024) Vol. 177, pp. 111191-111191
Closed Access | Times Cited: 1
High-Fidelity Steganography: A Covert Parity Bit Model-Based Approach
Tamer Rabie, Mohammed Baziyad, Ibrahim Kamel
Algorithms (2024) Vol. 17, Iss. 8, pp. 328-328
Open Access | Times Cited: 1
Tamer Rabie, Mohammed Baziyad, Ibrahim Kamel
Algorithms (2024) Vol. 17, Iss. 8, pp. 328-328
Open Access | Times Cited: 1
Face privacy protection scheme by security-enhanced encryption structure and nonlinear dynamics
Zhiyu Xie, Yiting Lin, Tengyu Liu, et al.
iScience (2024) Vol. 27, Iss. 9, pp. 110768-110768
Open Access | Times Cited: 1
Zhiyu Xie, Yiting Lin, Tengyu Liu, et al.
iScience (2024) Vol. 27, Iss. 9, pp. 110768-110768
Open Access | Times Cited: 1
Dynamic feedback bit-level image privacy protection based on chaos and information hiding
Jinlong Zhang, Heping Wen
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access
Jinlong Zhang, Heping Wen
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access
An image steganography algorithm via a compression and chaotic maps
M. Abdelhakm, Ahmed Salah, Sameh Askar, et al.
AIP Advances (2024) Vol. 14, Iss. 4
Open Access
M. Abdelhakm, Ahmed Salah, Sameh Askar, et al.
AIP Advances (2024) Vol. 14, Iss. 4
Open Access
The Role of Deep Learning Innovations With CNNs and GANs in Steganography
Harpreet Kaur, Chiranji Lal Chowdhary
Advances in information security, privacy, and ethics book series (2024), pp. 75-106
Closed Access
Harpreet Kaur, Chiranji Lal Chowdhary
Advances in information security, privacy, and ethics book series (2024), pp. 75-106
Closed Access
Optimizing energy hubs with a focus on ice energy storage: a strategic approach for managing cooling, thermal, and electrical loads via an advanced slime mold algorithm
Tao Hai, Hayder Oleiwi Shami, S Saleh, et al.
International Journal of Low-Carbon Technologies (2024) Vol. 19, pp. 2568-2579
Open Access
Tao Hai, Hayder Oleiwi Shami, S Saleh, et al.
International Journal of Low-Carbon Technologies (2024) Vol. 19, pp. 2568-2579
Open Access
Bio-inspired disease prediction: harnessing the power of electric eel foraging optimization algorithm with machine learning for heart disease prediction
Geetha Narasimhan, Akila Victor
Artificial Intelligence Review (2024) Vol. 57, Iss. 12
Open Access
Geetha Narasimhan, Akila Victor
Artificial Intelligence Review (2024) Vol. 57, Iss. 12
Open Access
Large-capacity information hiding method based on a chunking matrix
Zhang Ju, Tao Zhang, Yanpeng Xiang, et al.
Journal of Intelligent & Fuzzy Systems (2023) Vol. 46, Iss. 1, pp. 2727-2741
Closed Access
Zhang Ju, Tao Zhang, Yanpeng Xiang, et al.
Journal of Intelligent & Fuzzy Systems (2023) Vol. 46, Iss. 1, pp. 2727-2741
Closed Access
A transform domain communication method based on combinatorial basis function
Beiming Li, Jiahao Xu
(2023), pp. 101-105
Closed Access
Beiming Li, Jiahao Xu
(2023), pp. 101-105
Closed Access