
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Reversible data hiding based on Shamir’s secret sharing for color images over cloud
Priyanka Singh, Balasubramanian Raman
Information Sciences (2017) Vol. 422, pp. 77-97
Closed Access | Times Cited: 49
Priyanka Singh, Balasubramanian Raman
Information Sciences (2017) Vol. 422, pp. 77-97
Closed Access | Times Cited: 49
Showing 1-25 of 49 citing articles:
Very High Capacity Image Steganography Technique Using Quotient Value Differencing and LSB Substitution
Gandharba Swain
Arabian Journal for Science and Engineering (2018) Vol. 44, Iss. 4, pp. 2995-3004
Closed Access | Times Cited: 93
Gandharba Swain
Arabian Journal for Science and Engineering (2018) Vol. 44, Iss. 4, pp. 2995-3004
Closed Access | Times Cited: 93
Digital Steganography and Watermarking for Digital Images: A Review of Current Research Directions
Oleg Evsutin, Anna Melman, Roman Meshcheryakov
IEEE Access (2020) Vol. 8, pp. 166589-166611
Open Access | Times Cited: 91
Oleg Evsutin, Anna Melman, Roman Meshcheryakov
IEEE Access (2020) Vol. 8, pp. 166589-166611
Open Access | Times Cited: 91
Recent trends in image watermarking techniques for copyright protection: a survey
Arkadip Ray, Somaditya Roy
International Journal of Multimedia Information Retrieval (2020) Vol. 9, Iss. 4, pp. 249-270
Closed Access | Times Cited: 59
Arkadip Ray, Somaditya Roy
International Journal of Multimedia Information Retrieval (2020) Vol. 9, Iss. 4, pp. 249-270
Closed Access | Times Cited: 59
Secure data deduplication using secret sharing schemes over cloud
Priyanka Singh, Nishant Agarwal, Balasubramanian Raman
Future Generation Computer Systems (2018) Vol. 88, pp. 156-167
Closed Access | Times Cited: 38
Priyanka Singh, Nishant Agarwal, Balasubramanian Raman
Future Generation Computer Systems (2018) Vol. 88, pp. 156-167
Closed Access | Times Cited: 38
Two new steganography techniques based on quotient value differencing with addition-subtraction logic and PVD with modulus function
Gandharba Swain
Optik (2018) Vol. 180, pp. 807-823
Closed Access | Times Cited: 31
Gandharba Swain
Optik (2018) Vol. 180, pp. 807-823
Closed Access | Times Cited: 31
A (t,n)- Secret image sharing with steganography based on Rook polynomial and LWE problem
Samaneh Mashhadi, Zahra Saeedi
Multimedia Tools and Applications (2023) Vol. 82, Iss. 25, pp. 39077-39097
Closed Access | Times Cited: 8
Samaneh Mashhadi, Zahra Saeedi
Multimedia Tools and Applications (2023) Vol. 82, Iss. 25, pp. 39077-39097
Closed Access | Times Cited: 8
Efficient and robust data availability solution for hybrid PLC/RF systems
Hassan Noura, Reem Melki, Ali Chehab, et al.
Computer Networks (2020) Vol. 185, pp. 107675-107675
Closed Access | Times Cited: 23
Hassan Noura, Reem Melki, Ali Chehab, et al.
Computer Networks (2020) Vol. 185, pp. 107675-107675
Closed Access | Times Cited: 23
Vulnerability Attacks of SVD-Based Video Watermarking Scheme in an IoT Environment
Heri Prasetyo, Chih‐Hsien Hsia, Chin -Hua Liu
IEEE Access (2020) Vol. 8, pp. 69919-69936
Open Access | Times Cited: 22
Heri Prasetyo, Chih‐Hsien Hsia, Chin -Hua Liu
IEEE Access (2020) Vol. 8, pp. 69919-69936
Open Access | Times Cited: 22
Efficient Real-Time Integrity Auditing With Privacy-Preserving Arbitration for Images in Cloud Storage System
Xin Tang, Yongfeng Huang, Chin‐Chen Chang, et al.
