OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

AuSR2: Image watermarking technique for authentication and self-recovery with image texture preservation
Afrig Aminuddin, Ferda Ernawan
Computers & Electrical Engineering (2022) Vol. 102, pp. 108207-108207
Closed Access | Times Cited: 23

Showing 23 citing articles:

An Efficient Semi-blind Watermarking Technique Based on ACM and DWT for Mitigating Integrity Attacks
Brahim Ferik, Lakhdar Laimeche, Abdallah Meraoumia, et al.
Arabian Journal for Science and Engineering (2025)
Closed Access | Times Cited: 1

Secure and reversible fragile watermarking for accurate authentication and tamper localization in medical images
Riadh Bouarroudj, Feryel Souami, Fatma Zohra Bellala, et al.
Computers & Electrical Engineering (2025) Vol. 123, pp. 110072-110072
Closed Access

Software-Defined Networking (SDN): A Review
Quadri Waseem, Wan Isni Sofiah Wan Din, Afrig Aminuddin, et al.
2022 5th International Conference on Information and Communications Technology (ICOIACT) (2022), pp. 30-35
Closed Access | Times Cited: 17

A blind recovery technique with integer wavelet transforms in image watermarking
Ferda Ernawan, Afrig Aminuddin, Suraya Abu Bakar
Engineering Science and Technology an International Journal (2023) Vol. 48, pp. 101586-101586
Open Access | Times Cited: 7

FGDB‐MLPP: A fine‐grained data‐sharing scheme with blockchain based on multi‐level privacy protection
Junyu Lin, Libo Feng, Jinli Wang, et al.
IET Communications (2024) Vol. 18, Iss. 4, pp. 309-321
Open Access | Times Cited: 2

RFDB: Robust watermarking scheme with Fuzzy-DnCNN using blockchain technique for identity verification
Divyanshu Awasthi, Priyank Khare, Vinay Kumar Srivastava
Expert Systems with Applications (2024) Vol. 255, pp. 124554-124554
Closed Access | Times Cited: 2

Observation of Imbalance Tracer Study Data for Graduates Employability Prediction in Indonesia
Ferian Fauzi Abdulloh, Majid Rahardi, Afrig Aminuddin, et al.
International Journal of Advanced Computer Science and Applications (2022) Vol. 13, Iss. 8
Open Access | Times Cited: 11

Image authentication and recovery: Sudoku puzzle and MD5 hash algorithm based self-embedding fragile image watermarking method
Ayhan Renklier, Serkan Öztürk
Multimedia Tools and Applications (2023) Vol. 83, Iss. 5, pp. 13929-13951
Closed Access | Times Cited: 6

An edge inspired image watermarking approach using compass edge detector and LSB in cybersecurity
Zaid Bin Faheem, Danial Hanif, Farrukh Arslan, et al.
Computers & Electrical Engineering (2023) Vol. 111, pp. 108979-108979
Closed Access | Times Cited: 6

Sentiment Analysis of Review Sestyc Using Support Vector Machine, Naive Bayes, and Logistic Regression Algorithm
Barka Satya, Muhammad Hasan S J, Majid Rahardi, et al.
2022 5th International Conference on Information and Communications Technology (ICOIACT) (2022), pp. 188-193
Closed Access | Times Cited: 9

Predictive Models Using Supervised Neural Network for Pollutant Removal Efficiency in Petrochemical Wastewater Treatment
Varun Geetha Mohan, Al-Fahim Mubarak Ali, Mohamed Ariff Ameedeen, et al.
2022 5th International Conference on Information and Communications Technology (ICOIACT) (2022), pp. 116-121
Closed Access | Times Cited: 8

An unsolvable pixel reduced authentication method for color images with grayscale invariance
Xiaoyu Zhou, Wien Hong, Guangsong Yang, et al.
Journal of King Saud University - Computer and Information Sciences (2023) Vol. 35, Iss. 9, pp. 101726-101726
Open Access | Times Cited: 4

AuSR3: A new block mapping technique for image authentication and self-recovery to avoid the tamper coincidence problem
Afrig Aminuddin, Ferda Ernawan
Journal of King Saud University - Computer and Information Sciences (2023) Vol. 35, Iss. 9, pp. 101755-101755
Open Access | Times Cited: 4

Trade-off independent image watermarking using enhanced structured matrix decomposition
Ahmed Khan, KokSheik Wong, Vishnu Monn Baskaran
Multimedia Tools and Applications (2024)
Open Access | Times Cited: 1

Selection of Prospective Workers Using Profile Matching Algorithm on Crowdsourcing Platform
Ahmad Cucus, Luhur Bayu Aji, Al-Fahim Bin Mubarak Ali, et al.
2022 5th International Conference on Information and Communications Technology (ICOIACT) (2022), pp. 122-126
Closed Access | Times Cited: 7

AuCFSR: Authentication and Color Face Self-Recovery Using Novel 2D Hyperchaotic System and Deep Learning Models
Achraf Daoui, Mohamed Yamni, Torki Altameem, et al.
Sensors (2023) Vol. 23, Iss. 21, pp. 8957-8957
Open Access | Times Cited: 3

A 3D Cuboid Image Encryption Algorithm Based on Controlled Alternate Quantum Walk of Message Coding
Pai Liu, Shihua Zhou, Wei Qi Yan
Mathematics (2022) Vol. 10, Iss. 23, pp. 4441-4441
Open Access | Times Cited: 5

TCBR and TCBD: Evaluation metrics for tamper coincidence problem in fragile image watermarking
Afrig Aminuddin, Ferda Ernawan, Danakorn Nincarean, et al.
Engineering Science and Technology an International Journal (2024) Vol. 56, pp. 101790-101790
Open Access

Novel Integer Hahn Transform for Real-time Lossless Image Authentication in IoT: A 32-bit Microcontroller Implementation
Achraf Daoui, Mohamed Yamni, Paweł Pławiak, et al.
IEEE Access (2024) Vol. 12, pp. 131044-131064
Open Access

Securing Digital Images with Triple Watermarks: An Integer Wavelet Transform Approach
Bharathi Chidirala, Bibhudendra Acharya, Bijayananda Patnaik
(2024), pp. 1-6
Closed Access

A Covid-19 Positive Case Prediction and People Movement Restriction Classification
I Made Artha Agastya
International Journal of Advanced Computer Science and Applications (2022) Vol. 13, Iss. 8
Open Access | Times Cited: 2

Fragile watermarking for image authentication using dyadic walsh ordering
Prajanto Wahyu Adi, Adi Wibowo, Guruh Aryotejo, et al.
International Journal of Advances in Intelligent Informatics (2023) Vol. 9, Iss. 3, pp. 490-490
Open Access

An Efficient Mathematical Method for Recovery of Tampered Image Content
Tong Liu, Xiaochen Yuan, Chan‐Tong Lam
2022 IEEE 10th International Conference on Information, Communication and Networks (ICICN) (2023), pp. 782-786
Closed Access

Page 1

Scroll to top