
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A new digital image tamper detection algorithm based on integer wavelet transform and secured by encrypted authentication sequence with 3D quantum map
Milad Jafari Barani, Milad Yousefi Valandar, Peyman Ayubi
Optik (2019) Vol. 187, pp. 205-222
Closed Access | Times Cited: 41
Milad Jafari Barani, Milad Yousefi Valandar, Peyman Ayubi
Optik (2019) Vol. 187, pp. 205-222
Closed Access | Times Cited: 41
Showing 1-25 of 41 citing articles:
A DWT-SVD based robust digital watermarking for medical image security
Narima Zermi, Amine Khaldi, Mohamed Redouane Kafi, et al.
Forensic Science International (2021) Vol. 320, pp. 110691-110691
Closed Access | Times Cited: 101
Narima Zermi, Amine Khaldi, Mohamed Redouane Kafi, et al.
Forensic Science International (2021) Vol. 320, pp. 110691-110691
Closed Access | Times Cited: 101
Deterministic chaos game: A new fractal based pseudo-random number generator and its cryptographic application
Peyman Ayubi, Saeed Setayeshi, Amir Masoud Rahmani
Journal of Information Security and Applications (2020) Vol. 52, pp. 102472-102472
Closed Access | Times Cited: 73
Peyman Ayubi, Saeed Setayeshi, Amir Masoud Rahmani
Journal of Information Security and Applications (2020) Vol. 52, pp. 102472-102472
Closed Access | Times Cited: 73
A new chaotic complex map for robust video watermarking
Peyman Ayubi, Milad Jafari Barani, Milad Yousefi Valandar, et al.
Artificial Intelligence Review (2020) Vol. 54, Iss. 2, pp. 1237-1280
Closed Access | Times Cited: 63
Peyman Ayubi, Milad Jafari Barani, Milad Yousefi Valandar, et al.
Artificial Intelligence Review (2020) Vol. 54, Iss. 2, pp. 1237-1280
Closed Access | Times Cited: 63
AuSR1: Authentication and self-recovery using a new image inpainting technique with LSB shifting in fragile image watermarking
Afrig Aminuddin, Ferda Ernawan
Journal of King Saud University - Computer and Information Sciences (2022) Vol. 34, Iss. 8, pp. 5822-5840
Closed Access | Times Cited: 33
Afrig Aminuddin, Ferda Ernawan
Journal of King Saud University - Computer and Information Sciences (2022) Vol. 34, Iss. 8, pp. 5822-5840
Closed Access | Times Cited: 33
A Blind and High-Capacity Data Hiding Scheme for Medical Information Security
Moad Med Sayah, Narima Zermi, Amine Khaldi, et al.
Circuits Systems and Signal Processing (2024) Vol. 43, Iss. 9, pp. 5711-5726
Closed Access | Times Cited: 7
Moad Med Sayah, Narima Zermi, Amine Khaldi, et al.
Circuits Systems and Signal Processing (2024) Vol. 43, Iss. 9, pp. 5711-5726
Closed Access | Times Cited: 7
Block mapping and dual-matrix-based watermarking for image authentication with self-recovery capability
X. Li, Qiancheng Chen, Runfu Chu, et al.
PLoS ONE (2024) Vol. 19, Iss. 2, pp. e0297632-e0297632
Open Access | Times Cited: 6
X. Li, Qiancheng Chen, Runfu Chu, et al.
PLoS ONE (2024) Vol. 19, Iss. 2, pp. e0297632-e0297632
Open Access | Times Cited: 6
Research on Multimodal Image Tampering Detection and Counterfeit Image Recognition Techniques under Deep Learning Framework
Meijing Zhang, Qiang Ding, Xiaoke Yan
Applied Mathematics and Nonlinear Sciences (2025) Vol. 10, Iss. 1
Open Access
Meijing Zhang, Qiang Ding, Xiaoke Yan
Applied Mathematics and Nonlinear Sciences (2025) Vol. 10, Iss. 1
Open Access
A blind and robust color images watermarking method based on block transform and secured by modified 3-dimensional Hénon map
Milad Yousefi Valandar, Milad Jafari Barani, Peyman Ayubi
Soft Computing (2019) Vol. 24, Iss. 2, pp. 771-794
Closed Access | Times Cited: 48
Milad Yousefi Valandar, Milad Jafari Barani, Peyman Ayubi
Soft Computing (2019) Vol. 24, Iss. 2, pp. 771-794
Closed Access | Times Cited: 48
A new Pseudo random number generator based on generalized Newton complex map with dynamic key
Milad Jafari Barani, Peyman Ayubi, Milad Yousefi Valandar, et al.