IEEE Access (2019) Vol. 7, pp. 33009-33023
Open Access | Times Cited: 17
Xin Tang, Yongfeng Huang, Chin‐Chen Chang, et al.
IEEE Access (2019) Vol. 7, pp. 33009-33023
Open Access | Times Cited: 17
Rate-distortion model for grayscale-invariance reversible data hiding
Siyan Zhou, Weiming Zhang, Chaomin Shen
Signal Processing (2020) Vol. 172, pp. 107562-107562
Closed Access | Times Cited: 17
Siyan Zhou, Weiming Zhang, Chaomin Shen
Signal Processing (2020) Vol. 172, pp. 107562-107562
Closed Access | Times Cited: 17
Separable Reversible Data Hiding for Encrypted 3D Meshes Based on Self-Organized Blocking and Most Significant Bit Prediction
Liansheng Sui, Pengfei Zhang, Zhaolin Xiao, et al.
Symmetry (2024) Vol. 16, Iss. 8, pp. 1059-1059
Open Access | Times Cited: 1
Liansheng Sui, Pengfei Zhang, Zhaolin Xiao, et al.
Symmetry (2024) Vol. 16, Iss. 8, pp. 1059-1059
Open Access | Times Cited: 1
Hyperchaos permutation on false-positive-free SVD-based image watermarking
Jing-Ming Guo, Dwi Riyono, Heri Prasetyo
Multimedia Tools and Applications (2018) Vol. 78, Iss. 20, pp. 29229-29270
Closed Access | Times Cited: 15
Jing-Ming Guo, Dwi Riyono, Heri Prasetyo
Multimedia Tools and Applications (2018) Vol. 78, Iss. 20, pp. 29229-29270
Closed Access | Times Cited: 15
Light Repository Blockchain System with Multisecret Sharing for Industrial Big Data
Hefeng Chen, Hsiao‐Ling Wu, Chin‐Chen Chang, et al.
Security and Communication Networks (2019) Vol. 2019, pp. 1-7
Open Access | Times Cited: 12
Hefeng Chen, Hsiao‐Ling Wu, Chin‐Chen Chang, et al.
Security and Communication Networks (2019) Vol. 2019, pp. 1-7
Open Access | Times Cited: 12
Three ( t , n ) -secret image sharing schemes based on homogeneous linear recursion
Sara Charoghchi, Samaneh Mashhadi
Information Sciences (2020) Vol. 552, pp. 220-243
Closed Access | Times Cited: 12
Sara Charoghchi, Samaneh Mashhadi
Information Sciences (2020) Vol. 552, pp. 220-243
Closed Access | Times Cited: 12
Steganography in RGB Images Using Adjacent Mean
Yun‐Hsin Chuang, Bor-Shing Lin, Yanxiang Chen, et al.
IEEE Access (2021) Vol. 9, pp. 164256-164274
Open Access | Times Cited: 11
Yun‐Hsin Chuang, Bor-Shing Lin, Yanxiang Chen, et al.
IEEE Access (2021) Vol. 9, pp. 164256-164274
Open Access | Times Cited: 11
An adaptive pixel mapping based approach for reversible data hiding in encrypted images
V. M. Manikandan, Yudong Zhang
Signal Processing Image Communication (2022) Vol. 105, pp. 116690-116690
Closed Access | Times Cited: 7
V. M. Manikandan, Yudong Zhang
Signal Processing Image Communication (2022) Vol. 105, pp. 116690-116690
Closed Access | Times Cited: 7
A Novel ( t , n ) Secret Sharing Scheme Based upon Euler’s Theorem
Hefeng Chen, Chin‐Chen Chang
Security and Communication Networks (2019) Vol. 2019, pp. 1-7
Open Access | Times Cited: 11
Hefeng Chen, Chin‐Chen Chang
Security and Communication Networks (2019) Vol. 2019, pp. 1-7
Open Access | Times Cited: 11
A Secured One Time Password Authentication Technique using (3, 3) Visual Cryptography Scheme
Oluwakemi Christiana Abikoye, Akande Noah Oluwatobi, Garuba Ayomide Victory, et al.
