
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Visually meaningful image encryption scheme based on new-designed chaotic map and random scrambling diffusion strategy
Xingyuan Wang, Cheng Liu, Donghua Jiang
Chaos Solitons & Fractals (2022) Vol. 164, pp. 112625-112625
Closed Access | Times Cited: 36
Xingyuan Wang, Cheng Liu, Donghua Jiang
Chaos Solitons & Fractals (2022) Vol. 164, pp. 112625-112625
Closed Access | Times Cited: 36
Showing 1-25 of 36 citing articles:
A comprehensive survey on image encryption: Taxonomy, challenges, and future directions
Morteza SaberiKamarposhti, Amirabbas Ghorbani, Mehdi Yadollahi
Chaos Solitons & Fractals (2023) Vol. 178, pp. 114361-114361
Closed Access | Times Cited: 52
Morteza SaberiKamarposhti, Amirabbas Ghorbani, Mehdi Yadollahi
Chaos Solitons & Fractals (2023) Vol. 178, pp. 114361-114361
Closed Access | Times Cited: 52
Exploiting one-dimensional exponential Chebyshev chaotic map and matching embedding for visually meaningful image encryption
Guoqiang Long, Xiuli Chai, Zhihua Gan, et al.
Chaos Solitons & Fractals (2023) Vol. 176, pp. 114111-114111
Closed Access | Times Cited: 29
Guoqiang Long, Xiuli Chai, Zhihua Gan, et al.
Chaos Solitons & Fractals (2023) Vol. 176, pp. 114111-114111
Closed Access | Times Cited: 29
Enhancing Image Encryption with the Kronecker xor Product, the Hill Cipher, and the Sigmoid Logistic Map
Dani Elias Mfungo, Xianping Fu, Xingyuan Wang, et al.
Applied Sciences (2023) Vol. 13, Iss. 6, pp. 4034-4034
Open Access | Times Cited: 23
Dani Elias Mfungo, Xianping Fu, Xingyuan Wang, et al.
Applied Sciences (2023) Vol. 13, Iss. 6, pp. 4034-4034
Open Access | Times Cited: 23
An efficient Intra-Inter pixel encryption scheme to secure healthcare images for an IoT environment
Sachikanta Dash, Sasmita Padhy, S Anjali Devi, et al.
Expert Systems with Applications (2023) Vol. 231, pp. 120622-120622
Closed Access | Times Cited: 23
Sachikanta Dash, Sasmita Padhy, S Anjali Devi, et al.
Expert Systems with Applications (2023) Vol. 231, pp. 120622-120622
Closed Access | Times Cited: 23
Image Encryption Algorithms: A Survey of Design and Evaluation Metrics
Yousef Alghamdi, Arslan Munir
Journal of Cybersecurity and Privacy (2024) Vol. 4, Iss. 1, pp. 126-152
Open Access | Times Cited: 10
Yousef Alghamdi, Arslan Munir
Journal of Cybersecurity and Privacy (2024) Vol. 4, Iss. 1, pp. 126-152
Open Access | Times Cited: 10
An image encryption method based on improved Lorenz chaotic system and Galois field
Xuncai Zhang, Guanhe Liu, Chengye Zou
Applied Mathematical Modelling (2024) Vol. 131, pp. 535-558
Closed Access | Times Cited: 10
Xuncai Zhang, Guanhe Liu, Chengye Zou
Applied Mathematical Modelling (2024) Vol. 131, pp. 535-558
Closed Access | Times Cited: 10
Secured Quantum Image Communication Using New Two Dimensional Chaotic Map Based Encryption Methods
Sakshi Patel, V. Thanikaiselvan, Rengarajan Amirtharajan
International Journal of Theoretical Physics (2024) Vol. 63, Iss. 2
Closed Access | Times Cited: 8
Sakshi Patel, V. Thanikaiselvan, Rengarajan Amirtharajan
International Journal of Theoretical Physics (2024) Vol. 63, Iss. 2
Closed Access | Times Cited: 8
Image compression-hiding algorithm based on compressive sensing and integer wavelet transformation
Guodong Ye, Simin Du, Xiaoling Huang
Applied Mathematical Modelling (2023) Vol. 124, pp. 576-596
Closed Access | Times Cited: 15
Guodong Ye, Simin Du, Xiaoling Huang
Applied Mathematical Modelling (2023) Vol. 124, pp. 576-596
Closed Access | Times Cited: 15
A secure medical image encryption algorithm for IoMT Using a Quadratic-Sine Chaotic Map and pseudo-parallel confusion-diffusion mechanism
Ali Mansouri, Pin Sun, Congdong Lv, et al.