Journal of Information Security and Applications (2020) Vol. 53, pp. 102509-102509
Closed Access | Times Cited: 48
Milad Jafari Barani, Peyman Ayubi, Milad Yousefi Valandar, et al.
Journal of Information Security and Applications (2020) Vol. 53, pp. 102509-102509
Closed Access | Times Cited: 48
AuSR2: Image watermarking technique for authentication and self-recovery with image texture preservation
Afrig Aminuddin, Ferda Ernawan
Computers & Electrical Engineering (2022) Vol. 102, pp. 108207-108207
Closed Access | Times Cited: 23
Afrig Aminuddin, Ferda Ernawan
Computers & Electrical Engineering (2022) Vol. 102, pp. 108207-108207
Closed Access | Times Cited: 23
A Medical Image Watermarking System Based on Redundant Wavelets for Secure Transmission in Telemedicine Applications
Amine Khaldi, Mohamed Redouane Kafi, Maghni Bilel
Wireless Personal Communications (2023) Vol. 132, Iss. 2, pp. 823-839
Closed Access | Times Cited: 14
Amine Khaldi, Mohamed Redouane Kafi, Maghni Bilel
Wireless Personal Communications (2023) Vol. 132, Iss. 2, pp. 823-839
Closed Access | Times Cited: 14
A Fragile Image Watermarking Scheme in DWT Domain Using Chaotic Sequences and Error-Correcting Codes
Andy M. Ramos, José A.P. Artiles, Daniel P. B. Chaves, et al.
Entropy (2023) Vol. 25, Iss. 3, pp. 508-508
Open Access | Times Cited: 12
Andy M. Ramos, José A.P. Artiles, Daniel P. B. Chaves, et al.
Entropy (2023) Vol. 25, Iss. 3, pp. 508-508
Open Access | Times Cited: 12
A self-embedding technique for tamper detection and localization of medical images for smart-health
Solihah Gull, Romany F. Mansour, Nojood O. Aljehane, et al.
Multimedia Tools and Applications (2021) Vol. 80, Iss. 19, pp. 29939-29964
Closed Access | Times Cited: 27
Solihah Gull, Romany F. Mansour, Nojood O. Aljehane, et al.
Multimedia Tools and Applications (2021) Vol. 80, Iss. 19, pp. 29939-29964
Closed Access | Times Cited: 27
A chaotic video steganography technique for carrying different types of secret messages
Milad Yousefi Valandar, Peyman Ayubi, Milad Jafari Barani, et al.
Journal of Information Security and Applications (2022) Vol. 66, pp. 103160-103160
Closed Access | Times Cited: 21
Milad Yousefi Valandar, Peyman Ayubi, Milad Jafari Barani, et al.
Journal of Information Security and Applications (2022) Vol. 66, pp. 103160-103160
Closed Access | Times Cited: 21
CSNTSteg: Color Spacing Normalization Text Steganography Model to Improve Capacity and Invisibility of Hidden Data
Reema Thabit, Nur Izura Udzir, Sharifah Md Yasin, et al.
IEEE Access (2022) Vol. 10, pp. 65439-65458
Open Access | Times Cited: 21
Reema Thabit, Nur Izura Udzir, Sharifah Md Yasin, et al.
IEEE Access (2022) Vol. 10, pp. 65439-65458
Open Access | Times Cited: 21
Medical image protection using a data-hiding technique based on integer wavelets
Moad Med Sayah, Narima Zermi, Amine Khaldi, et al.
Multimedia Tools and Applications (2023) Vol. 83, Iss. 15, pp. 45843-45857
Closed Access | Times Cited: 10
Moad Med Sayah, Narima Zermi, Amine Khaldi, et al.
Multimedia Tools and Applications (2023) Vol. 83, Iss. 15, pp. 45843-45857
Closed Access | Times Cited: 10
An Effective Semi-fragile Watermarking Method for Image Authentication Based on Lifting Wavelet Transform and Feed-Forward Neural Network
Behrouz Bolourian Haghighi, Amir Hossein Taherinia, Reza Monsefi
Cognitive Computation (2020) Vol. 12, Iss. 4, pp. 863-890
Closed Access | Times Cited: 28
Behrouz Bolourian Haghighi, Amir Hossein Taherinia, Reza Monsefi
Cognitive Computation (2020) Vol. 12, Iss. 4, pp. 863-890
Closed Access | Times Cited: 28
A critical literature survey and prospects on tampering and anomaly detection in image data
Kelton Augusto Pontara da Costa, João Paulo Papa, Leandro A. Passos, et al.
