
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Novel chaotic colour image cryptosystem with deep learning
Shuang Zhou, Zhipeng Zhao, Xingyuan Wang
Chaos Solitons & Fractals (2022) Vol. 161, pp. 112380-112380
Closed Access | Times Cited: 49
Shuang Zhou, Zhipeng Zhao, Xingyuan Wang
Chaos Solitons & Fractals (2022) Vol. 161, pp. 112380-112380
Closed Access | Times Cited: 49
Showing 1-25 of 49 citing articles:
EFR-CSTP: Encryption for face recognition based on the chaos and semi-tensor product theory
Suo Gao, Rui Wu, Xingyuan Wang, et al.
Information Sciences (2022) Vol. 621, pp. 766-781
Closed Access | Times Cited: 74
Suo Gao, Rui Wu, Xingyuan Wang, et al.
Information Sciences (2022) Vol. 621, pp. 766-781
Closed Access | Times Cited: 74
A new 2D-HELS hyperchaotic map and its application on image encryption using RNA operation and dynamic confusion
Mingxu Wang, Xianping Fu, Lin Teng, et al.
Chaos Solitons & Fractals (2024) Vol. 183, pp. 114959-114959
Closed Access | Times Cited: 21
Mingxu Wang, Xianping Fu, Lin Teng, et al.
Chaos Solitons & Fractals (2024) Vol. 183, pp. 114959-114959
Closed Access | Times Cited: 21
Image encryption scheme based on improved four-dimensional chaotic system and evolutionary operators
Ying Niu, Hangyu Zhou, Xuncai Zhang
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 20
Ying Niu, Hangyu Zhou, Xuncai Zhang
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 20
Enhancing Secure Image Transmission Through Advanced Encryption Techniques
Syam Kumar Duggirala, M. Sathya, Nithya Poupathy
International Journal of Computational and Experimental Science and Engineering (2025) Vol. 11, Iss. 1
Open Access | Times Cited: 4
Syam Kumar Duggirala, M. Sathya, Nithya Poupathy
International Journal of Computational and Experimental Science and Engineering (2025) Vol. 11, Iss. 1
Open Access | Times Cited: 4
Exploiting one-dimensional exponential Chebyshev chaotic map and matching embedding for visually meaningful image encryption
Guoqiang Long, Xiuli Chai, Zhihua Gan, et al.
Chaos Solitons & Fractals (2023) Vol. 176, pp. 114111-114111
Closed Access | Times Cited: 29
Guoqiang Long, Xiuli Chai, Zhihua Gan, et al.
Chaos Solitons & Fractals (2023) Vol. 176, pp. 114111-114111
Closed Access | Times Cited: 29
A Novel Medical Image Encryption Scheme Based on Deep Learning Feature Encoding and Decoding
Bofeng Long, Zhong Chen, Tongzhe Liu, et al.
IEEE Access (2024) Vol. 12, pp. 38382-38398
Open Access | Times Cited: 7
Bofeng Long, Zhong Chen, Tongzhe Liu, et al.
IEEE Access (2024) Vol. 12, pp. 38382-38398
Open Access | Times Cited: 7
A new 2D cross hyperchaotic Sine-modulation-Logistic map and its application in bit-level image encryption
Mingxu Wang, Lin Teng, Wenjie Zhou, et al.
Expert Systems with Applications (2024), pp. 125328-125328
Closed Access | Times Cited: 7
Mingxu Wang, Lin Teng, Wenjie Zhou, et al.
Expert Systems with Applications (2024), pp. 125328-125328
Closed Access | Times Cited: 7
Multiple-image encryption scheme based on a new 2D hyperchaotic map with blurred pixels
Lili Zhou, Zeqin Lin, Fei Tan
Physica Scripta (2024) Vol. 99, Iss. 4, pp. 045247-045247
Closed Access | Times Cited: 6
Lili Zhou, Zeqin Lin, Fei Tan
Physica Scripta (2024) Vol. 99, Iss. 4, pp. 045247-045247
Closed Access | Times Cited: 6
New Framework of Robust Image Encryption
Lin Huang, Chuan Qin, Guorui Feng, et al.