Expert Systems with Applications (2025) Vol. 270, pp. 126521-126521
Closed Access
Ali Mansouri, Pin Sun, Congdong Lv, et al.
Expert Systems with Applications (2025) Vol. 270, pp. 126521-126521
Closed Access
Visually secure multiple image encryption scheme based on the newly chaotic map and compression sensing
Yifan Wang, Xiaoli Qin, Yanzhao Tian
Physica Scripta (2025) Vol. 100, Iss. 3, pp. 035211-035211
Closed Access
Yifan Wang, Xiaoli Qin, Yanzhao Tian
Physica Scripta (2025) Vol. 100, Iss. 3, pp. 035211-035211
Closed Access
Design of a new multi-wing chaotic system and its application in color image encryption
Siyang Liu, Xinlei An, Yue Wang, et al.
Optik (2023) Vol. 290, pp. 171334-171334
Closed Access | Times Cited: 10
Siyang Liu, Xinlei An, Yue Wang, et al.
Optik (2023) Vol. 290, pp. 171334-171334
Closed Access | Times Cited: 10
Fast Encryption Algorithm Based on Chaotic System and Cyclic Shift in Integer Wavelet Domain
Yuanmin Li, Yang Deng, Mingjie Jiang, et al.
Fractal and Fractional (2024) Vol. 8, Iss. 2, pp. 75-75
Open Access | Times Cited: 3
Yuanmin Li, Yang Deng, Mingjie Jiang, et al.
Fractal and Fractional (2024) Vol. 8, Iss. 2, pp. 75-75
Open Access | Times Cited: 3
Exploiting 2D-SDMCHM and matching embedding driven by flag-shaped hexagon prediction for visually meaningful medical image cryptosystem
Xiuli Chai, Guangyu Shang, Binjie Wang, et al.
Chaos Solitons & Fractals (2024) Vol. 185, pp. 115153-115153
Closed Access | Times Cited: 3
Xiuli Chai, Guangyu Shang, Binjie Wang, et al.
Chaos Solitons & Fractals (2024) Vol. 185, pp. 115153-115153
Closed Access | Times Cited: 3
MieWC: Medical image encryption using wavelet transform and multiple chaotic maps
Kunal Demla, Ashima Anand
Security and Privacy (2024) Vol. 7, Iss. 3
Closed Access | Times Cited: 2
Kunal Demla, Ashima Anand
Security and Privacy (2024) Vol. 7, Iss. 3
Closed Access | Times Cited: 2
A fast visually meaningful image encryption algorithm based on compressive sensing and joint diffusion and scrambling
Duzhong Zhang, Chao Yan, Yun Duan, et al.
Multimedia Tools and Applications (2024) Vol. 83, Iss. 28, pp. 70693-70725
Closed Access | Times Cited: 2
Duzhong Zhang, Chao Yan, Yun Duan, et al.
Multimedia Tools and Applications (2024) Vol. 83, Iss. 28, pp. 70693-70725
Closed Access | Times Cited: 2
Drive–response asymptotic shape synchronization for a class of two-dimensional chaotic systems and its application in image encryption
Yuanyuan Huang, H. X. Huang, Yunchang Huang, et al.
Physica D Nonlinear Phenomena (2024) Vol. 463, pp. 134162-134162
Closed Access | Times Cited: 2
Yuanyuan Huang, H. X. Huang, Yunchang Huang, et al.
Physica D Nonlinear Phenomena (2024) Vol. 463, pp. 134162-134162
Closed Access | Times Cited: 2
Asymptotic shape synchronization in three-dimensional chaotic systems and its application in color image encryption
Yuanyuan Huang, H. X. Huang, Yunchang Huang, et al.
