OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Gauss–Jordan elimination-based image tampering detection and self-recovery
Xiaochen Yuan, Xinhang Li, Tong Liu
Signal Processing Image Communication (2020) Vol. 90, pp. 116038-116038
Closed Access | Times Cited: 14

Showing 14 citing articles:

A Fragile Image Watermarking Scheme in DWT Domain Using Chaotic Sequences and Error-Correcting Codes
Andy M. Ramos, José A.P. Artiles, Daniel P. B. Chaves, et al.
Entropy (2023) Vol. 25, Iss. 3, pp. 508-508
Open Access | Times Cited: 12

Three Layer Authentications with a Spiral Block Mapping to Prove Authenticity in Medical Images
Ferda Ernawan, Afrig Aminuddin, Danakorn Nincarean, et al.
International Journal of Advanced Computer Science and Applications (2022) Vol. 13, Iss. 4
Open Access | Times Cited: 18

Image authentication and recovery: Sudoku puzzle and MD5 hash algorithm based self-embedding fragile image watermarking method
Ayhan Renklier, Serkan Öztürk
Multimedia Tools and Applications (2023) Vol. 83, Iss. 5, pp. 13929-13951
Closed Access | Times Cited: 6

A Meta-Heuristic Method for Reassemble Bifragmented Intertwined JPEG Image Files in Digital Forensic Investigation
Rabei Raad Ali, Kamaruddin Malik Mohamad, Salama A. Mostafa, et al.
IEEE Access (2023) Vol. 11, pp. 111789-111800
Open Access | Times Cited: 5

Digital image self-recovery using CNN networks
Mehdi Rezaei, Hassan Taheri
Optik (2022) Vol. 264, pp. 169345-169345
Closed Access | Times Cited: 9

Pixel tampering detection in encrypted surveillance videos on resource-constrained devices
Ifeoluwapo Aribilola, Brian Lee, Mamoona Naveed Asghar
Internet of Things (2024) Vol. 25, pp. 101058-101058
Open Access | Times Cited: 1

A distortion-free authentication method for color images with tampering localization and self-recovery
Che-Wei Lee
Signal Processing Image Communication (2024) Vol. 124, pp. 117116-117116
Closed Access | Times Cited: 1

Integer wavelet transform based an effective fragile watermarking scheme for exact authentication and restoration
Durgesh Singh, Sandeep S. Udmale, Sanjay Kumar Singh
Journal of Ambient Intelligence and Humanized Computing (2022) Vol. 14, Iss. 5, pp. 4841-4852
Closed Access | Times Cited: 7

A novel geometrically invariant quantum watermarking scheme utilizing Quantum Error Correction
Zheng Xing, Chan‐Tong Lam, Xiaochen Yuan, et al.
Journal of King Saud University - Computer and Information Sciences (2023) Vol. 35, Iss. 10, pp. 101818-101818
Open Access | Times Cited: 4

Detection and localization of image tampering in digital images with fused features
Mohassin Ahmad, Farida Khursheed
Concurrency and Computation Practice and Experience (2022) Vol. 34, Iss. 23
Closed Access | Times Cited: 6

New Framework of Self-Embedding Fragile Watermarking Based on Reference Sharing Mechanism
Lin Huang, Zhaoyang Xiang, Jian Li, et al.
Security and Communication Networks (2022) Vol. 2022, pp. 1-14
Open Access | Times Cited: 4

NUMERICAL ANALYSIS OF RICE GROWTH PHASES IN KARAWANG USING THE GAUSS-JORDAN ELIMINATION METHOD
Ruth Ririn Vania Siregar, Santri Chintia Purba, Bela Desy Natalia, et al.
EduMatSains Jurnal Pendidikan Matematika dan Sains (2024) Vol. 8, Iss. 2, pp. 261-269
Open Access

Fragile watermarking for image authentication using dyadic walsh ordering
Prajanto Wahyu Adi, Adi Wibowo, Guruh Aryotejo, et al.
International Journal of Advances in Intelligent Informatics (2023) Vol. 9, Iss. 3, pp. 490-490
Open Access

Page 1

Scroll to top