Journal of Physics Conference Series (2019) Vol. 1299, Iss. 1, pp. 012059-012059
Open Access | Times Cited: 11
Oluwakemi Christiana Abikoye, Akande Noah Oluwatobi, Garuba Ayomide Victory, et al.
Journal of Physics Conference Series (2019) Vol. 1299, Iss. 1, pp. 012059-012059
Open Access | Times Cited: 11
High Capacity Reversible Data Hiding for VQ-Compressed Images Based on Difference Transformation and Mapping Technique
Yuehui Li, Chin‐Chen Chang, Mingxing He
IEEE Access (2020) Vol. 8, pp. 32226-32245
Open Access | Times Cited: 9
Yuehui Li, Chin‐Chen Chang, Mingxing He
IEEE Access (2020) Vol. 8, pp. 32226-32245
Open Access | Times Cited: 9
Data Integrity and Security in Distributed Cloud Computing—A Review
Abdullatif Ghallab, Mohammed Saif, Abdulqader M. Mohsen
Advances in intelligent systems and computing (2020), pp. 767-784
Closed Access | Times Cited: 9
Abdullatif Ghallab, Mohammed Saif, Abdulqader M. Mohsen
Advances in intelligent systems and computing (2020), pp. 767-784
Closed Access | Times Cited: 9
Weighted visual secret sharing for general access structures based on random grids
Zuquan Liu, Guopu Zhu, Feng Ding, et al.
Signal Processing Image Communication (2021) Vol. 92, pp. 116129-116129
Closed Access | Times Cited: 9
Zuquan Liu, Guopu Zhu, Feng Ding, et al.
Signal Processing Image Communication (2021) Vol. 92, pp. 116129-116129
Closed Access | Times Cited: 9
A novel PDF steganography optimized using segmentation technique
Sanjive Tyagi, Rakesh Dwivedi, Ashendra Kumar Saxena
International Journal of Information Technology (2019) Vol. 12, Iss. 4, pp. 1227-1235
Closed Access | Times Cited: 9
Sanjive Tyagi, Rakesh Dwivedi, Ashendra Kumar Saxena
International Journal of Information Technology (2019) Vol. 12, Iss. 4, pp. 1227-1235
Closed Access | Times Cited: 9
Security Attack on Secret Sharing Based Watermarking Using Fractional Fourier Transform and Singular Value Decomposition
Didi Rosiyadi, Heri Prasetyo, Shi Jinn Horng, et al.
(2020)
Closed Access | Times Cited: 7
Didi Rosiyadi, Heri Prasetyo, Shi Jinn Horng, et al.
(2020)
Closed Access | Times Cited: 7
Reversible data hiding in encrypted images using multiple Huffman coding based on optimal block allocation
Liansheng Sui, Pang Zhi, Ying Cheng, et al.
Multimedia Tools and Applications (2023) Vol. 83, Iss. 12, pp. 34887-34911
Closed Access | Times Cited: 2
Liansheng Sui, Pang Zhi, Ying Cheng, et al.
Multimedia Tools and Applications (2023) Vol. 83, Iss. 12, pp. 34887-34911
Closed Access | Times Cited: 2
User‐friendly XOR‐based visual secret sharing by random grid
Tzuo‐Yau Fan, Her‐Chang Chao
IET Information Security (2018) Vol. 12, Iss. 5, pp. 398-403
Open Access | Times Cited: 5
Tzuo‐Yau Fan, Her‐Chang Chao
IET Information Security (2018) Vol. 12, Iss. 5, pp. 398-403
Open Access | Times Cited: 5