Chaos Solitons & Fractals (2024) Vol. 184, pp. 114945-114945
Closed Access | Times Cited: 2
Yuanyuan Huang, H. X. Huang, Yunchang Huang, et al.
Chaos Solitons & Fractals (2024) Vol. 184, pp. 114945-114945
Closed Access | Times Cited: 2
Visually secure traffic image encryption scheme using new two-dimensional Sigmoid-type memristive chaotic map and Laguerre transform embedding
Lajie Wang, Lichang Xu, Guoqiang Long, et al.
Physica Scripta (2024) Vol. 99, Iss. 7, pp. 075266-075266
Closed Access | Times Cited: 2
Lajie Wang, Lichang Xu, Guoqiang Long, et al.
Physica Scripta (2024) Vol. 99, Iss. 7, pp. 075266-075266
Closed Access | Times Cited: 2
Explore the potential of deep learning and hyperchaotic map in the meaningful visual image encryption scheme
Chen Wei, Yichuan Wang, Yeqiu Xiao, et al.
IET Image Processing (2023) Vol. 17, Iss. 11, pp. 3235-3257
Open Access | Times Cited: 5
Chen Wei, Yichuan Wang, Yeqiu Xiao, et al.
IET Image Processing (2023) Vol. 17, Iss. 11, pp. 3235-3257
Open Access | Times Cited: 5
Verifiable visually meaningful image encryption algorithm based on compressive sensing and (t, n)-threshold secret sharing
Yu‐Guang Yang, Tao Wang, Yi‐Hua Zhou, et al.
Physica Scripta (2023) Vol. 99, Iss. 2, pp. 025204-025204
Closed Access | Times Cited: 4
Yu‐Guang Yang, Tao Wang, Yi‐Hua Zhou, et al.
Physica Scripta (2023) Vol. 99, Iss. 2, pp. 025204-025204
Closed Access | Times Cited: 4
Integration of a novel 3D chaotic map with ELSS and novel cross-border pixel exchange strategy for secure image communication
Sajid Khan, Hao Peng, Zhaoquan Gu, et al.
Complex & Intelligent Systems (2024)
Open Access | Times Cited: 1
Sajid Khan, Hao Peng, Zhaoquan Gu, et al.
Complex & Intelligent Systems (2024)
Open Access | Times Cited: 1
A fast color image encryption scheme based on the new chaotic structure and dynamic strong S-boxes
Mingjie Zhao, Yi‐Bo Luo, Zheng Yuan, et al.
Nonlinear Dynamics (2024)
Closed Access | Times Cited: 1
Mingjie Zhao, Yi‐Bo Luo, Zheng Yuan, et al.
Nonlinear Dynamics (2024)
Closed Access | Times Cited: 1
Medical Image Encryption using Biometric Image Texture Fusion
Zhaoyang Liu, Ru Xue
Journal of Medical Systems (2023) Vol. 47, Iss. 1
Closed Access | Times Cited: 4
Zhaoyang Liu, Ru Xue
Journal of Medical Systems (2023) Vol. 47, Iss. 1
Closed Access | Times Cited: 4
Image transformation based on optical reservoir computing for image security
Xiao Jiang, Yiyuan Xie, Bocheng Liu, et al.
Expert Systems with Applications (2023) Vol. 237, pp. 121376-121376
Closed Access | Times Cited: 3
Xiao Jiang, Yiyuan Xie, Bocheng Liu, et al.
Expert Systems with Applications (2023) Vol. 237, pp. 121376-121376
Closed Access | Times Cited: 3
Visual image encryption algorithm based on compressed sensing and 2D cosine -type logistic map
Qi Ren, Lin Teng, Donghua Jiang, et al.
Physica Scripta (2023) Vol. 98, Iss. 9, pp. 095212-095212
Closed Access | Times Cited: 2
Qi Ren, Lin Teng, Donghua Jiang, et al.
Physica Scripta (2023) Vol. 98, Iss. 9, pp. 095212-095212
Closed Access | Times Cited: 2