ACM Transactions on Multimedia Computing Communications and Applications (2025)
Closed Access
Lin Huang, Chuan Qin, Guorui Feng, et al.
ACM Transactions on Multimedia Computing Communications and Applications (2025)
Closed Access
Image encryption algorithm based on V-shaped scanning and matrix multiplication
Jiao Sun, Xiaoqiang Zhang, C. H. Chen
Physica Scripta (2025) Vol. 100, Iss. 3, pp. 035218-035218
Closed Access
Jiao Sun, Xiaoqiang Zhang, C. H. Chen
Physica Scripta (2025) Vol. 100, Iss. 3, pp. 035218-035218
Closed Access
Event-based fixed-time synchronization of neural networks under DoS attack and its applications
Mengping Xing, Jianquan Lu, Jungang Lou, et al.
Neural Networks (2023) Vol. 166, pp. 622-633
Closed Access | Times Cited: 12
Mengping Xing, Jianquan Lu, Jungang Lou, et al.
Neural Networks (2023) Vol. 166, pp. 622-633
Closed Access | Times Cited: 12
A new approach based on artificial neural networks and chaos for designing deterministic random number generator and its application in image encryption
Youcef Alloun, Mohamed Salah Azzaz, Abdenour Kifouche
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 4
Youcef Alloun, Mohamed Salah Azzaz, Abdenour Kifouche
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 4
An image encryption algorithm based on a novel 4D hyperchaotic system and improved Knightâs Tour scrambling algorithm
X. Deng, Zhong Chen, Bofeng Long, et al.
Physica Scripta (2025) Vol. 100, Iss. 4, pp. 045208-045208
Closed Access
X. Deng, Zhong Chen, Bofeng Long, et al.
Physica Scripta (2025) Vol. 100, Iss. 4, pp. 045208-045208
Closed Access
Design and FPGA implementation of a novel cryptographic secure pseudo random number generator based on artificial neural networks and chaotic systems
Youcef Alloun, Abdenour Kifouche, Mohamed Salah Azzaz, et al.
Integration (2025), pp. 102388-102388
Closed Access
Youcef Alloun, Abdenour Kifouche, Mohamed Salah Azzaz, et al.
Integration (2025), pp. 102388-102388
Closed Access
Color image encryption based on 2D enhanced hyperchaotic logistic-sine map and two-way Josephus traversing
Mingxu Wang, Xingyuan Wang, Chunpeng Wang, et al.
Digital Signal Processing (2022) Vol. 132, pp. 103818-103818
Closed Access | Times Cited: 21
Mingxu Wang, Xingyuan Wang, Chunpeng Wang, et al.
Digital Signal Processing (2022) Vol. 132, pp. 103818-103818
Closed Access | Times Cited: 21
Artificial Neural Network Chaotic PRNG and simple encryption on FPGA
Bishoy K. Sharobim, Mohammed H. Yacoub, Wafaa S. Sayed, et al.
Engineering Applications of Artificial Intelligence (2023) Vol. 126, pp. 106888-106888
Closed Access | Times Cited: 12
Bishoy K. Sharobim, Mohammed H. Yacoub, Wafaa S. Sayed, et al.
Engineering Applications of Artificial Intelligence (2023) Vol. 126, pp. 106888-106888
Closed Access | Times Cited: 12
An efficient S-box design scheme for image encryption based on the combination of a coset graph and a matrix transformer
Asima Razzaque, Abdul Razaq, Sheikh Muhammad Farooq, et al.
Electronic Research Archive (2023) Vol. 31, Iss. 5, pp. 2708-2732
Open Access | Times Cited: 10
Asima Razzaque, Abdul Razaq, Sheikh Muhammad Farooq, et al.
