OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Image encryption scheme based on blind signature and an improved Lorenz system
Guodong Ye, Huishan Wu, Min Liu, et al.
Expert Systems with Applications (2022) Vol. 205, pp. 117709-117709
Closed Access | Times Cited: 63

Showing 1-25 of 63 citing articles:

Image Encryption Scheme Based on Newly Designed Chaotic Map and Parallel DNA Coding
Shenli Zhu, Xiaoheng Deng, Wendong Zhang, et al.
Mathematics (2023) Vol. 11, Iss. 1, pp. 231-231
Open Access | Times Cited: 71

High-dimensional memristive neural network and its application in commercial data encryption communication
Chunhua Wang, Dong Hong Tang, Hairong Lin, et al.
Expert Systems with Applications (2023) Vol. 242, pp. 122513-122513
Closed Access | Times Cited: 71

Exploiting Newly Designed Fractional-Order 3D Lorenz Chaotic System and 2D Discrete Polynomial Hyper-Chaotic Map for High-Performance Multi-Image Encryption
Wei Feng, Quanwen Wang, Hui Liu, et al.
Fractal and Fractional (2023) Vol. 7, Iss. 12, pp. 887-887
Open Access | Times Cited: 70

Dual-Domain Image Encryption in Unsecure Medium—A Secure Communication Perspective
Hemalatha Mahalingam, V. Thanikaiselvan, Anirudh Rajiv Menon, et al.
Mathematics (2023) Vol. 11, Iss. 2, pp. 457-457
Open Access | Times Cited: 41

Optical image encryption and authentication scheme with computational ghost imaging
Zhe Guo, Suhua Chen, Ling Zhou, et al.
Applied Mathematical Modelling (2024) Vol. 131, pp. 49-66
Closed Access | Times Cited: 38

Image encryption scheme based on improved four-dimensional chaotic system and evolutionary operators
Ying Niu, Hangyu Zhou, Xuncai Zhang
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 20

Secured IIoT against trust deficit - A flexi cryptic approach
V. M. Padmapriya, K. Thenmozhi, M. Hemalatha, et al.
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 20

A novel image encryption algorithm based on hybrid chaotic maps using a key image
Sellami Benaissi, Noureddine Chikouche, Rafik Hamza
Optik (2022) Vol. 272, pp. 170316-170316
Closed Access | Times Cited: 67

A Fast Hyperchaotic Image Encryption Scheme
Xiaojuan Ma, Chunhua Wang, Wenlu Qiu, et al.
International Journal of Bifurcation and Chaos (2023) Vol. 33, Iss. 05
Closed Access | Times Cited: 35

A highly secure image encryption algorithm based on conservative hyperchaotic system and dynamic biogenetic gene algorithms
Xilin Liu, Xiaojun Tong, Miao Zhang, et al.
Chaos Solitons & Fractals (2023) Vol. 171, pp. 113450-113450
Closed Access | Times Cited: 30

Secured Quantum Image Communication Using New Two Dimensional Chaotic Map Based Encryption Methods
Sakshi Patel, V. Thanikaiselvan, Rengarajan Amirtharajan
International Journal of Theoretical Physics (2024) Vol. 63, Iss. 2
Closed Access | Times Cited: 8

A chaotic hierarchical encryption/watermark embedding scheme for multi-medical images based on row–column confusion and closed-loop bi-directional diffusion
Zheyi Zhang, Jun 俊 Mou 牟, Santo Banerjee, et al.
Chinese Physics B (2023) Vol. 33, Iss. 2, pp. 020503-020503
Closed Access | Times Cited: 19

Reversible image-hiding algorithm based on singular value sampling and compressive sensing
Guodong Ye, Huishan Wu, Min Liu, et al.
Chaos Solitons & Fractals (2023) Vol. 171, pp. 113469-113469
Closed Access | Times Cited: 16

Securing Parallel Data: An Experimental Study of Hindmarsh-Rose Model-Based Confidentiality
Nazeer Shaik, P. Chitralingappa, B S S Harichandana
International Journal of Advanced Research in Science Communication and Technology (2024), pp. 81-89
Open Access | Times Cited: 5

Chaos-Based Cryptography: Text Encryption Using Image Algorithms
Marcin Lawnik, Lazaros Moysis, Christos Volos
Electronics (2022) Vol. 11, Iss. 19, pp. 3156-3156
Open Access | Times Cited: 24

Reversible blind image hiding algorithm based on compressive sensing and fusion mechanism
Huishan Wu, Guodong Ye, Wun‐She Yap, et al.
Optics & Laser Technology (2023) Vol. 167, pp. 109755-109755
Closed Access | Times Cited: 15

Healthcare with datacare—a triangular DNA security
S. Aashiq Banu, Adel Ismail Al‐Alawi, M. Padmaa, et al.
Multimedia Tools and Applications (2023) Vol. 83, Iss. 7, pp. 21153-21170
Closed Access | Times Cited: 15

Image compression-hiding algorithm based on compressive sensing and integer wavelet transformation
Guodong Ye, Simin Du, Xiaoling Huang
Applied Mathematical Modelling (2023) Vol. 124, pp. 576-596
Closed Access | Times Cited: 15

Target-based image encryption via infinite interval chaotic system with Ill-conditioned parameter and 3DBDM
Pengbo Liu, Xingyuan Wang, Zhao Xiu, et al.
Expert Systems with Applications (2023) Vol. 232, pp. 120811-120811
Closed Access | Times Cited: 13

Integrated dual hyperchaotic and Josephus traversing based 3D confusion-diffusion pattern for image encryption
Edy Winarno, Kristiawan Prasetyo Agung Nugroho, Prajanto Wahyu Adi, et al.
Journal of King Saud University - Computer and Information Sciences (2023) Vol. 35, Iss. 9, pp. 101790-101790
Open Access | Times Cited: 13

Image encryption approach using improved chaotic system incorporated with differential evolution and genetic algorithm
S. Bhowmik, Sriyankar Acharyya
Journal of Information Security and Applications (2022) Vol. 72, pp. 103391-103391
Closed Access | Times Cited: 20

FPGA image encryption-steganography using a novel chaotic system with line equilibria
Sun Jingyu, Hong Cai, Gang Wang, et al.
Digital Signal Processing (2022) Vol. 134, pp. 103889-103889
Closed Access | Times Cited: 19

Image pixels swapping encryption based on the TetraVex game and a publicly hash-sharing algorithm
Muhammad Hussain, Nadeem Iqbal, Zia Bashir
Cluster Computing (2024) Vol. 27, Iss. 4, pp. 5355-5376
Closed Access | Times Cited: 3

CSENMT: A deep image compressed sensing encryption network via multi-color space and texture feature
Xiuli Chai, Shiping Song, Zhihua Gan, et al.
Expert Systems with Applications (2023) Vol. 241, pp. 122562-122562
Closed Access | Times Cited: 10

Latin Square and Machine Learning Techniques Combined Algorithm for Image Encryption
Sakshi Patel, V. Thanikaiselvan
Circuits Systems and Signal Processing (2023) Vol. 42, Iss. 11, pp. 6829-6853
Closed Access | Times Cited: 8

Page 1 - Next Page

Scroll to top