Applied Soft Computing (2020) Vol. 97, pp. 106727-106727
Closed Access | Times Cited: 27
Kelton Augusto Pontara da Costa, João Paulo Papa, Leandro A. Passos, et al.
Applied Soft Computing (2020) Vol. 97, pp. 106727-106727
Closed Access | Times Cited: 27
A redundant wavelet based medical image watermarking scheme for secure transmission in telemedicine applications
Amine Khaldi, Mohamed Redouane Kafi, Maghni Bilel
Multimedia Tools and Applications (2022) Vol. 82, Iss. 5, pp. 7901-7915
Closed Access | Times Cited: 18
Amine Khaldi, Mohamed Redouane Kafi, Maghni Bilel
Multimedia Tools and Applications (2022) Vol. 82, Iss. 5, pp. 7901-7915
Closed Access | Times Cited: 18
Review on secured data capabilities of cryptography, steganography, and watermarking domain
Farah Qasim Ahmed Alyousuf, Roshidi Din
Indonesian Journal of Electrical Engineering and Computer Science (2020) Vol. 17, Iss. 2, pp. 1053-1053
Open Access | Times Cited: 16
Farah Qasim Ahmed Alyousuf, Roshidi Din
Indonesian Journal of Electrical Engineering and Computer Science (2020) Vol. 17, Iss. 2, pp. 1053-1053
Open Access | Times Cited: 16
An image authentication and recovery system based on discrete wavelet transform and convolutional neural networks
Hsien-Chu Wu, Wen-Li Fan, Chwei‐Shyong Tsai, et al.
Multimedia Tools and Applications (2021) Vol. 81, Iss. 14, pp. 19351-19375
Closed Access | Times Cited: 13
Hsien-Chu Wu, Wen-Li Fan, Chwei‐Shyong Tsai, et al.
Multimedia Tools and Applications (2021) Vol. 81, Iss. 14, pp. 19351-19375
Closed Access | Times Cited: 13
Authenticated Public Key Elliptic Curve Based on Deep Convolutional Neural Network for Cybersecurity Image Encryption Application
Esam A. A. Hagras, Aldosary Saad, Haitham Khaled, et al.
Sensors (2023) Vol. 23, Iss. 14, pp. 6589-6589
Open Access | Times Cited: 5
Esam A. A. Hagras, Aldosary Saad, Haitham Khaled, et al.
Sensors (2023) Vol. 23, Iss. 14, pp. 6589-6589
Open Access | Times Cited: 5
Color image watermarking for content authentication and self-restoration applications based on a dual-domain approach
Hazem Munawer Al-Otum, Mouaz Ibrahim
Multimedia Tools and Applications (2021) Vol. 80, Iss. 8, pp. 11739-11764
Closed Access | Times Cited: 12
Hazem Munawer Al-Otum, Mouaz Ibrahim
Multimedia Tools and Applications (2021) Vol. 80, Iss. 8, pp. 11739-11764
Closed Access | Times Cited: 12
A Risk Assessment Framework Proposal Based on Bow-Tie Analysis for Medical Image Diagnosis Sharing within Telemedicine
Thiago Poleto, Maísa Mendonça Silva, Thárcylla Rebecca Negreiros Clemente, et al.
Sensors (2021) Vol. 21, Iss. 7, pp. 2426-2426
Open Access | Times Cited: 12
Thiago Poleto, Maísa Mendonça Silva, Thárcylla Rebecca Negreiros Clemente, et al.
Sensors (2021) Vol. 21, Iss. 7, pp. 2426-2426
Open Access | Times Cited: 12
CADEN: cellular automata and DNA based secure framework for privacy preserving in IoT based healthcare
Nasir N. Hurrah, Ekram Khan, Uzma Khan
Journal of Ambient Intelligence and Humanized Computing (2022) Vol. 14, Iss. 3, pp. 2631-2643
Open Access | Times Cited: 8
Nasir N. Hurrah, Ekram Khan, Uzma Khan
Journal of Ambient Intelligence and Humanized Computing (2022) Vol. 14, Iss. 3, pp. 2631-2643
Open Access | Times Cited: 8