Electronic Research Archive (2023) Vol. 31, Iss. 5, pp. 2708-2732
Open Access | Times Cited: 10
New image encryption algorithm based on hyperchaotic 3D-IHAL and a hybrid cryptosystem
Suo Gao, Songbo Liu, Xingyuan Wang, et al.
Applied Intelligence (2023) Vol. 53, Iss. 22, pp. 27826-27843
Closed Access | Times Cited: 9
Suo Gao, Songbo Liu, Xingyuan Wang, et al.
Applied Intelligence (2023) Vol. 53, Iss. 22, pp. 27826-27843
Closed Access | Times Cited: 9
SE-NDEND: A novel symmetric watermarking framework with neural network-based chaotic encryption for Internet of Medical Things
Xiuli Chai, Zongwei Tang, Zhihua Gan, et al.
Biomedical Signal Processing and Control (2023) Vol. 90, pp. 105877-105877
Closed Access | Times Cited: 9
Xiuli Chai, Zongwei Tang, Zhihua Gan, et al.
Biomedical Signal Processing and Control (2023) Vol. 90, pp. 105877-105877
Closed Access | Times Cited: 9
Novel image compression-then-encryption scheme based on 2D cross coupled map lattice and compressive sensing
Mingxu Wang, Xingyuan Wang, Chunpeng Wang, et al.
Multimedia Tools and Applications (2023) Vol. 83, Iss. 1, pp. 1891-1917
Closed Access | Times Cited: 7
Mingxu Wang, Xingyuan Wang, Chunpeng Wang, et al.
Multimedia Tools and Applications (2023) Vol. 83, Iss. 1, pp. 1891-1917
Closed Access | Times Cited: 7
A novel image encryption scheme based on ccnn
Xiangzi Zhang, Lina Sun, Xicong Geng, et al.
Physica Scripta (2024) Vol. 99, Iss. 2, pp. 025253-025253
Open Access | Times Cited: 2
Xiangzi Zhang, Lina Sun, Xicong Geng, et al.
Physica Scripta (2024) Vol. 99, Iss. 2, pp. 025253-025253
Open Access | Times Cited: 2
A New 2D Cross Hyperchaotic Sine-Modulation-Logistic Map and Its Application in Bit-Level Image Encryption
Mingxu Wang, Xianping Fu, Lin Teng, et al.
(2024)
Open Access | Times Cited: 2
Mingxu Wang, Xianping Fu, Lin Teng, et al.
(2024)
Open Access | Times Cited: 2
A two-parameter extended logistic chaotic map for modern image cryptosystems
Abdelhakim Latoui, Mohamed El Hossine Daachi
Digital Signal Processing (2024) Vol. 148, pp. 104463-104463
Closed Access | Times Cited: 2
Abdelhakim Latoui, Mohamed El Hossine Daachi
Digital Signal Processing (2024) Vol. 148, pp. 104463-104463
Closed Access | Times Cited: 2
SORCHIC: A Hybrid Image Cipher for IoT Applications Using Second Order Reversible Cellular Automata
B. Vijaya Bhaskara Rao, Umashankar Rawat, Satyabrata Roy, et al.
IEEE Access (2024) Vol. 12, pp. 146147-146159
Open Access | Times Cited: 2
B. Vijaya Bhaskara Rao, Umashankar Rawat, Satyabrata Roy, et al.
IEEE Access (2024) Vol. 12, pp. 146147-146159
Open Access | Times Cited: 2
Deep learning-based image encryption techniques: Fundamentals, current trends, challenges and future directions
Om Prakash Singh, Kedar Nath Singh, Amit Kumar Singh, et al.
Neurocomputing (2024) Vol. 612, pp. 128714-128714
Closed Access | Times Cited: 2
Om Prakash Singh, Kedar Nath Singh, Amit Kumar Singh, et al.
Neurocomputing (2024) Vol. 612, pp. 128714-128714
Closed Access | Times Cited: 2