
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
ACGIS: Adversarial Cover Generator for Image Steganography with Noise Residuals Features-Preserving
Junxue Yang, Xin Liao
Signal Processing Image Communication (2023) Vol. 113, pp. 116927-116927
Closed Access | Times Cited: 10
Junxue Yang, Xin Liao
Signal Processing Image Communication (2023) Vol. 113, pp. 116927-116927
Closed Access | Times Cited: 10
Showing 10 citing articles:
High invisibility image steganography with wavelet transform and generative adversarial network
Ye Yao, Junyu Wang, Qi Chang, et al.
Expert Systems with Applications (2024) Vol. 249, pp. 123540-123540
Closed Access | Times Cited: 12
Ye Yao, Junyu Wang, Qi Chang, et al.
Expert Systems with Applications (2024) Vol. 249, pp. 123540-123540
Closed Access | Times Cited: 12
ASIGM: An Innovative Adversarial Stego Image Generation Method for Fooling Convolutional Neural Network-Based Image Steganalysis Models
Minji Kim, Youngho Cho, Hweerang Park, et al.
Electronics (2025) Vol. 14, Iss. 4, pp. 764-764
Open Access
Minji Kim, Youngho Cho, Hweerang Park, et al.
Electronics (2025) Vol. 14, Iss. 4, pp. 764-764
Open Access
High-accuracy image steganography with invertible neural network and generative adversarial network
Ke Wang, Yani Zhu, Qi Chang, et al.
Signal Processing (2025), pp. 109988-109988
Closed Access
Ke Wang, Yani Zhu, Qi Chang, et al.
Signal Processing (2025), pp. 109988-109988
Closed Access
Medical steganography: Enhanced security and image quality, and new S-Q assessment
Yuxiang Peng, Chong Fu, Yu Zheng, et al.
Signal Processing (2024) Vol. 223, pp. 109546-109546
Closed Access | Times Cited: 2
Yuxiang Peng, Chong Fu, Yu Zheng, et al.
Signal Processing (2024) Vol. 223, pp. 109546-109546
Closed Access | Times Cited: 2
Exploiting Fine-Grained DCT Representations for Hiding Image-Level Messages within JPEG Images
Junxue Yang, Xin Liao
(2023), pp. 7373-7382
Open Access | Times Cited: 5
Junxue Yang, Xin Liao
(2023), pp. 7373-7382
Open Access | Times Cited: 5
Enhanced image steganalysis through reinforcement learning and generative adversarial networks
Sumia Abdulhussien Razooqi Al-Obaidi, ‪Mina Zolfy Lighvan, Mohammad Asadpour
Intelligent Decision Technologies (2024) Vol. 18, Iss. 2, pp. 1077-1100
Closed Access | Times Cited: 1
Sumia Abdulhussien Razooqi Al-Obaidi, ‪Mina Zolfy Lighvan, Mohammad Asadpour
Intelligent Decision Technologies (2024) Vol. 18, Iss. 2, pp. 1077-1100
Closed Access | Times Cited: 1
Improved security with novel M-Log chaos steganography algorithm for huffman compressed english text
Devvrat Raghuvanshi, Kamaldeep Joshi, Rainu Nandal, et al.
Multimedia Tools and Applications (2024)
Closed Access
Devvrat Raghuvanshi, Kamaldeep Joshi, Rainu Nandal, et al.
Multimedia Tools and Applications (2024)
Closed Access
A Novel M-Log Chaos Method for Enhanced Security Blended with Pristine d-Hybrid LSB Approach for Reducing Image Degradation Hinged on Huffman Compression of English Text for Payload Improvement
Devvrat Raghuvanshi, Kamaldeep Joshi, Rainu Nandal, et al.
Research Square (Research Square) (2023)
Open Access
Devvrat Raghuvanshi, Kamaldeep Joshi, Rainu Nandal, et al.
Research Square (Research Square) (2023)
Open Access
Implementation of a Logistic Map to Calculate the Bits Required for Digital Image Steganography Using the Least Significant Bit (LSB) Method
Wikky Fawwaz Al Maki, Indra Bayu Muktyas, Samsul Arifin, et al.
Journal of Computer Science (2023) Vol. 19, Iss. 6, pp. 686-693
Open Access
Wikky Fawwaz Al Maki, Indra Bayu Muktyas, Samsul Arifin, et al.
Journal of Computer Science (2023) Vol. 19, Iss. 6, pp. 686-693
Open Access
MedSteGAN: Medical Embedding-Optimized Steganography with Improved GAN
Yuxiang Peng, Chong Fu, Yu Zheng, et al.
(2023)
Closed Access
Yuxiang Peng, Chong Fu, Yu Zheng, et al.
(2023)
Closed Access